Da costo a risorsa
Transcription
Da costo a risorsa
CONTRIBUTI Da costo a risorsa Da costo a risorsa L A TUTEL A DEI DATI PERSONALI NELLE AT TIVITÀ PRODUT TIVE Questo volume si propone di valutare l’impatto della tutela dei dati personali nell’attività delle imprese e quale funzione essa può svolgere nell’economia dei mercati aperti. L’approccio vuole essere di natura di- A cura di Gaetano Rasi namica e non statica, nonché di confronto fra indirizzi ed esperienze diverse. Il volume è ripartito in quattro sessioni: la prima tratta della tutela dei dati personali nel mercato globale; la seconda della libertà di impresa e del diritto alla riservatezza; la terza della tutela dei dati personali nel rapporto tra impresa, utenti e consumatori e la quarta indica la nuova frontiera della privacy come risorsa per lo sviluppo economico. www.garanteprivacy.it Stefano Rodotà, Presidente Giuseppe Santaniello, Vice Presidente Gaetano Rasi, Componente Mauro Paissan, Componente Giovanni Buttarelli, Segretario generale Redazione Garante per la protezione dei dati personali Piazza di Monte Citorio, 121 00186 Roma fax 06 69677785 www.garanteprivacy.it www.dataprotection.org e-mail: [email protected] Pubblicazione della Presidenza del Consiglio dei Ministri Dipartimento per l’informazione e l’editoria Direttore: Mauro Masi Via Po, 14 - 00198 Roma - tel. 06 85981 Stampa e distribuzione: Ufficio grafico dell’Istituto Poligrafico e Zecca dello Stato presso il Dipartimento per l’informazione e l’editoria Piazza di Monte Citorio, 121 00186 Roma www.garanteprivacy.it www.dataprotection.org Progetto grafico: Vertigo Design Si ringraziano quanti nella struttura del Garante hanno, per le rispettive competenze, contribuito alla pubblicazione di questo volume G.R. Da costo a risorsa LA TUTEL A DEI DATI PERSONALI NELLE AT TIVITÀ PRODUT TIVE A cura di Gaetano Rasi www.garanteprivacy.it Indice I contenuti del volume About this Book 1 3 Introduzione Cosa cambia per le attività produttive What Is Changing in Production Activities di Gaetano Rasi 7 Sessione I - La tutela dei dati personali nel mercato globale Session I - Personal Data Protection in the Global Marketplace 17 The Privacy Benefits and Costs from a US Perspective di Robert Gellman 29 The Impact of the Different Regulatory Models in the World Scenario 50 di George Radwanski Diritti fondamentali e libertà di iniziativa economica 63 The Effectiveness of Privacy Protection in Economic Systems di Orson Swindle 69 Balancing of Interests di Amitai Etzioni La tutela dei dati personali in una realtà multinazionale Personal Data Protection in a Multinational Framework di Umberto Paolucci New Privacy-Oriented Markets di Alejandra Gils Carbò New Privacy-Oriented Markets. Direct Marketing in Hungary di Attila Peterfalvi IV 57 Fundamental Rights and Freedom of Enterprise di Giovanni Buttarelli Da costo a risorsa - Attività produttive e protezione dei dati personali 78 82 88 93 98 Indice Sessione II - Privacy e Impresa Session II - Privacy and Business Sessione III - Impresa, utenti e consumatori Session III - Business, Users, Consumers Quale privacy? 105 What Privacy? di Mauro Paissan 110 Mercato: trasparenza e privacy 115 Marketplace: Openness and Privacy di Luigi Spaventa 119 Businesses, Users, Consumers: Toward a New Relationship di Giuseppe Santaniello 123 Competizione economica: i vantaggi della protezione dei dati The Impact of Privacy Policies on Business Processes di Martin Abrams Does Business Need In-House Self-Regulation? di Alfred Büllesbach Uso a fini privati dei dati personali in mano pubblica Impresa, Utenti, Consumatori: verso un nuovo rapporto 131 Business Competition: Advantages of Data Protection di Giuseppe Tesauro The Anonymous Consumer di Herbert Burkert 152 201 207 213 220 226 Prevenzione e risarcimento dei danni 234 156 Prevention of and Remedies for Damage di Piergiuseppe Monateri 240 Privacy e rapporti di lavoro 160 Analisi economica del diritto alla riservatezza Privacy in the Employment Context di Umberto Romagnoli 169 Privacy and Technological Innovation di Helmut Bäumler 178 Using Personal Data Held by Public Entities for Private Purposes di Vincenzo Zeno Zencovich Garanzie e nuove tecnologie 185 Safeguards and New Technologies di Giuseppe Casadio 188 La nuova consapevolezza dei consumatori 190 Consumers' New Awareness di Enrico Letta 194 246 An Economic Analysis of the Right to Privacy di Marco Maglio 260 Privacy in a Business: An Operational Model di Douwe Korff 273 Infomediazione come strumento dei consumatori Infomediation as a Consumer Tool di Carlo Formenti 283 293 V Indice Building Consumer Trust: Personal Data Protection as a Resource di Mel Peterson La Rete: fiducia degli utenti e sicurezza dei dati 302 311 The Network: Users’ Trust and Data Security di Claudio Manganelli 315 Quali regole tra libertà e sicurezza? 319 Freedom and Security: What Rules? di Maurizio Gasparri 324 Sessione IV - Privacy e sviluppo economico: soluzioni e prospettive Session IV - Privacy and Economic Development: solution and Outlook Globalizzare le garanzie 331 Globalising Safeguards di Stefano Rodotà 336 Collective Rights and Interests: How to Harmonise Approaches and Safeguards di Marc Rotemberg Investire in Privacy per lo sviluppo di nuovi prodotti e servizi Investing in Privacy to Develop New Products and Services di Maurizio Costa Growth Expectations for a Global Marketplace That is Mindful of Individuals di Mozelle W. Thompson The Privacy Resource di Spiros Simitis VI Da costo a risorsa - Attività produttive e protezione dei dati personali 342 348 356 363 367 I contenuti del volume Questo volume si propone di valutare l’impatto della tutela dei dati personali nell’attività delle imprese e quale funzione essa può svolgere nell’economia dei mercati aperti. L’approccio vuole essere di natura dinamica e non statica, nonché di confronto fra indirizzi ed esperienze diverse. A tal fine sono stati qui raccolti i contributi di autorevoli studiosi ed esperti che si sono espressi nel corso della Conferenza Internazionale “Privacy: da costo a risorsa” che si è tenuta a Roma, presso la sede dell’Autorità Garante, nel dicembre 2002. Gli intenti vanno oltre la pur impegnata trattazione scientifica. Si desidera infatti che abbia luogo un ampio confronto tra coloro che operano nelle attività imprenditoriali, professionali e della cultura economica e giuridica, per fare il punto non solo dottrinale sull’evoluzione della materia. Da tale dibattito il Garante italiano e, si ritiene, anche i colleghi di tutto il mondo che si occupano di protezione dati, potrebbero trarre utili indicazioni ed avere motivi di ulteriore avanzamento della normativa sulla protezione dei dati personali con particolare riferimento alla sua incidenza nella macro e nella microeconomia. Per dare conto di uno scenario oramai piuttosto complesso, si è deciso di rispettare l’articolazione della Conferenza Internazionale “Privacy: da costo a risorsa”. Il volume, pertanto, è ripartito in quattro sessioni: la prima, La tutela dei dati personali nel mercato globale, si è proposta di introdurre i temi di discussione, individuando quale funzione svolga, nella percezione attuale, la tutela dei dati personali rispetto ai meccanismi del mercato globale ed all’incontro tra domanda ed offerta. Particolare attenzione è stata data agli effetti sulle dinamiche economiche della coesistenza del modello di data protecion di stampo europeo e del sistema di protezione adottato dagli Usa. Oltre al punto di vista dei rappresentanti istituzionali si è dato spazio all’esperienza diretta di strutture multinazionali sia statunitensi che europee e sono state introdotte le testimonianze di esponenti del mondo asiatico e latino americano. Si parla anche delle aspettative dei consumatori in una dimensione continentale europea. • • La seconda sessione, Libertà di impresa e diritto alla riservatezza, ha inteso approfondire il ruolo della tutela dei dati personali nel quadro dell’attività d’impresa. Sono stati presi in considerazione due aspetti: quello statico, relativo alla struttura organizzativa delle aziende, analizzando l’impatto della protezione dei dati personali all’interno dell’impresa e sui problemi connessi con il rapporto di lavoro; 1 quello dinamico con un esame del principio del bilanciamento degli interessi come strumento per garantire l’equilibrio in concreto tra libertà, impresa e diritto alla riservatezza. Inoltre sono stati trattati i problemi del rapporto fra trasparenza e privacy e delle garanzie nei confronti delle nuove tecnologie. • La terza sessione, La tutela dei dati personali nel rapporto tra impresa, utenti e consumatori, ha preso in esame i problemi concernenti l’uso dei dati personali nella comunicazione commerciale e nelle azioni di fidelizzazione dei clienti. Particolare attenzione è stata prestata alle questioni relative ai problemi della sicurezza, alle modalità di raccolta dei dati utilizzati per attività di comunicazione e di marketing diretto, ai costi della raccolta di dati, alla relazione tra attività di vendita a distanza e trattamento di dati personali, all’utilizzabilità dei dati provenienti da elenchi pubblici, al ruolo del consenso come meccanismo di autotutela del consumatore ed alle possibili forme di protezione dei consumatori con particolare riferimento ai mercati sovranazionali. In questo quadro è stato esaminato anche il tema dell’allocazione dei costi derivanti per l’impresa dalla violazione delle norme per la tutela dei dati personali. La quarta sessione, Verso la nuova frontiera: la privacy come risorsa per lo sviluppo economico, anzitutto ha affrontato il tema di come universalizzare le garanzie di tutela dei dati, dal punto di vista dei popoli, dei territori, delle strutture mondiali produttive e distributive delle merci e dei servizi. Inoltre - prendendo spunto dall’analisi, condotta nelle sessioni precedenti - dei cambiamenti in corso nel mercato globale, nell’organizzazione dell’impresa e nel rapporto tra consumatori e produttori, ha cercato di individuare le possibili prospettive di sviluppo della tutela dei dati delle persone, intesa come valore verso il quale possono convergere tanto le aziende quanto i clienti per realizzare scelte consapevoli e libere. In questo quadro è stato messo in evidenza il ruolo che possono svolgere le tecnologie e l’autodisciplina (codici deontologici) per abbandonare una visione negativa (rispetto della privacy come mero costo o limite allo sviluppo) e per favorire l’affermazione della tutela dei dati personali come strumento in grado di generare valore aggiunto in una civiltà di cosciente, diffuso e superiore progresso. • 2 Da costo a risorsa - Attività produttive e protezione dei dati personali About This Book This book is aimed at considering the impact of personal data protection on business activities as well as the role to be played by data protection in the openmarket economy. A dynamic rather than a static approach will be followed, also based on the comparison of different views and experiences. The contributions submitted by authoritative scholars and experts on the occasion of the international Conference “Privacy: Cost to Resource” were collected in this book. The Conference was held in Rome, at the premises of the Italian data protection Authority, in December 2002. Publishing these contributions is meant to provide more than an opportunity for carrying out in-depth scientific analysis. Indeed, we hope that it will stimulate a broad-ranging discussion between industry, professionals and economic and legal actors, in order to assess the state-of-the-art situation in this sector not only in terms of jurisprudence. I believe that such a discussion may provide useful guidance not only to the Italian data protection authority, but to our colleagues worldwide that deal with data protection issues – in view of the further advancement of privacy legislation with particular regard to its macro- and microeconomic impact. In order to take account of a scenario that is by now quite complex, the book is organised according to the structure of the International Conference “Privacy: Cost to Resource”, i.e. it includes four Sessions: • session one, concerning Personal Data Protection in the Global Marketplace, aims at presenting the main issues to be debated, by identifying the role played currently by personal data protection in respect of the mechanisms featured in the global marketplace as well as of the demand-offer interplay. Special attention was paid to the effects produced on economic mechanisms by the co-existence of the European and US data protection models. In addition to the viewpoints of representatives from various institutions, the direct experience of both US and European multinational organisations was taken into consideration, and the opinions voiced by representatives from the Latino-American and Eastern European world were reported. Consumer expectations in the Europe-wide area were also addressed. Session two, concerning Freedom of Enterprise and Right to Privacy, addressed the role of personal data protection within businesses in greater detail from two viewpoints. From a static viewpoint, the organisational structure of businesses was considered and the impact of personal data protection on both business activi• 3 ties and employer-employee relationships was evaluated. From a dynamic viewpoint, the balancing of interests principle was taken into account as a tool to ensure that freedom, enterprise and right to privacy can be reconciled in concrete. The relationship between openness and privacy and the safeguards related to new technologies were also debated. Session three, concerning Personal Data Protection in the Relationships between Businesses, Users and Consumers, addressed the issues related to the use of personal data in commercial communications and customer loyalty initiatives. Special attention was paid to security issues, mechanisms for collecting data used for communication and direct marketing activities, costs of data collection, relationships between distance selling and personal data processing, re-use of data from public sources, the role of consent as a self-protection mechanism for consumers, and the safeguards available to consumers with particular regard to supra-national markets. In this connection, allocation of the costs incurred by businesses following breaches of personal data protection laws was also considered. • • Session four, concerning Towards the New Frontier: Privacy as a Resource for Economic Development, tackled the issue of how to globalise data protection safeguards in terms of peoples, territories, and world production and distribution facilities for goods and services. Additionally, based on the analysis carried out in the preceding sessions concerning the on-going changes in the world market, in business organisation as well as in the consumer-to-producer relationship, an attempt was made to outline the development outlook for data protection on the assumption that data protection is the focus of attention for both businesses and customers in order to make free, informed choices. The role to be played by technologies and self-regulation (codes of practice) was pointed out in this regard, so as to overcome the negative concept of privacy - i.e. privacy compliance regarded merely as a cost and/or a hindrance to development - and foster the establishment of personal data protection as a tool that can yield added value in a community seeking enlightened, widespread, and superior progress. 4 Da costo a risorsa - Attività produttive e protezione dei dati personali Introduzione C OSA CAMBIA PER LE ATTIVITÀ PRODUTTIVE Gaetano Rasi INTRODUZIONE Cosa cambia per le attività produttive Gaetano Rasi (1) Sommario: 1. Profondi cambiamenti – 2. La valutazione delle esigenze del mercato – 3. Incidenza nei rapporti fra soggetti economici – 4. La privacy come qualità – 5. L’analisi costi-benefici dello spamming – 6. Necessità di equilibrio tra protezione dati e libera iniziativa – 7. I termini della nuova sfida 1. Profondi cambiamenti Siamo tutti convinti che viviamo un’epoca di profondi cambiamenti che attraversano in modo sempre più intenso tutte le attività umane. I progressi tecnologici, da un lato, rendono possibili meccanismi di comunicazione un tempo impensabili e consentono quasi di annullare le distanze nei trasferimenti delle merci e dei servizi, dei capitali, delle persone e riducono i tempi di realizzazione delle scelte, influendo direttamente sulle modalità di produzione e di distribuzione dei beni; dall’altro lato, sempre gli stessi progressi tecnologici influiscono sul - oppure come nel caso di Internet si sottraggono al - tradizionale rapporto che collega l’efficacia di una normativa nazionale ad un ambito territoriale determinato. Tutto questo comporta, rispetto al tema della tutela dei dati personali, spunti di riflessione di varia natura che confermano giorno dopo giorno che una generale normativa sulla protezione dei dati personali è davvero il crocevia verso il quale convergono i possibili percorsi di sviluppo della società contemporanea. Solitamente l’analisi delle conseguenze derivanti da queste innovazioni e da queste possibilità si sofferma su formulazioni di carattere giuridico che individuano i limiti, positivi o negativi, rispetto al diritto ad esercitare un controllo sulle informazioni che ci riguardano. Ma, da economista, credo opportuno sottolineare che, insieme con le consapevolezze etiche e con le condizioni giuridiche da tutelare, si modifica il peso dei fattori produttivi e distributivi rispetto ai risultati e cambia l’organizzazione del lavoro all’interno delle aziende. (1) Componente Garante per la protezione dei dati personali - Italia Gaetano Rasi - Cosa cambia per le attività produttive 7 Una riflessione particolare merita la scomposizione dei processi produttivi. Mi riferisco al fenomeno sempre più diffuso della parcellizzazione delle fasi intermedie fra il varo del progetto riguardante un prodotto (merce o servizio) e la sua commercializzazione. E qui hanno luogo passaggi di dati personali. Il diffondersi delle fasi di scomposizione del processo non è deindustrializzazione bensì attribuzione all’esterno di funzioni specifiche e specialistiche di singoli elementi e ruoli per poi riassumere all’interno dell’impresa l’assemblaggio e dar luogo al prodotto finito. Ed anche qui vi sono passaggi fra diversi responsabili o titolari del trattamento dei dati personali Da tempo, poi, il concetto di innovazione come motore del progresso produttivo va oltre l’incidenza sui processi di fabbricazione o sull’invenzione di nuovi prodotti. È innovazione pure una nuova organizzazione (oltre la terziarizzazione esterna come l’outsourcing), l’impiego di sistemi automatici nella comunicazione ed elaborazione dei dati, la gestione consortile di settori aziendali comuni ad altre imprese, le iniziative pre e post vendita. 2. La valutazione delle esigenze del mercato Il successo di una innovazione dipende non solo dalla sua originalità, ma spesso dalla capacità di valutare le esigenze emergenti o latenti nel mercato. Questo ci porta a valutare l’elemento personale nella valutazione del venditore e dell’acquirente nella determinazione a concludere il negotio moderno. Nei contratti bilaterali – compresi quelli di pura adesione ad una offerta pubblica (per es. l’esposizione della merce in vetrina o su uno scaffale, oppure quella che viene reclamizzata sui media) – la determinazione ad operare dei singoli soggetti deriva sia dall’utilità perseguita dai consumatori, sia dalle certezze nelle modalità. Quindi emerge come decisivo nella formazione delle volontà del venditore e del compratore, oltre il calcolo della convenienza, anche quello della certezza. E questo ultimo è un elemento tipico del comportamento soggettivo. Analizziamo in sintesi le componenti in gioco nella formazione della volontà: a) il rapporto tra il sacrificio per il prezzo da pagare e l’utilità prevista per il bene da acquisire; b) la convenienza a privarsi del bene in relazione al guadagno calcolato nell’incasso del corrispettivo; c) il grado di rischio nelle modalità di vendita o di acquisto: fornitura immediata o differita, pagamenti in contanti o dilazionati; d) garanzie rispetto ad eventuali vizi occulti; e) bontà dei mezzi di pagamento; f ) fiducia nella assistenza post vendita (pezzi di ricambio, riparazioni, celerità intervento, ecc.); g) grado di affidabilità nella gestione del rapporto (professionalità, riservatezza, personalizzazione, continuità, grado del servizio, qualità della prestazione, adeguatezza delle informazioni, istruzioni per l’uso, ecc.). 8 Da costo a risorsa - Attività produttive e protezione dei dati personali I punti da c) e g) – 5 su 7 – riguardano possibili trattamenti di dati personali. Come appare evidente una corretta gestione delle informazioni riguardanti coloro che le raccolgono o le forniscono danno certezza al mercato: i venditori tendono ad espandere l’offerta e gli acquirenti sentono tutelati i loro diritti. La regolamentazione dell’elemento responsabilità nei comportamenti a prestazioni corrispettive fornisce fiducia e costituisce la base alle fasi espansive del ciclo economico. Non esiste attualmente un sistema di misurazione dell’influenza della qualità, derivante dal corretto trattamento dei dati personali, nelle attività economiche relative allo scambio tra bene e corrispettivo. Tuttavia appare essere rilevante in relazione all’importanza che, da un lato, le imprese attribuiscono alle informazioni sulla moralità e puntualità nei pagamenti da parte degli aspiranti clienti e, dall’altro, alla preoccupata attenzione che gli acquirenti pretendono circa l’esatta fornitura di notizie sul proprio comportamento. Mutano inoltre le relazioni tra le imprese ed i consumatori. I pubblicitari, come affermava Vance Packard negli anni Cinquanta, utilizzavano le tecniche tradizionali dei persuasori occulti che “non vendono prodotti ma comprano clienti” per l’industria standardizzata. Di fronte ad un mercato di massa anche la comunicazione commerciale tendeva alla massificazione. Il consumatore non era preso in considerazione in quanto individuo, ma come membro di un gruppo omogeneo, privo di diversificazioni. Al contrario oggi tendono ad affermarsi, anche a causa dei moderni sistemi di comunicazione interattiva, nuovi metodi di relazione fondati sulla personalizzazione dei messaggi pubblicitari e degli acquisti: il consumatore si trova così al centro di una rete di messaggi che convergono per indurlo all’acquisto facendo leva sui suoi specifici interessi e bisogni individuali. Si è ormai realizzato il passaggio dal “mercato rivolto alle masse” al “mercato rivolto agli individui”. Ma non sono solo i momenti del “contatto commerciale” e dell’“invito all’acquisto” ad essere mutati. Anche la fase post-vendita, e quindi i servizi offerti a chi è già diventato cliente, risente fortemente della possibilità tecnica di modulare l’assistenza assecondando le mutevoli e diversificate esigenze del consumatore. Non a caso da tempo ormai le aziende parlano di fidelizzazione del cliente e investono ingenti risorse per gestire con attenzione il rapporto con il cliente per protrarlo nel corso del tempo, secondo i metodi che la terminologia anglosassone qualifica come Customer Relationship Management (o Crm). Credo sia importante osservare che anche la Pubblica amministrazione, sia a livello centrale che locale, tende a utilizzare gli strumenti tecnologici per favorire i rapporti con i singoli cittadini al fine di offrire con celerità e trasparenza i propri servizi: mi riferisco in particolare a quel processo di modernizzazione dell’attività burocratica che va sotto il nome di E-government. Questo cambiamento complesso, che contiene in sé aspetti positivi per le imprese ed i soggetti pubblici e di vantag- Gaetano Rasi - Cosa cambia per le attività produttive 9 gio per il consumatore ed il cittadino, presenta però elementi di problematicità e di pericolo. 3. Incidenza nei rapporti fra soggetti economici In particolare, in questa prospettiva, la tutela dei dati personali assume una valenza centrale, incidendo profondamente nel quadro dei rapporti tra i soggetti economici. La privacy, quindi, mantenendo il suo ruolo essenziale nel contesto dei diritti fondamentali della persona (assurgendo a prerequisito per l’affermazione di altri diritti individuali costituzionalmente definiti), acquisisce anche una funzione strategica per determinare gli sviluppi futuri del mercato. Essa, meritoriamente, può individuare il limite invalicabile per difendere il cittadino da azioni condizionanti o invasive ad opera delle imprese oppure della Pubblica Amministrazione. Ma, negativamente, può anche costituire un limite per lo sviluppo di un’offerta che non riesca ad adeguarsi, per difficoltà di comunicazione, ai bisogni della domanda espressa dalla società civile e dal mercato, come vuole una fondamentale legge economica. Si tratta quindi di definire i termini necessari per fare in modo che la tutela dei dati personali divenga una leva di sviluppo economico e non un fattore di limite alla crescita. Posta la problematica in questi termini, appare evidente che il diritto alla tutela dei dati personali è in ogni caso destinato a svolgere una funzione fondamentale per disegnare i futuri assetti del rapporto tra imprese e consumatori oltre che tra gli enti pubblici ed i cittadini. Da una parte sta il rischio, reso possibile dalle nuove tecnologie, di un consumatore assediato, denudato ed influenzabile, conosciuto e scrutato quotidianamente dai “raccoglitori di informazioni personali” che, se non sono sottoposti a regolamentazioni e controlli – meglio ad autoregolamentazioni (i codici deontologici) potranno usare questi dati per sollecitare acquisti inutili o dannosi e stimolare bisogni non reali né attuali. Il rischio del plagio o del cedimento per stanchezza è la conseguenza finale. Dall’altra si può concretizzare la prospettiva di un mercato bloccato che, messo nell’impossibilità di dialogare con il consumatore e di stabilire un rapporto diretto con il cliente, sarebbe destinato a ritornare sui suoi passi ed a riutilizzare i metodi dei “persuasori occulti” per indurre a consumi di massa, ricorrendo a forme di pubblicità invadente e ridondante. Analoghe considerazioni si possono delineare nei confronti dell’operato delle amministrazioni pubbliche. 4. La privacy come qualità La tutela dei dati personali da parte delle pubbliche autorità ed il persegui- 10 Da costo a risorsa - Attività produttive e protezione dei dati personali mento della loro protezione da parte dell’individuo, collocati in un efficiente e consapevole contesto economico, possono invece offrire un utile supporto alla definizione di un corretto e più produttivo rapporto tra impresa e consumatore e, per l’altro aspetto, tra le Istituzioni ed i cittadini. L’esistenza di norme di tutela dei dati personali, infatti, può permettere di migliorare la qualità del rapporto con il cliente e con il cittadino: le aziende possono disporre di informazioni corrette e genuine, raccolte con il consenso dell’interessato, il quale desideri effettivamente essere contattato per finalità commerciali. Lo stesso discorso può essere effettuato rispetto ai dati trattati dagli enti che forniscono servizi di utilità generale. Si profila in tal maniera un contenuto di utilità sociale e di eticità diffusa per la moderna economia aperta che tende ad identificarsi con la società aperta e con un consapevole concetto di vantaggio collettivo. D’altra parte se si esamina l’evoluzione della privacy nel corso della sua storia ormai secolare, sembra di poter dire che la capacità di adattamento alle nuove esigenze sociali sia proprio l’elemento caratterizzante, il nocciolo di questa conquista giuridica. La tutela dei dati personali rappresenta comunque, da oltre trent’anni, un fenomeno normativo ampiamente codificato nell’area europea. La Data Protection si è inserita nella tradizione del diritto alla privacy che era nato alla fine del secolo XIX nel sistema giuridico statunitense come espressione elitaria del “diritto di essere lasciati soli”. Ma oggi essa è diventata la risposta ad un’esigenza diffusa trasversalmente nei diversi ceti sociali: quella di permettere ad ognuno di esercitare un controllo sulle informazioni che lo riguardano in modo da essere arbitro del rapporto, spesso conflittuale, che esiste tra l’individuo e la collettività. Così la protezione dei dati personali ha cessato di essere un diritto banalmente destinato a tutelare i privilegi di pochi ed è diventata un presupposto per lo sviluppo della personalità individuale di ciascuno, un prerequisito per l’esercizio dei diritti fondamentali di tutti i cittadini. Non a caso, proprio la protezione dei dati di carattere personale è inserita – nel capo dedicato alla Dignità della persona – tra i principi di apertura che definiscono la Carta dei diritti fondamentali dell’Unione Europea sottoscritta a Nizza nel dicembre 2000. Ed ora appare ripresa nell’art. 50 del Trattato di Costituzione europea che è opportuno riprendere nella sua interezza: “Ogni individuo ha diritto alla protezione dei dati di carattere personale che lo riguardano. La legge europea stabilisce le norme relative alla protezione delle persone fisiche con riguardo al trattamento dei dati di carattere personale da parte delle istituzioni, degli organi e delle agenzie dell’Unione, e da parte degli Stati membri nell’esercizio di attività che rientrano nel campo di applicazione del diritto dell’Unione, e le norme relative alla libera circolazione di tali dati. Il rispetto di tali norme è soggetto al controllo di un’autorità indipendente”. Gaetano Rasi - Cosa cambia per le attività produttive 11 È dunque una conquista sociale e culturale oltre che politica di assoluto rilievo. Questo è tanto più evidente in relazione all’impetuoso sviluppo tecnologico ed all’importanza, non solo sociale ma anche economica, che ha assunto il libero flusso delle informazioni. Se è diventato sempre più facile comunicare e raccogliere informazioni su ognuno di noi per le finalità più diverse, diventa essenziale stabilire entro quali limiti questi trattamenti di dati siano legittimi e secondo quali limiti possa essere esercitato il diritto all’autodeterminazione informativa del quale ognuno dispone. Da questa premessa emerge chiaramente che il quadro normativo della Data Protection ha fondamento, oltre che nel progresso etico e culturale, nelle analisi sociologiche ed economiche, superando gli aridi steccati dei tecnicismi giuridici. 5. L’analisi costi-benefici dello spamming Un filone particolarmente interessante per capire la dinamica di questa normativa in relazione ad un modello sociale in costante evoluzione è offerto dall’analisi economica del diritto. Anche il giurista non può esimersi dall’esaminare il rapporto costi-benefici che l’esistenza delle norme sulla privacy determina in una società evoluta. Se è certo che la tutela dei dati personali è una esigenza irrinunciabile nella società contemporanea, è altrettanto evidente che tale bisogno va commisurato con le conseguenze economiche che l’esistenza di questo diritto comporta. L’economista può portare un contributo di analisi particolarmente importante per capire quale impatto abbia prodotto la legge sulla tutela dei dati personali rispetto alle attività produttive. In un articolo di Maryfran Johnson (redattore capo di Computerworld Editorial Columns) su Computerworld del 25 febbraio 2002, si leggeva che era crescente nelle imprese e nei consumatori la consapevolezza che il rispetto della privacy offra l’occasione di maggiori guadagni e di una maggiore fidelizzazione dei clienti. A ciò si aggiunge il fatto che le imprese e gli enti anche pubblici, per il mancato rispetto delle norme, si rendevano sempre più convinte del rischio di dover pagare in sanzioni amministrative e in spese giudiziarie quanto non avevano pagato per garantire la sicurezza dei dati. Un sondaggio di Harris Interactive ha indicato, per l’appunto, che la diffusione dei dati personali senza il consenso del cliente, in particolare lo spamming, costituisce la maggiore fonte di preoccupazione per i consumatori, l’84% dei quali chiede una “verifica indipendente” della politica seguita dalle imprese in materia di privacy. La Forrester Research aveva stimato che il volume di affari online nel 2001 avrebbe potuto essere più consistente di 15 miliardi di dollari (rispetto ai 47,6 miliardi effettivamente conseguiti ) se i consumatori avessero avuto più fiducia nella privacy garantita dalle imprese. 12 Da costo a risorsa - Attività produttive e protezione dei dati personali Al centro del dibattito si pone dunque l’analisi costi/benefici dello spamming e il problema del bilanciamento di interessi, quelli della conquista del mercato e quelli della tutela (e soddisfazione) dei consumatori. A quanto detto sopra si vanno ora ad aggiungere nuovi elementi di valutazione, poiché a partire dal 2003 l’inversione di tendenza e il miglioramento dell’economia in rete ha portato a rivedere molte previsioni allarmistiche, se non talora persino catastrofiche, fornite allora dagli analisti dello spamming, cosí come quella citata della Forrester Research. Da un lato, si sono attivati, spontaneamente ed autonomamente, meccanismi difensivi del mercato volti a frenare il dilagante fenomeno dello spamming quali: - enormi investimenti dei provider in tecnologia anti-spamming, in informativa ed in attivitá di ricerca e di sviluppo di nuove strategie; - sensibili sforzi da parte delle aziende per riuscire ad instaurare un trasparente rapporto con i consumatori, basato anche e soprattutto su e-mail con preventivo e selezionato consenso; - crescita culturale ed informatica dell’utente in rete, sempre piú esigente ed informato. Dall’altro, le iniziative legislative dell’Unione Europea, volte alla salvaguardia dei dati personali sempre piú minacciati in rete, si sono estese agli Stati Uniti, seppur con diverso approccio, portando significativi miglioramenti in molte direzioni. È ormai certo, quindi, che solo un approccio multi-strategico al problema, ossia basato su interventi legislativi, auto-regolamentazione, tecnologia avanzata, e cooperazione internazionale sembrano essere la soluzione vincente per ridurre lo spamming. Riprendiamo quindi dallo studio condotto dalla Forrester Research nel 2001 secondo il quale il volume d’affari on-line avrebbe potuto essere maggiore se fosse stata rispettata maggiormente la “privacy” e valutiamo questa affermazione alla luce delle evoluzioni nel frattempo intercorse nell’economia della rete di Usa ed Europa. L’analisi si presenta complessa sia per l’accentuarsi delle differenze comportamentali che si registrano tra gli utenti della rete, ossia tra nordamericani ed europei, sia per le difficoltà interpretative dei sondaggi, spesso tanto ambigui e contradditori da prestarsi pericolosamente, all’occorrenza, a sostegno di opposte tesi. Recenti proiezioni prevedono un’esplosione del fenomeno spamming per il 2004, con un valore pari a cinque volte quello registrato nel 2003. Si è rilevato inoltre che a luglio 2003 le e-mail spazzatura rappresentavano il 50% dei messaggi inviati per posta elettronica(2). Questo significa la crisi dell’economia in rete o della rete stessa? Prima di procedere, si deve sottolineare che la definizione di spamming non trova unanime consenso in Europa e in Usa, cosí come non vi è unanimità nel pre(2) Secondo la Brightmail, come riportato da DSTI/ICCP(2003)10/FINAL Pubblicato dall’OCSE il 22/01/2004 Gaetano Rasi - Cosa cambia per le attività produttive 13 vedere l’incidenza che avrá lo spamming nello sviluppo dell’economia in rete e nella tutela della privacy. Piú ottimismo si riscontra negli Usa, maggiore preoccupazioni vengono registrate nei rapporti dell’Ocse e in quelli dell’Unione Europea. La Commissione Europea(3) ed altri paesi, come Francia(4) ed Australia, hanno adottato definizioni standard in cui gli elementi identificativi comuni sono dati dall’essere, lo spamming, “l’invio di messaggi commerciali non sollecitati, normalmente inviati ripetutamente e in gran quantitá, e ove l’identitá del mittente sia intenzionalmente nascosta o falsata per trarre in inganno il destinatario”. Piú sbrigativa ed ampia è la definizione che si ricava dallo studio del fenomeno spamming condotto dalla Federal Trade Commission nel maggio 2003(5), e la cui definizione viene utilizzata anche dall’Ocse(6), sia nel senso di e-mail spazzatura(7), sia di “qualsiasi messaggio che il cliente non gradisce”, indipendentemente dal fatto che abbia dato o meno il suo consenso. Quest’ultima definizione, che rappresenta una significativa modifica nella definizione concettuale del fenomeno, porta anche a ridefinire il problema della lotta allo spamming e a ridisegnare le relazioni tra aziende e consumatori. 6. Necessità di equilibrio tra protezione dati e libera iniziativa Dunque, una maggiore attenzione alla sicurezza delle informazioni ed alla corretta gestione dei flussi di dati è indispensabile per evitare conseguenze spiacevoli. Per quanto riguarda le imprese, sempre la citata Computerworld ha indicato, in particolare, tre elementi che esse dovrebbero tenere presenti a questo scopo: 1. assicurarsi che i dati sulla clientela siano accurati, aggiornati ed uniformi per tenere conto in modo adeguato, ad esempio, delle preferenze espresse in (3) Secondo il 2001 Europea Commision Report “Unsollicited Commercial Communications and Data Protection” “Spam is generally understood to mean the repeated mass mailing of unsolicited commercial messages by a sender who disguise or forges his identity”. (4)Secondo la definizione della Commission Nazionale de l’Informatique et des Libertés (5) Forum sullo Spamming, presieduto da Mozelle Thomson, dal 1997 membro della Federal Trade Commission, presidente all’ Ocse del Comitato dei Consumatori statunitensi. (6) Ved. in DSTI/ICCP(2003)10/FINAL, pubblicato dall’Ocse il 22/01/2004, a pag. 9 il riferimento al sondaggio della Mail Shel qui indicato nel par. 4.3. (7) Può anche essere rappresentato da annunci multipli dello stesso messaggio, inviati a Newsgroup o server di discussione, e che non sono relativi al tema in oggetto. Altri termini comuni per lo spam presenti su Internet sono Uce (Unsolicited Commercial Email) e UBE (Unsolicited Bulk Email) e corrispondono alla stessa definizione di spam. Gli individui o le aziende che inviano spam generalmente hanno acquistato o raccolto liste di indirizzi e-mail. Quindi, procedono all'invio di messaggi da diversi indirizzi verso ogni area del Web. Tutti i messaggi hanno un indirizzo IP incorporato nell'intestazione completa dell'indirizzo che consente di identificare l'identità del mittente del messaggio e quindi di rintracciare l'individuo presso il relativo gestore di posta o fornitore di accesso in rete. 14 Da costo a risorsa - Attività produttive e protezione dei dati personali materia di privacy; 2. evitare database sovradimensionati: “piccolo è meglio” per la privacy: 3. seguire gli sviluppi legislativi e regolamentari (che anche negli Usa si fanno sempre più importanti in questo settore). Ferma restando la necessità dell’attività sanzionatoria delle autorità garanti della privacy va peraltro sottolineato che questa funzione non deve in nessun caso trasformarsi in un ostacolo alla libera iniziativa economica, ma deve contribuire a rafforzare la certezza del diritto, oltre che la fiducia nei rapporti di scambio. La ricerca dell’equilibrio nel sistema di protezione dei dati personali è essenziale per rendere possibile uno sviluppo effettivo. La cultura della riservatezza nel nostro Paese sta sempre più diffondendosi. Dobbiamo quindi prendere atto – e ciò non vale solo per l’Italia – che l’“inglobamento” nelle merci e nei servizi del rispetto della privacy sta per diventare una esigenza proprio del mercato. L’impresa che non risponderà a questo tipo di nuova domanda rischierà di uscire da esso. Insomma si va verso un tipo di competitività per la quale l’offerta dei prodotti, che non corrispondono alla richiesta di rispetto della riservatezza, incontrerà sempre maggiori difficoltà a trovare e a mantenere fedeli gli acquirenti. Diventa quindi essenziale capire quale sia il costo economico (e come esso possa contribuire ad un prezzo competitivo perché comprensivo di questo nuovo tipo di qualità) della scelta di tutelare la riservatezza dei dati personali e quali benefici possa comportare - non solo dal punto di vista sociale, ma anche da quello strettamente economico - l’esistenza di un diritto alla tutela delle informazioni personali. Le più recenti evoluzioni del marketing, ed in particolare del cosiddetto permission marketing, che basa ogni iniziativa promozionale sul preventivo consenso dell’interessato, confermano che data protection e marketing efficace possono, anzi debbono, andare d’accordo e viaggiare di pari passo. Ripeto perciò che il rispetto della privacy può diventare una leva competitiva per le aziende che desiderano stabilire un rapporto di fiducia e trasparenza nei confronti dei propri clienti. I contributi pubblicati in questo volume si propongono di fare, per la prima volta in Italia, il punto su questi aspetti poco esplorati della tutela dei dati personali: l’obiettivo – mi sembra che sia chiaro da quanto finora detto - è quello di avviare una riflessione per definire quali siano i diversi criteri da tenere presenti per coniugare la effettiva protezione dei dati personali con l’efficienza di un sistema economico che punti allo sviluppo. Si tratta di una prospettiva di analisi finora trascurata, salvo lodevoli eccezioni, da parte degli studiosi ma che in realtà va esaminata per meglio comprendere e gestire i complessi cambiamenti sociali e tecnologici dei quali la tutela dei dati personali è una delle componenti essenziali. Gaetano Rasi - Cosa cambia per le attività produttive 15 7. I termini della nuova sfida La privacy, nella sua lunga evoluzione, è così chiamata ad affrontare una nuova sfida: quella di essere il punto di convergenza tra le esigenze di crescita delle imprese e quelle dello sviluppo civile appagando nel contempo il bisogno di protezione e di certezze che il singolo consumatore sollecita. In realtà si profila quella che la cultura anglosassone definisce una “win-win situation”, nella quale entrambe le parti in gioco hanno da trarre beneficio dalla sottoscrizione di un accordo. Così la privacy, considerata nel quadro delle relazioni tra soggetti economici, è destinata a delinearsi come il valore fondante di un patto tra imprese e consumatori che consentirà un ulteriore dinamismo di un mercato composto da soggetti in grado di realizzare scelte consapevoli e libere. È questa la nuova frontiera della tutela dei dati personali che si inserisce nel moderno concetto qualitativo dello sviluppo sociale ed economico in grado di valorizzare ad un livello superiore la mera crescita quantitativa nella produzione delle merci e dei servizi. Con questo spirito il Garante italiano ritiene che sia utile sottoporre alla comunità scientifica internazionale questo tema: l’auspicio è quello di aprire la strada nuove prospettive di ricerca e di confronto tra le ragioni del diritto e le esigenze dell’economia e che perciò possa fare da esca ad un ulteriore dibattito sul futuro della data protection. 16 Da costo a risorsa - Attività produttive e protezione dei dati personali What Is Changing in Production Activities Gaetano Rasi (1) Contents: 1. Deep-Ranging Changes – 2. Assessing Market Requirements – 3. Effects on the Relationships between Economic Actors – 4. Privacy as Quality – 5. Cost-Benefit Analysis Applied to Spamming – 6. Need for Balancing Data Protection and Freedom of Enterprise – 7. The Features of the New Challenge 1. Deep-Ranging Changes We all believe that we are living through an age of deep-ranging changes involving, to an ever-increasing extent, all human activities. Technological developments enable communication in a way that was unconceivable up to some time ago, indeed they allow almost doing away with distance in the transfers of goods, capitals, and persons and reduce decision-making time by directly influencing production and distribution mechanisms. On the other hand, technological developments produce effects on – or, as is the case with the Internet, go beyond – the relationship conventionally existing between effectiveness of domestic law and territorial scope of application. As regards personal data protection, this raises several issues for consideration – which confirm day after day that the overall framework of data protection legislation is really at the crossroads of the development paths followed by contemporary society. In analysing the consequences resulting from these innovations and opportunities, one usually dwells on the legal wording setting out the limitations that may apply, if any, to an individual’s right of being in control of the information concerning him or her. Being an economist, I think it is appropriate to point out that – jointly with the ethics principles and the legal conditions to be safeguarded – there is also a change in progress concerning both the weight of production and distribution factors as related to final results and work management policies inside enterprises. Specific attention should be paid to the de-composition of production processes. I am referring to the increasingly widespread practice of fragmenting the steps between launch of the project concerning a given product (good or service) and marketing of such product. This is where personal data are transferred. The widespread practice of process decomposition is not an instance of de-industrialisation; in fact, it entails conferring specific, specialised functions in respect (1) Member, Italian Data Protection Authority. Gaetano Rasi - What Is Changing in Production Activities 17 of individual components and positions that will be ultimately assembled to yield the finished product. Again, personal data are processed throughout the phases of this process. Moreover, innovation as the driver of production progress has long ceased being limited to the effects produced on manufacturing processes or else on the invention of new products. Indeed, innovation also means introducing new organisational patterns – such as the externalisation allowed by outsourcing -, using automated systems to communicate and process data, or jointly managing business sectors that are shared with other enterprises. 2. Assessing Market Requirements Innovations are successful not only to the extent that they are original, but also – quite often – insofar as they are based on the assessment of emerging and/or hidden market requirements. This consideration shifts the focus of discussion on the personal components of the assessment performed by seller and purchaser in the decision-making leading to conclusion of a “contract” in modern times. In bilateral contracts – including those based on the mere acceptance of a public offer, such as the exhibition of goods in a shop window or on a shelf, or an offer advertised on media – a party’s decision to enter the contract does not result exclusively from cost assessment as it is also based on the existence of some guaranteed certainties, in addition to the considerations relating to taxation and/or contractual constraints as well as to the immediate and/or future availability and accessibility of the relevant good. Therefore, a key role in shaping both the seller’s and the purchaser’s intent is played by the assessment of the certainty degree in addition to the evaluation of economic suitability. And the former item is a typical component of an actor’s individual personality. Let us briefly consider the components coming into play as regard intent formation. They are the following: a) the ratio between the sacrifice inherent in the price to pay and the expected benefit resulting from the good to be acquired; b) the economic suitability related to deprivation of the good as opposed to the profit resulting from payment of the relevant consideration; c) the degree of risk related to sale/purchase mechanisms, immediate/postponed delivery, and payment in cash or by instalments; d) guarantees against hidden flaws/defects; e) validity of payment means; f) trust in post-sales assistance (spare parts, repairs, time to repair, etc.); g) reliability in managing customer relations (professionalism, confidentiality, customisation, continuity, service levels, performance quality, adequacy of information, instructions for use, etc.). 18 Da costo a risorsa - Attività produttive e protezione dei dati personali Points c) and g) are related to the processing of personal data. It is quite clear that the appropriate management of the information concerning those collecting and/or providing such information means certainty for the market. Sellers tend to expand their offers and purchasers feel that their rights are safeguarded. Regulating liability in performance-based contracts is a source of trust as well as providing the foundations for the expansion phases of the economic cycle. There is currently no assessment system available as regards the quality resulting from the appropriate processing of personal data in the economic activities related to the exchange of goods against a consideration. However, this component would appear to play a key role by having regard to the importance attached by businesses to the information on their prospective customers’ conduct and timeliness in paying as well as, on the other hand, to the concern shown by purchasers in respect of the accuracy of the information describing their conduct. The protection of privacy is fundamental in connection with assessing reliability and creditworthiness. The relationships between enterprises and consumers are also changing. As maintained by Vance Packard in the ‘50s, advertising companies availed themselves of the techniques conventionally implemented by “hidden persuaders”, who “do not sell products, but buy customers” for mass-production industry. In the face of a mass market, commercial communication also tended to massification. Consumers were not taken into consideration as individuals, but rather as members of a homogeneous, non-diversified group. Conversely, new contacting methods based on customised advertising are getting increasingly common nowadays – partly because of the modern interactive communication systems. Each consumer is therefore becoming the focus of a network of messages converging on him/her to get him/her to purchase goods by leveraging his/her specific interests and individual requirements. The shift from “mass-oriented” to “individual-oriented” markets has already taken place. However, the change has not concerned “commercial contact” and “invitation to purchase” components only. The post-sales phase, i.e. the services provided to established customers, is also undergoing considerable modifications because of the technical possibility to fine-tune assistance by meeting the consumer’s ever-changing, diversified requirements. It is no chance that customer loyalty programs have long become the staple of business management and huge resources are being invested in order to carefully manage customer relationships and extend their duration – according to Customer Relationship Management (CRM) principles. I think it is important to point out that the public administration also avails itself increasingly of technological tools, at both central and local level, in order to facilitate contacts with citizens and provide its services speedily and transparently. I am referring, in particular, to the modernisation of bureaucratic activities that is of- Gaetano Rasi - What Is Changing in Production Activities 19 ten referred to as e-government. This complex change, though including positive features for both enterprises and public bodies and producing beneficial effects to consumers and citizens, is also fraught with some dangers and criticalities. 3. Effects on the Relationships between Economic Actors The protection of personal data – seen against this background – takes on key importance as it produces deep-ranging effects on the relationships between economic actors. Thus, privacy retains its fundamental role within the framework of fundamental personal rights – that is to say, it is established by now as a pre-requisite to ensure implementation of all other personal rights set out in constitutional instruments – and, at the same time, it is coming to play a strategic role in determining future market developments. Privacy can set the inviolable boundary defending citizens against undue influence and/or interference from enterprise and/or the public administration. However, in a negative perspective, privacy can also dampen the development of an offer that cannot adjust to the demand coming from markets and the society at large – as per a fundamental law of economics. Therefore, it is necessary to create the conditions for the protection of personal data to become a driver of economic development rather than a hindrance to growth. Given these premises, there is little doubt that the right to personal data protection is bound to play a fundamental role in shaping the future pattern of the relationships between enterprise and consumers as well as between public bodies and citizens. On the one hand, there is the danger – resulting from new technologies – that consumers are besieged, denuded and influenced, investigated and surveilled daily by “collectors of personal information” – who, in the absence of rules and checks, or preferably of self-regulatory tools such as codes of practice, might use this information to urge useless or downright harmful purchases and stimulate demand in a way that is unrelated to real, actual requirements. The ultimate risk is that customers may be exposed to undue influence or else give up in exhaustion. On the other hand, markets might end up being blocked and unable to get in touch with consumers to set up a direct relationship with them, which would oblige them to re-trace their steps and avail themselves of the methods used by “hidden persuaders” to induce mass consumption – via invasive, redundant advertising. Similar considerations apply to the activity of the public administration. 20 Da costo a risorsa - Attività produttive e protezione dei dati personali 4. Privacy as Quality The protection of personal data by public authorities and the attempt to protect personal data made by individuals – if placed in an efficient, knowledgeable economic context – can actually assist in developing appropriate, more productive relationships between enterprise and consumers as well as between institutions and citizens. Indeed, the existence of data protection legislation can allow improving the quality of relationships with customers and citizens: enterprises can be provided with accurate, truthful information that is collected with the data subjects’ consent where the latter are really interested in being contacted for commercial purposes. The same applies to the data that are processed by public utility bodies. In this manner, social usefulness and all-round ethicality can become components of today’s open economy, which tendentially goes hand in hand with the open society and the awareness of the community benefits to be achieved. On the other hand, if one considers the evolution of privacy over its centuryold history, one could argue that its peculiar feature, indeed the core of this major legal achievement, consists exactly in the capability to adjust itself to new social requirements. Personal data protection has been the subject of deep-ranging regulations throughout Europe for over thirty years. Data protection has sprouted from the privacy law tree, which had been first sown at the end of the 19th century in the US legal system as the expression of the elitarian “right to be left alone”. However, nowadays it has turned into the response to a requirement existing cross-wise in all social strata – i.e. the requirement that everyone should be in control of the information concerning him or her so as to be free to decide how to behave in the frequently strained relations between individuals and society. Personal data protection has ceased to be a right simply aimed at protecting the privileges of the happy few; it has become a pre-requisite for the development of everyone’s personality – a pre-requisite to exercise the fundamental rights pertaining to all citizens. It is no chance that exactly the protection of personal data is included – in the Chapter concerning “Dignity of Individuals” – among the opening principles of the Charter of Fundamental Rights of the EU signed in Nice in December 2000 – now corresponding to Article 50 of the Draft Constitution, which is appropriate to quote here in its entirety: “1. Everyone has the right to the protection of personal data concerning him or her. 2. A European law shall lay down the rules relating to the protection of individuals with regard to the processing of personal data by the Union’s Institutions, bodies and agencies, and by the Member States when carrying out activities which come under the scope of Union law, and the rules relating to the free movement of such data. Compliance with these rules shall be subject to the control of an independent authority.” Gaetano Rasi - What Is Changing in Production Activities 21 Therefore, we are confronted with a social, cultural and political achievement of the utmost importance. This is shown most clearly by considering the unrelenting technological development and the importance that is attached to the free flow of information both in social and in economic terms. Whilst it is increasingly easy to communicate and collect information on any of us for multifarious purposes, it is fundamental to set out the boundaries within which this type of processing is lawful and to what extent one may exercise the right to informational self-determination. I think it is quite evident that the regulatory framework applying to data protection rests not only on ethical and cultural developments, but also on the findings of sociological and economic analysis – which goes well beyond the dry ground of legal technicalities. 5. Cost-Benefit Analysis Applied to Spamming An especially interesting approach to better appreciate the development of this regulatory framework with regard to a continuously evolving social model can be found by considering the so-called law economics. No law scholar should actually refrain from assessing the cost-benefit ratio as resulting in an advanced society from the existence of privacy regulations. There is little doubt that personal data protection is a fundamental requirement in contemporary society; however, it is also obvious that this requirement should be gauged against the economic effects produced by its existence. Economists can provide an especially important contribution to this analysis in order to fully understand the impact produced by personal data protection legislation on production activities. In a paper by Maryfran Johnson (from Computerworld) of 25 February 2002, it was stated that businesses and consumers were increasingly aware that respect for privacy provided opportunities for increasing profit and customer loyalty. This is compounded by the fact that businesses and private/public bodies are increasingly mindful of the risk of having to pay the monies they had not invested to ensure data security in the form of administrative sanctions and legal costs following breaches of the relevant regulations. A survey by Harris Interactive showed actually that dissemination of personal data without the customer’s consent – in particular as related to spamming – was the first cause of concern for consumers, of whom 84% requested “independent verification” of the privacy policies adopted by businesses. According to estimates released by Forrester Research, the online business turnout in 2001 might have been higher by 15 billion dollars – compared with the 47.6 billion dollars achieved – if consumers had been more confident in the privacy afforded by businesses. 22 Da costo a risorsa - Attività produttive e protezione dei dati personali The discussion is therefore focused on the cost/benefit analysis applied to spamming as well as on balancing the interests at stake – those aimed at market expansion and those concerning consumer protection (and satisfaction). New items should be added to the above considerations, since a trend reversal and the improvement in network economy starting from 2003 prompted the revision of several alarming, at times downright catastrophic, forecasts made in previous years by spamming analysts – including the one by Forrester Research. On the one hand, market protection mechanisms were developed spontaneously and autonomously in order to curb the expansion of spamming, such as - huge investments by service providers in anti-spamming technology, information-raising and research and development of new strategies, - market efforts made by businesses to set up transparent relationships with consumers also based, in particular, on sending e-mails with their prior, specific consent, and - cultural growth and increased familiarity with computer science by increasingly discriminating, well-informed network users. On the other hand, the law-making policy followed by the EU with a view to safeguarding personal data – which are increasingly threatened on the Net – was also extended to the Usa albeit in accordance with a different approach, and this led to significant improvements in all respects. Therefore, there is by now little doubt that only a multi-policy approach to this issue, i.e. based on legislation, self-regulation, advanced technology and international co-operation, can yield a successful solution to reduce spamming. Let us get back to the study carried out by Forrester Research in 2001, showing that the online turnout might have been higher if privacy had been more respected. This finding should now be assessed in the light of the evolution that was subsequently experienced by network economy both in the Usa and in Europe. This is a complex analysis both on account of the enhanced behavioural differences applying to network users, i.e. Americans and Europeans, and because of the difficulties in interpreting survey findings – which are often so ambiguous and contradictory as to dangerously lend themselves to supporting opposite views. Based on recent forecasts, spamming is expected to boom in 2004 up to five times as much as the amount reported for 2003. Moreover, it was found that in July 2003 junk e-mail accounted for 50% of e-mail messages.(2) Will this jeopardise network economy, or the network itself? Before going forward, one should stress that the definition of spamming is not unanimously agreed upon in Europe and the Usa; nor is the impact produced by spamming on the development of network economy and privacy protection unanimously evaluated. (2) According to Brightmail, as quoted in DSTI/ICCP(2003)10/FINAL, published by OECD on 22.01.2004. Gaetano Rasi - What Is Changing in Production Activities 23 More optimistic views are held in the Usa, whereas the reports released by both OECD and EU voice increased concerns. The European Commission(3) as well as some countries including France(4) and Australia has adopted standard definitions, sharing the view that spamming consists in unsolicited commercial messages that are usually mass-mailed repeatedly, whereby the sender has intentionally disguised or forged his/her identity in order to deceive recipients. A more concise as well as broader definition can be found in the study on spamming carried out by the US Federal Trade Commission, released in May 2003,(5) and this definition was also used by the OECD(6) - spamming is considered to include both junk e-mail and “any message that is disliked by a customer” regardless of the latter’s consent. The latter definition significantly changes the conceptual framework of spamming and postulates a new definition of the fight against spamming as well as the re-configuration of the relationships between businesses and consumers. 6. Need for Balancing Data Protection and Freedom of Enterprise Therefore, increased attention to security of information and appropriate management of data flows is a fundamental prerequisite in order to prevent unpleasant consequences. As for businesses, Computerworld referred, in particular, to three items they should take into account in this regard, i.e. 1. Ensuring that customer data are accurate, updated and homogeneous in order to adequately take account, for instance, of privacy preferences; 2. Refraining from the establishment of oversize databases: “small is better” for privacy; 3. Keeping up with legislation and regulatory developments (which are becoming increasingly important in the Usa as well). Without prejudice to the need for supervisory authorities to impose sanctions as required, it should be pointed out that this should not turn out to be a hindrance to freedom of enterprise; in fact, it should contribute to strengthening the rule of law as well as trust in economic exchanges. The search for balance within the framework applying to personal data protection is fundamental to enable effective development. The privacy culture is get(3) According to the 2001 European Commission’s Report on “Unsolicited Commercial Communications and Data Protection”, “Spam is generally understood to mean the repeated mass mailing of unsolicited commercial messages by a sender who disguises or forges his identity”. (4) See the definition adopted by the Commission Nationale de l’Informatique et des Libertés. (5) Forum on Spamming, chaired by Mozelle Thomson. (6) See DSTI/ICCP(2003)10/FINAL, published by OECD on 22.01.2004. 24 Da costo a risorsa - Attività produttive e protezione dei dati personali ting increasingly widespread in our country. We should consider – which does not apply to Italy only – that the “incorporation” of privacy compliance into goods and services is soon to become a requirement dictated exactly by market. Any business that is not capable to meet this new demand will be in danger of being ousted from the market. In short, the competition pattern that is being developed is one in which it will be increasingly difficult to find and ensure loyalty of customers if the products on offer do not comply with the demand for respecting privacy. Thus, it is of the essence to appreciate the economic costs of protecting personal data and how they can contribute to setting a price that is competitive because it also includes this new qualitative feature. It is also fundamental to appraise the benefits resulting from the existence of a right to personal data protection, not only from a social viewpoint, but also in merely economic terms. Given the most recent developments in the marketing sector, in particular the so-called permission marketing whereby promotional initiatives are based on the recipient’s prior consent, one might reasonably argue that data protection and effective marketing can, indeed must go hand in hand. Therefore, let me say it once again, businesses can leverage respect for privacy in order to set up customer relationships based on mutual trust and transparency. The contributions collected in this book are aimed at providing an overview – never attempted before in Italy – of these largely unexplored issues related to personal data protection. The ultimate objective, as readers may have gathered from the above considerations, would consist in starting an exercise with a view to identifying the criteria to be taken into account to reconcile effective data protection with efficiency of a development-oriented economic system. Apart from a few commendable exceptions, scholars have not yet addressed privacy issues in this perspective; in fact, it is a necessary step in order to better understand and manage the complex social and technological changes of which personal data protection is a fundamental component. 7. The Features of the New Challenge Privacy is therefore called upon to cope with a new challenge, i.e. how to be at the crossroads between businesses’ growth and civil society’s development by simultaneously meeting the protection demand coming from individual consumers. Actually, we are facing what is termed a “win-win situation” in the Anglo-Saxon world, in which both parties can benefit from the stipulation of an agreement. Within the framework of the relationships between economic actors, privacy is bound to be the founding value of a covenant between businesses and consumers that will enhance the dynamic features of a market comprised of entities making free, informed deci- Gaetano Rasi - What Is Changing in Production Activities 25 sions. This is the new frontier for personal data protection as an instance of nowadays’ qualitative concept of social and economic development, which must be capable to raise merely quantitative increases in the production of goods and services to a higher level. This is the spirit in which the Italian data protection Authority considers it useful to draw the international scientific community’s attention to the issue at stake. We do hope that in so doing we will manage to pave the way to new approaches to research and confrontation between law and economics, and thereby spark further debates on the future of data protection. 26 Da costo a risorsa - Attività produttive e protezione dei dati personali Contributi S ESSIONE I L A TUTEL A DEI DATI PERSONALI NEL MERC ATO GLOBALE Sessione I – La tutela dei dati personali nel mercato globale Privacy Benefits and Costs From a U.S. Perspective Robert Gellman (1) Contents: I. Introduction - II. Privacy Protections Benefit Record Keepers – III. The Absence of Privacy Protections Costs Record Subjects – IV. Challenges in Assessments of Privacy Costs and Benefits – V. Conclusion Protecting the privacy of personal information involves costs and results in benefits. Most analysts in the United States would probably agree with that statement, but there is little agreement on much else relating to privacy costs and benefits. The purpose of this paper is to identify some cost and benefit elements that should be considered in evaluating the economics of privacy protection in the United States. No comprehensive model is proposed. A major preliminary issue is defining privacy. This is much more of a problem in the United States than elsewhere. Most of the world accepts Fair Information Practices (FIPs) as describing the basic elements of information privacy. Support of FIPs by the American government and American record keepers has been fitful. Privacy protections may benefit record keepers as well as record subjects. The types of benefits that may accrue to record keepers include an increase in sales, a reduction in transaction costs, record keeping efficiencies, reduced costs through greater uniformity of privacy requirements, and other benefits. Privacy rules – and the absence of privacy rules – also have consequences for consumers. One way to measure the importance of privacy to consumers is to observe actions that consumers take to protect their personal information. An American family seeking to protect the privacy of its information could spend hours of time and several hundred dollars annually in out-of-pocket expenses plus other intangible and unmeasurable costs. Some will pay higher prices for goods and services to protect privacy. Avoidance of identity theft, a crime fueled by the availability of personal information, imposes other costs for consumers. Assessing privacy costs and benefits in a formal way is difficult anywhere. Challenges include: (1) Privacy and Information Policy Consultant - Usa Robert Gellman - Privacy Benefits and Costs From a U.S. Perspective 29 - Establishing a baseline from which to measure the actual or likely effect of a rule. - Identifying benefits from privacy rules and quantifying the benefits, whether the benefits accrue to record keepers or record subjects. - Identifying and valuing record keeper costs. Future work will benefit greatly from agreement on the definition of privacy; on whether and how to account for secondary and tertiary effects of processing practices; on how to find fair ways to share costs and benefits between record subjects and record keepers; and on how to measure baselines internationally in light of significantly different privacy regimes. I. Introduction Protecting the privacy of personal information involves costs and results in benefits. Most analysts in the United States would probably agree with that statement, but there is little agreement on much else relating to privacy costs and benefits. The United States, with its highly developed marketplace for personal data and lack of legislative protection for many types of personal data, presents a particular challenge for evaluating costs and benefits. It is difficult to find agreement in the United States on basic definitions of privacy or on the categories of costs or benefits that might be measured. Unlike countries that have omnibus privacy laws, the United States has occasional and uncoordinated state and federal privacy laws; selfregulatory activities that range from meaningful to insincere; and no response to privacy at all. Professor Spiros Simitis once described the American approach to data protection as “an obviously erratic regulation full of contradictions, characterized by a fortuitous and totally unbalanced choice of its subjects.”(2) Simitis’s characterization remains true ten years later. The purpose of this paper is to identify some cost and benefit elements that should be considered in evaluating the economics of privacy protection in the United States. No comprehensive model is proposed. The goal is simpler. First, some of the benefits from privacy that accrue to record keepers (rather than record subjects) are identified. Some American record keepers have been vocal about the costs of privacy, while ignoring the benefits. Their controversial privacy cost studies are only mentioned here in passing. Second, some of the costs that consumers bear when privacy is not protected at law or by business practice are discussed. Third, several challenges of assessing costs and benefits are reviewed. The conclusion considers some of (2) Spiros Simitis, New Trends in National and International Data Protection Law, in Recent Developments in Data Privacy Law 22 (J. Dumortier ed. 1992). 30 Da costo a risorsa - Attività produttive e protezione dei dati personali the fundamental difficulties that arise in assessing privacy costs and benefits. A major preliminary issue is defining privacy. This is much more of a problem in the United States than elsewhere. Most of the world accepts the Fair Information Practices (FIPs) defined in the Guidelines of the Organization for Economic Cooperation and Development(3) as describing the basic elements of information privacy.(4) The eight OECD FIPs are: Collection Limitation, Data Quality, Purpose Specification, Use Limitation, Security Safeguards, Openness, Individual Participation, and Accountability. Although FIPs were first proposed as a framework for privacy in the United States in 1973,(5) and although the US Government embraced the OECD Guidelines during the early years of the Reagan Administration,(6) active support of FIPs has been fitful. American companies, trade associations, and even federal agencies significantly restate FIPs to suit their own interests. The result is that it is difficult to find any broad consensus on privacy policy, goals, or language in the United States. For example, in 2000, the Federal Trade Commission recommended that consumer-oriented commercial websites that collect personal identifying information from or about consumers online should be required to comply with “the four widely-accepted fair information practices.”(7) The FTC’s version of FIPs includes notice, choice, access and correction, and security. Choice is not a core element of traditional FIPs. Choice means that consumers would have to be offered some ability to say how their personal data may be used for secondary purposes. It appears that the FTC modeled its choice principle on privacy policies from elements of the American business community. (3) Organization for Economic Cooperation and Development, Council Recommendations Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data, 20 I.L.M. 422 (1981), O.E.C.D. Doc. C (80) 58 (Final) (Oct. 1, 1980), at <http://www.oecd.org//dsti/sti/it/secur/prod/PRIV-EN.HTM>. See also Council of Europe, Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data, 20 I.L.M. 317 (1981), at <http://conventions.coe.int/treaty/en/treaties/html/108.htm>. (4) Colin J. Bennett, Regulating Privacy: Data Protection and Public Policy in Europe and the United States (1992). (5) Secretary’s Advisory Committee on Automated Personal Data Systems, Records, Computers, and the Rights of Citizens (1973) (Department of Health, Education & Welfare) <http://aspe.os.dhhs.gov/datacncl/1973privacy/tocprefacemembers.htm>. (6) See Report on OECD Guidelines Program, Memorandum from Bernard Wunder, Jr., Assistant Secretary for Communications and Information, Department of Commerce, to Interagency Committee on International Communications and Information Policy (Oct, 30, 1981), reprinted in International Telecommunications and Information Policy, Hearings before a Subcommittee of the House Committee on Government Operations, 97th Congress at 27-58 (1981-82). Official supporting activities were part of an effort to show interest in privacy through voluntary action rather than legislation. See General Accounting Office, Privacy Policy Activities of the National Telecommunications and Information Administration, (Aug. 31, 1984) (GGD-84-93). More than 180 major U.S. multinational companies and trade associations endorsed the guidelines. The Reagan Administration dropped its interest in the Guidelines by 1983. The sincerity of the effort has been questioned, and the effect of the endorsements was unclear at the time. Robert M. Gellman, Fragmented, Incomplete, and Discontinuous: The Failure of Federal Privacy Regulatory Proposals and Institutions, 6 Software Law Journal 199, 227-233 (1993). (7) Federal Trade Commission, Privacy Online: Fair Information Practices in the Electronic Marketplace, (May 2000), at <http://www.ftc.gov/reports/privacy2000/privacy2000.pdf>. Robert Gellman - Privacy Benefits and Costs From a U.S. Perspective 31 The FTC statement of FIPs does not address the collection limitation or data quality principles. The accountability principle is not mentioned, but it is part of the FTC’s proposal by implication since the Commission would have an enforcement role. The other missing principle is that of purpose specification. The Commission’s choice principle appears to be a partial substitute. What is absent is any requirement that a record keeper specify the purposes for data collection and that subsequent use or disclosure be limited to those purposes and other closely related purposes. Other restatements of FIPs by American businesses contain even fewer FIPs elements than the FTC’s version. The importance of a definition is that the costs and benefits of privacy depend on what elements are being assessed. Selective review of either costs or benefits produces an incomplete picture. Those who seek to assign a high price tag to privacy sometimes focus on cost without considering the corresponding benefits or methods for mitigating the costs or consequences. II. Privacy Protections Benefit Record Keepers Privacy protections benefit consumers.(8) However, it is often overlooked that protecting privacy may be good for record keepers as well as record subjects. In the United States, self-regulatory activities are evidence that some businesses recognize that offering privacy protections is important to attracting and satisfying customers. Protecting privacy may be another factor in business success, along with free parking, competitive prices, convenient hours, and good service. For some in the American business community, the principal motivation for self-regulation is a desire to avoid additional privacy legislation at the federal or state level. However, some companies sincerely believe that privacy is important to their customers and therefore to business operations. For activities such as health care, customers expect a higher degree of privacy protection, and privacy is an inherent characteristic. The types of benefits that may accrue to commercial record keepers include an increase in sales, a reduction in transaction costs as privacy-sensitive consumers agree to use less expensive Internet facilities, record keeping efficiencies, and reduced costs through greater uniformity of privacy requirements. A. Increased Sales The lack of adequate controls over the use and disclosure of personal information appears to take a significant toll on Internet sales. Internet users fill and (8) This paper uses the terms record subject, consumer, and customer interchangeably. In some contexts, the terms can have different meanings or connotations. 32 Da costo a risorsa - Attività produttive e protezione dei dati personali then abandon shopping carts in huge numbers. One study suggests that four out of five consumers try to purchase online and give up. The two leading reasons are 1) too much information has to be provided, and 2) unwillingness to enter credit card details.(9) Other studies and surveys show the importance of privacy in the online environment. In a recent report to the Congress, the Federal Trade Commission estimated that lost online retail sales due to privacy concerns may be as much as $18 billion. The FTC also cited a study showing that 92% of respondents from online households stated that they do not trust online companies to keep their personal information confidential.(10) Marketplace effects are sometimes most apparent when consumers react angrily to privacy policies. In 1998, a newspaper story revealed that two pharmacies in the Washington, D.C., area were sending prescription information to an independent company that mailed patients reminders about prescription refills. Within a few days, both pharmacies stopped the programs because of customer complaints.(11) Another illustration comes from a change in a privacy policy announced in 2002 by Qwest Communications, a large regional telecommunications company in the Western United States. Qwest told customers that their personal data would be disclosed to subsidiaries and to others unless the customers took steps to opt-out. In response to complaints from customers, regulators, and consumer groups, Qwest revoked the new policy within weeks and substituted a policy more acceptable to consumers.(12) The extent to which good privacy policies or practices increase sales, whether in an online or offline environment, is hard to measure directly. Anecdotal evidence suggests that consumers sometimes object when they become aware of data practices, and these objections may result in a loss of business or a tarnished reputation for the company. A headline from a recent report from a business research company makes the point clearly: Enterprises That Stray From Best Practices When Dealing With Personal Information Risk Customer Backlash or Worse.(13) (9) A.T. Kearney, Satisfying the Experienced On-Line Shopper at 8 (2000) <http://www.atkearney.com/pdf/eng/Eshopping_survey.pdf>. (10) Federal Trade Commission, Privacy Online: Fair Information Practices in the Electronic Marketplace 2 (2000) <http://www.ftc.gov/reports/privacy2000/privacy2000.pdf>. (11) Robert O’Harrow Jr., Prescription Sales, Privacy Fears: CVS, Giant Share Customer Records With Drug Marketing Firm, Washington Post, Feb. 15, 1998 at Page A01; Robert O’Harrow Jr., Giant Food Stops Sharing Customer Data, PrescriptionMarketing Plan Drew Complaints, Washington Post, Feb. 18, 1998 at Page A01. (12) Lisa M. Bowman, Qwest Backpedals on Privacy Plan, ZDNet News, Jan. 28, 2002 <http://zdnet.com.com/2100-1105824663.html>. (13) W. Janowski, Worst Practices in Customer Privacy Management (2002) (Gartner Group) (TU-16-6918) retrievable at <http://www3.gartner.com/pages/story.php.id.2367.s.8.jsp>. Robert Gellman - Privacy Benefits and Costs From a U.S. Perspective 33 B. Reduced Transaction Costs Internet transactions offer the benefit of reduced transaction costs. It is widely reported, for example, that bank transaction costs greatly diminish when customers shift to the Internet. A typical transaction involving a bank teller may cost from $1.00 to $1.44. A transaction at an automatic teller machine may cost 25 to 30 cents. However, estimates of the cost of an Internet transaction range between 1 and 4 cents.(14) The reduction in cost from an Internet transaction may exceed 95 percent. Assessing the level of consumer concerns about privacy and the marketplace effects of those concerns is difficult and controversial. However, even if only a relatively small percentage of consumers decline to engage Internet transactions because of privacy concerns, privacy protections that would induce more customers to use the Internet can still result in a net benefit for companies through a reduction in cost. The savings may be sizeable enough to outweigh the revenues that a bank may realize by exploiting customer records for other purposes. C. Record Keeping Efficiencies Many good privacy practices are good record management policies as well. Evidence suggests that privacy laws sometimes force record keepers to do things that they should have done otherwise. The effect of a privacy law can be better protections for data subjects as well as greater efficiency and lower costs for record keepers. Clear examples with firm cost savings are hard to find without considerable research and cooperation from record keepers. However, experience with a governmental privacy law offers some useful anecdotal evidence. The Privacy Act of 1974(15) was one of the first generation of privacy laws.(16) It applies only to federal agencies in the United States, and it requires agencies to implement Fair Information Practices in a systematic way. The combined effect of the law’s provisions requiring publication of notices of data systems, inclusion of privacy notices on forms that collect information from individuals, and other privacy protections forced agencies to review and reconsider their data processing practices. In a 1977 review of the law, the Privacy Protection Study Commission reported these results: - Some agencies eliminated systems of records in order to avoid the requirement to publish a descriptive notice. (14) See, e.g., Juan Hovey, Bank On It, Entrepreneur Magazine (April 2000) <http://www.Entrepreneur.com/article/0,4621,268144,00.html>. (15) 5 U.S.C. §552a. (16) For a discussion of the generations of privacy laws, see Viktor Mayer-Schönberger, Generational Development of Data Protection in Europe in Technology and Privacy: The New Landscape, 218-241 (Philip E. Agre & Marc Rotenberg eds., 1997). 34 Da costo a risorsa - Attività produttive e protezione dei dati personali - Some agencies disposed of records to avoid the responsibility of managing them. - The Foreign Service reduced the amount of material in its personnel records by 50 to 60 percent. - The Drug Enforcement Administration destroyed some records after discovering that it has no statutory authority to maintain them. - The United States Information Agency eliminated 9300 personnel records. The Community Services Administration also disposed of outdated personal records. - The Department of Housing and Urban Development and the National Center for Health Statistics eliminated personal identifiers from research records. - Some agencies stopped publishing directories with the home addresses and telephone numbers of employees. - One agency removed Social Security Numbers and other irrelevant information from carpool application forms. - The Civil Service Commission revised the government’s standard employment application form and eliminated 20 subsystems, including unnecessary records on 1.3 million individuals. - The Department of Labor stopped collecting Social Security Numbers from two million people each year, changing the records from identifiable to non-identifiable. - The Department of Defense eliminated more than 58,000 forms, and simplified another 22,000 forms. Hundreds of data elements were eliminated from some personnel systems.(17) These actions taken to comply with privacy requirements resulted in cost savings, greater efficiency, better management, improved compliance with legal obligations, or other benefits to the record keepers. Improving controls over information systems with personal data helps both the record keeper and the record subject. A measurement of the benefits, however, is not available. Some evidence of commercial benefits from privacy regulations can also be found. Perhaps more than any other industry, the American credit reporting industry is heavily regulated for privacy. The Fair Credit Reporting Act,(18) which dates back to 1970, is the oldest federal commercial privacy law. Equifax, one of the three major American credit bureaus, acknowledged the benefits of privacy in a 1992 annual report. Equifax said that greater attention to customer concerns for fair infor(17) Privacy Protection Study Commission, The Privacy Act of 1974: An Assessment 51-55 (1977) (Appendix 4 to the Report of the Privacy Protection Study Commission) <http://aspe.hhs.gov/datacncl/77apdx4/index.htm>. (18) 15 U.S.C. §1681 et seq. Robert Gellman - Privacy Benefits and Costs From a U.S. Perspective 35 mation practices “has reduced operating costs and increased profit margins.”(19) When companies that use records to make decisions about consumers maintain those records with greater accuracy, the result will be fairer and better decision-making as well as lower costs. D. More Efficient Compliance through Greater Uniformity The European Union long ago realized the importance of privacy laws to its common market for goods and services. Few Americans recognize that the EU Data Protection Directive has two separate purposes: one regarding the protection of personal privacy, and one on the free movement of personal data. The Directive recognizes that a uniform level of privacy is vital to the transfer of personal data within the EU internal market.(20) In the United States, recognition of the same principle continues to grow in other ways. Perhaps the single most important privacy issue for the American business community is the desire for uniform federal rules that preempt state laws. American companies that operate in interstate commerce do not want to face having to comply with fifty different state laws. They argue that differences in state laws as well as differences in national laws create barriers to commerce. While some in the American business community still wish that privacy would disappear as a public concern, it is apparent that privacy is here to stay. Record keepers will be forced by laws, self-regulatory mechanisms, or market pressure to address privacy. Thus, the choice is not whether to have privacy rules, but who will impose the rules. Whether self-regulation is effective is an open question. However, self-regulation may not dissuade legislators from enacting privacy laws so the jurisdiction issue may be unavoidable.(21) Laws govern international personal data processing activities in many countries, and those laws are also unavoidable. Companies that do not meet international standards for privacy face the prospect of either lost business or increased costs to meet those standards. It is difficult to put a price tag on the potential losses and costs, but the strong objections from parts of the business community suggest that the stakes are significant. The Safe Harbor agreement(22) between the US Department of Commerce and the European Commission offers one way for American companies to meet EU standards. Meeting the terms of Safe Harbor imposes costs on American record keepers, with (19) Equifax, Inc., Annual Report to Stockholders 17 (1992), quoted in Paul M. Schwartz & Joel R. Reidenberg, Data Privacy Law 264-65 (1996). (20) Recital 8. (21) Even self-regulation raises its own jurisdictional problems. See Robert Gellman, Can Privacy Be Regulated Effectively on a National Level? Thoughts on the Possible Need for International Privacy Rules, 41 Vill. L. Rev. 129 (1996). (22) <http://www.export.gov/safeharbor/>. 36 Da costo a risorsa - Attività produttive e protezione dei dati personali corresponding benefits to the data subjects whose personal information is exported to the United States. If the United States enacted privacy legislation that allowed American companies to conduct international business activities without the need for individual company compliance with privacy standards of other countries, more uniform and less expensive privacy obligations would be one result. As the EU Member States already learned, a degree of uniformity in privacy regulation opens markets, reduces barriers, and lowers costs. The benefits to business of privacy harmonization can be significant, although the benefits may be hard to quantify. The same benefits might flow to businesses if American legislation established either common or minimum standards within the United States. Preemption of state laws is one of the most controversial privacy issues in the United States. Privacy advocates generally oppose federal laws that prevent states from enacting laws with higher standards. Advocates tend to favor federal privacy laws that establish a floor of protection with the possibility that state laws that offer addition protections can remain in force. Businesses tend to favor federal laws that completely preempt state laws so that there is a single uniform rule throughout the country.(23) Resolution of competing demands about preemption will not happen quickly or easily. However, either approach toward uniform or minimal privacy standards bring with it some promise of cost savings for record keepers. E. Other Benefits Other potential benefits include avoidance of lawsuits and reputational damage. Even more than other benefits, these benefits are particularly difficult to quantify. However, some companies with inadequate privacy policies or practices have been the subjects of private lawsuits, government investigations, and negative press. The immediate cost of responding to an unexpected and negative media story can be measured in the millions of dollars in out-of-pocket costs and lost sales. In one highprofile case, the market value of a company that ran into privacy problems dropped precipitously when the problems became the subject of public controversy.(24) Another benefit from privacy can be better information from consumers. Consumers concerned about privacy, spam, or other consequences of information sharing have learned to lie.(25) Privacy protections may induce consumers to disclose accurate information so that record keepers will have better quality data. (23) See, e.g., John Dugan, Financial Services Coordinating Council, Testimony before the Senate Banking Committee (Sept. 19, 2002) <http://banking.senate.gov/02_09hrg/091902/dugan.htm>. (24) See, e.g., Chris Oakes, A Turning Point for E-Privacy, Wired News, Mar. 4, 2000 (discussing DoubleClick) <http://www.wired.com/news/politics/0,1283,34734,00.html>. (25) See, e.g., Leslie Miller, Web Surfers Keen on Politics and Privacy, USA Today, June 30, 1996 (“More than on fourth (26%) say they’ve given false information about themselves when asked to register at Web sites.”) Robert Gellman - Privacy Benefits and Costs From a U.S. Perspective 37 III. The Absence of Privacy Protections Costs Record Subjects Any discussion of privacy costs and benefits must take a comprehensive look at costs and benefits to all participants. Privacy rules impose costs on record keepers. Privacy rules can also result in benefits to record keepers through increased sales, reduced costs, greater efficiencies, or in other ways. Privacy rules – and the absence of privacy rules – also have consequences for consumers. One way to measure the importance of privacy to consumers is to observe actions that consumers take to protect their personal information. When people perceive threats to privacy and insufficient systemic responses, they are left to protect themselves. An American family seeking to protect the privacy of its information could spend hours of time and several hundred dollars annually in out-of-pocket expenses plus other intangible and unmeasurable costs.(26) A. Higher Prices American merchants increasingly offer frequent shopper programs that offer lower prices to consumers who register, provide personal information, and allow their purchases to be tracked. One opponent of the cards calls them registration and monitoring programs.(27) The most common examples are supermarket frequent shopper cards. Before the cards were in common use, supermarkets usually offered sales and discounts to all customers. The ability of merchants to set prices and limit discounts to registrants places tremendous pressure on consumers to participate in the programs. Any customer who refuses to use a frequent shopper card – or is unaware of the requirement – will pay more. Individuals may object to these programs for different reasons, including inadequate privacy policies from the merchants and the lack of statutory protections. Some merchants address these concerns, at least in part, by allowing anonymous registration. Some individuals lessen the consequences by acquiring cards using pseudonyms, by lying, or through other tactics. However, merchants sometimes require identification. The number of people who refuse to use frequent shopper cards is unknown. The higher prices paid by those who reject frequent shopper cards represent a direct financial sacrifice for privacy. For consumers as a whole, it is likely that frequent shopper programs represent a net expense from the previous regime where sale prices were available to everyone. Under the programs, some consumers receive discounts while others pay higher prices. A group that opposes the cards suggests that <http://www.cc.gatech.edu/gvu/user_surveys/>. (26) See Privacy, Consumers, and Costs. (27) Consumers Against Supermarket Privacy Invasion and Numbering <http://nocards.org/essays/nofakes.shtml>. 38 Da costo a risorsa - Attività produttive e protezione dei dati personali supermarkets may make a profit on the programs from the higher prices that some consumers pay.(28) B. Junk Mail Recipients of unsolicited advertising (junk mail) through the Postal Service bear some costs. Recipients spend time sorting through the mail and discarding it. They pay to have the trash removed, not a trivial expense on a nationwide scale. The basic numbers indicate the vast scale of junk mail sent and received in the United States: - The average person receives 10.8 pieces of junk mail each week or nearly 560 pieces per year. For a household, the amount of junk mail received annually can easily exceed 1000 pieces a year. - The total volume of junk mail produced each year in the United States is approximately 4.5 million tons. - Each year, 100 million trees are used to produce junk mail. - Estimates are that 44% of junk mail is discarded unopened and unread.(29) - A 1995 survey by the US Postal Service found that 50% of households wished that they received less “advertising” mail, up from 30% in 1987.(30) Some junk mailers allow consumers to opt-out of the sharing of their personal information for marketing purposes. Those who do opt-out may receive less unwanted mail. The burden on consumers of opting-out is significant. Many companies require those seeking to opt-out to write letters. Writing a letter is a significant burden on most individuals, and the cost for paper, postage, and time is not trivial.(31) If the cost to a consumer of sending an opt-out letter were 50 cents, the consumer who opted out of one type of junk mail each week would spend $26.00 in the course of a year. Some broader opt-outs are available, but not all are free. Individuals who want to use the Mail Preference Service run by the Direct Marketing Association to optout of junk mail must pay a five dollar “processing fee” and pay by credit card if they want to register for the service online.(32) The reticence of privacy-sensitive consumers to disclose their credit card numbers online is well known, so the demand (28) See Consumers Against Supermarket Privacy Invasion and Numbering, Supermarket Cards: The Pricing Issues <http://nocards.org/savings/index.shtml>. (29) Native Forest Network <http://www.nativeforest.org/stop_junk_mail/nfn_junk_mail_guide.htm>. (30) Direct Marketing Association, Statistical Fact Book 1998 at 37. (31) In regulations issued under Gramm-Leach-Bliley governing opt-outs offered by financial institutions, the Federal Trade Commission distinguished between reasonable and unreasonable opt-out methods. The Commission said expressly that it is an unreasonable method if the only way for a consumer to opt-out is to write a letter. The Commission favored check-off boxes, reply forms, and electronic means to opt-out. 16 C.F.R. §313.7(a)(2). (32)< http://www.dmaconsumers.org/cgi/offmailinglistdave >. Robert Gellman - Privacy Benefits and Costs From a U.S. Perspective 39 for disclosure of a credit card is a seemingly intentional barrier on the use of this service. The DMA’s email opt-out service has no processing fee.(33) However, it is only effective for two years and must be affirmatively renewed. Exercising these optouts imposes a cost on consumers that must also be attributed, at least in part, to the lack of adequate privacy protections. C. Telemarketing Telemarketing is highly unpopular among consumers. Polls confirm that people find telemarketing calls annoying, unacceptable, invasive, and offensive.(34) The Privacy Rights Clearinghouse makes the point with the subtitle of its fact sheet on telemarketing calls: Whatever Happened to a Quiet Evening At Home?(35) There are many ways to measure consumer unhappiness with telemarketing. Connecticut is one of many states that operates a state do-not-call list. Recent statistics show that nearly half of Connecticut households have placed their telephone number on the list.(36) When AOL announced in 1997 that it would begin to sell the telephone numbers of its members, the move “unleashed a storm of criticism.”(37) It took only one day for AOL to hear the complaints and reverse its decision. The Telephone Consumer Protection Act(38) gives recipients of unwanted calls a limited legal remedy. Several websites help people to exercise these remedies. One reports that its members have recovered more than $800,000 in damages over the calls.(39) However, the courts are beyond the reach of most, and consumers use other techniques and technologies to avoid, evade, and stop telemarketing calls. Consumers spend time, effort, and money in their efforts, and these are costs that result in part from the lack of adequate protections for the privacy of personal information. Many consumers simply suffer the aggravation and disruption of unwanted telemarketing calls. Both the Federal Trade Commission and the Federal Communications Commission are considering stronger rules on telemarketing that would enhance the ability of consumers to stop unwanted calls.(40) Telephone companies and device manufacturers use objections to telemarket(33) <http://www.dmaconsumers.org/optoutform_emps.shtml>. (34) For a collection of polls on the subject, see <http://telejunk.norman.ok.us/surveys.html>. (35) <http://www.privacyrights.org/fs/fs5-tmkt.htm>. (36) DM News, Connecticut DNC List Doubles in Size at 6 (June 11, 2001). (37) Associated Press, AOL Backs Off Plan to Give Out Phone Numbers (July 25, 1997). (38) 47 U.S.C. §227. (39) See Private Citizen, <http://www.private-citizen.com/>. See also <http://www.stopjunkcalls.com/links.htm>. (40) Federal Trade Commission, Request For Information on Proposed National Do-Not Call Registry (2002) <http://www.ftc.gov/os/2002/05/16cfrpart310.htm>; Federal Communications Commission, Notice of Proposed Rulemaking, In the Matter of Rules and Regulations Implementing the Telephone Consumer Protection Act of 1991 (2002) <http://www.fcc.gov/Daily_Releases/Daily_Business/2002/db0918/FCC-02-250A1.pdf>. 40 Da costo a risorsa - Attività produttive e protezione dei dati personali ing as a selling point for enhanced telephone services. In other words, consumers who want to avoid telemarketing calls can buy protection. Here are some examples: - Caller ID is often promoted as a privacy protection and a way to avoid unwanted calls. Qwest’s version is called Caller ID with Privacy+.(41) Verizon offers a service under the name Call Intercept.(42) The prices for these services vary. Listed price in 2001 for Verizon Call Intercept service as described on its website was $5 per month. The cost for Caller ID with Name was an additional $7.50 per month. - Answering machines and voice mail have long been used to screen calls. A 1997 survey found that about 3 in 4 households had answering machines. The firm that conducted the survey took special note of the role of answering machines in avoiding telemarketing calls, describing the answering machine as particularly “valuable in screening out those annoying telemarketing calls that we all like to avoid, as well as capturing those calls and messages that we don’t want to miss.”(43) Answering machines can also serve another purpose in protecting consumers. State securities regulators consider answering machines to be the consumers’ best weapon in the fight against telemarketers selling fraudulent investment schemes.(44) The advice is a reminder that not all telemarketers offer legal products and services. - Another product expressly and exclusively aimed at telemarketers is EZ Hangup by Zenith. This telephone accessory allows a the user to hang up on an unwanted sales call and press a button to play a recording rejecting the call and asking to be removed from a calling list. The product lists for around $25.00.(45) - Verizon, like other telephone companies, offers customers several ways to keep telephone numbers private. Customers can pay for non-listed numbers (not in the telephone directory but listed for directory assistance) or non-published numbers (not in the directory or directory assistance). Each service has a monthly charge.(46) A 1995 study found that 31.5% of households had unlisted or unpublished numbers. In some communities, the percentage exceeds 60%.(47) Another estimate is that a quarter of households pay an average of $1.50 a month to be unlisted. The total cost to (41) <http://www.qwest.com/pcat/for_home/product/1,1354,431_1_8,00.html>. (42) <http://www22.verizon.com/ForYourHome/SAS/ProdDesc.asp?ID=6063&state=P1>. (43) Decision Analyst, Inc., More Households Using Answering Machines (Press Release, October 15, 1997) <http://www.decisionanalyst.com/publ_data/1997/ansmachi.htm>. (44) ABP News, Regulators: Answering Machines Can Foil Telemarketing Fraud, (Oct. 17, 1999) <http://www.apbnews.com/safetycenter/business/1999/10/17/securitiesfraud1017_01.html>. (45) Full Life Products, EZ Hangup <http://www.superproducts.com/anti-telemarketing/ez/index.htm>. (46) <http://www.opc-dc.gov/bdcrates.html>. (47) Brad Edmonson, Unlisted America, American Demographics (June 1995) <http://www.demographics.com/publications/ Robert Gellman - Privacy Benefits and Costs From a U.S. Perspective 41 telephone subscribers for these privacy-protecting services is more than $400 million a year.(48) Techniques to avoid telemarketing are not practices only for those who are especially privacy sensitive. Anti-telemarketing techniques are a recognized activity recommended by governments and other mainstream organizations as a way of protecting privacy and avoiding unwanted calls. A consumer guide published by the Commonwealth of Massachusetts advises consumers to register for all do-not-call lists, to consider having an unlisted number, to avoid disclosures through contests, surveys, and sweepstakes, to use blocking technology to avoid disclosing a telephone number when making a call, and to screen calls with an answering machine.(49) Consumers spend time and money to avoid telemarketing calls. Even an individual with a casual objection to telemarketing could spend a considerable sum on equipment or monthly charges. These represent costs that consumers pay because they are unable to control how their personal information is used and disclosed. Some telephone capabilities, such as answering machines, voice mail, and unlisted numbers serve other goals beyond the protection of privacy. A fair cost accounting would allocate only some of the expense to privacy protection and some to other objectives. Nevertheless, the telephone costs consumers incur for privacy reasons are significant. Society faces other consequences when consumers are forced to act in their personal interest to keep their telephone numbers secret. Telephone directories help to make the telephone network inclusive, efficient, and useful. When large percentages of the population have unlisted numbers because of concern about misuse, every telephone directory user suffers from the lack of an effective, interconnected universal telephone system. D. Identity Theft Identity theft occurs when an individual appropriates another’s name, address, Social Security number, or other identifying information to commit fraud. Identity thieves may use consumers’ identifying information to open new credit card accounts, take out loans, or steal funds from existing checking, savings, or investment accounts.(50) The financial and emotional harm to victims of identity theft is significant ad/95_ad/9506_ad/AD767.htm>. (48) Jay Chris Robbins, Phone Book “Non-Service”Dials up Huge Profit (Jan. 14, 2000) <http://tampabay.bcentral.com/tampabay/stories/2000/01/17/editorial3.html>. (49) A Massachusetts Consumer Guide: Stopping Junk Mail, Phone Calls, And Email <http://www.state.ma.us/consumer/pubs/stopjunk.htm>. (50) Testimony of David Medine, Associate Director for Credit Practices, Bureau of Consumer Protection, Federal Trade Commission, before the Subcommittee on Technology, Terrorism and Government Information, Senate Committee On The Judiciary (May 20, 1998) <http://www.ftc.gov/os/1998/9805/identhef.htm>. 42 Da costo a risorsa - Attività produttive e protezione dei dati personali and long lasting.(51) It can take years of hard work and hundreds or thousands of dollars in out-of-pocket expense to remove all vestiges of identify theft from a victim’s record.(52) In the interim, a victim may be unable to obtain a job, purchase a car, or qualify for a mortgage.(53) The number of victims is hard to measure, but some estimate that the numbers range into the hundreds of thousands annually in the United States.(54) - The costs to financial institutions are also significant. Definitional problems and lack of data make it difficult to estimate costs with precision, but the losses appear to be measured in the hundreds of millions of dollars.(55) Consumers may ultimately pay for many of these losses through higher prices and higher interest rates. Identity theft also undermines consumer confidence in the credit system and the Internet, deterring the growth of electronic commerce.(56) - Identity theft mushroomed in the 1990s. It may not be a coincidence that the growth of identity theft roughly parallels the growth of the Internet. Personal information is available from many commercial and public sources on the Internet. The widespread availability of consumer data makes it easier for criminals to engage in identity theft. Identity theft occurs for many reasons, and the routine trafficking in personal data is a contributing cause. Several independent studies support the relationship between personal data availability and identity theft. In a 1998 report, the General Accounting Office said that “[m]any of the officials we contacted said that Internet growth, which enhances the availability and accessibility of personal identifying information, obviously creates greater risks or opportunities for criminal activity, including identity fraud.”(57) Industry argues that the availability of personal data helps to reduce fraud.(58) This is undoubtedly true to some extent. Yet the vast amount of consumer data avail(51) Id. (52) The Identity Theft Resource Center reports that, on average, victims spend 175 hours and $808 in out-of-pocket expenses to clear their names <http://www.idtheftcenter.org/html/facts_and_statistics.htm>. (53) General Accounting Office, Identity Fraud: Information on Prevalence, Cost, and Internet Impact Is Limited at 4 (GAOGGD-98-100BR) (1998) [hereinafter cited as GAO Identity Fraud]. (54) See id at 24-41 (discussing information sources and lack of comprehensive national statistics). The Identity Theft Resource Center estimates that there were 700,000 to 1.1 million victims in 2001. <http://www.idtheftcenter.org/html/ facts_and_statistics.htm>. (55) GAO Identity Fraud at 4. (56) See, e.g., National Fraud Center, National Fraud Center White Paper Says Internet Driving Dramatic Increase in Identity Theft - Balanced Approach Required to Address Issue (Press Release, March 16, 2000) <http://www.nationalfraud.com/pressrelease/IDTheft.htm>. (57) GAO Identity Fraud at 4. See also National Fraud Center, Inc., Identity Theft: Authentication As A Solution (2000) <http://www.nationalfraud.com/identity%20theft%203.13.htm>. (58) Ernst & Young, Customer Benefits of Information Integration by Financial Services Companies 5 (2000) <http://www.privacyalliance.org/resources/research.shtml>. The survey of Financial Services Roundtable members found that 63% of respondents Robert Gellman - Privacy Benefits and Costs From a U.S. Perspective 43 able today to credit grantors has not stopped the growth of identity theft. The value of more data as a protection against identity theft is limited. At the same time, extensive and largely unregulated trafficking in personal data – typically without consumer knowledge or consent – makes it easier for some identity thieves to operate. Privacy laws that would give individuals more control over the use and disclosure of their personal information have potential to limit identity theft.(59) Stronger security protections might also protect against misuse of personal data. The lack of protections thus appears to contribute to identity theft. More importantly, activities that individuals take on their own initiative to protect against identity theft impose costs that can be attributed in significant part to the absence of privacy protections. Some companies profit by selling personal information to detect or avoid fraud. At the same time, they also sell personal data that may be used directly or indirectly to support identity theft. These companies profit from both sides. Now the same companies seek to profit in a third way as well. The companies want consumers to pay to protect themselves against identity theft. An example comes from a recent Equifax press release about a Credit Watch service that costs $39.95 a year. The service promises to “quickly detect possible identity theft and minimize its potentially devastating consequences.”(60) Costs incurred by individuals who are afraid of being victims of identity theft represent costs that result from the lack of adequate privacy protections. The New York State Attorney General is one of many authorities suggesting that consumers buy a copy of their credit report each year.(61) For a family with two adults, the cost is $51 a year to buy reports from three credit bureaus. Better privacy protections for personal data might lessen the risks, reduce the need for monitoring credit reports, or provide equivalent data directly to consumers at no cost to them. The Federal Trade Commission suggests that consumers take other actions to protect their information.(62) These include exercising opt-out rights, such as prescreening for credit offers. This strategy can have only limited benefits. Many comthought that restrictions on information sharing included in the Gramm-Leach-Bliley (GLB) law would restrict their ability to detect fraud. A second question found that 79% thought that potential new restrictions on information sharing would restrict their ability to detect fraud. The second question left the nature of any information restrictions to the imagination of the respondent. Even so, 21% did not see a connection between information restrictions and ability to detect fraud. In a survey designed to elicit positive responses to these questions, the presence of a sizeable minority view may be more telling than the opinion of the majority. (59) The same point could be made that privacy laws would limit telemarketing fraud and other forms of consumer fraud that benefit from the ready availability of personal information. (60) Equifax, Inc., Equifax Credit Watch Provides Early Warning Of Identity Theft To Consumers (Press Release 4/10/01) <http://www.equifax.com/press_room/press_releases2001/2001_04_10.html>. (61) <http://www.oag.state.ny.us/consumer/tips/identity_theft.html>. (62) <http://www.ftc.gov/bcp/conline/pubs/credit/idtheft.htm#risk>. 44 Da costo a risorsa - Attività produttive e protezione dei dati personali panies that traffic in personal information do not notify data subjects that their records are being sold, do not allow consumers to opt-out, or allow narrow opt-out choices. The number of telephone calls and letters required for a family that elects all available opt-outs is uncertain, but it could be measured in the dozens. The time, trouble, and expense of opting out are costs that consumers incur. A recent development is the offering of insurance to protect individuals against losses due to identity theft and to provide reimbursement of expenses incurred to deal with the consequences of being an identity theft victim. For example, one policy offers to reimburse up to four weeks lost wages resulting from dealing with fraud. This policy costs $85 per year for coverage of $10,000.(63) IV. Challenges in Assessments of Privacy Costs and Benefits Assessing privacy costs and benefits in a formal way is difficult anywhere. An assessment in the United States is even harder because of the widespread lack of consensus about nearly everything relating to privacy. What follows is a discussion of some of the problems for any privacy cost benefit analysis. A. Baseline When assessing costs or benefits of a privacy rule, it is important to establish a baseline from which to measure the actual or likely effect of a rule.(64) A rule that prohibits conduct that no one engages in will likely have no direct costs. A rule that requires conduct that is already common practice will have little marginal cost. It is difficult to determine a baseline because of the great variation in privacy practices in the United States. For example, it is increasingly common for major American commercial websites to maintain a privacy policy. Legislation requiring the adoption of online privacy policies would have a smaller cost because some websites are already be in compliance. The Gramm-Leach-Bliley law that requires financial institutions to adopt limited privacy protections offers an interesting example. Financial institutions covered by the law must give customers the right to opt-out of data sharing with nonaffiliated third parties.(65) A cost is associated with implementing this requirement. However, some financial institutions never shared customer data with third parties. The reasons for not sharing vary. Some companies would not benefit from data sharing, (63) Travelers Insurance <http://www.travelerspc.com/personal/theft/?>. (64) See Peter Swire, New Study Substantially Overstates Costs of Internet Privacy Protections (May 9, 2001) <http://www.osu.edu/units/law/swire1/hahn.doc>. (65) 15 U.S.C. §6802. Robert Gellman - Privacy Benefits and Costs From a U.S. Perspective 45 some may be avoiding adverse customer reaction, and others may be more protective of customer privacy. For these companies, the cost of administering an opt-out program is zero. Another example comes from the Video Privacy Protection Act,(66) a law that limits the disclosure of videotape rental or sale records for marketing and other purposes. The law was enacted at a time when the video rental industry did not routinely sell detailed customer data. The effect of the law was to prevent the development of commercial practices that would have negatively affected the privacy of customers. If the law had associated costs, they were probably minor. However, had the law also covered the rental or sale of magazine subscribers, the costs would have been much greater because magazine publishers make extensive use of their lists. B. Identifying and Valuing Benefits Identifying benefits from privacy rules and quantifying the benefits is difficult whether the benefits accrue to record keepers or record subjects. A recent attempt by the US Department of Health and Human Services (HHS) at assessing privacy costs and benefits for a health privacy rule may be one of the most comprehensive and independent attempts to determine both the costs and benefits of privacy regulation. HHS found a lack of data, models, or empirical studies that provide credible measures of benefits for record subjects.(67) HHS summarized some of the difficulties in valuing confidentiality in health care: There are important societal benefits associated with improving health information privacy. Confidentiality is an important component of trust between patients and providers, and some studies indicate that a lack of privacy may deter patients from obtaining preventive care and treatment. For these reasons, traditional approaches to estimating the value of a commodity cannot fully capture the value of personal privacy. It may be difficult for individuals to assign value to privacy protection because most individuals view personal privacy as a right. Therefore, the benefits of the proposed regulation are impossible to estimate based on the market value of health information alone. However, it is possible to evaluate some of the benefits that may accrue to individuals as a result of proposed regulation, and these benefits, alone, suggest that the regulation is warranted. Added to these benefits is the intangible value of privacy, the security that individuals feel when personal information is kept confidential. This benefit is very real and very significant but there are no reliable means of measuring dollar value of such benefit.(68) (66) 18 U.S.C. §2710. (67) Final Rule, Standards for Privacy of Individually Identifiable Health Information, 65 Federal Register 82461, 82776 (Dec. 28, 2000). (68) Id. (footnote omitted). 46 Da costo a risorsa - Attività produttive e protezione dei dati personali HHS offered examples of benefits for which it was able to assign a monetary benefit. The analysis began with evidence that fears about disclosure of health information dissuades some individuals from seeking treatment. Consequences of postponing treatment include preventable spreading of infectious diseases, reduction in the quality of life, and lost wages that might have been avoided if people sought early treatment of cancer and other diseases.(69) For cancer alone, HHS calculated that encouraging people to seek early cancer treatment through enhanced privacy protections could save $1.6 billion in lost wages. The specificity of the calculation is not especially convincing, but it is believable that there would be some benefit. Even if HHS’s lost wage number were accurate, its relevance is not entirely clear. Wages lost by one worker might be paid to another so the systemic effect might be less than the calculation suggests. On the other hand, a healthier workforce produces benefits for employers through lower health insurance costs and greater productivity. Another benefit may be lower health care costs from early treatment. Whether secondary and tertiary effects of privacy protection can be measured or should be counted in a cost-benefit analysis is uncertain. C. Identifying and Valuing Record Keeper Costs In the United States, the quantification of privacy costs and benefits has rarely been undertaken in any systematic or objective manner. Some examples illustrate the point. The Congressional Budget Office of the US Congress estimates the cost of bills passed by congressional committees. In recent years, CBO prepared cost estimates for several bills with privacy implications. Not all privacy bills impose costs on the private sector, so not all CBO estimates address private sector costs. However, for estimates that included costs for the private sector, CBO has not been able to offer firm privacy cost estimates. At best, CBO estimates include a general discussion of the types of costs that the bills might entail. The consistent inability of CBO to provide more detailed cost estimates strongly suggests the lack of any meaningful privacy cost methodology.(70) CBO has no obligation to attempt to calculate the benefits of legislation for secondary beneficiaries. In promulgating its health privacy rule, the US Department of Health and Human Services attempted to assess the costs and benefits of the rule in a systematic (69) Id. at 82776-79. (70) See, e.g., Congressional Budget Estimate, Cost Estimate for S. 2201, Online Personal Privacy Act (June 18, 2002) <http://www.cbo.gov/showdoc.cfm?index=3549&sequence=0>; Cost Estimate for H.R. 4585, Medical Financial Privacy Protection Act (July 14, 2000) <http://www.cbo.gov/showdoc.cfm?index=2249&sequence=0>; Cost Estimate for H.R. 4857, Social Security Number Privacy and Identity Theft Prevention Act of 2000 (Oct. 6, 2000) <http://www.cbo.gov/showdoc.cfm?index=2583&sequence=0>. Robert Gellman - Privacy Benefits and Costs From a U.S. Perspective 47 way.(71) The detailed cost estimates generally reviewed each of the rule’s requirements, identified the employees who would carry out their responsibility, determined their average wage, and calculated the cost. The attempt is instructive, but of limited relevance to a comparable analysis of commercial activities that involve the sale, rental, and sharing of personal data for profit. Significant parts of the health care system in the United States are governmental or non-commercial. In addition, many health care activities are governed by ethical rules that protect the confidentiality of health data and prohibit commercial exploitation of the data. As part of the American political debate about privacy, elements of the business community have offered a series of commissioned “studies” written or sponsored by the Financial Services Roundtable, the Direct Marketing Association, the Association for Competitive Technology, and others.(72) The cost of privacy is a legitimate issue, but the studies and the conclusions drawn from them have serious flaws, poor definitions, and questionable methodology. Some criticisms of these studies can be found elsewhere.(73) V. Conclusion Like many other human endeavors, the protection of privacy imposes costs and produces benefits. Both costs and benefits are relevant to decisions to impose privacy rules on record keepers. One problem is defining the scope of privacy. If privacy is viewed solely as an individual right, the identification and calculation of benefits will be determined in one way. If, however, privacy is viewed as a common good,(74) the process and the result will be different. Definitions matter to a cost-benefit analysis. In the privacy arena, agreement on definitions is unlikely, but it may be possible to agree on some elements relevant to costs and benefits. A second problem involves consequential effects. If a lack of privacy dissuades individuals from seeking medical treatment, how many of the consequences of that lack of treatment count in the calculation? If privacy laws limit direct mail solicitations of customers so that direct mail sales diminish but other sales increase, does the calculation consider only the losses and not the gains? If privacy laws create new industries,(75) do the resulting jobs and profits count as benefits or costs? Should (71) Final Rule, Standards for Privacy of Individually Identifiable Health Information, 65 Federal Register 82461, 8275982779 (Dec. 28, 2000). (72) Many of these papers are available at <http://www.privacyalliance.org/resources/research.shtml> or at <http://www.bbbonline.org/UnderstandingPrivacy/library/whitepapers.asp>. (73) See, e.g., Privacy, Consumers, and Costs. (74) See, e.g., Priscilla M. Regan, Legislating Privacy: Technology, Social Values, and Public Policy 214-243 (1995). (75) See, e.g., Call Compliance, a company that provides tools for telemarketers to ensure regulatory compliance with donot-call lists. <www.callcompliance.com>. 48 Da costo a risorsa - Attività produttive e protezione dei dati personali these secondary and tertiary effects be included? A third problem involves the best way to share costs and benefits. If privacy protections impose costs on record keepers and the absence of privacy protections imposes costs on record subjects, then a reasonable inquiry is who can and should bear the costs most efficiently and most fairly. From a societal perspective, it may be more efficient to ask record keepers to bear some costs because the collective expenditure is less than the expenditures that individuals incur to protect their own privacy. On the other side, if the number of individuals interested in privacy protections is small, it may be more efficient for those individuals to bear some of the costs. A fourth problem that complicates international comparisons of privacy costs and benefits involves the baseline. Privacy law and personal data processing vary considerably between the United States and Europe. A privacy rule could have minimal effect in Europe because it does not change existing policies or practices greatly. In the United States, the same rule could force a major change in practices for a much larger range of commercial activities. In the United States so date, discussions of privacy costs have been mostly driven by political considerations. Privacy benefits are rarely considered. Participants in privacy debates have not agreed on any terms or framework for a fair assessment of the costs, and no formal assessment of the benefits has been undertaken. Without agreement on terms and methodology, American debates over privacy costs and benefits are likely to remain unenlightening. Robert Gellman - Privacy Benefits and Costs From a U.S. Perspective 49 The Impact of the Different Regulatory Models in the World Scenario George Radwanski (1) I’m very happy to be able to participate in a conference on the advantages to business of respecting privacy. That’s a subject about which I speak frequently to business audiences in Canada. It is my firm belief that respect for the privacy of customers and employees is a fundamental element of competitive advantage for businesses. It’s also a great pleasure to be at a conference hosted by the Italian Data Protection Commission, which is headed by one of the most respected Data Protection Commissioners on the international stage, Dr. Stefano Rodota. You here in Italy are very lucky to have privacy and data protection in such capable hands. That is of the greatest importance, because privacy is a fundamental human right, recognized as such by the United Nations. Privacy is often described as the right from which all our other freedoms flow—freedom of speech, freedom of association, freedom of thought, virtually any freedom you can name. As Justice Gérard La Forest of the Supreme Court of Canada has written, “privacy is at the heart of liberty in a modern state.” To me, that’s almost self-evident: How can we be truly free if our every move can be watched, our every activity known, our every preference monitored? Privacy lets us live as free individuals. It means we have a right to a private sphere of thought and action that is our own business, and no one else’s. It means that we don’t have to go through life with persons unknown watching over our shoulderswatching and assessing every move, every purchase, and every human interaction. And privacy is more than a fundamental human right. It’s also an innate human need. When you go home at night, you probably close the curtains. It’s not that you’re trying to hide something. You just instinctively need your privacy, your freedom from being observed. If you’re on a bus or a plane, and someone starts reading over your shoulder, you probably feel uncomfortable. What you’re reading isn’t secret; it’s just that your privacy is being invaded. If you’ve ever had your home or even your car broken into, you’ll know that the sense of intrusion, of having your privacy violated, can be even more painful than the loss of whatever was stolen. And yet, almost every day, in some new and creative way, that innate human need, that fundamental human right–the right to privacy–is being chipped away. (1) Privacy Commissioner of Canada 50 Da costo a risorsa - Attività produttive e protezione dei dati personali Individuals have the sense that businesses and governments have more curiosity about them than ever before. Every day someone wants more information about them. Every day someone has some new use for their personal information, or some new way of collecting it without their consent. That thirst for personal information has become almost insatiable, and the pressures on privacy almost overwhelming, since the terrorist attacks of last year in the U.S. While this is primarily a business conference, it is difficult to talk of privacy and the need to protect it without referring to this broader context. As many of you will know, since September 11, 2001, Dr. Rodotà has been very much a leader in the ongoing struggle to protect and enhance privacy while ensuring security. I’m very proud to be alongside him in that struggle. It’s certainly the most difficult privacy challenge facing us all right now. The essence of the problem is that privacy is not an absolute right. All of us involved in privacy protection acknowledge that fact. We all accept that there may be a need for privacy-invasive measures to meet the kinds of security threats our world is facing. But these choices must be made calmly, carefully and case by case. The burden of proof must always be on those who suggest that some new intrusion or limitation on privacy is needed in the name of security. In Canada, I have suggested that any such proposed measure must meet a fourpart test. It must be demonstrably necessary to meet some specific need. It must be demonstrably likely to be effective–in other words, it must be likely to actually make us significantly safer, not just make us feel safer. The intrusion on privacy must be proportional to the security benefit to be derived. And it must be demonstrable that no other, less privacy-intrusive, measure would suffice to achieve the same purpose. Necessity, effectiveness, proportionality, and lack of a less privacy-invasive alternative–that’s the test that I believe can allow us to take all appropriate measures to enhance security, without unduly sacrificing privacy. Compared to the threat that governments pose to privacy, the risks of private businesses collecting, using, and disclosing and our personal information may seem minor. But they should not be underestimated. The threat may be less dramatic, but the fact is that a vast amount of our personal information finds its way into the hands of private businesses. Of course, it’s perfectly understandable why businesses want personal information. They depend on it. In an increasingly competitive globalized marketplace, they rely on personal information to identify and stay in touch with their customers. They want to use it to seek out new customers who might be interested in their products. They want to find out what the market is looking for and what it G e o r g e R a d w a n s k i - T h e I m p a c t o f t h e D i f f e r e n t Re g u l a t o r y M o d e l s i n t h e Wo r l d S c e n a r i o 51 will bear. And they want information about their employees, so that they can administer benefits and ensure a safe and productive workplace. Getting that personal information, and using it, in ways that don’t offend the fundamental human right of privacy–that’s the challenge for modern businesses. And they have to rise to that challenge, or they will alienate their workforces and drive away their customers. This challenge is complicated by the fact that people more than ever insist on control over their personal information. In a world where so much is taken out of our control, one of the few things that people still feel that they can control is their personal information. So they’re sensitive on the subject of businesses collecting it. They want to know what happens to it and how it’s used when they deal with businesses. When businesses don’t respect our rights, it strikes at our sense of control over our lives. And people respond very, very negatively to that. Let me give you a couple of examples from Canada. Air Canada, our major airline, operates a program called Aeroplan, where people earn and redeem “points” every time they fly on Air Canada planes or do business with partners in the program. Some six million people participate. In June 2001, Aeroplan sent 60,000 of them–about one per cent–a brochure called “All about your privacy.” That brochure caused Aeroplan a lot of problems. It didn’t communicate clearly, simply, in plain language what Aeroplan would do with members’ personal information. It was vague about what information was to be shared, with whom, and for what purpose. It appeared to say that potentially highly sensitive information about personal and professional interests, use of products and services, and financial status would be shared. Members could opt out, by indicating each situation where they did not want their information shared, and then mailing the brochure back to Aeroplan. If they didn’t opt out, Aeroplan would consider them to have consented. Not surprisingly, members objected when they received Aeroplan’s brochure. In fact, my Office was flooded with e-mails from people objecting. As a result of the overwhelming public interest, I had to publicly state my own concerns about the program. That didn’t make things pleasant for the people at Aeroplan. The good news is that my Office was able to work with Aeroplan to remedy the situation. It was a painful lesson for them. In spite of all their efforts to ensure that they were respecting privacy, they fell down on this very basic requirement–the requirement to communicate their practices clearly to their members and get their informed consent. 52 Da costo a risorsa - Attività produttive e protezione dei dati personali A similar situation happened with Canada Post, the public sector corporation responsible for moving the mail in Canada. It offers a change of address service, for a fee, if people want their mail redirected from their old address to their new one. That’s a useful service, but with a significant privacy price-tag. The problem was that, unless people had read the fine print, they wouldn’t know that Canada Post did more with their names and addresses than just redirect their mail. It sold their new addresses, and the buyers included list brokers, mass mailers, and direct marketers. So when they moved to their new addresses and asked Canada Post to redirect their mail, they would get their mail, alright–and they’d also get marketing brochures, junk mail, and telephone solicitations. To avoid this, they had to opt out in writing. When this came to light, the public was utterly indignant. As had been the case with Air Canada, corporate good sense prevailed. Canada Post moved to make the process more transparent and switch to a system of opt-in consent. These are the types of incidents than can plague a company that is not respectful of privacy. People are getting angrier and angrier. They want control over their personal information, including, and maybe especially, when it’s connected with their financial transactions. Think about what it means for a company that’s seeking a competitive edge, if its customers perceive it as careless about privacy. And you have to ask yourself: what are some of these companies thinking? What use is a mailing list made up of names of people who may very well not want to be marketed to? Why would any marketer want a list like that? Organizations collect and analyze personal information to find out who is going to want their products and promotions. The key to that is getting people’s solid, affirmative consent to the use of their personal information. If people don’t trust businesses, if they see businesses twisting consent or unjustifiably inferring it, they’ll undermine the system. They’ll refuse to give information, or give false information. They’ll inundate companies with complaints. They’ll reject things that might be of benefit to them, out of sheer anger and frustration and resentment. And they’ll look for competitors who do respect their privacy. That, to my mind, is the largest single reason why respecting privacy is less and less regarded as a business cost. Smart businesses are coming to see that respecting privacy is a key element of good customer relations–and that makes it a key element of competitive advantage. And what, fundamentally, is respect for privacy? In the business world, it’s really nothing more complicated than respect for the golden rule–do unto others as G e o r g e R a d w a n s k i - T h e I m p a c t o f t h e D i f f e r e n t Re g u l a t o r y M o d e l s i n t h e Wo r l d S c e n a r i o 53 you would have them do unto you. It’s not an abstract legal concept. It’s simple consideration, respect, and courtesy–the essence of a good relationship with your customers and employees. Of course, protecting privacy is more than just a wise business move. And privacy is more than just an individual right. Privacy is a public good. It goes to the heart of decisions that people make collectively about how they want to live as a society. That’s why privacy and data protection legislation are so fundamental to the fabric of our societies. In Canada, we’ve had privacy protection in the public sector since 1983. The Privacy Act puts important limits on the Federal government’s ability to collect, use, and disclose information about Canadians. It gives Canadians the right to see what information federal government institutions hold about them. And it gives me, as Privacy Commissioner, broad powers to initiate and investigate complaints and audit compliance. Most of our provinces have followed the example of the federal government, and enacted similar laws applying to their public sectors. But for a long time Canadians have been concerned about privacy in their dealings with the private sector, too. Computer networking, sophisticated surveillance technologies, commercial trade in customer information, and the explosive growth of the Internet have heightened their concerns. That’s why, over the past fifteen years or so, Canada has worked on developing privacy protection that will apply to the private sector. In 1984, we adopted the OECD’s Guidelines for the Protection of Privacy and Transborder Flows of Personal Data. The Canadian Standards Association, with representatives from business, government, labour, and consumer groups, used the OECD Guidelines as the starting point for a model privacy code for the private sector. The Code was completed in 1996, and incorporated by the government into the Personal Information Protection and Electronic Documents Act, which came into effect in January, 2001. This law strikes a balance between the legitimate information needs of the private sector and the fundamental privacy rights of individuals. It has been able to achieve that balance partly because the Canadian Standards Association’s Code on which it is based was the result of a consultative, cooperative process. The Act incorporates provisions that are common to data protection laws around the world—the requirement for consent to collection, use, or disclosure of personal information; the requirement that personal information collected for one purpose not be used or disclosed for other purposes without consent; the right of individuals to see the personal information that an organization holds about them and to correct inaccuracies; oversight, through me and my office, to ensure that the law is respected, and redress if people’s rights are violated. 54 Da costo a risorsa - Attività produttive e protezione dei dati personali In addition, the Act contains a very important provision that is not always found in data protection laws. Even with consent, an organization can only collect, use, or disclose information for purposes that a reasonable person would consider appropriate under the circumstances. That provision– “the reasonable person test” as it’s known–is what makes the Act a true privacy protection statute, rather than just a code of fair information practices. It’s particularly important in situations like employment, where there’s a power imbalance between an individual and an organization that wants to collect, use, or disclose his or her personal information. The organization can’t use its greater bargaining power to coerce the individual to consent. It has to be able to justify what it wants to do, and show that it’s reasonable. Of course, what’s reasonable varies from one situation to another. Video surveillance of employees in a diamond polishing operation, for example, might be reasonable. But it’s not likely to be reasonable in an insurance company–whether or not employees consent to it. The Act applies at the moment to industries that, under the constitution, are the responsibility of the federal government–primarily banks, airlines, telecommunications companies, broadcasters, and transportation companies. It also applies to personal information held by any organization if it’s sold, leased, or bartered across provincial or national boundaries. Beginning in January 2004, the Act will apply across the board–to all personal information collected, used, or disclosed in the course of commercial activities by all private sector organizations–except where provinces have passed their own privacy legislation. At that point, we’ll have seamless privacy protection in Canada. As I’m sure you’re aware, Canada’s privacy law is one of the few outside the European Union that the EU considers adequate to protect the personal information of its citizens. Last December, the European Commission recognised that the Act meets the demands of the EU’s Data Protection Directive and provides adequate protection for personal information transferred from the EU to Canada. This is a major step forward for Canada. It’s an important element in the competitive strength of Canadian businesses. But when I say that, in fact I’m selling privacy a little short. As important as it is to affirm that good privacy is good business, it’s not enough. Privacy is much, much more. Privacy is a fundamental human right, and it’s the safeguarding of that fundamental right that is the real achievement of our privacy laws, in your country as in mine. G e o r g e R a d w a n s k i - T h e I m p a c t o f t h e D i f f e r e n t Re g u l a t o r y M o d e l s i n t h e Wo r l d S c e n a r i o 55 And so, when businesses respect the privacy of their customers and employees, yes, they are improving their own competitive position. Yes, they are demonstrating consideration and courtesy and basic respect. But they are doing much more. When businesses respect privacy, they are enhancing individual autonomy, and advancing the cause of freedom and human dignity. That is what privacy really means. This presents businesses, not with a burden, but with an opportunity, a duty and a challenge. It is an opportunity, a duty and a challenge that I’m sure the Italian business community, with the help of my esteemed colleague Dr. Rodotà, will be able and eager to meet. 56 Da costo a risorsa - Attività produttive e protezione dei dati personali Diritti fondamentali e libertà di iniziativa economica Giovanni Buttarelli (1) Il dibattito giuridico sul rapporto che intercorre tra la libertà di iniziativa economica e i suoi limiti sembra datato e aver perso di attualità. Ho voluto però sfiorare questo tema perché vi ho trovato elementi utili per la Conferenza. Prenderò spunto dal contesto italiano, cercando di globalizzare alcune riflessioni e di tener presenti le problematiche del mercato interno europeo e dei flussi internazionali di dati. L’art. 41 della Costituzione italiana afferma che l’iniziativa economica privata è “libera” e non deve svolgersi in contrasto con l’“utilità sociale” o recando danno alla libertà e alla dignità umana. Qualcuno ha sostenuto che l ‘iniziativa economica privata dovrebbe perseguire non tanto il fine particolare del singolo operatore di mercato, quanto una “funzione sociale” ed essere pertanto orientata a conseguire i beni dell’utilità sociale e della dignità umana. In alcuni casi la Corte costituzionale ha interpretato l’espressione “utilità sociale”, ma non è stata enucleata una nozione generale e unitaria. “Utilità sociale” è anzi un concetto indeterminato e in costante evoluzione, da adattare ai tempi, al punto che Massimo Severo Giannini ritenne che l’art. 41 non sia tra le disposizioni più “perspicue” della nostra Costituzione. Una cosa è più chiara: dietro le espressioni “utilità sociale” e “dignità umana” vi sono non tanto singoli beni individuali dell’uomo quanto i valori costitutivi della soggettività umana e della personalità, che sono inscindibili. In norme di questo tipo, anche in altri Paesi, abbiamo quindi una garanzia unitaria dei diritti e delle libertà fondamentali della persona e non di singoli suoi frammenti. Non siamo oggi qui per sostenere il primato dell’intervento pubblico sul principio di libertà imprenditoriale. Del resto, diritti e libertà fondamentali della persona vanno rispettati “a monte” da chi esercita un diritto di libertà quale quello di iniziativa economica (che è anch’ esso tutelato costituzionalmente, ma che non è agevolmente riconducibile ai “principi fondamentali” della prima parte della Carta costituzionale). In platea sono rappresentate molte imprese. Permettetemi quindi di assicurarvi che non intendiamo chiedervi di non perseguire un fine di profitto, di divenire “be(1) Garante per la protezione dei dati personali Giovanni Buttarelli - Diritti fondamentali e libertà di iniziativa economica 57 nefattori” della privacy e di prestare un servizio sociale per il quale dovreste essere a questo punto remunerati. Il profitto può essere però perseguito in una dimensione nuova. Il mercato non è solo un luogo di scambi, di produzione e lavoro. È anche un contesto in cui bilanciare valori e interessi in nome del principio del rispetto. Questo bilanciamento di interessi non dovrebbe essere fatto solo ex post, con norme di legge sulla privacy che “correggano” un’attività economica che si svolge già da tempo. Il bilanciamento dovrebbe invece far parte dell’esperienza quotidiana dell’operatore economico. Non è però configurabile una piena autodisciplina del mercato. Quando si tocca la sfera più intima della persona (come in questa materia), la formula dello “Stato minimo” non è facilmente utilizzabile nel mercato. Si potrebbe obiettare (prendendo in prestito le parole di Luigi Einaudi) che il mercato soddisfa “domande”, non “bisogni”. Si potrebbe però replicare che esiste anche un’esigenza di soddisfare bisogni che non si esprimono in domande aventi i requisiti richiesti dal mercato: e che ciò accade proprio per i diritti della personalità, i quali non sono nati per essere commercializzati. Questo è ancor più vero in tempi di globalizzazione, nei quali, in assenza di una disciplina come quella europea attuale sulla privacy, avremmo corso il rischio di globalizzare una lex mercatoria, a svantaggio dei diritti della persona. In passato, gli interessi che ruotano attorno alla privacy non hanno trovato nel mercato una loro conciliazione spontanea. Questo spiega come le leggi sulla privacy abbiano cercato di non lasciare il cittadino al giuoco del mercato, affermando ad esempio il principio di proporzionalità nel trattamento dei dati il quale prevale sulla logica del consenso dell’interessato. Le diverse decisioni adottate in Europa negli ultimi due anni in tema di flussi transfrontalieri di dati, e i recenti approfondimenti in atto a Bruxelles a proposito delle garanzie che le imprese possono offrire attraverso binding corporate rules, dimostrano lo sforzo dei c.d. watchdog europei della privacy di tener conto delle nuove sfide del mercato interno europeo, alla luce del Trattato di Amsterdam, e di una corretta competizione su scala Mondiale: è l’impegno che 27 Paesi hanno preso nel 2000 con la “Carta di Venezia” sottoscritta dalle rispettive autorità garanti della privacy. Ora che le regole sulla privacy si sono in parte armonizzate nel mondo, e si basano meno sugli adempimenti formali, guardando alla sostanza della tutela e favorendo la combinazione flessibile di diversi strumenti di regolamentazione (compresa la deontologia), è giunto il momento in cui l’impresa può guardare alla privacy in modo nuovo e non più come controparte. A mano a mano che cresce l’integrazione nella Società dell’Informazione sale il trend secondo il quale il rispetto della privacy è sentito da ampi strati di popolazione 58 Da costo a risorsa - Attività produttive e protezione dei dati personali informata è non più da ristrette elite. In una ricerca del 2001 Alan Westin individua in una quota alta (63% del campione intervistato, rispetto al 55% nel 1990) coloro che hanno una buona percezione del rischio privacy e sono quindi disponibili a permettere il trattamento di informazioni personali in cambio di servizi personalizzati, offerte e sconti solo se soddisfatti del grado di correttezza con cui queste informazioni sono trattate. Un restante 25% di campione viene ironicamente definito da Westin come composto di privacy fundamentalists, mentre la percentuale dei privacy unconcerned scende dal 20% del 1990 al 12%, appunto, del 2001. Ripetuto il sondaggio a novembre del 2001, dopo i gravi fatti dell’ 11 settembre, il numero dei privacy fundamentalists è salito al 34%, quelli dei privacy unconcerned è sceso all’ 8% (quello dei semplicemente “pragmatici” scende conseguentemente dal 63% a1 58 %). Siamo al punto più alto di evoluzione di idee, regole, dispositivi e procedure per rendere sicura la custodia dei dati personali. Ma siamo anche ad un punto in cui, mai come ora, si sono create le condizioni per condizionare contestualmente e negativamente i diritti della personalità di milioni di persone sull’intero pianeta. Vorremmo non accettare passivamente l’idea secondo cui l’integrazione in rete delle persone comporta un’inevitabile compressione della loro riservatezza. Al contrario, sulla base dell’esperienza alle nostre spalle - che comincia a farsi lunga - pensiamo che sia maturo il momento per un’ennesima svolta nella disciplina della privacy. Abbiamo attraversato due o tre generazioni di regole basate (la prima) sulla presenza di pochi elaboratori e su freni alla loro interconnessione, (la seconda) sulla tendenza delle leggi a dettagliare i principi di privacy in molti settori e (la terza) sulla semplificazione di adempimenti non vitali per concentrare l’attenzione sulle garanzie sostanziali, sulle privacy enhancing technologies e sui privacy audits. Cosa ci aspettiamo dalla privacy di quarta generazione ? Una combinazione di strumenti giuridici diversi, ma, anzitutto una privacy condivisa, una privacy orientata spontaneamente al rispetto della persona, concepita come una trave portante e non come un fardello. Non può essere altrimenti: i casi e le occasioni in cui numerosi cittadini sono coinvolti sono infiniti e siamo di fronte ad una vera e propria questione di massa. La semplice prospettiva di un passaggio dal marketing invasivo al permission marketing appare già modesta e insufficiente ancor prima di essersi affermata nel mercato. Vi chiediamo di scrivere assieme una ben altra pagina nella protezione dei dati, nella quale l’impresa assicuri un grado elevato ai diritti della persona per effetto di un nuovo sentire. Giovanni Buttarelli - Diritti fondamentali e libertà di iniziativa economica 59 Una pagina nella quale dovrebbe essere il mercato stesso, prima che il legislatore, a confinare nella patologia i casi in cui la privacy è assicurata solo quando interviene un reclamo, una richiesta di risarcimento del danno o una sanzione. Vi chiediamo di scrivere questa pagina sfruttando quel connotato propulsivo e creativo che è insito in ogni attività imprenditoriale. Il vostro mestiere è combinare i fattori della produzione per creare nuova ricchezza: usate meglio l’ingrediente privacy. Dobbiamo tutti rivalutare il valore della manifestazione di volontà dell’interessato, non banalizzarla o addirittura commercializzarla in cambio di sconti e gadget. Occorre soddisfare la legittima aspirazione di tutti gli utenti ad utilizzare di più la rete, ad essere curiosi nella navigazione e ad avere differenti gradi di solitudine e di socializzazione, senza essere per tutto ciò penalizzati. Chi tratta dati personali non ha di fronte oggetti, ma persone. Che sensazione vi darebbe accorgervi all’uscita di un centro commerciale che vi era stato attaccato alla schiena un cartello che indicava, di minuto in minuto, la lista dei negozi visitati, l’elenco dei prodotti guardati e acquistati, il tempo speso davanti ad una vetrina; sapere che questo cartello è stato copiato, vostro malgrado, da altri che vi hanno poi aggiunto altre considerazioni, valutazioni e notizie che vi riguardano? Penso che anche se vi sentiste perfetti sconosciuti nel centro commerciale non apprezzereste tutto ciò. Eppure è questo che accade in rete, dove è come se milioni di uomini sandwich fossero masticati da una minoranza che ingenera rassegnazione circa la possibilità di decidere se e come indossare quel cartello, cosa scriverci e a chi farlo eventualmente vedere. Se è vero che l’iniziativa economica ha come suo pendant il fattore-rischio dobbiamo anche essere più consapevoli che cresce il rischio di infortuni, contrazioni di mercato e di sostanziali fallimenti proprio a causa di erronee valutazioni del fattore privacy. Con le diverse clausole contrattuali-tipo sul trasferimento dei dati all’estero sono state valorizzate le garanzie per le persone fornite su base contrattuale: quante imprese, però, se ne avvalgono? Noi possiamo raccogliere ancora una volta la vostra domanda di avere regole certe, chiare e di facile applicazione. Lo vorremmo fare con la vostra collaborazione, visto che con la nuova generazione di codici deontologici potete costruire voi stessi alcune regole per stabilire quando un trattamento è legalmente lecito e corretto. Va raccolta anche la domanda di valutare preventivamente e in modo più approfondito l’impatto della disciplina della privacy: lo possiamo fare subito utilizzando meglio, in tutti i Paesi, lo stesso strumento delle audizioni e delle consultazioni pubbliche. 60 Da costo a risorsa - Attività produttive e protezione dei dati personali Adottando nuove best practices in materia di privacy vi rimarrebbe egualmente un ragionevole margine di utile economico e di convenienza ad iniziare e proseguire un’attività che si basi sull’utilizzo di dati personali. Così come, dopo 1’11 settembre dello scorso anno, abbiamo coniugato lo slogan “privacy e sicurezza non sono in antitesi” possiamo azzardarci a pensare che la privacy è compatibile con il profitto, anzi, che può essere un volano per il profitto. Basti pensare - per puro esempio - ai risparmi che le società che offrono servizi di telecomunicazione possono trarre nel non conservare per svariati anni miliardi e miliardi di dati di traffico telefonico. Può darsi che siano utili alcuni audit interni all’azienda, la formazione professionale, investimenti nella ricerca di tecnologie pulite, come pure certi meccanismi di certificazione. Assai più utile risulterebbe anche una prassi diffusa di studio dell’impatto sulla privacy, prima del lancio di un nuovo prodotto o servizio o di una metodologia di lavoro interna all’azienda. Occorre maggiore attenzione ai profili sostanziali della tutela, anziché solo agli adempimenti formali. Le risorse impiegate per la privacy customer satisfaction non sono mal utilizzate, specie a medio-lungo termine. Lo potranno dimostrare le riflessioni di questi due giorni sul danno all’immagine dell’impresa, sui costi derivanti da contenziosi, procedure amministrative e sanzionatorie, dal clima negativo che può determinarsi in azienda a seguito di un controllo occhiuto dell’uso del p.c., dalla ridotta fiducia del consumatore sulla correttezza dell’impresa, sulla sicurezza della rete e sui mille tranelli della democrazia elettronica. È di poche ore fa la notizia della seconda sentenza italiana di risarcimento del danno, successiva alla legge sulla privacy del 1996, che obbliga uno sportello bancario a rifondere circa 40 mila euro - determinati forfettariamente - a causa del solo dubbio che alcune informazioni pregiudizievoli custodite distrattamente presso uno sportello bancario siano state sbirciate dal pubblico in fila. Non è detto che una privacy più soft di quella che teorizziamo avvantaggi l’impresa: l’inchiesta sullo spamming di cui ha dato notizia lo scorso settembre il mensile italiano “Happy Web” ci dice ad esempio che nel 2001 solo le aziende italiane hanno speso ben 10 milioni di euro in connessione per scaricare dai propri computer la “spazzatura elettronica”. Ci dice che con questo trend, entro tre anni, saranno oltre 14 mila le spam e-mail che ciascun utente italiano riceverà in un anno. Alla domanda: “chi paga i costi di un elevato livello di privacy?”, ovvero “quanta parte dei costi ricade sul consumatore-utente?”, possiamo comunque replicare che con questa eventuale quota contributiva l’interessato si sottrae comunque ad una situazione deteriore. Potremmo infine chiederci perché mai, nel groviglio delle esenzioni, rottamazio- Giovanni Buttarelli - Diritti fondamentali e libertà di iniziativa economica 61 ni, detrazioni e sconti fiscali per le imprese non vi sia spazio per qualche incentivo per documentate iniziative, quanto meno di ricerca o di formazione professionale. Non pensiamo solo al dilemma divulgare dati “si”- divulgare dati “no”. Guardiamo anche ai benefici che l’impresa può trarre dalla circolazione di notizie esatte, pertinenti e aggiornate, private del “rumore” di un eccesso di notizie esuberanti. Riflettiamo anche, anche in sede pubblica, su altri nodi, ad esempio su alcuni riflessi negativi sulla privacy che possono derivare da interventi pubblici, pur doverosi, a tutela della concorrenza nel mercato. A questo punto l’avrete intuito: non siamo qui per nascondere o sottovalutare il tema “costi”. Che ci siano “costi” in questa materia lo riconosce espressamente la direttiva europea-madre sulla privacy, come pure, per implicito, la legge italiana in materia che, riguardo alle misure tecniche di sicurezza, sposa l’idea che è sensato obbligare le imprese a spendere in misure di sicurezza solo se tali misure, benché costose, sono al top dell’ evoluzione tecnologica. Stime incontrovertibili sui costi non sono disponibili e sono rapportate al genere di attività svolta e alle relative modalità, dal Paese in considerazione. Vanno infine storicizzate in base alle regole di volta in volta vigenti. Uno studio dell’Aston Business School del 1994 di stima dell’impatto della direttiva europea del 1995 ridimensionava le preoccupazioni formulate in ambienti privati. Successive stime hanno quantificato tali costi nel 2% circa della spesa complessiva edp. Quel che vogliamo verificare con voi è il margine di ricavo che deriva dai costi: quanto, cioè, si può essere ripagati dalla singolare opportunità che viene da questa necessità di tutelare diritti e libertà fondamentali. Sembra avere compreso questa opportunità la società EarthLink, nell’esperienza che Ann Cavoukian e Tyler J.Hamilton sintetizzano nel recente volume “Privacy PayOff ” di cui sembriamo oggi, mi rendo conto, mandanti. Ancor più sembra comprenderlo l’RBC Financial Group, istituzione finanziaria canadese, secondo i cui studi interni il tasso di privacy assicurato dal Gruppo contribuirebbe già oggi, nella misura del 7%, alle scelte del consumatore e, sempre per il 7%, al valore aggiunto dell’ organizzazione, sicché la banca stima già al 14% il contributo che la privacy può dare al marchio RBC. Per iniziare, non è poco. 62 Da costo a risorsa - Attività produttive e protezione dei dati personali Fundamental Rights and Freedom of Enterprise Giovanni Buttarelli (1) The debate among legal scholars concerning the relationship between freedom of enterprise and its limitations would appear to be outdated and no longer current in scope. Still, I decided to deal with this issue because I found that one could get some useful clues in respect of the Conference topics. I will start from the Italian situation and then expand the scope of my considerations to also take account of the issues related to Europe’s internal market and international data flows. Under Article 41 of Italy’s Constitution, freedom of enterprise by private entities is “free” and must not be carried out so as to be in conflict with “common good” or else in a way that may harm human freedom and dignity. It has been maintained that private economic enterprise should pursue not so much the individual market operator’s purpose, but rather a “common purpose” and therefore be focussed on achieving common good and human dignity. In a few cases, the Constitutional Court has provided its interpretation of “common good”, however no general, unified concept has been developed. In fact, “common good” is an indefinite, continuously evolving concept, to be adjusted depending on the specific circumstances, so much so that Massimo Severo Giannini believed that Article 41 was not to be regarded as one of the most “perspicuous” provisions of our Constitution. One thing can be said with a greater degree of certainty: terms such as “common good” and “human dignity” refer not so much to individual human goods, as to the fundamental values of human subjectivity and personality – which should not be kept separate. Therefore, provisions of this kind can afford, also in other countries, unified safeguards for fundamental human rights and freedoms rather than for individual components of such rights and freedoms. Our purpose today is not to argue for the primacy of public intervention over freedom of enterprise. Indeed, fundamental human rights and freedoms should be respected “a priori” by any entity exercising freedom of economic enterprise rights – such rights being also protected by the Constitution, although they cannot be easily traced back to the “fundamental principles” laid down in the first part of our Constitutional Charter. There are several representatives from major businesses in the audience today. (1) Italian Data Protection Authority Giovanni Buttarelli - Fundamental Rights and Freedom of Enterprise 63 Let me assure you that we are not going to ask you not to pursue gain in your activities – to become privacy “benefactors” and deliver social services, for which you should then be entitled to wages. However, you might pursue gain within a different framework. The market is not merely a place to exchange, produce and process goods. It also provides the framework within which to balance values and interests for the sake of respect. This balancing of interests should not be only performed ex post, i.e. by means of privacy laws that bring about “corrections” in respect of long-standing economic activities. Rather, such balancing should be a part of economic operators’ daily experience. However, market self-regulation is not a feasible option. If you have to do with the most intimate sphere of a person’s life – as is the case here - , the “minimum State” approach cannot be easily applied to the market. One might argue – by quoting Luigi Einaudi – that market can meet “demands” rather than “needs”. A possible objection to this argument would be that it is also necessary to meet needs that are not reflected by demands with the qualifications required by market – and that this is the case exactly with personal rights, which have not arisen with a view to their being marketed. This is even more so in the age of globalisation: indeed, we would have run the risk of globalising a lex mercatoria and jeopardising personal rights if no regulations applying to privacy had been devised such as those currently existing in Europe. In the past, the interests related to privacy could not be reconciled autonomously on the market. This accounts for the attempt made by privacy legislation to prevent citizens from being left a prey to market dynamics – for instance, by laying down the proportionality principle in processing personal data, which can override the data subject’s consent. The decisions adopted in Europe during the past two years concerning transborder data flows as well as the ongoing debate in Brussels regarding the safeguards that businesses can provide by means of binding corporate clauses testify to the effort made by the so-called European privacy watchdogs to take account of the new challenges posed by the European internal market in the light of Amsterdam Treaty, as well as of a fair competition strategy at world level. This is the commitment undertaken by 27 countries in 2000 with the “Charter of Venice”, which was adopted by the respective data protection supervisory authorities. Now that privacy rules have been partly harmonised at global level and are less related to compliance with bureaucratic requirements - being focussed on the substantive components of the relevant safeguards and encouraging a flexible mix of the different regulatory instruments, including codes of practice – it is high time for businesses to 64 Da costo a risorsa - Attività produttive e protezione dei dati personali view privacy in a new perspective, i.e. no longer as their counterpart. With the increased integration into the Information Society there is an upward trend in the appreciation of the need to respect privacy – which is shared by a considerable portion of the public opinion rather than by a small group of experts. According to a 2001 survey carried out by Prof. Alan Westin, over 63% of the respondents (compared with 55% of 1990) had a good perception of privacy risks and were ready to allow processing of their personal data in exchange for customised services, offers and discounts only if they were satisfied that their data would be processed in a fair manner. A further 25% of the respondents were ironically termed “privacy fundamentalists” by Prof. Westin, whilst the percentage of “privacy unconcerned” fell from 20% of 1990 to 12% of 2001. When this survey was repeated in November 2001, after the 9/11 events, the percentage of “privacy fundamentalists” rose to 34% whilst privacy unconcerned made up only 8% of the sample and “pragmatists” fell consequently from 63% to 58%. We have attained a peak level in the development of concepts, rules, provisions and procedures to achieve secure personal data retention. However, we are also faced with an unprecedented situation, providing the opportunity to simultaneously jeopardise the personal rights of millions of people all over the world. We would not like to passively acquiesce in the concept according to which network integration of individuals inevitably entails limitations on individuals’ privacy. In fact, based on our – by now long-term – experience, we think it is high time that a new page should be turned in the history of privacy regulations. We have gone through two or three generations of rules that were focussed firstly on the presence of very few computers and the imposition of limitations on their interconnection, secondly on the legislative trend to detail privacy principles as applying to several sectors, and thirdly, on simplification of non-essential requirements and the attempt at highlighting basic safeguards including privacy enhancing technologies and privacy audits. What shall we expect from fourth-generation privacy rules? That they are made up of a mix of different legal instruments – however, we would expect that privacy regulations could be shared, could be spontaneously focussed on respect for individuals, could be considered a pillar rather than a burden. There is no possible alternative: there are endless cases involving citizens, so much so that a veritable public issue is arising. The mere shift from invasive to permission marketing would appear to provide a modest, insufficient response even apart from its actual implementation on the market. We would like you to write, jointly with us, a totally different chapter in the history of data protection – in which businesses do ensure a high level of protection Giovanni Buttarelli - Fundamental Rights and Freedom of Enterprise 65 for personal rights because of their taking a new stance. In this chapter, it should be market itself, rather than the law, that marks the cases in which privacy is only ensured following either a complaint, a claim for damages or a fine with the brand of abnormality. We would like you to write this chapter by taking advantage of the propelling force and the creative spirit that are inherent in all entrepreneurial activities. You are masters in combining production factors to create value: why not use the privacy ingredient better? We should all re-consider the value of the manifestation of a data subject’s will – without turning it into a trivial circumstance, or maybe bartering it for discounts and gadgets. It is necessary to fulfil users’ legitimate expectations to use the Net more, navigate following their curiosity and be able to choose among different degrees of isolation and socialisation – without being in any way disadvantaged. In processing personal data you are dealing with people rather than with objects. How would you feel if you realized on leaving a shopping mall that a plate had been tagged to your back in which the list of the shops you visited, the products you had examined and purchased and the time spent before each shop-window were duly noted minute by minute, and if you knew that this plate had been copied against your will by others, who might have added further considerations, judgments and information concerning yourself? I think that you would not be happy with all this, even though you felt that nobody knew you within the shopping mall. Still, this is what happens on the Net, where it is as if millions of sandwich men were chewed by a minority that breeds resignation to the impossibility of deciding whether and how to carry that plate, what should be written on it and who could possibly have a look at it. If it is a fact that economic enterprise is fraught with risk, one should also be aware of the fact that the risk of accidents, market contraction and failure is actually increased by misjudging the privacy factor. The standard contractual clauses for transborder data flows have enhanced the value of safeguards for individuals based on contractual agreements – however, how many businesses are actually making use of these clauses? Again, we are ready to meet your demand for clear-cut, definite, easy-to-apply rules. We would like to do so with your co-operation, since the new generation of codes of practice can allow you to set forth rules in order to assess whether processing operations are lawful and fair. It is also necessary to take account of the request to assess the privacy impact in advance more precisely; this can be done by making a better use, in all countries, 66 Da costo a risorsa - Attività produttive e protezione dei dati personali of hearings and public consultation. If you adopt new best practices applying to privacy you could still count on a reasonable profit margin in starting and maintaining an activity based on the use of personal data. After the 9/11 events, we chose to pursue the principle that “privacy and security are not in conflict”; by the same token, we may now be as daring as to say that privacy is compatible with profit – indeed, it can become a profit lever. Only think, for instance, of the cost reduction that can be achieved by TLC companies if they are not required to store billions of telephone traffic data for several years. Perhaps certain internal audit mechanisms, vocational training, and investments to develop non-polluting technologies as well as certification initiatives are useful for the above purposes. However, the widespread practice of assessing the privacy impact prior to launching a new product or service or implementing a new production method inside a business would be probably more useful. Greater attention is to be paid to substantive safeguards rather than to merely formal requirements. The resources deployed for privacy customer satisfaction purposes are not used improperly, especially in the medium to long term. This will be shown by the considerations made during these two days concerning the harm to business image, the costs resulting from litigation, administrative and sanctioning procedures, the negative effects that may be produced inside a business by intrusive controls over the use made of PCs and by consumers’ low confidence in business fairness, network security and the tricky procedures of electronic democracy. The news of the second decision by an Italian court awarding damages pursuant to the DPA of 1996 was broadcast a few hours ago. In this case, a bank agency will have to pay about 40,000 euros as a lump sum on account of the mere possibility that some sensitive information kept negligently at a bank counter may have been glimpsed by other customers waiting to be served. It is by no means certain that a softer privacy approach will be beneficial for businesses. Indeed, based on the findings of a spamming survey that was carried out by an Italian journal last September, it appears that over 10 million euros were spent by Italian businesses in 2001 to download “electronic garbage” on their own computers. Based on this trend, there will be over 14,000 spam e-mails received yearly by each Italian user within three years. If you ask “who pays the costs of a high privacy level?” or maybe “what portion of the costs is to be borne by users-consumers?”, the answer should be that by paying this possible contribution data subjects can anyhow escape a definitely worse situation. Finally, one might wonder why there should not be the possibility to support initiatives undertaken by businesses – at least as regards research activities and/or Giovanni Buttarelli - Fundamental Rights and Freedom of Enterprise 67 vocational training in this sector – given the jumble of exemptions, end-of-life incentives, deductions and tax reductions that have been devised for businesses. We should not only think of the disclosure/non-disclosure dilemma as regards personal data. We should also consider the advantages for businesses resulting from circulation of accurate, relevant, updated information without the “noise” caused by excess data. Public bodies should perhaps consider other issues, such as the possible negative effects produced on privacy by public measures that are taken to safeguard market competition. As you may have already guessed, it is not our intention to downplay or underestimate the “costs” issue. That there are “costs” involved in dealing with this subject matter, it is expressly acknowledged by the European privacy directive as well as – implicitly – by the Italian DP Act. Indeed, as regards technical security measures, our Act supports the view that it is sensible to oblige businesses to invest in implementing such measures - expensive though they may be – only if they are based on state-of-the-art technology. There is no such thing as an unquestionable cost estimate, and anyhow such estimates are dependent on the features of the activity that is carried out and the relevant arrangements as well as on the country considered. Moreover, they must be placed in the relevant context based on the rules that apply to the specific case. According to a survey carried out by the Aston Business School in 1994 to estimate the impact of the 1995 privacy directive, the concerns raised by private entities were excessive. Subsequent surveys put the relevant costs at about 2% of the overall EDP expenditure. We would like to assess, with your help, the profit margin resulting from costs – i.e., how much one can benefit from the peculiar opportunity provided by the need to protect fundamental rights and freedoms. This is what has been apparently realised by EarthLink, as described by Ann Cavoukian and Tyler J. Hamilton in their recently published book on the “Privacy PayOff ” – which actually would seem to have been commissioned by us here. The RBC Financial Group, a Canadian financial group, would appear to have realised this if possible to a greater extent. Based on their in-house surveys, the privacy rate afforded by the Group is said to contribute by 7% to the decisions made by consumers, and by another 7% to the Group’s added value – therefore, the contribution provided by privacy to the RBC trademark is estimated to already total 14%. This is really not too bad as a start. 68 Da costo a risorsa - Attività produttive e protezione dei dati personali The Effectiveness of Privacy Protection in Economic Systems Orson Swindle (1) General Opening Good Morning. Thank you, Mr. Rasi. And, let me also thank Professor Rodotá and the Italian Garante for the invitation to participate in this important privacy dialogue. In particular, I want to commend the conference’s review of privacy protection in the context of: - consumer expectations, - costs and benefits to businesses and governments, - and effects on economies and the global marketplace. Disclaimer/FTC I am one of five Commissioners at the Federal Trade Commission. So as I begin, let me explain that my remarks today are my own. They do not necessarily represent the views of the Federal Trade Commission or of any other individual Commissioner. Road Map of My Remarks My remarks today will principally focus on our experience at the Federal Trade Commission in helping to shape privacy protection in the marketplace through the use of: - our enforcement authority against unfair or deceptive acts or practices in or affecting commerce; and - our education and outreach to consumers and businesses. At the FTC, our experience supports the notion that effective privacy protection is best ensured by focusing enforcement action against the misuse of information and the harmful consequences of such misuse. Let me suggest a premise for consideration: effective privacy practices are good for business; the free flow of information is good for consumers. Or said another way by a Member of the US Congress: - “The ideas that privacy can actually be good for business and that infor(1) Commissioner, US Federal Trade Commission Orson Swindle - The Effectiveness of Privacy Protection in Economic Systems 69 mation sharing can actually be good for consumers are the “two dirty little secrets” of the privacy issue.” [Representative Diana DeGette (D-Colorado)] Information Economy What are consumer’s privacy expectations in an Information Economy? - There is no question that consumers are deeply concerned about the privacy of their personal information. - And, there is no question that a lot of information is being collected and exchanged offline and online in a networked environment where we are all increasingly interconnected. - While consumers want the conveniences, services and product choices that are made possible through new mediums and information technologies, there are questions about how consumer information is being used and who is using it. These are questions of importance to Americans, and we know that they are concerns for individuals, businesses, and governments around the world. For this reason, consumer privacy and consumer information security are two of the Federal Trade Commission’s highest priorities. FTC’s Framework For Analyzing Privacy Issues Let me begin by describing to you the framework we use to analyze privacy issues. - The availability of information confers many benefits in our informationdriven economy. - The miracle of instant credit helps to drive the American economy - and at automobile dealerships, it allows Americans to drive away in new car - Consumers can shop online 24 hours a day/7 days a week. - These are benefits that consumers want and enjoy. - At the same time, consumers are clearly concerned about their privacy. - We believe that what consumers are most concerned about is that their information, once collected, may be misused in ways that harm them or disrupt their daily lives. - These kinds of negative consequences drive consumer concerns about privacy. - At the FTC, we think the most important part of any privacy agenda is stopping or minimizing the kinds of practices that can cause those negative consequences. Consumers want protection from: 70 Da costo a risorsa - Attività produttive e protezione dei dati personali physical consequences - Consumers want to restrict availability of personal information, particularly for safety reasons [potential harm to children, stalking]; • economic consequences - Consumers fear harmful economic consequences ranging from improper denial of credit, even a job, or, in extreme circumstances, identity theft; and • unwanted intrusions - Consumers have had enough of what I call “nuisance” intrusions to their privacy from activities like unsolicited spam and unwanted telemarketing calls. - Existing laws in the US, which target the need for privacy in different information sectors (financial, children, medical, etc.) areas through an industry sectoral approach, allow us to address harmful consequences and enforce privacy promises. - Our broad enforcement authority under Section 5 of the Federal Trade Commission Act to deter “unfair or deceptive acts or practices in or affecting commerce” assists us in bringing cases that enforce privacy promises made to consumers. This includes the promises made by US companies that self-certify compliance with privacy principles under the US-EU Safe Harbor framework. - So, we focus on the consequences of information use, good or bad. - When there are bad consequences from information uses, we look for ways to correct the problems that may result. We believe that this framework of analyzing privacy issues is highly effective in the United States for: - influencing the expectations and behavior of consumers and businesses in the marketplace, and - representing a pragmatic and efficient use of government resources by directing our enforcement efforts at the misuse of personal information that can actually cause harm to consumers. • The FTC Privacy Agenda In October 2001, FTC Chairman Timothy Muris announced an ambitious privacy agenda that focused on vigorous enforcement of US laws and privacy promises to consumers. We have doubled the number of staff dedicated to privacy enforcement and have brought major cases and educational efforts forward. During the past year, - More than 30 cases were brought or settled, involving privacy and securi- Orson Swindle - The Effectiveness of Privacy Protection in Economic Systems 71 ty, children’s online privacy protection, pretexting, the Fair Credit Reporting Act, abusive telemarketing practices, and spam. - There are ongoing efforts to stop identity theft through collecting and analyzing consumer complaints, criminal referrals, education and training; - We have conducted public workshops on financial privacy notices and security; - There has been activity in rulemakings on telemarketing (pending Telemarketing Sales Rule) and security of financial information;(2) and - We have conducted more than 15 consumer and business education initiatives. We have ambitious plans for this coming year that further emphasize consumer information security, anti-spam efforts, and a federal Do-Not-Call List option for consumers who choose not to receive certain telemarketing contacts. Case Discussion The FTC has placed particular emphasis on the relationship between privacy and security - which are really two sides of the same coin. Both have enormous effects on consumer trust and confidence. Without trust and confidence the full potential of information technology will not be realized. The most recent FTC privacy cases underscore the basic principle that privacy promises are important and must be honored. This is a test. National Research Center for College and University Admissions and American Student List - Last month, we announced settlements with two companies: National Research enter for College and University Admissions and American Student List. These cases involved the offline collection of sensitive personal information from high school students – such as name, date of birth, and religious and ethnic affiliation. (2) The FTC promulgated a “Safeguards Rule” to implement the security requirements set forth in the Gramm-Leach-Bliley Act. The Rule, which becomes effective in May, 2003, requires financial institutions under FTC jurisdiction to secure customer records and information. As part of its plan, each financial institution must: 1. designate one or more employees to coordinate the safeguards; 2. identify and assess the risks to customer information in each relevant area of the company's operation, and evaluate the effectiveness of the current safeguards for controlling these risks; 3. design and implement a safeguards program, and regularly monitor and test it; 4. select appropriate service providers and contract with them to implement safeguards; and 5. evaluate and adjust the program in light of relevant circumstances, including changes in the firm's business arrangements or operations, or the results of testing and monitoring of safeguards. 72 Da costo a risorsa - Attività produttive e protezione dei dati personali - The two companies market a student survey to high school teachers and guidance counselors asking them to administer the survey during class time. the offline collection of sensitive personal information from high school students – such as name, date of birth, and religious and ethnic affiliation. - The two companies market a student survey to high school teachers and guidance counselors asking them to administer the survey during class time. - The privacy statement on the survey claimed that students’ data “is used by colleges, universities and other organizations to assist students and their families by providing them with valuable information.” - While using this information to match students to colleges might benefit students and their parents, regrettably the companies also shared the information with commercial marketers. - Contrary to their claim, substantial funding to finance the survey came from commercial entities, including American Student List, one of the defendants. - As a result of our action, the companies are prohibited from misrepresenting their privacy policy. If they sell the information for any non-educationrelated marketing purpose, they must disclose that fact as well as the types of entities to whom they will sell the information. And, previously-collected information may be used only for education-related purposes. In addition to looking at privacy promises both on and off-line (whatever the medium), we are also focusing great attention on information and network security. The Eli Lilly Case focuses on a firm’s responsibility for the security of information - First, a brief review of what happened in our Eli Lilly case: • The privacy promise: Ely Lilly promised to keep consumers’ information confidential and secure • The privacy problem: Consumers using prescription drugs for depression subscribed to a reminder email service offered at Lilly’s website. - When Eli Lilly terminated the service, the email notifying subscribers revealed the subscribers’ email addresses – over 600 in all. - The reason for the privacy problem was Lilly’s inadequate security - Our complaint alleged that Eli Lilly’s failure to take appropriate steps to ensure the security of consumers’ information – in light of the sensitivity of the information – violated the FTC Act - In Eli Lilly, there was an inadvertent breach that led to the disclosure of sensitive personal information. Orson Swindle - The Effectiveness of Privacy Protection in Economic Systems 73 Consequences can also be “potential” harm, rather than actual or realized harm. In other words, we do not have to wait for a breach to take action. The Microsoft Case focuses on keeping promises and potential harm - The Microsoft Passport System is an online authentication service. Microsoft has 200 million e-mail accounts. It’s Passport Wallet has 2 million accounts. - Microsoft promised that it maintained a high level of security by taking sufficient measures reasonable and appropriate under the circumstances. - To our knowledge, there was no security breach which compromised consumer information. - However, we still alleged Microsoft failed to or could not deliver on its privacy and security promises. - In particular, we alleged that Microsoft did not maintain a high level of security because it failed to have systems in place to prevent or detect unauthorized access; to monitor for potential vulnerabilities; and to record and retain system information sufficient to perform security audits and investigations. - The Remedy: Microsoft must implement an information security program and submit to bi-annual audits by an independent third-party for many the next 20 years. - Besides failing to deliver on its security promises, the Microsoft complaint alleged other privacy violations: • Collection of sign-in history was not disclosed • Microsoft erroneously promised parents that they could control information collected about their children for Kids Passport service. - The FTC’s Order requires Microsoft to institute an information security program that takes into account the sensitivity of the information collected and an ongoing assessment of reasonably foreseeable risks and threats. It also requires Microsoft to comply with its privacy promises. Other Privacy and Security Concerns Deceptive Spam Within the past month, the Federal Trade Commission and 12 federal, state, and local law enforcement and consumer protection agencies announced a fourpart initiative launched to fight deceptive spam. 74 Da costo a risorsa - Attività produttive e protezione dei dati personali - The centerpiece of the initiative is a group of more than 30 law enforcement actions, including three FTC complaints and four settlements with Spammers caught in an FTC sting. In addition, 10 law enforcement agencies signed letters to approximately 100 Spammers warning them that their Spam appeared to be illegal and that action against them could be taken if they continued their fraudulent scams. - Ten agencies participated in the FTC’s “Spam Harvest,” an initiative designed to test which actions consumers take online that put them most at risk for receiving spam. - The initiative also developed consumer education material, including a publication, “E-mail Address Harvesting: How Spammers Reap What You Sow” (http://www.ftc.gov/bcp/menu-internet.htm). This material uses the lessons learned from the Spam Harvest to provide tips to consumers who want to minimize their risk of receiving spam. Consumer and Business Education on Privacy and Information Security Security Workshop and Education Campaign - Last May, we held a public workshop to address consumer information security issues. The workshop discussion highlighted one very important – and timely – point: that good information security is everyone’s responsibility: government, industry, and individual consumers. In addition, failure to implement good information security practices has potentially devastating consequences at all levels of our economy. Culture of Security - Another point that participants emphasized was the role that the FTC should play in educating consumers and businesses in creating a “culture of security.” - The FTC’s Information Security Education Campaign was launched in September. The goal of this campaign is to focus on the critical role information security plays in all sectors of our economy. The campaign comes complete with a dedicated website (www.ftc.gov/infosecurity) and it features our very own: Dewie The e-Turtle (We call this taking a hard shell approach to security). - The website highlights the recently revised OECD Guidelines for the Security of Information Systems and Networks. The FTC led the US delega- Orson Swindle - The Effectiveness of Privacy Protection in Economic Systems 75 tion in the OECD Guidelines review. Our team consisted of the Departments of Commerce, State, Justice and Treasury. We are constantly disseminating information throughout our society about how to practically implement a “culture of security”. Closing The FTC’s framework for approaching privacy issues is to focus on the adverse consequences caused by misrepresentations and misuse of consumer information and to enforce existing US privacy laws to ensure that privacy promises are kept. I believe this approach helps curb market abuses and fosters respect for consumer privacy. We vigorously encourage corporate leadership, investment and innovation to enhance information privacy and security practices. - I firmly believe that the private sector is best equipped, motivated and capable of solving most of our concerns. - I believe a combination of responsible self-regulation, market pressures, an informed public, government encouragement, and vigorous law enforcement is the best path to better solutions rather than burdensome and most likely ineffective government regulation. - Although being an advocate for industry solutions for privacy and security, I never fail to remind industry leaders that,“Either you lead and make responsible information privacy and security practices a part of your corporate culture, or I will assure you there will be an FTC in your future.” In the United States, we see the results of our public and private sector partnership efforts in terms of increased compliance with privacy policies and increased attention to privacy and information security issues on the part of corporate leadership. I believe that in the United States, the best means of protecting consumer privacy without unduly burdening e-commerce (or commerce, in general) has been a combination of (1) consumer awareness, (2) leadership and self-regulation by the private sector, and (3) aggressive government enforcement of existing law. This approach is flexible enough to respond to changes in technology and to the tremendous insights that we are gaining from the continuing dialogue among government, industry, and consumers on privacy issues. To that end, the FTC and I personally have been actively working with industry members, consumer groups, and others to address privacy concerns. A simple truth: Consumers expect privacy protection - and, equally important firms realize that it is to their competitive advantage to respond to consumer expectations. As public awareness of privacy issues has grown, market forces have definitely come into play. For example, last year a Progress and Freedom Foundation study in- 76 Da costo a risorsa - Attività produttive e protezione dei dati personali dicated that the most frequently visited US websites have clearly recognized that information management policies and privacy practices are necessary parts of everyday business on the Internet. In addition, recent years’ progress in the development of privacy protection tools is encouraging. Firms are making significant investments in time, ingenuity, resources, and money to best solve and minimize privacy concerns. These investments and industry leadership and commitment need to continue. I agree with US House of Representatives Energy and Commerce Committee Chairman Billy Tauzin (R-Louisiana), who said that “ … the real and perceived fears surrounding privacy need to be addressed.” “… Before we can have great debates of how to fix the current situation, we must understand the current situation and the constraints we are bound by ... Before we add new law, we must examine the old, as the heavy hand of government often takes a broad swipe when invited in.” This is the approach we have been taking at the FTC. We have increased our enforcement of existing law by using our broad authority to enforce privacy promises made to consumers. At the same time, we are constantly assessing whether there are areas of concern in need of greater enforcement authority. Yet, we have been guarded in approaching the issue of whether broad new privacy legislation is necessary. We must all keep the dialogue going in high-quality and professional forums such as this one in Rome. Working together, domestically and on a cross-border basis, I believe that we can effectively address the misuse of personal information and protect consumers from harm, and at the same time, encourage innovative solutions to meet consumer expectations in the marketplace. Orson Swindle - The Effectiveness of Privacy Protection in Economic Systems 77 Balancing of Interests Amitai Etzioni (1) Before we lay a glove on our individual rights, at the heart of a free society, we must assess the scope and nature of the threats to our safety. These can be readily overstated. Thus, the danger of dirty bombs has been vastly exaggerated; a good part of their exposure can be washed off with soap and water. The bomb’s main effect is panic, which is best curtailed by expanding public education, not by trimming rights. Before we feel cornered by a worldwide conspiracy, we ought to note that very different groups - including Chechnyan freedom fighters, Columbian drug dealers, and Philippine kidnappers - have been spun together into a global terrorist network by the United States. Such overstatements can readily lead us to tolerate unduly repressive policies. Nevertheless, a cautious assessment finds thousands of Islamic extremists openly declaring their intention to harm the free world, especially the Big Satan (the United States); the production of various kinds of weapons of mass destruction by states known to have collaborated with terrorists in the past; and poor control of weapons, including miniature nuclear weapons and biological arms, in former communist countries. All of this calls for stronger safety measures. True, so far nations other than the United States have not been a prime target of Islamic terrorists, but all free countries have good reasons to stand by their major ally and refuse to serve as launching pads for attacks on it, as to some extent, Hamburg and Montreal have been. Nor can a nation assume that it is immune from terrorist attacks, as we witnessed, for instance, when the Armed Islamic Group of Algeria planted a series of bombs in rail stations in France in the mid-1990s. The most welcome new safety measures are those that do not entail curbing rights. These include reinforcing cockpit doors in airplanes, providing pilots with stun guns, and training flight attendants in self-defense, to name just a few. Refusing to allow people who are suspected of being terrorists entry into one’s country violates no rights; obtaining a visa is a privilege a nation accords visitors, not a right anyone commands. Insisting that airlines provide the names of passengers to public authorities before they land is fully acceptable for the same basic reason. Arguably, the same holds for smart cards, in effect, voluntary ID cards, of the kind used in Schiphol airport, which allow vetted travelers to zoom through lines, enabling public authorities to focus their attention on the rest. X-raying containers imported from overseas might well also qualify. (These last two items could raise (1) George Washington University – Usa 78 Da costo a risorsa - Attività produttive e protezione dei dati personali some privacy concerns, if not properly introduced and supervised.) When we must turn to trade-offs between rights and security (which cannot be fully avoided), a mini-max approach should be the guiding principle. Measures that entail a minimum (at worst, a low) level of violation of rights and, at the same time, greatly (at least significantly) enhance our security should be tolerated; measures that provide substantial intrusion and add little safety should be avoided. Those that fall in-between should be introduced only when threats are high and must be particularly closely monitored. Because this principle addresses the core of the question at hand, and the devil of unnecessarily violating rights or not providing essential security lies in the details, several examples are provided using the mini-max criterion just discussed. Note, though, that this is but an illustrative list, and not an exhaustive one. Moreover, one may disagree about the details and yet buy into the minimax criterion. Mass detention (not to mention deportation) of citizens based on their ethnicity or religion, say those of Pakistani origin or all Muslims - the way Japanese Americans were detained during World War II - constitutes a gross violation of the individual rights of many thousands of innocent people, while adding precious little to national security. Questioning hundreds of thousands of immigrants, just because of they are of Arab origin, as the Fbi is doing, has a similar, highly objectionable profile. Cameras in public spaces may be justified, but certainly not keeping records of the movements of one and all, especially if that information is available for users other than those who fight terrorists. Screening the e-mail messages of all citizens to find those of terrorists is another bad case in point, as is indiscriminate analysis of credit card records to look for unusual purchase patterns. In short, treating everyone as if they were terrorists until proven innocent constitutes a maximum violation of rights. Furthermore, these same measures provide little, if any, security. Actually, they may set it back by cluttering the system and draining resources. Similarly, mobilizing all citizens-especially mailmen, taxi drivers, and truckers—to act as the eyes and ears of public authorities may not constitute a technical violation of anyone=s rights, but it will make people suspicious of each other, undermine the social fabric, and flood authorities with useless tips and malicious gossip. It will hide the terrorists needles we need to find in enormous, government-made haystacks. In contrast, roving wiretaps introduced in the Usa Patriot Act meet the criterion of minimum intrusion and make a significant contribution to public safety. Wiretaps of any kind are approved only after public authorities have presented evidence to a magistrate that there is good reason to suspect that a specific person is a terrorist (or other kind of criminal). The level of evidence required is quite high, reflected in the fact that rather few such wiretaps were authorized before 9/11. Indeed, in the U.S. the standards were set so high that Fbi, whose agents were keen to search the Amitai Etzioni - Balancing of Interests 79 computer of Zacarias Moussaoui (believed to be the 20th hijacker), did not even bother to ask for permission. Most damaging to security is that before 9/11, when taps were authorized, they were limited to one specific phone. A new feature that was added after 9/11 is that, if and when permission to tap is granted, it encompasses all of the phones the same suspect uses (hence the term “roving”). Roving wiretaps are still minimally intrusive because they can be used only against those people that authorities have been able to convince a court are suspects, and information gathered inadvertently about others who are overheard must be suppressed. Other new measures that meet the criterion of minimum intrusion and significant contribution to security include improving the cooperation and collaboration between agencies that deal with suspects once they enter a country (MI-5 and the Fbi) and those that follow them overseas (MI-6 and the Cia), modernizing the communications and computer systems of agencies involved in national security, hardening the domes of nuclear plants, and protecting our numerous computer systems from cyber-attacks using various new software and audit trails. In addition, all new measures should be examined to establish whether one could find ways to reduce the conflict between rights and security. For instance, security requires that suspects on trial are prevented from finding out the identity of agents planted in their terrorist cells and those of their own who turned them in, as well as the specific ways information about them was gathered. However, all suspects should be able to choose from a list of lawyers who have security clearance the one they wish to join their defense team. This lawyer could establish whether the claims the government is making are indeed supported by the classified information. To help ensure that all safety measures will be used legitimately, accountability must be expanded as the power of public authorities is increased. Such heightened oversight should not be limited to members of the executive branch of the government, including the Inspector Generals. The staff and oversight powers of select committees of members of Parliament or Congress should be expanded. Barriers that prevent the courts and the fourth estate from doing their job in the name of national security should be particularly carefully scrutinized. If all these layers of accountability act vigorously, excesses - hard to fully avoid - will come to light quickly and will be countered before they become pervasive. Some argue that you simply cannot trust the government. Hence, it is best not to allow the fox into the citizen coop in the first place, rather than try to muzzle it once it is given free range. If one distrusts government that much, one must rush to act to change it, rather than try to prevent it from adopting necessary safety measures. At the same time, it must be noted that the surest way to pave the road for demagogues to usher in a totalitarian government is to prevent free soci- 80 Da costo a risorsa - Attività produttive e protezione dei dati personali eties from taking effective measurements required to provide the people with elementary safety and security. Ultimately, the question of trading rights for safety cannot be addressed outside time and place, disregarding history and society. Thus, one may strongly object to extending the power of an oppressive government, such as that of Singapore, which one reckons is already wildly excessive. At the same time, one may recognize that before 9/11 the United States did not have many of the safety measures that the U.K. introduced following its earlier experiences with I.R.A. terrorists. Or, that after 9/11 the US went way overboard, especially by holding people in detention for indeterminate periods, without charging them with any crimes or according them access to attorneys. Measures that provide what might be called collateral gains are especially welcome. These are measures that make for better government or society-whether or not they work to prevent future terrorist attacks. Training thousands of volunteers to act as “first responders” - to assist firefighters, rescuers, and medical personnel will help cope with natural and manmade disasters. Shoring up the public health system to deal with bioterrorism, developing a more effective public health reporting system, increasing the capacity of emergency rooms, and improving the working conditions of nurses in order to attract more people into the profession are all salutary improvements, even if no additional terrorist attack ever takes place. Last but not least, in this area, as in many others, prevention is the best treatment. Terrorism has many complex causes. Hence, to suggest that the West should work much more to reduce poverty and injustice-forgive the debt of the poorest nations, provide free drugs to those infected with HIV, and quadruple foreign aid - although justified in its own right, will not eliminate terrorism. The same holds for the suggestion that the West should withdraw its support from authoritarian governments. We must be willing to acknowledge that a major reason strongly religious people become terrorists is because they view our free way of life as offensively permissive, morally vacuous, and dedicated to goods instead of God. Nevertheless, an important element of a long term drive to deal with the causes of terrorism must include support by free societies for the forces of reform in nations that breed or support terrorism, for instance in Iran. Engaging nations such as North Korea in trade and encouraging student exchanges and tourism rather than hampering it will work better than hostile isolation. Support for the worldwide movement of women’s rights will appeal to women, especially young ones, in large parts of the Islamic world. In short, the more we bring liberty and individual rights to other people, the more we foster the social, economic, and political conditions in which open, democratic societies may evolve - the less we will have to trade our rights for enhanced safety. Amitai Etzioni - Balancing of Interests 81 La tutela dei dati personali in una realtà multinazionale Umberto Paolucci (1) Vorrei usare il mio tempo essenzialmente su tre punti. Il primo è il momento attuale nel quale il mondo dell’Information Technology si trova. Il secondo è quello che riguarda la necessità di avere un approccio molto interconnesso e globale fra i temi della sicurezza e quello della privacy, che non sono così antitetici come spesso si sente dire. E il terzo è quello della nostra esperienza aziendale. Questi sono i tre temi nei quali vorrei spendere i minuti a mia disposizione. Il momento tecnologico. Un momento nel quale noi possiamo davvero essere molto ottimisti, in ragione della decisione da parte dei grandi fornitori di tecnologia di base di mettersi d’accordo su alcuni standard di rappresentazione dei contenuti della rete, in particolare sull’ uso di Xml e sull’ interoperabilità dei Web services, questi componenti, questi strumenti che permettono al software di lavorare davvero insieme e che permettono ai dati di essere usati in maniera globale, rendendo internet una risorsa programmabile. Quindi non un insieme di tante isole separate: il software di una generazione, di un’azienda, pensato per fare un certo lavoro, viene esteso a lavorare anche con altri software di altre aziende pensati con altri obiettivi. Quindi possiamo ora mettere insieme dei mondi che non erano nati per stare insieme con degli strati di compatibilità che nascono dai Web Services. Questa è una grande promessa che apre uno spazio applicativo enorme. L’hardware sottostante, con il quale noi abbiamo a che fare quando lavoriamo sul software, continua a mantenere la promessa di raddoppio delle prestazioni ogni 18 mesi per quanto riguarda i processori, le memorie. Vi è addirittura un fattore tre per quando riguarda la larghezza di banda, come la fibra che ci arriva in azienda e nelle case, e sempre un fattore 3 anche per quanto riguarda la capacità dei dischi, sempre ogni 18 mesi. Tutta questa gamma raffinata di monitor, di schermi grandissimi che ci avvolgono o piccolissimi che ci portiamo in tasca, con grande capacità di risoluzione. Tutto questo ci dà delle possibilità di creare dei nuovi livelli di semplicità con il software, e questo vuol dire avere del software che ci potrà capire nel nostro modo naturale di esprimerci, nel nostro linguaggio naturale, scritto, parlato un software che ne interpreta le possibili ambiguità e decide il senso più giusto di ogni frase. Il Tablet PC, che è sul mercato da un mese, è un grande passo avanti in questa direzione, mette insieme il mondo della scrittura con il mondo formale del testo, con i caratteri di testo cosi’ come sono gestiti dai computer. (1) Vice Presidente Microsoft Corporation 82 Da costo a risorsa - Attività produttive e protezione dei dati personali Il grande tema dell’usabilità, quindi poter parlare, lavorare con queste macchine in una maniera che ci è connaturale, anche risolvendo problemi di coloro che ne sarebbero esclusi per motivi di handicap, è un obiettivo di cui dobbiamo tenere conto. Gli oggetti che ci portiamo dietro, per esempio questa legge di cui vi parlavo prima di raddoppio delle prestazioni ogni 18 mesi, alla fine fa sì che non ci siano solo macchine potentissime nella fascia alta, ma anche macchine particolarmente raffinate e poco costose nella fascia bassa con componenti di pochi dollari che ci portiamo dietro. Abbiamo così un assortimento di oggettistica la quale finalmente può mantenere la promessa di sincronizzarsi da sé, di andar d’accordo con se stessa: il mio telefono è sincronizzato con il mio pocket pc o con il mio pc e il mio pc è sincronizzato con la rete. Quindi un universo che lavora davvero per noi. Questo è molto pratico e le aziende stanno utilizzando questo sistema per ridisegnarsi, rendendo dei processi che prima erano analogici, cioè basati su passaggi cartacei o su interventi manuali anche di basso livello, a processi digitali, ai quali veramente la tecnologia dà una mano. Questa maggiore pervasività per la tecnologia è positiva: vuol dire grande opportunità, vuol dire maggiori opportunita’ per le persone, vuol dire però maggiore vulnerabilità. Vuol dire un grande rischio. Il rischio è che se le persone non si fidano non possono contare veramente sull’affidabilità degli oggetti con cui hanno a che fare, tutto questo che ho appena finito di descrivere non succede, ci fermiamo per mancanza di trust, di confidence in questo universo che di fatto è complesso e del quale dobbiamo nascondere la complessità quando la presentiamo agli utenti finali. La complessità dobbiamo delegarla al software, non alle persone. I temi di cui vorrei parlare: ho toccato rapidamente lo scenario tecnologico pertinente al nostro lavoro di oggi. Trustworthy computing è l’iniziativa che noi abbiamo definito come grande priorità per noi stessi, noi investiamo quest’anno più di 5 miliardi di dollari nella ricerca e sviluppo, di questi circa il 60% sono dedicati a questi temi, che non sono temi che si possono affrontare alla leggera e sui quali siamo impegnati. Il tema della privacy è certamente un tema di grande rilevanza per noi sul quale siamo molto focalizzati. Il tema della sicurezza, cioè avere dei sistemi che resistono agli attacchi, che sono integri nelle loro componenti, che forniscono i dati solo quando ci devono essere. E l’affidabilità delle tecnologie, dei sistemi, in tutti i loro componenti, perché se una parte è meno affidabile, evidentemente lo è anche il prodotto nel suo insieme. L’affidabilità dei fornitori, quindi di coloro che devono garantire con la loro reputazione, con le loro regole, con la loro presenza su più teatri operativi, su più paesi. Si deve poter garantire la validità di quello che fanno e quando sbagliano devono essere corretti, aiutati, perché quello che stiamo scrivendo adesso non è un libro già scritto, è un libro nuovo nel quale noi vogliamo usare in maniera più Umberto Paolucci - La tutela dei dati personali in una realtà multinazionale 83 aggressiva, a vantaggio della nostra qualità della vita, della qualità del nostro lavoro, le tecnologie che ci sono. Il rischio è di correre troppo, fare degli errori, essere più aggressivi, più ambiziosi. E quindi è giusto che ci sia questa rapporto di collaborazione tra autorità e fornitori di tecnologia, fra industria e istituzioni, per il quale ci si possa reciprocamente dare una mano. Questo è assolutamente benvenuto. Il tema che volevo toccare è dire quello che facciamo noi al nostro interno per garantire il rispetto delle regole di privacy. Noi abbiamo creato un Hand book sulla privacy, che non è un hand book fisico ma è un oggetto che si evolve sulla nostra rete per il nostro personale, per i nostri partner, che definisce i principi non solo ad alto livello, ma che definisce anche i comportamenti in tutta una serie di scenari reali, concreti che si presentano durante il lavoro di diverse tipologie di persone, quindi agli executive, ai manager, alle persone che devono organizzare una campagna di marketing, a coloro che devono gestire dei dati o delle campagne in collaborazione con delle realtà esterne. Quindi definiamo dalle policy, su come i dati vengono gestiti, su quanti devono essere tenuti, su quali sono le regole, anche in rispetto degli accordi come quello che abbiamo sentito citare prima, di fronte ad una serie di scenari. Questo è uno sforzo partito negli Stati Uniti. Come spesso avviene gli input delle multinazionali americane partono dalla casa madre, e noi ci sforziamo, e in parte anche ci riusciamo, di avere davvero una visione più globale fin dall’inizio, tenendo conto di quelle che sono le regole e i principi che valgono in paesi diversi dagli Stati Uniti, dove le regole possono essere diverse dalle nostre. Come voi mi insegnate, sapete che le cose sono molto diverse qui in Europa. Quindi quello che noi qui cerchiamo di fare è di creare una serie di processi, una serie di regole, una serie di paletti, noti alle persone e a quelle che lavorano con noi anche all’esterno, in modo che si possa veramente condividere un patrimonio di conoscenza, in modo di utilizzare al massimo quello che noi possiamo fare e rispettare la responsabilità che abbiamo. E naturalmente quando si danno degli obiettivi bisogna dare anche una metrica per misurare in che modo gli obiettivi sono raggiunti, quindi abbiamo messo sempre sulla nostra rete, a disposizione di tutti, uno strumento che misura la compliance, il grado di rispetto, che è in sostanza un privacy health index, così come abbiamo lo health index per la salute del personale in termine di soddisfazione, di rapporti con i loro capi, di validità degli obiettivi, ne abbiamo uno sugli aspetti della privacy. E vi dico che è un indicatore che ha effetti importanti sulla carriera delle persone, sulla loro retribuzione, sui loro bonus, e sulla loro capacità di farsi allocare del denaro, per la quantità di budget nei progetti che via, via si vengono a proporre. Quindi è uno strumento operativo molto agile che naturalmente cresce, si evolve. Perciò dicevo che non è un book virtuale, che credo debba essere considerato, non voglio dire, una best practice, ma comunque una practice interessante e che 84 Da costo a risorsa - Attività produttive e protezione dei dati personali aziende strutturate anche geograficamente dovrebbero usare in maniera estesa. In realtà a ciascuno viene richiesto di identificarsi, nel suo lavoro e negli scopi che ha per usare l’hand book, quindi identificarsi come posizione, come obiettivi, come scenario applicativo e in funzione di quello, vengono presentate tutte le alternative, tutti i paletti che servono per guidare queste alternative. E in questo senso è importante avere una tassonomia, quindi una serie di termini, di definizioni comuni per la quale non ci sia assolutamente ambiguità. E questa tassonomia nel nostro sforzo per la sicurezza, per l’iniziativa di knowledge transfer di cui parlavo prima, l’abbiamo fatta ovviamente validare, è nata da un lavoro comune con le società di auditing più importanti. Quindi i termini significano delle cose condivise, sulle quali siamo veramente d’accordo. Non posso naturalmente permettermi di insegnare nulla a nessuno in questo contesto. Su questi temi noi abbiamo preso atto delle regole della direttiva del ’95 e per noi è benvenuta e sono benvenuti gli sforzi che vengono fatti nell’evolverla e nell’armonizzarla. L’articolo 29 consigliava la Commissione Europea di creare quelle omogeneità che è importante che ci siano, sia per motivi di principio, che anche per motivi strettamente operativi, legati al lavoro delle aziende che devono ottimizzare ovviamente la loro presenza e le loro regole su paesi diversi. E abbiamo preso atto con piacere dell’accordo che è stato anche prima citato: siamo stati tra i primi tra le grandi corporation ad aderire e siamo molto sensibili sia a quello che viene dagli Stati Uniti che a quello che mano a mano verrà anche in Europa. Cerchiamo di dare anche il nostro contributo di esperienza. Ecco quindi in conclusione la nostra iniziativa su il TWC (Trustworthy Computing) e posso con fermezza dire che la priorità più alta che abbiamo non è solo di fare software, non è di implementare più caratteristiche, più funzioni ma è di far si che le persone possano contare più tranquillamente su queste funzioni. Gli obiettivi sono ambiziosi, intendiamo raggiungere lo stesso livello di affidabilità anche nell’immaginario collettivo di reti ben più mature, di reti per le quali evidentemente, in modo intrinseco, la complessità si ritrova ad essere al centro (es.energia, reti idriche, reti telefoniche), mentre quando si parla dei nostri oggetti, la complessità per definizione, è distribuita alla periferia. Quindi dobbiamo in qualche maniera non delegarla alle persone ma farla gestire dal software. E questo è un obiettivo molto più complicato da raggiungere di quanto non si debba fare con altre tecnologie come l’elettricità per esempio e in qualche misura, anche con il telefono, per lo meno nell’accezione di telefoni più tradizionali. In realtà i telefoni che noi abbiamo, quello che ho io qui, uno Smart Phone, è un computer e quindi mi consente di lavorare via Gprs come se fossi in ufficio. Nel breve il nostro obiettivo è quello di migliorare il progetto delle cose che noi facciamo e che fanno quelli che lavorano insieme a noi, le impostazioni di base, quindi le scelte di default. Puntiamo a far mettere in moto da parte delle azien- Umberto Paolucci - La tutela dei dati personali in una realtà multinazionale 85 de, dei processi, delle procedure semplici, anche da questo punto di vista. Perché noi abbiamo visto, questo è un dato che voglio condividere con voi, che quando ci sono dei guai in una azienda per motivi di virus, per motivi di sicurezza violata in qualche modo, nel 95% dei casi questo nasce dal fatto che il software che esiste, i patch che esistono, le ultime configurazioni disponibili non erano state installate, quindi non c’era bisogno di inventare il prossimo antivirus che non c’era ancora, sarebbe bastato fare quello che si poteva fare. Purtroppo, nostra colpa, il rimanere aggiornati non è sempre così facile, il propagare delle soluzioni che curano dei problemi improvvisi, deve essere più veloce di quando non si propaghino i problemi improvvisi stessi, e quindi dobbiamo fare un lavoro molto significativo dal lato della tecnologia e non possiamo farlo da soli. Nel medio termine, dobbiamo certamente raggiungere questi obiettivi di sistemi che si gestiscono da soli, che si autoconfigurano, si auto-aggiornano sulla rete, che si auto-medicano quando vengono feriti in qualche maniera. E però questo non è facile e soprattutto non è facile, come dire, avere impegni davvero finalizzati sulla ricerca. Perché lo sforzo non può essere fatto solamente dal mondo privato, deve essere fatto anche dal pubblico. Sono felicissimo per il sesto programma quadro anche in Europa e mi auguro che vengano fuori delle acquisizioni concrete. Dobbiamo essere insieme su questa sfida. E il tema, come ho detto, non è quello di fare più cose, ma è quello di farle con maggiore affidabilità. Il contesto è questo: il software che esce, deve essere pensato in termini di sicurezza, di privacy fin dall’inizio, quindi non ci deve essere un’aggiunta dopo, perché qualcosa non funziona come previsto. Testare software, vi segnalo, costa di più che scriverlo. Quindi se il software nasce con rammendi successivi non sarà mai affidabile come è invece giusto che sia. In termini di default, vi spiego rapidamente, significa dare agli utilizzatori, che non si suppone siano particolarmente esperti, degli assetti di macchina, delle scelte standard di configurazione del software, che siano le più protette possibile, che disabilitino le funzioni che sono solamente interessanti e però estendono l’area di vulnerabilità e di attacco. Per coloro che sono più raffinati e più esperti, quindi le opzioni più belle, più ricche, più aperte all’esterno, quindi più attaccabili, devono essere attivate esplicitamente, ma solo da chi se lo può permettere. E il tema di installare livelli adeguati di sicurezza e di privacy nelle funzioni deve essere semplice nella sua mantenibilità nel corso del tempo, altrimenti, come dicevo prima, per esperienza del 95% di aziende che non si mettono a posto, perché è troppo complicato o perché non ci pensano e allora è davvero colpa nostra. E dobbiamo anche metterci d’accordo su come comunicare le cose. Per esempio ci possono essere degli approcci per i quali quando ci si rendere conto che c’è un problema di importanza, per molti, globale, una violazione di sicurezza, di privacy e allora bisogna mettersi d’accordo se, al di là dei circoli ristretti degli addetti dei lavo- 86 Da costo a risorsa - Attività produttive e protezione dei dati personali ri, lo si deve dir subito che c’è questo problema, oppure se lo si deve dire quando si ha una soluzione. Quindi vanno presi certi rischi oppure no. Su questo ci devono essere dei codici molto precisi di allineamento di coloro che hanno la responsabilità della quale prima parlavo. E mi permetto anche di accennare al fatto che abbiamo messo, come azienda, a disposizione un “response center” che per problemi di virus, di sicurezza è disponibile gratuitamente per chiunque, per ogni emergenza e questo è anche un contributo a questo grande obiettivo che penso che tutti quanti condividiamo. Umberto Paolucci - La tutela dei dati personali in una realtà multinazionale 87 Personal Data Protection in a Multinational Framework Umberto Paolucci (1) I would like to use up my time here to deal with three main issues. I would first like to deal with the world of Information Technology and where it currently stands. Secondly, with the need to have a much more interconnected and global approach to the themes of security and privacy, which are not so diametrically opposed, as is often said. And thirdly with my corporation’s experience. A technological era. A time in which we can really be very optimistic in view of the decision made by the major basic technology providers to agree on some netcontents representation standards, in particular on the use of XML and the interoperability of web services, the components and services that have enabled the software to really work together, the data to be used in a global manner, and internet to become a programmable resource. Consequently, not a group made up of many different islands: the software of a generation, of a company, developed to carry out a given task, shall be extended to work with the software of other companies, developed to carry out other objectives. So now, we can put together worlds that were built to be apart, their compatibility arising from the Web Services. This is a substantial promise that paves the way to enormous applicative space. The underlying hardware we deal with when we work on the software, continues to keep its promise of doubling its performance every 18 months with respect to processors and memories. We even have a three factor in respect of the band width, like the fibre we get in our corporations and homes, and a three factor also in respect of disk capacity, always every 18 months. The whole refined range of monitors, the very large screens surrounding us, or the very small ones we carry in our pockets, all have a very high resolution. All this gives us the chance of creating more simple software capable of understanding our natural way of expressing ourselves, our natural language, whether written or oral: a software capable of interpreting possible ambiguities and deciding the more correct meaning of each sentence. Tablet PCs, which have been on the market for one month, are a huge step forward in this direction; they combine the world of writing with the formal world of a text, with text characters as they are handled by computers. As to the major theme of usability, to be able to talk and work with these machines in a way that is natural for us, as well as to solve the problems of those persons who would be excluded in view of their handicaps, are objectives we have to keep account of. As to the handsets we carry along, well, for example the law I (1) Vice President Microsoft Corporation 88 Da costo a risorsa - Attività produttive e protezione dei dati personali was mentioning before on doubling performances every 18 months, in the end has generated a situation in which we both have very powerful high-range sets and especially refined, but rather cheap, low-range sets. The range of machines is so large that it can finally keep its promise of self-synchronisation, of getting along with itself: my phone is synchronised with my PC and my PC is synchronised with the net. So we have a universe that really works for us. It is very practical, and corporations are using this system to reorganise themselves, to replace their analogical procedures - also based on paper or low-level manual work - with digital ones, with the help of technology. This greater pervasiveness is good for technology: it means big opportunities, greater opportunities for people, but also greater vulnerability. It means running a big risk. The risk is that if people do not trust, or cannot really count on, the reliability of the devices they are dealing with, then everything I have just said will not take place; we will come to a standstill for lack of trust and confidence in this actually complex universe; in fact, we have to hide its complexity when we present it to its end users by delegating it to the software instead of the people. So I have quickly dealt with the technological milieu we work in today. Trustworthy computing is an initiative we have been giving great priority to. This year more than 5 billions dollars have been invested in research and development. About 60% of these funds have been dedicated to these themes, which cannot be dealt with light heartedly. I would now like to deal with the theme of “Privacy”, which is of extreme importance to us, and on which we have focused great attention. A system is safe when it can resist attacks, features sound components, and is capable of providing data only when it is supposed to. It implies a trustworthiness in the technologies, the systems and all its components; this is because if just one part is less reliable, then the whole system is too. The trustworthiness of the providers of security is given by their reputation, their rules, their presence in several operative theatres, in several countries. The validity of what they do has to be guaranteed, and when they make a mistake, they have to be corrected, helped, because what we are writing now has not been written before, it’s a new book, where existing technologies can be used in a more aggressive way to improve the quality of life, and work. We run the risk of going too quickly, of making mistakes, of being more too aggressive and ambitious. And so the authorities and the technology providers, the industries and the institutions should co-operate, mutually help each other. This would be absolutely welcome. And now, I would like to deal with the steps taken by my company to ensure compliance with privacy rules. We have developed a privacy handbook, which is not a physical handbook but one developed on the net for our personnel and partners, setting forth both our high-level principles and our approach vis à vis a whole Umberto Paolucci - Personal Data Protection in a Multinational Framework 89 series of real and concrete scenarios we face while working; by “we”, I mean our executives, managers, the staff organising the marketing campaigns or handling data or campaigns in co-operation with external entities. So through our corporate policies, we decide how data is handled, if it is stored, and how to deal with different milieu. This effort was launched in the United States. As is often the case, the inputs of American multinationals come from their parent company, and we try, and in part succeed, to have a global view from the start, keeping account of the rules and principles that apply to countries other than the U.S., where rules can be different from ours. As you know, things are very different here in Europe. So what we are trying to do here is to develop a set of procedures, rules and restraints, to be disseminated to our external workers and the people, with a view to mutually share a heritage of knowledge, and to implement our objectives while complying with our commitments. And, naturally, when you set objectives, you also have to develop a tool capable of gauging their success. For this reason, we have introduced on the net a tool for gauging compliance, i.e. a privacy health index, which is similar to our personnel health index, developed to measure personnel satisfaction, workers’ relations with their bosses, and the validity of objectives. So now we have one on the various aspects of privacy. A personnel health index is an indicator which deeply affects careers, remuneration and bonuses. It also shows personnel capacity to be allotted money for the various projects. Thus it is an agile operational tool, which naturally grows and develops. It is not a virtual book; it should not be considered so much a good practice, as an interesting practice, which world-wide corporations should thoroughly use. Each person has to identify himself, his job, objectives and the reason for using the handbook. Each person then is presented with alternatives and instructions to implement them. In this respect, it is important to have a taxonomy, a number of words or common definitions to do away with ambiguity. Obviously we had this taxonomy validated, in our effort towards security and the knowledge transfer I mentioned before. It was generated by a common effort made together with the more important auditing companies. So the words mean something that is shared by the others, and we really agree on its meaning. Naturally, I cannot afford to teach anything to anyone here. In this respect, we have abided by the rules set forth in the ’95 Directive, and we support them. We also appreciate all the efforts made to develop and harmonise said directive. In Article 29, the European Commission suggests implementing the required approximations both as a matter of principle and for strictly operational reasons linked to the work carried out by corporations to optimise their production and rules in the different countries. We were also happy to acknowledge the agreement mentioned before: we were one of the first major 90 Da costo a risorsa - Attività produttive e protezione dei dati personali corporations to sign such an agreement and we are very sensitive both to what comes form the United States of America and what will gradually also come to Europe. We have also tried to contribute with our expertise. Here then our initiative on Trustworthy Computing, and I can definitely say that our first priority is not only to make software and implement more characteristics and functions, but also to make sure that people can safely count on these functions. Our objectives are ambitious, we want to reach the same level of trustworthiness in the public imagination than far more developed nets have, and in respect of which, evidently, in an intrinsic way, the complexity is at the centre (e.g. electricity, water systems, telephone systems). When dealing with our products, instead, the complexity by definition, is distributed over the periphery. So, in some way we must not delegate it to the people but we have to get the software to deal with it. And it is far more complicated to reach this objective in our field than it is when dealing with other technologies like electricity, for example, and to a certain extent, also the telephone, at least the more traditional one. In fact, the phones we have now, the one I have here today, is a Smart Phone. It is a computer that allows me to work via GPRS as if I were at the office. In short, our objective is to improve the project of the things that we and those working with us make, the basis procedures and default choices. So as to simplify the processes and procedures used by the corporations. We have seen that when a company is in trouble because of a virus and their security has been breached in some way, in 95% of the cases this is due to the fact that the last available configurations have not been installed in the existing software and patch. If they had been installed it would not have been necessary to invent a new anti-virus. It would have been enough for the company to do what could be done. Unfortunately, nostra culpa, it is not always simple to stay updated. The dissemination of the solutions for sudden problems has to be quicker than the dissemination of the sudden problems themselves. Consequently, we have a lot of work ahead of us, and we cannot do it alone. In the average term, we certainly have to reach the objective of self-managing systems, self-configurating, self-updating on the net, and selftreating when they get wounded in some way. However, this is not easy and, in particular, it is not easy to undertake commitments in the field of research. Efforts cannot only be made by the private companies, they also have to be made by the public entities. I am very happy about the sixth draft programme developed in Europe and I hope that something practical will come out of it. We have to meet the challenge together. It is not a question of doing more things, but of making them more trustworthy. In the future, when software is developed, it shall have to be secure and consistent with the privacy rules as from the start. It must not be set right later on, be- Umberto Paolucci - Personal Data Protection in a Multinational Framework 91 cause something has not worked as expected. Please note that it is more expensive to test software than to develop it. Then, if the software comes out to be subsequently improved, it will never be as reliable as it should be. As to default, in short it means giving not especially expert users the information required to prepare their computer, i.e. standard choices to configurate the software in such a way as to protect it as much as possible, and to disable the functions that although interesting increase their set’s vulnerability and attack area. There are nicer and more interesting versions too, but they are for those who are more skilled and knowledgeable. However, these versions are not as protected from the outside world and can be attacked more easily. They have to be activated explicitly only by those who have the skills to do so. Adequate levels of security and privacy should be simple to install, and simple to maintain over time. Otherwise, as I was saying before, like 95% of the corporations, the software is not updated because it is too complicated or because no one thinks about it, and then this is really our fault. And we also have to decide how to get this information across. What approach should be followed. For example, if one realises that there is an important problem affecting many persons, a global problem, a breach in the security or privacy, then should the people other than the experts be told immediately, or only when a solutions has been found? Should certain risks be run or not? Very specific codes have to be developed for the decision makers. And allow me to mention that my corporation has started a response centre which is available for problems concerning viruses and security. It is free of charge, for anyone, for any emergency. And this is our contribution to this major objective, which we all share. 92 Da costo a risorsa - Attività produttive e protezione dei dati personali New Privacy-Oriented Markets Alejandra Gils Carbò (1) Contents: 1. Data protection in Latin America – 2. Argentinean Law has an adequate level of protection – 3. International data transfer – 4. Privacy and economic crisis – 5. The costs of controlling compliance – 6. The credit reports - 1. Data protection in Latin America In Latin America, the need to protect individual privacy from computerised proccessing of information is an important subject. This is clear when you see that the National Constitutions of Colombia, Perú, Guatemala, Venezuela, Ecuador, Brazil, Paraguay and Argentina have upgraded the habeas data and the access to the own data as a constitutional right. Besides, Argentina and Chile have passed special laws for data protection, while Perú, Paraguay and Panamá have regulated the use of credit reports. When you think about Latin América, you must take into account that the interest in data protection is in direct relation to the educational level and the purchasing power of the population. People are unlikely to worry if the employer checks how the employees use their computers, when unemployment rates are high and there is more concern about finding a job or keeping it. On the other hand, the poorer the technological development of a country is, the lower the interest to legislate on this subject. Despite this, several Latin American states are working on bills of privacy. However, in our view this effort will be worthless unless there is an agreement to set forth uniform principles. In fact, the laws enacted by Chile, Paraguay, Perú and Panamá so far, do not include a general framework about data protection rules which can be considered as an adequate level of protection according to the standards of Directive 95/46, and for the Argentinean law, either. 2. Argentinean Law has an adequate level of protection Recently, on October the third, this year, the Working Party of the European Commission came to the conclusion that Argentina provides an adequate level of protection for the international transfer of data. We were likely to be granted this status because our data protection act follows closely follow the contents of the (1) Procuraciòn general de la naciòn-Argentina Alejandra Gils Carbò - New Privacy-Oriented Markets 93 Spanish law. This was a wise move of the legislators that fostered the bill, as they had to bear during the five years of the parliamentary procedure, the pressure from companies and public agencies that were relunctant to accept it, as the automated data treatment had always been a free activity. The opponents used to say that it was inconvenient in our environment to rule a topic in full development; that a data protection act will increase costs and hinder the growth of industries or services which are decisive for progress; that it was an excess of rules and regulations. United States have not done it, why us? Finally, other pressing reasons have prevailed. 1. Firstly, the purpose to protect people´s rights. The lack of rules has brought about abuses that claimed action. The amendment of the National Constitution in 1994 that introduced the habeas data action as a fundamental right was not enough to protect people´s rights due to the lack of provisions about the obligations of the controller and the data subject´s rights. 2. The second reason to pass the law, was the prohibition to transfer personal data to countries which do not provide an adequate level of protection set forth by the European Union. It provoked the concern about future conflicts in international business due the lack of regulation. That situation would be an obstacle to our position in overseas markets. 3. International data transfer One of the main problems that causes the enforcement of the Data Protection Act was the prohibition to transfer personal data to countries without an adequate legal protection. This prohibition we have included in our law plays an essential role to support the aim of the system because it is useless to state restrictions for the data treatment which can be broken by processing data in a neighbouring country. Imagine, how this prohibition works in a country situated in a continent where other countries – except Canada – have not passed data protection laws according to the European standards. What would happen in Mercosur? United States companies in Argentina and the United States Embassy objected to this rule from the beginning. Finally, we have come to a solution set forth in the regulatory decree that was considered appropriate to all actors. We introduced exceptions mentioned in Directive 95/46 of the European Commission, because the Argentinean law was excessively strict and did not admit any exceptions. I am referring to the possibility of requesting the consent of the data subject 94 Da costo a risorsa - Attività produttive e protezione dei dati personali for international transfer; and to the guidelines to assess what an adequate level of protection means, including the option to consider codes of conduct and self regulation systems. Besides, the international transfer of personal data does not require the previous authorization of the controlling body, because this would be hindering commercial relationship among Latin American countries. Instead of that, we emphasize the accountability of the controller who makes the communication of the data. The responsible for the data file must examine the level of protection of the recipient country, and in case it is not adequate, he must ask for the data subject´s consent, or state contractual clauses which introduce the adequate protection not provided in the law. Contractual clauses must establish the responsibility of the recipient for the unlawful use of the communicated data. 4. Privacy and economic crisis I have been asked about what happens to privacy in a country like Argentina undergoing its worst economic crisis. Is privacy an essential cost for business? or when it comes to spending cuts privacy policies are sacrificed to improve benefits? We can approach this issue in this way. Many people wonder: Was there any human life before the mobile phone? I mean, when people have introduced a device of comfort, they are unlikely to accept to do without it. Therefore, the demand of consumers in relation to privacy has not fallen down. Otherwise it has increased as well as the invasive power of technology, even during an economic crisis. Recession encourages competition and creativity. Companies have no choice but to turn the problem into an opportunity. The opportunity to provide a better service: - offering a new product: the respect for privacy as a quality feature; - taking into account that the customer´s protection is cheaper than the bad image; - besides, privacy policies reduce “litigation risk” and prevent fines. The companies were the first to adopt the new regulation: who dare to sign a contract with somebody that breaks the law? 5. The cost of controlling compliance Another important subject is to determine the public cost for controlling the Alejandra Gils Carbò - New Privacy-Oriented Markets 95 compliance with data protection provisions. Countries with budget restrictions must make the most of their infrastructure. We have to resort to several options: The prosecution of crimes established in the data protection act, carried out by prosecutors, has made a great dissuasive impact and it enables to take advantage of the judicial system and the aid of cybercrime investigation office of the police division. In the Argentina the unlawful access to databases and the violations to confidentiality and security of personal data are punished by criminal law. Thus, we prosecute the “insiders”: the unfaithful employee, the civil servant that sells information of public files. Many times, paying a fine – which is not significant in case of insolvency – is not the same as seeing the police car parked in front of your house. On some occasions, we solve the limited resources by notifying the Internet service provider that someone is making an illegal activity on a website. Provider has solvency, and respond jointly for the violation of the law when he has taken knowledge of it. The provider´s decision to close the service turns out to be more effective than a court order. We have the habeas data, a typical Latin American judicial action, brief and simple, to guarantee all the rights recognized in the Data Protection Act. Since the law was passed there have been thousand of claims. There exists an administrative controlling body, called la Dirección Nacional de Protección de Datos Personales, which consists of the existing technical and human resources in the administration. The controlling body collects taxes for the registration of databases, with the exceptions provided for in favor of sectors which have passed codes of self-regulation, as an incentive. The control of compliance with the codes of conduct is shared between the controlling body and marketing associations. 6. The credit reports Another point of concern for many consumers in Latin America is the credit reports. In this framework, we have to admit that transparency for the banking and financial system takes priority over privacy. The basic problem is the low average of the population which is inserted in the banking system. So, to make credit reports useful, we include information about trials, which is difficult to keep update. This happens because courts register the beggining of the judicial procedure, but not the conclusion. 96 Da costo a risorsa - Attività produttive e protezione dei dati personali Therefore the debtor must be in charge of updating data, by notifying the provider of credit information services of the payments or the sentence rejecting the action, so as to remove his name form the defaulter list. The provision of credit reports is considered of public interest by the State authorities because. They compel the payment of obligations; They eveal the defaulters who used to protect themselves behind anonymity; They enable insecured credits. And, as the bankers say, though I do not believe them, they reduce the interest rates. In conclusion, I want to point out that this is the opportunity to advance conversations with Latin American states, because there is concern about the increasing collection of information for the sake of security and market´s interest. The myth of a dream society that inspired the utopias of Platon and Saint Thomas More was set aside by the antiutopias of Orwell and Huxley, who have changed those optimist versions to show that the quest for perfection in social control destroys self-determination and freedom. If humanity forget about its writers, it will have forgotten itself. Alejandra Gils Carbò - New Privacy-Oriented Markets 97 New Privacy-Oriented Markets. Direct Marketing in Hungary Attila Péterfalvi(1) Contents: 1. Mail Marketing – 2. Telemarketing - 3. E-mail marketing 1. Mail Marketing In the beginning of the nineties, the direct marketing companies were new actors in the Hungarian economic life. After the Hungarian Parliament adopted the Act on Data Protection and Freedom of Information (hereinafter: Data Protection Act) their activity - processing personal data and using it for marketing purposes without the consent of the data subject - became illegal. Of course the direct marketing lobby tried to create the legal background of their data processing, but till 1995 there was not legal way to collect and use personal data for marketing purposes except with the expressed consent of the data subject. In 1995 the Parliament adopted the Act On the Use of Name and Address Information Serving the Purposes of Research and Direct Marketing - the law which laid the groundwork for the practice of direct marketing (hereinafter: Direct Marketing Act). According to this Act, direct marketing companies (and research companies which are also under of this Act’s operation) may use only the name and address information and information concerning the interest of their customers. It follows from this disposition that under the Direct Marketing Act only the “traditional” mail marketing is legal and the rules of this Act do not apply to other ways of direct marketing. According to the Act companies can use the data of their former customers (those who get in contact with the company on their own for example answering for a promotion campaign), and they can collect name and address information from public registers (for example phone book). It is also allowed to forward data from one company to another if the data subject did not forbid it after being informed. That means that the direct marketing companies do not need the expressed consent of the data subject; as a Hungarian proverb says: in this case silence gives consent. The fourth legal source of names and addresses for direct marketing purposes is the Central Data Processing, Records and Electoral Office which is the largest state register in Hungary containing every citizen’s data. The companies can not ask for individual data, they can ask for arranged lists. According to the relevant ministerial decree the price per data is between two and twenty five Eurocents - de(1) Data protection and Freedom of Information Commissioner-Hungary 98 Da costo a risorsa - Attività produttive e protezione dei dati personali pending on the amount of the required data. Many citizens complain about this kind of data processing. The Act on the Name and Address Records of Citizens (hereinafter: Records Act) makes it possible for citizens to block their data with the Central Office, preventing the Office from further disclosure of the information except to authorised bodies and in cases and for purposes expressly required by law. But citizens are not informed of this option and although many of them complain about forwarding their data to direct marketing companies only a few of them - less than one percent - blocked their data. In case of infants this rights accrues to the parents, but the block was not effective unless the parents were quicker than the direct marketing companies. This situation was often criticised by the former Data Protection Commissioner and in 1999 the Records Act was amended. Now the request for data by direct marketing companies is declined for ninety days after the baby’s data were filed with the Registrar. The Direct Marketing Act contains many regulation to protect the right to the protection of personal data. The citizens has the right to ask to erase their data and also has the right to require information about the way of data processing. As companies may collect data without the knowledge of citizens it is essential to inform them at the first time when the company gets in contact with its prospective customers. So the Act obliges the companies to inform the data subject about the source of the data, the purpose, way and duration of the data processing, the name and address of data processor. The data subject also has to be informed about the right to ask for erasing the data (actually, the information is not erased but switched to a so-called blocked list or Robinson list, which helps to screen the names of persons who have blocked data out of any new lists). The mails of direct marketing companies not always contain this information - and it is also, apart from the fact that it violates the law, a source of complaints. The other question about erasing concerns technical data processing. The biggest Hungarian direct marketing company - actually, one of the biggest International direct marketing companies - used to send more than two hundred thousands letters at each campaign. The technical data processing - printing the letters, envelopes, posting them - takes several weeks. Many citizens complained that after they asked the company to erase their records they got materials for weeks - sometimes for months. At this case I called the company’s attention to the strict rules: according to the Data Protection Act after the citizen asked for erasing it is illegal if the data processor or the technical data processor process the data. However, it must be understood that it is impossible to follow the rules in such cases so three or four weeks for erasing the data is acceptable. Attila Péterfalvi - New Privacy-Oriented Markets. Direct Marketing in Hungary 99 2. Telemarketing The Direct Marketing Act can not be used for telemarketing as it allows to use phone books only to collect name and address information and not for calling the citizens. So strictly speaking telemarketing was illegal without the consent of the data subject. Due to the fact that after the Direct Marketing Act was adopted telemarketing was a very common business in Hungary the Data Protection Commissioner did not consider it as illegal but asked the companies to apply the rules of the Direct Marketing Act as appropriate. The direct marketing companies had to wait three years after the Data Protection Act was adopted - for the legal groundwork of telemarketing they had to wait nine years. The Hungarian parliament adopted the Act on Communications in 2001, and this Act contains three rules for telemarketing. First of all the Act says that each telephone subscriber shall have the right to require the service provider to state in the telephone books that his/her personal data may not be used for the purposes of direct marketing. So mail marketing and telemarketing companies must not use the data of those who has this kind of statement in the telephone book. All the other names and addresses can be used for mail marketing and also for telemarketing - with two exceptions. Automated calling system free of any human intervention can be used for direct marketing purposes only with the consent of the subscriber, so the telemarketer must have the expressed consent before using such kind of calling system - but the preliminary consent is needed only for using automated calling system. On the other hand no announcement serving the purposes of direct marketing may be forwarded to a subscriber, by telephone or through other telecommunications method, who has declared that he/she does not wish to receive any publicity matter. The problem with this Act is its conciseness. The telemarketing companies work with public telephone books and if they want to keep the Act they have to keep a record of those who made the above mentioned declaration - this is similar to or the same as the blocked list or Robinson list in the Direct Marketing Act. This kind of list is also a data processing so the data processor - in this case the telemarketing company - must have a permission by law to keep this register. But the Communications Act does not contain any rule concerning this question. But as keeping the blocked list or Robinson list is the only way to keep the law, the Telemarketing companies must have it. 3. E-mail marketing The problem with the e-mail marketing was the same as with the telemarketing: there were not any regulations concerning this way of direct marketing. In 2001 100 Da costo a risorsa - Attività produttive e protezione dei dati personali - after the Communications Act - the Parliament adopted the Act on the Issues of Electronic Commercial Services and Services Connected with the Information Society. This Act clarifies that the addressee’s consent is needed to send advertisement or any marketing matter using electronic mails. The marketer has to keep a register of those who gave their consent and only this register can be used for marketing purposes. It must be written in every mail that the addressee has the right to forbid to use his/her mailing address for direct marketing purposes. So in contrast to the Communications Act this Act requires the preliminary consent of data subject. Mention must be made of the circumstance that the Communications Act applies to direct (commercial) marketing, the Electronic Commercial Act to every kind of marketing. That’s why it was a violation of this Act that political parties sent campaign materials via e-mail without the addressee’s consent during the Electoral Campaign before the Parliamentary Elections this April. Political marketing is also a marketing so parties must keep the rules of the Electronic Commercial Act. Finally, it must be underlined that the Direct Marketing Act only applies to the use of the name address of persons. So the names and addresses of companies, offices, etc. can be used for direct marketing almost without limits. On the other hand the Communications Act applies to every subscriber and also the Electronic Commercial Act applies to every addressee – so everyone, not only private individuals. Attila Péterfalvi - New Privacy-Oriented Markets. Direct Marketing in Hungary 101 Contributi S ESSIONE II P RIVAC Y E I MPRESA Sessione II – Privacy e Impresa Quale privacy? Mauro Paissan (1) Sommario: 1. La globalizzazione dei diritti – 2. Codici di condotta, nuove tecnologie e regole multinazionali – 3. La tutela dei dati personali all’interno dell’impresa: in particolare i dati dei lavoratori 1. La globalizzazione dei diritti La sessione che sono chiamato a coordinare, caratterizzata da una pluralità eterogenea di sollecitazioni sull’uso delle informazioni personali nell’attività di impresa, muove da un interrogativo: “quale privacy?”. La nostra attenzione viene dunque indirizzata verso le modalità con le quali può trovare compiuta tutela il diritto alla protezione dei dati personali. Si riconosce, così, se non altro implicitamente, non voglio dire la non effettività ma almeno la non esaustività del ricorso ai tradizionali strumenti di protezione dei dati riconosciuti in capo all’interessato (accesso, rettifica, cancellazione etc.), che si sono aggiunti ai rimedi classici – a presidio dei diritti della personalità – rappresentati dal risarcimento del danno e dall’inibitoria. In questa cornice si giustificano gli interventi successivi aventi ad oggetto da un lato i codici di condotta e, dall’altro, le così dette privacy enhancing technologies (PETs), ovvero le tecnologie informatiche in grado di incrementare la privacy, come i sistemi crittografici per la posta elettronica o i sistemi per navigare in rete in modo anonimo. Da questo punto di vista, allora, il nostro dibattito presenta una connessione diretta con talune delle conclusioni della conferenza internazionale sullo stato di attuazione della Direttiva 95/46/CE svoltasi presso la Commissione europea a Bruxelles circa due mesi fa(2). Ma questa linea di ideale continuità che ho voluto tracciare per dare ragione della natura internazionale della nostra Conferenza (i problemi sono ormai tutti so(1) Componente Garante per la protezione dei dati personali - Italia (2) V. i diversi contributi alla Conferenza di Bruxelles resi pubblici in http://europa.eu.int/comm/internal_market/en/dataprot/lawreport/index.htm. Mauro Paissan - Quale privacy? 105 pranazionali), ha radici più profonde: essa intende rappresentare l’ulteriore svolgimento del messaggio che il Garante volle condensare nel titolo della Conferenza di Venezia del 2000: One World, One Privacy. Si tratta di uno slogan ancora attuale nel reclamare, a fianco della libera circolazione delle informazioni nell’economia globalizzata, la non separabile globalizzazione dei diritti: per quanto ci riguarda, della dignità della persona attraverso il trattamento dei dati personali che ad essa si riferiscono. Intenti non diversi, del resto, erano presenti nel convegno organizzato nel settembre 2001 a Kiel dal Garante dello Schleswig-Holstein, nel contesto della Sommerakademie, con il titolo Datenschutz als Wettbewerbsvorteil (3). Queste giornate di studio romane si inseriscono, stavolta guardando al futuro, nell’itinerario verso l’imminente World Summit sulla società dell’informazione previsto per l’anno prossimo(4), rispetto al quale le conclusioni dei vertici regionali, ed in particolare di quello paneuropeo di Bucharest(5), sembrano non aver tenuto in debito conto le fondate preoccupazioni dei cittadini e le loro legittime aspettative a non divenire puro strumento dell’evoluzione tecnologica o merce del processo produttivo che la incorpora. In questo senso, va allora rettamente posto, in termini di auspicabile alleanza, il rapporto intercorrente tra iniziativa economica e diritti fondamentali. Se parlassimo invece di funzionalizzazione di questi ultimi alla prima, ci collocheremmo, per quanto attiene all’ordinamento italiano, in linea di rottura rispetto alla cornice definita dalla nostra Carta costituzionale agli articoli 2 (“La Repubblica riconosce e garantisce i diritti inviolabili dell’uomo…”) e 41 (“L’iniziativa economica privata è libera. Non può svolgersi in contrasto con l’utilità sociale o in modo da recare danno alla sicurezza, alla libertà, alla dignità umana”). 2. Codici di condotta, nuove tecnologie e regole multinazionali La ricordata Conferenza di Bruxelles ha affermato l’inopportunità di una revisione del testo della direttiva del 95 sulla privacy. Non sono dunque messi in dubbio i principi cardine della protezione dei dati, che risalgono alle linee guida dell’Ocse(6) e alla Convenzione del Consiglio d’Europa del 1981, e che potranno tro(3) Gli atti del Convegno possono essere letti in H. Bäumler – A.v. Mutius (a cura di), Datenschutz als Wettbewerbsvorteil – Privacy sells: Mit modernen Datenschutzkomponenten Erfolg beim Kunden, Braunschweig – Wiesbaden, 2002. (4) Un’agenda completa delle attività preparatorie si può trovare in http://www.itu.int/wsis/index.html. (5) “The Bucharest Declaration” può essere consultata in http://www.itu.int/wsis/events/bucharest.html; v. pure la “Declaration of the Bishkek-Moscow Conference on the Information Society”, in http://www.itu.int/wsis/events/bishkek.html. (6) Oecd, Recommendation Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data, adottato dall’Ocse il 23 settembre 1980 (Oecd Privacy Guidelines), Doc. C 58 final del 1° ottobre 1981; l’attuale validità dei principi contenuti nelle Guidelines è stata ribadita, anche con riguardo alle reti telematiche, dall’Ocse: cfr. Ministerial Declaration on the Protection of Privacy on Global Networks, Ottawa, 7-9 October 1998, p. 4 (DSTI/ICCP/REG(98)10/FINAL). 106 Da costo a risorsa - Attività produttive e protezione dei dati personali vare più alto ed esplicito riconoscimento una volta definito il ruolo della Carta dei diritti fondamentali dell’Unione europea (art. 8)(7). Si sono registrate, tuttavia, istanze volte all’individuazione di modalità dirette a migliorare l’uniforme applicazione dei principi della Direttiva nei singoli Paesi membri dell’Ue, anche attraverso la ricerca di approcci più pragmatici e con la semplificazione del quadro normativo, garantendo comunque le libertà dei cittadini, dei quali ancora basso è il livello di consapevolezza dei diritti loro attribuiti e delle modalità di esercizio degli stessi. Tra le misure volte ad incrementare l’effettività delle discipline di protezione dei dati, come anticipato, si sono menzionati sia i codici deontologici sia le PETs. A proposito di queste ultime va tuttavia rilevato che, al di là della precisa individuazione del loro contenuto e della loro effettiva idoneità a ridurre l’impatto sulla privacy, se ne è denunciata la modesta diffusione e la difficoltosa introduzione nel mercato. Si tratta di elementi dei quali occorre farsi carico se non si vuol perdere il contatto con la realtà, specie in presenza della crescente diffusione di tecnologie che – procedendo in senso opposto – consentono ad esempio il datamining, ovvero l’estrazione e la successiva elaborazione di dati personali reperiti in diversi database o in rete. Ulteriore strumento per rendere più “appetibile” o, rimanendo in contesto, più “digeribile” le discipline di protezione dei dati sono i codici di deontologia e di buona condotta(8): anche nell’ordinamento italiano, e segnatamente nel settore della protezione dei dati, essi stanno trovando progressiva accettazione(9). Tutti ne conosciamo i vantaggi, in termini di maggiore prossimità rispetto alle specifiche problematiche delle categorie interessate. Ma non possiamo sottacere le difficoltà che talora si presentano, anzitutto nell’individuazione dei soggetti effettivamente rappresentativi degli interessi in gioco; compito pressoché impossibile quando le ricadute sono su una platea indistinta di soggetti o quando gli interessi implicati richiedono un’attività che oltrepassa la mera competenza tecnica per debordare in valutazioni di politica del diritto che non possono che essere rimesse al Parlamento. Ma di regole frutto dell’autonomia privata, ed in questo senso assimilabili ai codici di buona condotta, sempre più si va parlando quale tecnica ulteriore per superare uno dei problemi maggiormente avvertiti dall’impresa che, nel mercato globalizzato, si articola in più sedi dislocate nelle parti più disparate della terra: si trat(7) V. http://www.europarl.eu.int/charter/default_en.htm. (8) Un’utile trattazione è stata offerta da C.D. Raab, Effective self regulation – genuine protection or a contradiction in terms?, Paper prepared for the 24th International Conference of Data Protection and Privacy Commissioners, Cardiff, 9-11 September 2002. (9) Codice di deontologia relativo al trattamento dei dati personali nell’esercizio dell’attività giornalistica ai sensi dell’art. 25 della legge 31 dicembre 1996, n. 675, adottato con provvedimento del 29 luglio 1998; Codice di deontologia e di buona condotta per i trattamenti di dati personali per scopi storici, adottato con provvedimento del 14 marzo 2001. Codice di deontologia e di buona condotta per i trattamenti di dati personali a scopi statistici e di ricerca scientifica effettuati nell’ambito del sistema statistico nazionale, adottato con provvedimento del 31 luglio 2002 . Mauro Paissan - Quale privacy? 107 ta della disciplina volta a regolare il flusso transfrontaliero di dati personali dall’Europa verso Paesi terzi che non offrano un livello adeguato di protezione dei dati personali. E’ un tema che lascio agli ospiti stranieri. Mi limito a ricordare che la Commissione europea e le Autorità nazionali di garanzia, anche operando in modo cooperativo all’interno del “Gruppo articolo 29”, hanno realizzato sforzi rilevantissimi per coniugare le esigenze del mercato, consentendo la libera circolazione dei dati personali attraverso gli strumenti, pur diversi, del Safe Harbor (10) e delle “clausole contrattuali standard”(11); strumenti che, pur attenuando le possibilità di controllo sulle modalità di trattamento dei dati al di fuori dell’Europa, non le elidono. Questa preoccupazione è, invece, più difficile da dissipare rispetto a tecniche contrattuali diverse che consentano una libera circolazione, all’interno delle multinazionali, di dati personali provenienti dall’Unione europea. 3. La tutela dei dati personali all’interno dell’impresa: in particolare i dati dei lavoratori Se quanto appena descritto attiene allo svolgersi dell’attività economica dell’impresa verso l’esterno, non possiamo dimenticare gli aspetti, altrettanto rilevanti, della definizione delle regole di circolazione delle informazioni all’interno dell’impresa. Pensiamo al flusso informativo nei processi gestionali e organizzativi, ai problemi posti dalle reti Intranet e, segnatamente, al tema dei dati nel contesto del rapporto di lavoro. Qualche osservazione su quest’ultimo aspetto. Non si tratta di tema nuovo e, con riguardo all’ordinamento italiano, è stato affrontato ormai molto tempo fa con lo Statuto dei lavoratori(12), che riconosce garanzie per il lavoratore e per la vita privata dello stesso. Ma l’introduzione massiva delle tecnologie dell’informazione nel processo produttivo e nell’organizzazione aziendale ha modificato il quadro: la materia dei controlli della posta elettronica e della navigazione in Internet è, da questo punto di vista, solo la punta di un iceberg. Ad esse bisogna associare altre problematiche, non meno rilevanti, che abbracciano un arco temporale assai ampio, che parte fin dalla fase precedente all’instaurazione del rapporto di lavoro, con l’assunzione di informazioni personali sul candidato-lavoratore; si aggiungano poi le informazioni raccolte nel corso del rapporto lavorativo, con le metodologie più varie (anche ricorrendo al(10) Commission Decision of 26 July 2000 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequacy of the protection provided by the safe harbour privacy principles and related frequently asked questions issued by the US Department of Commerce; v. anche il sito dedicato dall’US Department of Commerce al Safe Harbor in http://www.export.gov/safeharbor/. (11) Vedi le decisioni della Commissione europea in: http://www.europa.eu.int/comm/internal_market/en/dataprot/modelcontracts/index.htm . (12) L. 20 maggio 1970, n. 300. 108 Da costo a risorsa - Attività produttive e protezione dei dati personali l’uso di test), e il problema della loro tipologia. Si pensi, solo per fare qualche esempio, ai cosiddetti dati valutativi, ai dati genetici (la cui raccolta può tradursi in fonte di grave discriminazione), ai test antidroga, antialcool e antifumo, ai badge attivi che consentono l’individuazione della collocazione geografica del dipendente, al controllo delle voice-mail e dei computer. Per non parlare della videosorveglianza. È un tema caldo in molti paesi. Le Autorità di garanzia sono intervenute a più riprese e le stesse tematiche hanno formato oggetto di riflessione da parte del “Gruppo art. 29”(13). Le autorità di garanzia europee vengono sollecitate a pronunciarsi in materia. Le preoccupazioni al riguardo sono reali e non riducibili ad un “chiodo fisso” degli esperti di protezione dei dati: chi ne volesse conferma non avrebbe che da scorrere le pagine della recentissima Comunicazione della Commissione europea intitolata Second stage consultation of social partners on the protection of workers’ personal data, nella quale si prefigura l’emanazione di una Direttiva in materia(14). Il tema è spinoso e non sono praticabili soluzioni semplicistiche. Riguardo, ad esempio, alle e-mail inviate e ricevute da un lavoratore sul computer aziendale, è in gioco il diritto inalienabile alla segretezza della corrispondenza al quale viene talvolta contrapposto il diritto di proprietà dell’imprenditore sugli strumenti di lavoro aziendali. Ma la difficoltà del tema non ci esime dalla necessità e dall’urgenza di un dibattito aperto tra i soggetti sociali coinvolti e la cultura giuridica e scientifica. Una necessità che segnalo al mondo delle imprese, che troppo spesso preferiscono rimuovere il problema e operare per vie di fatto; al mondo sindacale, incomprensibilmente disattento, forse anche perché i lavoratori maggiormente coinvolti sono meno rappresentati dalle organizzazioni sindacali; e al mondo del diritto, la cui elaborazione al riguardo è ancora lontana dalle attese. Una maggiore attenzione e sensibilità su questo tema da parte dei soggetti sociali e della cultura giuridica e scientifica renderebbe più agevole anche la nostra attività istituzionale. (13) V. Working document on the surveillance of electronic communications in the workplace, 29 May 2002, DG MARKT/5401/01, WP 55; Opinion 8/2001 on the processing of personal data in the employment context, 13 September 2001, DG MARKT 5062/01, WP 48; Recommendation 1/2001 on Employee Evaluation Data, 22 March 2001, DG MARKT 5008/01, WP 42. (14) La comunicazione, dell’ottobre 2002, è consultabile in: http://europa.eu.int/comm/employment_social/soc-dial/labour/dataprot_en.pdf Mauro Paissan - Quale privacy? 109 What Privacy? Mauro Paissan (1) Contents: 1. Globalising Rights – 2. Codes of Conduct New Technologies and Multinational Rules – 3. Personal Data Protection inside Businesses, with Particular Regard to Employee Data I. Globalising Rights The Session I have the task of coordinating includes multifarious issues related to the use of personal information in connection with business activities; its starting point appears to be a question, i.e. what privacy? Our attention must therefore focus on the manner in which the right to personal data protection can be fully safeguarded. This means that it is acknowledged – at least implicitly – that the traditional data protection tools made available to data subjects (access, rectification, cancellation, etc.) in addition to time-honoured remedies to safeguard individual rights (compensatory damages, prohibition orders) are, though not ineffective, at least non-exhaustive ineffective. The presentations we will shortly be listening to should be considered against this background. They will address, on the one hand, codes of conduct and, on the other hand, the so-called Privacy Enhancing Technologies (PETs), that is to say the computer-based techniques capable to enhance privacy - such as cryptography systems for e-mail or anonymous browsing systems. From this viewpoint, our meeting is directly related to some of the conclusions drawn on the occasion of the international conference on implementation of Directive 95/46/EC, which took place at the European Commission in Brussels about two months ago.(2) However, this continuity I pointed to in order to account for the international character of our conference – indeed, nowadays all issues are supranational in nature – has deeper roots. It is meant to be the furtherance of the message summarised by the Italian data protection authority in the title of the Venice Conference in 2000 – i.e. One World, One Privacy. This motto retains its validity as it calls for, on the one hand, the free flow of information in the globalised economy and, on the other hand, the ineliminable globalisation of rights – which means, as far as we are concerned, globalising the dignity of individuals by means of the processing of the (1) Member. Italian Data Protection Authority (2) See the various contributions published at http://europa.eu.int/comm/internal_market/en/dataprot/lawreport/index.htm . 110 Da costo a risorsa - Attività produttive e protezione dei dati personali personal data concerning them. No different targets were actually envisaged in connection with the conference organised by the Schleswig-Holstein supervisory authority in Kiel, in September 2001, within the framework of the Sommerakademie – its title being Datenschutz als Wettbewerbsvorteil.(3) This Roman workshop is a station on the road leading to the forthcoming World Summit of the Information Society, which is scheduled for the next year(4); in this regard, the conclusions reached by regional meetings, in particular the panEuropean meeting of Bucharest(5), would appear not to have taken duly into account the well-grounded concerns expressed by citizens and their legitimate expectation not to become merely tools of technological development or else commodities in the production process incorporating that development. In this context, establishment of a relationship between economic enterprise and fundamental rights is definitely desirable to the extent that it can become an alliance. However, should we regard fundamental rights as instrumental to economic enterprise, we would go against the grain of our Constitution – whose Article 2 states that “The Republic recognises and guarantees the inviolable rights of man…”, whilst under Article 41 “Private economic enterprise shall be free. It shall not be carried out against the common good, or in a way that may harm security, freedom and human dignity”. 2. Codes of Conduct, New Technologies and Multinational Rules During the abovementioned Brussels Conference, revision of the 1995 directive on privacy was found to be inappropriate. Therefore, the basic data protection principles have not been questioned so far – such principles dating back to the OECD Guidelines(6) as well as to the Council of Europe Convention of 1981; it is expected that they will be recognised at the highest level once the role of the Charter of Fundamental Rights of the EU (Article 8) is clarified.(7) However, the request was made to identify approaches that could enhance harmonised application of the principles laid down in the Directive in the individual (3) The Conference proceedings are available in H. Bäumler – A.v. Mutius (eds.), Datenschutz als Wettbewerbsvorteil – Privacy sells: Mit modernen Datenschutzkomponenten Erfolg beim Kunden, Braunschweig – Wiesbaden, 2002. (4) A full agenda of the preparatory activities can be found at http://www.itu.int/wsis/index.html. (5) “The Bucharest Declaration” is available at http://www.itu.int/wsis/events/bucharest.html; see also the “Declaration of the Bishkek-Moscow Conference on the Information Society”, at http://www.itu.int/wsis/events/bishkek.html. (6) OECD, Recommendation Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data, adopted by OECD on 23 September 1980 (OECD Privacy Guidelines), Doc. C 58 final of 1 October 1981; validity of the principles set forth in the Guidelines was recently re-affirmed by OECD also with regard to computerised networks: see Ministerial Declaration on the Protection of Privacy on Global Networks, Ottawa, 7-9 October 1998, p. 4 (DSTI/ICCP/REG(98)10/FINAL). (7) See http://www.europarl.eu.int/charter/default_en.htm. Mauro Paissan - What Privacy? 111 EU Member States – also by developing more pragmatic approaches and simplifying the regulatory framework, without prejudice to citizens’ freedoms. Indeed, citizens are often poorly aware of the rights they are entitled to as well as of the ways in which they can exercise such rights. Among the measures aimed at enhancing effectiveness of data protection provisions, reference was made both to codes of conduct and to PETs. As to the latter, it should be stressed that, apart from precisely identifying their contents and establishing whether they may be suitable to soften the impact on privacy, the limited implementation experience and difficult marketability were highlighted. These issues should be taken into account in order not to lose contact with reality, especially in connection with the growing use of technologies that allow, for instance, data mining and/or extraction and processing of personal data from different databases and the network. Additional tools to make data protection provisions more appealing – or rather, more acceptable – are provided by codes of conduct and professional practice(8); they are being increasingly favoured in Italy’s legal system as well, with particular regard to data protection matters.(9) We all are aware of their advantages in terms of their being closer to the specific issues that are to be coped with by the relevant categories. However, one should not overlook the difficulties that sometimes arise – especially as regards identifying the entities that actually represent the interests at stake. This task is as good as impossible if the effects of such instruments concern undifferentiated groups of entities, as well as whenever the interests at stake require activities that go beyond technical know-how and border on law policy issues that cannot but be left to Parliamentary discretion. Still, applying rules that have been developed autonomously by private entities – being similar, from this viewpoint, to codes of conduct – is increasingly being regarded as an additional tool to overcome one of the main sources of concern for businesses, which nowadays are often established in several countries worldwide given the globalisation of markets. I am referring here to the provisions aimed at regulating transborder data flows from Europe to third countries, in which no adequate level of protection is available. I will leave this issue to our guest speakers. Let (8) This issue was dealt effectively by C.D. Raab, Effective self regulation – genuine protection or a contradiction in terms?, Paper prepared for the 24th International Conference of Data Protection and Privacy Commissioners, Cardiff, 9-11 September 2002. (9) Codice di deontologia relativo al trattamento dei dati personali nell’esercizio dell’attività giornalistica ai sensi dell’art. 25 della legge 31 dicembre 1996, n. 675, adottato con provvedimento del 29 luglio 1998; Codice di deontologia e di buona condotta per i trattamenti di dati personali per scopi storici, adottato con provvedimento del 14 marzo 2001. Codice di deontologia e di buona condotta per i trattamenti di dati personali a scopi statistici e di ricerca scientifica effettuati nell’ambito del sistema statistico nazionale, adottato con provvedimento del 31 luglio 2002 . 112 Da costo a risorsa - Attività produttive e protezione dei dati personali me only point out that the European Commission and the national supervisory authorities, also within the framework of the cooperation activities carried out by the Article 29 Working Party, have made considerable efforts in order to meet market requirements by allowing free movement of personal data through different tools such as the Safe Harbor Agreement(10) and Standard Contractual Clauses(11). Although these tools reduce the opportunities for controlling data processing arrangements outside Europe, they do not eliminate such controls. Conversely, the latter type of concern is more difficult to assuage as regards other contractual instruments that might allow personal data originating from the EU to circulate freely inside multinational companies. 3. Personal Data Protection inside Businesses, with Particular Regard to Employee Data Whilst the above considerations apply to businesses’ outward economic activities, reference should also be made to the equally important issues related to setting out data circulation rules inside businesses. Only think of the information flows in management and organisational processes, the issues related to Intranets and, in particular, the processing of personal data in the employment context. The latter requires some additional considerations. It is no new topic, and it was addressed many years ago as regards Italy – where the so-called workers’ statute was passed(12), an Act setting forth safeguards for employees and their private life. However, the massive introduction of information technologies into production processes and business organisation has changed the overall pattern. From this viewpoint, e-mail and Internet access monitoring is merely the tip of an iceberg. To this, other issues should be added that are of no smaller moment and relate to a wide time span – starting from the recruitment phase, when personal information on applicants is collected. Information is subsequently collected in the course of the employment relationship by using the most different methods – including tests – and with regard to many different categories of data. Only think, for instance, of the so-called evaluation data, of genetic data – whose collection may entail serious discrimination -, drug, alcohol and smoking tests, the active badges allowing employee geographic location and the monitoring of voice-mails and computers. (10) Commission Decision of 26 July 2000 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequacy of the protection provided by the safe harbour privacy principles and related frequently asked questions issued by the US Department of Commerce; see also the web site of the US Department of Commerce at http://www.export.gov/safeharbor/. (11) See the European Commission’s decisions at http://www.europa.eu.int/comm/internal_market/en/dataprot/modelcontracts/index.htm (12) Act no. 300 of 20.05.1970. Mauro Paissan - What Privacy? 113 Video surveillance should also be mentioned in this context. These are hot issues in many countries. Supervisory authorities have repeatedly taken steps in this regard, and the same issues were addressed by the Article 29 Working Party.(13) European data protection authorities have been urged to take stance in respect of this subject matter. The underlying concerns are real and should not be dismissed as the “obsession” of data protection experts. To confirm this, it would be enough to leaf through the recent European Commission’s Communication on the “Second Stage Consultation of Social Partners on the Protection of Workers’ Personal Data”, where issuing of a Directive in this sector is envisaged.(14) It is a thorny issue that is not amenable to simplistic solutions. For instance, as regards e-mails sent and received by an employee via his/her office PC, the inalienable right to confidentiality of correspondence is at stake – which is sometimes opposed to the entrepreneur’s ownership right in respect of business worktools. Complexity of these issues does not make it less urgent and necessary to start an open discussion between all the social partners and legal and scientific scholars. I would like to highlight this requirement to businesses, which too often prefer to ignore problems and make recourse to practical measures, trade unions, which are unaccountably paying little attention to these issues - partly perhaps because of the fact that the employees that are most affected are those that are least represented in trade unions - and to law scholars, who have not yet come up with suggestions that are equal to the expectations. Increased attention to and awareness of this issue by both social partners and the legal and scientific world would also facilitate our institutional activities., (13) See Working document on the surveillance of electronic communications in the workplace, 29 May 2002, DG MARKT/5401/01, WP 55; Opinion 8/2001 on the processing of personal data in the employment context, 13 September 2001, DG MARKT 5062/01, WP 48; Recommendation 1/2001 on Employee Evaluation Data, 22 March 2001, DG MARKT 5008/01, WP 42. (14) The Communication, published in October 2002, is available at http://europa.eu.int/comm/employment_social/socdial/labour/dataprot_en.pdf 114 Da costo a risorsa - Attività produttive e protezione dei dati personali Mercato: trasparenza e privacy Luigi Spaventa (1) In linea di principio si potrebbe argomentare che io sono una controparte del Garante per la privacy. Il motto dei regolatori dei mercati è infatti, o dovrebbe essere, quello del giudice Brandeis: sunlight is the best disinfectant. Se le informazioni non vengono alla luce e non sono rese pubbliche il regolatore dei mercati finanziari si preoccupa e viene preso da pruriti sanzionatori. Cercherò di argomentare che così non è e così non deve essere, cominciando da qualche constatazione di base. Il regolatore dei mercati finanziari e degli emittenti parte dalla premessa che l’investitore si trova in una posizione di endemica inferiorità: in gergo economico, diciamo che si manifesta un problema di agency cost, di costo di agenzia: vi è un principal, l’investitore, che affida i suoi soldi a soggetti che non conosce e non conoscerà mai; vi è un gestore, l’agent, i cui interessi non necessariamente (o se vogliamo essere pessimisti, raramente) coincidono con quelli dell’investitore. L’inferiorità dell’investitore a motivo di alcune cause che sono richiamate nella teoria economica: asimmetrie informative, perché ne sa molto meno del gestore del fondo, del manager, dell’executive officer; incompletezza dei contratti che non possono prevedere tutte le possibilità da cui cautelarsi. Il problema della protezione del risparmiatore si è posto, come tutti sanno, da tanto tempo, e fu affrontato per la prima volta negli Stati Uniti con la legge del 1934. La protezione degli investitori, soprattutto sul versante societario, opera con due strumenti. Anzitutto si devono offrire all’investitore rimedi legali e rimedi “di voce”. I rimedi legali consistono nella possibilità di ottenere la protezione dei tribunali, contro i manager e gli amministratori sia per vere e proprie frodi o, nel caso della giurisprudenza americana, per violazione del fiduciary duty o del duty of care. I rimedi di voce mirano a dare ogni possibilità all’azionista di partecipare all’assemblea, di esprimersi, di votare. Non meno importante, o forse più importante, è consentire all’investitore di votare con il portafoglio, favorendo la sua possibilità di exit dall’investimento. Per esercitare il diritto di exit (o di entry se vogliamo) è essenziale che il risparmiatore abbia ogni informazione possibile. Quindi l’informazione piena e trasparente è una condizione necessaria per un funzionamento dei mercati in cui si formino prezzi significativi e l’investitore non sia esposto a sorprese per circostanze che egli non conosce. Naturalmente le società, gli emittenti tengono molto alla loro privacy. E ancor più l’amano i manager delle società. E quindi le autorità di vigilanza sono in rotta (1) Presidente Consob Luigi Spaventa - Mercato: trasparenza e privacy 115 di collisione con questo comprensibile ma non ammissibile desiderio di privacy. Quali informazioni non collidono con le regole di cui parlo e quali altre rischiano di collidere? Certamente non si può ritenere che le informazioni che riguardano la persona giuridica società possano collidere con esigenze di privacy. Quindi vi sono ovunque delle regole molto precise riguardanti sia gli obblighi di informazione periodica nei financial reports che devono essere presentati a cadenze trimestrali, semestrali e annuali, sia l’informazione continua. Recentemente anche sull’informazione periodica si sono avuti degli sviluppi interessanti. Svegliandosi, il nuovo (e già vecchio, perché se ne è già andato), chairman della Security Exchange della Commission, ha detto che un bilancio o le relazioni trimestrali o semestrali dovrebbero consentire agli investitori di vedere la società “attraverso gli occhi del management”, con ciò mettendo in dubbio che il gergo contabilese o giuridichese impiegati nei bilanci riescano a dare le informazioni richiesta dal risparmiatore. Per quanto riguarda l’informazione continua, vi sono delle differenze di definizione ordinamentale: negli Stati Uniti si parla di material information, in Europa, a norma di direttiva, si parla di price-sensitive information – ovvero di ogni informazione che possa avere influenza sui prezzi. Vi sono almeno due punti per i quali possono cominciare a porsi dei problemi di collisione con le regole di privacy. Il primo è l’imposizione di un obbligo agli amministratori di denunciare nei documenti di bilancio le remunerazioni che essi percepiscono e i benefici che essi ricevono dalla società. Perché questa richiesta da parte delle autorità di controllo? Perché si ritiene che gli azionisti debbano poter valutare se quanto (e solitamente non poco) essi pagano al manager e agli amministratori sia bene speso e al fine di dar conto di tutti altri meccanismi di remunerazione, che non sono per così dire in busta paga, fra cui soprattutto le stock options. La seconda informazione, forse ancora più delicata, riguarda le negoziazioni che un amministratore di società compie sui titoli della società medesima. Tale informazione è importante, perché l’amministratore possiede conoscenze sulla società che l’azionista non possiede. Da un lato occorre verificare che non vi siano episodi di insider trading. Dall’altro quelle transazioni danno un’indicazione dell’atteggiamento del management nei confronti della sua società. Rammento che, con il caso Enron si è constatato che gli amministratori della settima società americana, alla vigilia del fallimento della medesima, avevano avuto utili per 600 milioni di dollari, vendendo le azioni della propria società quando le quotazioni erano ancora alte: il che non ha fatto una buona impressione. Né ha fatto una buona impressione aver scoperto che l’amministratore di un’altra società, anch’essa ora in fallimento, si era arricchito o aveva migliorato la sua vita comprando quadri da collezione a spese dell’azienda. Questi sono i due punti di potenziale collisione con il Garante della privacy ma solo potenziale. In attuazione del decreto legislativo 58/98 la Consob dispose l’ob- 116 Da costo a risorsa - Attività produttive e protezione dei dati personali bligo di pubblicità dei compensi degli amministratori. Personaggi eminenti mi onorarono della loro visita per rappresentarmi che, ove avessero detto quanto guadagnavano, vi sarebbero stati pericoli di rapimento; o che la pubblicazione dei compensi avrebbe reso difficile le trattative sindacali. Fu eccepita la violazione della privacy, e, comunque, la illegittimità della disposizione. Queste istanze non hanno avuto esito. Il Garante, infatti non ritenne che la pubblicazione dei compensi fosse in violazione del diritto alla riservatezza. E anche il Tar, decise, che la Consob poteva imporre questo obbligo. Siamo grati al Garante per la sua decisione: grazie ad essa ora quei dati vengono correntemente pubblicati. Il problema del insider dealing, ossia della negoziazione dei titoli della società da parte di amministratori, è più complicato. La Consob non ha base legislativa per imporne l’immediata comunicazione. Recentemente in un sussulto di innovazione, il gestore del mercato, ossia la borsa, decise di imporre un obbligo di disclosure, inizialmente mensile e diventato poi trimestrale. Borsa chiese al Garante se era ad essa consentito richiedere quelle informazioni. Ancora una volta il parere fu favorevole. Mi pare dunque che mai vi è stata collisione fra gli interessi protetti dalla Consob e quelli protetti dal Garante. Il Garante, nei due casi che ho citato, ha ben compreso dove debba essere stabilito il limite della protezione dei dati personali, al fine di non sacrificare altre esigenze. In alcuni casi avviene che gli interessi siano perfettamente coincidenti: come quando si viola la privacy per trarre profitti. Faccio un esempio frequente che riguarda la grande categoria dell’insider trading (abuso di informazioni privilegiate previsto dall’articolo 180 del testo unico sull’intermediazione finanziaria). Entro questa categoria il front running è una pratica temo molto diffusa: l’operatore che ha notizie di un grosso ordine di un cliente, che può far salire o scendere il prezzo, inserisce in anticipo un proprio ordine, per trarre beneficio della prevedibile variazione di prezzo. In questo caso l’operatore al tempo stesso viola in qualche modo gli obblighi di riservatezza verso il cliente, viola norme di correttezza e commette il reato di abuso di informazioni privilegiate. Né mi pare che vi sia violazione della privacy se, nel corso di indagini preliminari per l’insider trading o per manipolazione, si acquisiscono le registrazioni dei traders (sovente molto divertenti, per l’uso libero, diciamo così, della lingua italiana e per la franchezza di espressione). Per finire, vi sono dei problemi che invece non sono di agevole soluzione. Una delle più efficaci sanzioni in un mercato che funzioni è quella definita reputazionale: il mercato dovrebbe essere messo a conoscenza dei comportamenti scorretti o illegittimi di un soggetto, per trarne le conseguenze sull’affidabilità del soggetto medesimo. In Italia questa sanzione di mercato funziona poco. Ad esempio il volontario pagamento, dopo la contestazione, di una sanzione pecuniaria inferiore al mas- Luigi Spaventa - Mercato: trasparenza e privacy 117 simo (l’oblazione, come dicono i giuristi) non solo estingue il procedimento sanzionatorio, ma impedisce anche la pubblicità, poichè solo l’irrogazione della sanzione può essere resa pubblica. Il mercato non ne saprà mai nulla; il soggetto ha la possibilità di acquistare questo silenzio con il pagamento di una somma relativamente esigua. Non mi sembra un risultato ottimo. Con questa notazione concludo e ringrazio per l’attenzione. 118 Da costo a risorsa - Attività produttive e protezione dei dati personali Marketplace: Openness and Privacy Luigi Spaventa (1) In principle, one might argue that actually I am a counterpart of the Italian data protection authority. Indeed, the motto of market regulators is – or should be – the one referred to by Justice Brandeis – i.e. sunlight is the best disinfectant. If the information is not brought to light and made public, the regulator of financial markets gets worried and starts itching for punishments. I will try and show that this is not and should not be the way things are, beginning from a few basic considerations. Regulators of financial markets and issuers start from the assumption that investors are in an intrinsically inferior position; to use the economics jargon, one might say that there is an agency cost issue: there is a principal, i.e. the investor, committing his money to entities he does not and never will know; then there is a manager, the agent, whose interests do not necessarily coincide – one might argue pessimistically that they rarely do – with the investor’s ones. The investor’s inferiority is due to reasons that are referred to in economics theories, such as information asymmetry – since he is definitely less familiar with these matters than the manager and/or the executive officer – and contractual gaps, since not all the dangers to be averted can be envisaged. The issue of protecting investors was raised long ago, as all of you know; indeed it was addressed for the first time in the Usa with the 1934 Act. Protection of investors is based on two main tools, especially as regards companies. Firstly legal and “voice” remedies should be made available to investors. Legal remedies consist in the possibility to seek judicial protection against managers and directors both in case of fraud and – as regards US case law – on account of breach of fiduciary duty or the so-called duty of care. Voice remedies are aimed at enabling shareholders to the greatest possible extent to participate in the assembly, express their opinions and cast their votes. Of no less importance, perhaps even more important, is providing investors with the possibility to vote with their wallets – by facilitating their exiting from the investment. In order to exercise their exit rights – or their entry rights, as the case may be -, it is fundamental for investors to be provided with all possible information. Full, transparent information is therefore a prerequisite to ensure operation of markets in a way allowing significant prices to be generated and preventing investors from being exposed to unexpected events on account of circumstances they are not aware of. Obviously companies/issuers are quite keen on their privacy. Company man(1) President of CONSOB [Italian Authority Regulating the Securities Market] Luigi Spaventa - Marketplace: Openness and Privacy 119 agers are actually even keener on this issue. Therefore, supervisory authorities are bound to be on a collision course with this understandable, though not admissible, desire for privacy. What information is not in conflict with the rules I have been referring to, and what other information is in danger of being in conflict with them? Certainly the information concerning companies as legal persons may not be considered to be in conflict with privacy requirements. Therefore, there are everywhere quite detailed rules in place concerning the obligation both to regularly provide information via financial reports to be submitted at quarterly, six-month and yearly intervals, and to provide continuous information. Interesting developments took place recently also with regard to the provision of regular information. Waking up from his slumber, the new chairman of the Securities Exchange Commission – indeed, he should be referred to as the past chairman, since he has already left his position – said that a balance sheet as well as quarterly or six-month reports should allow investors to see a company “through management eyes”, which would appear to question the capability of the accounting and legal jargon used in balance sheets to supply the information requested by investors. As for the continuous information, there are differences related to the individual legal systems. In the Usa reference is made to material information, whereas in Europe this should be – as per the Directive – price-sensitive information, i.e. any kind of information possibly influencing prices. There are at least two areas where there may arise a conflict with privacy regulations. A first one has to do with the obligation imposed on directors to disclose, in accounting reports, their salaries and the benefits granted to them by their companies. Why has this been requested by supervisory authorities? Because it is considered that shareholders should be in a position to assess if what they pay to managers and directors – which is usually not negligible – is money well spent, as well as in order to account for all other remuneration mechanisms that are not included in pay-slips – including, above all, stock options. A second set of information, which is perhaps even more sensitive, is related to the negotiations made by directors in respect of a company’s securities. This information is important because directors are in the possession of data that are not known to shareholders. On the one hand it is necessary to check that no insider trading takes place. On the other hand, those transactions provide clues to the stance taken by managers in respect of their companies. Let me only remind you that, in connection with the Enron case, it was found that the directors of the seventh-largest US company had managed to get 600 million dollars on the eve of the company’s winding up by selling their shares when the quotations were still high – which definitely did not make a good impression. Nor did it make a good impression when it was found that the director of another company, currently wound up, had got richer – perhaps one should say that he had 120 Da costo a risorsa - Attività produttive e protezione dei dati personali improved the quality of his life – by purchasing pictures at the company’s expense. These are the two areas in which we are potentially on a collision course with the Italian data protection authority – however, this is only a potentiality. In implementing legislative decree no. 58/98, Consob required that directors’ salaries should be made public. Distinguished personages obliged me with their visit to explain that, by disclosing their salaries, they would run the risk of being kidnapped, or that publishing their salaries would hinder negotiations with trade unions’ representatives. It was claimed that these provisions would be in breach of their privacy – at all events, that they were unlawful. These claims have had no consequences. Indeed, the Italian data protection authority did not consider that disclosing directors’ salaries was against the right to privacy. The administrative court competent for this subject matter also ruled that Consob was empowered to impose this obligation. We are grateful to the Italian Garante for its decision, which allowed those data to be regularly published. The insider dealing issue, i.e. the negotiation by directors of a company’s securities, is more complex. There is no legal basis allowing Consob to require this information to be immediately notified. Recently, the Stock Exchange authorities decided, in a sudden rush of innovation, to impose mandatory disclosure of this information firstly on a monthly, and thereafter on a quarterly basis. The Stock Exchange asked the Garante whether they were allowed to request such information; once again, the Garante ruled that this was to be permitted. Therefore, it seems to me that there has never been any collision between the interests safeguarded by Consob and those protected by the Italian Garante. In both cases I mentioned, the Garante clearly appreciated where the boundaries of personal data protection should be set in order not to jeopardise other requirements. In other cases our interests happen to be the same – for instance, whenever privacy rules are infringed with a view to gain. Let me give you an example that has to do with insider trading activities – what is termed “misuse of privileged information” under Section 180 of the Consolidated Statute on Financial Intermediation Activities. In this context, the so-called front running is unfortunately quite common a practice. A broker knowing that a customer is going to place a major order, which will cause prices to increase or decrease, enters his own order first to profit from the expected price variation. In this case, the broker acts both in breach of his confidentiality duties with regard to his customer and in breach of fairness rules, and is also liable for the offence of misusing privileged information. Nor do I believe that privacy is infringed if, during preliminary inquiries into insider trading activities and/or manipulation, tapes of the traders’ conversations are acquired – which are often quite amusing, given their – so to say – unconventional usage of the Italian language. Luigi Spaventa - Marketplace: Openness and Privacy 121 To conclude, there are issues that cannot be solved that easily. One of the most effective penalties in a functioning market is the reputational one – that is to say, the market should be informed of any instance of unfair and/or unlawful conduct by a given entity so as to draw the relevant conclusions as for that entity’s reliability. In Italy, this market-based punitive mechanism does not work properly. For instance, paying a fine voluntarily to an extent lower than the maximum amount not only results into extinguishing the proceeding involving punitive sanctions, but also prevents disclosing the relevant circumstances - since only imposition of a punishment may be disclosed. Therefore, the market will never be informed of this occurrence. The entity concerned is enabled to purchase this silence by paying a comparatively small sum. I would not regard this as an excellent achievement. This was my last remark. Many thanks for your attention. 122 Da costo a risorsa - Attività produttive e protezione dei dati personali The Impact of Privacy Policies on Business Processes Martin Abrams (1) (1) Center for Information Policy Leadership - Usa Martin Abrams - The Impact of Privacy Policies on Business Processes 123 124 Da costo a risorsa - Attività produttive e protezione dei dati personali Martin Abrams - The Impact of Privacy Policies on Business Processes 125 126 Da costo a risorsa - Attività produttive e protezione dei dati personali Martin Abrams - The Impact of Privacy Policies on Business Processes 127 128 Da costo a risorsa - Attività produttive e protezione dei dati personali Martin Abrams - The Impact of Privacy Policies on Business Processes 129 130 Da costo a risorsa - Attività produttive e protezione dei dati personali Does Business Need In-House Self-Regulation? A self-regulatory approach taking as an example the data protection policy of the DaimlerChrysler AG Alfred Büllesbach(1) I. Introduction The continuing development of our information society changes the way of doing business. Computer networks have been developed from proprietary and regional systems to open and global infrastructures, services that were separated until now have been developed into multimedia applications(2) and information technology allows interaction between software components based on various platforms. This development promotes a worldwide exchange of goods and services which leads to the consequence that competition becomes more and more a global challenge. The more modern information and communication technologies are used for various purposes, the more data are accumulated which increases the possibilities of matching and processing personal data collected in different connections. This development leads simultaneously to a raise of the potential risks of fraudulent use of data which might adversely affect the privacy rights of data subjects. The classic risks of unauthorized access, data loss, data manipulation, data theft and computer crime are omnipresent, especially within the framework of global networking, cooperation and diverse use of public networks. These potential risks for the privacy rights of data subjects become more and more subject of public discussions which leads at the same time to a raise of the concerns of consumers and contracting partners regarding the collection and use of their personal data by companies. Due to this increased sensitivity the handling of personal data becomes an important aspect in the course of choosing one’s business partner. Therefore, the development and integration of appropriate data security and data protection concepts in products and services is crucial for companies acting in global markets. In designing data protection and security concepts, companies have to consider legal as well as technological methods and instruments. II. Tendencies of the worldwide privacy legislation Overall, increasing activities in enacting data protection laws can be observed. (1) Chief Officer Corporate Data Protection Daimler Crysler - Germany (2) Büllesbach, Konvergenz durch Standardisierung und Selbstregulierung, in DGRI Jahrestagung 2001, forthcoming; Holznagel, Konvergenz der Medien, in DGRI Jahrestagung 2001, forthcoming. Alfred Büllesbach - Does Business need In-House Self-Regulation? 131 Due to the lack of a globally competent legislator, worldwide acting companies have to cope with different legal requirements laid down by national lawmakers. Especially, in Asian countries there is a wide-spread tendency of incorporating data protection and privacy issues in laws governing electronic commerce. On the one hand, by addressing privacy concerns of data subjects by means of legal regulations it is intended to overcome resistance to online transactions. On the other hand, these countries want to ensure that the power of law enforcement authorities will not be undermined by using modern information and communication technologies. Another important influence on international data protection legislation has to be attributed to regulations restricting the transfer of personal data to third countries that are not considered as countries providing an adequate level of data protection. These requirements result for instance from art. 25 of the EC-Directive,(3) or from Principle 9 of the National Privacy Principles of the Privacy Amendment (Private Sector) Act of Australia,(4) or from Sec. 33 of the Personal Data (Privacy) Ordinance of Hong Kong,(5) or from art. 24 of the Computer-Processed Personal Data Protection Law of Taiwan(6) as well as from Sec. 12 of the Personal Data Protection Act of Argentina,(7) or from art. 10 of the Draft of the Senate Bill No. 61 of Brazil.(8) In order to avoid a hindrance of transborder data flow, national legislators are forced to take actions. The attacks of September 11, 2001 have led to remarkable changes in the legislative framework of almost all industrialized societies worldwide. Broadly speaking, these changes have led to increased powers for “public authorities” all around the world sometimes with direct or indirect impact on the protection of personal data. In spite of the diversity of national data protection laws, it is ascertainable that the data protection and privacy legislation is on the way to an international law convergence.(9) Worldwide it could be generally differentiated between the following three models taken by legislators in order to address privacy issues: - a comprehensive regulatory approach, - a sector specific approach, - a self-regulatory approach. (3) Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal L 281, 23/11/1995. (4) Privacy Amendment (Private Sector) Act of 2000, http://www.privacy.gov.au/act/index.html. (5) Personal Data (Privacy) Ordinance of 1995, http://www.pco.org.hk/english/ordinance/ordglance.html. (6) Computer-Processed Personal Data Protection Law of 1995, http://www.virtualasia.com/taiwan/bizpack/legalcodes/cpdpl.htm. (7) The Personal Data Protection Act of Argentinia of 2000, http://www.privacyexchange.org. (8) Draft of the Federal Senate Bill No. 61, 1996, http://www.privacyexchange.org. (9) Büllesbach, Datenschutz in einem globalen Unternehmen, RDV 2000, 1, p. 2. 132 Da costo a risorsa - Attività produttive e protezione dei dati personali These approaches do not exclude each other. On the contrary, often legislators make use of a combination of two or even three of these models in order to provide an appropriate regulatory data protection scheme. 1. Comprehensive approach Characteristically, acts following the comprehensive approach stipulate requirements for the collection, processing and use of personal data by public as well as by private sector entities,(10) regardless of the application and the purpose for which the data is collected. These acts grant data subjects access and correction rights in respect to their personal data and provide for sanctions in case of a violation of data protection regulations, like compensation for damages or criminal offenses. The observance of these legal requirements is ensured by external governmental controlling bodies, which have the power to investigate actions that might contravene privacy regulations. The EC-Directive and consequently all member states follow the comprehensive regulatory approach. A lot of European states which are not member of the EC have Privacy Acts that are leaned on the EC-Directive. Some countries of the Asia/Pacific region like Australia, Hong Kong, New Zealand and Taiwan have implemented this regulatory model as well. The Privacy Act of New Zealand provides for the appointment of an internal data protection officer whose responsibilities include the encouragement of the compliance with the act by the respective entity.(11) Under the Australian Privacy Amendment (Private Sector) Act private sector entities may develop their own rules for the protection of privacy which might substitute the National Privacy Principles and which are enforced by the private sector entity itself and overseen by governmental control institutions. In North America, only Canada has adopted a privacy system according to the comprehensive regulatory approach. The new privacy protection legislation in Chile and Argentina also reflects the European Data Protection Directive 2. Sector-specific approach Countries which have followed this approach have not enacted a general data (10) Concerning the Computer-Processed Personal Data Protection Law of Taiwan it has to be noticed that this act applies only to any credit investigation business or organization or individual whose principal business is to make the collection of computerized processing or personal data any hospital, school, telecommunication business, financial business, securities business, insurance business, and mass media and other enterprises, organizations, or individuals designated by the Ministry of Justice and the central government authorities in charge of concerned end enterprises (see art. 3 no. 7 of the ComputerProcessed Personal Data Protection Law of Taiwan). (11) See Sec. 23 of the Privacy Act of New Zealand. Alfred Büllesbach - Does Business need In-House Self-Regulation? 133 protection law, but have issued regulations governing data protection issues for particular applications, e.g. the financial sector, the telecommunications sector or electronic commerce. According to US legal tradition, law is primarily intended to protect the citizen from encroachments by the government. The regulation of the relationships between private (individuals and/or corporations) is to be avoided where possible. Consequently, the US-private sector is in regard to privacy issues only affected by several area-specific regulations In the Asia/Pacific region, the Philippines(12) as well as South Korea(13) and China have enacted specific regulations of different kinds. Apart from the efforts to enact comprehensive data protection laws, up to now there are only sector-specific regulations in Singapore(14), India(15), Malaysia(16) and Thailand(17). 3. Self-regulatory approach The self-regulatory approach is based on the idea that data protection can be achieved through various forms of self-regulation, in which companies and industry bodies establish codes of practice and engage in self-policing. Global acting companies have to ensure the compliance with a diversity of national regulations. Self-regulatory mechanisms might be very helpful to cope with the heterogeneity of the data protection legislation. To ensure the variety of legislation a permanent analysis of the different national legislative activities is necessary. An effective internal enforcement infrastructure is also needed. These activities can conduct to a global strategy which is especially needed for transborder data flow and electronic commerce. The increasing customer awareness is also an important fact that should be taken into consideration by a global data protection strategy being based on self-regulatory mechanisms. The loss of revenue in the e-commerce-sector because of priva(12) E.g. Bank Secrecy Act (Republic Act 7653); Secrecy of Banks Deposits Act (Republic Act No 1405); E-Commerce Act of 2000 (Republic Act No 8972 of 2000, http://www.chanrobles.com/republicactno8792.htm) (13) E.g. Law on the Protection of Personal Information managed by Public Agencies of 1994; Act on the Disclosure of Information by Public Agencies of 1996; Basic Act on Electronic Commerce 1999; Law on the Protection of Communications Secrecy Act of 1993; Telecommunications Business Act of 1991; Act Relating to Use and Protection of Credit Information of 1995; Postal Services Act of 1982 (14) E.g. Banking Act, last amended 2001; Computer Misuse (Amendment) Act of 1998; Electronic Transactions Act 1998; for further information see http://www.lawnet.com.sg/. (15) E.g. Information Technology Act; for further information see http://www.mbc.com and Electronic Privacy Information Center, Privacy & Human Rights 2001 An International Survey of Privacy Laws and Developments, USA 2001, p. 173 (16) E.g. Communications and Multimedia Act of 1998, http://www.cmc.gov.my/legislationframe.htm; Computer Crime Act of 1997, http://www.ktkm.gov.my; Banking and Financial Institutions Act of 1989 (17) Official Information Act B.E. 2450 of 1997, http://203.152.23.33/html/fslaw_e.htm. 134 Da costo a risorsa - Attività produttive e protezione dei dati personali cy concerns(18) and the general increasing interest in privacy(19) make a proactive engagement in data protection and privacy very important. There are several instruments of self-regulation that could be combined to achieve a comprehensive data protection strategy. Self-declarations as consumer confidence and privacy statements transport the strategy to the public. Corporate standards of conduct are binding the companies and employees. The participation in privacy programs guaranteed by bilateral contracts as the Safe Harbor Principles (EC/USA) could be another building block in a global privacy strategy. To effectively carry through a global strategy a quality management system being based on internal or external audits is needed. By way of privacy seals external audits could be provided to the public. Self-control could also be implemented by establishing a organization of data protection officers. A parallel usage of these self-regulatory instruments is conceivable and partly necessary to address the arising privacy issues. Apart from self-regulatory approaches integrating many companies, there are also different mechanisms which could be used by single companies, like Codes of Conduct, Integrity Codes, Privacy Statements in order to inform the contractors or potentials about one’s privacy policy, or contractual solutions using model clauses in specific areas of application.(20) III. Challenges for global acting companies The self-regulatory approach could also be used to cope with the problems concerning transborder data flows. In general, according to art. 25 para.1 of the EC-Directive, or Principle 9 of the National Privacy Principles of the Privacy Amendment (Private Sector) Act of Australia, or Sec. 33 of the Personal Data (Privacy) Ordinance of Hong Kong, or Sec. 12 of the Personal Data Protection Act of Argentina, or art. 10 of the Draft of the Senate Bill No. 61 of Brazil, a transfer of personal data to a third country requires that the third country in question ensures an adequate level of data protection. According to art. 25 para.2 the European Commission may consider a third country to be providing an adequate level of data protection.(21) A similar authorization is particularly (18) FT, 28 Feb. 2001: 12 million people stopped buying over the net because of privacy concerns. That relates to $ 12 billion loss of revenue generated over e-commerce. (19) Westin Research: Privacy Fundamentalists, 25 % in 1990, same in 2000; Privacy Pragmatists, 55 % in 1990, increasing to 63 % in 2000; Privacy-Unconcerned, 20 % in 1990, dropping to 12 % in 2000. (20) Regarding the term “self-regulation” and self-regulatory instruments see Bizer, Selbstregulierung des Datenschutzes, DuD 2001, p. 168. (21) See for further information Jacob, Datenübermittlungen in Drittländer nach der EU-Richtlinie in Büllesbach (ed.) Datenverkehr ohne Datenschutz, Verlag Dr. Otto Schmidt KG, 1999. p. 25 ss.; Brühann, Die aktuelle Debatte um den Alfred Büllesbach - Does Business need In-House Self-Regulation? 135 granted by Sec. 33 para.3 of the Personal Data (Privacy) Ordinance of Hong Kong to the Commissioner. Up to now, only Hungary,(22) Switzerland(23) and Canada(24) are recognized by the European Commission as countries providing an adequate safeguard. Furthermore, personal data collected in the EU/EEC may be transferred to the U.S. provided that the US-American company adheres to the Safe Harbor Principles and is subject to the jurisdiction of the Federal Trade Commission or another institution which effectively ensures the compliance with the principles.(25) Since the Safe Harbor Principles provide only a solution for the transfer of personal data from the EU/EEC to the US they are not an appropriate instrument for companies exchanging personal data worldwide.(26) If the third country does not ensure an adequate level of data protection a company has the following options to legalize a transborder data flow: - obtaining the consent of the data subject to the transfer(27) or - adducing adequate safeguards with respect to the protection of the privacy and fundamental rights and freedoms of individuals and with regards to the exercise of the corresponding rights. Such safeguards may in particular result from appropriate contractual clauses or Codes of Conduct.(28) Since personal data is transmitted worldwide, a global acting company needs a global solution to cope with the different legal requirements in respect of transborder data flow. internationalen Transfer von personenbezogenen Daten in Büllesbach (ed.) Datenverkehr ohne Datenschutz, Verlag Dr. Otto Schmidt KG, 1999. p. 35 ss.; Simitis, Der Transfer von Daten in Drittländer – ein Streit ohne Ende? in Büllesbach (ed.) Datenverkehr ohne Datenschutz, Verlag Dr. Otto Schmidt KG, 1999. p. 177 ss. (22) Commission Decision of 26 July 2000 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequate protection of personal data provided in Hungary, Official Journal of the European Communities, 8/25/2000, L 215/4. (23) Commission Decision of 26 July 2000 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequate protection of personal data provided in Switzerland, Official Journal of the European Communities, 8/25/2000, L 215/1. (24) Commission Decision of 20 December 2001 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequate protection of personal data provided by the Canadian Personal Information Protection and Electronic Documents Act, Official Journal of the European Communities, 1/4/2002, L 2/13. (25) Commission Decision of 27 July 2000 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequacy of the protection provided by the Safe Harbor Privacy Principles and related Frequently Asked Questions issued by the US Department of Commerce, http://europa.eu.int/comm/internal_market/en/dataprot/news/decision_de.pdf. (26) Critical standpoint to the Safe Harbor Principles is also taken by Karstedt-Meierrieks, Selbstregulierung des Datenschutzes – Alibi oder Change?, DuD 2001, 287, p. 288. (27) See art. 26 para.1 a) of the EC-Directive; Principle 9 (b) of the National Privacy Principles of the Privacy Amendment (Private Sector) Act 2000 of Australia, Sec. 33 para.2(c) of the Personal Data (Privacy) Ordinance of Hong Kong. (28) art. 26 para.2 of the EC-Directive, Principle 9 (f ) of the National Privacy Principles of the Privacy Amendment (Private Sector) Act 2000 of Australia, Sec. 33 para. 2 (f ) of the Personal Data (Privacy) Ordinance of Hong Kong. See also Büllesbach, Überblick über Europäische Datenschutzregelungen bezüglich des Datenaustausches mit Ländern außerhalb der Europäischen Union, RDV 2002, forthcoming. 136 Da costo a risorsa - Attività produttive e protezione dei dati personali IV. Advantages of the Code of Conduct in comparison to the other solutions Taking all the pros and cons of the several options into account, Codes of Coduct are the best solution to cope with the issues arising from globalization, especially with the requirements of transborder data flow. To obtain a legally effective consent, it will be necessary to inform the data subject in advance about all intended data processings and especially about the fact that her or his data are transferred to substandard countries. Especially, the last notification requirement could raise serious marketing issues. Another problem is that the data subject is not prevented from withholding or revoking her or his consent. If this would be the case, her or his data could not be transferred to a third country. Furthermore, the mere consideration of this possibility could result in complicating the whole data processing process. The usage of contractual clauses allows to consider the peculiarities of each single processing.(29) But, due to the necessity to incorporate these clauses in each single contract as well as to update the contracts in case of changes (e.g. M & A) this concept results in an increased expenditure for administration. Moreover, under the EC-Directive, the contract between the data exporter established in the EU/EEC and the data importer established in the third country to whom the data are transferred must be individually approved by or notified to the appropriate data protection authorities in each Member State from which the data are transferred, making this a time-consuming and expensive process. The risk that the respective data protection authority refuses to provide its approval could be minimized by incorporating model clauses, which are formally adopted by the European Commission being a sufficient safeguard for the transfer of personal data to third countries.(30) In other words, if a company would incorporate the model clauses, the competent authority would be bound by the decision of the European Commission and could not refuse to provide its approval. But, in order to make use of the decision of the Commission, companies are required to adopt the model clauses word by word. Any alteration has to be approved by the respective authority. Additionally the use of model clauses could cause an unacceptable administrative expenditure for complex systems of contracts. Since the model clauses will serve as a benchmark for individually concluded contracts, it is questionable, whether a data protection authority would approve contractual clauses, which do not provide for the same safeguards and rights granted to data subjects as the model clauses do. The Safe Harbor Principles-Program is only created to provide safeguards for (29) Büllesbach/Höss-Löw, Vertragslösung, Safe Harbor oder Privacy Code of Conduct, DuD 2001, 135, p. 137. (30) See Commission Decision of 15 June 2001 on standard contractual clauses for the transfer of personal data to third countries, under Directive 95/46/EC, Official Journal of European Communities, 7/4/2001, L 181/19; Commission Decision of 27 December 2001 on standard contractual clauses for the transfer of personal data to processors established in third countries, under Directive 95/46/EC, Official Journal of European Communities 1/10/2002, L 6/52. Alfred Büllesbach - Does Business need In-House Self-Regulation? 137 the transfer of data from the EC to the US. This covers only a part of the data tranfers of a global acting company and must be combined with other solutions. The combination of the Safe Harbor Principles with other solutions would cause an additional administrative expenditure. Additionally Codes of Conduct provide an answer to other challenges arising from globalization. Even if Codes of Conduct could not be a substitute for national laws, by prescribing worldwide recognized data protection principles which, are based on several national laws, Codes of Conduct provide a possibility for companies to make use of the tendency of law convergence. Codes of Conduct could be easily implemented, controlled and updated which minimizes costs. Furthermore, the adherence to the Codes of Conduct ensures uniform procedures for the handling of personal data within companies. This allows customers to trust that their data is handled in the same manner, regardless where they are, which constitutes a competitive advantage. V. Data protection policy in the DC group As a conclusion it can be said, that a global acting company needs a global data protection policy. The Code of Conduct is the most adequate means of self-regulation for a group-wide data protection policy. It provides an uniform standard and philosophy for the DaimlerChrysler group (DC group), results in an uniform image in data protection of the DC group and satisfies the requirements of Electronic Commerce of today and in the future. The data protection strategy in the DC group is based on three pillars of selfregulation. The Codes of Conduct for customer and HR data provide an uniform standard and philosophy. In order to control the observance of the obligations resulting from Codes of Conduct, an international control infrastructure has been installed. An internal decentralized organization of data protection coordinators which locally undertake the tasks of the Chief Officer Corporate Data Protection has been established. The independent position of the Chief Officer Corporate Data Protection ensures a corporate law enforcement of the Code of Conduct.(31) 1. Codes of Conduct The content of the Codes of Conduct covers: - Aim of the Code of Conduct - Scope of the Code of Conduct - Application of law of individual nations (31) Büllesbach, Konzeption und Funktion eines Datenschutzbeauftragten vor dem Hintergrund der EG-Richtlinie und der Novellierung des 138 Da costo a risorsa - Attività produttive e protezione dei dati personali - Principles for the processing of personal data - Special categories of personal data - Notification and consent of the data subjects - Confidentiality of processing - Principles of data security - Marketing data /data processing on behalf /involvement of third parties - Customer Contact via Telecommunication - Remedies/sanctions/responsibilities - The Chief Officer Corporate Data Protection - Definitions 2. Global Data Protection Organization of DaimlerChrysler The global data protection organization of DaimlerChrysler is divided into four committees for the regions Europe, NAFTA, Asia/Pacific and Latin America each having respective data protection coordinators. Chairman of these committees is the Chief Officer Corporate Data Protection (CPO). The European committee is divided into three subcommittees for central functions and plants, sales and ebusiness and DaimlerChrysler Services. The meeting schedule of the committees is at least once a year. The data protection coordinators are the contact persons for the employees and the customers. They do the consulting and training on the spot. The coordinators also cope with complaints and are responsible for the administration of the decentralized controlling function. Additionally the data protection coordinators have a reporting function to the CPO. 3. Internal law enforcement within the DaimlerChrysler group The internal law enforcement is based on the Chief Officer Corporate Data Protection (CPO) with a worldwide responsibility, who reports directly to the Board of Management. The Chief Data Protection Officer supervises the observance of national and international data protection regulations and of this Code of Conduct. He is supported by decentrally-located data protection coordinators. The companies of the Group and the persons responsible for data processing must ensure that the requirements of data protection are observed. Infringements by employees may be pursued according to applicable provisions of labor law or disciplinary rules. In case of data transfers from one company of the Group located in the EU/ECC (data exporter) to another company of the Group outside the EU/ECC Alfred Büllesbach - Does Business need In-House Self-Regulation? 139 (data importer), the Chief Officer Corporate Data Protection and the data importer must cooperate with the competent supervisory authority in which the data exporter has its seat in the course of all inquiries. If a data subject alleges a breach of this Code of Conduct by the data importer, the data exporter must lend support to the data subject to clarify the situation. The data subject’s rights can also be applied against the data exporter. VI. Summary Considering the fact that there exists no worldwide data protection law and at the same time taking into account that enterprises and markets have gained global dimensions, it is evident that there is a need for worldwide self-regulation as far as data protection and data security are concerned. Privacy is an integral part of quality. A company that recognizes data protection and data security risks as a risk for the company, has an competitive advantage when establishing a global data protection strategy. 140 Da costo a risorsa - Attività produttive e protezione dei dati personali Alfred Büllesbach - Does Business need In-House Self-Regulation? 141 142 Da costo a risorsa - Attività produttive e protezione dei dati personali Alfred Büllesbach - Does Business need In-House Self-Regulation? 143 144 Da costo a risorsa - Attività produttive e protezione dei dati personali Alfred Büllesbach - Does Business need In-House Self-Regulation? 145 146 Da costo a risorsa - Attività produttive e protezione dei dati personali Alfred Büllesbach - Does Business need In-House Self-Regulation? 147 148 Da costo a risorsa - Attività produttive e protezione dei dati personali Alfred Büllesbach - Does Business need In-House Self-Regulation? 149 150 Da costo a risorsa - Attività produttive e protezione dei dati personali Alfred Büllesbach - Does Business need In-House Self-Regulation? 151 Uso a fini privati dei dati personali in mano pubblica Vincenzo Zeno Zencovich(1) Lo sfruttamento economico dei dati personali detenuti da soggetti pubblici presenta indubbie lusinghe: si tratta di grandi numeri, e di dati di rilevante interesse. I soggetti pubblici sono storicamente attrezzati a raccogliere e conservare dati, ma non rientra nella loro tradizione sfruttarli economicamente, attività per la quale è necessaria una attitudine imprenditoriale. Sicuramente un privato saprebbe trarne maggiore profitto, con significative esternalità positive: l’informazione è un fattore importante della produzione e più essa è accessibile, anche se a pagamento, più razionali sono le scelte degli attori del processo economico. È dunque facile cogliere le potenzialità del tema e comprendere i vantaggi che alle imprese deriverebbero dalla accessibilità e facile fruibilità di tali dati. Nel contempo sorgono istintivamente delle perplessità. I soggetti pubblici acquisiscono dati personali in genere sulla base di un rapporto di soggezione del privato il quale è obbligato a fornirli oppure, se vuole avvalersi di taluni servizi o prestazioni, deve identificarsi. Questi dati, acquisiti ratione imperii, verrebbero poi ceduti dietro corrispettivo a terzi i quali li utilizzerebbero per trarne profitto. L’intuitivo squilibrio della situazione descritta si fa più razionale se essa è analizzata con una visuale più ampia. La disciplina del trattamento dei dati personali - a livello comunitario - è anche una regola di allocazione di risorse informative. Non ci si stancherà di evidenziare lo stretto legame fra la Direttiva 95/46 sul trattamento dei dati personali e la - di poco successiva - Direttiva 96/6 sulla tutela giuridica delle banche dati. Con quest’ultima si accorda protezione ad un insieme di informazioni; con la prima si fissano dei limiti alla libera appropriabilità di talune informazioni, i dati personali. L’individuo controlla i dati che lo riguardano e stabilisce se e come possano essere appropriati da terzi. La proposta di direttiva sul “riutilizzo dei documenti del settore pubblico e il loro sfruttamento a fini commerciali” altera significativamente il bilanciamento degli interessi raggiunto da una lettura coordinata delle due direttive. Il primo punto critico è stato già evidenziato: l’individuo è tenuto a fornire i propri dati a soggetti pubblici, venendone in tal modo espropriato. Vi sono tuttavia una serie di vantaggi che egli trae da tale coattiva comunicazione: ottiene l’erogazione di taluni servizi; riceve certezza in ordine al proprio status o a suoi diritti. Il sistema presenta dunque una sua razionalità nel rapporto privato - soggetto pubblico - anche se (1) Università Roma III 152 Da costo a risorsa - Attività produttive e protezione dei dati personali è economicamente poco efficiente nel rapporto fra soggetto pubblico e impresa. Nel sistema divisato egli, indirettamente, cederebbe - senza consenso e senza corrispettivo - i suoi dati a terzi. È vero che questi pagherebbero, ma l’utilità economica spetterebbe solo all’ente pubblico. Quest’ultimo - e non più l’interessato - avrebbe un property right sui dati che gli sono conferiti dai singoli in virtù del rapporto di autorità o di amministrazione. Il secondo punto critico è connesso: la comunicazione dei dati al soggetto pubblico risponde a precise finalità ed è strumentale allo svolgimento di attività pubbliche che, per definizione, dovrebbero essere nell’interesse generale, oltre che, sovente, presentare utilità concrete per l’interessato. È questo interesse generale che guida l’attività del soggetto pubblico imponendo il rispetto di una serie di principi ormai acquisiti nel sistema costituzionale e comunitario: la legittimità, l’imparzialità, la non discriminazione, la proporzionalità della sua azione. Da ciò conseguono regole procedimentali, controlli, responsabilità. È facile comprendere che, nel momento in cui i dati sono conferiti a soggetti privati in primo luogo le finalità del trattamento cambiano mettendo in evidenza l’utilità economica del titolare; in secondo luogo il soggetto privato non è - né è logico che sia - gravato dagli oneri che invece sono propri del soggetto pubblico, essendo la sua azione libera nelle forme e nei fini. In terzo luogo il soggetto privato non ha quelle responsabilità o anche solo quella accountability che invece sono imposte al soggetto pubblico. Ed in ogni caso mentre quest’ultimo è tendenzialmente un soggetto unico, ben individuato, la cessione a terzi di dati pubblici operata nel rispetto del principio di non discriminazione moltiplica i soggetti potenzialmente autori di trattamenti non corretti rendendo estremamente difficile - anche grazie alla circolazione transfrontaliera dei dati - il controllo da parte dell’interessato. È possibile evitare tali inconvenienti e conciliare tutela dei dati personali con circolazione delle informazioni? Al quesito possono darsi alcune risposte ma esse, come si vedrà, non sono del tutto soddisfacenti. a) restrizione dei dati trasferibili a soggetti privati: una prima strada da percorrere potrebbe essere quella di cercare di restringere la categoria di dati trasferibili a terzi, escludendo, ad esempio, quelli sensibili o “semi-sensibili” ovvero altri come ad esempio quelli inerenti a rapporti tributari. Non pare convincente ed efficiente la soluzione- individuata dalla proposta di direttiva- di consentire la cessione dei dati per i quali l’ordinamento nazionale ammette un diritto di accesso. Tale diritto, infatti si configura in maniera variegata e riguarda solitamente un dato, un soggetto, non una massa di dati relativa ad una molteplicità di soggetti. Peraltro il diritto di accesso è solitamente finalizzato al soddisfacimento di un preciso interesse individuale. Come è stato opportunatamente osservato dalla giurisprudenza, la circo- Vincenzo Zeno Zencovich - Uso a fini privati dei dati personali in mano pubblica 153 stanza che un dato sia conservato in un pubblico registro non legittima di per sé la diffusione urbi et orbi del dato medesimo. b) restrizione delle finalità per le quali i dati possono essere ceduti: un’altra strada potrebbe essere quella di consentire la cessione dei dati pubblici ai privati a condizione che essi ne facciano il medesimo uso consentito al soggetto pubblico. Ancorché razionale, la soluzione è di ben scarsa utilità: il privato vuole acquisire i dati pubblici perché vuole sfruttarli in modo più intenso e innovativo. Se dovesse limitarsi a farlo ad imitazione del soggetto pubblico (ad es. rilascio di attestazioni o “visure”) sarebbe sufficiente un suo collegamento telematico con il sistema che gestisce i dati pubblici. c) restrizione dei soggetti cui cedere i dati: al fine di assicurare un maggiore controllo sul corretto utilizzo dei dati da parte di terzi sarebbe possibile pensare di restringere il numero dei soggetti privati abilitati al trattamento dei dati personali pubblici. Si tratta di una linea antitetica a quella della proposta di Direttiva che si fonda sul principio di non discriminazione (e dunque di astratta illimitata fruibilità). Tuttavia non è difficile scorgere i prevalenti interessi generali che suggeriscono una limitazione a pochi soggetti del riutilizzo di tali dati. È evidente che in tal modo si pone il problema della scelta del o dei soggetti: ma qui i meccanismi comunitariamente compatibili sono ben collaudati e vanno dalla qualità ed affidabilità del soggetto all’eventuale offerta economica presentata per aggiudicarsi la gara. d) una ipotesi alternativa: i dati personali pubblici come res extra commercium: non si può peraltro ignorare una diversa prospettiva che configuri i dati personali detenuti dai soggetti pubblici come res extra commercium e dunque in radice sottratte ad uno sfruttamento economico diretto o tramite terzi. Dal punto di vista normativo si possono rinvenire significativi elementi nella Direttiva 95/46 essendo la cessione a terzi per scopi di lucro incompatibile con le finalità per le quali i dati sono stati raccolti. Oltretutto verrebbe a crearsi un vistosa disparità fra dati detenuti da titolari privati - che possono essere comunicati a terzi solo in ipotesi limitate e in genere con il consenso dell’interessato - e dati detenuti da titolari pubblici abilitati ad una generale disseminazione dei dati. Ma vi sono anche ragioni di ordine più generale: tutti ricordiamo che la prima spinta verso la protezione della riservatezza informatica nasce dalla preoccupazione efficacemente rappresentata dalla figura letteraria del “Grande Fratello” di George Orwell. Ed è nei confronti delle banche di dati pubbliche - le uniche all’epoca - che si appunta l’attenzione. Lo Stato dovrebbe ora trasformarsi da potenziale “nemico” della riservatezza individuale in suo difensore. tutelando in tal modo anche il rapporto di fiducia con le parti del contratto sociale. I dati personali pubblici vanno ge- 154 Da costo a risorsa - Attività produttive e protezione dei dati personali stiti direttamente dallo Stato, al pari di altri beni fuori commercio, come quelli ambientati e molti di quelli culturali. Ed il richiamo all’ambiente e all’arte non appare fuori luogo perché ci porta in un dibattito sulla riservatezza da costo a risorsa- a riflessioni che sono state ampiamente svolte nel confrontarsi fra ragioni dell’ecologia e sviluppo sostenibile, fra difesa del patrimonio nazionale e corretta fruizione dello stesso. Si tratta di problemi di difficile soluzione, ma sicuramente il dibattito sulla tutela dei dati personali assume dimensioni più vaste e implicazioni di policy di più ampio respiro. Vincenzo Zeno Zencovich - Uso a fini privati dei dati personali in mano pubblica 155 Using Personal Data Held by Public Entities for Private Purposes Vincenzo Zeno Zencovich(1) The business exploitation of personal data held by public entities is undoubtedly appealing: one has to do with a major amount of data, which are of considerable interest. Public entities have traditionally been equipped to collect and store data; however, exploitation of these data for business purposes does not fall under the scope of their standard activities – it being an undertaking that requires entrepreneurial approaches. A private entity is undoubtedly in a better position to profit from such data by turning them into a source of significant assets; indeed, information is an important production factor: the more it is available, even if not for free, the more rational the decision-making will be as regards economic actors. Therefore, the potential inherent in this matter can be easily grasped, as can the beneficial effects for businesses produced by availability and ease of use of those data. At the same time, one is bound to feel instinctively perplexed. Public bodies usually acquire personal data on the basis of an individual’s obligation to either supply such data or provide proof of his/her identity in order to obtain certain services. These data as acquired ratione imperii, i.e. by authority, would then be transferred for a consideration to third parties, who could use them for profit-seeking activities. The unfairness of this situation can be appreciated intuitively, but a broader scope of analysis allows attaining a more rational vision. The regulations applying to processing of personal data at Community level can be also regarded as guidelines for allocating information resources. The close relationship between Directive 95/46 on the processing of personal data and Directive 96/9 on the legal protection of databases should be tirelessly pointed out. The latter Directive provides safeguards for sets of information; the former one lays down restrictions on the boundless acquisition of certain items of information – i.e. personal data. Individuals are in control of the data concerning them and decide whether and how they may be acquired by third parties. The draft directive concerning “Reuse and Exploitation for Commercial Purposes of Public Sector Documents” produces significant effects on the balancing of interests that can be achieved by the joint application of the two directives. One first critical issue has already been referred to – namely, the fact that individuals are required to provide their data to public entities and therefore, are dispossessed of their data. However, this compulsory communication entails some benefits: individuals are delivered certain services, or can establish their status (1) Roma Tre University-Italy 156 Da costo a risorsa - Attività produttive e protezione dei dati personali and/or rights with certainty. There is therefore a rationale underlying this system as regards the relationship between individuals and public entities – whilst this same system proves poorly effective in economic terms with regard to the relationship between public entities and businesses. According to the system envisaged in the Draft Directive, an individual would indirectly assign his/her own data to a third party regardless of his/her consent and for no consideration. It is a fact that the third party in question would have to pay for the data, however only the public entity would be entitled to the resulting profit. Only the public entity would be entitled to a property right in respect of the data it receives from individuals on account of the existing authority and/or management relationship. A second critical issue is related to the considerations made above: data communication to a public body serves specific purposes and is necessary for performing public activities which, by definition, should be carried out in the public interest as well as being concretely useful for the individual concerned. This general interest focus underlies the activities of public entities and makes it compulsory for them to comply with principles that have long been recognised in constitutional and Community provisions – namely, lawfulness, impartiality, non-discrimination, proportionality. This results into the need for setting forth procedural rules, controls, and specific liabilities. It can be easily appreciated that the purposes of the processing change whenever data are transferred to private entities, since emphasis is put on the data controller’s economic profit; secondly, private entities are not – nor can be expected to be – subjected to the obligations that are actually typical of public entities, since they are free to act in the manner and for the purposes they find most suitable. Thirdly, responsibilities and accountability of private entities are not the same as those pertaining to public entities. At all events, whilst the latter are usually single, well-defined organisations, assigning publicly-owned data to third parties in compliance with the non-discrimination principle results into multiplying the number of entities that may process such data inappropriately and makes it quite difficult for a data subject to be in control – partly on account of the existing transborder data flows. Can these mishaps be avoided by reconciling personal data protection and free movement of data? This question can be answered in several ways, which are, however, not completely satisfactory – as the paragraphs below will show. a) Limiting the data that may be transferred to third parties: one first solution might consist in trying to limit the categories of data that may be transferred to third parties, e.g. by excluding sensitive and/or “quasi-sensitive” data or else other data such as those concerning taxation matters. The solu- V i n c e n z o Z e n o Z e n c o v i c h - Using Personal Data Held by Public Entities for Private Purposes 157 tion envisaged in the draft Directive – i.e. allowing transfer of a data in whose respect the right of access may be exercised under domestic law – would not appear to be either convincing or effective. Indeed, the access right shows a multifarious pattern and usually refers to one data and one entity – rather than to multiple data concerning several entities. On the other hand, the right of access is usually aimed at meeting a specific individual requirement. As appropriately pointed out in some court decisions, the fact that a data is kept in a public register does not make it lawful, in itself, to unrestrictedly disclose it. b) Limiting the purposes for which the data may be assigned: another solution might consist in allowing publicly-owned data to be assigned to private entities on condition that the latter use them for the same purposes for which they are used by the public entity. Though sensible, this solution is all but useful: indeed, private entities wish to acquire publicly owned data in order to exploit them more thoroughly and innovatively. If they were to limit themselves to using the data in a similar fashion – e.g. to issue certificates and/or attestations – it would be enough for them to connect electronically with the system managing the publicly owned data. c) Limiting the entities entitled to receive the data: in order to allow more effective control on the appropriate use of the data by third parties, limiting the number of private entities that are entitled to process publicly-owned data might be envisaged. This approach goes in the opposite direction to that proposed in the draft Directive, which is based on the non-discrimination principle – entailing unlimited usability, at least theoretically. However, it is not difficult to imagine the overriding general interests that point to the advisability of limiting re-use of such data to a small number of entities. This raises, most obviously, the issue of how to select the relevant entity/entities; Community-compatible parameters have long been tested in this field, ranging from quality and reliability of the recipient(s) up to the tender possibly submitted in order to be granted a public contract. d) An alternative approach: regarding publicly-owned personal data as res extra commercium: one should also take account of a different approach, in which publicly-owned personal data are regarded as res extra commercium (non-marketable goods) that may not be, as such, the subject of economic exploitation whether directly or by the agency of third parties. From a regulatory viewpoint, this position is significantly supported by Directive 95/46 – since assignment to third parties for purposes of gain is incompatible with the purposes for which the data have been collected. Additionally, this type of assignment would give rise to a markedly unequal treatment 158 Da costo a risorsa - Attività produttive e protezione dei dati personali of the data held by private data controllers as compared with those held by public data controllers – since the latter would be enabled to disseminate the data unrestrictedly, whereas the former are currently entitled to only communicate personal data to third parties under specific circumstances and with the data subjects’ consent. However, this approach is also based on more general considerations. We all remember that the first impulse towards protecting computer privacy resulted from the concerns that were aptly described in George Orwell’s literary works as the “Big Brother”. The attention was focussed on public data banks – being the only ones existing at that time. Nowadays, States should turn from potential “enemies” into defenders of privacy, which would allow them to also safeguard the trust relationship with all the parties to the social contract. Publicly owned personal data should be managed directly by States, similarly to other non-marketable goods such as environmental goods and a considerable portion of cultural heritage. The reference to environmental and cultural heritage is far from being out of the place. Indeed, the focus being on how to make privacy from a cost to a resource, this reference points to considerations that have been repeatedly made in connection with the debate on environmental protection and sustainable development, safeguarding national heritage and making appropriate use of our heritage. These issues cannot be coped with easily; however, the issue of personal data protection can be undoubtedly approached in a wider perspective and with deepranging policy implications. V i n c e n z o Z e n o Z e n c o v i c h - Using Personal Data Held by Public Entities for Private Purposes 159 Privacy e rapporti di lavoro(1) Umberto Romagnoli(2) 1. Ricordare gli inizi è sempre utile. Non di rado, è doveroso. Come in questo caso Lo statuto dei lavoratori non era ancora legge dello Stato e già si era sparsa la voce che si stava esagerando coi diritti. Non solo con quelli collettivi, ma anche e soprattutto con quelli individuali che, propiziando un morboso attaccamento alle libertà personali, avrebbero incoraggiato comportamenti sconsiderati. La voce si tramutò in un luogo comune; il quale, come i suoi fratelli, dimostrerà di avere la prerogativa di sovvertire i ritmi biologici. I luoghi comuni, si sa, nascono, crescono, ma non muoiono mai. Predire che la cultura anarco-libertaria del “tutto è lecito” sarebbe dilagata nelle aziende non era molto più realistico di quanto non lo fosse in passato. Tuttavia, la predizione venne ugualmente presa sul serio dai laudatores temporis acti per delegittimare i denigratori di una cultura industriale che volevano caratterizzata dalla prevaricante autorità-autoritaria degli imprenditori. Ogni tanto, per fortuna, il tempo è galantuomo. Così, adesso che nemmeno le giovani mamme più colte conoscono le teorie di pediatri come Spock, i figli liceali non leggono libri di filosofi come Marcuse e i padri, se sono operatori giuridici di mestiere, hanno smesso di doparsi con dosi consistenti di diritto alternativo, adesso – dicevo – è arrivato il momento di confessare quel che allora pensavano in pochi, anche se era la verità. E la verità era che, quando il carastrofismo moralistico si coniuga col trionfalismo apologetico, l’orgasmo della drammatizzazione tocca il culmine e difatti si finisce col perdere di vista che si può essere a sinistra o a destra di tutto, tranne che del buon senso. Per questo, contrapporre ad un’opinione faziosa e parziale un’opinione altrettanto faziosa e parziale, se allora fu il pedaggio pagato alla temperie di una stagione surriscaldata dalle polemiche e avvelenata da insane voglie di rivincita, adesso sarebbe peggio che ozioso. È saggio invece suggerire agli instancabili duellanti di accettare una premessa comune: ammettere cioè che il riconoscimento legale di diritti individuali di libertà nei luoghi di lavoro non va enfatizzato – né da destra né da sinistra. L’ambiente era quello che era; si sa. Tuttavia, per essere persuasiva, anche la più fondata critica della giuridificazione avrebbe dovuto essere preceduta dalla ricerca dei correttivi necessari per giustificare la scelta di lasciare le regole nell’informalità. (1) Questo scritto sarà pubblicato anche negli Studi in onore di Mario Grandi. (2) Università di Bologna - Italia 160 Da costo a risorsa - Attività produttive e protezione dei dati personali Analogamente, pur essendo condivisibile, la soddisfazione per l’intervento legislativo non avrebbe dovuto essere compiaciuta, e compiacente, al punto di pretendere che la titolarità del diritto a fare una certa cosa esonerasse di per sé da censure. Non a caso, un leader carismatico della Cgil sentì il dovere di ammonire, anche a rischio dell’incomprensione o della contestazione, quei “compagni che si erge(va)no a gelosi custodi di certe conquiste come se avessero (avuto) un tesoro da conservare dentro uno scrigno e non si accorg(evano) di montare la guardia ad un mucchietto di cenere”. Correva l’anno 1978, uno dei più cupi della più drammatica crisi che abbia colpito l’Italia nel secondo dopo-guerra, e nel mucchietto di cenere erano finite anzitutto le norme statutarie a tutela della privacy. Titolavano i grandi quotidiani nazionali: “È da lì, dallo statuto, che nascono l’assenteismo e la violenza?”, trasmettendo così all’opinione pubblica la notizia che la riservatezza legislativamente protetta incoraggiava i più lavativi a darsi continuamente malati o, peggio, poteva servire per nascondere le simpatie o le connivenze che alimentavano il terrorismo armato. Infatti, intorno alla norma che aboliva la figura del medico di fabbrica ed a quella che vietava le indagini sulle opinioni e la vita privata, si formò in fretta un alone di diffidenza e i giuristi che avevano assecondato l’ascesa della tendenza dottrinale ad assegnare ai diritti della personalità costituzionalmente garantiti universalità di direzione, e dunque rilevanza anche nei rapporti contrattuali, si rinchiusero in un pensoso silenzio. Luciano Lama non poteva condividere e reagì. Reagì con la medesima energia con cui, un quarto di secolo più tardi, un suo successore respingerà la proposta avanzata da un governo di centro-destra di rimodulare le tutele degli insider a beneficio degli outsider, perché vi leggerà quel che vi leggerebbe anche un Premio Nobel per l’economia: un pretesto, secondo Robert Solow, che spiana il terreno al proposito di “rafforzare gli imprenditori rispetto agli insider”. Lama, dunque, prese pubblicamente posizione, nella forma di una densa intervista a la Repubblica, pronunciando parole che ho sempre giudicato le più adatte a popolarizzare efficacemente l’asserzione secondo cui la relazione tra lavoro e cittadinanza ha la caratteristica instabilità di una barca con l’elefante, perché le libertà del cittadino in quanto lavoratore devono bilanciarsi con la libertà d’iniziativa economica. Infatti, se l’impresa è il luogo in cui più si manifesta l’effetto cumulativo delle disuguaglianze – le concentra, le focalizza, le radicalizza – al tempo stesso è il luogo in cui è più problematico ridurle e pressoché impossibile eliminarle, come insegna la storia ormai secolare delle cooperative di lavoro. Per questo, la normativa statutaria – con buona pace dei reduci dall’autunno caldo del ’69 disposti ad accettare soltanto interpretazioni massimaliste che la stiracchiassero come pelle di zigrino – ha sì ridisciplinato il potere aziendale, lo ha razionalizzato, lo ha procedimentalizzato, Umberto Romagnoli - Privacy e rapporti di lavoro 161 ma non poteva autorizzare ad azzerarlo. Piuttosto, al legislatore non bastava più che esso fosse contenuto entro i limiti di una rigorosa finalizzazione allo svolgimento dell’attività produttiva; voleva che il suo esercizio fosse commisurato a tutti i valori, anche extra-patrimoniali ed extra-contrattuali, di cui il lavoro è portatore per volontà dei padri costituenti. “L’idea-madre dello statuto”, scrisse Luigi Mengoni, “è che l’organizzazione tecnico-produttiva dell’impresa deve modellarsi sull’uomo, e non viceversa”, nell’ampia misura in cui l’inserimento in essa della persona tenuta a lavorarvi subordinatamente assume rilevanza giuridica quale fonte non solo di obblighi di comportamento coordinati alle esigenze dell’organizzazione, ma anche del diritto di proteggersi contro le minacce alla libertà, alla dignità e alla sicurezza. Come dire: lo statuto, più che una riforma, è stato una sfida. Una sfida che gli operatori giuridici, economici e sindacali non potevano perdere o vincere se non insieme. Ce l’hanno fatta? Naturalmente, non intendo insinuare il sospetto che non abbiano raggiunto una maturità culturale e una preparazione professionale all’altezza delle aspettative. Semplicemente, ritengo che la sfida duri tuttora e anzi non terminerà mai. Un po’ perché, malgrado la sua centralità, quella individuale è la dimensione lunare del rapporto di lavoro dipendente e un po’ perché, come ama dire Gérard Lyon-Caen, il diritto del lavoro “c’est Pénélope devenue juriste”. Quindi, se qualcuno mi chiedesse di elencare le idee nobili e generose che mi sedussero in gioventù, non mi vergognerei a mettere in cima alla lista quella che ravvisava nel costituzionalismo aziendale il sentiero percorribile dagli abitanti del pianeta-impresa per tentare di ricomporre la frattura che spacca in due il cittadino: legittimato a partecipare al governo della polis almeno quando entra nella cabina elettorale, quando si veste da produttore subalterno può vedersi negata da altri uomini la possibilità di avvalersi dei diritti derivanti dal contratto quanto di quelli connessi con la sua posizione professionale od anche col suo status di cittadino, acquistando così le connotazioni di un capite deminutus. Tuttavia, ho imparato che bisogna essere idealisti senza illusioni. Perché c’è sempre qualcuno o qualcosa che disfa la tela. Anche al di là delle intenzioni. Paradigmatica è l’accelerazione subita per effetto delle innovazioni tecnologiche dal processo di invecchiamento della protezione legale della privacy dei lavoratori; innovazioni di per sé neutre, come si desume dalla casualità delle distorsioni prodotte, che talvolta possono mortificare il legittimo potere di controllo, talaltra indeboliscono le linee di difesa del controllato. Così, per ricominciare ogni volta daccapo occorre proprio la testardaggine del diritto del lavoro ereditato dal Novecento. E la sua umiltà. Perché non è mica esatto che le sue stagioni evolutive siano immancabilmente segnate da rotture epocali, 162 Da costo a risorsa - Attività produttive e protezione dei dati personali da spettacolari dietro-front, da brack risolutivi. Anzi, la sua costante storica è la micro-discontinuità, specialmente per quanto attiene alle situazioni giuridiche soggettive che i contemporanei designano in termini di diritti di libertà del lavoratore come individuo. È infatti un errore credere che tutti i comuni mortali possano sentire ciò che ad alcuni di noi sembra di udire distintamente: un fragoroso sbatacchiamento di porte. Quella della società pre-industriale, che si chiude, e quella della società industriale, che si apre. Quella del corporativismo fascista, che pareva non chiudersi mai, e quella della costituzione democratica, che pareva non volersi aprire. Quella del post-industriale, che però non si apre né si chiude del tutto, e quella del postmoderno, che non si sa dove conduca. Le cose sono andate e vanno diversamente. Le scosse dei sommovimenti tellurici di cui discorrono storici e costituzionalisti non si propagano fulmineamente alla dimensione individuale del rapporto di lavoro. Anzi, è altamente probabile che vi giungano infiacchite. Del resto, durante la traversata nella sala-macchine nessuno riesce a capire quali pezzi musicali l’orchestra di bordo sta eseguendo per intrattenere i passeggeri in crociera. Forse, non è neanche interessato a capire. Insomma, la disciplina del rapporto individuale di lavoro è refrattaria all’innovazione, soprattutto se è repentina o destinata ad agire in profondità, e cambia adagio anche per evitare che i passaggi d’epoca descritti nei manuali scolastici possano destabilizzare una relazione sociale che possiede una valenza fondativa per l’esistenza della gente comune. Potrà impietosire o indignare, ma il suo modo di realizzare il valore della certezza giuridica si confonde con la vischiosità d’una storia infinita i cui protagonisti sono troppo piccoli e troppo soli per poter manifestare una propensione all’adattamento al nuovo che avanza meno accomodante di quella che si esprime nella ricerca delle soluzioni compatibili con l’esistente interiorizzato come un dato oggettivo immodificabile. “Gli individui”, come scrisse André Gorz, “desiderano quello che hanno la possibilità di ottenere nelle condizioni date, e non quello che potrebbero ottenere solo in condizioni diverse”. A ciò si aggiunga che il diritto individuale del lavoro costituisce dalle origini parte integrante, se non del diritto civile codificato, delle sue categorie e dei suoi referenti concettuali. Con la velocità impercettibile dei ghiacciai, infatti, si è sviluppato alla periferia d’un impero e in forma semi-clandestina, perché il diritto dei privati non tollera che la prestazione di lavoro all’altrui servizio sia sottratta al suo governo e dunque è intenzionato ad immunizzarne le regole contro i virus messi in circolazione da eventi esterni. Sennonché, i gius-privatisti che colonizzarono questo settore del sapere dava- Umberto Romagnoli - Privacy e rapporti di lavoro 163 no per scontato ciò che non poteva esserlo. Davano per scontato che il capitalismo moderno si sarebbe sorretto indefinitamente sulla capocchia d’uno spillo come il contratto individuale di lavoro e che la configurazione collettiva impressa di fatto, sotto più di un aspetto, dall’evoluzione industriale al regime dei rapporti contrattuali in cui si realizza tipicamente lo scambio tra lavoro e retribuzione sarebbe rimasta ai margini dei discorsi giuridici. Peraltro, daranno per scontata anche l’ininfluenza della costituzione post-liberale del 1948. Ormai, la storiografia giuridica ha analizzato la vicenda in misura più che sufficiente alla sua archiviazione. Pertanto, se vi accenno, è unicamente per sottolineare che la cultura giuridica degli anni ’50 trasmetteva ai giuristi del lavoro – anche a quelli che erano stati dei corporativisti convinti – il medesimo disagio che i gius-privatisti provavano davanti al documento costituzionale. Un disagio che si traduceva in un arbitrario impoverimento della sequenza di dati di cui gli interpreti devono tenere conto. In realtà, avrebbero voluto che il diritto del lavoro restasse rinchiuso dentro l’involucro di una transazione economica, pur protestando contraddittoriamente contro il persistente sequestro. Poi, è arrivato lo statuto e l’involucro è stato lacerato. 2. Infatti, è nell’area dei rapporti di lavoro dipendente che l’ordinamento giuridico italiano si è aperto all’esigenza di tutelare la privacy delle persone. Tuttavia, non è vero che tutto sia cominciato con lo statuto. È toccato a Philipp Lotmar, durante la sua pionieristica incursione nell’inesplorato territorio di una contrattazione collettiva statu nascenti, registrare con simpatia che, tra le clausole dirette ad assicurare all’operaio un trattamento riguardoso, figurava il divieto al padrone di dargli del “tu”. Come dire il grande giurista pre-weimariano intuì che regolare l’amministrazione del personale significa spesso giuridificare le buone maniere. Perciò, ove si ammetta che un atteggiamento rispettoso della privacy del lavoratore durante e fuori l’orario di lavoro sia in qualche modo equivalente ad un corretto uso della forchetta a tavola, bisogna riconoscere che la velocità con cui si è incivilita l’amministrazione del personale è stata più che discreta: la forchetta impiegò cinque secoli per entrare stabilmente nelle consuetudini degli europei. D’altra parte, se la velocità è stata inferiore alle attese degli amministrati, anche loro dovrebbero recitare il mea culpa, perché non può dirsi che si siano sforzati troppo per imparare che, se i diritti non vengono interpretati con l’auspicabile ragionevolezza, possono incentivare una condotta irresponsabile. Così, per esemplificare, non giova certamente ad intensificare i ritmi dell’evoluzione usare abitualmente a fini privati il telefono aziendale, riportare false annotazioni sui fogli di presenza, svagarsi viaggiando in Internet; a prescindere dall’esistenza di un danno reale per l’azienda. 164 Da costo a risorsa - Attività produttive e protezione dei dati personali Non me la sentirei, invece, di sostenere che dovrebbe recitare il mea culpa anche il sindacato, come se le carenze od i limiti riscontrabili nelle politiche sindacali in difesa della privacy fossero interamente riconducibili a negligenza, disimpegno od altro. Il fatto è che le aggressioni più lesive della dignità del debitore di lavoro hanno ben altra natura – più rozza ed elementare – e occorre pur stabilire un ordine di priorità: tutto e subito non si può ottenerlo. Per questo, gli stessi sindacati che contestavano la pratica delle perquisizioni personali degli operai all’uscita dagli stabilimenti, senza pretendere troppi riguardi, nell’arco degli stessi anni premevano per sottrarre all’imprenditore la licenza di licenziare, negoziando importanti accordi che prevedevano la sanzionabilità dei licenziamenti privi di giustificato motivo. Come dire che la clausola collettiva abilitante alle perquisizioni era ed è valutabile non già come una testimonianza della loro opportunità o addirittura della loro indispensabilità per prevenire furti, bensì come un indicatore empirico che permetteva di misurare il cammino che restava da percorrere per civilizzare il clima aziendale. Ciò non toglie che carenze o limiti esistessero nelle politiche rivendicative in materia. Ma, proprio per questo, è documentabile che il loro superamento è stato agevolato e accelerato dalla normativa statutaria che coinvolge e responsabilizza la rappresentanza sindacale aziendale nella elaborazione di criteri per l’esercizio del potere di controllo idonei a contemperare contrapposte esigenze che, pur non essendo equi-ordinate, aspirano alla massima realizzazione contestuale possibile. Per quanto significativa, l’esperienza generata dalle norme che subordinano la liceità del controllo sulla persona dei debitori di lavoro ad una previa codecisione collettiva ha dimensioni minuscole al confronto con quelle che assumerà l’attuazione della legge 146/1990 sullo sciopero nei servizi pubblici essenziali. In entrambi i casi, la qualità degli interessi in gioco e della loro mediazione è identica: in entrambi i casi, il sindacato dispone di diritti della personalità dei propri rappresentati allo scopo di garantirne la fruibilità nel quadro di un passabile equilibrio col godimento di diritti costituzionalmente riconosciuti a terzi. Se la legislazione limitativa dello sciopero non ha dato buona prova nei settori – trasporto aereo e ferroviario – senza la preesistente turbolenza sindacale dei quali il legislatore non si sarebbe probabilmente mosso, è tuttavia inconfutabile che, nel restante mondo del lavoro dipendente, il suo rendimento è stato e continua ad essere elevato. A questo proposito, vorrei dissuadere i più zelanti a non andare a caccia di meriti e demeriti per stilare pagelle. L’operazione non è interessante quanto ci terrebbe ad apparire. Senz’altro più proficuo è riflettere sul dato, anch’esso inconfutabile, che l’autorità amministrativa indipendente a cui spetta pilotare l’attuazione della normativa, e che in ragione della sua pluri-funzionalità è un punto di snodo cruciale delle procedure prescritte per produrre e far osservare le regole del conflitto nel ter- Umberto Romagnoli - Privacy e rapporti di lavoro 165 ziario, da sola non sarebbe mai riuscita a generalizzarne la metabolizzazione da parte dei loro destinatari. L’apporto del sindacato per aiutare la legge a superare le comprensibili difficoltà di acclimatazione è stato determinante. Finora, invece, non può dirsi la stessa cosa con riferimento alla legge 675/1996. Il suo impianto è eminentemente individualistico. Si direbbe che i suoi autori abbiano voluto mantenersi fedeli al principio di realtà caro a Roman Jakobson, il linguista, secondo il quale la parola formaggio non ha senso alcuno per chi non ne ha mai assaggiato in vita sua. Insomma, non si può né si deve parlare se non di ciò che si conosce: il che è sacrosanto. Può darsi, devono aver pensato nonostante tempestivi e autorevoli richiami, che i singoli possiedano un’apprezzabile capacità di autodeterminazione informatica e siano in grado di fronteggiare le insidie che il progresso tecnologico reca alla loro personalità: certamente, devono aver pensato, più del sindacato. Coerentemente, devono aver giudicato una forzatura prevederne interventi nei processi decisionali attinenti all’introduzione e alla gestione di sistemi automatizzati per la raccolta e l’uso di dati di carattere personale dei dipendenti: sarebbe come aspettarsi consigli affidabili sul sapore del formaggio da parte di chi ne sa poco o quasi niente. Se, come credo, questa è una delle chiavi lettura della legge in parola, è agevole stabilire la paternità del suo imprinting culturale. Essa risale ad un’opzione di politica del diritto mirante non tanto a sottostimare il ruolo del sindacato quanto piuttosto ad offrire una rappresentazione deformata del mondo del lavoro. Si è ritenuto cioè che la privacy sia il pregio o il tic di un angolo di mondo del lavoro popolato da minoranze privilegiate e, presumendo anche per questo che sarebbe stata sufficiente un’istituzione centralizzata di sorveglianza, il sindacato non possa stazionare se non nelle smisurate retrovie dove il bisogno primario di un lavoro decente è soverchiante. È questo soprassalto di pauperismo, che sa di grottesco nel contesto di una società evoluta, a pregiudicare e compromettere l’efficienza operativa di una legge a cui gioverebbe il contributo del medesimo esponente della cultura della prassi che lo statuto dei lavoratori aveva sollecitato ad attivarsi su di una tipologia di questioni strettamente affini. E ciò accadeva proprio mentre il divieto statutario di controlli sulla persona di fatto si era svuotato per conto suo e, contemporaneamente, era stato relativizzato dalla dilatazione del concetto di privacy per cui da una garanzia di riservatezza dell’individuo mediante il blocco assoluto delle informazioni si transitava alla ricerca dei mezzi per mantenere il controllo su di esse e la loro circolazione. Pertanto, l’espulsione del sindacato dal circuito “persona-informazione-circolazionecontrollo”, per dirla con Stefano Rodotà, costituisce una incoerenza di sistema che nessuna scaltrezza interpretativa dell’obsoleta normativa statutaria può sanare. 166 Da costo a risorsa - Attività produttive e protezione dei dati personali Si obietterà che la legge del 1996, se non prevede un preventivo confronto sindacale sulle ragioni e modalità di raccolta e trattamento dei dati personali, nemmeno lo preclude. Ma l’argomento è fragile, perché qui più che altrove appare necessaria una misura legislativa promozionale dell’intervento sindacale; un po’ perché la reattività del sindacato non è, come si è visto, in rerum natura e un po’ perché i rapporti di forza possono non favorirla. Antecedenti normativi in Europa non mancano. Gli stessi vertici della Comunità trasmisero nel 1989 un input per introdurre “una tutela più articolata di natura collettiva”. Ma l’indicazione non ebbe seguito sul piano della progettazione legislativa. Come dire che si è sciupata un’occasione. E non solo per restituire alla ratio della normativa statutaria la perduta incisività, e al tempo stesso allargarne il cono di luce, e dunque per stuccare le crepe emerse a livello sistemico, ma anche per arricchire una cultura delle relazioni industriali la cui articolazione binaria – o contrattazione o conflitto – fa tenerezza. In effetti, poiché le esigenze di tutela della privacy insorgono soltanto in azienda e qui si manifestano in termini che si rinnovano continuamente, il metodo più adeguato per affrontarle e soddisfarle non può essere quello dell’eteronomia regolativa. L’incessante quanto imprevedibile dinamismo evolutivo dell’informatica applicata all’organizzazione del lavoro si è incaricato di dimostrare che scarse sono le capacità di dominio della materia da parte della legge e perciò anche da parte della contrattazione collettiva che ha imparato da un pezzo a mimarne le movenze. Il metodo preferibile è quello meno sordo alla richiesta di “meccanismi omeostatici”, come li chiama Stefano Rodotà, “che consentano al diritto di evitare un destino che contraddirebbe la sua stessa natura: divenire da strumento di ordine elemento di disordine, generatore e non più risolutore di conflitti, per l’allontanarsi dalla realtà delle sue regole”. Una tecnica del genere, però, non è stata ancora individuata e messa a punto con la precisione desiderabile. Per questo, in vista dell’avvento di una seconda generazione delle norme sulla protezione dei dati personali, avanzerei faute de mieux la proposta di sperimentare il metodo della partecipazione imperniato su organismi collettivi di rappresentanza. L’originalità della proposta è assai limitata. Essa risiede unicamente nella modulazione dell’intervento sindacale. Infatti, a sostegno di quest’ultimo si è già pronunciata, non senza qualche dissenso, la giovane, ma agguerrita, dottrina che si è occupata del tema negli ultimi anni adducendo numerose motivazioni tra le quali quella che mi persuade di più attiene alla necessità di frenare lo slittamento degli atti di disposizione delle informazioni concernenti la persona del lavoratore nell’orbita della logica proprietaria di cui è paradigmatica la valorizzazione del consenso individuale che, liberamente prestato e corredato da congrue informazioni, viene ele- Umberto Romagnoli - Privacy e rapporti di lavoro 167 vato a pilastro dell’intera impalcatura legislativa. Una logica che, oltretutto, mi sembra singolare voler accarezzare e premiare nella medesima unità spazio-temporale in cui se ne teorizza la caduta: infatti, se è diventata un’eresia con riferimento al posto di lavoro, con riferimento ai dati personali non è che il riflesso di una ideologia nel senso di falsa coscienza. Se a Stefano Rodotà quella del consenso individuale per autorizzare il trattamento dei dati personali appare, giustamente, “una via di mezzo tra regulation e deregulation”, non si può negare che la proposta di declinare in chiave partecipativa il sistema di tutela della privacy nei rapporti di lavoro tende a renderla meno insicura: il consenso individuale resterà essenziale; ma sarà un po’ più libero e un po’ più informato. Onestamente, però, non credo che l’aggiustamento di ottica qui indicato come preferenziale renda più attraente la proposta. In Italia, la partecipazione non è ancora uscita dall’ambiguità. Non corrisponde ad una linea di politica del diritto che possa svolgersi in maniera trasparente. Si fa, ma non si dice. Ostacolata dai veti di imprenditori ai quali la massima di ragion pratica “nel dubbio, consultarsi” non suggerisce nient’altro che l’idea di una deplorevole abdicazione di ruolo, incontra resistenze anche da parte di un sindacalismo restio a schiodarsi dalla “presunzione di autosufficienza” pan-contrattualistica di cui parla Aris Accornero. Viceversa, il management più moderno sa che, per ogni momento di contrattazione, ce ne dovrebbero essere cento di consultazione e un sindacato consapevole che un glorioso passato non è di per sé garanzia di un luminoso futuro dovrebbe sapere che “codeterminare non è contrattare. E’ una questione di skill”. Di competenza tecnica. Di stile professionale. “Chi sa contrattare non è detto che sappia cogestire”. 168 Da costo a risorsa - Attività produttive e protezione dei dati personali Privacy in the Employment Context Umberto Romagnoli(1) 1. Starting from the beginning is always useful. At times, it is actually necessary – like in this case. The workers’ statute had not yet been passed and rumours already had it that this thing with rights had gone too far – meaning not only collective rights, but also, above all, personal rights: by favouring a morbid fondness for individual freedom, reckless behaviours would be encouraged. These rumours became commonplace and – as is the case with all items in this category – proved capable to subvert the laws of biology. It is well known that commonplaces are born, grow and never die. Foreseeing that businesses would be flooded by the anarchist and libertarian views based on the “everything is permitted” principle was not much more realistic than it had been in the past. Still, this forecast was taken seriously by the laudatores temporis acti - those praising the past – as a way to cut the ground from under the feet of those protesting against a business culture that was allegedly characterised by the entrepreneurs’ overwhelming authoritarian power. Luckily, time happens to do us a good turn every now and then. Thus, nowadays when not even the most cultured young mothers are aware of the theories put forward by such paediatricians as Dr. Spock, teenage children no longer read the books written by Marcuse and other philosophers and their fathers – working as legal professionals – have stopped getting high on considerable doses of alternative law, it is high time we acknowledged what very few people thought at that time – even though it was true. Indeed, the truth is that whenever moralistic catastrophism meets apologetical triumphalism, dramatisation reaches its climax and one ends up failing to realise that one can be to the right or left of any and every thing – apart from common sense. This is why counteracting a partial, factious view by an equally partial, factious view would be worse than useless – whilst in those days it was the toll required by the circumstances resulting from a period of overheated debates, which was poisoned by senseless vindication impulses. One can perhaps suggest that the tireless fighters should accept starting from a shared assumption – namely, acknowledging that the legal recognition of individual freedoms in the workplace is not to be emphasized excessively, either by left-wing or by right-wing supporters. The milieu was as good as it could get – this is well known. Still, even the bestgrounded criticism to juridification should have been preceded – in order to be re(1) Bologna University - Italy Umberto Romagnoli - Privacy in the Employment Context 169 ally convincing – by the search for the adjustments required in order to justify the decision of laying down no formal rules. Similarly, jubilation for the passing of legislation, though understandable, should not have been self-satisfied (and self-satisfying) – so much so that it gave rise to the belief that being entitled to do a certain thing did exempt, in itself, from being the subject of reproach. It is no mere chance that a charismatic trade union leader felt the duty – by defying misunderstandings and opposition – to warn those “comrades who jealously ward certain conquests as if they had a treasure to keep inside a coffer, without realising that they are mounting guard at a heap of ashes”. It was the year 1978, one of the darkest years in the most difficult crisis that gripped Italy in the aftermath of WWII, and the heap of ashes consisted, in the first place, of the provisions included in the Workers’ Statute concerning privacy protection. Major Italian dailies worded their headlines like this: “Is It, the Workers’ Statute, the Source of Absenteeism and Violence?” – thereby conveying the information that laws protecting confidentiality actually encouraged lazybones to request sick leave, or could be used to hide support for and/or assistance to armed terrorists. Indeed, the provisions abolishing factory physicians or prohibiting investigations on employees’ opinions and private life came to be the subject of mistrust, and those legal scholars that had supported the spreading of views according to which personal rights enshrined in constitutional instruments should be recognised as having universal value, and therefore should be applicable to contractual relationships as well, chose to pursue their meditations in silence. Luciano Lama, leader of the left-wing Cgil trade union, could not share this stance, and reacted. He reacted with the same energy shown by his successor a quarter of a century later in rejecting the proposal put forward by a centre-right government – i.e. re-defining the safeguards applying to insiders to benefit outsiders. He construed this proposal exactly as a Nobel Prize economist would do, that is to say, as an excuse for paving the way – in Robert Solow’s opinion – to the attempt at “strengthening entrepreneurs rather than insiders”. Mr. Lama therefore took publicly stance via a lengthy interview to la Repubblica daily, in which he used words I have always regarded as most suitable to effectively divulge the concept that the relationship between employment and citizens shows the same instability as that between a boat and an elephant – since the freedoms of citizens as employees should be reconciled with freedom of enterprise. Indeed, if businesses are the places where the cumulative effects of inequalities are most visible – because they get concentrated, become the focus of attention, are made harsher – they are, at the same time, the places in which reducing such inequalities is most difficult and eliminating them is as good as impossible, which is shown by the century-old history of employees’ co-operatives. This is why the work- 170 Da costo a risorsa - Attività produttive e protezione dei dati personali ers’ statute has undoubtedly downsized businesses’ power by rationalising it and setting forth procedural rules, but it could have never allowed eliminating such power – much to the chagrine of the veterans of the fights waged in the “hot autumn” of 1969, who could only accept maximalist interpretations such as to stretch the provisions in the statute to their utmost degree. In fact, Parliament could no longer accept that the boundaries of businesses’ power should consist in its serving exclusively the purposes of production; rather, exercise of that power was to take account of all the values, including non-pecuniary and extra-contractual values, that have been conferred on employment by the drafters of our Constitution. “The leading concept of the workers’ statute” Luigi Mengoni wrote, “is that the technical and manufacturing organisation of businesses should be modelled after man, rather than the other way round” – to the wide extent that inclusion into a business of an individual that is required to work inside it as an employee is to be attached juridical importance, being the source not only of obligations to behave in line with the requirements of the specific organisation, but also of the right to get protection against threats to freedom, dignity and safety. That is to say: the workers’ statute was a challenge rather than a reformation. A challenge that legal, economic and trade-union actors could only lose or win together. Did they make it? Obviously, I am not going to intimate that they did not reach cultural maturity and professional skills such as to be equal to those expectations. It is simply that I believe this challenge to go on – in fact, it will never end, partly because the individual dimension, though pivotal, is the remotest component among those making up the employer-employee relationship, and partly because, to quote Gérard LyonCaen, employment law “c’est Pénélope devenue juriste”. Therefore, if someone asked me to list the noble, generous ideas I was seduced by as a youngster, I would not be ashamed to refer, in the first place, to the concept that business constitutionalism was the path to be followed by the inhabitants of the business-planet in order to attempt healing the fracture that is splitting citizens in two. Indeed, citizens are entitled to participate in governing the polis at least when they enter a polling station, whilst in the capacity of employed producers they may be denied by others the possibility to exercise the rights resulting both from the social contract and from their professional and/or citizen status – so that they take on capite deminuti features. However, I have learnt that one should be idealist without delusions. There is always someone or something managing to unweave the cloth – even unwillingly. A typical example is provided by the accelerated obsolescence of the legal safeguards applying to employees’ privacy that has resulted from technological innovations. These innovations are neutral in themselves, as shown by the casual nature of the distortions they have produced: at times they may impinge on lawful monitor- Umberto Romagnoli - Privacy in the Employment Context 171 ing powers, at other times they actually weaken the defence afforded to the monitored parties. Thus, in order to start from scratch every time, you do need the stubbornness that is a feature of the employment law as developed in the course of the 20th century. But you also need its humility. Indeed, it is not accurate to state that the development of employment law has ever been characterised by unprecedented achievements, dramatic U-turns and final solutions. In fact, this development is characterised historically by micro-discontinuities especially with regard to the legal entities contemporaries usually refer to as freedom rights recognised to employees as individuals. It is a mistake to believe that all mortals can be aware of what some of us apparently can hear quite clearly – doors slammed with violence. The door of pre-industrial society is being closed, whilst the door of the industrial society is ajar. The door of fascist corporativism is closing – although it seemed as if it would never be closed – and the door of the democratic constitution is opening – whereas it seemed as if it would never be opened. The door of post-industrialism is closing – in fact, it has never been opened (or closed) completely – and the door of post-modernism is opening on nobody knows what. Things have gone and are going differently. The tremors due to the earthquakes referred to by historians and experts in constitutional law do not propagate as lightning to the individual dimension of the employer-employee relationship. Indeed, they are quite likely to arrive there in a much-softened fashion. On the other hand, in crossing the engine room nobody manages to understand what pieces the orchestra is playing to entertain passengers on a cruiser. Perhaps one is not interested in understanding it. In short, individual labour law is shy of innovation – especially as regards sudden or deep-ranging innovations – and changes slowly also to prevent the epochmaking transformations described in schoolbooks from unbalancing a social relationship that has a founding value for the existence of ordinary people. You may find it pitiful or be incensed by it; still, it is a fact that here, the rule of law is realized in a manner that tends to get confused with an endless story, whose main characters are too puny and too lonely in order to prove less ready to adjust to the advancing innovations than are individuals seeking solutions that are compatible with the existing circumstances – which are felt to be an objective, non-modifiable reality. To quote André Gorz, “individuals wish what they can get under the existing circumstances, rather than what they might only get under different circumstances”. It should also be considered that individual labour law has formed, from the start, an integral part not so much of statutory civil law, but of its conceptual categories and reference items. 172 Da costo a risorsa - Attività produttive e protezione dei dati personali Indeed, it has been developing on the margins of an empire in a semi-clandestine fashion, at the barely perceptible speed of a glacier: private law does not accept the performance of work by employees to be outside the scope of its regulatory power, and therefore intends to make its rules immune against the viruses spread by external events. However, private law scholars colonizing this sector of knowledge took for granted what could not be. They assumed that modern capitalism would indefinitely rest on a pinpoint – i.e. individual labour contracts – and that the collective configuration industrial evolution was conferring under many respects on the contractual relationships applying to the exchange between work and wages would only remain marginal within the juridical debate. Actually, those scholars also took for granted that the 1948 Constitution would prove ininfluential. This issue has been debated more than enough by law historians and should therefore be talked off. I am only mentioning it to stress that the legal culture of the ‘50s was such that labour law scholars – including the staunchest supporters of corporativism – felt as ill at ease as private law scholars did when faced with the text of the Constitution. This uneasiness was translated into the arbitrary depletion of the circumstances that juridical analysis should take into account. In fact, they would have liked labour law to remain inside the boundaries of economic transactions, although they protested, at the same time, against this persistent seclusion. But then, the workers’ statute was passed, and those boundaries were broken. 2. It was exactly with regard to the employer-employee relationship that the need for safeguarding individuals’ privacy was first considered within Italy’s legal system. However, not everything did begin with the workers’ statute. Philipp Lotmar first remarked sympathetically, in his pioneering exploration of the yet virgin land of collective bargaining, that the clauses aimed at ensuring that workers would be treated respectfully included the prohibition for masters to address them familiarly. That is to say, the great pre-Weimarian law scholar perceived that regulating personnel management often means juridifying good manners. Therefore, if it is acknowledged that respecting employees’ privacy during and outside working hours is somehow equivalent to properly using forks when eating, it should also be acknowledged that personnel management has been civilised at a more than moderate speed: it took five centuries for forks to become a staple item of European cutlery. On the other hand, if the managed personnel believe that speed to have been lower than expected, perhaps they should also assume their own responsibilities; in- Umberto Romagnoli - Privacy in the Employment Context 173 deed, they cannot be said to have made many efforts to learn that rights may encourage reckless behaviour if they are not construed as reasonably as is desirable. For instance, making private phone calls from one’s office, making false statements as to the clock-in time or having a good time by surfing the Internet are all but conducive to a quicker pace of evolution in this sector – regardless of the damage this may actually cause to a business. Conversely, I would not go as far as maintaining that trade unions should also assume their own responsibilities – as if the gaps and/or limitations affecting trade union policies with regard to privacy protection were exclusively due to their negligence, non-committal conduct and so on. In fact, the most damaging attempts on employees’ dignity are of a totally different nature: they are much rougher, much more elementary in nature, and a priority order is to be defined. One cannot get all and all at the same time. This is why trade unions, on the one hand, endorsed body searching of employees exiting from plants without requesting too many safeguards, whilst in those same years they exerted their pressure to prevent employers from having the power to fire their employees by negotiating important agreements under which unjustified firing was to be punished. That is to say, the collective agreement enabling searches was and is to be regarded not so much as proof of their being appropriate or even necessary to prevent theft, but rather as an empirical index that could allow appreciating the stretch of road yet to be followed in order to civilize the business environment. This does not mean that there were no gaps or limitations affecting the policies implemented in this field. However, it can be shown that exactly for this reason they could be overcome more easily and expeditiously by means of the workers’ statute, which provides that trade union representatives should participate in and be responsible for setting out criteria applying to the exercise of control powers in such a way as to reconcile opposite requirements – which, though of different rank, both strive to be complied with to the widest possible extent under the given circumstances. Though significant, the experience gathered through the provisions under which employee monitoring is only allowed on the basis of a prior collective decision-making procedure is puny compared with that related to implementation of Act no. 146/1990 – concerning strikes in the public facilities sector. In both cases, the quality of the interests at stake and their balancing is the same: in both cases, trade unions may make use of their members’ personal rights in order to ensure that they can be exercised by striking an acceptable balance with the exercise of rights that are granted to third parties by the Constitution. Whilst the provisions limiting the right to strike have not proven especially effective in those sectors – air and rail transport – whose prior turbulence in tradeunion terms was probably the reason prompting Parliament to take steps, it cannot 174 Da costo a risorsa - Attività produttive e protezione dei dati personali be denied that they have been and are still quite beneficial in the remaining employment sectors. In this regard, I would like to discourage the most zealous among you from pinpointing pros and cons to get a final score. This activity is not as interesting at it might appear to be. Definitely more fruitful considerations can be made as regards the fact – unquestionable in itself – that the independent administrative authority in charge of supervising implementation of those provisions, which is a key reference point on account of the multiple functions discharged in connection with the procedures that must be followed to lay down and ensure compliance with the relevant regulations in the tertiary sector, could have never managed by itself to have those procedures accepted by all the entities concerned. Trade unions gave a fundamental contribution towards helping the legislation to go unscathed through the – understandably difficult – acclimatation phase. Conversely, this has not been the case so far with regard to Act no. 675/1996, whose structure is in essence individualistic. One could argue that the drafters of this Act tried to abide by the reality principle so aptly described by the linguist Roman Jakobson, who remarked that the word “cheese” is meaningless for someone who has never tasted cheese in his life. In short, one can and should only talk of what one knows – which is unquestionable. In spite of timely, authoritative objections, they must have thought that individuals are likely to be gifted with considerable informational self-determination and are probably capable to cope with the dangers for their personality resulting from technological development – to a greater extent than trade unions, in any case. Consistently with this stance, they must have considered that it would be inappropriate to provide for involving trade unions in the decision-making concerning deployment and management of automated system to collect and use employees’ personal data. It would be as if one expected to get reliable advice on the taste of cheese from someone who knows as good as nothing about cheese. If, as I believe, this is one of the ways to construe the Act we are considering here, its cultural imprinting can be easily traced. It is related to a law policy perspective that is focussed not so much on the underestimation of the role played by trade unions, but on a distorted view of the labour sector. It has been considered, in short, that privacy is a benefit and/or the hobby-horse of a small portion of the labour world, which is inhabited by privileged minorities, and that trade unions can only be stationed among the huge rearguards where the primary need for a decent job is the prevailing interest – which also accounts for the idea that a single, centralised supervisory authority would be enough. This pauperistic component, which sounds absurd within the framework of an advanced society, did jeopardise and negatively affect the operational effectiveness of Umberto Romagnoli - Privacy in the Employment Context 175 a law that could only profit from the contribution of an entity – the trade union – called upon by the workers’ statute to take steps in respect of closely related issues. This happened just when the statutory ban on monitoring of individuals was losing its force – of its own accord – and, at the same time, was being re-defined as to its scope following the expansion of the privacy concept. The final result was a shift from the attempt to safeguard personal privacy by blocking all kinds of information to the search for means allowing control over information and its circulation to be retained. Therefore, expulsion of trade unions from the individual-information-circulation-control chain, to quote Stefano Rodotà, is a system inconsistency, which no technicalities in construing the outdated statutory provisions will be able to amend. One might argue that the 1996 Act does not provide for previously seeking the trade unions’ opinion as to the purposes and arrangements of the collection and processing of personal data, but it does not prevent these steps from being taken. However, this objection is poorly grounded, since in this case, more than in any other case, a legislative measure appears to be necessary in order to promote trade unions’ participation – partly because trade unions’ reactivity is far from being immediate, as described above, and partly because such reactivity may not be promoted by the existing power configuration. There is no dearth of regulatory precedents in Europe. Ever since 1989, Community leaders gave an input aimed at laying down “more detailed protection of collective nature”. However, this invitation did not produce any effects in terms of legal drafting – that is, an opportunity was wasted not only to restore the effectiveness of the relevant statutory provisions and simultaneously enlarge their scope of action, by plastering the cracks that had appeared in the structure, but also to expand the culture of employer-employee relationships, whose binary configuration (negotiate or fight) is almost endearing. Indeed, since privacy protection requirements arise in a business and manifest themselves in ever-changing ways, the most appropriate means to address and cope with them cannot consist in regulations adopted elsewhere. The unceasing, unforeseeable evolution dynamics of computer science as applied to labour organisation has shown that the law – and therefore, collective negotiation, which has learnt to mimic legislative evolution quite closely – is scarcely capable to keep this matter under control. The most preferable approach is one that is less indifferent to the demand for “homeostatic mechanisms”, to quote Stefano Rodotà, “allowing law to escape a destiny that would be in conflict with its very nature – i.e. turning from a tool bringing about order into an agent of chaos, which gives rise to conflicts without solving them, on account of the widening gap between its rules and reality”. However, such a technique has not yet been identified and developed with the required precision. This is why, pending the adoption of second-generation person- 176 Da costo a risorsa - Attività produttive e protezione dei dati personali al data protection regulations, I would put forward, faute de mieux, the proposal of testing the method based on participation via collective representational bodies. Originality of this proposal is quite limited. It only consists in modulating the contribution to be given by trade unions. Indeed, the latter has already been supported – though amidst a few dissenting opinions – by recent jurisprudence dealing with this issue. The reasons underlying this stance are of many different kinds, but the one I find most convincing has to do with the need to counteract the trend by which assignment of the personal data concerning employees is falling progressively under the scope of proprietary law – as shown by the emphasis put on the individual’s consent, which has been turned into the pillar of the whole legislative framework on condition that it is given freely and on the basis of suitable information. Actually, I find it rather puzzling that one should endorse such an approach exactly at a time when it is considered to be on the wane. Whilst it has come to be regarded as heresy with reference to the workplace, it is but the reflection of an ideology – i.e. of bad conscience – in respect of personal data. Stefano Rodotà has aptly said that authorising the processing of personal data through the individual’s consent is “halfway between regulation and de-regulation”; one cannot deny that the proposal to enhance participation mechanisms in devising privacy safeguards for the employment context serves the purpose of making such protection more secure: individuals’ consent will remain fundamental, but it will be somewhat freer and more informed. Honestly, I do not believe, however, that adjusting the viewpoint in the way I have referred to as the most suitable one will make the proposal more appealing. In Italy, participation is still the province of ambiguity. It does not correspond to a law policy that may be waged in an open manner. Such things are done, but they are not mentioned. It is hindered by the vetoes of entrepreneurs, for whom the rule of thumb saying that “when in doubt, consult” only means a regrettable waiver of their power; it is also meeting with the opposition of some trade unions, which are unwilling to get rid of the pan-contractual “self-sufficiency assumption” mentioned by Aris Accornero. Conversely, modern managers know that for each negotiation there should be hundreds of opportunities for consulting with the other parties; a trade union being aware that a glorious past is no guarantee, in itself, of a bright future should also know that “co-determining does not mean negotiating. It is a matter of skill”, of technical know-how, professionalism. “Who can negotiate is not necessarily capable to co-manage”. Umberto Romagnoli - Privacy in the Employment Context 177 Privacy and Technological Innovation Helmut Bäumler (1) Contents: 1. The Starting Point – 2. From Technological Scepticism to Privacy Enhancing Technologies – 3. The Legislative Response – 4. Data Protection Audit and IT Quality Seals – 5. Market Economy and Data Protection – 6. A Revolutionary Change – 7. Future Tasks of Data Protection Authorities – 8. Outlook for Data Protection in Europe 1. The Starting Point It is no exaggeration to say that the relationships between data protection and information technology were all but easy at the beginning. In fact, it is perfectly correct to see data protection as an answer to the challenges and risks resulting from computerisation in many different sectors. There are actually those who consider the most serious threats to the private sphere to derive from information technology in itself, so that one should not wonder that privacy watchdogs are often accused of regarding computers as the real public enemies. This has eventually lent technologyunfriendly features to the image of data protection, which would allegedly attempt to hinder any developments. Conceiving of data protection as mainly an obstacle to technological progress does not make it a palatable issue; moreover, this type of approach cannot but oblige privacy watchdogs to play the role of people who can only react to technological development without being able to influence it. In competing with information technology, data protection appears to be bound to be the loser because it has to cope with new technological variations – meaning new challenges for the protection of private life – immediately a problem is solved. On the whole, data protection has been allotted a very bleak role from this viewpoint. 2. From Technological Scepticism to Privacy Enhancing Technologies However, another approach has been receiving increased favour for the past few years in data protection circles. It does not consider technology to be the main enemy of data protection; in fact, it seeks to determine whether privacy might be effectively protected with the help of information technology – maybe even better so than with the help of conventional methods. This attempt has immediately shown that information technology tends to turn from a threat into an ally of data protection. The significance of such Privacy Enhancing Technologies (PET) was highlighted for (1) Unabhängiges Datenschutzzentrum Schleswig-Holstein 178 Da costo a risorsa - Attività produttive e protezione dei dati personali the first time in 1995 by the then Vice-President of the Dutch Registratiekamer, Mr. John Borking, during the international data protection conference in Copenhagen. Since then the issues related to development, promotion and use of PET have been a permanent feature of the international data protection debate. A typical example of PET is provided by encryption techniques, which allow securing personal data against unauthorised access. However, other technical means for restricting access, the automatic logging of accesses and changes, the application of data minimisation and data avoidance principles to technical design and other technical features are so many examples of the possibility to cope with data protection issues by means of technology. It is immediately evident that PET integration into the data protection concept allows viewing information technology in a completely different perspective. Regarding computers as allies rather than enemies of data protection can open up wholly new paths. 3. The Legislative Response Lawmakers have also realised that PET are an issue to be taken into account in data protection legislation. The European Data Protection Directive is actually relatively non-committal in respect of technical issues; its Article 6(1e) provides that data should be made anonymous as early as possible, whilst under Article 17 appropriate technical and organisational measures are to be taken to protect personal data against accidental and/or unlawful destruction, accidental loss, unauthorised alteration, disclosure or access “and against all other unlawful forms of processing of personal data”. In this context, information technologies are mainly regarded as a “conservative” tool to ensure enforcement. A step forward was made in 1997 by Germany’s Computerised Services Data Protection Act, whose section 3(4) expressly required providers of computerised services to pursue the objective of collecting, processing and using either no personal data or as little personal data as possible in configuring and selecting technical equipment. Therefore, Parliament took account for the first time not only of the way in which processing operations were organised, but also of the selection and configuration of technical equipment itself. The underlying reasons can be easily understood when considering the core provisions of the above Act in Germany. They include data minimisation, data avoidance and the obligation to enable anonymous and/or pseudonymous access to the Internet by users. A similar provision has been also included meanwhile into the general Federal Data Protection Act, whose Section 3a) also concerns configuration and selection of data processing systems. On the other hand, the underlying assumption consists in the development and availability of data processing systems with the above features, as well as in the H e l m u t B ä u m l e r - P r i v a c y a n d Te c h n o l o g i c a l I n n o v a t i o n 179 possibility for managers of information systems to find and identify these products on the market. Therefore, a fundamental step forward was made in this connection by the Data Protection Act of the Schleswig-Holstein Region, requiring that the Region’s public authorities should implement, on a priority basis, products whose compatibility with the provisions concerning data protection and security was established “through a formal proceeding”. Thus, for the first time the use of PET was not only encouraged from a theoretical viewpoint, but rather made concretely binding in a German data protection law. 4. Data Protection Audit and IT Quality Seals However, the regulations set forth in Schleswig-Holstein go further by referring to a “formal proceeding” to establish the specific features of a given product in terms of data protection and security. This has to do with the certification issue, which is addressed in Section 4(2), second sentence, of the Schleswig-Holstein’s data protection act: the Regional Government is empowered to regulate, by decree, contents, configuration and authorisation to carry out “the proceeding”, i.e. the certification of IT products. The above decree has actually come into force, therefore it can be stated that in Schleswig-Holstein the introduction of IT seals for data protection is fully regulated. More specifically, the Schleswig-Holstein’s model envisages a two-step proceeding. Manufacturers and/or providers of an IT product can apply to an auditing body that is certified by the Independent Regional Centre for Data Protection and have their own product(s) audited. The auditing bodies are evaluated as to their professional qualifications, reliability and independence before being certified. They are required to assess and evaluate products in accordance with the criteria developed and upgraded yearly by the Independent Regional Centre for Data Protection. They will subsequently send their audit report to the Independent Regional Centre for Data Protection, which will establish its soundness and methodological correctness. If all prerequisites are met, the Independent Regional Centre for Data Protection will grant the quality seal, which is valid for two years and may be renewed following a simplified procedure. The peculiarity of this model consists in the fact that the Independent Regional Centre for Data Protection – which also acts as supervisory authority pursuant to Article 28 of the European data protection directive – grants the seal as a public entity of the Schleswig-Holstein region. This is in line with the requests coming from businesses, which preferred the quality seal to be granted under public law provisions rather than under exclusively private law requirements. Some experience has already been gathered in respect of this model; auditing bodies have been certi- 180 Da costo a risorsa - Attività produttive e protezione dei dati personali fied and the first quality seals have already been granted. Work is in progress at federal level as well in Germany to draft an auditing and quality seal act, which is expected to enter into force in the near future. 5. Market Economy and Data Protection With the establishment of auditing and quality seals as new data protection tools, a veritable revolution is taking place in the data protection sector, which is barely visible at first sight but is bound to produce deep-ranging effects and, above all, new opportunities for data protection. Data protection in Germany as well as in most European countries is organised according to a prescriptive law scheme. Data protection laws provide for a certain type of conduct to be followed whilst they ban other types. Any entity failing to abide by the rules is in danger of being punished as provided for by the data protection legislation. In case of an audit, it can expect to be reprimanded and to have its infringement made public, which sometimes may be harmful for its image and even negatively affect its turnover. Under specific circumstances, this may even lead to imposition of a fine and/or institution of a criminal proceeding. However, in Germany as well as in most European countries, data protection authorities are not in a position to carry out blanket controls on businesses and public authorities – on account of the available human and financial resources. Still, one cannot rule out the possibility of a data protection audit, which is why each enterprise and each authority is to take minimum-level precautions to avoid being pinpointed as a data protection rogue. What can data protection offer to someone who abides by the relevant provisions, or actually implements a data protection concept that goes much further? What benefits can he expect? At present, no immediately tangible benefits, since data protection law is currently built after a “negative” pattern – that is to say, it is focussed on detecting infringements, raising criticisms and lodging of complaints. “Positive” data protection, in which correct data protection approaches are rewarded, is slowly developing. This is why one has the impression that with data protection there is always something to lose and very little to gain. However, if anything is ever associated with the concept of loss, it is uncommonly difficult to turn it into a success story. Data protection could benefit from the circumstance that one can get “some” benefits through it. This is the objective pursued by the introduction of market economy components into the data protection system. Audits and quality seals are important tools to achieve that objective. Indeed, they allow businesses that either implement a correct data protection concept or can offer products in line with PET requirements to achieve market advantages – which plays a key role in the market economy system that predominates throughout Europe. H e l m u t B ä u m l e r - P r i v a c y a n d Te c h n o l o g i c a l I n n o v a t i o n 181 6. A Revolutionary Change Auditing and quality seals are therefore the founding stones of a new data protection system that is focussed on providing stimuli rather than issuing obligations and prohibitions. This presentation started with the consideration that data protection must get rid of its technology-hostile approach by turning information technology into its ally. This led obviously to wondering how producers and developers of IT products can be convinced to design such products in a way that is compliant with PET criteria. Raising this issue means – more or less unavoidably – to address the auditing and quality seals issue, which in turn points to market economy considerations. Indeed, auditing and quality seals fall undoubtedly under the scope of the market advantages expected by producers and users of privacy-compliant information technology. Thus, we have ended up unawares being confronted with the issue of the stimuli, benefits and advantages related to data protection – even though our starting point was data protection as based on obligations and prohibitions and modelled after a prescriptive policy. What are the remains of the “old” data protection concept? Undoubtedly we will need clear-cut, effective data protection laws in future as well – this is actually the advantage of Europe compared with the Usa. Additionally, the fully independent supervisory authorities referred to in the EC data protection directive may not be abolished. However, their tasks can become simpler and more practicable if they have increasingly to do with certified IT products and audited data controllers in their supervisory activities. Auditing and quality seals could even result, to a certain extent, into improving their supervision. Customers would pay special attention to the actual implementation of data protection concepts in respect of products and services advertising their auditing and quality seals features. One might argue that probably thousands of customers’ eyes can see better than the eyes of the few professional data protection supervisors. At all events it must be clear that auditing and quality seals as well as an increasingly market-oriented data protection concept should not replace the amply tested tools of “traditional” data protection, but rather supplement them by adding new options. 7. Future Tasks of Data Protection Authorities The “new” data protection concept will also entail a change in the tasks committed to data protection authorities. In addition to the legal competence, they will be increasingly in need of technical know-how. The staff structure in their offices should therefore be modified accordingly. If they do not wish to be directly involved in issues related to auditing and seals, this will be done by private entities – a very promising market is about to open in this sector. If data protection authorities in- 182 Da costo a risorsa - Attività produttive e protezione dei dati personali tend to exert their influence in respect of technical standards, they must address these issues more intensively among themselves. Meetings and workshops devoted so far mostly to the exchange of views on legal issues related to data protection should leave ampler room for technical issues. This is especially important in light of the fact that law-making remains – as it was the case in the past – mostly a matter for national consideration, whereas technology is per se of transnational nature. A typical example is provided by the Internet, which operates in the same way in Rome as well as in Oslo or Moscow. Regarding the Internet, absorbing Internet’s specific work culture can open up new ways for data protection authorities to organise their work processes. Many discussions and voting procedures could be carried out via the Internet in future. It will be considerably easier to process complex work packages in a transnational manner by a subdivision of tasks. An example is provided by the – already existing – Virtual Privacy Office, which includes most data protection authorities in Germany as well as those from Canada, Poland, Switzerland, Slovakia and Netherlands. The Virtual Privacy Office is only the beginning of these new developments and can make available potentialities that will facilitate discharge of the increasingly complex, rapidly changing tasks committed to data protection authorities. The information offer of the Virtual Privacy Office can be accessed on the Internet by visiting the following web site: www.privacyoffice.org 8. Outlook for Data Protection in Europe Data protection in Europe has made a huge step forward with the adoption of the EC data protection directive. The directive has resulted into a comparable level of data protection and transparency for citizens throughout Europe. Still, the EC data protection directive entails a major drawback in addition to this unquestionably beneficial effect – namely, it takes account of technical issues to a very limited degree. In principle this reflects the state-of-the-art debate on data protection in the early ‘90s. Everybody knows that the dynamics of information technology results into very rapid changes to the framework applying to data protection. Continuously adjusting the data protection directive to technical evolution would be a daunting task; this is why it could be considered whether a European regulation applying to audits and quality seals might be developed as a first step in addition to the EC data protection directive. There are ample opportunities for dealing with these issues in a transnational perspective. The IT market is international and every single IT manufacturer and provider cannot but be interested in bringing his own products as much as possible into line with international standards. Should European criteria be laid down for data protection auditing and quality seals, manufac- H e l m u t B ä u m l e r - P r i v a c y a n d Te c h n o l o g i c a l I n n o v a t i o n 183 turers and developers of new IT products would probably strive to comply with those criteria. Data protection would come significantly closer to achieving a longcherished objective, i.e. influencing information technology from the start. Data protection and technological innovation – which are referred to in the title of my presentation – would thereby go hand in hand. This is quite pleasant as an outlook; indeed, it sounds so promising that it does make sense to try and make it real. 184 Da costo a risorsa - Attività produttive e protezione dei dati personali Garanzie e nuove tecnologie Giuseppe Casadio(1) Sono consapevole della non adeguata attenzione che la mia organizzazione (tutto il sindacato) dedica alla specifica e modernissima declinazione della tematica dei diritti individuali e collettivi dei lavoratori a cui presiede l’autorità di garanzia, oggetto di questo convegno. Mi piacerebbe discutere delle ragioni di questa inadeguatezza (quelle indicate da Paissan mi paiono sommarie). Ma questo spero potremo farlo in un prossimo incontro da noi organizzato, auspico con il prezioso contributo dell’autorità di garanzia. Certo è che sul piano della elaborazione siamo poco oltre qualche convegno sulla normativa di base; sul piano dell’azione sindacale poco oltre qualche sporadica esperienza di contrattazione collettiva in realtà produttive di avanguardia e alla tradizionale attività di tutela individuale in casi di conclamata discriminazione; sul piano del pensiero poco oltre la fedeltà ai principi (preziosi) sanciti negli articoli 4 e 8 dello Statuto dei lavoratori e al patrimonio di giurisprudenza che ne è seguito. Questo vale in Italia, ma, in verità anche in Europa. Fatti, pur importanti, come la recente, più volte citata, esperienza dell’accordo sul tele-lavoro o la partecipazione della Ces a qualche audizione finalizzata alla emanazione delle attese direttive comunitarie non possono considerarsi alla stregua di un impegno sindacale pieno e consapevole. Per me, per noi, questo incontro, l’invito che il presidente Rodotà ci ha rivolto a prendere la parola sono una sollecitazione che raccogliamo con serietà per una nostra più diretta partecipazione al farsi del diritto comunitario; per un potenziamento della nostra azione negoziale a livello nazionale e nelle imprese; per elevare la conoscenza e la capacità di intervento dei nostri gruppi dirigenti. D’altronde l’organizzazione che qui rappresento ha ben dimostrato in questi mesi la sua quasi ossessiva fedeltà all’obiettivo della difesa e della espansione dei diritti, individuali e collettivi, delle persone nel lavoro e nella cittadinanza. E il riscontro di consensi che le nostre iniziative hanno registrato, noto forse anche agli ospiti stranieri, va così interpretato. Gli episodi di mobilitazione sociale che hanno contrassegnato i mesi che abbiamo alle spalle non si spiegano con la potenza organizzativa della Cgil; noi abbiamo voluto dare voce ad un altissimo sentimento di dignità delle persone, di rispetto di tutte le differenze, di valorizzazione di tutte le identità, innanzitutto nel lavo(1) Confederazione generale italiana del lavoro Giuseppe Casadio - Garanzie e nuove tecnologie 185 ro; abbiamo sintetizzato questa volontà in uno slogan di cui abbiamo forse anche abusato: per i diritti. E questo slogan ha intercettato una enorme disponibilità, un diffuso sentire (il nesso con le tematiche qui oggi approfondite è evidente). Ci siamo mossi sul terreno che ci è proprio, quello del diritto sostanziale del lavoro (anche se questo flusso di sentimenti e aspirazioni, come si è visto, non è recintabile, in una sola dimensione). Ci siamo mossi con determinazione perché, è necessario dirlo con forza, molte azioni messe in campo da questa maggioranza di governo si proiettano in direzione opposta. Atti legislativi già adottati e, ancor più, altri più consistenti in via di definizione manomettono in profondità il diritto del lavoro, fino a negare l’esistenza di quella “asimmetria di potere fra le parti del contratto” che del diritto del lavoro, in questa parte del mondo che chiamiamo Europa, è il fondamento teorico e culturale. Come si potrà dare effettività anche ai diritti individuali già oggi formalmente sanciti nella L. 300 (e più in generale nell’ordinamento lavoristico) depotenziando la funzione della rappresentanza collettiva, equiparando il contratto di lavoro ad un ordinario contratto commerciale? Eppure ciò è teorizzato nel libro bianco sul Mercato del Lavoro e normato nei principi del ddl delega sul lavoro in discussione al Senato. A quali condizioni di fatto (anche inerenti la possibilità di esprimere e praticare i propri convincimenti politici, sindacali, di fede religiosa, di appartenenza a sensibilità e orientamenti civili ed umani) sarà disposto ad acconsentire il singolo lavoratore quando si troverà solo davanti al potenziale datore di lavoro a sottoscrivere le clausole del proprio contratto individuale? Condivido a questo proposito tutte le considerazioni testè esplicitate dal Prof. Romagnoli sul ruolo che possono e devono essere chiamati a svolgere i soggetti della rappresentanza collettiva al fine di dare effettività ai diritti individuali. E quale soggetto, autorità, istituzione, tutelerà il singolo lavoratore, a fronte di abusi, se il sindacato si sarà nel frattempo trasformato in una istituzione che dopo averlo collocato presso quella impresa, ha certificato la congruità di quel contratto individuale, magari ricevendone in cambio qualche prebenda? Questo, ancora, prevede il disegno di legge sul mercato del lavoro in via di approvazione. Queste che sto formulando non sono apocalittiche ipotesi della irrealtà; sono simulazioni fondate nei dispositivi del nuovo diritto del lavoro in fieri oggi in Italia. Spero di non essere considerato inopportuno e invadente se colgo l’occasione per lanciare, anche da questa autorevole e qualificata sede un preoccupante grido di allarme. Questa grave tendenza regressiva caratterizza la prospettiva contro cui ci bat- 186 Da costo a risorsa - Attività produttive e protezione dei dati personali tiamo con vigore da mesi, e continueremo a batterci, in ragione, se me lo consentite, delle stesse motivazioni che mi spingono, lo ripeto, a raccogliere con molto impegno la sollecitazione che da qui ci viene ad allargare a nuovi ambiti la nostra azione per i diritti delle persone che lavorano. Giuseppe Casadio - Garanzie e nuove tecnologie 187 Safeguards and New Technologies Giuseppe Casadio(1) I would like to start by saying that I am well aware of the inadequate attention dedicated by my organisation (and the trade union as a whole) to this specific and very modern subject concerning the protection of the individual and collective rights of workers by the data protection Authorities, which is at the basis of this conference. I would like to discuss the reasons for this inadequacy (those indicated by Paissan in my opinion are unsubstantial), but we will do that at the next meeting, which we are going to organise, I hope, with the invaluable support of the data protection Authority. Certainly, as far as any discussion on this subject matter is concerned, we have hardly gone past some meetings on ground rules; at a trade union level, we have hardly gone beyond some occasional cases of collective bargaining and our traditional activity of individual protection in cases of clear discrimination; on a theoretical level, hardly beyond our compliance with the (invaluable) principles sanctioned in articles 4 and 8 of the statute of workers and the ensuing relevant heritage of case law. This is true in Italy, but also in Europe. Events like the recent, and already mentioned, case of the telework agreement or the CES participation at some hearing aimed at producing the expected community guidelines, although important, cannot be considered as an exhaustive and conscientious trade union commitment. I think that by bidding us to take the floor, Chairman Rodotà has invited us to participate more directly in developing community law; in fostering our bargaining action at a national and corporate level; in improving our knowledge and the intervention capacity of our executives. After all, the organisation I represent here has over the last months effectively shown its nearly obsessive loyalty to the objective of defending and increasing the individual and collective rights of the people, as workers and citizens. And this is how the consent recorded by our initiatives - of which perhaps our foreign guests are aware - has to be interpreted. The episodes of social mobilization over these last months cannot be explained by Cgil’s organisational power; we have wanted to give voice to a high sentiment of dignity, respect for all discrepancies, enhancement of all identities, especially in the labour milieu; we have summarised our intent in a slogan, which perhaps we have also misused, which is: “for the rights”. And this slogan has been widely accepted (1) Confederazione generale italiana del lavoro - Italy 188 Da costo a risorsa - Attività produttive e protezione dei dati personali and shared (of course its connection with the subject we are dealing here today is quite clear). We have moved on familiar ground, that of labour substantive right (even if this flow of sentiments and inspirations, as we have seen, cannot be fenced in, in only one dimension). We have moved with determination because, and this has to firmly underscored, many initiatives taken by our government head in the opposite direction. Legislative acts that have already been adopted, and even more those that are being developed now, deeply undermine the labour right, to the extent of denying the existence of that “asymmetry of power among the parties to a contract” which in this part of the world called Europe, is the theoretical and cultural basis of labour. How can we support the individual rights already officially sanctioned by Law 300 (and more in general by the labour system), when the function of collective representation is being undermined, and labour contracts placed at the same level as an ordinary trade contract? And yet this is theorised in the white book on the Labour Market and embodied in the principles set forth in the delegated Decree Law on labour being discussed by the Senate. On what factual conditions (also inherent in the possibility of expressing and practising one’s own political, trade union, religious, civic and human beliefs) will the individual worker agree to when, all alone, he will face his employer and sign the clauses of his individual contract? I share, in this regard, all the considerations set forth by Prof. Romagnoli before on the role that trade unions can and have to be called to play for the purposes of giving effectiveness to individual rights. And what entity, authority, institution will protect the individual worker when he suffers abuses if the trade union in the meantime changes into an institution that after placing a worker in a given corporation, certifies the congruity of the individual contract, maybe in return for some profit? This, again is what is envisaged by the bill on the labour market that is being considered. The things I am saying are not apocalyptic assumptions of an unreal situation; they are simulations based on the provisions on the labour law in the process of being developed in Italy today. I hope you will not consider me as inappropriate and intrusive for having seized this opportunity to launch a concerned cry of alarm also in front of this eminent and qualified forum. We have been fighting this serious regressive trend for months, and will continue to do so for the same reasons that will urge me to meet the invitation to extend our action in favour of the rights of workers to new ambits. G i u s e p p e C a s a d i o - S a f e g u a r d s a n d N e w Te c h n o l o g i e s 189 La nuova consapevolezza dei consumatori Enrico Letta (1) Io parto da una frase molto importante che ritengo essere il nocciolo dell’intervento che Mauro Paissan ha svolto prima. Quella appunto della logica per cui il rapporto tra iniziativa economica e i diritti fondamentali deve essere interpretato come un rapporto di alleanza e non di funzionalizzazione, di trade off. Questo elemento – credo – deve condizionare il ragionamento che oggi noi facciamo sul tema della privacy, del costo, del passaggio dal costo alla risorsa. In questa prospettiva, la privacy è certamente un tema nuovo e, come tale, deve obbligare chi si occupa di vicende economiche ad affrontarlo con una mentalità differente rispetto al passato. Ma in cosa consiste questa novità? In primo luogo, nella inedita consapevolezza che contraddistingue negli ultimi anni i comportamenti dei consumatori. Si tratta di un punto per me centrale, che del resto voi affronterete in modo approfondito domani. Le vicende economiche risultano di certo influenzate da questo nuovo protagonismo dei consumatori, che, attraverso le loro scelte, indirizzano gli andamenti del mercato e impongono a chi offre i prodotti di tener conto di questo cambiamento di approccio e di aspettative. In termini più chiari, oggi i consumatori valutano le politiche di privacy dell’impresa come un elemento discriminante. È un fenomeno non ancora generalizzato – questo è evidente – ma tutti gli indicatori a nostra disposizione configurano una tendenza ormai consolidata e in qualche modo indiscutibile, perché unilaterale e senza soluzione di continuità. Ciò impone alla generalità degli operatori economici la necessità di tener conto di un nuovo elemento che condiziona gli orientamenti dei consumatori e diventa – ed eccolo il trait d’union con l’iniziativa economica – fattore chiave nel determinare la competitività delle imprese, specie in una fase in cui alla competizione non ci si può più sottrarre, soprattutto alla luce dell’emergere, su scala globale, di nuovi attori sempre più agguerriti e dinamici. In questa prospettiva può essere affrontata anche la questione fondamentale della fidelizzazione del cliente, in funzione della quale il rispetto della privacy diventa una sorta di valore aggiunto, un elemento qualificante nella percezione del giudizio sulla prestazione di una determinata azienda. Un simile processo vale per la singola azienda, ma anche per il fenomeno ormai crescente delle multi-utilities, che vivono del fatto di poter usufruire su più campi e su più settori del concetto per cui l’informazione sul cliente e il rapporto col cliente è un valore economico. Si tratta – è chiaro – di un elemento nuovo, di straordinaria e fondamentale importanza, (1) Camera dei deputati - Italia 190 Da costo a risorsa - Attività produttive e protezione dei dati personali che investe, ad esempio, anche tutto il terreno dell’applicazione delle direttive comunitarie nel campo della liberalizzazione delle public utilities, nel quale con l’on. Rasi nella scorsa legislatura abbiamo compiuto, mi sembra, un lavoro molto positivo per il Paese. Settore, tra l’altro, nel quale il concetto di informazione, di rapporto con il cliente, diventa un valore economico e spinge l’impresa che fornisce un servizio a ricercare sinergie con altri soggetti, con prevedibili ripercussioni sull’attività dell’Autorità per la concorrenza, che deve valutare questi sviluppi in termini di concentrazioni e di violazione delle leggi antimonopolio. E questo perché l’impresa che opera in più settori rischia di trasgredire le regole della concorrenza per ciascun ambito di attività. Più in generale, la questione si riflette anche su un altro tema cruciale, quale quello che attiene al marketing. Per chiarirci: il non rispetto della privacy del cliente produce un effetto assolutamente controproducente per l’impresa. Effetto, per giunta, amplificato dalla facilità e dalla velocità di trasmissione delle informazioni offerte dai nuovi media. In questa prospettiva, sono convinto che ognuno di noi sia quotidianamente alle prese con la necessità di salvaguardare il proprio indirizzo di posta elettronica, e di tutelarsi dalla quantità, francamente insopportabile, di informazioni e notizie. Sovraesposizione mediatica? Forse. È interessante comunque notare come queste dinamiche seguano un percorso in qualche modo antitetico rispetto a quello della pubblicità. Infatti, così come nell’ambito del marketing, si può riscontrare un andamento abbastanza lineare di crescita dei risultati economici di una azienda e di un prodotto, a seconda della quantità di risorse che quella azienda e quel prodotto investono in pubblicità, in quello della privacy osserviamo un andamento speculare, ma opposto, per cui, superata una certa soglia di ricezione delle informazioni, l’utente finisce per subire un effetto saturazione, che lede all’immagine, al brand, del prodotto o dell’azienda, che invece si vorrebbe promuovere. Quindi: tematiche nuove per le imprese, per i consumatori, per coloro che distribuiscono i prodotti. Ma soprattutto tematiche rispetto alle quali la privacy diventa, a seconda di come viene gestita, un fattore importantissimo, di successo o di insuccesso. Tutto questo suggerisce, inoltre, la nascita di nuove professionalità, specie tra coloro che affrontano il tema della privacy in termini di consulenza aziendale, strategica o di customer care. Entrando più nello specifico – e vengo alla parte conclusiva del mio intervento – è utile concentrarsi sulla situazione italiana e capire quali siano i miglioramenti da approntare nel nostro Paese. Su questo aspetto, soprattutto dal punto di vista legislativo, vi è sicuramente un problema di chiarimento dei tanti dubbi interpreta- Enrico Letta - La nuova consapevolezza dei consumatori 191 tivi che oggi ci sono, legati prevalentemente all’assenza di un testo unico di riferimento. Un testo che stiamo aspettando da tempo, e che dovrebbe essere emanato, pare, in tempi abbastanza rapidi. Ovviamente ce lo auguriamo, soprattutto perché la definizione di un quadro regolatorio certo, razionale, lineare è indispensabile in una fase in cui i soggetti economici e sociali che devono relazionarsi tra loro in questo settore scontano la cronica assenza di punti di riferimento ben identificabili. Dunque, regole chiare, nessun dubbio interpretativo, responsabilità ripartite. Questo chiediamo e questo – mi sembra – sta venendo in questi mesi, grazie anche all’attivismo del Garante, che sta portando avanti una grande opera di comunicazione alle imprese, soprattutto alle Pmi. Per procedere a qualsiasi trasformazione, è necessario, tuttavia, che si abbia una lucida percezione dei tempi che stiamo vivendo. Le facili approssimazioni sarebbero oggi quanto mai deleterie. Anni fa, ai primordi della Rete e della sua utilizzazione, c’è stato un periodo in cui in molti immaginavano che Internet modificasse completamente il modo in cui si produceva e si vendeva. Per la gran parte di noi l’ecommerce, ad esempio, era la nuova frontiera nella vendita dei prodotti. In realtà – ce ne siamo resi conto solo recentemente – l’e-commerce altro non è se non una modalità di acquisto e vendita. A contare è ancora la qualità del prodotto. E poi, proprio per quanto attiene alla commercializzazione, incidono tutti quegli elementi tipici anche delle altre modalità di commercio, prime fra tutti le infrastrutture fisiche. Perché ho fatto questo riferimento? Perché – a mio avviso – quello del commercio elettronico è un caso che ben sintetizza il modo un po’ caotico e non eccessivamente ragionato con cui le imprese si sono lanciate in un settore nuovo e poco conosciuto. È mancata – spesso manca ancora – le selettività delle scelte strategiche. E questo mi pare contrassegnare, più in generale, anche gran parte degli atteggiamenti nei confronti delle nuove frontiere aperte alle attività economiche dall’innovazione tecnologica. È necessario, piuttosto, comprendere quali sono gli elementi davvero decisivi e puntare tutto su questi. Inoltre, occorre acquisire la consapevolezza che, specie in settori nuovi, le regolamentazioni e l’intervento dello Stato non sempre sono costi aggiuntivi e “laccioli” che frenano le attività imprenditoriali. È vero: il Legislatore non può permettersi errori di prospettiva o di approssimazione. Ma allo stesso modo – si pensi a tal proposito alla reazione nei confronti di tutta la normativa in materia di sicurezza – anche i soggetti economici devono accettare le iniziative legislative e i regolamenti applicativi come una forma di tutela, e non come fattori limitativi. Quanto tempo abbiamo impiegato e di quanto ancora abbiamo bisogno perché tutte le nostre attività vengano messe a norma? È opinione abbastanza diffusa che il nostro sistema sia ingessato da troppi regolamenti e da troppe leggi. A mio avviso, tuttavia, non si tratta di un problema di quantità, ma di efficacia nell’imple- 192 Da costo a risorsa - Attività produttive e protezione dei dati personali mentazione e nell’applicazione di queste stesse leggi. Proviamo a pensare alla resistenza con cui l’intero sistema ha reagito al complesso di norme e regolamenti che disciplinano la sicurezza in materia di ascensori. L’eventualità da scongiurare è quella che le stesse imprese si trovino a bypassare le norme perché considerate eccessivamente onerose, sia in termini di adattamento e comprensione, che di costi. I livelli di attenzione vanno quindi attivati subito, nella fase legislativa e di preparazione regolamentare. C’è inoltre il livello comunitario, sul quale in questa sede non è possibile dilungarsi. Mi fa piacere, tuttavia, notare che, rispetto alla situazione della media dei Paesi dell’Unione, l’Italia occupa una posizione all’avanguardia. Il fatto stesso che Stefano Rodotà sia anche presidente dei garanti europei è un elemento importante per noi, sia perché in questa materia il livello legislativo comunitario è semplicemente decisivo, sia perché in una fase quale quella attuale occupare un posto di prestigio nelle istituzioni comunitarie assume un ruolo politicamente strategico. L’altro punto chiave da sottolineare è attinente al coinvolgimento diretto degli operatori nella elaborazione delle norme e riguarda, ad esempio, tutta la materia dei codici di autoregolamentazione, peraltro ancora aperta in Italia. Chiudo con un tema che mi sta particolarmente a cuore. Il riordino quadro dell’intero comparto delle Autorità indipendenti, reale condizione perché il garante, così come le altre autorità, riescano a essere efficaci fino in fondo e indipendenti. La discussione va avanti già da tempo e ha coinvolto soggetti di entrambi gli schieramenti, che hanno portato ciascuno idee e proposte di riforme. Il mio auspicio è che si vada avanti in questa direzione, soprattutto dopo che il ministro della Funzione Pubblica ha espresso la volontà del governo di portare avanti una logica di riordino del settore. Credo che sia importante che questa – che é una materia di riforma istituzionale pura – trovi in Parlamento un confronto libero e aperto. Sul tavolo ci sono numerose proposte formalizzate in disegni di legge che mantengono delle specificità laddove questo è necessario, soprattutto nel caso del garante della privacy, per il quale una omologazione con altri organi e altre autorità indipendenti sarebbe nefasta. Tuttavia, molti sono gli elementi utili per rendere più lineare il rapporto con le altre autorità indipendenti e con gli altri livelli istituzionali, e anche il rapporto legato alla materia dei contenziosi amministrativi, per esempio, che ritengo potrebbero trovare un giusto e positivo chiarimento in sede parlamentare. L’intento è quello di razionalizzare e di rendere più efficiente l’intera materia, con ovvi vantaggi in termini di soddisfacimento delle richieste dei cittadini e degli utenti. Il tutto al fine di avvicinare istituzioni, cittadini e imprese, e contribuire davvero al processo di maturazione di questo Paese. Enrico Letta - La nuova consapevolezza dei consumatori 193 Consumers' New Awareness Enrico Letta (1) I would like to start from a very important passage I consider to be the core of the presentation given by Mauro Paissan – namely, that the relationship between enterprise and fundamental rights should be seen as an alliance rather than as a trade-off. I think that this item should be given top priority in analysing the privacy issue nowadays – the costs of privacy, the transformation of privacy from a cost to a resource. In this context, privacy is undoubtedly a very new issue and should be addressed by scholars in a totally different perspective compared with the past. What does this novelty consist in? I think it consists first and foremost in the unprecedented awareness that has featured in consumers’ behaviour for the past few years. This is a key issue in my view; actually you will be addressing it tomorrow in depth. Indeed, there is little doubt that economy is influenced by this new stance taken on by consumers, who set the pattern of economic events through their choices and require producers and marketers to take account of this change in approach and expectations. More specifically, consumers nowadays consider privacy policies of businesses as a major determinant in their decision-making. Although this is not yet a mass-scale, all-round approach, nevertheless all the available information shows that this is a consistently upward trend as well as one that cannot be questioned because it is unilateral and shows no intermissions. Therefore, economic actors as a whole are required to take into account a new item that influences consumer choices and thereby becomes – here is the link with enterprise and industry – a key feature in ensuring competitiveness, especially at a time when you can no longer escape competition given that increasingly aggressive, dynamic actors arise unrelentingly in a global scenario. This is the perspective in which to also address the fundamental issue of customer loyalty, as a function of which respect for privacy can become a sort of added value – a qualifying item to appreciate the performance of a given enterprise. This is the case for individual businesses, but it applies to an even greater extent to the growingly common “multi-utilities” – whose existence is grounded on the concept that customer information and customer relations are economic assets. This is unquestionably an extraordinary as well as fundamental innovation – for instance, as also regards the application of Community directives concerning liberalisation of public utilities, which is a sector where highly positive results could be achieved for our country together with the Hon. Mr. Rasi during the past legislature. In this sec(1) Chamber of Deputies, Italy 194 Da costo a risorsa - Attività produttive e protezione dei dati personali tor, the information on and relationships with customers are becoming an economic asset and increasingly leading businesses that provide services to pursue a synergic approach by involving several entities. This, in turn, is raising new issues to be coped with by the antitrust authority, which is called upon to assess these developments in terms of concentrations and violations of anti-monopoly laws. Indeed, when doing business in several sectors you run the risk of breaching competition rules in each of the sectors at stake. From a more general standpoint, these considerations apply to another key issue, i.e. marketing. That is to say, failure to respect customer privacy is ultimately counterproductive for an enterprise, and this effect is enhanced further by the ease and quickness of information transmission afforded by new media. I am sure that all of us are daily aware of the need to protect our own e-mail addresses against the by now definitely insufferable amount of information and news. Is this a case of media overexposure? Maybe, however I believe it is interesting to consider that the dynamics underlying this phenomenon are exactly the reverse of those conventionally applying to advertising. Indeed, in the marketing sector one can usually observe that the results achieved by a given business or product increase in basically direct proportion to the resources invested in advertising said business or product. In the privacy sector, the effect produced is exactly the reverse; that is to say, there is an information reception threshold beyond which users get eventually saturated, which spoils the image/the brand of the product and/or business that is being advertised in this manner. Thus, there are new issues to be taken into account by businesses, consumers, and distributors. Above all, the privacy issue can become the key to a successful economic initiative depending on how it is managed. Furthermore, these considerations point to opportunities for creating new professions, in particular as regards addressing the privacy issue in terms of business and/or strategic consultancy or else of customer care. Let me now tackle a couple of points more in detail – so as to approach my conclusions. I think it is helpful to focus on the Italian situation and establish what improvements are to be made in our country. There is undoubtedly the need to clarify several interpretive doubts, in particular from the standpoint of legislation. This is related mainly to the lack of a consolidated reference instrument. We have been waiting for this instrument for a long time, and I understand that it is to be issued shortly. We all hope that it will be so, above all because clear-cut, sensible, and streamlined regulations are indispensable at a time when economic and social actors that are required to interact in this sector are negatively affected by the long-standing absence of clearly identifiable reference points. Therefore, the objectives should be to set out unambiguous rules, do away with interpretive doubts, and allocate re- Enrico Letta - Consumers' New Awareness 195 sponsibilities. This is what we would like to get, and this is what – I believe – has been happening for the past few months, partly thanks to the active role played by the Garante, which is making a major communication effort in respect of businesses, in particular SMEs. However, prior to making changes one should get a crystal-clear picture of the attending circumstances. Simplistic approximation would only be deleterious. There was a time, a few years ago, when Internet had just been discovered and was considered capable to modify all the production and sales mechanisms. Most of us believed that e-commerce, for instance, would be the new sales frontier. In fact, we realised only recently that e-commerce is ultimately a means to perform sales and purchases. What still matters is product quality. Then, account should be taken – exactly in view of marketing products – of all the components that can usually be found in the other types of commerce, first and foremost physical infrastructures. What is the point of all this? In my view, the e-commerce case is an excellent example of the rather disorderly, not especially reasoned approach followed by businesses to cope with a new, unfamiliar sector. There was, indeed there still is, no selective approach in strategic choices – which is, I believe, a feature applying more generally to the stance taken with regard to the new frontiers opened up by technological innovation in the economic sector. One should rather try and understand what components are really decisive and stake all on them. Furthermore, one should become aware that regulations and State interventions do not always carry additional costs and hindrances for businesses, especially as regards new sectors. There is little doubt that lawmakers cannot afford to see things from the wrong angle or be sloppy in their work; however, economic actors should be ready to view legislation and implementing regulations as safeguards rather than limitations – only think, in this regard, of the reaction brought about by all the legislation on safety matters. How long did and will it take for all our activities to be brought into line with safety laws? Our country is widely held to be hampered by an excess of legislation and rules. However, I think that it is not a question of quantity, but of effectiveness in implementing and applying such legislation and rules. Let me quote, as an example, the resistance aroused by the set of laws and regulations applying to safety measures for elevators. The danger to be averted is that the businesses concerned decide eventually to dodge the laws and regulations at stake because they are regarded as too burdensome in terms both of the adjustments required and their understandability and of the costs involved. Therefore, it is necessary to pay the utmost attention from the start, i.e. in drafting legislation and/or implementing regulations. Then there is the Community level to be considered, on which I am not going to dwell. Let me only recall that our country has proved to be on the forefront 196 Da costo a risorsa - Attività produttive e protezione dei dati personali in this area, compared with the situation existing on the average in EU countries. The fact that Stefano Rodotà is currently the chair of the European data protection working party is itself important for us, both because Community legislation plays a key role in this sector and because it is strategically fundamental to hold an influential position within the Community in the current phase. Still on this point, another key requirement consists in directly involving economic actors in the law-making process. Reference can be made, for instance, to the broad-ranging issues related to codes of conduct and professional practice – which are as yet unsolved in Italy. Let me conclude by mentioning a topic I am especially keen on – that is, how to re-organise the whole framework of independent authorities, which is a prerequisite for the Garante as well as the other authorities to be effective and independent to the highest possible degree. There has been a debate on this for some time, which has allowed both majority and opposition members to voice their views and put forward proposals. I hope that further progress will be made in this direction, especially considering that the Minister for the Public Administration expressed the Government’s intention to streamline the regulations applying to this sector. I think that this issue, related to institutional reformation, should be addressed by Parliament via an open-minded, free discussion. There are several proposals tabled in bills submitted to Parliament, in which account is taken of individual peculiarities insofar as this is necessary – in particular, it would be deleterious for the data protection authority to be equated to other independent bodies and authorities. Still, there are many items that can help simplify its relationships with other independent authorities and institutions as also regards, for instance, the handling of disputes under administrative law – a topic that might be appropriately clarified by Parliament. This is aimed ultimately to streamline and enhance the effectiveness of this sector as a whole, which cannot but be beneficial in terms of meeting the demands coming from citizens and users so as to bring institutions closer to citizens and businesses and contribute concretely to the maturation of our country. Enrico Letta - Consumers' New Awareness 197 Contributi S ESSIONE III I MPRESA , UTENTI E CONSUMATORI Sessione III – Impresa, utenti e consumatori Impresa, Utenti, Consumatori: verso un nuovo rapporto Giuseppe Santaniello(1) Sommario: 1. New economy. Imprese, consumatori, utenti. Verso un nuovo rapporto sulla base della privacy – 2. La privacy: costi e benefici – 3. La tutela del consumatore e dell’utente. Le innovazioni - Gli interventi della Comunità europea – 4. Gli antesignani: i sistemi anglosassoni – 5. La legge italiana – 6. Conclusioni 1. New Economy. Imprese, Consumatori, Utenti. Verso un nuovo rapporto sulla base della Privacy Nella fase attuale di profonde trasformazioni e innovazioni dei sistemi economici su scala mondiale il fattore privacy non poteva non collocarsi con la sua particolare rilevanza di significati individuali e sociali e soprattutto con la sua trasfigurazione da costo economico a risorsa dell’impresa. In un interessante libro, dal titolo “Il mondo che cambia”, Antony Giddens (uno dei più influenti sociologi del nostro tempo) ha rilevato che la new economy non può essere ridotta, attraverso una interpretazione superficiale, a una dimensione speculativa legata a una particolare fase di espansione dei mercati, bensì essa incide in profondità sui valori fondanti dei sistemi di convivenza tra gli individui e tra i popoli. In tale quadro emerge uno specifico ciclo evolutivo, per cui nei mercati privacy oriented si sta delineando un rapporto del tutto nuovo, intercorrente fra i tre protagonisti dello scenario economico, l’imprenditore, il consumatore, l’utente, fra i quali si determina per effetto delle regole della privacy una situazione di sostanziale armonizzazione di interessi e di condivisione di obiettivi per molteplici profili. Attraverso la funzione emergente della riservatezza quale fonte di risorse, il sistema non è orientato soltanto verso l’operatore commerciale e la protezione dei suoi diritti, ma pone l’accento anche sulla rilevanza dei consumatori e degli utenti. I quali per tal modo si configurano come fattori di equilibrio del ciclo produttivo e soprattutto come soggetti partecipi, non più in un ruolo inerte. (1) Vice presidente Garante per la protezione dei dati personali - Italia Giuseppe Santaniello - Impresa, Utenti, Consumatori: verso un nuovo rapporto 201 2. La privacy: costi e benefici Ciò premesso, si rileva che i costi della protezione dei dati personali vanno misurati in termini sia pubblici, sia privati. Vi è un costo sopportato dalle strutture amministrative pubbliche nel momento in cui si apre la fase attuativa della leggebase, e vi è un costo pubblico di gestione delle normative che con ritmo incalzante si susseguono nella regolamentazione di una materia in continuo divenire. Tali oneri non sono specifici della privacy, bensì sono generalizzati per ogni tipo di legislazione a carattere innovativo, che richieda l’organizzazione di nuovi nuclei strutturali e funzionali. D’altra parte sussistono una serie di oneri che incidono esclusivamente sulla imprenditoria privata, poiché gli interventi aziendali finalizzati alla data protection hanno forti valenze di tipo commerciale. Basti avere quale punto di riferimento il costo degli adeguamenti strutturali di un’impresa in termini di infrastrutture tecnologiche, di gestione dei processi di trattamento dei dati personali nonché di formazione e aggiornamento del personale preposto a tali compiti. Però tali costi non sono inerti passività aziendali, bensì generano una serie di positività per le imprese. Un impegno degli imprenditori finalizzato a soddisfare le aspettative dei consumatori, degli utenti di beni e dei servizi materiali e immateriali, sollecita le opportunità competitive dell’impresa, promuovendo l’individuazione di formule innovative, per la fidelizzazione dei clienti e la conquista di nuovi mercati. Ogni politica commerciale di ampia prospettiva poggia sul rapporto fiduciario col cliente e ha tra suoi fini un miglioramento di tale relazione. Anzi il vantaggio competitivo, prodotto dalla applicazione di regole aziendali per il corretto trattamento delle informazioni personali, è l’effetto del consolidamento del rapporto fiduciario tra fornitore e consumatore, che la tutela della riservatezza determina. Un recente studio realizzato negli Usa dal Boston Consulting Group ha evidenziato che la crescita del commercio elettronico aumenterebbe, in rapido tempo, oltre il doppio, se l’utente si sentisse sicuro ed avesse fiducia del rispetto della propria privacy nelle transazioni in rete. E già nell’ottobre del 1997 la Commissione europea indicò delle linee di quadro, per sottolineare l’importanza della tutela e della sicurezza delle informazioni personali, al fine di effettuare attività commerciali o comunicazioni private su Internet (Ensuring trust and security in electronic communication, 8 ottobre 1997). La Commissione sottolineò che la tutela dei dati personali (mediante apposite misure di sicurezza dei dati, da parte delle imprese) è il frutto di un’attività composita e permanente, che richiede interventi di tipo organizzativo, sottoposti a continuo aggiornamento e verifica. E soggiunse che le informazioni personali devono essere protette a prescindere dalla loro forma o supporto (cartaceo, informatico o di altro tipo) su cui sono registrate. 202 Da costo a risorsa - Attività produttive e protezione dei dati personali E osservò che il principio di adeguatezza indica una relazione tra misure adottate (o da adottare) e una serie di riferimenti, quali il grado di sensibilità dei dati personali trattati, i criteri di distribuzione interni al titolare, i flussi esterni con altri responsabili, le procedure di divulgazione, il metodo di archiviazione. Ed è significativo che su un piano internazionale si è registrata una sostanziale convergenza fra le imprese e l’utenza nel conferire il valore di risorsa alla tutela della privacy on line, ai fini del potenziamento delle infrastrutture telematiche che costituiscono la fondamentale articolazione della società dell’informazione. Il sondaggio Harris Westin evidenziò come per il 52% degli utenti di computer la tutela della privacy sia il fattore principale che influenza la loro decisione di collegarsi in rete. La conferenza ministeriale europea di Bonn del luglio 1997, nel segnalare l’esigenza delle reti informative globali di offrire ogni opportunità per il rafforzamento dei valori democratici e sociali, ravvisò nella collaborazione e nel supporto degli utenti la forza trainante dello sviluppo delle reti, condizionatamente a una adeguata tutela dei dati personali, al fine di incrementare il rapporto di fiducia fra utenza e rete. Ciò costituiva la dimostrazione che l’investimento in privacy è un fattore costitutivo per lo sviluppo di nuovi prodotti e servizi. 3. La tutela del consumatore e dell’utente. Le innovazioni. Gli interventi della Comunità europea In tale prospettiva della riservatezza quale risorsa di sviluppo dell’impresa, assume valore di fattore essenziale la tutela del consumatore e dell’utente. Il fattore determinante del processo, che ha portato negli ordinamenti dei Paesi partners dell’Unione europea all’esplicito riconoscimento dei diritti dei consumatori e alla loro tutela diretta, è rappresentato dall’attività svolta dalle istituzioni comunitarie. Secondo l’art. 153 del trattato CE (come modificato dal trattato di Amsterdam) la Comunità contribuisce alla protezione della sicurezza e degli interessi economici dei consumatori, alla promozione del loro diritto all’informazione e all’organizzazione dei loro interessi. Ed è stato con il trattato di Maastricht che la protezione dei consumatori, non specificamente considerata originariamente dal trattato di Roma, è divenuta politica comunitaria a pieno titolo, in relazione agli obiettivi di fornire un contributo di rafforzamento delle misure protettive dei consumatori. L’evoluzione, che ha condotto a una specifica politica comunitaria, è stata sostenuta a livello organizzativo da una apposita direzione generale della Commissione, col compito di vigilare sul rispetto degli interessi dei consumatori nell’impostazione delle politiche comunitarie, di rafforzare la trasparenza del mercato, di migliorare la sicurezza dei prodotti e dei servizi di consumo in circolazione nel mercato unico, di accrescere la fiducia dei consumatori, in particolare attraverso un più Giuseppe Santaniello - Impresa, Utenti, Consumatori: verso un nuovo rapporto 203 nutrito flusso di informazioni, di instaurare un dialogo sistematico tra la Commissione e le organizzazioni rappresentative dei consumatori. Da tali fattori viene in rilievo una figura del tutto nuova del consumatore, la cui funzione, di primaria importanza, travalica perfino l’ambito contrattuale intercorrente col fornitore o col produttore, per inserirsi nel quadro degli obiettivi di trasparenza del mercato e di ottimizzazione della qualità dei prodotti. Con la decisione del 25 gennaio 1999 la Comunità si è dotata di uno strumento operativo unitario, stabilendo il quadro generale per le attività volte a promuovere gli interessi dei consumatori e a garantire loro un elevato livello di protezione. Tale quadro è adottato per il periodo 1999-2003 a sostegno e completamento della politica degli Stati membri, e comprende azioni di ausilio ad attività delle organizzazioni europee dei consumatori e di sostegno finanziario a progetti specifici. Gli interventi riguardano quattro settori: salute e sicurezza dei consumatori in relazione a prodotti e servizi; educazione e informazione dei consumatori sui diritti di cui godono; promozione e rappresentanza dei loro interessi. Grande interesse ha mostrato il legislatore comunitario anche per l’accesso dei consumatori alla giustizia. È emerso con particolare rilievo non solo il tema della tutela giustiziale del singolo consumatore, ma anche quello della tutela giurisdizionale degli interessi collettivi e diffusi dei consumatori, in particolare della legittimazione processuale degli enti esponenziali di tali interessi. Dal complesso di queste misure protettive emerge anche una linea prospettica del tutto nuova: quella per cui gli interventi sono rivolti a tutelare non solo le imprese concorrenti nel mercato, ma a garantire anche il consumatore come soggetto che contribuisce con le imprese stesse al regolare andamento di quel modello concorrenziale del mercato, che deve essere salvaguardato per assicurare, nell’interesse generale, un continuo e dinamico sviluppo economico. Alla nozione di consumatore e alla questione relativa alla sua tutela si affianca la figura dell’utente, specialmente in relazione ai servizi pubblici di cui essi sono utilizzatori. Vi sono punti di assimilazione del cittadino utente al cittadino consumatore, ma vi sono anche elementi differenziali tra la posizione di soggezione in cui può trovarsi il consumatore, quale contraente debole nella stipulazione di contratti aventi ad oggetto beni di consumo offerti dai privati, e quella dell’utente di servizi pubblici sottoposto alle determinazioni imposte dall’impresa pubblica erogatrice dei servizi. Ed è proprio su tale profilo che la tutela dei diritti fondamentali della persona può dispiegare la sua efficacia ai fini del corretto ed equo rapporto tra il fornitore pubblico dei servizi e l’utente. 204 Da costo a risorsa - Attività produttive e protezione dei dati personali 4. Gli antesignani: i sistemi anglosassoni Ho citato finora riferimenti normativi prevalentemente di fonte comunitaria per i profili della disciplina consumeristica. Ma va ricordato che, in ordine storico, gli antesignani di tale tutela sono stati il sistema giuridico americano e quello britannico, i quali per primi (e già da molto tempo) hanno accordato protezione anche giurisdizionale a quegli interessi che non sono necessariamente individualizzati (come i diritti soggettivi) ma rivestono carattere ultraindividuale, o categoriale o di gruppo organizzato. Sicchè trascendono il singolo soggetto e si esprimono in una entità collettiva: essi si definiscono interessi collettivi e interessi diffusi. In tale ambito si è collocata, nei sistemi di matrice anglosassone (e non tanto per tradizione codicistica quanto per influsso di common law o per regolamentazioni autodisciplinari) la difesa degli interessi delle associazioni di consumatori e di utenti. Va ricordato che la grande forza innovativa caratterizzante gli ordinamenti giuridici anglosassoni ha riservato alle suddette associazioni consumeristiche l’ingresso della tutela giudiziaria attraverso il riconoscimento delle c.d. azioni di classe (class action). 5. La legge italiana Per quel che riguarda l’ordinamento italiano la l. 281/1998 ha introdotto la disciplina generale dei consumatori e degli utenti. Essa riguarda principalmente tre temi. In primo luogo sotto il profilo sostanziale garantisce i diritti fondamentali e gli interessi individuali e collettivi dei consumatori e degli utenti. In secondo luogo, sotto il profilo processuale, promuove la protezione di tali diritti e interessi, definendo il ruolo delle associazioni dei consumatori in giudizio. In terzo luogo si occupa della rappresentanza a livello istituzionale dei consumatori e degli utenti, istituendo il consiglio nazionale. In particolare la legge tratta dei diritti alla qualità dei prodotti e dei servizi, alla correttezza, trasparenza ed equità nei rapporti contrattuali concernenti beni e servizi, nonché dei diritti all’erogazione di servizi pubblici secondo standard di qualità ed efficienza. 6. Conclusioni Lo sviluppo dei diritti fondamentali della persona, nel cui contesto la privacy mantiene il suo ruolo essenziale, si iscrive nel ciclo attuale di mutazione della società e delle istituzioni, dei modi di essere e di operare degli individui e delle collettività e particolarmente in quella dinamica economica fortemente accelerata, la cui formula definitoria è mondializzazione. Giuseppe Santaniello - Impresa, Utenti, Consumatori: verso un nuovo rapporto 205 In tale visuale la privacy rivela la sua duplice valenza: sia come formula di garanzia per tutti i soggetti, sia come opportunità per le imprese operanti nel mercato. Ma va considerato che il mercato tende a globalizzarsi sempre più, in una dimensione spazio-temporale ad ampiezza crescente. E se da un lato esso si presenta pieno di potenzialità produttive e generatore di nuove risorse sotto tutte le latitudini, dall’altro lato deve evitare il rischio di tensioni, di disequilibri, di scompensi. Occorrono quindi fattori riequilibranti e riumanizzanti, i quali possono rinvenirsi soltanto nella tutela dei diritti fondamentali. Sicchè la formula strategica per determinare uno sviluppo del tutto positivo è quella di crescita di un mercato globale che sia attento ai principi dei diritti fondamentali. In tal modo prendono valore gli sviluppi di un’economia globalizzata, purchè affiancata dalla globalizzazione delle garanzie. 206 Da costo a risorsa - Attività produttive e protezione dei dati personali Businesses, Users, Consumers: Toward a New Relationship Giuseppe Santaniello (1) Contents: 1. New Economy. Businesses, Consumers, Users: Toward a New Relationship Based on Privacy - 2. Privacy: Costs and Benefits - 3. Protection of Consumers and Users. Innovations. European Community’s Initiatives - 4. Forerunners: The Anglo-Saxon Systems - 5. Italian Legislation - 6. Conclusion 1. New Economy. Businesses, Consumers, Users: Toward a New Relationship Based on Privacy In the current phase featuring deep-ranging changes and innovations of economic systems worldwide, the privacy factor was bound to play a major role on account of its significance for individuals and society as well as, above all, because of its potential for turning from a cost into a resource for businesses. In his interesting book on “A Changing World”, Anthony Giddens – one of the most influential contemporary sociologists – remarked that the new economy should not be considered to merely reflect speculative attempts in connection with a specific market expansion phase – as might be suggested by a superficial analysis. In fact, it deeply influences founding values underlying the coexistence of peoples and individuals. Within this framework, a specific evolutionary cycle can be identified, in which a wholly new relationship is taking shape between the main economic actors – i.e. entrepreneurs, consumers, and users - as regards privacy-oriented marketplaces. Because of the effects produced by privacy rules, the interests at stake are growingly harmonised and the targets to be achieved are increasingly shared under many respects. Thanks to the emerging function of privacy as a resourceful aid, the whole system is not focussed only on commercial operators and the protection of their rights; in fact, emphasis is also put on the important role played by consumers and users. The latter become in this way balancing factors in the production cycle – above all, they become actors rather than simply passive bystanders. 2. Privacy: Costs and Benefits Given these premises, it should be pointed out that the costs of personal data protection are to be assessed in both public and private terms. There are undoubt(1) Vice-President, Italian Data Protection Authority G i u s e p p e S a n t a n i e l l o - B u s i n e s s e s , U s e r s , C o n s u m e r s : To w a r d a N e w R e l a t i o n s h i p 207 edly costs that are incurred by a State’s administrative machinery at the time of implementing the basic Act; on the other hand, there are public management costs in connection with the quick-paced enactment of provisions to better regulate this ever-changing sector. These costs are no specific feature of privacy legislation, since they actually apply to all types of innovative legislation that requires organisation of new structural and functional components. There are additionally costs to be borne exclusively by private enterprises, since business actions aimed at ensuring data protection entail considerable commercial costs. Only think of the costs related to adjusting technology infrastructures in a business, managing personal data processing, training and upgrading staff in charge of these activities. However, such costs are no mere business liabilities: in fact, they are a source of assets for businesses. The entrepreneurial commitment towards meeting the expectations of consumers and users of goods and physical/non-physical services can enhance businesses’ competitive chances by promoting the development of innovative approaches to increase customer loyalty and acquire new markets. Any far-sighted commercial policy must be based on customer trust and is aimed at improving such trust. In fact, the competitive advantage resulting from application of business rules for appropriate personal data processing is the outcome of the enhanced trust between supplier and consumer generated by the protection of privacy. A study recently carried out in the USA by the Boston Consulting Group showed that the growth of E-commerce would more than double in a short time span if users felt safe and were confident that their privacy was respected during network transactions. Ever since October 1997, the European Commission laid down framework guidelines to stress the importance of the protection and security of personal information, in order to carry out commercial activities and/or private communications on the Internet (Ensuring Trust and Security in Electronic Communications, 8 October 1997). The Commission pointed out that data protection by way of specific security measures to be adopted by businesses is the outcome of a complex, permanent activity requiring organisational measures that should be continuously updated and assessed. It was also added that personal information should be protected irrespective of its format and/or the media (paper, computerised, or any other kind) on which it is stored. In the Commission’s paper it was also highlighted that the adequacy principle was based on the relationship between adopted (or yet to be adopted) measures and a set of reference criteria such as the degree of sensitivity of the personal data undergoing processing, the controller’s internal circulation rules, external flows to other processors, dissemination procedures, archiving methods, and so on. 208 Da costo a risorsa - Attività produttive e protezione dei dati personali On the international level, businesses and users can be said to have significantly shifted towards the shared understanding of the protection of online privacy as a resource, with a view to strengthening the electronic infrastructure that is the backbone of the information society. A Harris Westin survey has shown that 52% of computer users consider privacy protection to be the main factor influencing their decision to go on the Net. The 1997 Bonn Ministerial Conference pointed out the need for global information networks to provide the amplest opportunity for strengthening democratic and social values and pinpointed user cooperation and support as the driving forces for network development – provided adequate data protection is ensured – so as to enhance the trust relationship between users and the Net. Thus, investing in privacy is to be regarded as a basic feature of quality products and services. 3. Protection of Consumers and Users. Innovations. European Community’s Initiatives Being privacy to be regarded as a resource for business development, the protection of consumers and users takes on fundamental importance. Within the EU, the basic factor that has led to the express recognition of consumer rights as well as to their protection has been the activity carried out by community institutions. Under Article 153 of the EC Treaty – as amended by the Amsterdam Treaty , the European Commission contributes to protecting security and economic interests of consumers, promoting their right to information and organising their interests. It was thanks to Maastricht Treaty that consumer protection – not specifically taken into account in the Rome Treaty – became a component of community policy in its own right with a view to contributing to the enhancement of consumer protection measures. The process leading to a specific community policy was supported in organisational terms by the creation of an ad-hoc general directorate of the Commission, which is responsible for verifying that consumer interests are respected in the shaping of Community policies, as well as for increasing market transparency, improving the security of product and consumer services in the single market, enhancing consumer trust – in particular by expanding information flows -, and setting up and maintaining a dialogue between the Commission and consumer representatives. The above developments have been shaping a wholly new type of consumer, whose function is to be attached fundamental importance since it actually goes beyond the scope of the contract stipulated with suppliers/producers – in fact, it is becoming a part of the market openness policy and product quality optimisation. G i u s e p p e S a n t a n i e l l o - B u s i n e s s e s , U s e r s , C o n s u m e r s : To w a r d a N e w R e l a t i o n s h i p 209 Following its decision of 25 January 1999, the European Community was provided with a unified operational tool in which the general framework applying to the activities aimed at promoting consumer interests and ensuring a high protection level was laid down. This framework was adopted for the 1999-2003 period to support and supplement the policies adopted by the individual Member States; it envisages the support of European consumer organisations as well as the funding of specific projects. Four areas of activity were identified, namely consumer health and education in connection with products and services, education and information of consumers as to their rights, promotion and representation of consumer interests. Considerable attention was also paid at Community level to the availability of legal remedies for consumers. The legal safeguards afforded to individual consumers as well as the judicial protection of the collective interests applying to consumers – in particular as regards the locus standi of consumer organisations intended to further such interests – were found to be especially important. These protective measures also point to a wholly new development, i.e. the fact that the individual measures are aimed not only to protect such companies as operate on the market, but also to provide safeguards for consumers; the latter should be actually regarded as entities contributing - jointly with businesses - to ensuring operation of the market competition model, which must be protected in order to allow continued, dynamic economic development and benefit society as a whole. Consideration of the “consumer” concept and its protection should be accompanied by the analysis of the role played by “users” – with particular regard to public facilities catering for their needs. There are several similarities between user-citizens and consumer-citizens; however, there are also differences between the subjection status of consumers – considered as weak parties in the stipulation of contracts concerning consumer goods offered by private entities – and the subjection status of users of public facilities, who are subjected to the decisions made by the public company delivering the relevant service(s). This is exactly an area, in which the protection of fundamental human rights can prove effective in order to ensure fair, balanced relationships between public service providers and users. 4. Forerunners: The Anglo-Saxon Systems I have referred so far mainly to Community law sources as regards consumer legislation. However, it should be stressed that the forerunners of this type of protection can be found in the American as well as in the British legal systems. They have been 210 Da costo a risorsa - Attività produttive e protezione dei dati personali the first to (also) grant judicial protection to interests that are not necessarily individual-oriented – such as individual rights – as they are of supra-individual nature, i.e. they concern a given category or organised group. From this viewpoint, their scope goes beyond that of the individual’s interest: they are called collective and/or community interests, being the expression of a community group. In Anglo-Saxon systems, the protection of the interests of consumer and user associations has been ensured within this framework – not so much on the basis of statutory instruments, as because of the influence of either the common law or self-regulatory tools. It should be pointed out that the innovation drive of Anglo-Saxon legal systems reserved the legal remedy consisting in the recognition of the so-called class actions exactly for consumer associations. 5. Italian Legislation As to Italy’s legal system, Act no. 281/1998 set forth the general regulatory framework applying to consumers and users. Three main topics can be distinguished. Firstly, the Act guarantees the fundamental rights as well as the individual and collective interests of consumers and users from a substantive viewpoint. Secondly, as regards procedural issues, the protection of those rights and interests is supported in that the role to be played by consumer associations in judicial proceedings is specified. Thirdly, the issue of the institutional representation of consumers and users is addressed; to that end, the Act provides for setting up the National Board of Consumers and Users. More specifically, this Act addresses the rights to product and service quality, fairness and openness in contractual relationships concerning goods and services, and the delivery of high-quality, effective public services. 6. Conclusion The development of fundamental human rights, in whose framework privacy retains its fundamental role, is part and parcel of the changes currently involving our society and institutions, the conduct and life-styles of both individuals and communities – in particular, it is part of the quick-paced economic development mechanism that is usually referred to as globalisation. In this context, privacy shows its dual role – being both a safeguard for individuals, and an opportunity to be seized by businesses. However, the growing globalisation of markets should be also taken into account, as it entails the extension of space and time coordinates. On the one hand, G i u s e p p e S a n t a n i e l l o - B u s i n e s s e s , U s e r s , C o n s u m e r s : To w a r d a N e w R e l a t i o n s h i p 211 markets are rich in production potentialities and can generate new profits at all latitudes; on the other hand, it is necessary to prevent the risk that markets are exposed to tensions, unbalances and decompensation. It is necessary, above all, to counteract such unbalances and humanise market dynamics – which can only be achieved by ensuring the protection of fundamental human rights. Therefore, the key to achieve fully positive developments consists in ensuring growth of a global marketplace that is mindful of fundamental human rights – in whose framework privacy retains a fundamental role. Within this new boundary, the values underlying a universalised economic system can be implemented on the foundations of globalised safeguards so as to achieve widespread progress. 212 Da costo a risorsa - Attività produttive e protezione dei dati personali Competizione economica: i vantaggi della protezione dei dati Giuseppe Tesauro(1) La relazione che lega concorrenza e informazione ovvero, guardando l’altro lato della medaglia, concorrenza e protezione dei dati, ha in primo luogo una dimensione sostanziale, che però non è così lineare come potrebbe a prima vista apparire. Infatti, se la concorrenza perfetta implica come condizione necessaria una puntuale e completa informazione tra tutti gli operatori (quindi l’assenza di asimmetrie informative), è anche vero che lo scambio di tali informazioni può trasformarsi in uno strumento che facilita condotte collusive. È evidente che questa problematica è di fondamentale rilevanza per una Autorità preposta alla tutela della concorrenza, dal momento che in molti contesti diventa cruciale distinguere se la protezione dei dati è essenziale per evitare scambi di informazioni in grado di consentire il coordinamento (esplicito o tacito) tra imprese concorrenti, o se invece tale scambio possa rendere così trasparente il mercato da incentivare strategie competitive a vantaggio del consumatore finale. La rilevanza del tema è dimostrata dal fatto che gli organi di giustizia, sia comunitari che nazionali, hanno da tempo sostenuto la natura illecita dello scambio di informazioni. La liceità o meno dello scambio di informazioni è in primo luogo legata alla natura sensibile dei dati. Questo implica che lo scambio di segreti aziendali, così come di informazioni sulle strategie d’impresa (quali i prezzi o le politiche di marketing) o sulla struttura d’impresa (ad esempio sui costi o sulla funzione di domanda) è elemento potenzialmente sufficiente per individuare uno “spirito anticoncorrenziale” della condotta. Secondo fattore da valutare riguarda la forma con la quale tali dati vengono trasmessi. Infatti, uno scambio di dati aventi natura sensibile in modo disaggregato è da valutare diversamente dal medesimo scambio ma in forma aggregata, ovvero in modo tale da non consentire ai concorrenti di risalire alle informazioni sui singoli operatori. Terzo elemento è la tempistica nel senso che uno scambio di dati sensibili e disaggregati in modo sistematico e ravvicinato nel tempo consente un grado di conoscenza e una capacità di reazione tra concorrenti in grado certamente di agevolare il reciproco coordinamento su equilibri non concorrenziali. Altro elemento è la divulgazione limitata ai partecipanti allo scambio di tali informazioni. Si tratta forse del fattore centrale nell’analisi, dal momento che se i da(1) Presidente Autorità garante per la concorrenza ed il mercato - Italia Giuseppe Tesauro - Competizione economica: i vantaggi della protezione dei dati 213 ti vengono utilizzati solo tra gli operatori concorrenti la loro funzione non può che essere quella di strumento facilitante la collusione, essendo veicolo per l’osservazione delle azioni e pertanto di reazione tra le imprese. Viceversa, se le informazioni sono rese pubbliche, dove per pubbliche si fa riferimento alla divulgazione soprattutto ai consumatori, è possibile che queste assumano la veste di strumento che aumenta la trasparenza nel mercato, facilita il confronto tra i prezzi, la qualità e la gamma dei prodotti/servizi offerti e quindi incentiva il gioco competitivo tra le imprese. La stessa Commissione, già nella Relazione sulla politica della concorrenza del 1977, aveva chiarito che la differenza, o meglio una delle differenze, tra scambi di informazioni statistiche consentiti e scambi vietati concerneva proprio la limitazione della diffusione ai soli operatori e non a vantaggio del mercato (inteso come insieme dei consumatori e dei concorrenti non aderenti allo scambio). Questo tipo di analisi è stata seguita in varie istruttorie condotte dall’Autorità garante della concorrenza e del mercato, da ultimo nel recente caso nel settore assicurativo. Si trattava di un sistema di scambio di informazioni su dati estremamente sensibili (tariffe, premi, tipologie di polizze, sconti, previsioni future, ecc) tra le principali compagnie assicurative, posto in essere tramite una società terza, che è stato qualificato come pratica concordata avente un oggetto illecito, in quanto in grado di facilitare l’uniformazione delle condotte commerciali delle imprese, quindi di determinare premi commerciali più elevati rispetto a quelli che si sarebbero registrati in un mercato concorrenziale. A tale conclusione l’Autorità è giunta rilevando (i) la natura sensibile dei dati (si trattava di informazioni acquisibili solo dalle imprese e non dal mercato), (ii) la disaggregazione delle informazioni poi trasmesse ai partecipanti (i dati erano individuati per singola società), (iii) la divulgazione limitata alle compagnie aderenti al sistema e (iv) alla continuità nel tempo del sistema di trasferimento dei dati di input e di output. Oltre ad essere rilevante essendo il primo caso nel quale lo scambio in sé è stato ritenuto lesivo della concorrenza avendo un oggetto illecito, in grado di facilitare condotte coordinate, esso è stato utile al fine di chiarire i limiti oltre i quali lo scambio di informazioni diventa lesivo della concorrenza. Inoltre, è stato ribadito il principio secondo il quale non rileva la “modalità” attraverso la quale lo scambio viene posto in essere, nel senso che le parti possono anche servirsi di una società terza, senza che questo incida sulla illiceità della condotta. Ciò che rileva è la natura riservata dei dati scambiati, la possibilità di risalire a ogni operatore e la limitazione della loro conoscenza alle parti e non anche ai consumatori. In un simile contesto il trasferimento di quei dati tra le imprese era uno strumento pro-collusivo e certamente non incentivante la trasparenza e in definitiva la concorrenza tra le imprese. La necessità di condurre questo tipo di analisi è stata avvertita in numerosi al- 214 Da costo a risorsa - Attività produttive e protezione dei dati personali tri casi istruttori, nei quali lo scambio di informazioni è stato spesso qualificato come strumentale o come condotta ricompresa in una più complessa e vasta intesa, frequentemente in seno ad una associazione di categoria. Non è facile distinguere se e quando i dati oggetto di scambio meritano protezione, ovvero devono necessariamente rimanere nell’ambito dell’impresa e non diventare oggetto di scambio tra concorrenti, o viceversa meritano la massima divulgazione per favorire il confronto concorrenziale. Una informazione chiara e trasparente al pubblico dei consumatori, in grado di rendere agevole la valutazione delle tariffe, il confronto e la comparazione sui vari parametri tra imprese, potrebbe essere uno strumento importante per rendere trasparente il mercato, aumentare il grado di conoscenza del consumatore sul servizio e quindi indurlo a porre in concorrenza le compagnie nella formulazione delle offerte. I settori ove tale problematica emerge sempre più di frequente sono quelli ove è necessaria una qualche forma di regolamentazione o di controllo pubblico. E’ questo il caso del settore farmaceutico, settore nel quale la rilevazione dai dati sulle vendite appare talvolta funzionale al controllo della spesa farmaceutica pubblica. La ricerca del confine tra dati da proteggere e dati invece da rendere pubblici diventa in questi casi questione delicata. Infatti, in tale settore (oggetto di vari interventi anche comunitari - da ultimo il caso comunitario di abuso Ims) le rilevazioni sulle vendite è arrivato ad un livello di dettaglio da poter praticamente consentire di risalire al farmaco venduto dal singolo medico in un’area di pochissime farmacie. Proprio per il rischio che una simile disaggregazione, frequenza e sensibilità di dati, possa trasformarsi in uno strumento quantomeno disincentivante la concorrenza tra le imprese, l’Autorità ha espresso alcune “preoccupazioni” in una segnalazione al legislatore. Si tratta della segnalazione sulla “Rilevazione dei dati di vendita dei medicinali a carico del Sistema sanitario nazionale”, del 29/03/2001, nella quale è stata rilevata la possibile distorsione della concorrenza derivante da alcune disposizioni, sulla raccolta dei dati concernenti la vendita dei farmaci, effettuata dalle farmacie pubbliche e private, contenute nell’accordo collettivo nazionale tra il Ssn e le farmacie del 3 aprile 1997, nella l. 448/98 (“Misure di finanza pubblica per la stabilizzazione e lo sviluppo”) e nel decreto del Ministero della Sanità n. 7032/99. Le disposizioni prevedevano la raccolta da parte di Federfarma dei dati di vendita contenuti nel fustello dei medicinali dispensati con onere a carico del Servizio sanitario nazionale per la trasmissione al Ministero della Sanità. Tale sistema è stato recentemente esteso dalla legge finanziaria 2001 anche alla raccolta dei “dati presenti sulla ricetta leggibili otticamente relativi al codice del medico, al codice dell’assistito ed alla data di emissione della prescrizione”. L’Autorità ha ritenuto che il sistema potesse produrre effetti restrittivi della Giuseppe Tesauro - Competizione economica: i vantaggi della protezione dei dati 215 concorrenza qualora alcune delle informazioni raccolte fossero state portate a conoscenza delle imprese farmaceutiche. Nessuna distorsione della concorrenza appariva, al contrario, rilevabile con riferimento all’acquisizione di tali dati da parte degli organi del Servizio sanitario nazionale, ovvero delle Asl, delle Regioni e del Ministero della Sanità, essendo in questa ipotesi le informazioni acquisite funzionali al controllo e alle politiche relative alla spesa farmaceutica. Per quanto riguarda invece la cessione di tali dati da parte di Federfarma a soggetti privati, possibilità espressamente prevista, le stesse fonti normative primarie e secondarie non specificavano limiti o cautele in merito al tipo di informazioni che potessero essere cedute o alla loro aggregazione. L’Autorità ha quindi ritenuto che la cessione di tali dati ai soggetti privati, in assenza di specifici limiti e cautele, potesse consentire un utilizzo improprio degli stessi, in grado di ridurre o alterare la concorrenza fra imprese farmaceutiche. La diffusione dei dati in oggetto poteva, innanzitutto, elevare in modo eccessivo la trasparenza del mercato, rendendo più facili condotte non competitive. In particolare, per i farmaci soggetti ad obbligo di prescrizione (medicinali etici in classe A, B e C), la conoscenza diretta o indiretta (attraverso un’aggregazione minima dei dati di vendita) delle modalità di prescrizione da parte dei medici poteva alterare le politiche informativo-promozionali delle imprese farmaceutiche inducendole a porre in essere iniziative dirette anche a ripartizioni territoriali, incidendo in tal modo sui meccanismi di concorrenza. Con riferimento a questa tipologia di farmaci, l’attività informativa-promozionale rappresenta, infatti, uno dei principali ambiti nei quali si svolge il confronto concorrenziale fra le imprese farmaceutiche. Sulla base di tali considerazioni, l’Autorità ha ritenuto opportuno che la disciplina relativa al sistema di raccolta dei dati di vendita dei farmaci soggetti a rimborso venisse integrata con limiti e cautele per l’eventuale cessione a privati dei dati raccolti in base ad un obbligo imposto dalla legge. In primo luogo, è stato rilevato che dovesse essere espressamente esclusa la possibilità che vengano ceduti dati relativi al medico e al paziente. Inoltre, per quanto riguarda i dati di vendita, avrebbe dovuto essere stabilito che essi potessero essere ceduti solo in forma aggregata non in grado di individuare, direttamente o indirettamente, la posizione delle imprese concorrenti con riferimento ad ambiti territoriali estremamente circoscritti; il livello di aggregazione minimo doveva identificarsi con l’ambito spaziale corrispondente al territorio provinciale, ovvero con quello corrispondente alle singole Aziende Sanitarie Locali. Quanto descritto evidenzia la difficoltà di individuare una chiara linea di confine tra dati da proteggere a tutela della stessa struttura competitiva del mercato e dati invece da diffondere per agevolare lo “spostamento” dei consumatori e quindi la aggressività in termini di strategie concorrenziali tra le imprese. La rilevanza della riservatezza di dati ed informazioni confidenziali viene in ri- 216 Da costo a risorsa - Attività produttive e protezione dei dati personali lievo poi in relazione ai procedimenti di concorrenza, in cui vanno considerati insieme ed in rapporto ad altri valori meritevoli di tutela. Una prima questione è l’interferenza della disciplina della privacy sul trattamento delle informazioni confidenziali nell’ambito dei procedimenti di concorrenza. Il regime introdotto dalla disciplina sulla privacy non interferisce direttamente sul regime della riservatezza e dell’accesso prevista dalla normativa antitrust. Questo primo punto mi sembra pacifico, ove si consideri la legge n. 675/96 che in sostanza fa salvi i regimi di comunicazione e diffusione di dati da parte di soggetti pubblici (art. 27, comma 2), nonché le vigenti norme in materia di accesso ai documenti amministrativi (art. 43, comma 2). In secondo luogo, la riservatezza che generalmente viene in rilievo in materia di concorrenza è quella relativa, tranne alcune eccezioni, alle informazioni confidenziali di carattere commerciale delle imprese coinvolte nei procedimenti antitrust. Si tratta cioè di dati non direttamente riconducibili al cosiddetto nucleo duro della privacy, ossia i cosiddetti “dati sensibili” riconducibili alla dignità della persona e di diretta estrazione costituzionale, che nella legge 675/96 ricevono a buon diritto una tutela rafforzata. Ciò, ben inteso, non perché si intende negare riconoscimento alle informazioni confidenziali delle persone giuridiche, parimenti ricomprese nell’ambito di applicazione della legge in questione; ma solo perché, nell’ipotesi di contrapposizione insanabile tra diritto alla riservatezza e diritto di difesa – che in materia di concorrenza possono trovarsi in posizione confliggente - l’esito del contemperamento assume toni meno drammatici di quanto potrebbe risultare in un conflitto con dei dati sensibili legati alla dignità di una persona fisica(2). Ciò premesso, la disciplina specifica del regime della riservatezza in materia di concorrenza viene essenzialmente in rilievo nell’ambito del regime dell’accesso. Nel quadro di un procedimento antitrust il diritto delle parti “imputate” ad accedere ai documenti raccolti nell’ambito dell’istruttoria è ampiamente riconosciuto perché è null’altro che il corollario del diritto di difesa delle parti; ma va contemperato con altri interessi meritevoli di tutela, quali appunto la riservatezza di informazioni di natura personale o commerciale comunicate dalle parti del procedimento, dai denuncianti o parti terze estranee al procedimento. La disciplina nazionale è interamente ispirata a quella comunitaria. In ambito comunitario, in particolare, i principi rilevanti sono esplicitati nella Comunicazione sul diritto di accesso ai documenti acquisiti nei procedimenti antitrust(3), dove la (2) Ciò detto, anche in relazione alla esigenza di riservatezza di informazioni commerciali delle imprese è forse possibile identificare un ancoraggio costituzionale, un po’ più mediato, nel diritto di proprietà e nello stesso diritto relativo alla libertà di iniziativa economica. (3) Comunicazione della Commissione relativa alle regole procedimentali interne per l’esame delle domande di accesso al fascicolo nei casi di applicazione degli articoli 85 e 86 del Trattato CE, degli articoli 65 e 66 del Trattato CECA e del regolamento CEE 464/89, sul controllo delle concentrazioni tra imprese, in GUCE del 23/1/97, n. C 23/3. Giuseppe Tesauro - Competizione economica: i vantaggi della protezione dei dati 217 Commissione fornisce un quadro completo della disciplina rilevante, sistematizzando taluni principi elaborati dalla giurisprudenza comunitaria nella materia(4). La disciplina nazionale prevede dei principi sostanzialmente analoghi. Per cominciare, la disciplina in questione si pone in un rapporto di specialità rispetto al regime generale sancito dall’art. 22 della nota legge n. 241/90 sulla trasparenza dei procedimenti amministrativi per il fatto che sussiste nei procedimenti antitrust l’esigenza di contemperare contrapposti interessi, da un lato il diritto di difesa delle parti, di cui, come si è detto, l’accesso è diretto corollario, dall’altro la salvaguardia di altri interessi meritevoli di tutela, quali la riservatezza di informazioni di natura personale o commerciale comunicate dai partecipanti al procedimento o comunque acquisite dall’Autorità attraverso l’esercizio dei propri poteri investigativi. La specialità della disciplina dell’accesso in materia di concorrenza è stata avallata dal giudice amministrativo (sentenze n. 873 del 15/04/99, Vendo Musica, e n.103 del 14/01/2000, Vetri), nonché ormai anche codificata nell’ordinamento dall’emendato art. 23 della legge 241, nella nuova formulazione recentemente introdotta dall’art. 4, comma 2, della legge n. 265/99. Sotto il profilo soggettivo, il diritto d’accesso è innanzitutto, ed in forma più generosa, riconosciuto alle parti “imputate” del procedimento, che lo esercitano come strumento di esercizio dei diritti di difesa. Inoltre, anche gli altri soggetti che partecipano al procedimento in funzione di un interesse giuridicamente rilevante hanno diritto ad accedere ai documenti del fascicolo. Si tratta in sostanza, di quei soggetti portatori di interessi pubblici o privati, nonché le associazioni di consumatori, cui possa derivare un pregiudizio, diretto, immediato e attuale dalle infrazioni oggetto dell’istruttoria o dai provvedimenti adottati in esito alla stessa ” (cfr. art. 13, comma 1 e art. 7 dpr 217/98). In sostanza, il legislatore identifica l’interesse legittimante all’accesso con il pregiudizio che un soggetto può ricevere dalle infrazioni oggetto di accertamento o dall’esito di un procedimento dell’Autorità. Sotto il profilo oggettivo, sul modello di quanto previsto in sede comunitaria, la legge identifica tre categorie di documenti suscettibili di segretazione: ossia le informazioni riservate, comprensive, tra l’altro, degli atti contenenti informazioni che permettono di svelare l’identità di coloro che hanno fornito l’informazione o che desiderano mantenere l’anonimato rispetto alle parti, nonché taluni tipi di informazioni comunicate alla Commissione a condizione che ne venga rispettata la riservatezza; ii) i segreti commerciali, intendendo per tali quelle informazioni che oggettivamente hanno un valore commerciale sensibile, e la cui divulgazione può arrecare pregudizio economico all’impresa; iii) le note interne, ossia ogni elaborazione degli uffici con funzioni di studio e preparazione del contenuto degli atti nel corso dell’istruttoria, nonché la corrispondenza eventualmente intercorsa con altre (4) Si veda in particolare la sentenza 29 giugno 1995, Solvay c/Commissione, causa T-30/91, p. II-1775. 218 Da costo a risorsa - Attività produttive e protezione dei dati personali istituzioni (art. 13, comma 5). Mentre con riferimento a quest’ultima categoria è sempre esclusa l’azionabilità al diritto di accesso - e così anche in ambito comunitario -, per le prime due l’ostensibilità è garantita entro certi limiti, peraltro differenti per l’una e l’altra categoria di documenti. Per quanto riguarda in particolare le informazioni riservate, si pone un principio “positivo” di accesso cui si può derogare eccezionalmente, sicché questo è di regola consentito nei limiti in cui ciò sia necessario per assicurare il contraddittorio(5). In merito, per converso ai segreti commerciali, la norma prevede una forma di tutela rafforzata, ponendo il principio opposto di sottrazione all’accesso, salvo che dette informazioni non forniscano elementi di prova di un’infrazione o elementi essenziali per la difesa di un’impresa, nel qual caso gli uffici ne consentono l’accesso, limitatamente a tali elementi (6). In altri termini, le divergenze testuali delle disposizioni in causa lasciano pensare ad una deliberata volontà del legislatore di assicurare per la sola categoria dei segreti commerciali una sorta di tutela rafforzata. Concretamente, l’Autorità procede, in relazione alla documentazione per la quale sia stata richiesta la segretazione, al bilanciamento degli opposti interessi all’accesso ed alla riservatezza. (5) L’art. 13 § 2 d.p.r. n. 217/98 prevede che “Qualora i documenti contengano informazioni riservate di carattere personale, commerciale, industriale e finanziario, relative a persone e imprese coinvolte nei procedimenti, il diritto di accesso è consentito, in tutto o in parte, nei limiti in cui ciò sia necessario per assicurare il contraddittorio” (6) L’art. 13 § 3 d.p.r. n. 217/98 prevede che “I documenti che contengono segreti commerciali sono sottratti all’accesso. Qualora essi forniscano elementi di prova di un’infrazione o elementi essenziali per la difesa di un’impresa, gli uffici ne consentono l’accesso, 219 Giuseppe Tesauro - Competizione economica: i vantaggi della protezione dei dati 219 Business Competition: Advantages of Data Protection Giuseppe Tesauro(1) The relationship between competition and information – or, if you consider the other side of the coin, competition and data protection – has substantive features, which are not, however, as simple as one might imagine. Indeed, if a prerequisite for perfect competition is full, detailed information of all stakeholders – i.e. the lack of information asymmetry -, it is unquestionable that the exchange of such information may turn into a tool facilitating collusion. These issues obviously play a key role with regard to an authority that is in charge of safeguarding competition, since in many cases it is fundamental to establish whether data protection is indispensable to prevent information exchanges that might allow competing business to explicitly or tacitly co-ordinate their activities, or maybe those exchanges can enhance market transparency to such a degree that competitive policies are devised with an overall benefit for end-consumers. Proof of the importance of this subject matter is given by the fact the both Community and national judicial authorities have been long upholding the view that information exchanges are unlawful. Lawfulness of information exchanges is related, first and foremost, to the sensitive nature of the data. This implies that the exchange of business secrets and/or information on corporate strategies – such as prices or marketing policies – and corporate structure – such as costs and demand patterns – is potentially enough to establish the existence of “anti-competitive” conduct. A further consideration to be made has to do with the manner in which those data are conveyed. Exchanging disaggregate sensitive data is to be evaluated differently from exchanging those same data in aggregate form, i.e. in a way preventing competitors from tracking information on the individual operators. A third issue has to do with timing, in that exchanging sensitive, disaggregate data in a systematic fashion and at short time intervals allows competing entities to attain a degree of knowledge and response capability such as to undoubtedly facilitate their striking a non-competitive balance. Another item to be taken into account is disclosure as limited to the participants in the exchange of this type of information. This is perhaps the key consideration here: indeed, if the data are only used by competing operators, they cannot but be used as a tool to facilitate collusion – providing a key to interpret activities and react accordingly. Conversely, if the information is published – where published means disclosed to, above all, consumers – it is likely to become a tool enhancing market trans(1) President, Italian Anti-Trust Authority 220 Da costo a risorsa - Attività produttive e protezione dei dati personali parency, facilitating comparison of prices, quality and products/services on offer and, therefore, promoting competitive company strategies. The Commission itself, in its Report on competition policies of 1977, had highlighted that the difference, or rather one of the differences, between lawful and unlawful exchanges of statistical information had to do exactly with the scope of its dissemination – i.e. among market operators rather than within the marketplace as a whole, where marketplace includes consumers and competitors not involved in those exchanges. This type of analysis was carried out in several proceedings instituted by the Italian anti-trust authority – of late, with regard to the insurance sector. In this case it was a system for exchanging information on quite sensitive data – rates, premia, types of policy, discounts, forecasts, etc. – among the most important insurance companies, which had been set up by way of a third-party company. This system was considered to be an instance of concerted practice with a view to unlawful purposes since it could facilitate adoption of unified commercial policies by the relevant undertakings, which would be able to set higher commercial premia compared with those applying to a competitive market. This conclusion could be drawn by the Authority on the basis of (i) the sensitive nature of the information – which could only be gathered by undertakings rather than by the market as a whole, (ii) the disaggregation of the information subsequently forwarded to the participants – the data were specifically intended for the individual companies, (iii) the fact that dissemination was only limited to the companies adhering to the system, and (iv) the continuing nature of input and output data transfers. The importance of this case consists not only in its being the first one in which the exchange of data as such was considered to be in breach of competition rules – being aimed at unlawful purposes in order to facilitate concerted practices – but also in the fact that it could usefully highlight the boundary beyond which exchanging information becomes an anti-competitive practice. Additionally, it allowed re-affirming the principle that the manner in which such exchange takes place is irrelevant – since the parties may also make use of a third-party company without this producing any effects on unlawfulness of their conduct. What really matters is the confidential nature of the exchanged information, the possibility to track each individual operator and the fact that the information is only available to the parties at stake rather than to consumers as well. Given the specific background, transfer of the data among the businesses involved was a means to facilitate business collusion rather than to enhance transparency and ultimately competition. The need for this type of analysis was felt in many other proceedings, where the exchange of information was often found to be either instrumental to or part of a larger, more complex agreement that had frequently been made within a trade association. It is not easy to establish if and when the exchanged data deserve protection or else must absolutely remain inside a business without becoming the subject of an ex- Giuseppe Tesauro - Economic Competition: Advantages of Data Protection 221 change between competitors, or perhaps should be disseminated to the highest possible degree in order to promote competition. Clear-cut, open information to consumers such as to facilitate price assessment as well as comparisons of the different business parameters might be a major tool to enhance market transparency, increase consumers’ awareness of a service and therefore encourage them to get businesses to compete in offering their products. The sectors in which these issues arise with increasing frequency are those requiring some type of public regulation and/or control. This applies to the pharmaceutical sector, where sales data surveys sometimes appear to be instrumental to the control of public expenditure in that sector. Setting the boundary between the data to be protected and the data to be made public becomes a highly sensitive issue under these circumstances. Indeed, sales data have become so detailed in this sector – which has also been the subject of Community measures, including lately the IMS misuse case – that they practically allow identifying the individual drug as sold by the individual physician in an area including very few pharmacies. Exactly because of the risk that such a level of disaggregation coupled with the frequency and sensitivity of the surveyed data might turn into a factor discouraging, if nothing, business competition, our Authority expressed its “concern” in a report submitted to Parliament. This report relates to the “Survey of Sales Data in respect of Drugs Paid for by the National Health System” of 29.03.01 and points out the possible distortion of competition resulting from certain provisions on the collection of drug sales data as performed by public and private pharmacies in pursuance of the national collective agreement between NHS and pharmacies of 3 April 1997 as well as of Act no. 448/1998 (including “Public Financial Measures for Stabilisation and Development”) and the Health Minister’s decree no. 7032/1999. Those provisions required Federfarma [the federation of Italy’s drug manufacturers] to collect sales data as included in the package tags removed from drugs paid for by the National Health System and subsequently forward them to the Ministry of Health. This system was recently extended by the 2001 Budget Act to the collection “of optically readable prescription data concerning physician’s code number, patient’s code number and prescription issue date”. Our Authority considered that this system might produce restrictive effects on competition if any of the collected data were made known to drug manufacturers. Conversely, no distortion of competition appeared to result from acquisition of those data by NHS bodies, since the acquired data were instrumental to control and policy-making in respect of pharmaceutical expenditure. As for Federfarma’s assignment of the data to private entities – which is expressly permitted under the law – primary and secondary legislation sources do not specify limitations and/or precautions applying to the type of information that may be assigned or else to the aggregation level. Therefore, our Authority ruled that as- 222 Da costo a risorsa - Attività produttive e protezione dei dati personali signment of such data to private entities in the absence of specific limitations and precautions might allow inappropriate use of those data such as to reduce or alter competition among pharmaceutical businesses. Dissemination of the data at stake could, first and foremost, enhance market transparency excessively by facilitating non-competitive practices. This applies, in particular, to prescription drugs – so-called ethical drugs included in A, B and C classes – since direct and/or indirect knowledge of physicians’ prescription patterns, based in the latter case on the loose aggregation of sales data, may affect businesses’ information and promotion policies by leading them to take steps aimed eventually at slicing up a given territory – which cannot but alter competition mechanisms. Indeed, with regard to these drugs information and promotion activities make up one of the main areas in which pharmaceutical businesses usually compete. Based on the above considerations, our Authority considered it appropriate for the provisions on collection of sales data concerning refundable drugs to be supplemented by the specification of limitations and precautions with regard to the possibility of providing private entities with data that are collected pursuant to law. Firstly, it was stressed that the assignment of data concerning physicians and patients should be expressly ruled out. Additionally, as for sales data, it should be required that they be only transferred in aggregated format so as to prevent establishing, whether directly or indirectly, the positions of competing businesses within a limited geographic area; the minimum aggregation level should consist in the geographic area corresponding to a province, or else to the individual local health care agencies. This shows how difficult it is to set clear-cut boundaries between data that should be protected in order to safeguard market competition, and data that should be disseminated to facilitate consumers’ “shift” and therefore enhance businesses’ adoption of aggressive competition policies. The privacy issue in connection with confidential data and information is also to be taken into account as regards competition proceedings, where it is to be considered both jointly with and as related to other values deserving protection. A first topic to be considered has to do with the way in which privacy regulations may interfere with processing confidential information in connection with competition-related proceedings. Privacy regulations do not interfere directly with confidentiality and access regulations included in antitrust laws. This first argument cannot be disputed, in my view, especially if one considers that Act no. 675/1996 practically leaves unprejudiced the provisions on data communication and dissemination by public bodies (Section 27(2)) as well as those regulating access to administrative records (Section 43(2)). Secondly, the confidentiality issues that are relevant with regard to competition matters have to do mostly with confidential business information disclosed by businesses that are involved in antitrust proceedings. That is to say, they have to do with data that cannot be classed directly among the so-called core privacy data – i.e. “sen- Giuseppe Tesauro - Economic Competition: Advantages of Data Protection 223 sitive” data, which are related to human dignity and protected directly by the Constitutional Charter, being aptly the subject of enhanced safeguards under Act no. 675/1996. This does not mean that confidential information of legal persons is not taken into consideration – in fact, it falls under the scope of application of the data protection Act; however, if right to privacy and right to defence happened to be in conflict – as may be the case in competition-related proceedings -, the impact of the attempt to strike a balance between those rights should be regarded as less devastating than that possibly resulting from a conflict involving sensitive data related to dignity of individuals.(2) Having said this, the provisions specifically applying to privacy in connection with competition issues are to be taken into account mainly with regard to access issues. Within the framework of antitrust proceedings, the right of “defendant” to access documents collected in the preparatory phase is widely recognised, it being no less than the logical consequence of the parties’ right of defence; however, this right should be reconciled with other interests deserving protection, such as the confidentiality of personal and/or business information that may be disclosed by the parties themselves, the complainants or third parties. National laws are wholly modelled after Community legislation. In particular, the relevant principles underlying the latter were highlighted in the Notice on right of access to documents acquired in the course of antitrust proceedings(3), where the Commission provided a full picture of the relevant provisions by systematising principles developed in Community case law concerning this subject-matter.(4) National law is grounded on basically similar principles. To start with, the relevant provisions particularise the general rules laid down in Section 22 of Act no. 241/1990 on openness of administrative proceedings. A feature of antitrust proceedings consists in the need to reconcile opposing interests – on the one hand the parties’ right of defence, whose direct consequence is the abovementioned right of access, on the other hand the need to ensure respect for other interests deserving protection – such as confidentiality of personal/business information that may be disclosed by the parties to the proceeding or else acquired by the Authority exercising its own investigational power. The fact that competition-related provisions particularise the general rules referred to above was upheld by administrative courts in several decisions and eventually enshrined in the amended text of Section 23 of Act 241/1990 (further to Section 4(2) of Act no. 265/1999). As for the entities concerned, the right of access is granted first and foremost to the parties acting as “defendant” in a proceeding, such parties using this right as a tool (2) Having said this, perhaps the confidentiality requirements applying to business information might be grounded – albeit less directly – on constitutional principles by referring to ownership law and freedom of enterprise. (3) COMMISSION NOTICE on the internal rules of procedure for processing requests for access to the file in cases pursuant to Articles 85 and 86 of the EC Treaty, Articles 65 and 66 of the ECSC Treaty and Council Regulation (EEC) No 4064/89, published in OJEC of 23.01.97 (no. C 23/3) (4) See, in particular, the Decision of 29 June 1995, Solvay v. Commission, Case T-30/91. 224 Da costo a risorsa - Attività produttive e protezione dei dati personali to exercise the rights of defence. Furthermore, the other parties to the proceeding claiming legally enforceable rights are entitled to access the documents included in the case file. Here reference is made basically to entities representing private and/or public interests as well as to consumer associations, which may suffer direct, immediate, present harm on account either of the infringements that are the subject of the proceeding or of the measures taken upon conclusion of the proceeding (see Section 13(1) and Section 7 of Presidential Decree no. 217/1998). Basically, our lawmakers have identified legitimation to access in the harm possibly suffered by an entity either because of the infringements being investigated or on account of the measures that may be taken once the proceeding by our Authority is finalised. As for the substantive matter, three categories of document liable to secrecy rules are referred to in our law after the model set forth at Community level – i.e. confidential information, including records containing information disclosing the identity either of the information providers or of individuals intending to remain anonymous as well as certain categories of information that is supplied to the Commission on condition that it is kept confidential; ii) business secrets, meaning information that is commercially valuable, whose disclosure may be prejudicial to a company in economic terms, and iii) internal notes, i.e. any drafts prepared by officers in order to evaluate and develop the contents of documents to be used in the preparatory phase as well as any correspondence with other institutions (Section 13(5)). Whereas the right of access may never be enforced with regard to the latter category – which is also the case at Community level - , disclosure of the relevant documents is allowed to a certain extent with regard to the former two categories; the extent of disclosure is actually different in the individual case. As regards, in particular, confidential information, an “affirmative” access principle applies that may be derogated from on an exceptional basis – therefore, access is allowed, as a rule, insofar as it is necessary to ensure due process.(5) Conversely, with regard to business secrets a sort of enhanced protection is provided for – access being denied, as a rule, except where the information can provide items of evidence in connection with an infringement, or else essential items of information for a business to defend itself, in which case access is permitted with regard to such items.(6) In other words, the different wording used in the two provisions referred to here would point to the lawmaker’s deliberate intention of ensuring a sort of enhanced protection exclusively with regard to business secrets. In practice, we seek to balance the opposing interests (privacy vs. access) in dealing with documents for which a request of classification has been made. (5) Under Section 13(2) of Presidential Decree no. 217/98, “If a document contains confidential information of a personal, business, industrial or financial character with regard to individuals and businesses involved in the proceedings, the right of access shall be granted, in whole or in part, insofar as it is necessary to ensure due process”. (6) Under Section 13(3) of Presidential Decree no. 217/98, “Documents containing business secrets may not be accessed. If they can provide items of evidence of an infringement, or else essential items of information for a business to defend itself, access shall be granted with regard to said items”. Giuseppe Tesauro - Economic Competition: Advantages of Data Protection 225 The Anonymous Consumer Herbert Burkert(1) Contents: I. Introduction – II. What is the “Anonymous Consumer” – III. Why should we have the Anonymous Consumer? – IV. Does the Anonymous Consumer Make Sense Business-wise? – IV.1. Is the Anonymous Consumer technically possible? - IV.2. Are there still any useful business purposes for non-personal data? – IV.3. Is anonymous data as valuable as personal data? – V. Why do we see so few “Anonymous Consumer” models, and how can we have more of them? – VI. Summing up I. Introduction I intend to approach the issue of the “Anonymous Consumer” by posing four simple questions and looking for brief but not so simple answers: (1) What is the Anonymous Consumer? (2) Why should we have the Anonymous Consumer? (3) Does the Anonymous Consumer make sense - business-wise? And - finally - should the last two questions have been answered in the affirmative, why do we see so few models of the “Anonymous Consumer” and how may this situation be amended? II. What is the Anonymous Consumer? A consumer is any natural person who in the meaning of Art. 2e of the Directive 2000/ 31 is “acting for purposes which are outside his or her trade, business or profession.”(2) The Anonymous Consumer then is a consumer the data on whom, if there is any, cannot be regarded as “personal data” in the meaning of Art. 2 a) of the Directive 95/46 (3), because this data, if any, he or she can no longer be identified ... “directly or indirectly, in particular by reference to an identification num(1) President, Research Centre for Information Law, University of St. Gallen. (2) Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000, on certain legal aspects of information society services, in particular electronic commerce, in the Internal Market (Directive on electronic commerce), Official Journal 17 July 2000, No. L 178 p.1. (3) Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal of the European Communities of 23 November 1995 No L. 281 p. 31. 226 Da costo a risorsa - Attività produttive e protezione dei dati personali ber or to one or more factors specific to his [or her] physical, physiological, mental, economic, cultural or social identity.” Without returning to the debates of the past on the limits of identification and what can really be perceived as “anonymous” in view of the increasing amount of additional knowledge that is available in computer systems today(4), it should suffice for the moment to remember that while to decide whether data is anonymous is a binary decision, this decision has to take into account a large number of “environmental” variables. III. Why should we have the Anonymous Consumer? This question may sound surprising because of its simplicity. If laws require the “Anonymous Consumer” then, of course, we should have the “Anonymous Consumer”. However, behind the question there seems to be a fundamental dilemma of data protection: Data protection is about informational self-determination, and self-determination implies choice. In this context it would be the choice between remaining, becoming or being anonymous and resting identifiable. If the “Anonymous Consumer” is required by law then such choice would be eliminated by the paternal decision of the law maker. Taking away such a choice would de-legitimize the very own normative position of a law maker implementing data protection. Such reasoning, however, would be based on a fallacy, and the normative position can easily be re-legitimized simply by re-questioning the notion of “choice” and by recalling the basic requirements of “choice”: - How frequent are the situations in which a consumer has a real choice between anonymity and identification? - How frequent are the situations in which a consumer can make an educated decision between anonymity and identification? - How frequent are the situations in which a consumer can exercise his or her preference regardless of his or her previous decision? Not very frequent, indeed. - In view of such limitations of choice data protection legislation has wisely supplemented the self-determination principle with a number of other safeguards, like e.g. the data processing principles for data quality and quantity. One of these principles is the “minimum principle” requiring that when designing information handling systems the first question should be whether personal information is needed at all, and if it is such information should be han(4) See already: Burkert, Herbert: Das Problem des Zusatzwissens. In: Kaase, M. et al. (eds..); Datenzugang und Datenschutz. Konsequenzen für die Forschung. Frankfurt am Main 1980, 170-176. Herbert Burkert - The Anonymous Consumer 227 dled as sparingly as possible. Only very recently, the “minimum principle” has only very recently been restated in Recital 30 of Directive 2002/58/EC(5): “ (30) Systems [...]should be designed to limit the amount of personal data necessary to a strict minimum. [...]Where [...] activities cannot be based on aggregated data, they should be considered as [...] services for which the consent of the subscriber is required.” We may therefore summarize: Precisely because choice, as real choice, plays such an important role in the self-determination value system of data protection we do need the “Anonymous Consumer”. The “Anonymous Consumer” remains fully consistent with the normative requirements of data protection. Normative positions, however, have to acknowledge economic forces. This is necessary not to give in into the futility of enforcement in view of such forces, but in order to get a better understanding of the probabilities and conditions of enforcement so that better suited tools of enforcement can be employed. Such tools would have to take into account “the law of natural resistance to law”; or to put it positively, such tools have to consider the attractiveness of the regulatory concept they represent. The next question therefore is: IV. Does the Anonymous Consumer Make Sense Business-wise? This is a very broad question; obviously there are different factors to be considered in different business environments. We will stay here on a more general level. On that level the concept of the “Anonymous Consumer” is occasionally qualified as an absurdity because - very simply - deliveries to real people need real world addresses and real payments from real people to real people have to be settled. However, such a simplistic view neglects technical and organizational opportunities. To understand these opportunities better, it seems useful to break down the initial question into three sub-questions: - Is the “Anonymous Consumer” technically (and/or organizationally) possible (4.1 below)? - If so, are there also reasonable business uses for anonymous consumer data (4.2 below)? - And, finally, are such uses of anonymous data economically equivalent to the use of personalized data (4.3 below)? (5) Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications), Official Journal of 31 July 2002, L 201, p. 37. 228 Da costo a risorsa - Attività produttive e protezione dei dati personali IV.1. Is the Anonymous Consumer technically possible? In a different context(6) we have described the concepts of “Privacy Enhancing Technologies”. Such technologies (i.e. ensembles of technical and organizational measures) make it possible to interact with persons as individual entities without, however, revealing the personal identity of these persons. Some such measures could e.g. easily be implemented (and are already being partially implemented) to solve the delivery and payment problem: Easily accessible places like e.g. filling stations could be designated as delivery points where customers would pick up the goods they have purchased online. Customers would identify themselves via code numbers they have received from the selling company rather than by revealing their personal identity. Forms of payments have already been tested in which e.g. banks act as trusted third parties ensuring payments for deliveries without revealing the identity of the customer to the selling company. On a more general level several approaches could be imagined to create “Anonymous Consumers”. In business transactions - identifiers could be destroyed after a transaction to make any new matching of identifiers and identified object impossible; - identifiers could be entrusted to third parties or trusted entities within business operators or consumer organizations acting behind “Chinese Walls”; - and finally identifiers could be left with the consumer. All these concepts invite technical and organizational imagination; some of these concepts, as indicated above, have already been implemented. With increasing processing speed, miniaturization, higher compression rates, and stronger processing power we can also well imagine a number of innovative engineering solutions which would work particularly well in the context of “Anonymous Consumer” designs. So, basically, the Anonymous Consumer is both technically and organizationally possible. IV.2. Are there still any useful business purposes for non-personal data? This question is best answered by another question: Is there useful planning with (anonymous) statistical data? If not, we should close our statistical offices. - In fact statistical data is useful precisely because it is anonymous: It is the anonymity of the data which helps to ensure (although it is no absolute guarantee) its validity. Data mining applications are using anonymous data to identify consumption patterns and improve production and logistics. Websites assign identifiers for opti(6) Burkert, Herbert: Privacy Enhancing Technologies.: Typology, Critique, Vision. In: Agre, Philip E.; Rotenberg, Marc (eds): Technology and Privacy: The New Landscape. MIT-Press. Cambridge 1997, 125-142. 229 Herbert Burkert - The Anonymous Consumer 229 mization purposes without tracing the identity. So there are sufficiently wide areas in which anonymous data is useful for business purposes. IV.3. Is anonymous data as valuable as personal data? To state it clearly: Consumers who have chosen to remain anonymous cannot be reached as easily with customer targeted information. Other measures of outreach would, of course, still be possible. “Anonymous Consumers” could even still be the object of improved and continuous customer relationship models; with, however, the final choice of being reached resting with the customer. In terms of marketing response, such a design would , of course, reduce the probability of reach which in turn might change the effort/effect-ratio of direct customer relationship models. The profitability of business organizations, however, does not depend on the profitability of a single activity or a group of activities but on the overall profitability of the entity. Privacy considerations and considerations of customer choice are, of course, part of any comprehensive cost-benefit-analysis of a company. The problem of privacy in such models (this applies for security considerations as well) is that it enters calculations more as a soft than as a hard figure. Soft figures are figures which require individual cost (and benefit) assessments based on individual perceptions which in turn are based on a number of factors on which it is difficult to achieve at least inter-subjective consent. Businesses, again with strong differences among business areas, have over the last years put a stronger emphasis on the benefits of consumer privacy, at least judging from advertisement campaigns; although such a statement would need closer scrutiny since at times, particularly banks and insurance companies read privacy simply as confidentiality towards third parties with out necessarily endorsing an “Anonymous Consumer” concept for their own operations. In summary - while anonymous data is by far not synonymous with useless data the outcome of an evaluative comparison largely depends on the privacy input into the cost-benefit analysis. V. Why do we see so few “Anonymous Consumer” models, and how can we have more of them? We have stated so far - that the “Anonymous Consumer” is technically and organizationally possible; - that the “Anonymous Consumer” is still useful in the business context, al- 230 Da costo a risorsa - Attività produttive e protezione dei dati personali though there are questions about his or her comparative value to the “Identified Consumer”; - and that availability of the “Anonymous Consumer” model is a normative necessity. Against these observations it is striking that there are so few models in operation and if they are they are usually not offered as an equivalent choice. We have already indicated one of the possible explanations: - The comparative value of anonymous information is seen as doubtful. We can assume there are other “environmental” factors at work in this situation. We tentatively list some of them - The perhaps most often used argument is that the consumer does not want it. And where there is no demand, there is no supply. This argument is in contrast with consistent results in opinion polls over the last years, which return privacy as very highly valued. This result in turn is, of course, in contrast with very many so-called real-life decisions where consumers constantly seem to give up their privacy in exchange for easy comfort. However, this contrast rather seems to prove that there are no equally comfortable anonymous solutions available to allow real time decisions to be in tune with long term preferences which then would finally turn the demand problem into a supply problem. - Another element is, of course, still a lack of awareness. One of the standard text books on marketing(7) published after the general European directive does not contain references to privacy related issues although it carries a remarkable section on “marketing and society”. There is also - judging from the available sources - very little experience with the use of Privacy Enhancing Technologies in the context of marketing. - Businesses may be subject to a fallacy as regards the effectiveness of personalized marketing which may lead to a tendency to overrate the benefits of identification and underestimate the benefits of privacy. - There are other elements in the business environment, outside the direct control of businesses which discourage the concept of the “Anonymous Consumer”. There are areas where consumers have to identify themselves for public policy reasons. These obligations should not be confounded e.g. with age verification requirements. Such requirements could be fulfilled by technical and organizational means - using Privacy Enhancing Technology approaches like digital signatures. - Consumer Protection is sometimes juxtaposed with Privacy Protection (7) Kotler, Philip; Armstrong, Gary; Saunders, John; Wong, Veronica: Principles of Marketing. The European Edition. Prentice Hall: London etc. 1996. - Boone, Louis E.; Kurtz, David L.: Contemporary Marketing , 9th ed. 1999 introduces the issue as an internet (technology) related problem in a small 5 line section in its chapter on social and regulatory issues (p. 86). Herbert Burkert - The Anonymous Consumer 231 and - would in such a constellation - indeed discourage the implementation of “Anonymous Consumer” models. Again, however, we meet with habits but not with necessities of thinking: Appropriate use of organizational and technological imagination has and will design consumer protection friendly privacy devices. An anonymous charge card e.g. with printout facilities would provide better means of itemized cost control than detailed records kept at business organizations. In essence then, this list basically leaves us with the initial observation: The comparative value of identifiable consumer information is regarded higher than the value of anonymous information and - as a result of this, no sufficient “Anonymous Consumer” models are produced for the market. To change this situation - against the background of the normative requirements - a cost relevant incentive, possibly in terms of “hard” figures, for the creation of “Anonymous Consumer” models has to be created. Several such incentives to increase the observance of data protection have been discussed in various contexts; e.g. the offer to undergo privacy audits and to ease other supervisory measures in exchange. I assume incentives of a more substantial nature are needed to change the outcome of internal cost/benefit-assessments. In parallel to similar current reflections on information security(8), I suggest - particularly against the background of the current regulatory situation in the European Union - to reflect more on measures to substantially increase the costs of privacy infringements in terms of hard figures by increasing fines, civil damages, introducing punitive damages, and facilitating the transfer of costs of privacy investigations to the investigated party. Since such costs enter cost assessments still only as risk figures, which in turn are the product of the expected disadvantage and the probability of being held responsible, such measures have to be accompanied by facilitating privacy infringement procedures. Since almost thirty years now data protection agencies in Europe have constantly emphasized their educative rather than their interventionist function. It is in this spirit that at the European Commission Workshop on Data Protection, in October 2002, during the session “Better Compliance: Guidance, Enforcement and Self-Regulation” , Mrs Susan Gold, Chair for the UNICE Data Protection Working Group had re-emphasized the general assumption: “In order to ensure compliance, the best sanction is the fear of bad publicity and peer pressure. For all organisations the threat of negative publicity in relation to data protection is more than sufficient to encourage, and (8) See: Schneier, Bruce: Fixing Network Security by Hacking the Business Climate. June 2002. Available at : http://www.counterpane.com/presentation4.pdf [last verified 10 February 2003). 232 Da costo a risorsa - Attività produttive e protezione dei dati personali hopefully to ensure, compliance.”(9) Unfortunately, as we have seen with other business regulations in the not so recent past, this is hardly sufficient. Such considerations, as the one quoted above, do unfortunately not enter cost/benefit analyses as hard figures. On the other hand supervisory authorities in the United States have passed substantial fines or transferred considerable sums of investigation costs to investigated parties. It is obvious that a “penalty” oriented approach is not an overall solution to every problem and that the European approach has certainly helped to raise awareness for privacy issues. The recent US approach on the other hand clearly offers ways how to introduce privacy into internal business equations more effectively. It can also not be neglected that there are fundamental differences in the legal environment between most of the European countries and the possibilities and opportunities of US law on these matters, and it is an open question whether and to what effect and with which costs such elements are transferable from one legal culture into another. Again, however, it has been the European Union which at various occasions has made a point of upholding privacy protection as a universal principle and has strived to help this principle gain effect in a process of regulatory convergence, as represented e.g. by the safe harbor approach trying to bridge US and European Union concerns. It is about time that the European Union realizes that convergence works into both directions and that there are elements in the US approach which would deserve at least closer scrutiny. In a nutshell: Art. 24 of the Directive 95/46 is in urgent need of a reappraisal. VI. Summing up So in summing up the answers: Yes, we should have the “Anonymous Consumer”; consumers do want to have a true choice and consumers should have a true choice. This is part of the value system on which we operate and law is there to enforce it. The “Anonymous Consumer” is technically and organizationally possible. The “Anonymous Consumer” model, however, is still not sufficiently attractive as a business model. This situation could be amended - if in the process of regulatory convergence the balance of the cost/benefit analysis could be slightly tilted in favor of privacy by introducing some new cost factors for non-compliance. (9) http://europa.eu.int/comm/internal_market/en/dataprot/lawreport/speeches/gold_en.pdf - page 5 of her summary. Herbert Burkert - The Anonymous Consumer 233 Prevenzione e risarcimento dei danni Pierluigi Monateri(1) Nel mio intervento affronterò tre punti. In primo luogo farò riferimento ad alcuni casi decisi dalle Corti, per chiarire alcuni concetti che credevo elementari e che invece ieri, nel discorso di Etzioni, ho visto ancora confusi, come lo sono credo volutamente nei discorsi di Posner o di altri. Quindi passerò a un secondo punto che è quello di affrontare l’economia della privacy, come ha fatto ieri Gellman, per vedere quali sono le storture tipiche che il discorso economico subisce quando ci si rivolge alla privacy, ovvero come il discorso normale dell’economista viene piegato in considerazioni che, normalmente, non si fanno, in virtù dell’oggetto particolare della privacy. Infine arriverò a considerare la privacy come fattore strategico nella competizione globalizzata che oggi esiste fra Europa e America. Quindi partirò da un punto molto elementare, nel senso di cose che dovremmo sapere, e le affronterò dal punto di vista del legalese, come ha detto Etzioni. Sicuramente il legalese è noioso, ma è fatto per affrontare il mondo in modo preciso. Certamente spesso il legalese è usato per raggirare il prossimo, però sempre ... con precisione! E allora incominciamo col dire che la questione della tutela della privacy non ha nulla a che fare con l’onore e l’identità personale, e, soprattutto ovviamente non ha nulla a che fare col public interest alla rivelazione di dati per evitare che dei reati siano commessi. La privacy in sé ha anche poco a che fare con la tutela dell’onore quale diritto a non vedersi attribuire fatti non veri e infamanti. Allo stesso modo essa si differenzia dal diritto all’immagine e all’identità, i quali, ovviamente, valgono come diritto a non vedersi attribuire fatti e opinioni che non ci appartengono anche se non sono infamanti. In questi casi siamo sempre nell’ambito del rispetto della verità, di ciò che comunque è vero, sia o meno infamante. La riservatezza di per sé, invece, concerne proprio il problema della privativa sui fatti della propria vita, indipendentemente dal fatto che siano infamanti o meno, o altro; si tratta proprio della definizione di un diritto di proprietà, diciamo così, sui fatti della propria vita, anche se avvenuti in pubblico. Fatti neutri, indipendentemente dai loro riflessi morali o sociali, onde lo stesso nome e indirizzo o, appunto, le proprie preferenze alimentari, di consumatore di libri e così via. In tale ottica analizzerò solo tre casi tra cui l’ultimo che Buttarelli ci ha fatto presente ieri, ed è ovvio in questo discorso che se c’è una questione di public interest il diritto o meno di privativa sui propri fatti indifferenti viene meno, per cui questi fat(1) Università degli Studi di Torino - Italia 234 Da costo a risorsa - Attività produttive e protezione dei dati personali ti devono essere rilevati, onde non c’è più possibilità di uso ideologico di questi esempi per contrastare il diritto alla privacy. Cominciamo dal caso del tenore Caruso, per passare a quello degli eredi Petacci e per finire con il caso della Bnl che è stato deciso recentemente dal tribunale di Orvieto. Il caso Caruso è stato deciso dalla Corte Suprema nel ’56, laddove il tenore Caruso si lamentava perché in un film venivano rappresentati alcuni fatti della sua vita privata e famigliare: si vedeva il tenore da bambino che rompeva una brocca e il padre lo picchiava; si vedeva il padre perseguitato dai propri creditori; si vedeva il tenore che dopo i fischi meditava il suicidio sulle scogliere di Bari; si vedeva il tenore che abbracciava una donna all’epoca dei fatti libera, ma sposata all’epoca della proiezione del film. Quindi si può dire che fossero tutti fatti indifferenti, ma gli eredi Caruso si lamentavano della loro divulgazione. La Corte Suprema stabilì in una sentenza che é ancora scritta in un bellissimo italiano, anche se totalmente sbagliata, che, chi non ha saputo o voluto tenere celati i fatti della propria vita, non può pretendere che il segreto sia mantenuto dalla discrezione altrui. Ora, questa è la classica ipotesi dal punto di vista economico, in cui non si ha alcuna titolarità sui fatti, ma un loro semplice “possesso”, onde nel momento in cui perdiamo il possesso dei fatti allora questi diventano liberi e sono commercializzabili. Questa posizione è cambiata nel caso Petacci del ’63. Senza stare ora a narrarne i fatti basti ricordare che la Corte Suprema ha riconosciuto che esiste una titolarità sui fatti della propria vita privata, una titolarità ben al di là del semplice possesso, come vedremo, nel senso che se anche se ne perde il controllo, e questi vengono divulgati si può pretendere che gli altri non li divulghino ulteriormente, che è poi la posizione che è stata assunta dal legislatore. Il caso più recente del tribunale di Orvieto del 2002, che riguarda la Bnl, è particolarmente interessante per noi in quanto applicazione della legge sulla privacy. In tale caso si trattava di alcuni fogli sparsi lasciati sul davanzale di una finestra della banca, fra i quali si trovava la posizione debitoria di alcuni soggetti. Un terzo, che per caso conosce questi soggetti, rinviene tali fogli sparsi con le notizie che riguardano la loro esposizione debitoria e li avvisa. Costoro fanno azione per la violazione della loro privacy e chiedono un risarcimento di 600 mln di vecchie lire. Il tribunale riconosce la sussistenza della violazione della privacy che deve essere in questi casi tutelata, e, rispetto a tanti discorsi sofisticati che abbiamo fatto, possiamo apprezzare la dura rozzezza della realtà italiana. Giacchè, ovviamente, al di fuori dell’Italia a nessuna banca verrebbe in mente di trattare i propri clienti come le banche italiane fanno, e se mai succedesse, quella banca sarebbe penalizzata, ad esempio negli Stati Uniti con dei punitive damages che la metterebbero out of business. Peraltro, nella fattispecie i dati sull’esposizione debitoria degli attori era- Pierluigi Monateri - Prevenzione e risarcimento dei danni 235 no stati ricavati pure in modo illecito, ma erano poi stati distrattamente abbandonati sul davanzale. Il Tribunale ha stabilito un risarcimento di ora 25.000,00 euro per ciascuno degli attori a titolo di danno morale. Invero nella decisione non c’è alcun ragionamento su come si arriva a questa cifra, quindi il problema vero è ovviamente che noi non abbiamo un ragionamento su come arrivare a giustificarla. 25.000,00 euro è tanto o poco? Dal punto di vista della sanzione della Bnl è niente. Tuttavia si potrebbe forse adottare una teoria hayekiana e sostenere che una cifra, un prezzo, ci comunicano sempre molte più informazioni di quelle che sappiamo dire a parole, onde di fronte ad una cifra monetaria abbiamo delle impressioni che poi non sappiamo verbalizzare completamente, e forse dal punto di vista del danno morale italiano classico lo standard di 25.000,00 euro per il foglietto abbandonato sul davanzale rappresenta una somma adeguata, una somma che noi potremo ritenere adeguata anche se non sappiamo spiegare il perché, così come con un mero ricorso all’equità non l’ha saputo spiegare neanche il Tribunale. Ovviamente disponiamo di criteri generali sul risarcimento del danno morale, determinati dalla Cassazione, ed essi sono la densità della sofferenza subita dalla vittima, la gravità del fatto dannoso, la presenza di dolo, colpa o concorso di colpa, e addirittura la condizione economica delle parti. In particolare, in base a tale ultimo criterio, si potrebbe addirittura giungere a dei danni potenzialmente punitivi, giacchè se la parte che ha cagionato la violazione della privacy è molto ricca, mentre l’attore è molto povero, il criterio delle condizioni economiche delle parti, in base alla precedente sentenza della Corte di Cassazione n. 1371 del ’67, permetterebbe di arrivare ad un risarcimento che deve essere sensibile per il soggetto che ha provocato il danno. Ma veniamo ad affrontare l’economia della privacy, in quanto, dopo tutto, la liability cioè le regole di responsabilità civile, non sono che un riflesso giuridico di considerazioni che poi devono avere a che fare con l’economia dei beni che tuteliamo. Orbene in vari discorsi americani, e nella stessa voce privacy che Posner ha redatto per il dizionario Palmgrave di Law & Economics edito da Newman, si mette addirittura in discussione che ci possa essere una titolarità sui fatti indifferenti, dal momento che tale titolarità non sarebbe efficiente. Io credo che alla fin fine Posner abbia ragione, perché se fosse efficiente l’America tutelerebbe la privacy molto di più di quello che facciamo noi. Non ho mai visto, infatti, l’ordinamento americano sposare una teoria inefficiente. Ma ciò vuol dire che molte cose che ci vengono raccontate sul fatto che invece tutelare la privacy è efficiente, e fa bene al sistema economico, forse rientrano nei discorsi ideologici, forse sono discorsi di falsa coscienza. Però, secondo me, Posner ha torto dal punto di vista dei ragionamenti norma- 236 Da costo a risorsa - Attività produttive e protezione dei dati personali li, e cercherò di dimostrarlo molto brevemente. Naturalmente noi possiamo considerare questa risorsa, chiamata privacy come libera, o come affidata ad un titolare, poi possiamo decidere se questo titolare è chi detiene l’informazione, il consumer, ad esempio, o invece chi investe per avere quelle informazioni, quindi ad esempio l’impresa. Può la privacy essere una risorsa libera? Solo le risorse che non hanno un valore economico possono essere libere, altrimenti, se hanno un minimo di valore economico non possono essere libere, altrimenti non verrebbero allocate in modo efficiente. Ora, evidentemente, i fatti che per così dire costituiscono il dominio di una risorsa di privacy hanno un valore economico, altrimenti non verrebbero raccolti, distribuiti, e non verrebbero commercializzati. Quindi la privacy non può essere libera, onde può essere solo di colui che la detiene all’inizio, cioè il consumer, oppure può essere dell’impresa. Allora se noi diciamo che é di colui che la detiene, ovviamente avremo una allocazione normale, cioè la allocazione mediante contratto, perché se i vari soggetti privati hanno la titolarità sui fatti della loro vita, allora questa può venire allocata mediante contratto, e noi sappiamo che questo è il modo più efficiente per allocare le risorse, è il modo per raggiungere la frontiera paretiana. Però Posner non dice così, dice che in questi casi invece occorre che la risorsa sia attribuita a chi ha investito tempo, denaro e costi per procurarsi quella risorsa, ovvero è andato a procurarsi i dati di varie persone, le informazioni su di loro, le ha collezionate e quindi ha creato un bene. Questo ragionamento significa che i privati non hanno un diritto sulle informazioni che li concernono, mentre queste sono possedute legalmente dalle imprese che hanno investito per procurarsele. Tale ragionamento va benissimo, ma rappresenta la teoria del valore-lavoro. Vi è da chiedersi, allora, perché rispetto alla privacy colui che impiegato il lavoro per ottenere la risorsa se ne approria: se ciò vale per la privacy, perché non vale per tutte le risorse scarse? Se il ragionamento di Poster vale per la privacy, allora le terre debbono venire distribuite ai contadini, e i macchinari devono appartenere al proletariato. I cultori dell’economia neo-classica hanno ripetuto fino alla nausea che “nessun pasto è gratis”, e nondimeno ci vengono poi a raccontare che le informazioni sono la risorsa principale della nuova economia, e che tale bene essenziale può essere gratis per l’impresa! Dai più grandi maestri del mercato apprendiamo non c’è una cosa come un free lunch, ma scopriamo che invece esistono delle cose come le free-infos. Ciò è già di per sé buffo, ma diventa veramente paradossale se sosteniamo con- Pierluigi Monateri - Prevenzione e risarcimento dei danni 237 temporaneamente che le infos come risorsa spettano a chi ha investito lavoro per procurarsele. Questa è una allocazione marxista delle risorse che va molto bene, ma sicuramente non è la allocazione mediante il contratto di mercato. Delle due l’una: o bisogna riconoscere che il contratto non è il modo più efficiente per allocare le risorse, o si deve concludere che sul punto i maggiori economisti deviano il discorso economico per giungere ad un risultato che non è in linea con le premesse comunemente assunte della teoria economica. Se tali premesse fossero seguite si giungerebbe de plano ad affermare che esiste una titolarità sulla privacy, e che è proprio tale titolarità che assicura una sua allocazione efficiente in base al contratto, giacchè essa sola assicura che la risorsa graviti verso gli usi socialmente più vantaggiosi. In caso diverso ci dovremmo accontentare di utilizzi subottimali delle risorse connesse. Perché avviene questa deviazione dalle premesse? Cerchiamo di vederlo analizzando, per finire, il contesto strategico della privacy. Secondo me aveva ragione Gellman all’inizio quando diceva che non si può separare la politica dall’economia della privacy. Io ovviamente credo che in teoria, adottando un qualunque modello consueto, è efficiente proteggere la privacy, perché è semplicemente una questione molto rozza di calcolare quanto ciascuno di noi investirebbe per tutelarsi contro la divulgazione e l’espropriazione dei propri fatti, rispetto a quanto invece deve pagare l’impresa semplicemente per chiedere il consenso e collazionare questa informazione. Siccome in teoria i costi di autotutela di tutti i soggetti potenzialmente coinvolti sarebbero molto alti, allora è più economico tutelare la privacy. In pratica, però, questo non avviene, perché uno dei paradossi è che questo costo che i consumatori avrebbero ad autotutelarsi non viene pagato. Ovvero sebbene nei questionari i consumatori dimostrino una forte preferenza per la tutela della loro privacy, in pratica essi non sono disposti ad attivarsi per la sua tutela. Quindi in realtà il costo è teorico L’autotutela diffusa, che porta a concludere a favore della tutela della privacy, è un costo che in pratica non viene pagato, e quindi, dal punto di vista della business efficiency, risulta più conveniente abbassare ulteriormente i costi delle imprese non tutelando la privacy, e quindi esonerandole dai costi associati alla gestione dei diritti di privacy dei consumatori. La società nel suo complesso in realtà ci guadagna a non far pagare le acquisizioni di dati all’impresa, perché, ammessa la tutela della privacy, l’impresa deve effettivamente pagarne i costi associati, mentre i consumatori non pagano il loro costo di autotutela, perché in realtà non si autotutelano, quindi in realtà una società che tutela di meno la privacy affronta costi sociali complessivi inferiori. 238 Da costo a risorsa - Attività produttive e protezione dei dati personali Credo che tale differenza tra i costi fittizi dell’autotutela e i costi reali dell’impresa in regime di tutela legislativa della privacy debba venire esplicitamente assunta, e non nascosta nelle pieghe ideologiche del dibattito, mediante operazioni maldestre di stortura dei ragionamenti consueti. Veniamo così veramente al nocciolo della competizione globale tra America e Europa giacchè a me sembra evidente che, sul punto, la cittadinanza americana, una volta tanto, nel mercato globale delle idee, si pone come una cittadinanza di seconda classe. Peraltro ciò avviene in un’area strategica come quella dei diritti di cittadinanza dei consumatori, che rappresentano la vera essenza della cittadinanza globalizzata. L’atteggiamento americano rappresenta però una sfida insidiosa, poiché si tratta di una cittadinanza di seconda classe, ma più efficiente, come abbiamo dimostrato. Da un lato una race to the bottom nel campo della cittadinanza rappresenta una sicura sciagura possibile nel mondo della globalizzazione. Dall’altro lato standard troppo elevati di cittadinanza possono rendere i sistemi che li sostengono troppo deboli nel mondo della competizione globale. Ormai non è più possibile realizzare la cittadinanza in un solo paese. Ciò significa o dover rinunciare ai propri standard, o provare a farli trionfare a livello di convenzioni sovra-nazionali. In entrambi i casi la sfida sulla cittadinanza tra Europa e America è soltanto agli inizi. Pierluigi Monateri - Prevenzione e risarcimento dei danni 239 Prevention of and Remedies for Damage Piergiuseppe Monateri(1) I am going to deal with three main issues in my presentation. Firstly, I will refer to a few court decisions in order to clarify concepts that I considered to be basic, whereas I realised that they are still blurred – as shown by Professor Etzioni’s presentation yesterday – and they are probably knowingly so as regards Posner’s and other scholars’ writings. I will then deal with another issue – I will try and address privacy economics, as Mr. Gellman did yesterday, in order to highlight the flaws typically affecting economic considerations whenever privacy issues are taken into account – that is to say, how privacy-related peculiarities result into twisting economic principles to serve considerations that otherwise would not be contemplated. Finally, I will deal with privacy as a strategic factor in the globalised competition currently existing between US and Europe. Let me start from a basic consideration, i.e. from something we all should be aware of. I am going to address this from a “legalese” viewpoint, to quote Prof. Etzioni. Undoubtedly legalese is boring, however it has been developed to deal with worldly circumstances accurately. Undoubtedly legalese has been also developed to fool our neighbours, however with legalese you can fool them accurately. Let us start from the concept, therefore, that privacy protection is in no way related to personal reputation and identity – above all, it has obviously nothing to do with public interest in data disclosure to prevent commission of certain offences. Indeed, privacy as such is minimally related to protection of one’s honour in terms of the right not to be associated with untrue, defamating events/statements. Similarly, it is different from the right to one’s image and identity, which is to be construed as a person’s right not to be associated with events and opinions that are unrelated to that person – regardless of defamation. In these cases the focus is on respect for truth, for what is fundamentally true whether or not it provides information. Conversely, privacy as such is related exactly to monopoly over facts and circumstances of one’s own life regardless of whether they may be defamating; it is related to the establishment of ownership rights, so to say, in respect of facts and circumstances of one’s own life, even though they may have occurred in public. Such facts and circumstances are neutral, i.e. they are considered independently of their social and/or moral effects – this is why they include one’s name and address, as well (1) Turin University - Italy 240 Da costo a risorsa - Attività produttive e protezione dei dati personali as food preferences, reading habits, and so on. Given these premises, I am going to deal with only three cases including the latest one mentioned by Mr. Buttarelli yesterday. Obviously, if public interest is at stake, the monopolistic right over one’s facts and circumstances no longer applies – therefore, the examples I will be referring to may not be used to object to privacy rights. I will start from tenor Caruso’s case, to discuss then the Petacci estate case and finally, the BNL-bank case, which was recently decided upon by Orvieto court. The Caruso case was dealt with by the Supreme Court in 1956. Mr. Caruso claimed that a film depicted certain events of his private and family life: the tenor was shown when, as a child, he broke a pitcher and was beaten by his father; then the film showed his father being harassed by creditors, and the tenor who, after being hooted, contemplated suicide on Bari sea-front rocks; the tenor was then shown embracing a woman that was not married at that time, although she was married when the film was released. Therefore, it might be argued that all these circumstances were indifferent facts, however the Caruso heirs complained against their being disclosed. In its decision – which is written splendidly in Italian, though completely wrong –, the Supreme Court ruled that whoever has been unable or unwilling to keep circumstances related to one’s own life confidential has no title to demand that others should keep those same circumstances a secret. Well, this is a typical economic view, according to which one has no ownership rights in respect of the information concerning certain circumstances – being merely “the holder” of the information. Therefore, immediately one ceases being the holder, the information becomes freely available and may be marketed. A different stance was taken in the Petacci case of 1963. Without dwelling on the relevant details, let me only point out that the Supreme Court recognised the existence of ownership rights in respect of circumstances related to one’s own private life – such rights being wider in scope than those related to possession, in that if you lose control over the information related to those circumstances, and the information is subsequently disclosed, you may demand that the others do not disclose it further – which is actually the stance taken by lawmakers. The most recent case decided upon by Orvieto court in 2002, which concerned a bank (Bnl), is especially of interest for us as it is an instance of application of the data protection act. The case had to do with some loose sheets of paper that had been left on a windowsill outside a bank agency – among which information on a few customers’ outstanding debts was included. A third party who happened to be acquainted with those customers found the misplaced sheets with the information on the customers’ debts and informed the persons concerned. The latter sued the bank on account of breach of privacy and claimed damages for a total of 600 million Liras. Pierluigi Monateri -Prevention of and Remedies for Damage 241 The court ruled that there had been breach of privacy, which should have been safeguarded. Compared with so many sophisticated considerations we have made so far, here one can appreciate the harsh, rough reality of Italy’s situation. Indeed, no bank outside Italy would ever dream of treating its customers the way Italian banks currently do; should it ever happen, that bank would be punished, for instance in the States, by the so-called punitive damages, which would place it immediately out of business. Additionally, in the case at stake the information on the plaintiffs’ outstanding debts had been collected unlawfully – to be then recklessly left out on a windowsill. The Court awarded damages for a total of 25,000 euros to each plaintiff, on account of non-pecuniary damage. It should be stressed that no reference is made in the decision to the criteria used for calculating such amount; therefore the actual issue to be addressed here consists in the fact that we do not know yet how to account for it. Are 25,000 euros a lot of money, or not? They are a trifle if regarded as punitive damages for the Bnl-bank. However, one might apply a Hayekian approach by arguing that any figure, any price do communicate much more information than what is conveyed by words – therefore, when confronted with money figures one gets an impression that cannot be fully described in words. Perhaps if one considers the amount of non-pecuniary damages typically awarded by Italian courts, 25,000 euros for having left some sheets of paper on a windowsill might be regarded as adequate compensation – even though one cannot explain why, indeed the court itself was unable to account for its decision and merely referred to fairness considerations. Of course there are general criteria applying to compensation for non-pecuniary damage – they have been set forth by the Court of Cassation and include the degree of suffering experienced by the victim, the seriousness of the damage, the presence of intention, negligence or contributory negligence and the parties’ economic status. In particular, based on the latter criterion one might actually envisage potentially punitive damages: if the party that caused the breach of my privacy is very rich, whilst I am quite poor, the criterion related to the parties’ economic status could allow awarding damages that are substantial also with regard to the defendant’s assets – pursuant to the precedent set by the Court of Cassation’s decision no. 1371/1967. Let us now address the issue of privacy economics, since – after all – liability is nothing else but the legal reflection of considerations that have to do with the economics of the goods we wish to protect. Well, in several US texts as well as in the “Privacy” page written by Prof. Posner for Palmgrave’s Law & Economics dictionary, published by Newman, the existence of ownership rights in respect of mere indifferent facts is actually questioned 242 Da costo a risorsa - Attività produttive e protezione dei dati personali – since such rights would be allegedly inefficient. I believe that Prof. Posner is right, all things considered: indeed, if the above approach were efficient, America would protect its privacy much more than we do. I have never seen an inefficient theory being supported by the US legal system. However, this means that many things that are said as to the cost-effectiveness of protecting privacy, which would be beneficial for the economic system, are actually a matter of ideological stance – perhaps they reflect a false conscience. However, in my opinion Prof. Posner is wrong if the standard line of reasoning is followed – and I am going to show it briefly. Obviously, one can regard this resource called privacy either as free or as committed to a controller; one may then decide whether the controller is he who holds the information, for instance a consumer, or maybe he who invests to get that information, for instance an entrepreneur. May privacy be a free resource? Only resources devoid of economic value may be free; otherwise, if they have a minimum economic value, they may not be free because they would not be allocated effectively. Now, it is obvious that the facts making up – so to say – the domain of a privacy resource do have some economic value – otherwise, they would not be collected, circulated and marketed. Therefore, privacy may not be free: it may only be owned either by him who held it at the beginning, i.e. the consumer, or by the entrepreneur. If privacy resources are owned by him who holds them, this means that they will be allocated in a standard manner, i.e. via a contract: if different private entities hold ownership rights in respect of the circumstances concerning their lives, then such rights may be allocated on a contractual basis – and we know that this is the most effective way for resource allocation, allowing the Paretian limit to be reached. However, this is not what Prof. Posner said. He said that in these cases it is necessary for the resource to be allocated to him who has spent his time and money to get that resource – who has obtained the data concerning several individuals: he who has collected the information concerning them and has given rise thereby to a good. Based on this line of reasoning, it can be concluded that private entities have no rights in respect of the information concerning them, which is legally owned by the companies that have invested to get that information. This is perfectly fine – only, it is exactly an instance of the work-value theory. Thus, one might wonder as regards privacy why he who has worked to get a resource should become the owner of such resource – if this applies to privacy, why should it not apply to all scarce resources? If Posner’s reasoning applies to privacy, then all land should be distributed to peasants, and machines should belong to proletarians. Pierluigi Monateri -Prevention of and Remedies for Damage 243 Supporters of neo-classical economics have been repeating ad nauseam that “there is no such thing as a free lunch” – still, they cheekily tell us that information is the main resource of the new economy, and that this fundamental good may be available for free as regards businesses! The greatest market gurus tell us that there is no such thing as a free lunch, but then we discover that there really exist free infos. This is funny in itself, however it becomes paradoxical if one maintains, at the same time, that who has invested his work to get information is entitled to own such information. This is a Marxist allocation of resources, which is perfectly fine – however, this has positively nothing to do with allocation by means of market agreements. It is either this way or that way: either we acknowledge that contracts are not the most effective means to allocate resources, or we should conclude that the greatest economists are departing from a logic line of reasoning regarding this subject matter to achieve results that are not in line with standard economic tenets. If these tenets were fully complied with, one could not but conclude that ownership rights in respect of privacy do exist; indeed, it is exactly the existence of such rights that can ensure effective allocation of the privacy resource on a contractual basis, since it is the only way to ensure that this resource is made to serve the socially most beneficial purposes. Otherwise, one should put up with less than optimal uses of the relevant resources. Why should one deviate from those tenets? Let us try to understand it by analysing, in the end, the strategic context of privacy. In my opinion, Mr. Gellman was right when he said that privacy policies should not be kept separate from privacy economics. Obviously I think that, theoretically, protecting privacy by means of any of the conventional models is effective – it is quite simply a matter of calculating how much each of us would invest to protect himself against disclosure and dispossession of one’s own facts as compared with what a business is required to pay in order to simply request a person’s consent and collect the relevant information. Given that the self-protection costs to be incurred by all the entities potentially concerned would be quite high, it is more cost-effective to protect privacy. However, this is not what actually occurs. One of the main paradoxes consists in the fact that the costs consumers would have incurred to protect themselves are not paid. That is to say, even though consumers do appear to markedly prefer privacy protection based on the questionnaires they are requested to fill in, in fact they are not ready to take any steps to ensure such protection. Therefore, the costs theoretically related to widespread self-protection, which would lead one to conclude 244 Da costo a risorsa - Attività produttive e protezione dei dati personali that it is better to protect privacy, are actually costs that go unpaid – therefore, in terms of business efficiency, it is more cost-effective to further reduce business costs by not protecting privacy, i.e. by exempting businesses from the costs related to managing consumers’ privacy rights. Indeed, society as a whole does profit from failing to require that businesses should pay for acquiring information. Having recognised the need to protect privacy, a company will have to actually pay the costs this entails – whereas consumers do not pay their self-protection costs, since they actually do not protect themselves. Therefore, in a society where privacy is less protected overall social costs are actually lower. I believe that this difference between fictitious self-protection costs and real costs incurred by businesses whenever privacy is protected by law should be taken into account explicitly rather than remain hidden in the ideological folds of this discussion because of the awkward attempt at twisting standard reasoning patterns. If we acknowledge this difference explicitly, we come to grips with the core of the global competition between America and Europe. Indeed, it is quite evident to me that, for once, American citizenship in the global marketplace of ideas is to be regarded, from this viewpoint, as a second-rate citizenship. And this is occurring in a key area such as that related to consumers’ citizenship rights, which are the veritable essence of globalised citizenship. However, the American stance poses a tricky challenge: though second-rate, this citizenship is actually more efficient, as we have already shown. On the one hand, a race to the bottom in respect of citizenship is undoubtedly a possible evil in the globalised world; on the other hand, too high a citizenship standard may weaken the systems supporting such standard in the globalised competition race. It is no longer possible to limit citizenship to a single country – which entails either waiving one’s own standards, or attempting to impose them via supranational conventions. In both cases the citizenship challenge between Europe and America has just begun. Pierluigi Monateri -Prevention of and Remedies for Damage 245 Analisi economica del diritto alla riservatezza Marco Maglio (1) Sommario: 1. Quanto vale la privacy? – 2. I rapporti tra analisi economica del diritto e riservatezza – 3. La classificazione dei costi della privacy - 4. Il nodo della clausola del bilanciamento di interessi – 5. L’efficienza delle regole di data protection – 6. La ricerca del consenso dell’interessato – 7. Possibili interventi per favorire l’efficacia della tutela – 8. Il rischio intrinseco nell’analisi economica – 9. Le opportunità dell’analisi economica del diritto: la trasformazione della privacy da costo statico ad investimento dinamico – 10. La nobile e mobile frontiera della privacy 1. Quanto vale la Privacy? Quanto vale la privacy? Mi rendo conto: questa è una domanda provocatoria, che contiene in sé alcuni elementi di forte ambiguità. Eppure siamo abituati a misurare ogni cosa e a privilegiare quello che riteniamo di grande valore. “Ogni cosa ha un prezzo”, si sente dire spesso con un po’ di cinismo e la vita quotidiana ci offre frequenti dimostrazioni che confermano la tendenza ad una pericolosa sovrapposizione tra valori etici e valori economici. Per fortuna il diritto alla riservatezza mal sopporta questo genere di confusioni: è un presupposto della nostra libertà – ormai credo sia chiaro a tutti - e, in quanto tale, il suo valore è inestimabile. Forse per questo motivo, quando si parla di riservatezza sono frequenti le discussioni sui limiti da assegnare alla privacy, sui sistemi per tutelarla e per sanzionarne le violazioni mentre ogni valutazione che attenga al valore (stavo per dire al “prezzo”) da attribuire a questo diritto non ci sembra rilevante, e per certi versi ci inquieta. Non possiamo però ignorare che anche la nostra riservatezza si inserisce in un contesto sociale fittamente attraversato da flussi economici e la mia domanda iniziale voleva invitare a questa considerazione, con un pizzico di sano realismo. In effetti, come diceva un personaggio shakespeariano, l’origine delle cose ne condiziona il destino: se questo è vero non deve sorprendere che la radice etica della privacy abbia portato a sviluppare la riservatezza come un rigido complesso di norme di comportamento, utilizzando le forme ed i metodi della scienza giuridica. Coerentemente con questo approccio, nella storia secolare della privacy, finora ci si è preoccupati di fissare dei principi generali, di tradurli in regole giuridiche formalizzate e di stabilire meccanismi e procedure attraverso le quali tutelare questo di(1) Università degli studi di Parma - Italia 246 Da costo a risorsa - Attività produttive e protezione dei dati personali ritto, che è anche un profondo e diffuso valore sociale. L’immediata conseguenza di questa impostazione è che la discussione prevalente in materia di privacy si anima attorno alla ricerca in astratto dell’equilibrio tra diritti e doveri, tra obblighi e sanzioni. Vorrei però cimentarmi con un esercizio di saggezza pratica, che credo sia una delle aspirazioni cui deve tendere l’attività del giurista, e provo con una semplificazione estrema a ridurre alla radice l’essenza del meccanismo giuridico sul quale si basa la protezione dei dati personali. Da questa semplificazione emerge che questa tutela si traduce in un fatto preciso: nella facoltà individuale di scegliere quale ambito di circolazione attribuire alle proprie informazioni personali. Esercitando questo potere di scelta ognuno di noi, come è stato autorevolmente osservato, è chiamato ad essere garante di se stesso. La definizione del livello di privacy nasce da una scelta essenzialmente individuale, pur con tutte le eccezioni e le garanzie autoritative previste dall’ordinamento. Certo è eccessivo parlare a questo riguardo di “autonomia privata”, come si usa fare nel diritto dei contratti, ma è chiaro che le decisioni in materia di privacy passano attraverso valutazioni individuali. Cosa succede nella pratica? Mi sarei aspettato che il buon senso comune sollecitasse la curiosità di analizzare in che modo queste scelte individuali vengono esercitate in concreto. Ma probabilmente aveva ragione Cartesio quando affermava con ironia che “il buon senso è la cosa del mondo meglio distribuita: infatti perfino coloro che nelle altre cose difficilmente si accontentano, non ne desiderano più di quel che ne hanno”. Così mi sembra che la purezza della teoria abbia finora evitato contaminazioni con le esigenze della ragion pratica, anche se il buon senso avrebbe suggerito una maggior attenzione ai comportamenti effettivi dei destinatari delle norme. Si conferma la classica contrapposizione che la tradizione giuridica anglosassone descrive bene con la formula: law in the books vs. law in action. Ma resta la questione di fondo: dato che la privacy si lega inscindibilmente ad una scelta individuale, secondo quali criteri queste scelte individuali vengono effettuate? E quali conseguenze producono queste scelte individuali rispetto al benessere complessivo della società? In altri termini: quali benefici e quali sacrifici comporta, per l’individuo e per la collettività, riconoscere e proteggere la riservatezza individuale? Per dare una risposta a queste domande l’approccio giuridico tradizionale da solo non mi sembra sufficiente per cogliere la complessità del problema. Va integrato con una ricostruzione che esamini se le regole esistenti siano in grado di indirizzare le scelte individuali verso la massimizzazione del benessere collettivo e sappiano quindi incentivare i comportamenti efficienti, tanto da parte di coloro ai quali i dati personali si riferiscono, quanto da parte dei soggetti che trattano tali informazioni. Questa prospettiva credo possa essere utilmente esplorata con gli strumenti classici dell’analisi economica del diritto. Marco Maglio - Analisi economica del diritto alla riservatezza 247 Certamente non vanno trascurati, per una corretta ricostruzione dei meccanismi di scelta individuale, anche altri elementi che esulano da valutazioni di carattere esclusivamente economico. Non va ad esempio dimenticato che il meccanismo del consenso per la tutela dei dati personali è chiamato ad operare in quella che la moderna sociologia qualifica come “società orizzontale”, fortemente influenzata dal consumismo nei suoi miti e nelle sue strutture. Il consumo è oggi un linguaggio sociale, qualcosa che tende ad aumentare i desideri degli individui piuttosto che a soddisfarli. Nel mondo contemporaneo si assiste ad una dematerializzazione della realtà e l’attenzione dell’uomo è distolta dal mondo naturale e concentrata sulla televisione, sul mondo della comunicazione che è diventato un valore assoluto, un obiettivo in sé. Credo che sarebbe ingenuo pensare che tutto questo non abbia conseguenze sull’utilizzo dello strumento del consenso da parte di ognuno di noi e sulle scelte che esso ci impone di compiere. Anche le valutazioni psicologiche che orientano le scelte individuali vanno accuratamente tenute presenti e mi piace segnalare l’esperienza di Daniel Kanheman e John Cole premiati proprio in questi giorni con il Premio Nobel per l’Economia. La lezione di questi due studiosi è anzitutto di carattere metodologico e riguarda il ruolo dell’osservazione empirica nello sviluppo delle scienze umane: aiutarci a capire che componenti irrazionali influenzano le nostre decisioni e tenerne conto quando si elaborano modelli astratti che descrivono i comportamenti individuali. Sociologia e psicologia hanno quindi il loro peso nell’esame dei meccanismi che portano alle scelte individuali. Ma certamente la prospettiva introdotta dall’analisi economica del diritto alla riservatezza è stata finora trascurata rispetto ad un tema che invece sollecita un interesse sempre crescente, non solo sul piano dei diritti rivendicati, ma anche su quello delle conseguenze subite dalla libera iniziativa economica. Peraltro va messo in evidenza, come ricordavo in apertura, che questa sovrapposizione di valutazioni economiche rispetto a un valore sociale e culturale come la privacy rappresenta una provocazione in re ipsa: lo osservava, già vent’anni fa, chi si è occupato di questo stesso tema. 2. I rapporti tra analisi economica del diritto e riservatezza Infatti il contributo dell’analisi economica del diritto alle teorie dei diritti della personalità è stato limitato e solitamente accompagnato dal sospetto di essere o dissacrante o inutile. La privacy ha attirato occasionalmente l’interesse degli economisti a partire dalla fine degli anni Settanta; risalgono a quegli anni alcuni lavori di Richard Posner e un convegno su The Law and Economics of Privacy(2). Anche in Italia l’eco di questi (2) Gli atti del convegno, coordinato dal Center for the Study of the Economics and the State dell’università di Chicago, sono stati pubblicati nel 1980, in un fascicolo monografico del Journal of Legal Studies. 248 Da costo a risorsa - Attività produttive e protezione dei dati personali dibattiti d’oltreoceano ha lasciato traccia in un seminario sul diritto all’identità personale promosso nel 1981 dal Centro di Iniziativa Giuridica Piero Calamandrei. Posner, dal quale non si può prescindere per capire come siano nati i rapporti tra Economics and Privacy, considera la riservatezza non come un bene o valore in sé, ma piuttosto come un bene o un valore intermedio, strumentale rispetto alla produzione di reddito, e più in generale di benessere. Dopo questa premessa, Posner esamina la nozione di privacy sotto quattro profili: seclusion, innovation, confidentiality of communication, concealment of personal facts(3). Complessivamente da quest’analisi emerge un quadro della privacy ricco di ombre e di sfumature negative. Probabilmente questo ha contribuito a relegare l’analisi economica della privacy nello scaffale delle questioni fastidiose. Credo che a distanza di vent’anni questo diritto abbia invece dimostrato una ben diversa valenza positiva rispetto alle previsioni provocatorie di Posner. A distanza di oltre vent’anni da quel tentativo, credo sia possibile un diverso utilizzo degli strumenti economici in particolare perché essi possono aiutare a guardare alle conseguenze delle regole. In quest’ottica le scelte operate dai giuristi non vengono negate, ma sono valutate ed indirizzate in base a criteri di efficienza. Utilizzando gli strumenti economici, in particolare quelli dell’analisi costi/benefici e dell’allocazione delle risorse secondo criteri di efficienza, le regole acquistano una giustificazione legata all’efficacia con cui tutelano i valori in base ai quali sono state formulate. Proprio sul terreno delle scelte individuali, che sono il cuore del sistema di protezione dei dati personali, si colloca il punto di convergenza dell’analisi giuridica e di quella economica: le regole di protezione dei dati personali, ricostruite con i metodi dell’analisi economica del diritto, si traducono in un meccanismo attraverso il quale ogni singolo soggetto determina quale livello di riservatezza deve essere attribuito alle informazioni che lo riguardano, e quindi come esse debbano venire distribuite (gli (3) In particolare la seclusion è la volontà di ridurre le relazioni sociali, il che da un punto di vista economico è segno di egoismo: se le transazioni economiche creano utilità per i terzi (ciò che la scienza economica definisce surplus del consumatore), lo stesso può valere anche per le relazioni umane che stanno fuori dal mercato, in ogni caso chi si ritira dal mondo riduce il proprio contributo al benessere della società. Nel discorso di Posner la privacy acquista al contrario una valenza positiva quando diventa strumentale per lo svolgimento di un lavoro intellettuale, ad esempio come segreto professionale; oppure se contribuisce a proteggere le innovazioni tecnologiche: infatti, in questo caso specifico, se l’informazione diviene di pubblico dominio, essa perde in tutto o in parte il suo valore economico; pertanto, per incoraggiare la ricerca e l’innovazione è essenziale garantire all’inventore il segreto, oppure i cosiddetti diritti di privativa. Inoltre, un certo grado di confidentiality può essere economicamente giustificato al fine di garantire la segretezza delle comunicazioni e della corrispondenza. Posner esamina infine il controllo da parte dell’individuo sulle informazioni che lo riguardano definendo questa ipotesi concealment of personal facts. L’interesse ad evitare la circolazione di notizie personali come ad esempio precedenti penali, o una condotta morale difforme dagli standard comuni, è strettamente connesso al desiderio di diffondere di sé un’immagine positiva, che permetta di instaurare relazioni sociali (rapporti di amicizia, legami affettivi, rapporti di lavoro) a condizioni favorevoli: l’individuo si “vende” sul mercato delle relazioni sociali allo stesso modo in cui un produttore vende i suoi prodotti, ed è portato quindi ad evidenziare le proprie qualità e ad occultare i difetti; d’altro canto, ed esattamente per gli stessi motivi, anche i terzi possono avere un interesse apprezzabile a conoscere informazioni personali sulle persone con cui vengono a contatto a vario titolo. Marco Maglio - Analisi economica del diritto alla riservatezza 249 economisti parlerebbero, in questo senso, di allocazione di una risorsa scarsa). Per condurre questa analisi, centrata sulle scelte invidiali, credo sia utile partire da un esame dei costi che tutti i soggetti (tanto il singolo quanto la collettività) sono chiamati a sostenere per adeguarsi al meccanismo di tutela previsto dalla normativa di data protection. Infatti, i costi, che la scienza economica qualifica come la spesa necessaria per ottenere qualcosa, sono una delle variabili dalle quali dipendono tali scelte. 3. La classificazione dei costi della privacy Per poter muoversi in questo contesto credo sia importante formulare alcune valutazioni generali sulla natura dei costi legati alla tutela della riservatezza. In senso generale pongo in evidenza due considerazioni: A) La prima è di carattere pregiudiziale: i criteri di calcolo di tali sacrifici individuali sono tutt’altro che univoci e caratterizzati da una forte ambiguità soggettiva. A tale proposito credo sia sufficiente accennare al dibattito apertosi nel corso del 2001 negli Stati Uniti sulla valutazione dei costi legati all’approvazione di una legislazione in materia di privacy nei sistemi di commercio elettronico e in Internet. Le cifre indicate dai vari partecipanti alla discussione variavano da 1 a 36 miliardi di dollari, a seconda delle variabili esaminate da chi proponeva questi calcoli. Le polemiche legate a queste ricostruzioni hanno lasciato traccia in Internet ma non hanno contribuito a far chiarezza su una questione essenziale. Credo che, alla luce di questa esperienza, sia fondamentale individuare un metodo attraverso il quale calcolare univocamente i costi della privacy, per poterli correttamente valutare nel quadro delle scelte individuali. Ma per potersi cimentare in questa operazione non mi sembra si possa prescindere da una classificazione dei costi in base a criteri oggettivi. B) Da questo deriva la seconda considerazione che ha carattere sostanziale ed è legata appunto alla necessità di distinguere tra loro i costi della privacy. Mi cimento con questo tentativo di classificazione e provo ad individuare le categorie di costi in relazione a tre specifici criteri: 1) i soggetti che sopportano tali costi 2) il tempo in relazione al quale sono sostenuti tali costi 3) gli effetti derivanti dai costi 1) Dal punto di vista soggettivo possiamo parlare di: - costi individuali: sono i costi sostenuti tanto dall’interessato per esercitare i suoi diritti di riservatezza, quanto dal titolare per adeguarsi alla protezione dei dati personali; - costi sociali: sono i costi che la collettività sopporta per garantire il rispetto della riservatezza individuale. In questo contesto rientrano i costi di or- 250 Da costo a risorsa - Attività produttive e protezione dei dati personali ganizzazione che lo Stato sostiene per rispondere alla domanda di privacy dei cittadini. 2) Dal punto di vista cronologico va osservato che i costi possono essere - preventivi o di prevenzione: per evitare che si verifichino violazioni della privacy; - successivi o di correzione: per porre rimedio a violazioni che si siano già verificate; Può essere utile qualche approfondimento, soprattutto dal punto di vista dei titolari del trattamento che dispongano di organizzazioni complesse. Se consideriamo i costi preventivi necessari per garantire a questi soggetti il rispetto delle normative in materia di privacy vanno indicati essenzialmente: - L’inserimerimento di risorse umane da destinare alla gestione delle procedure in materia di privacy - Lo sviluppo e l’aggiornamento della procedura interna in materia di privacy - La formazione e l’aggiornamento del personale - Il controllo e l’audit delle attività di gestione della privacy - L’adozione di strumenti tecnologici ed informatici che garantiscano la protezione dei dati personali - La comunicazione interna per diffondere le privacy policies - La relazione diretta con i soggetti cui si riferiscono i dati personali trattati Se valutiamo i costi successivi al verificarsi di contestazioni derivanti dal mancato rispetto della privacy, dobbiamo distinguere a) Costi di ristrutturazione e riadeguamento dei dati alle esigenze di protezione della privacy. b) Costi derivanti dai rapporti con soggetti posti al di fuori dell’organizzazione interna con riferimento a: - Sanzioni amministrative - Risarcimenti dei danni - Riduzione del valore delle azioni della società - Danno rispetto alla reputazione pubblica dell’azienda - Riduzione della percezione del valore del marchio aziendale - Perdita potenziale di opportunità economiche Attraverso l’analisi dei costi di correzione e dei costi di prevenzione è possibile individuare l’indice di rischio che un’ organizzazione affronta rispetto al trattamento dei dati personali e l’indice di investimento che deve sostenere per ridurre adeguatamente questo rischio. 3) Dal punto di vista degli effetti derivanti dai costi distinguiamo: - costi di transazione cioè i sacrifici patrimoniali veri e propri derivanti dalla scelta effettuata Marco Maglio - Analisi economica del diritto alla riservatezza 251 - costi di opportunità ossia le rinunce che ogni soggetto è disposto a sostenere in conseguenza della propria scelta Finora il dibattito sui costi della privacy si è sviluppato tenendo come punto di riferimento esclusivo i costi di transazione, evidenziando solo l’impatto negativo nascente dall’esistenza di costi monetari. Credo che invece andrebbe valorizzata la riflessione sui costi opportunità perché sono quelli che incidono più direttamente sul meccanismo di tutela. Vale allora la pena di approfondire questo aspetto specifico. Che cos’è un costo-opportunità? È il costo della rinuncia a una possibile alternativa. Ad esempio, se stasera decidete di andare al cinema, il costo opportunità è dato dalla rinuncia a stare a casa con i propri cari (se l’alternativa a uscire è stare in casa). Il costo opportunità è pertanto rappresentato dal valore che viene dato all’alternativa migliore alla quale si rinuncia adottando un certo comportamento. Poiché individui diversi hanno alternative diverse a disposizione, sopportano anche costiopportunità diversi. Credo che sia soprattutto sul versante dei costi-opportunità che occorre condurre l’analisi per capire in che modo il meccanismo di tutela dei dati personali incida rispetto alle scelte individuali. Infatti va tenuto presente che l’interessato posto di fronte alla scelta di concedere o meno il consenso al trattamento dei dati personali, compie una valutazione dei costi-opportunità derivanti da quella decisione, comparando i benefici nascenti dalle possibili alternative. Se decide di limitare la circolazione dei suoi dati personali rinuncia all’opportunità di entrare in contatto con chi gli ha chiesto il consenso, ma in questo modo rafforza il proprio livello di riservatezza. Al contrario, se sceglie di consentire il trattamento, riduce il livello di riservatezza dei propri dati, ma aumenta le possibilità di entrare in contatto con altri soggetti. Allo stesso modo, il titolare di un trattamento che deve decidere se chiedere all’interessato il consenso per ulteriori iniziative rispetto ai suoi dati, fa una valutazione in termini di costi-opportunità. La mancata richiesta ridurrà i costi derivanti dalla gestione dei consensi ma ridurrà anche l’opportunità di entrare nuovamente in contatto con l’interessato. 4. Il nodo della clausola del bilanciamento di interessi Peraltro l’urgenza di affrontare, con certezza di metodi e di calcolo, il capitolo dei costi della privacy non è data solo da valutazioni che mirano all’efficienza del sistema. Preme la necessità di interpretare con coerenza una precisa previsione normativa, contenuta nella direttiva comunitaria del 1995, che va sotto il nome di “clausola di bilanciamento degli interessi”. 252 Da costo a risorsa - Attività produttive e protezione dei dati personali Il principio su quale si fonda questa clausola è semplice: per poter valutare la legittimità di un trattamento dei dati occorre comparare gli interessi di chi vuole utilizzare liberamente questi dati e quelli di colui al quale questi dati si riferiscono.(4) Certamente i criteri attraverso i quali valutare questo bilanciamento sono molteplici e non riguardano esclusivamente la sfera economica. Ma non credo che si possa prescindere dal riferimento ai costi (sia quelli di transazione, sia quelli di opportunità) per definire se la tutela del diritto individuale alla riservatezza comporti una sproporzione rispetto ad un diverso interesse potenzialmente in conflitto con tale diritto. Quindi, anche rispetto all’applicazione del principio di bilanciamento di interessi, la corretta valutazione dei costi e dei vantaggi comparati è essenziale per l’adeguato utilizzo di questa, che è una vera e propria clausola generale nella teoria del trattamento dei dati personali 5. L’efficienza delle regole di data protection Da queste riflessioni nasce una domanda ulteriore: quale regolamentazione giuridica della privacy va nella direzione di una migliore efficienza allocativa? Il nodo da sciogliere in relazione all’efficienza della tutela della riservatezza resta quello generato dalla necessità di armonizzare nel contesto del massimo benessere colletti(4) Da questo punto di vista, per meglio comprendere l’essenza del fenomeno, può essere utile proporre alcune riflessioni di diritto comparato che diano conto del modo in cui questa clausola è stata finora recepita ed applicata in alcuni ordinamenti giuridici omogenei. L’idea che gli interessi del titolare del trattamento dei dati e quelli della persona cui si riferiscono i dati debbano equilibrarsi nasce in Germania, nei Paesi Bassi, in Austria e in Finlandia, Paesi che per primi hanno conosciuto la clausola di Bilanciamento degli Interessi. In tutti gli Stati Membri che conoscono la clausola del Bilanciamento degli Interessi, il legislatore considera proibito il trattamento di taluni dati senza il consenso della persona interessata, e autorizza invece, senza necessità di altrui consenso, il trattamento di dati considerati generici e quindi non invasivi. Il trattamento dei dati personali, senza il consenso del diretto interessato, è vietato solo se riguarda i dati sensibili, che sono principalmente quelli specificati nell’Art. 8 della Direttiva Europea. Occorre pertanto definire quale sia l’interesse legittimo del titolare del trattamento e quello della persona cui si riferiscono i dati. Negli Stati Membri dell’Unione Europea che hanno recepito nei propri ordinamenti il Bilanciamento degli Interessi, tutti gli specifici interessi economici ragionevoli sono considerati legittimi. Ma è il titolare del trattamento a dover valutare la finalità dell’operazione. In questa analisi comparativa diventa pregiudiziale definire correttamente l’impatto economico legato alle due posizioni che si devono confrontare. Vale la pena in questo senso ricordare quanto ha affermato il Tribunale Civile Federale di Germania (Bundesgerischtshof, BGH) nel 1986: “L’espressione interesse giustificato richiede una valutazione dell’importanza e delle conseguenze che la rivelazione e l’uso dei dati personali significano per l’interessato in contrapposizione agli interessi del titolare del trattamento. Pertanto, tipo, contenuto e significato dei dati debbono essere valutati in base allo scopo per il quale essi vengono raccolti ed al costo sociale derivante dal loro mancato utilizzo. Soltanto se tale valutazione, ispirata al principio costituzionale della proporzione, non dà motivo di presumere che la conservazione dei dati per gli scopi prefissati potrebbe influire negativamente sugli interessi giustificati della persona interessata, tale conservazione dei dati è ammessa.” (BGH NJW 86, 2505) Marco Maglio - Analisi economica del diritto alla riservatezza 253 vo le scelte in materia di privacy, che sono scelte strettamente individuali. Sarebbe probabilmente utile se all’approccio giuridico, che suggerisce una valutazione puramente legata all’esercizio di un diritto soggettivo, si affiancasse anche una riflessione orientata in termini di ricerca del maggior benessere possibile, non solo nei confronti del titolare del diritto, ma anche di tutti gli altri soggetti. Da questo punto di vista il contributo dell’analisi economica del diritto, se saprà evitare osservazioni eminentemente provocatorie, potrà essere particolarmente utile per aprire nuove prospettive al dibattito che si andrà sviluppando nei prossimi anni. L’evoluzione della tecnologia e dei metodi di comunicazione commerciale tende inesorabilmente a trasformare i dati personali in merce, dotata di un valore intrinseco. L’esigenza di tutela tende quindi a crescere, ma per garantirne l’efficacia non si potrà prescindere da valutazioni che tengano conto anche della matrice economica della privacy, che si affianca a quella etica originaria. In questo senso nasce una riflessione ulteriore, in base alla quale la privacy non è più soltanto un diritto negativo, consistente nel dovere collettivo di astenersi passivamente da comportamenti lesivi della riservatezza. Essa invece assume le connotazioni tipiche del diritto civico(5) ed è una pretesa giuridicamente tutelata di prestazioni (di facere e di non facere, secondo il linguaggio dei giuristi) poste a carico della collettività. In questa nuova prospettiva i costi della data protection, sia pubblici che privati, sono destinati inevitabilmente a salire. Questo peraltro è un elemento che fa parte della fisiologia di un sistema efficiente e induce a guardare verso il futuro con questa consapevolezza: i diritti, intesi come posizioni giuridicamente protette, esistono non solo nella misura in cui un determinato ordinamento decide di riconoscerli e tutelarli, ma dipendono anche dalle risorse che la società è disposta a destinare a tale scopo. 6. La ricerca del consenso dell’interessato In termini economici mi sembra non si possa ignorare che il meccanismo di funzionamento della privacy è condizionato dalla comparazione tra i costi-opportunità dell’interessato e quelli del titolare del trattamento. Se il vantaggio del titolare del trattamento derivante dal rispetto delle norme di data protection si somma a quello dell’interessato si verifica un riequilibrio del sistema in cui l’aumento del livello di privacy non dipende più solo dalla scelta dell’interessato e dall’investimento di risorse da parte dell’Autorità, ma viene sollecitato dallo stesso titolare. Il risultato è che si attenuerà la pressione che viene esercitata sull’interessato per ottenere il suo consenso al trattamento dei suoi dati. Infatti, da questo punto di vista va tenuto presente che i meccanismi sempre (5) Secondo le categorie classiche di Jellinek 254 Da costo a risorsa - Attività produttive e protezione dei dati personali più raffinati che permettono di trasformare gli estranei in amici e gli amici in clienti (come vuole lo slogan di successo, usato da Seth Godin, il creatore del permission marketing), non sono un elemento rassicurante. Il singolo fa una valutazione essenzialmente egoistica rispetto alle conseguenze sociali che produrrà la sua scelta in materia di privacy. Oltre a questo, credo sia ingenuo proporre una naturale convergenza tra i sostenitori della privacy ed i sostenitori del permission marketing. Le cose non stanno in questi termini: emerge al contrario una pericolosa tendenza alla mercificazione del consenso che rischia di compromettere l’effettiva tutela della privacy ed il futuro sviluppo del mercato della comunicazione interattiva. Chi raccoglie dati personali per finalità commerciali è portato a spingere alle estreme conseguenze, in modo spesso sotterraneo e con sottili strategie psicologiche, il principio della centralità del consenso individuale, come strumento per la definizione del livello di privacy e per l’esercizio del conseguente diritto di autodeterminazione informativa. Il consenso, così svilito, può diventare merce di scambio (secondo un meccanismo che, banalizzando, si esprime in questi termini: “se mi dai il consenso all’uso dei tuoi dati personali, ti faccio partecipare ad un concorso a premi o ti regalo un gadget”), ed in questa sua mercificazione rischia di perdere il ruolo di garanzia, che pure i meccanismi di protezione della data protection gli attribuiscono. Questo è un indubbio pericolo, che avevano già colto, circa trent’anni fa i primi commentatori delle allora neonate teorie sulla data protection in Europa: il consenso da solo non basta per garantire effettivamente la tutela piena della riservatezza. La legge italiana contiene significative tracce di questa impostazione. Pensiamo ad esempio al regime che caratterizza la gestione dei dati sensibili, per i quali, al consenso scritto dell’interessato, si deve affiancare l’autorizzazione del Garante per la protezione dei dati personali. E la stessa funzione del Garante, che ha meritoriamente sollecitato ed organizzato questo Convegno, non è semplicemente quella che, secondo una formula statunitense che trovo particolarmente felice, definirei di sporting theory della giustizia. Il Garante non è solo un arbitro che verifica che i contendenti in gioco rispettino le regole fissate dal legislatore. Egli ha, per espressa previsione normativa, un ruolo attivo di promozione della legge, di indagine e di prevenzione di possibili violazioni. Riportando queste considerazioni sul piano normativo credo che occorra affrontare la vera questione di fondo: l’individuazione di meccanismi che aumentino l’interesse ad assumere comportamenti privacy oriented da parte di tutti. Il presupposto di questo ragionamento è che la privacy è un valore trasversale la cui affermazione porta benefici condivisi che riguardano tanto i singoli quanto la collettività, tanto i cittadini quanto le imprese ed i soggetti pubblici, e in senso lato la persona intesa sia come individuo sia come soggetto sociale. Il problema centrale quindi è quello di verificare se sia possibile riequilibrare il Marco Maglio - Analisi economica del diritto alla riservatezza 255 meccanismo di tutela alleggerendo la pressione che oggi inevitabilmente grava sull’interessato. 7. Possibili interventi per favorire l’efficacia della tutela Attraverso quali leve può essere raggiunto questo risultato? Ne indico alcune, senza pretese di completezza ma solo per sollecitare un dibattito aperto su questo argomento: 1) Prevenzione: gli abusi nel trattamento dei dati personali spesso avvengono all’insaputa dell’interessato. I cosiddetti trattamenti occulti vanificano il ruolo di controllo del consenso. Va quindi rafforzata l’attività di prevenzione di queste violazioni 2) Controllo: il ruolo di controllo dell’Autorità Indipendente può permettere di attenuare e regolamentare la pressione che viene esercitata dai titolari del trattamento sul singolo interessato per ottenere il suo consenso all’uso dei dati. 3) Sanzioni: l’applicazione di sanzioni pecuniarie e di rimedi risarcitori e punitivi potrà indurre i titolari del trattamento a formulare più prudentemente le loro valutazioni circa i vantaggi comparati derivanti dalla violazione delle norme poste a tutela della riservatezza. 4) Bilanciamento degli interessi: una corretta applicazione della clausola del bilanciamento degli interessi potrà attenuare la pressione esercitata sull’interessato per convincerlo a concedere il consenso (o per carpirlo a sua insaputa, come pure talvolta avviene). 5) Incentivi: l’individuazione di profili premiali che incrementino i vantaggi dei titolari del trattamento, collegati al rispetto delle regole, può indurre una maggiore propensione al rispetto della riservatezza anche da parte dei titolari stessi. Non so se sia vero l’assunto di fondo di un bel libro di Stephen Holmes e Cass Sunstein – “Il costo dei diritti” – in base al quale la libertà dipende dalle tasse, ma probabilmente la leva fiscale, mediante sgravi, deduzioni e detrazioni di imposta, può essere di aiuto per incentivare il rispetto della privacy altrui e disincentivare le violazioni. Lo stesso discorso vale per la semplificazione degli adempimenti amministrativi legati alla protezione dei dati che si potrebbe concedere, in senso premiale, solo ai titolari di trattamento che si adeguano a standard elevati di riservatezza. Anche strumenti di certificazione che dichiarino pubblicamente il rispetto delle procedure di privacy sono uno strumento dal forte contenuto incentivante, che le imprese in particolare potrebbero usare per elevare il loro rapporto di fiducia con il consumatore. Ma prima di affrontare il tema degli strumenti di tutela del diritto, al quale 256 Da costo a risorsa - Attività produttive e protezione dei dati personali siamo giunti con questa riflessione, sarà importante comprendere in che modo si realizza la dinamica dei dati personali all’interno di un sistema economico. Si tratterà di fare valutazioni essenzialmente legate alla microeconomia, utilizzandone schemi e criteri. Seguendo la tradizionale impostazione dell’analisi microeconomica (che è appunto lo studio dell’allocazione di risorse scarse rispetto a scelte alternative) è possibile analizzare le dinamiche generate dalla tutela dei dati personali attraverso cinque aspetti: 1. come vengono effettuate le scelte del consumatore rispetto alla domanda di privacy (e quindi come un consumatore tipo, vincolato da un reddito determinato, scelga tra i diversi livelli di privacy messi a sua disposizione); 2. come vengono operate le scelte in materia di privacy dalle società e imprese commerciali (in quest’ottica si potrà descrivere come l’impresa decida a quale livello di privacy sia accettabile adeguarsi, che investimenti sostenere per garantire la riservatezza dei clienti e quanto spendere per ottenere il loro consenso al trattamento dei dati); 3. come interagiscono tra loro imprese e consumatori (combinando la teoria del consumatore e dell’impresa si possono analizzare le decisioni degli uni e delle altre verificando se siano coordinate attraverso il movimento dei prezzi di mercato, nell’individuazione del punto di equilibrio e quale sia quindi il livello di privacy accettabile in un mercato efficiente); 4. come si strutturano l’offerta e la domanda di privacy nel processo produttivo (analizzando come incidono domanda ed offerta nell’ambito dei fattori di produzione: lavoro, capitale e capacità imprenditoriale); 5. come si organizzano i mercati e come possono raggiungere l’efficienza nell’allocazione delle scelte dei soggetti economici in materia di privacy. Certamente questo apre nuove prospettive di analisi, che dovrà essere condotta con grande rigore scientifico e con la capacità di valorizzare i risultati conseguiti finora dalla ricerca giuridica. 8. Il rischio intrinseco nell’analisi economica Peraltro va messo chiaramente in evidenza un rischio: la sovrapposizione di valutazioni di carattere economico rispetto ad un diritto fondamentale come la privacy si presta a fraintendimenti e confusioni che è necessario scongiurare. Ma credo che non sarebbe corretto ignorare questa prospettiva di analisi alla quale siamo chiamati dallo sviluppo del sistema sociale e tecnologico entro il quale avviene il flusso dei dati personali. Mi sembra anzi che questa sia una sfida alla quale non possiamo sottrarci. An- Marco Maglio - Analisi economica del diritto alla riservatezza 257 che a costo di affrontare passaggi rischiosi o complessi. Certamente non va ignorato che su questo tema si affolleranno nei prossimi anni gli interventi di quelli che Yves Dezalay ha definito, con straordinaria efficacia, i mercanti del diritto. Esistono autentiche multinazionali del diritto che intervengono per la ristrutturazione dell’ordine giuridico internazionale, perseguendo interessi particolari che nulla hanno a che spartire con la tutela dei principi generali, determinati attraverso le regole democratiche. La privacy è un piatto troppo ricco perché su questo argomento non si esercitino le pressioni della cosiddetta business community. Con l’orgoglio del giurista, non credo che un argomento così trasversale possa essere definito esclusivamente attraverso considerazioni legate alla relazione tra costi e benefici. Penso tuttavia che la scienza giuridica non è mai solo forma e non si esaurisce nella definizione di diritti e di doveri. E sono convinto che i veri problemi che il giurista è chiamato ad affrontare e risolvere sono, intimamente, questioni che attengono alla coscienza sociale. Per raggiungere questo scopo occorre valutare anche l’impatto economico che le regole determinano, ed esaminare con rigore il grado di efficienza delle norme nel perseguimento dell’interesse generale. 9. Le opportunità dell’analisi economica del diritto: la trasformazione della privacy da costo statico ad investimento dinamico L’accostamento tra categorie giuridiche ed economiche non presuppone però l’adesione alle posizioni di quanti, soprattutto oltreoceano, affermano che le regole giuridiche si evolvono necessariamente verso soluzioni efficienti. Il ricorso agli strumenti analitici della microeconomia serve invece ad individuare gli incentivi e i vincoli che condizionano i comportamenti dei privati. E una maggiore consapevolezza della logica economica sottesa a quelle condotte, quindi, è in grado di offrire un notevole contributo all’interpretazione e all’eventuale adeguamento delle regole. C’è poi un’ulteriore considerazione da fare rispetto all’evoluzione del nuovo mercato globale. La pluralità di regole e le differenze di approccio rispetto ai temi della circolazione dei dati personali rischia di generare la stessa confusione ed incomprensione di linguaggi che, secondo la leggenda, caratterizzava il mondo di Babele. Recuperare i dati economici della discussione può favorire l’affermazione di un linguaggio condiviso, principalmente ma non solo, tra le due sponde dell’Atlantico e porre le basi per un approccio più consapevole di entrambi i punti di vista. L’auspicio è quello di far emergere una crescente “attenzione incrociata” – come sono abituati a dire i comparatisti – basata sul reciproco rispetto, tra le posizioni che emergono nelle varie aree continentali. Credo che senza questa riflessione la strada per raggiungere la globalizzazione delle garanzie in materia di privacy, vero obiettivo di questo processo, sarebbe più difficile. 258 Da costo a risorsa - Attività produttive e protezione dei dati personali Non vedo all’orizzonte una prospettiva di deregulation per la privacy ma sono certo che non mancheranno coloro che, anche utilizzando strumentalmente l’analisi economica, invocheranno l’esigenza di liberare il mondo imprenditoriale da quelli che un luogo comune del lessico contemporaneo qualifica “lacci e lacciuoli”, con immagine volutamente polverosa. E non mancheranno neanche coloro che, per dar spazio alle esigenze dell’economia, invocheranno di fare a meno delle regole e delle ragioni del diritto. Invito a diffidare di questi richiami alla liberalizzazione. Questo è un pericolo che va denunciato a chiare lettere e proprio per scongiurarlo credo sia essenziale che l’analisi economica del diritto faccia chiarezza nel futuro dibattito sulla riservatezza e offra il suo contributo a questo settore della ricerca giuridica. Occorre quindi che anche in quest’analisi economica del diritto alla riservatezza, i fondamenti giuridici sui quali poggia la privacy vengano mantenuti e difesi. L’obiettivo è quello di configurare una visione armoniosa della privacy che possa trasformarsi da costo statico a investimento dinamico, per incentivare la crescita di valore delle risorse e favorire lo sviluppo economico generale: una privacy ben temperata, se così posso dire. 10. La nobile e mobile frontiera della privacy Si delinea così anche per la privacy un fenomeno evolutivo che ha caratterizzato lo sviluppo della teoria generale della responsabilità civile e che ormai appartiene al lessico dei giuristi italiani: la nobile frontiera della privacy, nobile perché riguarda un diritto fondamentale, avanza a causa dell’evoluzione della tecnologia e della società, diventando quindi una mobile frontiera in costante spostamento. Siamo chiamati a inseguire la privacy in questo ampliamento dei suoi confini. Per raggiungerli credo sia indispensabile evitare, da parte di tutti, arroccamenti su posizioni consolidate ed aprirsi a nuove prospettive. Per affrontare questo viaggio credo sia importante tenere conto che non è il possesso della conoscenza, della verità irrefutabile, a caratterizzare l’uomo di scienza, ma la ricerca critica persistente e inquieta della verità. Con entusiasmo e passione, ricordo sempre a me stesso quello che Karl Popper osservava, descrivendo come procede il progresso scientifico. Sulla base di quella lezione credo che anche per la privacy sia corretto dire: la ricerca non ha fine. Marco Maglio - Analisi economica del diritto alla riservatezza 259 An Economic Analysis of the Right to Privacy Marco Maglio (1) Contents: 1. How much is privacy worth? - 2. Relations between the economic analysis of law and privacy – 3. Privacy cost classification – 4. The issue of the interest balance provision – 5. The efficiency of data protection rules – 6. The pursuit of the data subject’s consensus – 7. Possible actions for more effective protection – 8. The intrinsic risk of economic analysis - 9. The opportunities offered by the economic analysis of the right to privacy: changing privacy from a static cost to a dynamic investment - 10. The noble and mobile frontier of privacy 1. How much is privacy worth? How much is privacy worth? I realize that this is a provocative question, which implies strong ambiguity. However we use to measure everything and to prefer what we attach a greater value to. “Everything has a price” is an often quoted, somewhat cynical slogan and daily life frequently confirms a trend towards a dangerous overlap of ethical and economic values. Luckily, the right to privacy is not too prone to this kind of confusion: it is a prerequisite for our freedom– I think this is clear enough to everybody by now – and, as such, invaluable. This is probably why, when talking about privacy, arguments often start on the limits privacy should have, as well as on the systems to protect it and to punish breaches, while any estimated value (I was about to say “price”) attributable to this right seems irrelevant - and disquieting to some extent. It may not be ignored, however, that privacy falls within a social context that is pervaded with economic flows, and the opening question is aimed at stimulating this thinking, with a bit of healthy realism. Indeed, as one of Shakespeare’s characters said, the origin of things conditions their destiny: if this is true, it should not be surprising that the ethical foundation of privacy has resulted into seeing this concept as a rigid set of behavioural rules, using the forms and methods of juridical science. Consistent with this approach, in the centuries’ long history of privacy, the main concern has been so far to set general principles, to translate these into formal legal rules, and to establish mechanisms and practices to protect this right, which is also a deep and widespread social value. As an early result of this process, the main (1) Parma University - Italy 260 Da costo a risorsa - Attività produttive e protezione dei dati personali discussion on privacy focuses on an abstract pursuit of the balance between rights and duties, between obligations and penalties. However, I would like to exercise some practical wisdom, which is probably something a lawyer’s activity should aim at, and try, very simply, to get down to the basic root of the juridical mechanism personal data protection is based on. This simple approach shows how such protection translates into a precise fact, namely the individual opportunity to choose the extent to which one’s personal data may circulate. By exercising this power of choice, each of us, as observed by outstanding authors, is asked to be “his/her own guarantor”. The definition of the privacy level results from a basically individual choice, even considering all the exceptions and authoritative guarantees provided for by the law. It is certainly an exaggeration to talk about “private autonomy” in this respect, a term used in contract law, but privacy-related decisions clearly depend on individual considerations. What happens in practice? I would have expected common sense to stimulate a wish to analyze how these individual choices are made in practice. But Descartes was probably right when he ironically stated that “common sense is the best-distributed item in the world: in fact, even those who are hardly satisfied with other things, never wish for more of it than they have.” Thus, I think that pure theory has so far prevented any contaminations with the needs dictated by reason, even if common sense would suggest greater care for the actual behaviour of the subjects of rules. This confirms the classical opposition that the juridical Anglo-Saxon tradition effectively describes as: “law in books vs. law in action.” Still the main point remains: privacy is inseparably linked to an individual choice, of which consensus is the expression. But what are the criteria on which this individual choice is based? And how does this individual choice affect the general well-being of society? In other words: what benefits and what sacrifices does it imply - for an individual and for the community - to acknowledge and protect individual privacy? An answer to these questions may not be provided using a traditional juridical approach alone, which seems unprepared to take stock of such a complicated problem. To integrate this approach, it should rather be decided whether the existing rules may direct individual choices towards a maximized general well-being, and thus promote efficient behaviours both by the data subjects and by the data controllers. I think this perspective may be usefully analyzed using the Law and Economics methods. For an appropriate review of individual-choice mechanisms, other factors should be considered that escape any mere economic assessment. It should be noted, for example, that the consensus expressed in view of personal data protection is adopted within the so called “horizontal society” – as defined by modern sociology Marco Maglio - An Economic Analysis of the Right to Privacy 261 – whose myths and structures are strongly influenced by consumerism. Consumption today is a social language, something that tends to increase, rather than satisfy individual wishes. Reality is dematerialized in today’s world, and man’s attention is diverted from nature and focused on television, on the media world, that is by now an absolute value, a goal in its own right. It would be naive to think that this has no impact on the use of the consensus instrument by each of us and on the choices that this forces us to make. Psychological assessments direct individual choices and should also be taken into account. I would like to refer to the experience of Daniel Kanheman and John Cole, Nobel Prize winners in 2002 for Economy. Their lesson is first and foremost on methods, and concerns the role of empiric observation in the development of human sciences, i.e. to help us understand that irrational factors influence our decisions, and should be taken into account when abstract models are defined to describe individual behaviours. Sociological and psychological principles definitely play a role in the review of the mechanisms by which individual choices are made. But the perspective introduced by the economic analysis of the right to privacy has certainly been neglected so far, in favour of a point that arouses, instead, growing interest in the claimed rights, as well as in the consequences produced by free economic initiatives. As stated above, however, it should be noted that these overlaps of economic assessments and such a great social and cultural value as privacy are strongly provocative as such, as observed by anyone discussing this issue as early as twenty years ago. 2. Relations between the economic analysis of law and privacy The economic analysis of law, in fact, has only contributed to theories on the rights to personality to a limited extent, usually combined with the feeling of being desecrating or useless. Since the late Seventies, privacy has occasionally been the object of the interest of economists. Some of the works by Richard Posner and a meeting on “The Law and Economics of Privacy”(2) date back to those very years. The echo of these overseas debates left its mark also in Italy, in a workshop on the right to personal identity promoted in 1981 by the Piero Calamandrei Centre for Juridical Initiative. Posner’s work is a mandatory reference to understand the origin of relations between Economics and Privacy. He considers privacy not so much as an asset or a value as such, but rather as an intermediate asset or value, instrumental to income and, more generally, to the production of well-being. After this introduction, Pos(2) The proceedings of the meeting, co-ordinated by the Center for the Study of the Economics and the State of Chicago University, were published in 1980, in a monography enclosed in the Journal of Legal Studies. 262 Da costo a risorsa - Attività produttive e protezione dei dati personali ner analyzes the notion of privacy in four respects: seclusion, innovation, confidentiality of communication, and concealment of personal facts(3). This analysis outlines privacy as something full of shadows and negative connotations. This is probably one of the reasons why the economic analysis of privacy has often been dismissed as a mere nuisance. I believe that, twenty years later, this right has demonstrated a clearly different positive value compared to Posner’s provocative predictions. Twenty years after that attempt, I feel that the economic instruments may be used differently, not least because they may help consider the consequences of the rules. This is no denying the lawyers’ choices, which are rather assessed and directed according to efficiency principles. Using the economic instruments, particularly for the cost/benefit analysis and for resource allocation according to efficiency principles, the rules are justified to the extent they effectively protect the values according to which they have been expressed. The juridical and the economic analyses converge in the domain of individual choices, which represent the core of the personal data protection system: personal data protection rules, defined according to the economic analysis of law, are translated into a mechanism by which each individual decides about the level of privacy that should be granted to his/her personal data, and therefore how the same should be disclosed (economists would define this action as the allocation of a scanty resource). This analysis, focussing on individual choices, should best start from a review of the costs that all parties (both individuals and the community) have to incur to adapt to the protection mechanism provided for by data protection rules. The costs defined by economic science as necessary to obtain something, in fact, represent one of the variables these choices are made upon. (3) Seclusion, in particular, is the wish to restrict social relations, which is a sign of selfishness from the economic viewpoint: if economic transactions result into a profit for third parties (referred to in economic science as “consumer surplus”), the same may also be true for the human relations that take place outside the market; however those that keep away from social life reduce their contribution to social well-being. In Posner’s lecture, on the other hand, privacy acquires a positive value when it becomes instrumental to the performance of an intellectual activity, for example as a professional secret; or if it helps protect technological innovation. In this case, in fact, any piece of information that becomes available to the public loses all or a part of its economic value. Therefore, in order to promote research and innovation, the inventor should be ensured the secrecy, or the so-called sole rights. In addition, confidentiality may, to some extent, be economically justified in view of ensuring the secrecy of communications and mail. Posner finally analyzes the individual’s control on his/her own data, and defines this assumption as concealment of personal facts. The interest in preventing the circulation of personal data, such as criminal records or a moral conduct that does not comply with general standards, is closely related to the wish to convey a positive image of one’s self, which allows to establish social relations (friendship, emotional links, business relations) under favourable conditions: the individual “sells” himself/herself on the market of social relations like a manufacturer sells his products, and is therefore inclined to enhance his/her qualities and to conceal defects. On the other hand, third parties too may, for the very same reasons, be significantly interested in receiving information on the people they meet for various purposes. Marco Maglio - An Economic Analysis of the Right to Privacy 263 3. The classification of privacy costs I think it is important, in this context, to express a few general considerations on the nature of the costs related to privacy protection. Two of these are particularly important: A) The first has a mandatory character: the criteria to calculate such individual sacrifices are all but unique, and characterized by strong subjective ambiguity. In this respect, just consider the debate carried out in 2001 in the United States on the assessment of the costs related to the approval of a privacy legislation for e-commerce and Internet trading systems. The amounts mentioned by the parties involved ranged from US$1 to 36 billion, according to the variables considered by those that submitted these calculations. The arguments related to these figures left their mark on the Internet, but never helped explain a basic matter. In the light of this experience, I deem it crucial to identify a way by which privacy costs may be uniquely calculated, in order to assess them correctly within the framework of individual choices. But this process requires a classification of costs based on objective criteria. B) Hence the second consideration, which is more substantial and related to the need to make a distinction between privacy costs. I will try to suggest a possible classification and to identify several cost categories according to three specific criteria: 1) the parties that incur such costs, 2) the time with respect to which such costs are incurred, and 3) the effects resulting from such costs. 1) From a subjective viewpoint, costs may be either: - individual, i.e. incurred both by the data subject to exercise his/her rights to privacy and by the data controller to abide by personal data protection rules, or - social, i.e. incurred by the community to ensure respect for individual privacy. These include the organizational costs incurred by the State to satisfy the citizens’ demand for privacy. 2) From the chronological viewpoint, costs may be either: - preventive or for prevention, to avoid any privacy breaches, or - subsequent or corrective, to remedy any breaches that have already occurred. Some in-depth analysis may be useful, especially from the viewpoint of the data controllers that operate within complicated organizations. The preventive costs required to ensure that these parties comply with privacy regulations basically provide for the following: - the provision of human resources to take care of the management of privacy-related practices; - the development and update of an internal privacy practice; 264 Da costo a risorsa - Attività produttive e protezione dei dati personali - staff training and updating; - the supervision and auditing of privacy management activities; - the adoption of technological and IT tools ensuring personal data protection; - internal communication to disseminate privacy policies; - direct relations with the subjects of the processed personal data. The costs subsequent to any claims resulting from non-compliance with privacy rules include: a) costs for the reorganization and readjustment of data to privacy protection requirements, b) costs resulting from relations with parties outside the corporate organization, with reference to: - administrative penalties, - damage reimbursement, - share value reduction, - damage to the company’s public reputation, - reduction of the corporate brand’s perceived value, - potential loss of economic opportunities. An analysis of correction costs and prevention costs allows to identify the risk a company has to take with respect to personal data processing and the investment the company has to make to reduce this risk accordingly. 3) Based on cost-related effects, costs may be either: - transaction-related costs, i.e. the actual economic effort resulting from the choice made, or - opportunity-related costs, i.e. what every individual is prepared to give up as a consequence of his/her choice. The confused discussion on privacy costs has developed so far with transaction-related costs as the only reference point, while only stressing the negative impact produced by the existence of monetary costs. On the other hand, I believe that opportunity costs deserve more consideration, since they affect the protection mechanism more directly. It is then worth analyzing this particular aspect. What is an opportunity-related cost? It is the cost of giving up a possible alternative option. Using the juridical categories of the buying and selling agreement, it may be defined as the price of renunciation. For example, if you decide to go to the cinema tonight, the opportunity-related cost results from your giving up to stay at home with your family (if the alternative to going out is staying in). The opportunity-related cost is therefore the value attached to the better alternative that is given up by adopting a certain behaviour. Since different individuals have different op- Marco Maglio - An Economic Analysis of the Right to Privacy 265 tions, they also bear different opportunity-related costs. I think the analysis of opportunity-related costs is most important to understand how the personal data protection mechanism affects individual choices. It should be noted, in fact, that whenever the data subject is asked to choose whether to grant his/her consensus to personal data processing, he/she estimates the opportunity-related costs resulting from such decision by comparing the benefits of the possible alternative options. If the data subject decides to restrict the disclosure of his/her personal data, he/she gives up the opportunity to get in touch with the party that asked for the consensus, while improving, at the same time, his/her privacy. On the other hand, if he/she decides to consent to processing, he/she reduces the privacy of his/her data, but increases the opportunities to get in touch with other parties. Similarly, whenever a data controller asks the data subject for consensus to further initiatives involving his/her data, it estimates the opportunity-related costs. No request will reduce the costs resulting from consensus management, but will also reduce the opportunities to have new contacts with the data subject. 4. The issue of the interest balance provision On the other hand, the need to tackle privacy-cost issues with sure methods and calculations does not only depend on an assessment of the system’s efficiency. A consistent interpretation of clear legal provisions, contained in the 1995 EC directive, called “interest-balance provision,” should also be provided. The principle on which this provision is founded is a very simple one: in order to assess whether a data processing activity is legitimate, the interests of those who want to use this data freely should be compared against the interests of the subject of such data.(4) Multiple criteria are used to assess this balance, and they are not limited to the (4) For better understanding of this phenomenon, it may be useful to make reference to comparative law, to explain how this provision was implemented and enforced so far in some homogeneous legal systems. The idea that the interests of the data controller and of the data subject should be balanced started in Germany, in the Netherlands, in Austria, and in Finland. These countries were the first to acknowledge the Interest Balance provision. In all the Member States that are familiar with the Interest Balance provision, the legislator prohibts that some data be processed without the consensus of the data subject and authorizes, instead, with no need for consensus, the processing of general, and therefore noninvasive, data. Personal data processing without the consensus of the data subject is only prohibited for sensitive data, as specified in Art. 8 of the European Directive. The legitimate interests of the data controller and of the data subject should then be defined. In the EC Member States that implemented the Interest Balance provision in their legal system, all reasonable specific economic interests are considered as legitimate. But the data controller should assess the purposes of the activity. In this comparative analysis, it is crucial to provide a correct definition of the economic impact of both positions that need to be compared. It is worth referring, in this respect, to the statement made by the Civil Federal Court of Germany (Bundesgerichtshof, BGH) in 1986: 266 Da costo a risorsa - Attività produttive e protezione dei dati personali economic domain. However, I think reference should be made to costs (both transaction-related and opportunity-related) to define whether the protection of the individual right to privacy is disproportional compared to a different interest that is potentially in conflict with such right. Thus, the correct evaluation of compared costs and benefits is crucial to the appropriate application of this provision, which has a true general character within the personal data processing theory, also with respect to the enforcement of the interest-balance principle. 5. The efficiency of data protection rules Another question arises from these considerations: what juridical regulation of privacy goes along the way of better allocation efficiency? The main issue with respect to effective privacy protection is generated by the need to harmonize strictly individual privacy-related choices in view of maximum social well-being. The juridical approach, suggesting an assessment only based on the exercise of a subjective right, may be usefully combined with some thinking aimed at pursuing maximum well-being, both for the owner of the right and for all the other concerned parties. If capable of avoiding provocative remarks, the economic analysis of law may be very helpful in opening up new perspectives for the discussion that is going to take place in the next few years. The development of technology and business communications inevitably tends to turn personal data into goods with an intrinsic value. The need for protection therefore tends to grow, but its effectiveness may only be ensured by taking into account the economic side of privacy, along with its original ethical side. In this respect, a further idea emerges, by which privacy is no longer just a negative right represented by the general duty to passively refrain from acting in such a way as to harm it. On the other hand, it takes the typical characters of civic law(5) and becomes a juridically protected claim for services (facere or non facere, in the legal jargon) the community is in charge of delivering. In this new perspective, data protection costs, both public and private, are inevitably bound to rise. This is physiological for an effective system, and leads to look at the future “The phrase justified interest requires an assessment of the importance and of the consequences that the disclosure and the use of personal datta imply for the data subject, as opposed to the interests of the data controller. Therefore, the type, the contents, and the meaning of the data should be assessed according to the purpose of its collection, and to the social cost resulting from its non-use. Only if this assessment, inspired by the constitutional principle of proportion, does not cause a reason to assume that data storage for the stated purposes may negatively affect the justified interests of the concerned party, is such data storage allowed.” (BGH NJW 86, 2505) (5) According to the classical categories of Jellinek Marco Maglio - An Economic Analysis of the Right to Privacy 267 with the certainty that a right, meant as a juridically protected status, does not only exist as long as a given legal system decides to acknowledge and protect it, but also depends on the resources a society is prepared to devote to this purpose. 6. The pursuit of the data subject consensus In economic terms, it may not be ignored that privacy works according to a comparison between the opportunity-related costs for the data subject and for the data controller. If the data controller’s advantage resulting from compliance with data protection rules is added up to the data subject’s advantage, a balanced system is established, by which an increased privacy does no longer just depend on the data subject’s choice and on the resources invested by the Authority, but is rather solicited by the data controller itself. The result is a reduced pressure on the data subject to obtain his/her consensus to personal data processing. It should be noted, in this respect, that the increasingly accurate mechanisms by which strangers become friends and friends become customers (as from the successful slogan used by Seth Godin, the creator of permission marketing) are not reassuring. An individual makes selfish assessments of the social impact of his/her choice on privacy. In addition, it is too naive to suggest that a natural convergence exists between privacy advocates and permission marketing advocates. But this is not the point: instead, this consensus dangerously turns into a commodity, and this may jeopardize actual privacy protection and the future development of an interactive communication market. Those who capture personal data for business purposes tend to take the principle of the central importance of individual consensus to extremes - often in a subtle way and using psychological strategies - as a tool for definition of the privacy level and for the exercise of the resulting right to information self-determination. Consensus, thus debased, may become a traded product in relations between the data controller and the data subject (according to a mechanism that may be simply described as follows: “if you consent to the use of your personal data, I’ll let you take part to a sweepstake or give you a gadget”) and lose, in the process, the guarantee value data protection mechanisms attach to it. This undisputed risk had already been perceived about three decades ago by commentators on the then new data protection theories in Europe: consensus, alone, is not enough to effectively ensure full privacy protection. This principle left significant marks in the Italian law, such as the regime characterizing sensitive data processing, by which the written consensus of the data subject should be supported by an authorization issued by the personal data pro- 268 Da costo a risorsa - Attività produttive e protezione dei dati personali tection Authority. The function of the independent authority for privacy protection is not only the one that could be defined, according to a very effective US formula, as the sporting theory of justice. The Authority, in fact, is not only a referee ensuring that the players comply with the rules set by the legislator. Instead, by law, it plays an active role in enforcing the rules and investigating and preventing any breaches. Once these comments are reported to the legal framework, the true basic matter should be solved, namely the identification of mechanisms by which everyone may have an interest in adopting privacy-oriented behaviours. The basic assumption of this reasoning is that privacy is a transversal value that, if established, may bring shared benefits to the individuals and the community, to private parties and public companies and entities and, more generally, to the person meant both as an individual and as a social subject. The main issue is then to decide whether the protection mechanism may be balanced by reducing the inevitable pressure on the data subject to obtain his/her consensus. 7. Possible actions for more effective protection A number of levers are available to accomplish this. With no claim of being exhaustive, I will mention a few, to stimulate an open debate on the matter: 1) Prevention: personal data processing abuses often occur without the data subject being aware. A so-called secret processing thwarts the role of control over consensus. An action should then be promoted to prevent such breaches. 2) Control: the supervisory role of the Independent Authority may help reduce and regulate the pressure exerted by the data controllers on individual data subjects to obtain their consensus to data use. 3) Sanctions: the enforcement of money penalties and indemnification or punishing systems may lead data controllers to use greater caution in expressing their assessment on the comparative benefits resulting from a breach of privacy protection rules. 4) Interest balance: the correct enforcement of the interest balance provision may reduce the pressure on the data subject to convince him/her to grant his/her consensus (or to take such consensus without the data subject being aware, as it happens sometimes). 5) Incentives: the identification of awarding profiles increasing the benefits for the data controllers related to compliance with the rules, may develop the latter’s willingness to respect privacy. I am not sure whether the basic as- Marco Maglio - An Economic Analysis of the Right to Privacy 269 sumption of a great book by Stephen Holmes and Cass Sunstein – “The cost of rights” – is true, by which freedom depends on taxes, but the tax leverage, through allowances, deductions, and tax exemptions, may probably help promote respect for other people’s privacy and discourage breaches. The same is true for a simplified exercise of the administrative duties related to data protection, that could be granted, as a reward, to the data controllers that comply with high privacy standards. Certification tools publicly stating compliance with privacy principles are also strongly motivating, and companies in particular may use them to improve consumer loyalty. But before discussing the instruments for right protection, to which our discussion has brought us, it is important to understand how personal data dynamically fall within an economic system. Micro-economic schemes and criteria will be used for this purpose. Following the traditional principles of micro-economic analysis (i.e. the study of the allocation of scanty resources to alternative options), the dynamics generated by personal data protection may be analyzed in five respects: - how consumer choices are made in the light of the demand for privacy (and therefore, how a typical consumer, bound by a given income, chooses between the different levels of privacy available); - how choices are made with respect to privacy by companies and business enterprises (in this respect, a description may be provided of how the company decides what privacy level is acceptable for it, which investments it should make to ensure customer privacy, and how much it should spend to obtain customer consensus for data processing); - how companies and consumers interact with each other (combining the consumer and company theory, the decisions of both these groups may be analyzed to check their co-ordination through the fluctuation of market prices, while identifying a balance point and therefore the privacy level that is acceptable in an efficient market); - how the supply and demand for privacy are defined in the manufacturing process (analyzing how demand and supply affect production factors: labour, capital, and entrepreneurial skills); - how the markets are organized and how they may effectively allocate economic entity choices with respect to privacy. This certainly opens up new perspectives for an analysis, which should be carried out with great scientific accuracy and with the ability to valorize the results achieved so far by juridical research. 270 Da costo a risorsa - Attività produttive e protezione dei dati personali 8. The intrinsic risk of economic analysis One risk should be taken into account, however: the overlap of economic assessments on a fundamental right like privacy is bound to cause misunderstanding and confusion that need to be avoided. But I think it would be unfair to ignore this analytical perspective, which is called for by the development of the social and technological system within which personal data flows. I feel, instead, that this is a challenge we need to take, even at the cost of having to cope with dangerous or complicated issues. It should be noted that the actions of the people that Yves Dezalay effectively described as the merchants of the law will develop in great numbers in the next few years. There are true multinationals of the law that act in view of restoring the international juridical system, while pursuing special interests that have nothing to do with the protection of general principles, determined on the ground of democratic rules. Privacy is too much of a highlight to keep away the pressures of the so-called business communities. With the pride of a lawyer, I do not think that such a cross-disciplinary issue may be tackled through cost-benefit considerations only. On the other hand, I also think that juridical science is never just formal, and does not end with a definition of rights and duties. And I am sure that the true problems a lawyer needs to tackle and solve are intimate matters that involve social consciousness. To achieve this, the economic impact of the rules should be assessed, and their efficiency should be examined in pursuing the general interest. 9. The opportunities of the economic analysis of law: changing privacy from a static cost to a dynamic investment The combination between juridical and economic categories, however, does not imply an approval of the viewpoints of those that - especially overseas - state that juridical rules necessarily develop towards effective solutions. The analytical micro-economic instruments are rather used to identify the incentives and constraints that influence individual behaviours. A greater awareness of the economic logic behind those behaviours may therefore significantly help interpret and possibly adapt to the rules. Still with respect to the development of the new global market, the multiple rules and the different approaches to personal data circulation issues may generate the same confused and misunderstood languages that, according to legends, characterized the Babel world. Specifying the economic data involved in the discussion may promote the introduction of a shared language, mainly, but not only, between both shores of the Atlantic ocean, and lay the foundations for a more conscious ap- Marco Maglio - An Economic Analysis of the Right to Privacy 271 proach to both viewpoints. A growing “cross-attention” should emerge – as experts in comparative studies use to say – based on mutual respect, between the opinions expressed in the different continents. I think that, without this, the road to globalized privacy guarantees – the true goal of this process – would be harder to reach. For the near future, I see no perspective for privacy deregulation, but I am sure that some people will use the economic analysis for their instrumental purposes and will state the need to release the entrepreneurial world from its constraints. Others will state they can do without the rules and the reasons of the law, to give more room to economic needs. I strongly recommend that you beware of these claims for liberalization. This risk should be clearly reported and, in order to avoid it, I think it is crucial for the economic analysis of law to clarify the future debate on privacy and offer its support to this branch of juridical research. In this economic analysis of the right to privacy, the existing legal framework needs to be preserved and protected in view of outlining a harmonious view of privacy, which may turn from a static cost to a dynamic investment, in order to increase the value of resources and promote economic development: a well-tempered privacy, if I may say so. 10. The noble and mobile frontier of privacy A development is then under way, also for privacy, that has characterized the development of the general theory of civil liability, and that belongs by now to the jargon of Italian lawyers: the noble frontier of privacy - noble because it concerns a fundamental right - comes forward thanks to technological and social developments, thus turning into an ever-shifting mobile frontier. Privacy needs to be pursued as its borders are expanded. To achieve this, I think we all need to refrain from taking up consolidated defensive positions and open up to new perspectives. It is important to consider, in this process, that a scientist is characterized not so much by knowledge, by the undisputed truth, as by a critical, continuing, and restless search for the truth. With enthusiasm and passion, I always remind to myself the words by which Karl Popper described the progress of scientific development. Based on that lesson, I think it is fair to say, with respect to privacy, that “research never ends”. 272 Da costo a risorsa - Attività produttive e protezione dei dati personali Privacy in a Business: An Operational Model Douwe Korff (1) Contents: 1. Introduction - 2. The problems with data protection - 3. Know thyself (in six steps) - 4. Reflect - 5. Conclusion: cost and benefits 1. Introduction Before making some remarks on how businesses can apply data protection rules in practice (somewhat grandly referred to as the presentation of an “operational model” in the programme), I would like to make a few brief general comments, partly related to earlier presentations. First of all, I would like to note that “data protection” is a concept that extends beyond “privacy” and “private life”. It is not solely concerned with limiting intrusions into our private matters, with ensuring that no-one holds more data on us than is necessary for their legitimate activities. That is only part of it. But data protection extends beyond this. It deals with the use of data in relationships between the individual and other social actors, private and public. It seeks to ensure that the data are indeed used only for a “legitimate”, defined purpose; that they are limited to what is “necessary” and “relevant” in relation to that purpose; that they are obtained and processed properly, fairly and lawfully; and that the individual has a measure of control over the process. In broad terms, data protection therefore serves to enhance lawfulness, social propriety and fairness in relationships, insofar as these relationships involve the use of data. This means that sometimes more, or better data may be needed. Privacy may concern the “right to be left alone”. Data protection concerns the right to be properly treated. This wider scope of data protection has clear implications. It means that the rules are not just aimed at reducing data. It also means that there must be a heavy emphasis on process, as well as substance. It also means that data protection (or at least elements of data protection) should be extended to legal persons. Companies don’t need privacy. On the contrary, in many ways they should be forced to open themselves to outside, State and non-governmental, inspection. But they do deserve to be properly treated. A false credit report can seriously damage a business, as much as an individual. To that extent, data protection should be available to the former as much as to the latter. Secondly, data protection relates to fundamental rights, and in particular to both the right to private and family life and the right to freedom of information and expression (Arts. 8 and 10 of the European Convention on Human Rights). It has been said at the conference that the rules on when a person’s privacy may be inter(1) Professor of international law, London Metropolitan University Douwe Korff - Privacy in a Business: An Operational Model 273 fered with are unclear. However, because of this human rights basis of data protection, we can discern the principles that apply. They have been extensively elaborated in the case-law of the European Court of Human Rights. Put simply, they first of all recognise that the systematic collecting and collating of information on a person intrudes into that person’s freedom: they constitute “interferences” with a person’s private life. Secondly, they therefore require that any such activities be: (a) lawful (i.e. must be in accordance with positive law); (b) legitimate (i.e. serve a legitimate purpose); and (c) “necessary” to serve that purpose. The requirement that restrictions on fundamental rights (such as, in casu, processing of personal data) must be “lawful” also means that the legal rules in question must be (aa) published; (ab) detailed; and (ac) not such as to allow “arbitrariness” - which basically means that they must not allow excessive discretion in their application. The principle that processing must be “legitimate” implies that there is a test of what I may call “societal necessity” and propriety: not everything that is “lawful” (i.e. not forbidden by law) is “legitimate”. Processing which improperly interferes with a person’s privacy and freedom is not “legitimate”, even if it is “lawful”. The test of “necessity”, moreover, involves in particular an assessment of the “proportionality” of any interference. In terms of data protection, it means we must ask whether the purpose that is supposed to be served by data collecting and –use even if it is lawful and legitimate - is such as to outweigh the intrusion in a person’s private sphere inherent in such activities. In addition, it is crucially important to note the procedural aspect of human rights protection. By this I mean that under international human rights law, it is not sufficient to stipulate the requirements listed above, at (a) – (c). Rather, these must be backed up by: (d) supervision; and (e) remedies that are available to individual data subjects. This is not the place to discuss these matters at length. Rather, I would just like to make two points. First of all, I hope the above may counter remarks that the framework for the application of data protection is too vague. I agree that the specific legal rules are complex and often ambiguous. But in my opinion, the gist, the thrust of the rules is clear, and the above principles provide a clear set of standards by which data protection legislation, and its application and enforcement, can be judged. Secondly, in respect of the latter two points (points (d) and (e)), it must be noted that State supervision can never “police” the billions of processing actions that take place every day. At most, the data protection authorities can hope to expose the worst abuses. And individuals, too, cannot hope to properly exercise control over 274 Da costo a risorsa - Attività produttive e protezione dei dati personali their data, or the processing of their data: “informationelle Selbstbestimmung” is a mirage. Rather, data protection - fair processing of personal data - must be embedded in the ethos of State and corporate actors if it is to be effective. This presentation is concerned with data protection and businesses, i.e. with the private sector. However, in this introduction I may note two more general matters. First of all, we are moving to the era of “ubiquitous computing”: virtually all we do, say, or write (or [e-]mail, or “text”) is captured. There is a strong temptation, on the part of both private and public actors, to try and seek access to these evermore-revealing data. The US Government has even formally adopted a “Total Information Awareness” programme in its so-called “war on terrorism”. Businesses may try to obtain “total information” on people to sell products or services. Both attempts are (a) doomed to fail and indeed (b) likely to be counter-productive. They are doomed to fail for two reasons. First of all, attempts by government authorities to use “profiles” to catch highly untypical exceptions just do not work - even if the data are reliable. As one expert told me: “you just catch oddballs”. Secondly, data, and the quality of data, are and is directly linked to the context in which the data are provided, collected and used. If I dont like airline meals with (certain kinds of ) meat in them, I may tell them that I am a vegetarian, or indeed a Jew or a Muslim. I (or my childen) may fill in consumer questionnaires by saying I earn massive amounts of money, and take five holidays a year, in the hope of being sent catalogues of expensive sports cars and luxurious hotels in exotic places. Companies may not mind such mis-statements too much, as long as their marketing remains largely unaffected. However, State agencies relying on such data may arrest innocent people (and not just innocent oddballs, either). Worse, they may think such raw data will enable them to spot the guilty. Real criminals or terrorists will not find it too difficult to escape such crude Rasterfahndung. Secondly, abuse of data will be exposed - and is the most certain way to ensure that people will be more reluctant to part with their data, or more tempted to provide incorrect data. “Total Information Awareness” just means that ubiquitous computing is being turned into unbiquitous surveillance. Data subjects - individuals will not accept it, and will try to evade it. The upright citizen will do so because he feels he should not have to bare all before the State or mighty corporations. The criminal will do it to escape detection. The terrorist will do it to avoid capture until it is too late. If ubiquitous surveillance will lead to avoidance action by individuals - as I believe it will - it will have defeated itself. Both the State and business can only do what they are supposed to do on the basis of trust. In a police context this is called, in England (where I live) “policing by consent”. The British police has long since recognised that policing without consent is not only oppressive, it is also ineffective and indeed counter-productive, even in the fight against terrorism (al- Douwe Korff - Privacy in a Business: An Operational Model 275 though this lesson may have to be re-learned by the security services who now appear to be in the ascendency). The same applies to business. In the era of ubiquitous computing, the private sector should avoid the temptation of trying to grab as much data as possible, from wherever they can get it. They will merely obtain a load of rubbish - useless, inaccurate data. And they will alienate the customer. I will conclude below, in the main part of my presentation, that compliance with data protection is not really difficult or demanding. Here, I may already add that it also makes good business sense. 2. The problems with data protection The above is not to say that there are no problems with data protection. On the contrary, data protection legislation is awkward, and often fails to deal with “the real world”. Thus, data protection rules were written for simple operations: - they assume there is always one controller;(2) - they assume controllers obtain data from one source; and - they focus on operations in one country. In practice, commercial operations can be very complex; they do not correspond to this simple approach: - they often involve several entities, with different legal status (such as wholly-owned subsidiaries; legally independent but effectively linked companies; agents; etc.); - they use data from many different sources and wish to exchange those data, in particular within a group of companies; and - they are increasingly transnational - inherently so with regard to the Internet. Furthermore, in spite of transitional rules in the national and European rules, there are problems with old, inherited (“legacy”) systems and with acquisitions and mergers. The first and main point I want to make in this presentation is that companies must address these issues squarely: they must try to find solutions - that is: ways of operating in compliance with the rules - first and foremost by and for themselves. They should not either actively evade the law: that would merely lead to exposure and opprobrium - and loss of consumer confidence and business - later on. Nor should they wait until the national supervisory authority catches up with them. First of all, because that would involve such exposure and loss of confidence. But also because the best (initial) judge of what is needed to comply with data protec(2) The EC framework directive on data protection contains one, difficult exception to this, in the highly problematic provision on “applicable law” - but even in that context fails to resolve the issues. 276 Da costo a risorsa - Attività produttive e protezione dei dati personali tion principles and rules is - must be - the data user, the company (or group of companies) concerned. This presentation intends to give an insight into how this can be done. In it, I draw on extensive experience in advising corporate and not-for-profit clients, ranging from Readers’ Digest, Cendant Corporation and Euromoneys plc to Amnesty International and the UN High Commissioner for Refugees. What I will try and do is show how a purposeful, but common-sense, approach to the issues can result in pragmatic solutions which both allow companies to process (and share) personal data for their legitimate business purposes, and to respect the privacy and other rights of their customers and potential customers. 3. Know thyself (in six steps) In order to comply with data protection rules, companies must first of all assess (“self-audit”) their operations in the light of data protection. They must describe (for themselves) their own operations in data protection terms. In my experience, this first self-assessment is the single most important action that must be taken towards data protection compliance. In carrying out this description, in making this assessment, companies must not assume that a purely legal description of the relationship between the different entities, or between the companies and the data subjects, is sufficient for data protection purposes. Thus, for instance: - whether one company (e.g. a mother company) or another company (e.g. a daughter company) is to be regarded as the controller of a specific operation does not depend on their formal status within the company (mother or daughter, subsidiary, wholly-owned, etc.) but on the actual, practical arrangements; - “consent” obtained in a contractual context may not be valid for data protection purposes; and - an agreement between companies (even within one group) to exchange data, even if valid in terms of contract law, may not be sufficient to allow such exchanges. The self-assessment or internal description should take place in six steps, in the following sequence: The first step in the assessment should be a close examination (and writing up) of the Purposes for which the company (or group of companies) uses personal data. In this, companies should: - assess Each separate, distinct personal data processing operation: whether operations are separate depends on whether they serve different purposes; - think about the specificity of the description of the purposes in question: Douwe Korff - Privacy in a Business: An Operational Model 277 you may be tempted to use broad descriptions, but informing data subjects in vague terms (e.g. “commercial purposes”) may not be sufficient in several ways to meet the informing-requirements of the law, or to obtain consent; it is best to be precise whenever practicable, especially about secondary uses and disclosures of data; and - check what is meant by “personal data”: this sometimes includes data on legal persons (this is the case in Italy, for instance); it may also depend on whether the data are used with reference to the data subjects: this can be quite a difficult matter with regard to sound and image data (as obtained, for instance, through cctv cameras, or biometric identifiers), or statistical data, for example. The second step in the process requires a company to specify who “determines” the purposes of any processing operation: this entity must be regarded as the controller. In order to do so, for complex operations, you will need to look closely at the real activities of all the entities involved (e.g., in a group of companies) You should try to specify the role of the other companies involved: they could be controllers with respect to some operations, and processors with regard to other operations. Having determined who is the controller and who is (or are) processor(s) with regard to each distinct processing operation, you can (for transnational operations) determine which national law applies to the separate processing operations. However: beware! In spite of an attempt by the EC data protection directive, in practice, the national laws may show positive or negative conflicts; the different laws in the EU Member States still (regrettably) often define their territorial applicability differently. The purpose(s) specified for each operation determine(s) the application of many relevant data protection rules: - whether the data are collected for (a) legitimate purpose(s); - if they are processed for a secondary purpose, whether that purpose is compatible with the primary purpose; - whether the data are adequate or inadequate, relevant or irrelevant and excessive or not excessive in relation to the purposes concerned; - whether the data are accurate or inaccurate in view of the purposes concerned; - whether, and if so, how often, the data should be up-dated; - how long the data may be retained; - what information should be provided to the data subjects (depending on the specificity of the purposes and also whether the purpose is - or the purposes are - obvious or not); - etc. 278 Da costo a risorsa - Attività produttive e protezione dei dati personali For the third step, it must be attempted to specify the criterion or lawful basis for each separate processing operation. For companies, this will generally be one of the following: - consent; - contract; - a legal obligation imposed on the controller (the company); or - the “balance” criterion Quite different, and very specific, requirements arise in respect of each of these criteria: you must therefore carefully check whether you meet them: - consent must be free, specific, informed and unambiguous (and for sensitive data, explicit and often in writing); - contractual or pre-contractual stipulations about uses of personal data may not be valid if they are unrelated to the main purpose of the contract; - controllers must check whether they are really obliged to process (e.g. to disclose data to a public authority) under some legal rule; and - the “balance” criterion requires a careful assessment of the interests of both the company and the data subjects - if possible, it is much better to obtain the consent of the data subjects. Fourthly, you must check whether you meet the other substantive requirements of the applicable national law (or laws!), in particular as regards: - the stricter rules or criteria for the processing of “sensitive data”; - the informing of data subjects (and the specificity of the information) generally; - the informing of data subjects of their rights in particular; and - the granting of data subject rights: the right of access and correction; the general right to object; the specific right to object to direct marketing (whereby you must take into account the different requirements relating to different technologies used for direct marketing - mail, fax, telephone, email - and the differences between different countries in this respect); and the right not to be subjected to fully automated decisions based on “personality profiles”. Once again, you must check these matters separately, for each distinct processing operation (defined by reference to its purpose, as explained above in the first step). For the fifth step, you must check how you ensure security and confidentiality of personal data, both within your company (or group of companies) and as concerns processors or agents. To this end, you must: - check the physical security of your data; - check whether you are limiting access to personal data on a “need-toknow” basis; and Douwe Korff - Privacy in a Business: An Operational Model 279 - review what formalities you have put in place to ensure compliance (e.g., confidentiality clauses in employees’ contracts; in contracts with agents; in contracts with other companies; and in intra-group agreements). It is important to stress that the formalities just mentioned are not limited to measures relating to outside contractors: you must also look at any rules or agreements that have been adopted within your company, or within your group of companies. You must also of course take special care with regard to on-line transmissions of data. Finally, as the sixth step, you must check the notifications you have made to the national data protection authority (or to different national authorities!) with regard to your personal data processing operations: were they (and are they still) accurate? 4. Reflect Now take a rest - and think about whether you should make new, and possibly different arrangements within your company or group of companies, as concerns your processors or agents, and as concerns your relationship with your data subjects (in particular, your customers) - for instance: - you may wish to assign responsibility for certain processing operations to different entities within your company, or within your group - but remember that this may mean that different entities become the controller, and perhaps even that a different law applies; - you may wish to re-think how (and in how much detail) you inform your data subjects; - you may want to base certain operations on a different basis (e.g., on consent in stead of on the “balance” criterion, or vice versa); - you may (usually should) revise - or where none exist, draw up - detailed contracts or intra- or inter-company agreements reflecting the (possibly new) arrangements, to reflect the (new?) arrangements In this, there are some “dos” and “donts” (and perhaps a “perhaps”): - do ensure that someone within your company or group of companies is given overall responsibility for data protection - and give that person appropriate authority, and lend him your ear! - do consult with your national data protection authority (or in appropriate cases, with the relevant data protection authorities) - they are usually most helpful! - do consult with your national (and where appropriate, European) trade association - they are usually most knowledgeable! 280 Da costo a risorsa - Attività produttive e protezione dei dati personali - perhaps hire a consultant to get you started and/or to train and assist your in-house data protection official (but often this will not be necessary if you adhere to the above and your operations are not too complex). - don’t dissimulate: you can make new arrangements, but they must be real ones, not facades! 5. Conclusion: cost and benefits If you carry out the above exercise, you will know what you need to know to arrange your data processing operations in such a way as to comply with any relevant (applicable) data protection rules. There may be practical issues you may want to address - for instance, how to move from certain practices and certain databases, which are not yet fully data protection compliant to practices and systems which do fulfil the legal requirements. There may also be questions as to whether a particular operation is in accordance with the relevant rules. But at least you will have been able to remedy matters which could be remedied without great cost or effort. And at least you now know where the problems are, and will have an idea of how you would like to address them. As noted above, at 4, you can now discuss these matters rationally and in a practical way with the data protection authority (or authorities), if needs be after having first consulted your trade association. You will find that the authorities will be positive to you, once they realise you have tried, and are trying, to comply with the law. They are generally quite willing to discuss ways of bringing your practices and databases in line over time (provided the time-line isn’t too long). They are willing to discuss the wording of information-paragraphs in contracts, forms and on websites in a practical and open way. It is extremely rare - I would almost say, unheard-of - for a bona fide company to be unable to make practical, acceptable arrangements in consultation with the authorities. In other words: you can comply with data protection laws and –rules, without this undermining proper business practices or the possibility to make a profit. Not trying to make this effort, by contrast, can be costly. It will expose you to enforcement action on the part of the authorities and the courts - who, if you haven’t at least tried to bring your own house in order, will not be as helpful as they would otherwise be. And remember that deliberately violating data protection law is costly: the data protection authorities and the courts can impose severe sanctions. They can fine you, or they (or the courts) can order you to cease certain operations, or to re-collect (or worse, destroy) data, or to retrospectively obtain the consent of your data subjects, or to re-design your databases (all of which is even more costly than fines). Most costly of all: data subjects will abandon companies who violate their rights - they are becoming increasingly aware of their rights and interests in this field. Douwe Korff - Privacy in a Business: An Operational Model 281 Conversely, complying with data protection law is not as difficult as it may seem - it just has to become part of your corporate thinking and ethos; it also does not necessarily cost very much if carried out with common sense and in consultation with the authorities, trade associations and where appropriate consumers or clients. And above all: making data protection and respect for the rights of your data subjects (in particular, your customers) part of your ethos and image is a major benefit - increasingly, consumers are basing their choices on how they think the companies they deal with treat them. Overall, data protection compliance is therefore a benefit, not a cost to industry. 282 Da costo a risorsa - Attività produttive e protezione dei dati personali Infomediazione come strumento dei consumatori Carlo Formenti (1) Nei modelli teorici che descrivono l’evoluzione dei rapporti sociali nell’epoca di Internet gli scenari cambiano a seconda che l’accento venga posto prevalentemente sui fattori economici, politici, o culturali. Ma la letteratura sociologica concorda su un punto: la comunicazione a rete favorisce l’individualizzazione dei rapporti sociali a ogni livello, dalla famiglia al lavoro, alla politica. Manuel Castells(2) parla di “privatizzazione della socialità”, o di “individualismo in rete”, riferendosi alla crisi – che le nuove tecnologie non hanno provocato ma sicuramente accelerato – che investe la famiglia patriarcale, le forme tradizionali di rappresentanza politica e sindacale, l’associazionismo fondato sull’appartenenza a comunità locali, categorie professionali, ecc. Sembra dunque riemergere una tendenza di lungo periodo già evidente nelle prime fasi del processo di modernizzazione - basti pensare alla dissoluzione delle forme tradizionali della famiglia e della comunità locale concomitante con il processo di formazione del mercato capitalistico nell’Inghilterra del XVII e XVIII secolo. A una prima ondata nella direzione della frantumazione-atomizzazione delle relazioni sociali, accompagnata dalle politiche legislative del neonato statonazione, aveva tuttavia fatto seguito una lunga fase in controtendenza: per contrastare gli effetti devastanti dell’accumulazione primitiva sulle condizioni di vita della popolazione, lo stato inizia quella lunga marcia di istituzionalizzazione del mercato capitalistico destinata a durare un secolo e mezzo e a culminare con la nascita del Welfare(3). Fu in quel periodo che maturarono le forme istituzionali della moderna democrazia e nacquero quei corpi intermedi – partiti politici, sindacati, associazioni professionali, organismi di rappresentanza, ecc. – che hanno ridisegnato modalità e regole dell’appartenenza dopo il crollo delle comunità tradizionali. Ma con i processi di deregulation economica degli anni ’80 e con il successivo decollo della New Economy(4) si è rimesso in moto il processo di atomizzazione: come era capitato alle comunità tradizionali, le moderne forme di aggregazione sociale entrano a loro volta in crisi, lasciando l’individuo a tu per tu con le impersonali potenze di una tecnologia e di un mercato sempre più “globalizzati”. La teoria neoliberista interpreta tale evoluzione come realizzazione dell’utopia (1) Giornalista - Italia (2) Cfr. Manuel Castells, La Nascita della società in rete, Università Bocconi Editore, Milano 2002. Vedi anche Galassia Internet, Feltrinelli, Milano 2002. (3) Cfr. K. Polanyi, La grande trasformazione Le origini economiche e politiche della nostra epoca, Einaudi, Torino 1974. (4) Per il rapporto fra deregulation e decollo della New Economy vedi K. Ohmae, Il continente invisibile, Fazi, Roma 2001. Carlo Formenti - Infomediazione come strumento dei consumatori 283 del “mercato perfetto”, formulata più di due secoli fa da Adam Smith: l’avvento di Internet consente di mettere sullo stesso piano venditori e compratori, in uno scambio “trasparente” in cui entrambi i contraenti accedono alle stesse informazioni. Al tempo stesso stati-nazione e corpi intermedi perdono presa nei confronti di un “individuo sovrano”(5) che si trova ora nelle condizioni di offrire le proprie prestazioni lavorative, di vendere e comprare beni o servizi, di scegliere soci e alleati al di fuori di qualsiasi controllo politico, fiscale, ideologico. Ma questo modello, che ha contribuito ad alimentare il mito di una progressiva e irreversibile “disintermediazione” delle relazioni economiche (tutti scambiano tutto con tutti, senza bisogno di ricorrere a intermediari) non descrive adeguatamente la complessa realtà della Network Society. In particolare, l’approccio “economicista” sottovaluta la portata e la consistenza dei legami comunitari di nuovo tipo che le reti di computer hanno consentito di sviluppare. L’individualismo in rete, sostiene Castells(6) – sulla scia di Rheingold(7) e altri autori - non si riduce a una raccolta di individui isolati, ma configura un modello sociale di nuovo tipo, un sistema di relazioni sociali “centrato” sull’individuo. Gli individui selezionano cioè i loro rapporti sulla base delle proprie affinità e costruiscono reti di legami personali in grado di garantire socialità, supporto, informazione, senso di appartenenza e identità sociale. Ancorché diversi sia da quelli delle comunità tradizionali che da quelli delle moderne relazioni sociali, questi nuovi legami non sono affatto “deboli”: la loro indipendenza da vincoli territoriali e il fatto di affondare radici in un humus culturale fatto di affinità elettive li rende, se mai, più solidi e duraturi. I rapporti fra Network Society e New Economy, insomma, cambiano in relazione al punto di vista adottato: nella teoria neoliberista lo scenario si articola su due figure fondamentali, l’individuo da una parte e il mercato globale fondato sulle tecnologie di rete dall’altra, mentre tutti i “filtri” politici, sociali e culturali che si interpongono fra tali figure tendono a sparire (si potrebbe dire che il mercato incorpora la rete, configurandola come strumento capace di realizzare l’utopia del mercato perfetto). Dal punto di vista “culturalista” Internet – o meglio le relazioni sociali fondate sulla rete – influenzano al contrario il mercato più di quanto il mercato influenzi Internet, e questo perché i filtri fra individuo e mercato, invece di sparire, si moltiplicano, assumendo la forma di quelle comunità virtuali che costituiscono il terreno su cui si decide il successo o il fallimento di qualsiasi modello di business. La seconda tesi appare più credibile ove si consideri che il capitalismo, nel momento in cui parte alla conquista di Internet, ha da tempo abbandonato il modello fordista, fondato sulla produzione di massa di beni e servizi per un pubblico indif(5) Cfr. J. D. Davidson, W. Rees-Mogg, The Sovereign Individual, Simon & Shuster, New York 1997. (6) Cfr. op. cit (7) Cfr. H. Rheingold, Comunità virtuali. Parlare, incontrarsi, vivere nel cyberspazio, Sperling & Kupfer, Milano 1994. 284 Da costo a risorsa - Attività produttive e protezione dei dati personali ferenziato. Il processo di terziarizzazione, lo spostamento dell’enfasi dalla produzione al consumo, l’attenzione per i mercati di nicchia, ecc. trasformano cultura e organizzazione delle imprese, inducendole a concentrare le energie sul controllo del consumatore più che su quello del lavoratore. Ma controllare il consumatore non significa solo vendergli qualcosa, significa anche e soprattutto istaurare un rapporto duraturo, fidelizzarlo, coinvolgerlo nella progettazione di beni e servizi. E nel momento in cui nascono le comunità virtuali questa “filosofia” è costretta a compiere un ulteriore salto di qualità, affrontando una sfida ricca al tempo stesso di opportunità e di rischi. I secondi derivano dal fatto che le logiche di aggregazione delle comunità virtuali - ad eccezione dei casi in cui queste nascano su iniziativa delle stesse imprese, come comunità di esperti o appassionati di un determinato prodotto – si rivelano del tutto autonome dalle logiche di mercato (con cui entrano spesso in conflitto). L’elenco degli esempi in merito è nutrito: dal passaparola negativo sulla qualità di un servizio, alla nascita di circuiti di scambio gratuito di prodotti capaci di mettere in crisi interi settori industriali (vedi il caso Napster); senza dimenticare la circolazione accelerata di informazioni che consente di esplorare un’ampia gamma di alternative, intensificando la competizione, abbassando i prezzi e indebolendo le relazioni fra cliente e impresa fondate sul marchio. Al tempo stesso, le comunità virtuali rappresentano una preziosa fonte di informazioni su gusti e preferenze dei consumatori, e nella misura in cui se ne ottiene la fiducia, possono trasformare la natura stessa del rapporto fra cliente e impresa, che da semplice transazione economica si trasforma in una relazione umana che entra in quanto tale nella catena del valore. Al punto che autori come Jeremy Rifkin(8) mettono in guardia sui rischi di mercificazione delle relazioni umane, mentre è sempre su questo terreno che sorgono le maggiori sfide intorno al problema della privacy. Questo paradossale intreccio di alleanza e conflitto fra imprese e consumatori ha attraversato due fasi evolutive. Nella fase aurorale della Net Economy, è prevalsa la convergenza di interessi: da un lato, le comunità virtuali rappresentavano per le imprese una fonte straordinaria di idee, progetti e suggerimenti, contribuivano a testare e migliorare prodotti e servizi, funzionavano da amplificatore e canale di diffusione di informazioni e notizie relative a merci e marchi aziendali; dall’altro, le imprese offrivano a loro volta alle comunità notizie e informazioni utili, mettevano a disposizione – spesso gratuitamente – conoscenze e competenze relative all’oggetto di interesse attorno a cui si era aggregata una comunità, ecc. È la fase che ha alimentato le tesi sullo sviluppo di un’economia della conoscenza in cui “tutti vincono”, perché tutte le parti in causa hanno qualcosa da guadagnare nello scambio reciproco di informazioni(9). È la fase in cui le comunità virtuali funzionano spesso da (8) Cfr. J. Rifkin, L’era dell’accesso. La rivoluzione della New Economy, Mondatori, Milano 2000. (9) Cfr. K. Kelly, Nuove regole per un mondo nuovo, Ponte alle Grazie, Milano 1999. Carlo Formenti - Infomediazione come strumento dei consumatori 285 veri e propri incubatori per le startup. La seconda fase si sviluppa invece quando le imprese della Net Economy iniziano a diminuire di numero e crescere di dimensioni - un processo di selezione e concentrazione accelerato dalla crisi economica tuttora in corso. A mano a mano che alcuni marchi si consolidano e riescono a costruire veri e propri “monopoli di nicchia”, mentre fanno il loro ingresso sul mercato dell’ebusiness i colossi dell’economia tradizionale, le imprese vincenti riescono a concentrare nelle proprie mani enormi data base di informazioni sui propri clienti, ed è a questo punto che il pendolo comincia a oscillare nella direzione del conflitto. Per le imprese della Net Economy, la relazione con le comunità virtuali è infatti in primo luogo un mezzo per arrivare a un fine, che consiste nel raccogliere il maggior numero possibile di informazioni sui singoli membri delle comunità e nel rielaborarle a fini commerciali. La maggioranza, se non la totalità, dei modelli di business sono fondati sulla capacità di raccogliere dati personali che consentano di costruire profili personalizzati dei singoli consumatori, nella speranza di realizzare quel modello ideale del marketing one to one che consentirebbe di ritagliare i prodotti sulle esigenze specifiche dei singoli individui. Ma è a questo punto che fini e mezzi entrano in conflitto: per “servire” il consumatore, dicono le imprese, dobbiamo sapere tutto su di lui, la rinuncia alla privacy è dunque il prezzo da pagare per chi voglia ottenere beni e servizi che rispondano effettivamente alle sue esigenze. E tuttavia il consumatore non è affatto interessato ad accettare questa relazione one to one con le imprese, ben sapendo che la sua identità, le sue competenze e le sue conoscenze non le ha costruite da solo, ma acquisite all’interno d’un network di relazioni con gli altri membri della comunità virtuale alla quale appartiene. E la comunità gli ha anche insegnato che, in quanto singolo, la sua relazione con le imprese è asimmetrica: per quanto Internet consenta al consumatore di acquisire più informazioni sulle imprese di quanto fosse possibile in passato, le imprese continuano a sapere molte più cose su di lui di quante lui ne sappia sulle imprese. Nella comunità, invece, circolano informazioni e conoscenze che consentono di cercare e trovare ciò che si desidera al miglior rapporto qualità/prezzo, e di emanciparsi così dalla tirannia del marchio. Infine la comunità offre ai propri membri l’opportunità di confrontare le proprie esperienze negative in merito di spamming, coockie, software di tracciamento, compravendita di dati personali, ecc., e di scambiare tecnologie per proteggersi da questi flagelli. In una parola, la comunità è il luogo in cui matura la sfiducia nei confronti dei “tradimenti” delle imprese. A usare questo termine è Manuel Castells(10), che definisce così la rottura della solidarietà culturale che aveva caratterizzato la fase aurorale della Net Economy, quando comunità virtuali e imprese formavano un fronte libertario che si opponeva ai tentativi di controllo governativo nei confronti della Rete. A preoccupare, al(10) Op. cit. 286 Da costo a risorsa - Attività produttive e protezione dei dati personali lora, non erano i dati che ci si scambiava reciprocamente per favorire lo sviluppo di tecnologie, reti di relazione e progetti, bensì il desiderio dei governi di riconquistare quelle fette di potere su cittadini e imprese che erano state loro tolte dall’avvento di Internet. Le imprese hanno rotto quel fronte libertario accettando di fornire ai governi gli strumenti per realizzare i loro programmi di sorveglianza. Ciò è avvenuto sostanzialmente per due motivi: 1) la necessità di strappare leggi più severe a tutela della proprietà intellettuale, minacciata dai fenomeni di napsterizzazione dei contenuti - e successivamente la necessità di violare la privacy di utenti e consumatori per identificare eventuali infrazioni alle leggi, 2) la volontà di ottenere mano libera su acquisizione, elaborazione e vendita di dati personali. Oggi stiamo tuttavia entrando in una terza fase, che si delinea a mano a mano che le imprese si rendono conto delle conseguenze del deficit di fiducia che esse stesse hanno prodotto, e che sempre più si ritorce contro di loro. Così la Direct Marketing Association, dopo avere osteggiato per anni ogni ipotesi di legge antispam, ha iniziato a premere sul Congresso americano perché vari un provvedimento contro le pratiche del marketing selvaggio; così Microsoft lancia la sua strategia Trustworthy Computing, per neutralizzare le diffidenze che le associazioni dei consumatori avevano espresso nei confronti del servizio Passaport; così Yahoo inserisce tool antispam nei suoi servizi di posta elettronica; così molte grandi imprese si dicono disposte ad adottare i principi del permission marketing,(11) e a inviare messaggi promozionali esclusivamente ai consumatori interessati a riceverli. A provocare simili “pentimenti” sono i dati relativi ai devastanti effetti collaterali delle politiche di marketing più aggressive e spregiudicate: un rapporto della Federal Trade Commission stima in 18 miliardi le perdite di fatturato nel 2001, provocate dalle transazioni interrotte dai consumatori, irritati dalla richiesta di fornire i propri dati personali; la rivista Wired rivela che il 31% dei navigatori americani cambia indirizzo e-mail almeno una volta all’anno per evitare l’invio di posta indesiderata, sottolineando come tale comportamento provochi gravi danni all’e-commerce, rendendo inutilizzabili data base faticosamente raccolti nel corso di anni; infine si diffonde rapidamente l’uso di tecnologie anticookie, software per mantenere l’anonimato durante la navigazione, filtri antispam, strumenti per effettuare pagamenti anonimi, ecc. Ma le nuove politiche che le imprese adottano per far fronte a questi problemi hanno un limite fondamentale: cercano cioè di riconquistare la fiducia dei consumatori a partire dai rapporti con i singoli individui, ignorandone le appartenenze comunitarie. Questo approccio rivela come non si sia ancora capito che campagne di immagine e promesse solenni non bastano a convincere i consumatori, i quali, dopo tante scottature, non sono disposti a verificare sulla propria pelle l’attendibilità di queste rassicurazioni. Detto altrimenti: la fiducia non è un bene che possa es(11) Cfr. S. Godin, Permission marketing. Trasformare gli estranei in amici e gli amici in clienti, Parole di Cotone, Milano 2000. Carlo Formenti - Infomediazione come strumento dei consumatori 287 sere “prodotto” o “venduto” dalle imprese. È un bene che si genera spontaneamente all’interno delle comunità, e di cui le imprese possono usufruire solo se accettano a loro volta di esporsi al giudizio delle comunità, e non solo a quello dei singoli consumatori. Arriviamo così al punto: esiste un incentivo economico in grado di favorire questo ulteriore passo? Il concetto di privacy come risorsa può diventare qualcosa di più di un semplice slogan propagandistico? Esiste un modello di business in grado di inserire la produzione di fiducia nella catena del valore? Alcuni teorici del marketing, come John Hagel III(12), rispondono positivamente lanciando l’idea degli infomediari. Il concetto di infomediario è iscritto nel tramonto dell’utopia dell’accesso universale e generalizzato allo scibile umano che l’ipertesto elettronico sarebbe in grado di garantire a tutti. Nel momento in cui trasforma in realtà il sogno di Ted Nelson(13), il World Wide Web ne dimostra il limite intrinseco: la mostruosa inflazione di dati che circolano nelle reti di computer rende difficile accedere a informazioni realmente significative. Motori di ricerca, portali tematici e gli altri filtri elaborati dal giornalismo on line (professione che diverge sempre più dal giornalismo tradizionale, come dimostra il fenomeno dei web log), rappresentano altrettanti modelli di infomediazione. John Hagel III sviluppa un ulteriore modello in relazione ai problemi dell’e-commerce; un modello che parte dalla critica ai teorici del mercato perfetto: non è vero che Internet ridimensiona il ruolo degli intermediari, dando ai venditori l’opportunità di raggiungere direttamente i compratori e viceversa. Anche la ricerca di informazioni commerciali, il confronto del rapporto qualità/prezzo fra prodotti diversi, la ricerca di dati sui gusti e sulle tendenze dei consumatori, la comunicazione pubblicitaria ecc. richiedono funzioni di intermediazione capaci di governare la spaventosa complessità del Web. Ecco perché, grazie alle comunità di consumatori che si sono aggregate attorno ai loro network, giganti della Net Economy come Amazon, Yahoo! ed eBay hanno potuto assumere il ruolo di “certificatori” dell’affidabilità di prodotti e servizi di altre imprese. Ed ecco perché, a mano a mano che gli interessi del marketing e dei consumatori divergono, si fa pressante la domanda di assistenza da parte di un consumatore consapevole di non essere in grado di negoziare con le imprese in quanto singolo A soddisfare tale domanda, sostiene John Hagel III, dovrebbero essere degli operatori di fiducia che tratterebbero al posto del consumatore. Il compito di questi “agenti dei consumatori” consisterebbe nel conoscere a fondo desideri, bisogni e preferenze dei propri clienti, oltre a tutta una serie di dati personali (dal reddito al profilo anagrafico), per poi mettere a confronto tali informazioni con quelle delle imprese che operano sul mercato. L’obiettivo di tutto ciò consiste nel creare una sorta di “mercato inverso”: non si parte dalle merci e dai prezzi fissati dalle imprese, (12) Cfr. J. Hagel III, Net Worth, Apogeo, Milano 2001. (13) Cfr. T. Nelson, Literary Machine, Muzzio, Padova 1992. 288 Da costo a risorsa - Attività produttive e protezione dei dati personali bensì dalle esigenze dei consumatori e dalle cifre che costoro sono disposti a spendere per soddisfarle. Per svolgere il proprio ruolo, l’infomediario dovrebbe potere “spiare” il cliente - ovviamente con il suo consenso e offrendogli l’assoluta garanzia che nessun altro verrà in possesso dei dati che lo riguardano – in modo da disegnarne un profilo il più accurato possibile. Inoltre dovrebbe fornirgli strumenti (software, formazione, consulenza, ecc.) utili per proteggerne la privacy. Riassumendo: se il consumatore desidera acquistare un determinato prodotto o servizio, l’infomediario esplora la rete al suo posto, 1) aiutandolo a spuntare il miglior prezzo possibile, 2) evitandogli di esporsi a qualsiasi richiesta di dati da parte del venditore. In poche parole l’infomediario non vende nulla, si limita a prestare un servizio ricompensato con una percentuale sul prezzo dei beni acquistati. Oppure potremmo dire che l’infomediario vende fiducia: ai consumatori, proteggendoli dalle violazioni di privacy cui li espone il contatto diretto coi venditori, e alle imprese, alle quali offre opportunità di vendita alle quali non avrebbero potuto accedere a causa della diffidenza dei consumatori. Una prima osservazione è che questo tipo di servizio viene già svolto, in forme diverse, da una serie di imprese: basti pensare ai servizi di infomediazione finanziaria offerti dalle banche, oppure alle agenzie di viaggio e ai club del libro. Ancora più significativo il caso eBay, un marchio che, di fatto, non “vende” altro che fiducia, nel senso che mette a disposizione dei suoi utenti un ambiente virtuale “protetto” in cui le transazioni (in questo caso le aste) si svolgono in sicurezza, dove compratori e venditori si sentono al riparo da truffe, raggiri, violazioni di privacy, ecc. Ma anche i grandi portali come aol, msn e yahoo! svolgono questa funzione di infomediari e garanti delle condizioni di sicurezza e privacy che accompagnano le transazioni online. Ma qui scatta la seconda osservazione: questi “luoghi” del mercato virtuale coincidono con quei crocevia della rete - gateway (porte) presidiate da gatekeeper (guardiani) - che Jeremy Rifkin(14) denuncia in quanto agenti della mercificazione delle relazioni umane: sia che restino “ibridi”, quali sono attualmente, sia che evolvano verso le forme di infomediazione “pura” vagheggiate da John Hagel III, queste imprese controllano modalità e condizioni di accesso degli utenti alla rete. Ma chi controlla i controllori? È vero che il consumatore isolato non è in grado di negoziare a causa della dissimmetria informativa che caratterizza il suo rapporto con le imprese, ma delegando la tutela della propria privacy a una terza parte, con cui si troverebbe a intrattenere una relazione non meno asimmetrica, non migliorerebbe la propria situazione. Torniamo dunque al punto di partenza: concepita esclusivamente come modello di business, la produzione di fiducia sembrerebbe restare un obiettivo impossibile. Arriviamo così al punto: gli interessi economici possono contribuire alla produzione di fiducia, ma non possono sostituire quei fattori politico(14) Op. cit. Carlo Formenti - Infomediazione come strumento dei consumatori 289 culturali che restano fondamentali per risolvere il problema. La tesi qui avanzata è che il concetto di infomediario risulta credibile solo nella misura in cui viene concepito come articolazione funzionale delle comunità virtuali. Di ciò è consapevole lo stesso John Hagel III: non solo perché indica le comunità virtuali fra i più probabili candidati ad assumere il ruolo di infomediario, ma anche perché prospetta la possibilità che gli infomediari finiscano per svolgere nei confronti dei consumatori il ruolo che i sindacati svolgono nei confronti dei lavoratori(15). Se milioni di consumatori fossero in grado di parlare con un’unica voce grazie agli infomediari, la loro capacità di influire sulle politiche aziendali e governative, diventerebbe formidabile, assai superiore a quella di cui dispongono le attuali associazioni dei consumatori. Queste potenti organizzazioni esprimerebbero la volontà collettiva dei consumatori mettendoli nelle condizioni di incalzare le aziende non solo sui temi della privacy, ma anche in materie come la sicurezza dei prodotti, il rispetto dell’ambiente, la protezione dei dati, i prezzi, gli standard di assistenza, il rispetto dei diritti civili nei paesi in via di sviluppo, ecc. Ovviamente, all’interno di organizzazioni del genere, la produzione di fiducia non rappresenterebbe più un problema. Una prima formula potrebbe essere quella di un sindacato impegnato anche in attività commerciali a scopo di autofinanziamento e di pressione negoziale nei confronti delle altre imprese. Un esempio del genere ci viene offerto da un fondo di pensione come il Calpers (California Public Employees’ Retirement System), sostenuto dai sindacati e dal Partito Democratico, che opera come una potente lobby in grado di premere su provvedimenti legislativi e politiche aziendali, mentre qualcosa di analogo potrebbe diventare, qualora decidesse di estendere le proprie attività al settore della Net Economy e di tutelare i propri associati anche sul terreno della privacy, l’italiana Lega delle Cooperative. Un altro esempio concreto è quello incarnato dalla comunità di utenti e sviluppatori del software open source, al cui interno si sono sviluppate le competenze che hanno favorito la nascita di imprese (come Red Hat, SuSe, Caldera, ecc.) che operano nel campo del software, dove gli utenti possono confrontare la qualità dei vari prodotti attraverso un ampio network di siti, newsgroup, mailing list e web log, dove chi ne è in grado può contribuire a modificare i prodotti e a migliorarne la qualità e dove, infine, viene dedicata un’attenzione ossessiva alle tecnologie e alle conoscenze necessarie a tutelare la privacy, a difendere la libertà di parola in rete, ecc. Una terza formula possibile è quella di un’impresa commerciale capace di “cooptare” al proprio interno una comunità di utenti cui delegare la soluzione del problema della fiducia. È il caso di eBay, il celebre sito di aste che non ha bisogno di “garantire” la sicurezza del proprio spazio di vendita perché è la comunità dei suoi utenti a certificare l’attendibilità dei singoli operatori attra(15) Cfr. J. Hagel III, op. cit. 290 Da costo a risorsa - Attività produttive e protezione dei dati personali verso un sistema di rating autogestito. Per concludere riassumiamo le tesi fin qui avanzate. 1) L’individualizzazione dei rapporti sociali che si accompagna allo sviluppo della comunicazione a rete non provoca la sparizione delle forme di aggregazione intermedie, né la disintermediazione dei rapporti economici, ma opera piuttosto come motore di un nuovo modello di socialità, nel quale l’individuo è al centro di reti di relazioni fondate sulle affinità di interessi, bisogni, passioni, ecc. che danno vita a comunità virtuali, le quali sono a loro volta destinate ad avere un peso decisivo nel determinare il successo o il fallimento di qualsiasi modello di business (per dirla altrimenti: Internet cambia l’economia più di quanto l’economia cambi Internet). 2) Nel rapporto fra Network Society e Net Economy (cioè fra comunità e imprese) ci sono state due fasi: nella prima è prevalsa la collaborazione, fondata sullo scambio reciproco di conoscenze e informazioni, nella seconda le imprese hanno “tradito” l’alleanza con le comunità, concentrando le proprie energie sulla raccolta, elaborazione e compravendita dei dati personali dei singoli utenti-consumatori. Questo tradimento ha generato nei consumatori una sfiducia che, assieme ad altri fattori, ha contribuito a mettere in crisi la Net Economy. 3) A mano a mano che le imprese hanno compreso che il deficit di fiducia si ritorce contro i loro interessi, si sono create le condizioni per una terza fase: così oggi le imprese cambiano politica, cercando di inserire la produzione di fiducia nella catena del valore; ma quando viene fatto privilegiano le relazioni con il singolo consumatore, mentre si sottovaluta il ruolo delle comunità come luogo in cui possono maturare relazioni più positive fra imprese e consumatori. 4) Per affrontare il problema c’è chi propone un nuovo modello di business, quello dell’infomediario, che avrebbe il compito di gestire la relazione fra consumatori e imprese, tutelando le esigenze di privacy dei primi e permettendo alle seconde di ridurre i costi della sfiducia. 5) Pur rappresentando un buon passo in avanti sul piano concettuale, questa ipotesi ha il limite di restare ancorata alla relazione fra impresa e singolo consumatore, e per superare tale limite occorrerebbe concepire l’infomediario non solo come modello di business, ma anche come una nuova forma di aggregazione sociale, come una comunità che avrebbe, fra i suoi tanti compiti, anche quello di tutelare la privacy dei propri membri. In questo modo, la fiducia entrerebbe nella catena del valore della Net Economy “di riflesso”, nel senso che verrebbe prodotta in altri contesti socioculturali per poi venire “esportata” nel contesto economico. Resta da aggiungere che gli scenari appena descritti possono assumere credibilità solo se sostenuti da adeguate politiche governative. Il che può avvenire in forme diverse: nel contesto europeo, è più facile immaginare un quadro in cui i protocolli negoziali fra imprese e infomediari assumano valore di leggi o regolamenti pubblici (riproponendo il metodo della triangolazione fra imprese, sindacati dei lavora- Carlo Formenti - Infomediazione come strumento dei consumatori 291 tori e governi); nel contesto americano è più realistico pensare a una situazione in cui le imprese finiscano per adottare regole di condotta mutuate dall’esperienza degli infomediari, magari elaborando dei codici deontologici. Entrambe le vie, tuttavia, possono funzionare solo in un contesto politico-culturale che inquadri il diritto alla privacy nei diritti fondamentali del cittadino, contesto che, purtroppo, non può essere dato per acquisito, né tanto meno per scontato. 292 Da costo a risorsa - Attività produttive e protezione dei dati personali Infomediation as a Consumer Tool Carlo Formenti (1) In the theoretical models describing the evolution of social relations in the age of Internet, the scenario changes depending on whether the stress is placed prevailingly on economic, political or cultural factors. But sociological literature agrees on one point: communication on the net fosters the detection of social relations at every level, from the family to labour, to politics. Manuel Castells(2) talks of “denationalisation of sociality”, or “individualism on the net”, referring to the crisis – that the new technologies have not caused but surely expedited – affecting the patriarchal family, the traditional forms of political and trade union representation, associationism based on membership in local communities, professional classes, etc. Thus, a trend that has long been evident in the first phases of the modernisation process seems to be re-emerging. Just think of the dissolution of the traditional forms of the family and the local community concurrently with the formation process of the capitalist market in an 17th and 18th century England. A first wave in the direction of the disruption-atomisation of social relations, accompanied by the legislative policies of the newly born state-nation, was however followed by a long stage marked by a countertendency: to counter the devastating effects of primitive accumulation on the life conditions of the population, the state started the long march of institutionalising the capitalist market that was to last half a century and end with the birth of the Welfare(3). It was at that time that the institutional forms of modern democracy ripened and that those intermediate bodies – political parties, trade unions, professional associations, representative bodies, etc. – were born, and redesigned the membership modalities and rules after the collapse of the traditional communities. But the economic deregulation processes in the ‘80’s and the subsequent take off of the New Economy(4) gave new momentum to the process of atomisation: as had occurred in traditional communities, the modern forms of social aggregation in turn reached a crisis, leaving the individual to face the impersonal powers of a growingly “globalised” technology and market. The neo-liberalist theory interprets such evolution as the achievement of the “perfect market” utopia, developed more than two centuries ago by Adam Smith: (1) Journalist - Italy (2) See Manuel Castells, (The rise of the Network Society) La Nascita della società in rete, Università Bocconi Editore, Milan 2002. See also Galassia Internet, Feltrinelli, Milano 2002 (3) See K. Polnyi, “La grande trasformazione. Le origini economiche e politiche della nostra epoca, Einaudi, Torino 1974. (4) In respect of the relation between deregulation and take off of the New Economy, see K. Ohmae, Il continente invisibile, Fazi, Roma 2001. C a r l o F o r m e n t i - I n f o m e d i a t i o n a s a C o n s u m e r To o l 293 the advent of Internet has placed sellers and purchasers on the same level, in a “transparent” exchange in which both contracting parties have access to the same information. At the same time state-nations and intermediate bodies have lost ground vis à vis a “sovereign individual”(5) who can now offer his expertise, sell and buy goods and services, choose partners and allies outside any political, tax and ideological control. But this pattern, which has contributed to nurture the myth of a progressive and irreversible “disintermediation” of economic relations (everyone exchanges everything with everyone, without having to resort to intermediaries), cannot adequately describe the complex reality of Network Society. In particular, the “economicist” approach underestimates the scope and consistency of this new type of community links that computer nets have enabled to develop. Individualism on the net, so says Castells(6) – on the wake of Rheingold(7) and other authors – cannot be cut down to a collection of isolated individuals, but is a new type of social model, a system of social relations “focused” on the individual. The individuals select their relations on the basis of their affinities and build nets of personal links that can ensure sociality, support, information, sense of belonging and social identity. Although different both from those of traditional communities and those of modern social relations, these new relations are not by far “weak”: their independence from territorial restraints and the fact of placing one’s roots in a cultural humus made of elective affinities, makes them, rather, more solid and lasting. Relations between Network Society and New Economy, in fact, change in relation to the adopted point of view: in the neo-liberalist theory, the scenario is based on two basic entities, the individual on the one hand and the global market based on net technologies on the other, while all the political, social and cultural “filters” interposing between such entities tend to disappear (we could say that the market embodies the net, considering it as a tool that can accomplish the perfect market utopia). From a “cultural” point of view, Internet, or rather social relations based on the net, on the contrary affects the market much more than the market affects Internet, and this is because the filters between an individual and the market, instead of disappearing, have multiplied, taking the form of those virtual communities which constitute the ground where the success or failure of any kind of business is decided. The second theory appears to be more credible if we consider that when capitalism launches off to conquer Internet, it will have long abandoned the Ford pattern, based on the mass production of goods and services for an undifferentiated public. The fordist process, the shifting of emphasis from production to consumption, the attention for niche markets, etc. change the culture and organisation of (5) See J.D.Davidson, W. Rees-Mogg. The Sovereign Individual, Simon & Simon, New York 1997. (6) See op.cit. (7) See H. Rheingold, Comunità virtuali. Parlare, incontrarsi, vivere nel cyberspazio, Sperling & Kupfer, Milano 1994. 294 Da costo a risorsa - Attività produttive e protezione dei dati personali corporations, inducing them to focus their energies on controlling the consumer rather than the worker. But to control a consumer does not only mean selling him something, it also and especially means establishing a lasting relation, making him loyal and involving him in the development of goods and services. And when virtual communities are born this “philosophy” is obliged to make a further quality step, standing up to a challenge at the same time rich in opportunities and risks. The latter stem from the fact that the aggregation logics of virtual communities – with the exception of cases in which they are born on initiative of the corporations themselves, as communities of experts or fans of a given product – turn out to be completely independent from the market logics (with which they are often in conflict). There is a long list of examples of this: from the adverse word-of-mouth on the quality of a service to the birth of free exchange circuits of products capable of jeopardising whole industrial sectors (see the case of Napster); without forgetting the expedited flow of information which enables to explore a wide range of alternatives, intensifying competition, lowering prices and weakening relations between customers and a company based on trade mark. At the same time, virtual communities represent a precious source of information on the tastes and preferences of consumers, and to the extent to which one obtains their trust, the nature itself of relations between client and corporation can be transformed from a simple economic transaction to a human relation which enters, as such, in the chain of value. This is true to such an extent that authors like Jeremy Rifkin(8) have warned us on the risk of commodifying human relations, while it is always on this ground that the major challenges concerning the privacy problem arise. This paradoxical entwine of alliances and conflicts between corporations and consumers has crossed two stages in its development. At the dawn of Net Economy, the convergence of interests prevailed: on the one hand, for the corporations the virtual communities represented an extraordinary source of ideas, projects and suggestions, contributed to testing and improving products and services, acted as amplifiers and diffusion channels of information and news concerning goods and corporation trade marks; on the other, corporations in turn offered the communities news and useful information, made available – often free of charge – their know how and expertise on the object of interest around which a community had formed, etc. This is the stage which nurtured the theory on the development of an economy of know how in which “everyone wins”, because all the parties in cause have something to gain in the mutual exchange of information(9). It is the stage in which virtual communities often work as real incubators for the start-ups. The second stage, instead, developed when the number of Net Economy corporations start(8) See j. Rifkin.L’era dell’accesso. La rivoluzione della New Economy, Mondatori, Milano 2000. (9) See K. Kelly, Nuove regole per un mondo nuovo, Ponte alle Grazie, Milano 1999. C a r l o F o r m e n t i - I n f o m e d i a t i o n a s a C o n s u m e r To o l 295 ed dropping and their size started increasing – an expedited selection and concentration process of the still on going economic crisis. And while some trade marks were consolidated and succeeded in building real “niche monopolies”, and while the colossals of the traditional economy made their entry in the e-business market, the successful corporations managed to concentrate in their hands huge data base of information on their customers, and it is at this point that the pendulum started to swing in the direction of conflict. For Net Economy corporations, their relations with the virtual communities is in fact in the first place a means for reaching a goal, which consists in collecting as much information as possible on the individual members of the communities, and in reprocessing it for marketing purposes. The majority, if not the totality, of business patterns are based on the capacity of collecting personal data and developing personalised profiles on single consumers, hoping to accomplish the ideal marketing, one-to-one pattern, that would enable to mould products on the specific needs of single individuals. But it is at this point that the means and ends enter in conflict: in order to “serve” consumers, so the corporations say, we have to know everything on them, the waiver of their privacy is thus the price consumers have to pay to get goods and services that actually meet their needs. However, consumers are not interested at all in accepting this one to one relation with corporations, well aware that their identity, skills and know how were not built all alone, but acquired inside a network of relations with other members of the virtual community where they belongs. And the community has also taught them that, in as much as individuals, their relations with corporations are asymmetrical: even if Internet enables consumers to acquire more information on corporations than it was possible in the past, corporations continue to know many more things on consumers than consumers know on corporations. In a community, instead, information and know how circulates to enable members to look for and find what they want at the best quality/price ratio, and to free themselves form the tyranny of the trade mark. Lastly, the community offers its members the chance of comparing their adverse experience on spamming, cookie, tracing software, personal data sale, etc, and to exchange technologies to protect themselves from these plagues. In one word, the community is the place where the mistrust in corporation “betrayals” flourishes. It is Manuel Castells(10) who uses this word. This is how he defines the breach in cultural solidarity featuring the dawn of Net Economy, when virtual communities and corporations formed a libertarian front to counter governmental efforts to control the Net. What worried at the time was not the data mutually exchanged to favour the development of technologies, nets of relations and projects, but the governments’ intent to win back the share of power over citizens and corporations (10) Op.cit. 296 Da costo a risorsa - Attività produttive e protezione dei dati personali which they had lost with the advent of Internet. Corporations breached the libertarian front accepting to provide governments the means to accomplish their supervision plans. This basically occurred for two reasons: 1) the need to reap stricter laws protecting intellectual property, jeopardised by content napsterisation phenomena – and subsequently the need to breach the privacy of users and consumers to identify possible breaches of law, 2) the intent of obtaining free hand on personal data acquisition, processing and sale. However, today we are entering a third phase, which is taking shape in so much as the corporations are realising the consequences of the lack of trust that they themselves brought about, and that is growingly turning against them. So the Direct Marketing Association, after having opposed any kind of antispam law for years, started to urge the US Congress to launch a law against wild marketing practises; so Microsoft has launched its Trustworthy Computing policy to neutralise the diffidence that consumer associations had expressed vis à vis the Passport Service; so Yahoo has included an antispam tool in its services of electronic post; so many major corporations say they are willing to adopt the permission marketing principles(11), and send promotional messages exclusively to consumers interested in receiving them. It is the data concerning the devastating side effects of the more aggressive and unscrupulous marketing policies that have caused such “feelings of repentance”: a report of the Federal Trade Commission estimates business losses in 2001 at 18 billions, caused by transactions interrupted by consumers, irritated by the request of providing their personal data; the magazine Wired reveals that 31% of American surfers change e-mail address at least once a year to avoid receiving undesired post, and notes how such conduct causes serious damage to e-commerce, making data base collected with great effort during the years unusable; lastly, anticookie technology is rapidly spreading: software to remain unnamed during surfing, antispam filters, tools to make anonymous payments, etc. The new policies adopted by corporations to tackle these problems have a fundamental limit: they try to win back consumers’ trust by establishing relations with single individuals, and ignoring the communities where they belong. This approach shows how they have not yet grasped that image campaigns and solemn promises are not enough to convince consumers, whom, after having been burned so many times, are not willing try on their skin the reliability of these reassurances. In other terms, trust is not an asset that can be “produced” or “sold” by corporations. It is an asset generated spontaneously within the communities, and which can be used by corporations only if they in turn accept to expose themselves to the opinion of the communities, and not only to that of individual consumers. Let’s get to the point then: is there an economic incentive which can favour this further step? Can (11) See S. Godin, Permission marketing, Trasformare gli estranei in amici e gli amici in clienti, Parole di Cotone, Milano 2000. C a r l o F o r m e n t i - I n f o m e d i a t i o n a s a C o n s u m e r To o l 297 the concept of privacy as a resource become something more than a simple propaganda slogan? Is there a business model that can include the production of trust in the chain of value? Some marketing scholars, like John Hagel III(12), answer affirmatively and launch the idea of infomediary. The concept of infomediary has been written in the wane of the utopia of a universal and generalised access to human knowledge ensured to all by an electronic hyper text. When Ted Nelson’s(13) dream is turned into reality by the World Wide Web, its intrinsic limit becomes evident: the terrific inflation of data flowing in computer nets makes it difficult to access really significant information. Search engines, theme portals and the other filters developed by online journalism (a profession which growingly diverges from traditional journalism, as the web log phenomenon shows), represent just as many other models of infomediary. John Hagel III has developed a further model in relation to e-commerce problems; a model which starts from the criticism of the scholars supporting the theory of a perfect market; it is not true that Internet cuts down the role of intermediary, giving the sellers the chance of directly reaching the purchasers and vice versa. Even the search for commercial information, the comparison of quality/price between different products, the search for data on consumer tastes and trends, advertising communication, etc. call for intermediation functions capable of ruling the tremendous complexity of the Web. That is why, thanks to consumer communities which have arisen around their networks, giants of the Net Economy like Amazon, Yahoo! and eBay have succeeded in taking on the role of “certifiers” of the trustworthiness of products and services of other corporations. And that is why, an increase in the gap between marketing and consumer interests goes hand in hand with an increase in the request for assistance on behalf of a consumer aware of not being able to negotiate with corporations in as much as an individual. John Hagel III, says that trusted agents should be the ones to meet such demand, and do the business instead of the consumer. These “consumer agents” should have the task of thoroughly knowing the wishes, needs and preferences of their customers, as well as a whole number of personal data (from income to personal details), and then compare this information with the information provided by corporations operating on the market. The objective of all this consists in creating a kind of “inverse market”: you do not start from the goods and prices fixed by the corporations, bur rather from the needs of consumers and the amount they are willing to spend to satisfy them. In order to play his role, an infomediary should be able to spy his client – obviously with his consent, and assuring him that no one else will get hold of his data – so as to sketch out a profile as accurate as possible. Furthermore, he should provide his (12) See J. Hagel III, Net Worth, Apogeo, Milano 2001. (13) See. T. Nelson, Literary Machine, Muzzio, Padova 1992. 298 Da costo a risorsa - Attività produttive e protezione dei dati personali client useful tools (software, training, advice, etc.) to protect his privacy. To sum up, if a consumer wishes to buy a given product or service, an infomediary explores the net in his stead, 1) helping him get the best possible price, and 2) avoiding him being exposed to the seller’s request for data. In short, an infomediary does not sell anything, he just provides a service remunerated with a percentage on the price of the purchased goods. Or we could say that an infomediary sells trust: to consumers, protecting them from a breach of privacy they would get if they got in contact with the sellers, and to corporations, the chance of selling goods, which they would not have otherwise sold because of the consumers’ diffidence. My first comment is that this type of service has already been provided, in different forms, by a number of corporations: just think of the financial infomediation services provided by the banks, or the travel agencies and the book clubs. Even more significant is the case of eBay, a trade mark that, de facto, sells nothing else but “trust”, in the sense that it puts a “protected” virtual milieu at the disposal of its users, where transactions (in this case, the auctions) are carried out without risks, where the purchasers and the sellers feel protected from frauds, swindles, privacy breaches, etc. . The major portals too, such as AOL, MSM and Yahoo! perform the task of infomediary and assure the security and privacy conditions accompanying online transactions. But here comes my second comment: these “places” of the virtual market coincide with those gateways presided by gatekeepers that Jeremy Rifkin(14) claims to be the agents commodifying human relations: both if they stay the “hybrids” that they are now, and if they develop into the forms of “pure” infomediary suggested by John Hagel III, these corporations control the access modalities and conditions of the Net users. But who controls the controllers? Surely an isolated consumer cannot negotiate due to the information asymmetry featuring his relation with corporations, but by delegating the protection of his privacy to a third party, with which he would have a just as asymmetrical relation, he would not improve his position. Then, let’s go back to square one: exclusively conceived as a business model, the production of trust would seem to be an impossible objective. Let’s get to the point then: economic interests may contribute to producing trust, but cannot replace those political-cultural factors which are still essential to solving the problem. The theory set forth here is that the concept of infomediary is credible only to the extent in which it is conceived as a functional articulation of virtual communities. This is what John Hagel III is aware of himself: not only because he indicates the virtual communities as the more probable candidates for taking on the role of infomediary, but also because he suggests the possibility for infomediaries to end up performing the role vis à vis consumers that trade unions carry out vis à vis work(14) Op.cit. C a r l o F o r m e n t i - I n f o m e d i a t i o n a s a C o n s u m e r To o l 299 ers(15). If millions of consumers could talk with one voice thanks to infomediaries, their capacity to affect corporate and government policies would become terrific, far greater than that of existing consumer associations. These powerful organisations would express the collective will of consumers, putting them in the condition of harassing corporations not only in matters of privacy, but also in respect of the safety of products, environmental and data protection, prices, assistance standards, compliance with civil rights in developing countries, etc. Obviously, the production of trust would no longer be a problem within organisations of this kind. The first solution could be that of a trade union engaged also in trade activities with a view to self-financing and putting pressure on negotiations with other corporations. An example of the kind comes from a pension fund like Calpers (California Public Employees’ Retirement System), supported by trade unions and the Democratic Party, which operates as a powerful lobby that can put pressure on legislative provisions and corporate policies. The Italian Lega delle Cooperative could become something similar, if it decided to extend its activities to the Net Economy field. Another concrete example is that embodied by the community of the opensource software users and developers, which has developed the expertise that has fostered the birth of corporations (such as Red Hat, SuSe, Caldera, etc.) operating in the software field, where users can compare the quality of various products through a wide network of sites, newsgroups, mailing list and web log, where whoever is capable of doing so, can contribute to changing the products and improving their quality, and where, lastly, obsessive attention is dedicated to technologies and know how required to protect privacy, defend the freedom of speech on the net, etc.. A third possible solution is that of a trade company capable of “co-opting” within itself a community of users responsible for solving the problem of trust. It is the case of eBay, the popular auction site which does not have to “guarantee” the safety of its selling space because it is the community of its users that certifies the reliability of individual agents through a self-managed rating system. To conclude, let’s summarise the theories set forth so far. 1) The depletion of the social relations accompanying the development of net communication does not bring about the disappearance of the forms of intermediate aggregation, nor the disintermediation of economic relations, but rather operates as the engine of a new sociality pattern, where the individual is at the centre of a network of relations based on affinities of interests, needs, passions, etc. that give life to virtual communities, which are in turn going to have a decisive weight in determining the success or failure of any business pattern (or in other words: Internet changes the economy far more than the economy changes Internet). 2) In the relation between Network Society and Net Economy (i.e. between communities and corporations) there have (15) See J. Hagel III, mentioned work. 300 Da costo a risorsa - Attività produttive e protezione dei dati personali been two phases: in the first phase, a co-operation based on the mutual exchange of know how and information prevailed; in the second, corporations have “betrayed” the alliance with the communities, focusing their energies on the collection, processing and sale of personal data of individual users-consumers. This betrayal generated in consumers a lack of trust that, together with other factors, contributed to disconcerting the Net Economy. 3) The corporations’ growing awareness that the lack of trust was turning against their interests has paved the way for a third phase: today the corporations have changed their policies, and are trying to comprise the production of trust in the chain of value; but this is done by giving priority to their relations with individual consumers, and they underestimate the role of communities as a place where more constructive relations between corporations and consumers can develop. 4) A new business pattern has been suggested to solve the problem: the infomediary, responsible for handling relations between consumers and corporations, protecting the privacy needs of consumers and allowing corporations to reduce the costs of the lack of trust. 5) Although this, in theory, is a good step forward, in practise, it has the limit of remaining anchored to relations between corporations and individual consumers. To overcome such a limit, an infomediary should be conceived not only as a business pattern but also as a new form of social aggregation, as a community having the task, among others, of protecting the privacy of its members. By so doing, trust would enter the chain of value of Net Economy “as a consequence”, that is, it would be produced in other socio-cultural milieus and then “exported” to the economic milieu. I would only like to add that the aforesaid scenario can only be credible if supported by adequate government policies. And this can take place in different forms: in the European context, it is easier to picture a framework where protocols between corporations and infomediaries take on the value of laws or public regulations (reproposing the method of the triangle between corporations, trade unions of workers and governments); within the American context, it is more realistic to think of a situation in which the corporations end up adopting rules of conduct reaped from the experience of the infomediaries, perhaps by developing deontological codes. Both ways, however, may work only in a political-cultural context embodying the right to privacy in the fundamental right of citizens. A context that, unfortunately, cannot be taken for acquired, or even for granted. C a r l o F o r m e n t i - I n f o m e d i a t i o n a s a C o n s u m e r To o l 301 Building Consumer Trust: Personal Data Protection as a Resource Mel Peterson (1) Abstract Procter & Gamble has recognized the business opportunity presented by providing personalized services and information to its consumers. The majority of consumers want personalization. Effective personalization depends on consumers to provide accurate information about themselves and their interests. But study after study has shown consumers to be concerned about their privacy, and that their concerns either prevent them from providing information or cause them to provide inaccurate information. To address this issue, Procter & Gamble has implemented a strong, global data protection program targeted to build an environment of trust, so that consumers willingly provide accurate information in return for the personalization and services they desire. Procter & Gamble’s privacy program covers personal information provided by any individual to P&G, whether it is from online, offline, or wireless sources. P&G policy is to treat information provided by an individual as that individual’s, which has been entrusted to P&G’s care. This simple policy leads us to do things that consumers care about with regard to data protection. P&G research confirms that consumers appreciate their data being managed according to Fair Information Practices of notice, choice, access, and security. Viewing information as a borrowed item naturally leads an organization to, for example, implement transparent notices, and provide choices about how information may and may not be used. Procter & Gamble has organized internally to deploy its privacy program throughout the organization. The P&G Privacy Executive reports to the ViceChairman of the Board, and leads the P&G Privacy Council, a team of 30 individuals appointed to lead privacy deployment in their organization. The company has created a “Privacy Central” web site containing all the company’s privacy guidelines and resources. Online privacy training has been deployed to all employees with a computer account, and privacy self-assessments are deployed periodically to all people who manage databases containing personally identifiable information. As a result of these activities, P&G has experienced very high participation in its online and offline direct marketing programs. The majority of people signing up for our programs give us permission to contact them with additional offers from other P&G brands – an indication they trust P&G. (1) Procter & Gamble Company – Usa 302 Da costo a risorsa - Attività produttive e protezione dei dati personali In summary, viewing privacy as a consumer issue, not just a regulatory or compliance issue, is paying dividends to Procter & Gamble and to our consumers. M e l P e t e r s o n - B u i l d i n g C o n s u m e r Tr u s t : P e r s o n a l D a t a P r o t e c t i o n a s a R e s o u r c e 303 304 Da costo a risorsa - Attività produttive e protezione dei dati personali M e l P e t e r s o n - B u i l d i n g C o n s u m e r Tr u s t : P e r s o n a l D a t a P r o t e c t i o n a s a R e s o u r c e 305 306 Da costo a risorsa - Attività produttive e protezione dei dati personali M e l P e t e r s o n - B u i l d i n g C o n s u m e r Tr u s t : P e r s o n a l D a t a P r o t e c t i o n a s a R e s o u r c e 307 308 Da costo a risorsa - Attività produttive e protezione dei dati personali M e l P e t e r s o n - B u i l d i n g C o n s u m e r Tr u s t : P e r s o n a l D a t a P r o t e c t i o n a s a R e s o u r c e 309 310 Da costo a risorsa - Attività produttive e protezione dei dati personali La Rete: fiducia degli utenti e sicurezza dei dati Claudio Manganelli(1) La diffusione dell’utilizzo della rete presenta ormai coefficienti di crescita esponenziali e, malgrado le molte delusioni imprenditoriali al di là e al di qua degli oceani, l’uso della rete é divenuto un must non più esclusivo del mondo imprenditoriale e della socialità tra individui, ma anche una necessità gestionale e di colloquio delle Pubbliche Amministrazioni tra loro, con le imprese, con i cittadini. L’ istituzione del Ministero per l’innovazione tecnologica ed il piano di finanziamento di oltre 130 progetti di e-governement approvati dal Ministero lo scorso mese di Ottobre e destinati a far crescere il livello di efficienza degli enti locali, dalle Regioni, alle Province, ai Comuni grandi, medi e piccoli, sino alle Comunità montane, confermano l’ormai inarrestabile impegno delle Pubbliche Amministrazioni nella improcrastinabile razionalizzazione dei processi amministrativi e nella volontà di avviare un dialogo più snello ed efficace con i cittadini. Al di là del corpo di norme predisposte in questi ultimi anni e facilitanti questo processo di ammodernamento, hanno da qualche tempo visto la luce alcune tessere fondamentali per la realizzazione di questa nuova architettura: il documento ed il protocollo elettronico, la firma digitale, la carta nazionale dei servizi; ora questi elementi vanno diffusi, resi usuali nella vita degli uffici pubblici, delle imprese, dei cittadini. Le potenzialità del sistema Ict sono ormai pronte ad assorbire l’esplosione dell’innovazione tecnologica. Un miliardo e forse molti di più p.c. nel mondo, 27 milioni di siti registrati, più di 2 miliardi di pagine registrate nel più usato motore di ricerca, 30 miliardi di e-mail giornaliere nel mondo e delle quali si stima un raddoppio nei prossimi quattro anni, questi i numeri sul piano planetario; la situazione italiana sta recuperando il divario di qualche anno fa: 14 milioni di utenti connessi ad internet, 60 miliardi di minuti di traffico telefonico dedicato alla rete, 64 miliardi di minuti per la fonia. Anche in Italia, il sorpasso é vicino. Questi dati sono stati forniti alcune sere fa dal Ministro Gasparri nel corso di un convegno e sono relativi al 2001. Essi sono la testimonianza che anche in Italia è in corso una marcia decisa verso la nuova economia, ove l’innovazione tecnologica é il necessario mezzo di trasporto. Ma nuova economia ed innovazione tecnologica, per poter procedere in modo armonico senza correre il rischio di provocare sacche di isolamento produttivo o eccessi di spesa, non possono prescindere da un processo di forte innovazione sociale. Ciò significa non solo introdurre intensi e convinti piani di formazione alle tecno(1) Autorità per l’informatica nella pubblica amministrazione - Italia Claudio Manganelli - La Rete: fiducia degli utenti e sicurezza dei dati 311 logie dell’informazione nel sistema scolastico, ma anche ricercare le migliori soluzioni organizzative e tecnologiche per avvicinare dette tecnologie alle classi meno giovani e meno colte; come si usa dire colmare quindi il digital divide. Operare in questo campo in modo disinvolto può aprire il varco ad un succedersi di fenomeni indesiderati e azioni criminose che finirebbero per provocare un rifiuto sociale del cambiamento tecnologico creando una barriera psicologica che potrebbe arrestare indefinitivamente la curva di sviluppo della nuova economia. Nel prefigurare uno scenario in cui multimedialità e tecnologia digitale diverranno sempre più pervasive, - basti pensare che la nuova generazione di Protocollo Internet Ipv6 consentirà di passare da un indirizzamento a 32 bit ad uno a 128 bit corrispondenti più o meno a 1500 indirizzi per metro quadro della superficie terrestre – si può comprendere come assumerà particolare rilevanza la protezione delle informazioni detenute dai singoli, siano esse le informazioni dei propri conti bancari, piuttosto che i valori del proprio stato di salute, piuttosto che il posizionamento della propria auto o del palinsesto home theatre che ciascuno si autoprogramma quotidianamente. Un utilizzo approssimativo della tecnologia Ict, fortemente orientato al consumo, come sta avvenendo con quelle di telefonia mobile, esporrà sempre più l’individuo in una sorta di Panopticon elettronico ove torre di sorveglianza e mezzo di intrusione nella sua vita sarà il fascio di comunicazioni interattive che lo raggiungeranno attraverso i diversi media. Ma rimaniamo nello scenario attuale in cui la Rete sta divenendo sempre più il sistema di scambio di informazioni, di accesso alle grandi banche dati, di esecuzione di transazioni e disposizioni finanziarie, di sviluppo di attività professionali e focalizziamone la sua attuale fragilità. Oltre 170.000 incidenti Web ufficialmente registrati dal Cert, dal 1988 ad oggi; più di 8.000 vulnerabilità da software negli ultimi otto anni (Cert), 5.580 attacchi di Hackers subiti nello scorso Agosto, di cui oltre 1.100 sferrati la domenica 18; va sottolineato che un incidente può interessare una semplice stazione p.c. ma può anche coinvolgere una Intranet e quindi provocare lunghe interruzioni di operatività. Ma a fianco di eventi distruttivi motivati da vandalismo, azioni di ciberterrorismo, puro esibizionismo cibernetico, si verificano moltissimi attacchi rivolti a carpire informazioni, per scopi di concorrenza commerciale piuttosto che per attuare frodi informatiche. Poi non vanno dimenticate le troppo abusate forme di attacco alle stazioni digitali; con questo termine voglio comprendere non solo i p.c. ma anche i palm e i cellulari di ultima generazione che consentono di interfacciarsi ad Internet; forme di attacco che sono entrate nella consuetudine dei service e degli application providers, abituali in tutto il mondo dei Web, finalizzate principalmente a carpire informazioni commerciali relative alle abitudini di vita del cibernauta, tramite strumentazioni quali cookies, 312 Da costo a risorsa - Attività produttive e protezione dei dati personali sniffing, tracking, hijacking, sino a raggiungere intollerabili azioni invasive delle caselle di posta elettronica con lo spamming; questi spyware appesantiscono il traffico in entrata e in uscita dai terminali nel corso di una connessione, catturando fiumi di bytes dagli hard disk e profilano l’utente per poi sottoporlo ad un bombardamento di banners ed e-mails promozionali. In particolare, negli Usa, lo spamming é diventato una piaga sociale: consultando il sito www.cluelessmailers.org/spamnews.html si può avere un’idea della fitta trama di interconnessioni che é stata tesa per commercializzare e dare valore alle informazioni che vengono pescate all’interno della rete; gli analisti statunitensi della rete stimano, in base alla crescita del traffico junkmail degli ultimi due anni, che nel 2004 il 25% del traffico sulla rete sarà di tipo non sollecitato. Cosa si aspetta allora il futuro cibercittadino? Innanzi tutto di poter dialogare con siti Web dove vi sia un elevato grado di affidabilità assicurato da una chiara identificazione del Titolare; dove il trattamento dei dati personali e la gestione delle transazioni siano fatte con correttezza e sicurezza secondo i dettami delle direttive europee e della normativa sulla protezione dei dati personali; dove tutto il ciclo del trattamento sia effettuato con etica e responsabilità; dove sia chiaramente espresso un indirizzo di accesso per richiedere controlli ed azioni correttive; dove sia possibile rivolgere reclami. È quindi tempo di operare in modo costruttivo e rapido per consentire alla new economy e allo e-governement di avere successo: se si scorrono le pagine dei giornali sono frequenti gli articoli che denunziano casi di abuso della rete ed in particolare a questo medium sono troppo spesso attribuite le colpe del crimine pedofilo. Certamente Internet é stato uno stravolgimento del modo di vivere delle società civili e attraverso di esso, con una errata sensazione di anonimato e di inviolabilità, si sono riversate attenzioni e passioni degli strati sociali più istruiti o più giovani: quando queste attenzioni provengono dai sentimenti più inconfessabili dell’animo umano ne può scaturire una miscela esplosiva che provoca ingenti danni alla società civile. Io stesso, quando mi assuefeci a questo strumento cogliendovi tutto il sapore della libertà spazio temporale, mi sentii far parte dell’allegra brigata della foresta di Sherwood, lontano dal Grande Fratello e dagli uomini dello sceriffo di Nottingham, poi il mio quadriennio nel Collegio del Garante mi fece capire i rischi che una totale libertà poteva provocare a questo fantastico medium. Quindi bisogna accettare che, ad una criminalità altamente tecnologica si contrapponga una sorveglianza altrettanto qualificata; ma questa ciberpolizia dovrà operare con tecniche e norme rispettose della dignità dei cittadini e della società democratica e non certo spingersi verso soluzioni del tipo Echelon o Carnivore degni di un cult movie quale “Nemico pubblico” di Tony Scott. L’utilizzo più comune di Internet dovrà invece essere protetto da una alleanza Claudio Manganelli - La Rete: fiducia degli utenti e sicurezza dei dati 313 tra istituzioni, imprese, i maggiori protagonisti della high tech e dei servizi Ict; diretta a mettere a punto le garanzie di sicurezza e protezione dei dati personali ed il rispetto della privacy; due concetti strettamente interconnessi che debbono essere perseguiti schierando in campo un articolato armamento di risorse: standard tecnici semplici e sicuri, sviluppo e diffusione di tecnologie rafforzanti la riservatezza e la sicurezza, un leggero pacchetto di norme di base, chiare ed omogenee tra loro, corredate dalle necessarie ed applicate sanzioni amministrative e penali, una più diffusa azione di autoregolamentazione fondata su convinti e rispettati codici deontologici. Infine sarebbe auspicabile che venisse intrapresa, almeno a livello della Commissione dei Garanti Europei - anche grazie all’azione dell’attuale presidenza italiana - una azione di coordinamento delle ormai numerose trade di certificazione dei Web. Si parlava di questo già nel 2000 con la Cnil francese: ora la Francia ha anche una agenzia, l’Atica - Agence pour le tecnologies de l’information e de la communication dans l’administration -, equivalente all’Aipa e quindi sarebbe possibile una azione coordinata, che nel nostro caso potrebbe coinvolgere anche il Mincom ed il Mit con la loro neoistituita commissione per la sicurezza al fine di mutuare la struttura di certificazione applicata alla firma digitale ed applicarla alla certificazione dei Web. 314 Da costo a risorsa - Attività produttive e protezione dei dati personali The Network: Users’ Trust and Data Security Claudio Manganelli(1) The use of the net today has drastically increased and, in spite of the disappointment of some businesses on all sides of the Oceans, the use of the net is no longer an exclusive must of the business world and the sociality between individuals, but has also become an operational requirement and a means for the Public Administration to communicate, with itself, the businesses and the citizens. The setting up of the Ministry for Technological Innovations and the funding of more than 130 e-government projects - approved by the Ministry last October and aimed at increasing the level of efficiency of local bodies, Regional and Provincial authorities, large, medium and small Municipalities, even mountain communities — confirm the relentless commitment of the Public Administration to rationalise administrative procedures and start a more expedite and effective dialogue with our citizens. Over and beyond the rules developed over the last years to facilitate this updating process, some basic tools have also been developed to implement this objective: the electronic document and protocol, digital signatures and the national charter of services; now these tools have to be disseminated, and currently used by our public offices, businesses and citizens. The potentialities of the ICT system are now ready for the explosion of technological innovations. A billion and maybe far more PCs in the world, 27 million recorded sites, more than two billion recorded pages in the more widely used research engines, 30 billion e-mails a day in the world, and this figure is expected to double in the next four years. These are the figures at a planetary level; the Italian situation is improving and recovering the gap recorded some years back: 14 million users have surfed Internet, 60 billion minutes of telephone traffic have been dedicated to the net, 64 billion minutes to telephony. These figures were provided some days ago by Minister Gasparri at a conference, and concern the year 2001. They show that Italy is definitely driving towards the new economy, and that technological innovation is the required means of transportation. But for the new economy and technological innovation to advance harmoniously without running the risk of causing sacs of productive isolation or expenditure excesses, they cannot be separated from strong social innovation. That means not only introducing intense and determined training programs on information technologies in the schooling system, but also looking for the best organisational and (1) Authority for Information Technology - Italy C l a u d i o M a n g a n e l l i - T h e N e t w o r k : U s e r s ’ Tr u s t a n d D a t a S e c u r i t y 315 technological solutions to approach the less young and educated classes to said technologies; as is usually said, to fill the digital divide. To operate in this field in a superficial way may open the way to a series of unwanted events and criminal acts that would end up making society reject technological change and creating a psychological barrier that could temporarily stop the development curve of the new economy. In a scenario in which multimedia and digital technology become all the more widespread – just think that the new generation of Protocol Internet Ipv6 will enable to pass from a 32-bit addressing to a 128-bit one, which more or less corresponds to 1500 addresses per square metre of the terrestrial surface – it is easily comprehensible how data protection, whether it concerns bank accounts or one’s health, will becomes particularly important, compared with the location of one’s car or the daily planning of one’s home theatre. An approximate use of ICT technology, strongly oriented towards consumption, as is the case of mobile telephony, will increasingly expose the individual to a sort of electronic Panopticon, where the control tower and the means of intrusion in his life will be represented by the range of interactive communications reaching him through the different media. But let’s go back to our current situation: the Net is increasingly becoming the system used to exchange information, access large data banks, carry out financial operations and measures and develop professional activities; however, the net also has its shortcomings: more than 170,000 Web accidents have officially been recorded by CERT since 1988; more than 8,000 software vulnerabilities have been recorded over the last 8 years (CERT), 5,580 hacker attacks were suffered last August, of which more than 1,100 on Sunday 18th; these accidents may affect a simple pc but also an Intranet, and thus cause long interruptions in the service. But besides these vandalistic episodes, cyberterrorist actions and pure cybernetic exhibitionism, many attacks are perpetrated to obtain information, for business competition purposes, rather than to commit computer frauds. We must not forget the numerous forms of attack to digital stations; these do not only include PCs but also palms and last generation mobile phones by which you can interface with Internet; these attacks have entered the everyday life of the services and application providers, the Web world, and are mainly aimed at obtaining business information concerning the ways of life of cybernauts, through instruments like cookies, sniffing, tracking, hijacking, and even unbearable invasive actions against e-mail boxes, by spamming; these spy-wares slow down traffic to and from the terminals during links, capture loads of bytes from the hard disk and capture a profile of the user so as to then bombard him with banners and promotional e-mails. In particular, in the Usa, spamming has become a social plague: by consulting the site www.cluelessmailers.org/spamnews.html you can get an idea of the close network of interconnec- 316 Da costo a risorsa - Attività produttive e protezione dei dati personali tions developed to market and give value to information fished inside the net; the U.S. Net analysts estimate that, given the increase in junkmail traffic over the last two years, in 2004 25% of the traffic on the net will be unsolicited. What can the future cyber citizen expect? First of all, to be able to link up with highly trustworthy Web sites featuring: clear identification procedures; personal data processing and transaction procedures made pursuant to European directives and laws on personal data protection; ethical and responsible data processing; clearly indicated addresses; possible inspections and corrective actions; and where it is possible to file complaints. So it is time to act constructively and quickly to enable the new economy and e-government to be successful: when reading through newspapers we often see articles reporting cases of network abuse and in particular of paedophilia crimes. Internet has certainly disrupted the way of life of civil societies and through it, has attracted the attention and enthusiasm of the more educated social classes or the young, wrongly thinking of being anonymous and inviolable: when this attention comes from the more unavowable sentiments of the human soul it may create an explosive mix that causes considerable damage to civil society. When I became addicted to this instrument, tasting all the flavour of its temporal space freedom, I felt I was part of the Sherwood forest happy brigade, far away from the Big Brother and the men of Nottingham’s sheriff, then the four years spent as a member of the Collegio del Garante (Board of the Data Protection Authority) made me understand the risks caused by that utter freedom to this fantastic medium. We have to accept that highly technological crime be countered by a just as qualified law enforcement; but cyber police will have to operate using techniques and rules that respect the dignity of citizens and democratic society, as they adopt should Echelon or Carnivore type solutions fit for a cult movie such as Tony Scott’s “Public Enemy”. Internet’s more common use shall have to be protected by getting institutions, companies, the major high-tech protagonists and ICT services to form an alliance aimed at guaranteeing security, personal data protection and privacy respect; two closely interconnected concepts that have to be pursued by producing a complicated armament of resources: simple and safe technical standards, development and dissemination of technologies that strengthen the confidentiality and security aspect, a streamlined packet of clear ground rules, in harmony with one another, accompanied by the required administrative and criminal sanctions, a more widespread action of self regulation based on assertive and respected deontological codes. Lastly, at least at the level of the Commission of Personal Data Protection Authorities, an action should be undertaken – also thanks to the current Italian Presidency – to co-ordinate the widespread Web certification trade. There were already C l a u d i o M a n g a n e l l i - T h e N e t w o r k : U s e r s ’ Tr u s t a n d D a t a S e c u r i t y 317 discussions on this back in 2000 with the French CNIL: now France also has an agency, ATICA – Agence pour les Tecnologies de l’Information et de la Communication dans l’Administration – which corresponds to AIPA. Consequently, a coordinated action could be possible, which in our case could also involve MINCOM and MIT with their newly formed Security Commission with a view to changing the certification structure of digital signatures and applying it to Web certification. 318 Da costo a risorsa - Attività produttive e protezione dei dati personali Quali regole tra libertà e sicurezza? Maurizio Gasparri(1) Il tema che affrontiamo è molto delicato. In un’era di continuo sviluppo della comunicazione, ricordiamo che in Italia si affermano la larga banda e la televisione digitale terrestre, aumenterà il lavoro di chi deve garantire un traffico corretto delle infomazioni. Da Ministro delle Comunicazioni, però, non mi sento una controparte. Anzi con il Garante della privacy e i suoi organismi ho dei rapporti eccellenti. Del resto chi deve mettere in campo nuove regole per moltiplicare la comunicazione, deve essere consapevole delle garanzie e dei controlli necessari. In questa sessione si è affrontato il rapporto tra l’impresa e la privacy degli utenti e dei consumatori. Il nostro Governo ha posto in primo piano la questione del contemperamento dei diritti di libertà della persona e del funzionamento del libero mercato, ritenendo queste necessità prioritarie. Se ne è discusso di recente anche a Bruxelles, nel Consiglio dei Ministri delle Comunicazioni, dove si è parlato di come regolare l’uso pubblico dei tanti dati, che sono a disposizione dei diversi Paesi, i quali spesso sono in commercio non sempre nel rispetto delle regole. A livello europeo, dunque, ci siamo posti il problema di stabilire quali regole darci per utilizzare questi dati che spesso finiscono poi per essere strumenti di politiche commerciali. In Italia come in Europa, dunque, sono queste le due chiavi, le due polarità. Da una parte la libertà di impresa; dall’altra la libertà della sfera privata del cittadino. Due situazioni che non si pongono in contraddizione ma specificano un rapporto di mutua implicazione. Sono, in definitiva, obiettivi che attengono alla politica economica, con risvolti anche di natura sociale. Come hanno chiarito le relazioni che ho ascoltato nel corso di questi giorni, lungi dal costituire un intralcio alla libera esplicazione del diritto d’impresa, il rispetto dei diritti fondamentali del cittadino può costituire una valorizzazione dell’attività economica, in armonia peraltro con i principi sanciti dalla nostra Costituzione. Vi è sicuramente, tra questi oneri, la libertà dell’iniziativa economica. Però è chiaro che questa azione non può svolgersi in modo da nuocere alla dignità delle persone. Del resto, il settore dell’ imprenditoria costituisce una delle principali attività attraverso le quali è assicurato il completo svolgimento della personalità umana e anche la partecipazione e l’organizzazione economica e sociale del Paese. Ma, ancora, è proprio la tutela dei diritti del cittadino, considerato come naturale consumatore, utente di beni e servizi, di prodotti offerti in regime di concorrenza e di (1) Ministro delle Comunicazioni - Italia Maurizio Gasparri - Quali regole tra libertà e sicurezza? 319 libera iniziativa, a costituire un criterio essenziale e garanzia dello svolgimento di un funzionamento efficiente del mercato. Questo sistema di protezione può assicurare non soltanto una corretta competizione e una pari condizione tra i vari soggetti sul mercato, ma costituisce anche un valore aggiunto per la fiducia che il consumatore può esprimere nei confronti delle offerte che gli vengono sottoposte. Per assicurare questi obiettivi non è necessario attivare alcun meccanismo di generalizzata identificazione dell’utente. In un regime di transazioni orientate al rispetto della privacy, infatti, è lo stesso consumatore a manifestare un suo interesse alla comunicazione d’impresa e a richiedere un bene e un servizio che sia orientato verso la salvaguardia dei suoi diritti, avendo avuto accesso ad una dettagliata e preventiva informazione messa a disposizione dall’azienda offerente. In questa prospettiva, la protezione della privacy è quindi una risorsa aggiuntiva del sistema di qualità. Lungi dall’evocare una dipendenza o una condizione di minorità, la posizione di consumatore implica l’esercizio di quella che potremmo definire una sovranità sociale, tale da esigere, nei confronti delle organizzazioni economiche che con essa vengono a contatto, una tutela particolarmente penetrante che compete a queste realtà. La logica fordista, in questo campo, è stata soppiantata. Tant’è che oggi si potrebbe parlare di una coincidenza della pienezza di cittadinanza con l’assunzione integrale della condizione di consumatore. La tutela del consumatore parte dalla tecnica della responsabilità civile come elemento principale della società mista. Per questo rappresenta un ammortizzatore legislativo che contribuisce ad una più flessibile risposta sistemica alle esigenze della produzione e dello scambio, non disciplinabili solo attraverso le tecniche e le regole del mercato. È noto, del resto, come il criterio del mercato faccia emergere con evidenza il problema dei costi transattivi e delle informazioni al consumatore. Sul terreno della privacy si susseguono i paradossi. Così il consumatore si caratterizza sempre più come destinatario e produttore di informazioni. Anche l’attività del Garante è fondamentale nella sua integrazione con questa dimensione del cittadino-consumatore, portatore di pieni diritti.E’ la stessa esistenza di questi organismi di tutela che ha sviluppato, proprio nel cittadino-consumatore, la coscienza di essere destinatario di ulteriori riconoscimenti. Riteniamo, quindi, che si debba considerare un diritto fondamentale il controllo delle modalità di circolazione delle informazioni. A chi si domanda, riprendendo un antico motto della cultura latina, “chi certifica coloro che certificano?”, ricordiamo che in Italia ci siamo dati una normativa, di origine comunitaria, che è composta dalla legge 675; dal Decreto 171 del ’98 sulla privacy nelle reti di telecomunicazione; dal Decreto 185 del ’99 sulle vendite a distanza, nonché dal diritto ad essere cancellati dalle mailing-list; dal diritto a non essere inondati dalle pubblicità anche via fax e via e-mail; dal diritto – così potremmo 320 Da costo a risorsa - Attività produttive e protezione dei dati personali definirlo - alla tranquillità e dal diritto a non ricevere campioni promozionali se non previa prestazione di un consenso. Nella stessa prospettiva di regolamentazione si è mosso il legislatore comunitario il quale, non intervenendo in maniera paternalistica, ma in materia dei diritti fondamentali, cerca però di rendere efficiente e trasparente il mercato dei beni e servizi attraverso l’attribuzione di posizioni giuridiche soggettive in capo ai consumatori e agli utenti. C’è, poi, una nuova direttiva europea, la 58 del 2002 sulle comunicazioni elettroniche. Questa ha previsto, all’articolo 13, che l’uso di sistemi automatizzati di chiamata senza intervento di un operatore, denominati dispositivi automatici di chiamata, è consentito soltanto nei confronti degli utenti che abbiano espresso preliminarmente il loro consenso. Si parla di telefax o della posta elettronica a fini di commercializzazione diretta, degli sms che in Italia hanno avuto tanto successo e degli mms o dei telefoni di terza generazione. Lavoriamo, dunque, per moltiplicare il lavoro di verifica e di controllo. Questa direttiva fa riferimento al preventivo consenso esplicito del destinatario, accordando preferenza all’opinione già espressa dai garanti europei, e recentemente, anche da molte associazioni di categoria del direct marketing in favore del sistema dell’opt-in. Negli ultimi Consigli dei Ministri Europei delle Comunicazioni si è discusso sull’utilizzo dell’opt-in o dell’opt-out, riguardo la necessità o meno, di autorizzare preventivamente la trasmissione di informazioni non sollecitate. La scelta dell’optin non ci esime comunque da valutare i limiti connessi con questa tecnologia. Lo spamming resta un fenomeno che esula dai confini dell’Unione Europea e che può avvalersi di servizi provenienti da qualsiasi parte del mondo. Il web è globale e quindi la difficoltà è quella di un controllo che non ci esime, però, dal compiere sforzi interni. Devo dire che, anche con scambi di idee con il Presidente Rodotà e con i membri dell’Autorità del garante per la protezione dei dati, come Ministro delle Comunicazioni ho contribuito a modificare in qualche misura alcuni orientamenti europei, anche sulla base della mia esperienza personale. Praticamente i miei predecessori non usavano la rete quindi non avvertivano il fastidio, della ricezione e della successiva cancellazione di tanti messaggi inutili. Quindi, anche sulla base della mia personale esperienza, essendo un fruitore della rete, ho maturato il forte convincimento che si dovessero, nonostante le difficoltà della globalizzazione, stabilire in Europa delle regole più precise. Per questo ho sposato questa causa. E devo dire che in sede europea si è poi aperto, anche grazie al contributo italiano, un orientamento più rispettoso del diritto del consumatore, pur sapendo poi che dell’altro capo del mondo ci possono arrivare 100 e-mail al minuto e sarà un pò difficile trovare strumenti di difesa. Però, intanto, facciamolo in un’area europea. L’utilizzo di banche dati, di indirizzi di posta elettronica di coloro che non desiderano ricevere informazioni non sol- Maurizio Gasparri - Quali regole tra libertà e sicurezza? 321 lecitate, le cosiddette black-list o l’utilizzo delle white-list per la raccolta di indirizzi e-mail di chi invece è disponibile a ricevere pubblicità, possono rappresentare un limite per lo sviluppo del direct marketing. L’una o l’altra scelta implicano delle chiusure o aperture troppo grandi. Sono certo, però, che il processo di maturazione delle tecnologie a supporto della privacy permetterà di scegliere in modo agevole quale tipo di pubblicità ricevere e quale no e, quindi, di superare gli attuali limiti delle black - o white lists. La pubblicità su misura potrà rappresentare un servizio ed un valore aggiunto, tanto per internet quanto per la televisione via satellite e per il digitale terrestre, se lo sviluppo delle tecnologie la renderà compatibile con la tutela dei dati personali e con le direttive comunitarie che noi, come Governo, abbiamo recepito in largo anticipo. Sarebbe però miope considerare tale evoluzione come segno di una sensibilità tutta europea e di un’attenzione solo burocratica al problema. Da molte contee degli stessi Stati Uniti l’inoltro di pubblicità via fax è stato considerato un illecito e fonte di risarcimento del danno. D’altra parte le stesse aziende specializzate nel marketing diretto hanno mostrato negli ultimi anni molta sensibilità per il valore della riservatezza del consumatore. Sono state, infatti, inaugurate anche forme di collaborazione con le associazioni dei consumatori per un monitoraggio permanente delle politiche di privacy che dovrebbe condurre, in un prossimo futuro, a strumenti di certificazione indipendente di qualità e ad una maggiore consapevolezza dell’uso della rete. Non si deve perdere di vista il fatto che, alla fine, la reazione del consumatore svantaggia anche la stessa offerta e quindi non dà un beneficio al mercato e a chi deve vendere. In conclusione il diritto ad essere consumatore come dato costitutivo dell’appartenenza ad un’organizzazione sociale diventa ineludibile. L’utente deve essere protetto e garantito, pena la violazione del principio di uguaglianza sostanziale sancito dalla nostra Costituzione. Non vi è dubbio alcuno che la garanzia della riservatezza è elemento essenziale per la possibilità di accesso al consumo di particolari servizi la cui fruizione connota profondamente l’essere cittadino e la possibilità di essere inclusi nella comunità. Mi pare che in questa luce il ruolo della legislazione sulla protezione dei dati risulti, in modo evidente, doppiamente rilevante, sia quale concretizzazione delle tradizioni politiche consumistiche, sia in quanto direttamente rinviante a quella Carta Europea dei diritti fondamentali che si avvia ad entrare a far parte delle scelte dell’Europa, in un quadro non tanto di difesa di posizioni deboli, ma di garanzia di libere scelte. Infine il tema della sicurezza. Noi abbiamo vissuto, nell’ultimo anno e mezzo, una particolare preoccupazione. Dopo l’11 settembre 2001 la comunità internazionale si è trovata ad affrontare un argomento delicato ed inevitabilmente prioritario. 322 Da costo a risorsa - Attività produttive e protezione dei dati personali Se è vero, come è vero, che il diritto alla riservatezza delle comunicazioni è un diritto primario per l’individuo, non possiamo non metterlo in correlazione alla necessità, anche essa prioritaria, di tutelare le popolazioni da azioni terroristiche che sempre più spesso fanno ricorso a tecnologie sofisticate, avvalendosi di frequente proprio delle reti di telecomunicazione e anche ovviamente della rete internet. Quindi, pur conoscendo e ribadendo in questa occasione la inviolabilità del diritto alla riservatezza del singolo, credo che tutte le istituzioni, i Governi, la Commissione Europea, le Autorità poste a garanzia della riservatezza, come quella in Italia, devono valutare le soluzioni normative che possano coniugare - in una fase che tutti ci auguriamo transitoria e destinata ad esaurirsi nonostante la cronaca mondiale non ci consenta facili ottimismi - la garanzia della privacy in un contesto in cui anche il valore della sicurezza torna prepotentemente in primo piano. In quest’ottica vanno ampliati controlli e verifiche, intesi come esigenze dello stesso cittadino che vuole vedere garantita la riservatezza e la sicurezza. In che modo combinare queste due esigenze è un compito che spetta a tutti noi assolvere. Su questo credo che bisognerà lavorare in futuro. Ringrazio molto per questa occasione e mi auguro che la collaborazione proficua tra il Governo e l’Autorità nel nostro Paese prosegua in maniera rispettosa delle diverse funzioni, così come è accaduto in questo periodo. Mi auguro che il contributo che proprio l’Autorità con questo convegno ha offerto a tutti noi che abbiamo responsabilità, nel mondo delle imprese, nell’organizzazione dei diritti dei consumatori, nei Governi e Parlamenti, possa proseguire anche in futuro, in modo da avere ulteriori spunti per le nostre azioni che devono tutelare valori, beni, diritti. Tutti fattori fondamentali per la nostra vita e la nostra attività. Maurizio Gasparri - Quali regole tra libertà e sicurezza? 323 Freedom and Security: What Rules? Maurizio Gasparri(1) We are dealing with a very sensitive issue. In an age of unrelenting expansion of communications – broadband services and digital TV are increasingly common in Italy as well – there will be additional work for those in charge of ensuring appropriate information flows. In my capacity of Minister for Communications, however, I do not feel I am a counterpart. In fact, I have excellent relationships with the Italian Garante and its agencies. Actually, he who is required to lay down new rules to further communications must be aware of the necessary safeguards and controls. This session addressed the relationship between businesses’ activities and users’ and consumers’ privacy. Our Government has brought the issue of reconciling individual freedoms and functioning of the free market to the forefront, by including it among its top priorities. This topic was recently addressed in Brussels as well, during the Council of Ministers of Communications, who discussed on how to regulate public use of the many data available in the individual countries – such data being often marketed in breach of the relevant regulations. Therefore, at European level we have dealt with the requirement of determining the applicable rules for using these data, which often end up being exploited as a tool for business policies. In Italy, just like in Europe, these are therefore the two key issues, the two sides of the coin: on the one hand, freedom of enterprise; on the other hand, freedom of citizens’ private life. These two concepts are not in conflict, but rather mutually related. We have to do with objectives that are ultimately related to economic policies, with implications of social character as well. As aptly clarified by the presentations made during this Conference, far from being an obstacle to freedom of enterprise, respect for citizens’ fundamental rights can actually enhance the value of economic activities – in line with the principles laid down in our Constitution. Freedom of enterprise is undoubtedly included among such principles. However, economic activity should obviously fail to harm human dignity. Indeed, economic enterprise is one of the main activities ensuring full development of human personality as well as participation in a country’s social and economic organisation. On the other hand, exactly the protection of citizens’ rights – citizens being consumers, users of goods and services as well as of products that are offered according to competition and free enterprise rules – is to be regarded as a fundamental criterion to guarantee effective market operation. (1) Minister of Communications - Italy 324 Da costo a risorsa - Attività produttive e protezione dei dati personali Such a system of guarantees can ensure not only fair competition and equality of status among market stakeholders, but is actually an added value on account of the trust consumers can have in the offers submitted to them. In order to achieve these objectives, there is no need for generalised user identification mechanisms. Indeed, within the framework of privacy-compliant transactions consumers themselves can indicate their interest in business communications and request goods or services that are oriented towards safeguarding their rights – following detailed, prior information as provided by the businesses offering those goods or services. In this regard, privacy protection is an additional resource for a quality system. Far from playing a dependent or minority role, consumers are entitled to exercise what might be referred to as their social sovereignty – which warrants especially thorough protection in respect of the economic actors having contacts with them. The fordist approach has been superseded in this context. Indeed, nowadays one might argue that full citizenship is superimposable to achievement of full consumer status. Consumer protection starts from a civil liability approach, being a basic component of the mixed society. This is why it can be regarded as a regulatory dampener contributing to increased flexibility of system responses to production and trade requirements – which cannot be regulated exclusively via market techniques and rules. On the other hand, market-based criteria are known to bring up the issue of transaction costs and consumer information. Paradoxical features are increasingly typical of privacy issues. Consumers are growingly to be regarded as both recipients and producers of information. The Garante’s activity is also fundamental as it integrates this pattern in which consumers-citizens are holders of full-fledged rights. The very existence of these supervisory bodies raised awareness in consumers-citizens of their being entitled to further rights. Therefore, we believe that controlling the way in which information is disclosed is to be considered a fundamental right. If one wonders – after an ancient saying of Latin culture – “who will certify certifiers”, he/she ought perhaps to remember that in Italy there are regulations based on Community legislation, including Act no. 675/1996, legislative decree no. 171/1998 on privacy and telecommunications networks, decree no. 185/1999 on distance selling as well as the right to have one’s name erased from mailing lists, the right not to be flooded by advertising material via facsimile and/or e-mail, the right – so to say – to be left alone and the right not to receive promotional samples except on the basis of one’s prior consent. This is the regulatory framework also applying to the approach of Community law-makers, who have attempted to increase market effectiveness and transparency without paternalistic measures, though by taking steps in connection with fundamental rights – by granting individual rights to both consumers and users. Maurizio Gasparri - Freedom and Security: What Rules? 325 There is also a new European directive to consider, i.e. Directive no. 58 of 2002 on electronic communications. Under Article 13 of this Directive, use of automated calling systems without operator assistance – the so-called automated calling devices – is only allowed with regard to users that have given their prior consent thereto. This applies to facsimile and e-mail messages used for direct marketing purposes as well as to SMS texts – which are so successful in Italy –, MMS and thirdgeneration mobile phones. Thus, we are working to multiply supervisory and control activities. The Directive I mentioned refers to the recipient’s prior explicit consent, which is in line with an opinion given by European data protection authorities as well as with the stance taken more recently by several direct marketing associations, which are in favour of an opt-in approach. During the latest Councils of the European Ministers of Communications, the opt-in/opt-out dilemma was much debated in connection with the need for prior authorisation to transmit unsolicited information. Adoption of an opt-in approach does not rule out the need to consider the limitations this technology is fraught with. Spamming is a phenomenon that goes beyond EU borders and can take advantage of services originating from anywhere in the world. The global features of the web make it difficult to control, which does not rule out the need for us to make the necessary efforts. I must say that, also thanks to the exchange of views with Professor Rodotà and the members of the Italian data protection authority, I have contributed to somewhat modifying Europe’s position in respect of certain issues in my capacity of Minister of Communications – also on the basis of my personal experience. My predecessors practically did not use the network, therefore they could not be bothered by the fact of receiving and having to erase a lot of useless messages. Therefore, also based on my personal experience as a network user, I have come to believe deeply in the need for Europe to lay down more detailed rules despite the difficulties related to globalisation. This is why I have joined in this cause. And I must say that, partly thanks to the contribution given by Italy, a stance has been developed at European level that is more mindful of consumer rights – although we should be aware that perhaps 100 e-mails per minute could reach us from the other side of the world, which makes it rather difficult to devise suitable defences. Still, let us start reacting as Europeans. The fact of using databanks including the e-mail addresses of individuals who do not wish to receive unsolicited messages – the so-called black lists – as well as the creation of white lists to collect e-mail addresses of individuals accepting unsolicited advertising material may restrain the development of direct marketing. In either case you end up adopting an excessively restrictive or, as the case may be, permissive approach. However, I am sure that maturation of privacy-supporting technologies will allow selecting quite easily what 326 Da costo a risorsa - Attività produttive e protezione dei dati personali advertising is to be accepted or not by overcoming the current limitations of white and black lists. Customised advertising will eventually represent an added-value service both for the Internet and for satellite television or digital terrestrial services – if technological development makes it compatible with both personal data protection and the Community directives our Government has transposed well in advance of the relevant deadlines. However, it would be a narrow-minded view one that considers this evolution to reflect an exclusively European sensitivity as well as a merely bureaucratic approach to this issue. Forwarding advertisement material via facsimile is considered unlawful in many US counties, so much so that it entitles to compensation for damages. On the other hand, businesses specialising in direct marketing have been showing considerable awareness of the value of privacy for consumers during the last few years. Indeed, cooperation initiatives with consumer associations have been implemented with a view to permanently monitoring privacy policies, which is expected to result shortly into developing independent quality certification tools as well as greater awareness of network uses. One should not overlook the circumstance that consumer reaction is also prejudicial to offer, and therefore that it produces no beneficial effects either for the market or for those wishing to sell their products. To conclude, the right to be a consumer as a fundamental component in belonging to a social organisation is becoming inescapable. Users should be protected and safeguarded, otherwise the equality principle enshrined in our Constitution would be violated. Safeguarding privacy is undoubtedly fundamental to ensure consumer access to certain services that are an integral part of the status of citizen as well as a prerequisite for being a member of the social community. I believe that data protection legislation can play a key role in this perspective, for two main reasons – i.e. both because it incorporates traditional consumer policies and because it is directly related to the European Charter of Fundamental Rights, which is becoming a component of the choices made by Europe not so much in order to defend weak positions, but actually to ensure freedom of choice. Finally, the security issue should be considered. We have been facing specific concerns for the past year and a half. After 9/11 events, the international community had to address a difficult issue that was inevitably a top priority: if it is unquestionable that the right to confidentiality of communications is a fundamental human right, one should not fail to consider this right against the background of the – equally fundamental – need to protect our peoples against terrorist activities, which make recourse increasingly to highly sophisticated technologies and often make use exactly of telecommunications networks – including the Internet. Therefore, though aware of and reaffirming the inviolability of the right to in- Maurizio Gasparri - Freedom and Security: What Rules? 327 dividual privacy, I believe that all institutions, Governments, the European Commission and the data protection authorities such as the Italian Garante should take into consideration regulatory solutions that allow reconciling privacy safeguards and security requirements, in a phase we all hope will be a transient one covering a short time span – although world events do not appear to leave much room for optimism. In this regard, controls and checks should be enhanced because this is the request coming from citizens, who wish to be assured of both their privacy and security. How to reconcile these two requirements is a task we all are called upon to discharge. I think this will be a matter for future work. Let me express my thanks for having provided me with this opportunity; I do hope the fruitful cooperation between Government and the Garante will continue by respecting our functions, as it has been the case so far. I hope the contribution given by the Italian Garante through this Conference to all of us, who are in charge of specific tasks in the business world, in organising consumer rights, in Governments and Parliaments, will also be available in future – so as to provide additional inputs for our initiatives, which should safeguard values, goods and rights as fundamental components of our life and activity. 328 Da costo a risorsa - Attività produttive e protezione dei dati personali Contributi S ESSIONE IV P RIVACY E SVILUPPO ECONOMICO : SOLUZIONI E PROSPETTIVE Sessione IV – Privacy e sviluppo economico: soluzioni e prospettive Globalizzare le garanzie Stefano Rodotà (1) La sessione finale di questa intensa conferenza, anche per la presenza di interlocutori importanti come Cliff Stearns e Mozelle Thompson, suggerisce una indicazione proiettata verso il futuro. Come esiste un transatlantic business dialogue, ritengo sia venuto il momento di pensare ad un transatlantic privacy dialogue. Poiché il titolo di quest’ultima sessione è “privacy e sviluppo economico: soluzioni e prospettive nella dimensione globale”, vorrei limitarmi a sottolineare quello che è avvenuto nel mondo per effetto della attenzione sui temi della protezione dei dati imposta da diversi fattori, non soltanto da quelli più comunemente richiamati, cioè le innovazioni scientifiche e tecnologiche. Sinteticamente, toccherò quattro punti. Siamo partiti da una constatazione comune: che la privacy da diritto periferico è diventato oggi un diritto centrale nei diversi settori giuridici; da diritto in penombra, come lo definiva la giurisprudenza della Corte Suprema degli Stati Uniti, è diventato un diritto che illumina molti settori dell’ordinamento; da un diritto che sembrava simboleggiare l’isolamento della persona nella comunità è divenuto un diritto necessario per stabilire legami sociali. Mi limito a ricordare che ormai il riferimento alla privacy è corrente quando si pone il problema della libertà di manifestazione del pensiero, da esercitare al riparo dal rischio che raccolte di dati sulle opinioni espongano a discriminazioni o a stigmatizzazioni sociali. La privacy si presenta, poi, come componente della libertà di associazione, evitando che le liste degli aderenti siano acquisite illegittimamente, divulgate illegalmente, con possibili effetti negativi per chi vuole agire liberamente in comune con altri. Costituisce una precondizione di diritto alla salute. Senza riservatezza dei dati sanitari, in particolare nei casi di malattie come l’Aids, molte persone preferiscono non farsi curare. Vi è l’esempio americano della diminuzione del numero delle donne che accettano la somministrazione di un test per il cancro al seno: il rifiuto è determinato dal timore che questa informazione possa poi essere conosciuta dai datori di lavoro o dalle compagnie di assicurazione, con effetti negativi per quanto riguarda l’accesso o il mantenimento del posto di lavoro e la conclusione dei contratti di assicurazione. Vi è una scelta “tragica” tra mantenimento del posto di lavoro e salute. Solo la pienezza (1) Presidente Garante per la protezione dei dati personali - Italia Stefano Rodotà - Globalizzare le garanzie 331 della privacy, dunque, consente che il diritto alla salute - uno dei grandi diritti fondamentali di questa nostra epoca - possa essere rispettato. Questa è la premessa dalla quale siamo partiti, e questo convegno ci ha messo di fronte, in modo molto serio e molto significativo, al problema degli usi delle tecnologie. Vi è un modo di presentare la tecnologia che ha molto di mitologico, che la vede come la spada che procura ferite, ma è anche in grado di rimarginarle. In parte questo è vero. In tutti i cambiamenti tecnologici, c’è una prima fase in cui l’uso delle tecnologie è fortemente inquinante: questa volta non dell’ambiente fisico, ma dell’ambiente informativo, dell’ambiente delle libertà civili. Andando avanti e perfezionandosi le tecnologie, alcuni di questi effetti inquinanti vengono eliminati o ridotti, e tuttavia non possiamo pensare a una sorta di benefico e spontaneo mutamento della situazione grazie al solo fatto della tecnologia. Abbiamo visto e ci è stato detto che le tecnologie a tutela della privacy possono avere diversi effetti: strumenti di auto difesa del consumatore, strumenti per la produzione sociale di consapevolezza dei rischi della tecnologia, sigilli, certificazioni audit, rispetto a tecnologie particolari. Ma in questa impostazione vi è pure un rischio di autoreferenzialità: la tecnologia ci dice che è in grado con mezzi tecnologici, di risolvere i problemi della privacy; l’impresa ci dice che con l’auto-disciplina è in grado di risolvere i problemi della privacy; i consumatori parlano di un’autodifesa che consente di risolvere molti problemi della privacy. Devo dire che sono molto diffidente rispetto a tutte le impostazioni autoreferenziali, che in questo caso rischiano di oscurare la necessità di strategie istituzionali, economiche e politiche che integrino le diverse impostazioni: quella tecnologica, quella partecipativo, la disciplina di impresa. E, ovviamente, una strategia integrata richiede un intervento istituzionale; anche persone non sospette perché provengono da ambienti culturali che non hanno la propensione per la legislazione che sembrerebbe tipica del continente europeo, sottolineano ormai con molta forza la necessità di un ricorso alla legge. Naturalmente dobbiamo chiederci a quale tipo di legge vogliamo riferirci perché, quando facciamo riferimento oggi alla legge, ci riferiamo a qualcosa che non ha un unico significato. Una legge molto analitica, particolareggiata, è profondamente diversa da una legge strutturata per principi e criteri direttivi di carattere generale. È il tema sul quale richiamava l’attenzione Umberto Romagnoli, ricordando che vi sono settori - come quello delle relazioni di impresa, ma non questo soltanto - dove un’effettiva protezione dei dati richiede regole e procedure complesse, comprendenti anche diversi soggetti, perché questo ne aumenta l’accettabilità sociale, l’efficienza e anche la flessibilità, nel senso che cos’ si consente l’adeguamento a situazioni continuamente in movimento proprio per il carattere straordinariamente innovativo delle tecnologie. Dobbiamo, quindi, affrontare quest’altro tema: quali siano le tecniche di disciplina più adeguate, anche quando si fa riferimento allo strumento legislativo. Forse, il legislatore italiano non è stato così distratto o inconsapevole, come pure qualcuno ha detto, poiché nella disciplina della protezione dei dati ha congiunto principi generali 332 Da costo a risorsa - Attività produttive e protezione dei dati personali e regolazione analitica. Ed ha dato evidenza anche al problema della trasparenza. I due rappresentanti di due grandi autorità indipendenti italiane, il presidente della Consob e il presidente dell’Antitrust, hanno messo in evidenza come nei loro settori ci sia bisogno di trasparenza e che, quindi, i dati personali richiedano minor tutela per raggiungere un effetto importante che è quello del migliore funzionamento del mercato, compresa quindi la tutela dei consumatori, vista, in questo caso, anche come tutela degli investitori attuali o potenziali. Ora, i cinque anni di lavoro della nostra Autorità mostrano una attenzione particolare per i profili della trasparenza, con molti provvedimenti che disponevano che talune categorie di dati dovevano essere comunicate, dovevano divenire pubbliche. Qualcuno ironicamente si chiese se questa era un’autorità garante della riservatezza o della trasparenza. La verità è che abbiamo sviluppato indicazioni precise della legge n. 675, come quelle contenute nell’articolo 12, comma 1, lettera f), dove si dice che non è necessario il consenso degli interessati per trattare i dati che riguardano le attività economiche, purché siano rispettati il segreto aziendale e industriale. Dunque, i dati economici hanno nel nostro sistema un più basso grado di tutela proprio per far sì che altre finalità e altri valori, come il corretto funzionamento del mercato o l’uso corretto delle risorse pubbliche, siano tutelati. C’è dunque già nella legge una risposta a questa esigenza e questo spiega, per esempio, i rapporti di collaborazione e non di conflittualità con la Consob, come ricordava Luigi Spaventa. Bisogna peraltro tener conto del fatto che oggi nel mondo si confrontano, e non solo nella materia della protezione dei dati, due modelli: uno messo a punto nell’Unione Europea, l’altro storicamente elaborato negli Stati Uniti. Il primo ha sempre più nettamente considerato la privacy come diritto fondamentale, mentre la tradizione americana non è altrettanto esplicita. Ricordato questo aspetto, vorrei segnalare un’altra questione. Abbiamo sentito fare molti riferimenti all’analisi economica del diritto che, tuttavia, non è solo Richard Posner, ma anche, per esempio, Guido Calabresi. Ci sono diversi modi di utilizzare l’analisi economica del diritto: uno che ritiene inquinanti del rigore dell’analisi tutti i riferimenti a valori diversi da quelli immediatamente riconducibili al calcolo economico; altri, invece, ritengono che valori di questo tipo, quali possono essere i diritti fondamentali, debbano essere presi in considerazione e l’analisi economica del diritto è solo uno degli strumenti per valutare la funzionalità del sistema, senza però escludere dal calcolo e dalla valutazione giuridica questi altri riferimenti. Non credo che possiamo liberarci dal riferimento alla privacy come diritto fondamentale. Da una parte c’è un problema di sincerità dell’Europa. L’Unione europea non può iscrivere nella sua Carta dei diritti fondamentali il diritto alla protezione dei dati personali, addirittura come diritto autonomo, distinto e strutturalmente presentato in modo più forte della tradizionale tutela della vita privata e familiare, e poi non trarne le conseguenze. Questo sarebbe un comportamento non solo insincero, ma contraddittorio e negativo sul piano istituzionale. Stefano Rodotà - Globalizzare le garanzie 333 Ma vi è un’altra ragione perché ai diritti fondamentali in generale, e non solo alla protezione dei dati personali, oggi si faccia così insistente riferimento. Proprio nella dimensione globale, ci rendiamo conto della povertà degli strumenti di tutela giuridica. La fine della sovranità nazionale nel regolare alcune relazioni (non tutte, stiamo attenti a non abusare del riferimento alla globalizzazione) diviene anche l’argomento per affermare che nessuno deve più regolare alcune materie, perché non c’è più la sovranità degli Stati. Il riferimento forte ai diritti fondamentali, come diritti della persona che accompagnano ciascuno di noi in ogni luogo del mondo e non possono essere negati, diventa lo strumento per consentire che, in una situazione nella quale il diritto tradizionale ha poca presa, la dimensione giuridica, vista come garanzia della persona nella sua totalità, possa mantenere una sua forza e una sua evidenza. Ci sono stati presentati due modelli di disciplina globale della privacy - che considero con grande interesse e con grande attenzione - da due grandi società multinazionali Daimler-Chrysler e Procter & Gamble, che ci hanno indicato quali sono le loro politiche, come si organizzano, come si diffondono sull’intero pianeta, quali sono le strutture di tutela e dunque producono un concetto di privacy che però è evidentemente e giustamente modellato sulle esigenze delle imprese e che però, pongono per questo solo fatto, il problema di discipline non affidate soltanto agli interessi economici. Concludo. C’è un problema dunque di bilanciamento di interessi. La privacy oggi è stretta tra mercato e sicurezza collettiva, soprattutto come si usa dire dopo l’11 settembre. In Italia noi abbiamo, per risolvere il primo problema, quello del rapporto con il mercato, delle indicazioni sulle quali noi lavoriamo sempre con grande attenzione. E’ stato ricordato l’articolo 41 della costituzione italiana che dice che l’iniziativa economica privata non può svolgersi in contrasto con la dignità umana. Il principio di dignità è iscritto nell’articolo 1 della nostra legge. Il problema della sicurezza: questo è un problema oggi drammatico che impegna le autorità in tutto il mondo. Io credo che dobbiamo tenere conto, ce lo ricordava ieri George Randwanski, dell’opportunità, della necessità, della finalità di eventuali misure restrittive della privacy per finalità di sicurezza. Ma anche quando noi facciamo una valutazione di finalità, dobbiamo avere due riferimenti che sono istituzionalmente obbligati. Il primo, lo sarà tra poco, ma già la Carta dei diritti fondamentali cammina nelle nostre organizzazioni sociali. Una delle disposizioni finali della Carta, dice che comunque dai diritti fondamentali proclamati, e dunque anche la protezione dei dati, non può essere mai eliminato il contenuto essenziale. Quindi, non è pensabile che per ragioni di sicurezza, possa essere azzerata la protezione dei dati personali. Il secondo, un testo questo vigente nell’ordinamento italiano come nell’ordinamento di molti paesi, la convenzione europea dei diritti dell’uomo del ’50, all’articolo 8 ci parla di tutela della privacy. Al secondo comma di questo articolo si dice che 334 Da costo a risorsa - Attività produttive e protezione dei dati personali sono possibili limitazioni per vari motivi, compreso quello della sicurezza della tutela della privacy, con misure compatibili con la natura di una società democratica, cioè con misure che perseguono questo obiettivo. Dunque c’è un secondo parametro di riferimento, da una parte il contenuto essenziale, che non può essere mai azzerato, dall’altra la compatibilità con un sistema democratico. Noi tutti sappiamo che per certi versi i sistemi autoritari possono anche essere più efficienti sul terreno del mercato, perché per esempio, negano le garanzie ai lavoratori e in questo senso abbassano i costi, negano, e ne abbiamo avuto l’esperienza, quando abbiamo scoperto i giganteschi archivi di stato dell’Unione Sovietica, e forse ancora di più, della Repubblica Democratica Tedesca controllando minuziosamente i cittadini. Dunque, i sistemi democratici si distinguono anche perché non fanno mai scendere le garanzie sotto una certa soglia. Concludo. Il professor Campisi ci lasciava ieri con un interrogativo: questi nuovi grandi sistemi che negli Stati Uniti si accompagnano alle nuove misure, quelle legate al cosiddetto “Total Information Awareness System”, saranno in primo luogo gestibili? Questa è una domanda tecnologica ma non solo, e poi non saranno utilizzati anche per finalità diverse dalla sicurezza? Il caso Echelon, sicuramente inefficiente per evitare gli atti di terrorismo, e però noi sappiamo efficientissimo per distorcere la concorrenza passando ad alcune imprese informazioni sui comportamenti dei concorrenti. E dunque c’è anche questo altro problema che tocca sempre questioni di democrazia. E un altro aspetto di risorsa democratica della privacy deriva dal fatto che non possiamo nello stesso tempo dire, come diciamo continuamente, come è stato detto anche oggi, che il terrorismo e la criminalità si servono di strumenti molto sofisticati e poi non renderci conto che la creazione di gigantesche banche dati, non difendibili con le misure che conosciamo, non siano anche uno strumento che, creato per ragioni di sicurezza, può far crescere la vulnerabilità sociale. Nel senso che mette a disposizione di violatori, tutt’altro che animati da buone intenzioni questo tipo di dato. Quindi noi ci troviamo tutti in una situazione di grande difficoltà. La discussione, io credo, è lo strumento necessario tant’è che io concludo dicendo che a Venezia, come è stato ricordato, noi ponemmo la questione di una convenzione internazionale, e allora le diffidenze erano molte, perché le intese erano viste come uno strumento autoritario. Nell’ultima visita negli Stati Uniti, come sa bene Cliff Stearns, abbiamo trovato delle modifiche importanti, tant’è che lì sono state proposte leggi federali per la tutela dei dati personali, discorso che all’inizio del 2000 sembrava improponibile. E dunque, io credo, che questa contrapposizione tra modelli, se noi ragioniamo su alcuni valori fondativi, possa anche sfumare. E che mentre l’Europa inventa una nuova generazione di codici di condotta, gli Stati Uniti considerano con maggiore attenzione l’uso dello strumento legislativo. L’ipotesi della dichiarazione di Venezia oggi potrebbe portare noi dopo questa conferenza a dire quello che diceva all’inizio, ma forse potrebbe servire un “transatlantic privacy dialog”. Stefano Rodotà - Globalizzare le garanzie 335 Globalising Safeguards Stefano Rodotà (1) The final session of this content-packed conference would appear to point to the future outlook – partly on account of the presence of important participants such as Cliff Stearns and Mozelle Thompson. Just like there exists a Trans-Atlantic Business Dialogue, I wonder whether it is not high time a “Trans-Atlantic Privacy Dialogue” were also set up. As the title of our final session is “Privacy and Economic Development: Solutions and Outlook in the Global Dimension”, I only would like to stress what has happened worldwide thanks to the attention paid to privacy issues – which is due to several factors, in addition to those most commonly referred to such as scientific and technological innovation. I will be very concise and deal with this by mentioning four main issues. We started from a consideration that is generally agreed upon, i.e. that privacy has turned from a peripheral right to a central right in the different legal sectors – from a twilight right, to quote the US Supreme Court, it has become a right shedding light on many areas of our legal system. From being a right that appeared to typify isolation of the individual in a community, it is becoming a right that is necessary to establish social ties. Let me just remind you that today privacy is commonly an issue whenever freedom of speech is considered, i.e. whenever the possibility to freely express one’s opinions without being the subject of, for instance, discrimination or social stigma is taken into consideration. Privacy is also seen as a component of freedom of association, in order to prevent unlawful acquisition and disclosure of member lists with possible negative effects on any individual wishing to freely act by joining forces with others. Privacy is a prerequisite for exercising the right to health. The protection of certain medical data, in particular those concerning diseases such as AIDS, is a prerequisite for a patient to let himself/herself be treated. There are data from the US showing, for instance, a reduction in the number of women accepting administration of breast cancer tests, which is due to their being afraid that this information may come to be known to their employers and produce negative effects leading to their being denied access to and/or dismissed from work as well as to increased difficulties in getting insurance coverage. A “tragic” choice has to be made between keeping one’s job and keeping one’s health. Only full-fledged privacy allows the right to health – another of the fundamental rights of this great period of ours – to be respected. (1) President, Italian Data Protection Authority 336 Da costo a risorsa - Attività produttive e protezione dei dati personali These are the premises we started from. This conference led us to face, quite seriously and significantly, the issue of how to use technology. There is a way of presenting technology that sounds very much mythological, whereby technology is both the sword that wounds and the sword that heals. This is true, in part. Just like with any technological change, there is a starting phase in which using technologies is a source of pollution – not so much as regards the physical environment, but in respect of the informational environment, the civil freedom environment. With the development and refinement of technologies, some of these polluting effects can be eliminated or reduced; however, one should not imagine a sort of spontaneous, beneficial change in status merely due to technology. We have seen and heard that privacy-protecting technology can produce diverse effects: consumer self-defence, tools to raise social awareness of technological dangers, seals, certificates, and auditing with regard to certain types of technology. However, there is a self-reference risk in following this approach – technology is telling us that it can solve privacy problems with technological solutions; businesses are telling us that they can solve privacy problems with self-regulatory solutions; consumers are telling us that there are self-defence strategies allowing many privacy-related problems to be coped with. I must confess that I rather mistrust all selfreferencing approaches, which here might fail to highlight the need for institutional, economic, and political strategies such as to integrate the different approaches – the technological approach, the bottom-up approach, and the self-regulatory approach. Obviously, any integrated strategy requires institutional measures to be taken. Indeed, persons above suspicion, i.e. persons belonging to cultural circles where there is no law-making flair such as that seemingly typical of the European continent, have forcibly stressed the need for legislation. Of course, one should clarify which kind of legislation one envisages; whenever law is referred to nowadays, something is meant that is far from commonly agreed upon. A very detailed, analytical law is quite different from a law organised according to general principles and guidelines. This was the issue to which Umberto Romagnoli drew our attention, when he said that in certain sectors – such as the employment context, although these considerations are also applicable to other sectors – effective data protection requires complex rules and procedures in which several entities should be involved, because this is a way to increase social acceptance, effectiveness, and flexibility – which means that it becomes easier to adjust it to the ever-changing circumstances resulting exactly from the highly innovative contents of technological development. We have therefore to address another issue – namely, what are the most appropriate regulatory techniques, also with regard to legislative instruments. Perhaps the Italian Parliament was not as absent-minded and unaware as was hinted, be- Stefano Rodotà - Globalising Safeguards 337 cause in setting out data protection regulations it strove to reconcile general principles and detailed rules by also stressing the transparency issue. The representatives from two major independent supervisory authorities in Italy – the Chairman of the CONSOB (the authority regulating the securities market) and the Chairman of the Antitrust authority – pointed out that transparency is a must in their sectors, therefore personal data would be entitled to less protection in this area in order to achieve an important result, i.e. improving market operation as also related to consumer protection (meaning, in this case, protection of actual and/or potential investors). I believe that the past five years of activity of the Italian data protection authority show that special attention has always been paid to transparency – there have been several decisions taken to order that some data categories should be disclosed and publicised. Indeed, it was asked ironically at a certain time whether our authority was in charge of protecting transparency rather than privacy. Truth is, we have been developing clear-cut indications set out in Act no. 675 such as those contained in its Section 12(1), letter f ) – whereby the data subjects’ consent is not required to process data concerning economic activities on condition that industrial and business secrecy rules are complied with. Therefore, economic data are protected to a lesser degree in our system exactly to allow achieving other purposes and upholding other values – such as correct operation of markets and appropriate use of public resources. The DPA therefore already provides a response to meet this requirement, which accounts for the cooperative (rather than antagonistic) stance in our relationships with CONSOB as mentioned by Luigi Spaventa. One should actually consider that two models are currently confronting each other in the world scenario – not only as regards data protection. To sum up, let us say that there is a model developed in Europe and another model that historically was created in the Usa. The former one has always regarded privacy more decidedly as a fundamental right, whilst the American tradition has been less explicit on this point. I am not going to dwell on this topic, however I would like to point to an additional issue. Reference has been made frequently to the law economics approach – but this approach should also take account, for instance, of the writings by Guido Calabresi in addition to those by Richard Posner. There are several ways to use the law economics approach. One of them considers this type of analysis to be negatively affected by the reference to values other that those immediately related to economic considerations; others believe, however, that values such as those related to fundamental rights should be taken into account – the law and economics approach being just one of the tools allowing system operation to be assessed, without excluding such additional components from economic analysis and juridical evaluation. 338 Da costo a risorsa - Attività produttive e protezione dei dati personali I believe we cannot do away with the consideration that privacy is a fundamental right. On the one hand, the sincerity of Europe is at stake. Europe cannot enshrine the right to personal data protection in its Charter of Fundamental Rights as an autonomous right which is actually separate from and more powerfully supported than the conventional right to protection of private and family life, and then refrain from drawing the relevant consequences therefrom – because in doing so, it would behave in an insincere as well as inconsistent and institutionally counterproductive manner. However, there is another reason why fundamental rights – not only data protection – are nowadays so often referred to. It is exactly in a global scenario where one can realise how poorly effective legal protection instruments are. The end of national sovereignty in regulating certain relationships – not all of them of course, one should be careful not to misuse the globalisation concept – may also give rise to the concept that certain issues are no longer liable to regulation by whatever entity since States’ sovereignty is a thing of the past. The reference to fundamental rights as personal rights we carry with us wherever we go and may not be thwarted is becoming a tool to allow the legal dimension – insofar as it is a means to safeguard the individual as a whole – to retain its strength and value within a framework in which the effectiveness of conventional law is limited. Two models of global privacy regulation were described to us as implemented by two major multinational companies – Daimler Chrysler and Procter & Gamble; I regard them as highly interesting and deserving of attention. The two companies provided us with an overview of their policies and organisation worldwide, of the way in which they ensure the protection of privacy and, therefore, produce a concept of privacy that is modelled, however, after their business requirements - quite sensibly and correctly. This very circumstance raises the issue of devising regulations that are not based exclusively on economic interests. Let me add some final remarks. We have to do, therefore, with balancing the interests at stake. Nowadays, privacy is squeezed between market requirements and public security, especially after 11/9. In Italy, guidelines are available to cope with the issue related to market; we have been working on those guidelines with the utmost care. Reference has been made to Article 41 of Italy’s Constitution, under which private enterprise may not be in conflict, for instance, with human dignity. The human dignity principle is also referred to in Section 1 of Italy’s data protection Act. The security issue is being faced by all the authorities all over the world, and I believe that, as stated yesterday by Mr. George Radwanski, we should take account of the advisability, necessity, and purposes of measures possibly restricting privacy for security purposes. Stefano Rodotà - Globalising Safeguards 339 However, two reference points should be regarded as institutionally mandatory also when taking account of the relevant purposes. One of them is related to the Charter of fundamental rights, which is already a feature of our social organisation. One of the final provisions in the Charter states that any limitations on the fundamental rights enshrined in the Charter – including, therefore, the right to personal data protection – must respect the essence of those rights. Thus, it is out of the question that the protection of personal data may ever be overridden in full for security reasons. Secondly, the 1950 European Human Rights Convention – which has been transposed into Italian law as well as into the domestic laws of many countries – refers to the protection of privacy in its Article 8. The second paragraph of this Article provides that limitations on privacy are possible on several grounds including security; however, the relevant measures must be compatible with those necessary for the above purposes “in a democratic society” – i.e. they should be measures serving the purposes of a democratic society. There are therefore two reference criteria to be considered – on the one hand there is the essence of the right, which may never be overridden, on the other hand there is compatibility with a democratic system. We all know that, to a certain extent, authoritarian systems may actually be more efficient in market terms – because, for instance, they grant no safeguards to employees and therefore reduce labour costs. We could experience this directly when the huge State archives in the former Soviet Union were discovered – perhaps this applies to an even greater degree to those kept by the German Democratic Republic, which allowed in-depth surveillance of citizens. Therefore, democratic systems are different also because they never let safeguards fall below a given threshold. Let me now come to my conclusions. As hinted yesterday by Professor Campisi, will the new systems to be implemented in connection with the “Total Information Awareness” scheme be actually manageable? This is a technological issue, but there is something more than that – will they be used for purposes unrelated to security as well? The Echelon case provides a significant example in this regard – we know that it proved undoubtedly ineffective to prevent terrorism, whilst it was quite capable to distort competition by disclosing information on competitors to certain companies. There is, therefore, another issue to be considered, which is related, once again, to democracy. Another facet of privacy as a resource for democracy is related to the circumstance that one should not say – as is often the case, indeed we heard these words spoken this very day – that terrorism and crime avail themselves of highly sophisticated tools, without also realising that setting up huge databases that cannot be secured via the tools available so far is bound to enhance social vulnerability rather 340 Da costo a risorsa - Attività produttive e protezione dei dati personali than security – as they can make available the data in question to offenders, who are far from well-meaning in their intentions. Therefore, we all are facing a highly difficult situation. I believe that a debate is necessary; indeed, let me conclude by recalling that during the International Conference in Venice we raised the issue of an international convention on privacy which proposal was received with some mistrust, agreements being regarded as authoritarian tools in this sector. During our latest visit to the US – as Rep. Cliff Stearns knows very well – we found major changes; indeed, federal bills have been proposed to protect personal data, which seemed impossible at the beginning of 2000. Therefore, this antagonism between different models is bound, in my opinion, to be very much softened if we consider some founding values. Whilst Europe is inventing a new generation of codes of practice, the US is paying greater attention to the use of legislative instruments. The suggestion put forward in the Venice Declaration might lead us nowadays, at the end of this Conference, to re-affirm what I said at the beginning; however, a “Trans-Atlantic Privacy Dialogue” might be helpful. Stefano Rodotà - Globalising Safeguards 341 Collective Rights and Interests: How to Harmonise Approaches and Safeguards Marc Rotenberg(1) I would first like to thank Prof. Rodotà and Mr. Buttarelli for having given me the chance of being here with you today; it’s a real honour and pleasure. I would like to address the economic aspect of the issue today. First of all, by giving you an overall view. I must say that I find this especially interesting not only because my wife is an economist and in fact we met at a discussion on the Coat theorem; but also because in the world of advocacy and expertise on privacy the trend has been to focus attention on the scope of human rights, and privacy based on human rights, so we have not taken advantage of certain available analytical tools. As an introduction, I will try to explain the traditional approach to the problem. When we talk of common standards in respect of privacy protection, we often refer to existing international instruments, like the OECD guidelines, the EU data directive, the Universal Declaration on Human Rights, which have rules and standards in common. When I was working as Counsellor of the US Senate Judicial Committee, it fascinated me to note that both our legal system, the various rules on privacy in all possible fields, as well as the various legal systems throughout the world, all embodied what would seem to be a common approach in respect of privacy protection. We could say that this results directly from the legal standards. But after having reconsidered the subject, I thought there must be something else to explain the common aspects in privacy protection. Many people have already addressed this issue. David Flaherty in the ‘80s and Colin Bennet in the early ‘90s identified some theories, one being a theory on commerce, which simply says that when business expands and local corporations have to comply with the local standards, then the trend will be to adopt standards in common. In fact, we have seen something similar with the impact of the EC data directive, which has led to the adoption of the Safe Harbour agreement, described by some as the rationalisation of privacy protection. Then there is a second theory based on technology, which says that when there is a common communications infrastructure, like a telecommunications network or Internet, then common technical standards will arise leading to different privacy protection in different regions. While the third theory concerns the role of the élite, which says that there may be conferences, like the one we are having now, where government representatives (1) EPIC – Usa 342 Da costo a risorsa - Attività produttive e protezione dei dati personali and experts from various parts of the world meet to exchange points of view, and that these meetings as well as any publication of common documents, will give rise to a common agreement on privacy protection. I think that, to a certain extent, all these theories are correct. But then there is another theory, that I would like to explore in detail with you - which has already been mentioned by a rapporteur this morning, and which pivots on the question of whether there is an economic basis to privacy? And when I say “economic basis”, I mean in the strict sense of economics. Does privacy protection promote effectiveness? Does it favour what can be called optimal outcomes, given the rational interests of the various actors? I think it is important to raise this point as from the start, because the trend has been, when addressing privacy through the lens of economics, to focus on gauges that could not be considered as economic, at least normally speaking. What I mean is that there are people who say: let’s look at the business cost-effectiveness aspect – are the rules on privacy good for core business? It is a valid commercial consideration but it does not give any satisfying answers to the economic question. Others, instead, look at the cost-benefits analysis, and say: if we were to gauge the costs of these various approaches and weigh them against the possible relevant benefits, what would the outcome be? Some even say: maybe privacy is a factor which changes according to the markets – in other words, if we have a good privacy, this will inevitably have a beneficial effect on business – which could be true. But the question I would like to ask you today is the following: is a good privacy valid from an economic point of view? To answer this question, I think we have to start off by referring to the work of our well-known US expert and jurist, Richard Posner, who has extensively written on the application of economic models to legal problems. Posner incidentally was very interested in the question of privacy – and this already 25 years ago when he wrote an article on the so-called mailing lists and whether an opt-in or an opt-out was to be preferred. At the time, he said that the problem concerned the ownership interests of the person concerned or the data possessor. This obliges us to address the matter of the costs of transactions. In a world where people tend to exchange letters, with stamps and so forth, it is rather expensive to choose the option of not being included in a list, in respect of the benefits that could arise for the individual. So, Posner was thinking from an economic point of view when he said that opt-out was to be preferred. He also considered privacy vis à vis a communication net and if people should pay a certain price for the desired privacy before starting the communication transaction considering that unexpected inefficiencies could arise at any time. Think of this problem for a second. Let’s say that before picking up the phone, when you’re about to make a phone call, before doing so, you should probably decide how much privacy you want for that M a r c R o t e n b e r g - Collective Rights and Interests: How to Harmonise Approaches and Safeguards 343 call: you might be calling for business, or to know the price of a pullover – there is no need for a lot of privacy for that; but if you are calling your doctor to be informed on a diagnosis, then maybe you need a lot of privacy. If you call a friend to ask him for information on a show you want to check the time of and in the middle of the call your friend raises an issue that you had not expected, and the matter becomes strictly personal, now you need privacy. Posner considered this problem and said that there are good reasons to apply privacy standards to this type of relations to prevent enormous inefficiencies from arising when people have to deal with a secondary asset – privacy in this case – before being able to reach their primary aim. Now, there is a wide range of activities where privacy makes sense in economic terms: it makes sense because it promotes trust and confidence, in new net milieus and in offers for new services. A very good example of this is the recent US experience in the regulatory and non regulatory framework. In the ‘80s in the United States, there was a whole series of advanced services available to US consumers: interactive via cable television, electronic mail, video rent – and in each one of these cases, the Congress of the United States – like the European Union – said that, before providing these services, a privacy framework had to be established in accordance with the law, to develop trust and confidence in this new business milieu. And there were no protests associated to privacy in respect of cable TV, video rental or e-mail – at least not in the ‘80s. More recently, especially over the last ten years, and even more so after the spread of Internet, the United States have adopted a different attitude, which favours the self-regulatory approach: no common standards or a framework for the new services and new technology. This suggestion has raised a lot of protests – and this I find quite interesting. In fact, certain services, like advertising on Internet – which many of us thought would be Internet’s strong point – have practically collapsed. Advertising via Internet has collapsed in part due to the economic conditions, but it also collapsed as a result of the objections raised by the public against the collection and use of personal information in a milieu not governed by rules. Microsoft has recently admitted that its personalised services on Internet will probably not be continued as expected, also due to current concerns by the public in respect of the lack of privacy protection. Thus, generally speaking, I would say that the right to privacy, the common standards on privacy, have the effect of promoting trust and confidence, which in turn foster economic growth. But now I would like to consider a couple of more specific and technical areas, under the profile of the law and economics, to suggest a sound foundation on which to base privacy protection. There is a phenomenon in economics called rent-seeking behaviour which simply means that, if a corporation has knowledge of the most I am willing to pay for a given product, it will tend asking me for that price. A firm 344 Da costo a risorsa - Attività produttive e protezione dei dati personali could offer me a shirt for ¤ 20; but if it kno ws I am willing to pay ¤ 30 and it has the chance of making me pay ¤ 30, then it will undoubtedly tr y to make me pay just that. Now, if we consider the application of the privacy rules on transactions based on the market, what strikes you immediately is that the capacity of a consumer to keep his identity concealed in the market, enables the consumer to act more effectively and more precisely in this type of negotiation. A consumer could take advantage of a personalised discount pursuant to a loyalty programme, or could choose to remain unnamed, and by so doing avoiding the inconveniences arising from the fact of making the most one is willing to pay known (i.e. the highest sum a consumer is willing to pay). Privacy in this case does not seem capable of protecting a human right, but rather an economic right. I would like to consider another approach based on legal and economic concepts, and this approach concerns the assigning of responsibility. There is a theory called least cost avoider, which simply says that we should assign responsibility to the party implied in the operation which can better minimize the risk. If a person sells a good with a hidden defect that can not easily be discovered by the purchaser, then the law says that the seller is responsible for such defect. Similarly, the law on privacy would say that, from an economic point of view, the responsibility for any further use would fall on the data controller, and not on the person concerned. Why is this? Why is a corporation in possession of personal data the party that can better prevent such item from being misused subsequently. The economic interest aligns with the interest connected to the protection of a human right. Another economic theory is that privacy rules reduce the costs of transactions, as they inform both the seller and the buyer on what the privacy terms in the agreements in question will be. And by reducing the costs of transactions, the markets dealing with the primary product in terms of goods and services, will operate more effectively. Now, there is an interesting corollary on the wish to reduce transaction costs, and it is something we have noted over the last few years. It concerns the growing confusion deriving from privacy policies and reports. Why do self – regulated corporations set forth such complicated declarations on their practices in respect of potential customers? The economic answer is rather simple: they are trying to develop transaction costs, with a view to making it more difficult for the consumer to exercise his right in the transaction in question. So far I have suggested different ideas that we get from the laws of economics on the nature of transactions concerning privacy, and the economic basis of common standards. I would like to give you some more examples on why this approach is useful, and then I would like to say something to put you on guard. I have already mentioned the US experience on the regulation vs. non regulation approach on privacy protection. Please note that the first modern law on privacy in the Unit- M a r c R o t e n b e r g - Collective Rights and Interests: How to Harmonise Approaches and Safeguards 345 ed States, the Fair Credit Reporting Act, which is still from different points of view one of the stricter laws we have in the United States, has brought transparency, accountability and efficiency to the credit reporting industry. In other words, in the absence of this law on privacy, which holds credit reporting agencies responsible for collecting and using credit reports and which gives individuals, whom often could not have access to credits, despite being entitled to them, the chance of ascertaining and correcting these reports – in one word, the markets could not operate effectively, the fact of having to answer in person was lacking, and there was bad information. But privacy has made more rational markets possible. It is a critical approach, I think. I refer to the collection and use of personal information in any market milieu. And now some implications of the economic aspect of privacy protection. Firstly, we are about to see common standards not only from the law profile, but also technologically speaking, as I think it would be effective for both the purchasers and the sellers to find simple ways of dealing with the online milieu. Secondly, I think that we have to be careful when we adopt technical methods requiring consumers to resort to an elaborate set of choices. And here I am thinking of certain protocols having the effect of automating the confusion associated with privacy policies, and introducing a whole set of new transaction costs, which I think should be avoided in everyone’s interest. Lastly, with respect to the development of common standards, I would like to quote a nice analogy concerning cars I heard recently “there should be more technology under the boot and less in the instrument panel”. In other words, these standards should become part of the common protocols to be able to interact in a common online milieu. Now, some words of caution on this approach to privacy protection. First of all, the analysis taken by the reign of economics has suggested many valid instruments. But Posner himself thought that the privacy of an individual is not of great use. In fact, he is quite famous for having opposed any basis – referred to human rights, or legal – to support the privacy of information, as it is commonly meant. Furthermore, in one of Brandeis’ articles written more than a century ago, the author thoroughly considered the matter of whether privacy could be based on a revendication of property ownership rights. This thesis was rejected, firstly because whoever wants to protect his privacy – unlike copy right holders – is not that interested in publishing anything. And secondly the value of privacy probably varies considerably from person to person. So for that reason too, any revendication of property ownership rights is not a good approach. Furthermore, in my opinion, there are many situations where we can easily admit that an economic analysis should not replace an ethical, or legal or moral basis in respect of privacy protection. But I have addressed this aspect today in part be- 346 Da costo a risorsa - Attività produttive e protezione dei dati personali cause I think that in many discussions on privacy, anything that tastes of economics immediately raises the consideration that it is good from the point of view of business cost-effectiveness. If we look closer at some tools provided by the laws on economics, we will find that there are many good economic reasons in the direction of common standards for privacy protection. The conclusion thus is that common standards in respect of privacy protection are not only to be desired for normative reasons, but also to be preferred for economic reasons. And this will be growingly important in the future. I would just like to mention recent developments in the U.S., where, as you probably know, a new project called Total Information Awareness has recently been adopted by our Department of Homeland Security and thoroughly discussed. This project represents an ongoing research effort of our Department of Defence to develop new identification and control systems. I think we should all keep in mind that the reduction in personal privacy resulting from the events of 11 September 2001 is not a surprising and new factor, but the other consequential factor of this event is the increase in the secrecy used by our Government as shown by these programs. Both these factors, considered together, have to be well understood as they represent parallel developments of a similar type. Both privacy reduction and an increase in Government secrecy – I am sorry to say – have recently led to a considerable erosion in civil liberties in the United States. You can find further information on this aspect in our web site (www.epic.org). M a r c R o t e n b e r g - Collective Rights and Interests: How to Harmonise Approaches and Safeguards 347 Investire in privacy per lo sviluppo di nuovi prodotti e servizi Maurizio Costa (1) Sommario: 1. L’impatto della privacy sull’attività d’impresa – 2. I positivi cambiamenti introdotti dalla riforma del 2001 – 3. La legge può servire anche a tutelare la privacy dell’azienda – 4. Le prospettive future del mercato e delle relazioni con i clienti – 5. Il nuovo meccanismo di distribuzione di merci e servizi: dal produttore globale al consumatore individuale – 6. I tre strumenti per riequilibrare i meccanismi di tutela: legge, autodisciplina, tecnologia – 7. L’impegno del mondo delle imprese per favorire lo sviluppo della privacy: il buon esempio di “Cancellami” 1. L’impatto della privacy sull’attività di impresa Vorrei affrontare il tema che mi è stato assegnato con l’approccio pragmatico che un uomo d’impresa applica nella sua attività quotidiana. Svilupperò, perciò, il mio contributo partendo dall’esperienza concreta che la Mondadori, che opera da moltissimi anni nel settore del Direct Marketing, ha potuto maturare. Cercherò inoltre di allargare la prospettiva e di portare non solo qualche spunto di riflessione, ma anche qualche proposta operativa in grado di coniugare l’esigenza di rispondere allo sviluppo dei mercati e l’esigenza di essere assolutamente coerenti con le indicazioni che ci provengono dal sistema normativo. Il mio contributo parte dalla constatazione di ciò che è successo in Italia in questi anni di applicazione della legge sulla tutela dei dati personali e da cosa rappresenta la normativa sulla data protection in relazione ai suoi effetti nella vendita di prodotti e servizi nel continente europeo in generale. La normativa è stata accolta in Italia, un paese che non disponeva di nessuna legge su questo tema, con sospetto e prevenzione da buona parte del mondo imprenditoriale. Periodicamente si alzano voci che ne chiedono con argomentazioni, spesso discutibili, la modifica e la ridefinizione, un passo indietro, quindi, non solo antistorico, ma completamente sbagliato. Si crede che tale legge blocchi le attività economiche, costringendo gli operatori a costosi e fastidiosi adempimenti burocratici. Tuttavia, le osservazioni mosse da parte del mondo imprenditoriale in materia di riservatezza dati sono molto significative. Stabilire dei limiti al libero utilizzo dei dati personali ha indubbiamente un forte impatto nei confronti delle attività di impresa, sia in termini di costi di marketing, sia in termini di costi organizzativi e sia in relazione alle potenzialità di sviluppo delle relazioni con il cliente. Il mio punto (1) Arnoldo Mondadori Editore spa - Italia 348 Da costo a risorsa - Attività produttive e protezione dei dati personali di vista è che questa visione sia eccessivamente pessimistica e che una maggiore riflessione sulla vicenda, peraltro già in atto, consentirà di dare un segno più deciso al pensiero e all’azione di chi è coinvolto sulle tematiche della privacy in Italia. 2. I positivi cambiamenti introdotti dalla riforma del 2001 A seguito delle recenti modifiche attuate alla normativa approvata il 28 dicembre 2001, il tema della riservatezza può essere affrontato con il giusto equilibrio. La privacy potrà diventare davvero una leva per sviluppare il rapporto della comunicazione interattiva, innalzando la soglia di fiducia del cittadino nei confronti delle aziende, senza fare nessuno sconto rispetto all’impostazione originaria. La privacy resta un argomento delicatissimo e trattato con estremo rigore dalle nostre istituzioni, ma ho l’impressione che sia cambiato o stia cambiando l’approccio all’interno delle imprese, diventando più europeo, meglio modulato, meno basato sul formalismo e più sulla sostanza: le sanzioni sono più efficaci, le previsioni di leggi più di buon senso e più facilmente applicabili che in passato ed è inoltre presente un maggiore riconoscimento del ruolo dell’autodisciplina. Attraverso specifiche previsioni di codici deontologici potrà essere inoltre valorizzato il ruolo dei cosiddetti servizi di mail preference, che permettono a chi non vuole ricevere messaggi promozionali di iscriversi in appositi elenchi che dovranno essere obbligatoriamente consultati da chi vuole inviare messaggi indirizzati. Mi riferisco alle cosiddette Robinson lists, uno strumento di grande efficacia e da sviluppare ulteriormente. Inoltre, occorre attribuire il giusto riconoscimento al principio del bilanciamento di interessi, cioè al fatto che in generale il Garante potrà stabilire se il diritto alla riservatezza del singolo debba essere sempre e in ogni caso tutelato attraverso il necessario e previo consenso dell’interessato anche a discapito di un interesse legittimo del soggetto che decide di trattare i dati personali. In pratica, questo principio rappresenta una valvola di sicurezza già esistente in molte legislazioni europee che, se usata con equilibrio, permetterà di evitare applicazioni troppo rigide delle norme che hanno reso troppo spesso la privacy un territorio impervio e ricco di paradossi. Dopo che le nuove regole andranno in porto non ci saranno più scuse: adeguarsi alle normative sulla privacy sarà necessario e possibile. Non dovranno e non saranno ammesse deroghe. È assolutamente importante che le aziende abbiano piena consapevolezza del fatto che un nuovo tassello per l’affermazione della cultura della riservatezza nel nostro Paese si appresta ad esser collocato. Dopo sei anni dall’introduzione della prima legge sulla privacy, queste nuove regole rappresentano una conferma del fatto che si sta procedendo sulla giusta strada, una strada ricca di buoni auspici. Maurizio Costa - Investire in privacy per lo sviluppo di nuovi prodotti e servizi 349 3. La legge può servire anche a tutelare la privacy dell’azienda È compito di noi imprese sottolineare che la privacy non deve essere esaminata solo per evidenziare i limiti, gli aspetti negativi, le problematiche che essa stessa comporta. Essa può essere, al contrario, usata anche per proteggere in modo efficace i dati personali delle stesse aziende e quindi la segretezza delle informazioni che circolano all’interno di realtà complesse. Questo è un aspetto macroscopico che non è mai stato sollevato con la dovuta efficacia dalle aziende e dagli operatori economici. La legge italiana, a differenza di quanto prevedono analoghe discipline straniere e la direttiva comunitaria per la tutela dei dati personali, prevede che possano essere tutelati anche i dati appartenenti a persone giuridiche. L’immediata conseguenza è che, in linea teorica, una società che ritiene di aver subito un trattamento non autorizzato dei propri dati personali o comunque una fuga di notizie relativa alla sua organizzazione interna, potrebbe legittimamente tutelare i propri interessi e rivolgersi ai suoi concorrenti per sapere quali informazioni essi detengano sul proprio conto. In caso di mancata risposta, per l’imprenditore che si ritiene spiato si aprirebbero le porte dell’ufficio del Garante per la Protezione dei Dati Personali o del Tribunale. Lo spionaggio industriale non arricchisce solo le spy stories dei film di successo, ma costituisce un cospicuo strumento anche di guadagni illeciti da parte di alcuni dipendenti disinvolti e non proprio rispettosi dell’obbligo di fedeltà verso il loro datore di lavoro. Questa è una realtà assai diffusa e basterebbe guardare il numero impressionante e la forza di penetrazione dei prodotti gemelli che si affollano sul mercato per concludere che le coincidenze non sono casuali. Bisogna, quindi, riflettere sul fatto che la legge sulla privacy non pone solo limiti, ma offre anche opportunità inesplorate per le aziende. 4. Le prospettive future del mercato e delle relazioni con i clienti Per cogliere tutte le potenzialità che si collegano alla privacy è essenziale rivolgere lo sguardo verso il futuro, guardare allo sviluppo dei valori dell’informazione, della trasparenza e della riservatezza nel nuovo mercato delle vendite a distanza con strumenti telematici. Le caratteristiche essenziali del futuro mercato dei prodotti e dei servizi che, con formula convenzionale, viene ormai comunemente definito elettronico, possono essere descritte da due aggettivi. Il primo aggettivo è, forse banalmente, globale, termine che descrive la dimensione spaziale e anche ideale del mercato di domani, un luogo non più solo fisico, ma anche e sempre più virtuale. Contrariamente al primo, il secondo aggettivo che disegna gli scenari futuri della comunicazione commerciale è individuale, perché il commercio del futuro, sia esso elettronico o no, si baserà sempre più sul- 350 Da costo a risorsa - Attività produttive e protezione dei dati personali la personalizzazione dei servizi e dei prodotti. Questa mia riflessione non deve essere, ovviamente, fraintesa: non credo affatto che, come qualcuno ha sostenuto in passato, ogni individuo è un mercato, ma sono convinto però che ognuno di noi abbia esigenze specifiche e peculiari che è giusto che le aziende provino a soddisfare. 5. Il nuovo meccanismo di distribuzione di merci e servizi: dal produttore globale al consumatore individuale Volendo usare una formula sintetica, credo che il mercato dei produttori e dei fornitori di servizi cesserà di essere un sistema di massa per diventare un articolato e complesso sistema di relazioni individuali, un nuovo meccanismo di distribuzione di merci e servizi dal produttore globale al consumatore individuale. Si tratta di una rivoluzione copernicana iniziata con il boom della new economy che ha prefigurato uno scenario di mercato più finanziario che economico, anche se non ancora maturo. Al di là dei rallentamenti e degli arretramenti di questi ultimi anni, il percorso intrapreso da questo nuovo mercato non può che essere quello di una sempre maggiore e puntuale personalizzazione dell’offerta di beni e di servizi delle aziende. Si tratta, quindi, di una rivoluzione in cui il consumatore è al centro dei messaggi promozionali: sarà sempre più essenziale che chi produce conosca il suo cliente e assecondi i suoi gusti. In tutto è evidente un segno di progresso rispetto alle epoche passate in cui spesso le aziende dovevano indossare i panni anche scomodi di persuasori occulti, di propositori di beni e servizi indifferenziati, a una massa indifferenziata di potenziali clienti. Certo, esistono gravi pericoli di accerchiamento ai danni del singolo, assediato da messaggi mirati e personalizzati; in questo senso l’antico right to privacy potrà costituire un baluardo difensivo importante - tanto più se esso cesserà di essere inteso banalmente come il diritto ad esser lasciati soli, indisturbati - e diventerà il diritto alla autodeterminazione e quindi il presupposto per la libertà individuale. In questa chiave, il Direct Marketing è destinato inevitabilmente ad assumere un ruolo guida nella definizione delle nuove strategie di comunicazione commerciale e anche nell’organizzazione dei meccanismi di vendita. Se questa è la caratteristica del futuro commerciale del mondo, una caratteristica che si affermerà sempre più nel nuovo mercato, diventa essenziale chiedersi con assoluta sincerità che ruolo possono assumere le leggi che dagli anni settanta si propongono di tutelare questo particolare aspetto della privacy che è appunto la protezione dei dati personali. Promuoveranno questo processo o lo affosseranno? La risposta non può essere univoca perché diversi sono gli approcci che su questo tema si offrono all’analisi. Nell’Unione Europea la scelta condivisa dai legislatori di gran parte dei paesi Maurizio Costa - Investire in privacy per lo sviluppo di nuovi prodotti e servizi 351 europei (Regno Unito, Francia, Spagna, Portogallo, Svezia, Olanda, Belgio) fino a non molto tempo fa era nel segno di favorire la libertà del trattamento dei dati, dando all’individuo una sorta di potere di veto per bloccare le operazioni che ritenesse, in astratto o in concreto, lesive della sua riservatezza. In questo quadro normativo il futuro mercato globale poteva agevolmente svilupparsi, permettendo al produttore di entrare in contatto con ogni singolo consumatore. Al contrario l’Italia, capofila di un orientamento ultimamente recepito con crescente interesse anche nel resto d’Europa, ha fatto prevalere la tutela del singolo a scapito delle libere iniziative commerciali. Un simile sistema comporterà una maggiore difficoltà per il mondo imprenditoriale ad affermarsi come interlocutore consapevole delle esigenze dell’individuo e nulla potrà essere fatto senza il preventivo consenso dell’interessato. Il mio punto di vista è che il consenso preventivo sia uno strumento essenziale in alcuni casi, per esempio quando muta sostanzialmente la finalità del trattamento rispetto a quella per la quale il dato personale è stato raccolto; in altre situazioni, invece, il consenso preventivo non serve e chiederlo, conservarlo ed esibirlo diventa paradossalmente una beffa. Il consenso può essere comprato, infatti, anche a basso costo - forse non con la piena consapevolezza della dignità delle persone; anzi, è più facile comprare il consenso preventivo delle persone più deboli e indifese, sia culturalmente che economicamente. La partecipazione ai concorsi a premi, i gadgets, i buoni omaggio, e i carnets di sconto esprimono, con le suadenti note del marketing, questo processo di acquisto consenso. Quindi, ritengo sia interesse delle imprese e di tutta la società comprendere che il consenso è fondamentale, ma deve essere soprattutto un consenso consapevole. La vera partita della tutela della riservatezza, almeno nel settore della comunicazione commerciale, si gioca non tanto sul terreno scivoloso del consenso (sia esso raccolto con tecniche opt-in o opt-out), ma su quello assai più solido dell’informativa trasparente. Se invece ci si concentra solo sul modo in cui il consenso viene raccolto e non ci si preoccupa del livello di informazione dal quale il consenso nasce, la privacy resterà un diritto vuoto. Bisogna quindi studiare con serenità ed efficacia strumenti che permettano di riequilibrare il meccanismo di tutela, proteggendo con efficacia la riservatezza delle persone e, nello stesso tempo, favorendo lo sviluppo della società nella direzione di progresso che le tecnologie e le culture presenti rendono oggi raggiungibili. Non basta proibire per proteggere. Inibire l’attività di trattamento dei dati non elimina il pericolo di abuso, ma rende senz’altro più difficile lo sviluppo del dialogo consapevole tra mercato globale e consumatore individuale. Solo un approccio integrato ai problemi della riservatezza, fatto di norme equilibrate, autodisciplina e strumenti tecnologici può dare slancio all’effettiva protezione dei dati personali in 352 Da costo a risorsa - Attività produttive e protezione dei dati personali un mercato senza frontiere. Queste sono le tre linee di forza da perseguire con coerenza attraverso la collaborazione tra istituzioni, innanzitutto, associazioni di categoria, consumatori, cittadini e imprese. 6. I tre strumenti per riequilibrare i meccanismi di tutela: legge, autodisciplina, tecnologia La legge sulla privacy ha colto un bisogno sociale diffuso: ha dato voce a una domanda di giustizia e trasparenza reale che fino a qualche tempo fa non trovava gli strumenti per farsi sentire. Con una visione allargata del problema è bene chiedersi come può affermarsi la riservatezza individuale di fronte a una società e ad un mercato che pur muovendosi verso la globalizzazione, in realtà mirano sempre di più a stabilire un rapporto diretto con le singole persone: fidelizzazione, one-to-one, permission marketing, sono i termini che identificano una chiara tendenza in atto. In estrema sintesi, sulla base delle esperienze che altre nazioni hanno fatto prima di noi, possono indicarsi tre linee di azione da perseguire con coerenza, attraverso la collaborazione tra istituzioni, Associazioni di Categoria, Consumatori e Cittadini. La prima linea di azione che vi propongo è la specificazione della legge sulla tutela dei dati personali mediante lo sviluppo di singole normative di settore idonee ad adattare le regole generali alle particolarità dei casi (i trattamenti dei dati per finalità di Direct Marketing sono di qualità diversa rispetto a quelli finalizzati ad attività di analisi sociali o di investigazione privata). Le attuali norme rendono assai complesso lo svolgimento di attività comuni e creano dubbi e problemi interpretativi; quindi una prima linea che suggerisco è quella della specificazione. La seconda linea dovrebbe, a mio avviso, essere la promozione effettiva e la valorizzazione da parte del Garante di codici di autodisciplina e di buona condotta per favorire all’interno delle imprese lo sviluppo di una cultura della riservatezza diffusa dal basso nelle singole categorie attraverso le Associazioni di settore. La possibilità di adire singoli Comitati di controllo, seri, indipendenti e competenti permette di realizzare una tutela del cittadino effettiva e poco costosa. La terza linea d’azione è l’introduzione anche in Italia di sistemi di cancellazione centralizzata (il cosiddetto Mail preference o Robinson lists), che permettono ai cittadini che desiderano non ricevere comunicazioni commerciali di comunicare questa volontà ad un Sportello Unico: le singole aziende sarebbero tenute ad accedervi prima di indirizzare le loro comunicazioni commerciali. In questo modo il cittadino non dovrebbe più inviare svariate richieste di cancellazione dei suoi dati personali, ma potrebbe esercitare il suo diritto in modo semplice e immediato. Come dimostra l’esperienza inglese, un efficace strumento tecnico, con un facile accesso attraverso la rete, potrebbe favorire il processo di trasparenza nella comunicazione dei dati per fi- Maurizio Costa - Investire in privacy per lo sviluppo di nuovi prodotti e servizi 353 nalità commerciali e per far valere una volta per tutte il principale tra i diritti che la legge italiana sulla privacy attribuisce all’interessato. Si tratta in definitiva di un’applicazione concreta delle cosiddette Privacy Enhancing Technologies, previste nella direttiva 2000/31/EC dell’8 giugno 2000 sul Commercio Elettronico per utilizzare lo strumento delle e-mail marketing per promuovere le vendite on-line. 7. L’impegno del mondo delle imprese per favorire lo sviluppo della privacy: il buon esempio di “Cancellami” Da circa un anno esiste in Italia un servizio che si chiama Cancellami, che le aziende operanti nel settore del Direct Marketing diretto hanno deciso di sostenere sotto la sigla della AIDiM, l’Associazione italiana di riferimento di questo settore. Si tratta di un servizio che consente, esattamente in analogia con le Robinson lists, di cancellare il proprio nome e non ricevere messaggi, se non desiderati. I motivi che hanno dato origine a questa iniziativa sono tre. La prima è una ragione etica, perché riteniamo che sia giusto stabilire un confine tra l’invadenza della collettività e la sfera personale dell’individuo. La privacy è un presupposto essenziale per poter permettere lo sviluppo della socialità di ognuno di noi. È un baluardo per garantire la libertà individuale e collettiva. La seconda è una ragione normativa, perché il diritto a esercitare un controllo sulle informazioni personali è il risultato di un processo normativo ormai consolidato e non è un caso che la Carta Europea dei Diritti (articolo 8) preveda proprio la protezione dei dati di carattere personale come diritto fondamentale da esercitare secondo questi principi. La terza è una ragione economica. Trattare dati costa molto alle imprese; inviare messaggi promozionali a chi non desidera riceverli è un costo pesante sia in termini materiali (carta, inchiostro, stampa, spese postali, spese telefoniche), sia in termini di gestione (si tratta di operazioni complesse). È intuitivo che le aziende non desiderano spedire messaggi promozionali a chi non vuole riceverli, li considera inutili, fastidiosi, non li legge o li cestina appena ricevuti. Le aziende per prime hanno, quindi, interesse a sapere quali sono le persone che non desiderano ricevere informazioni promozionali, risparmiando tempo e denaro. Mettendo insieme queste tre motivazioni è nata la necessità, etica ed economica insieme, di creare uno strumento agile ed efficiente per dare concretezza alle esigenze delle singole persone che non vogliono essere disturbate con comunicazioni commerciali o di raccolta fondi a loro indirizzate, rendendone l’attuazione compatibile con il regolare e fluido svolgimento delle attività economiche. Il servizio è assolutamente gratuito per i cittadini che decidono di avvalersene, mentre le aziende che aderiscono al servizio coprono i costi di gestione. Mi sembra che questo sia un 354 Da costo a risorsa - Attività produttive e protezione dei dati personali esempio positivo del modo in cui le aziende possono farsi carico della privacy, offrirla come servizio aggiuntivo per i propri clienti e rendere effettivo il passaggio dal mercato di massa al mercato individuale. L’auspicio è che il sistema italiano adotti soluzioni che altre nazioni europee hanno o stanno adottando, integrando la legge, l’autodisciplina e la tecnologia. Credo che questo sia un modo corretto per aiutare a mettere ordine negli archivi polverosi dei diritti insoddisfatti e a non aver paura del futuro, guardando verso la nuova frontiera della società e dei mercati globali e individuali. La privacy è un diritto vitale, multiforme, dinamico e in continuo divenire; è il presupposto stesso per l’affermazione dei nostri diritti sia nel mercato reale sia nel mercato virtuale. Per questo è essenziale favorire lo sviluppo della normativa sulla privacy utilizzando tutti gli strumenti a disposizione: legge, autodisciplina, tecnologia e soprattutto tanto buon senso. Maurizio Costa - Investire in privacy per lo sviluppo di nuovi prodotti e servizi 355 Investing in Privacy to Develop New Products and Services Maurizio Costa (1) Contents: 1. The impact of privacy on business – 2. Positive changes introduced by the 2001 reform – 3. The Law can also be used to protect corporate privacy - 4. The market’s future prospects and relations with customers – 5. The new distribution mechanism of goods and services: from global producers to an individual consumer – 6. The three tools to rebalance the protection mechanism: law, self-regulation, technology - 7. Corporate commitment in favour of privacy development: “Cancellami’s” good example 1. The impact of privacy on business I would like to deal with the theme I have been assigned with the pragmatic approach used by a businessman in his daily activities. Consequently, I will start by talking about Mondadori’s experience, developed over the years in the field of Direct Marketing. I will also try to enlarge the perspective, suggest some ideas to think over, and make some operational suggestions to meet the markets’ development and the need to be absolutely coherent with current legislation. First of all, I will deal with the Italian situation in recent years, since the entry into force of the law on personal data protection, and then I will consider the effects of data protection legislation on the sale of products and services in the European continent in general. Italy had no legislation in this field, and the new law was perceived with suspicion and prejudice by a large share of the business world. Periodically, voices have arisen asking for its amendment and redefinition, often on questionable grounds. Thus a step backwards, which not only is anti-historical, but completely wrong. Said law is believed to hamper economic activities, obliging businessmen to comply with costly and burdensome bureaucratic procedures. However, the remarks made by the business world on privacy are very important. Any limitation in the use of personal data undoubtedly has a strong impact on business, both in terms of marketing and organisational costs and in terms of the development potentialities of relations with customers. In my opinion, this view is excessively pessimistic and a more thorough consideration of the matter, which in fact is in progress, will enable those concerned with privacy in Italy to reconsider their views. (1) Arnoldo Mondadori Editore s.p.a. - Italy 356 Da costo a risorsa - Attività produttive e protezione dei dati personali 2. Positive changes introduced by the 2001 Reform Following the introduction of recent amendments to the Law of 28 December 2001, the subject of privacy can be faced on the right footing. Privacy will be able to become an incentive for the development of interactive communication, by increasing the trust of citizens in corporations, without waiving its original approach. Privacy remains a very delicate issue and is dealt with extreme rigour by our institutions. However, I have the impression that the approach of corporations has changed, or is changing. It is becoming more European, better modulated, less based on formalism and more on substance: sanctions are more effective, the law provisions more sensible and more easily applicable than in the past. Furthermore, the role of self-regulation is increasingly acknowledged. Furthermore, specific provisions of deontological codes will enhance the role of the so-called mail preference services, whereby those who do not want to receive promotional messages can enter their names in special lists that will obligatorily be consulted by whomever wants to send addressed messages. I am referring to the socalled Robinson lists, a very effective tool that has to be further developed. In addition, the right importance has to be given to the balance of interests principle, i.e. to the fact that in general the data protection authority will be able to decide whether the right to privacy of an individual should always and in every case be protected through the necessary prior consent of the person concerned also to the detriment of the legitimate interest of the entity deciding to process the personal data. In practise, this principle is a security valve provided for in many European legislations that, if used in a balanced way, will prevent the rules from being applied too strictly, and thus, more often than not, turning privacy into an inaccessible territory full of paradoxes. When the new rules become effective, there will be no more excuses: to abide by the privacy law will be essential and possible. No departures from said rules will be allowed. It is absolutely important for corporations to be fully aware of the fact that a new piece is about to be placed in the direction of affirming the culture of privacy in our country. Six years after the introduction of the first privacy law, these new rules confirm the fact that we are on the right road, a road full of good omens. 3. The law can also be used to protect corporate privacy Corporations have the duty to stress the fact that we must not talk of privacy only to pinpoint its limits, negative aspects, and relevant problems. On the contrary, it can be used to effectively protect the personal data of corporations themselves, and consequently the secrecy of information moving inside complex milieu. This is a macroscopic aspect that has never been raised as effectively as it Maurizio Costa - Investing in Privacy to Develop New Products and Services 357 should have by corporations and economic operators. The Italian law, unlike similar laws in other countries and the community directive on personal data protection, also provides for the protection of data concerning legal persons. The immediate consequence of this is that, in theory, when a corporation discovers that its personal data has been processed without authorisation or in any event information concerning its internal organisation has been used by unauthorised entities, it could legitimately protect its interests by asking its rivals what information on the corporation they have. If there is no answer, a businessman who thinks he is being spied, could turn to the Personal Data Protection Authority or the Court. Industrial espionage does not only colour the spy stories of successful movies, but is also a way for impudent and disloyal employees to gain unlawful profits. This is quite common, and it is enough to see the impressive number of twin products crowding the market to conclude that they are not chance coincidences. We should, thus, ponder on the fact that the privacy law does not only set restraints, but also offers corporations unexplored opportunities. 4. The Market’s future prospects and relations with customers In order to take advantage of all the potentialities linked to privacy, we have to look ahead, to consider the development of information values, and the transparency and privacy of the new market of remote telematic sales. There are two adjectives that describe the essential characteristics of the so-called electronic, future, market of products and services. The first adjective is, perhaps trivially, global. It is a term that describes the spatial and even ideal scope of our future market: a place that is not only physical, but also and growingly virtual. Contrary to the first term, the second adjective depicts the future scenario of commercial communication and is individual, because future commerce, both electronic and not, will be increasingly based on the personalisation of services and products. I don’t want to be misunderstood: I don’t believe at all that, as someone has said in the past, every individual is a market, but I am convinced that each one of us has specific and peculiar needs that corporations should rightfully try to satisfy. 5. The new distribution mechanism of goods and services: from global producers to an individual consumer. To say it in a few words, I think that the market of service producers and providers will stop being a mass system and will become an articulated and complex system of individual relations, a new distribution mechanism of goods and services 358 Da costo a risorsa - Attività produttive e protezione dei dati personali from global producers to an individual consumers. It is a Copernican revolution launched by the booming new economy, which envisages a financial rather than economic market - even if not fully developed yet. Beyond the slowdowns and drawbacks recorded in recent years, the road taken by this new market can only be that of an ever-growing and detailed personalisation of the corporations’ offers of goods and services. Consequently, it is a revolution where consumers are at the centre of the promotional messages: it will be growingly fundamental for producers to know their customers, and satisfy their tastes. Progress has been made compared with the past, when corporations often had to play the unfortunate role of hidden persuaders, prompters of undifferentiated goods and services to an undifferentiated mass of potential customers. Certainly, individuals run the risk of being encircled and besieged by targeted and personalised messages; in this regard the old right to privacy will constitute an important defensive stronghold – all the more if it stops being banally intended as the right to be left alone and undisturbed – and becomes the right to self-determination and thus the condition for individual freedom. In this regard, Direct Marketing will inevitably take on the leading role of defining the new commercial communication strategies and organising the sale mechanisms. If this is the characteristic of the world’s commercial future, and ever more so of the new market, we will have to sincerely ask ourselves what will be the role played by the laws that have aimed at protecting this particular aspect of privacy, i.e. personal data. Will they foster or shelve this process? There cannot be an univocal answer as there are different approaches to this issue. Within the European Union, until recently the legislators of most European countries (United Kingdom, France, Spain, Portugal, Sweden, Holland, Belgium) supported the freedom in data processing, giving the individual a sort of authority to veto the operations abstractly or concretely considered as detrimental to his privacy. This legal framework could favour the development of the future global market and enable producers to get in contact with every individual consumer. On the contrary, Italy, the leader of a recently developed approach - of growing interest also in the rest of Europe - has favoured the protection of individuals to the detriment of free commercial initiatives. In a similar system, it would be more difficult for corporations to meet the needs of the individual and operate without the prior consent of the person concerned. My point of view is that prior consent is an essential tool in some cases, for example when the objective of data processing changes completely compared with the one for which the personal data was collected; in other cases, instead, prior consent is not required and to ask for it, keep it and show it, paradoxically becomes a farce. Consent may be bought, in fact, and even at a low cost – perhaps not with the full Maurizio Costa - Investing in Privacy to Develop New Products and Services 359 awareness of the dignity of individuals; in fact, it is easier to buy the prior consent of both culturally and economically weaker and defenceless individuals. The competitions with prices, the gadgets, the gift tokens, and the discount tickets are examples of the persuasive notes used by marketing to purchase prior consent. Consequently, I think that it is in the interest of corporations and society as a whole to understand that consent is fundamental, and especially that it has to be a conscious consent. The real data protection game, at least in the field of commercial communication, has to be played not so much on the slippery ground of consent (whether collected with opt-in or opt-out techniques), as on the more solid one of transparent information. If corporations only concentrate on the way in which consent is collected and are not concerned with the level of information giving rise to the consent, then privacy will remain a void right. We have to serenely and effectively develop tools to rebalance the protection mechanism, by effectively protecting the privacy of individuals and, at the same time, fostering the development of our society in the direction of the progress made possible by existing technologies and cultures. Prohibition is not sufficient to ensure protection. The hindrance of data processing activities does not exclude the danger of abuse and certainly makes the development of a dialogue between the global market and individual consumers more difficult. Only an approach taking account of the privacy problems, made up of balanced rules, self-discipline and technological tools can give momentum to effective personal data protection in a market without frontiers. These are the three guidelines to follow with coherence through the co-operation between institutions, in the first place, and then between trade associations, consumers, citizens and corporations. 6. The three tools to rebalance the protection mechanisms: law, self-regulation, technology The privacy law has reflected a far-ranging social need: it has given voice to a request for justice and real transparency that had not yet found a way of making itself heard. By giving the problem a broader scope, we should ask ourselves how individual privacy can affirm itself in a society and a market that although moving towards globalisation, in fact growingly aim at establishing a direct relation with individual persons: promotion of customer loyalty, one-to-one, permission marketing, are the terms that clearly identify the ongoing trend. In short, in the light of the experience gained by other countries before us, we can identify three guidelines that have to be pursued with coherence, through the co-operation between institutions, trade associations, consumers and citizens. The first guideline I am suggesting is the specification of personal data protec- 360 Da costo a risorsa - Attività produttive e protezione dei dati personali tion laws through the development of individual laws that can adjust the general rules to particular cases (data processing for direct marketing purposes are different in quality than those aimed at social analysis or private investigation activities). Existing rules make it very complex to conduct joint activities, nurture doubts and interpretation problems; so the first guideline I suggest is that of specification. The second guideline, in my opinion, should be for the Data Protection Authority to effectively promote and enhance the corporations’ codes of practice and good conduct to favour the diffusion of the privacy culture from the grassroots of individual categories, through the trade associations. By resorting to individual, serious, independent and competent control authorities, citizens could be protected in an effective and inexpensive way. The third guideline consists in introducing centralised deleting system (the socalled mail preference or Robinson lists) in Italy as well. Under this system, a citizen would only have to inform a Single Office that he does not want to receive commercial notices: individual corporations would then have to refer to these lists before addressing their commercial notices. By so doing, a citizen would not have to send various requests for deleting his personal data, but would be able to exercise his right in a simple and immediate way. As the British experience shows, an effective technical tool easily accessible through the net can favour the transparency process in data communication for commercial purposes and, once and for all, help wield the major right protected by the Italian privacy law. Basically, we are talking about a concrete application of the so-called Privacy Enhancing Technologies provided for in Directive 2000/31/EC of 8 June 2000 on Electronic Trade, on the uses of the e-mail marketing instrument to promote on-line sales. 7. Corporate commitment in favour of privacy development: “Cancellami’s” good example A service called Cancellami was set up in Italy about a year ago by the corporations operating in the field of Direct Marketing, under the aegis of AIDiM, the Italian reference Association in this field. Cancellami is a service whereby, like the Robinson lists, one can delete one’s name and thus not receive unwanted messages. There are three reasons why this service has been set up. The first is an ethical reason, because we believe that there should be a boundary between our community’s intrusiveness and an individual’s personal sphere. Privacy is an essential condition for developing the sociality of each one of us. It is a stronghold ensuring collective and individual freedom. The second reason concerns the law, as the right to exercise control over personal data results from a well-developed law, and it is not by chance that the Euro- Maurizio Costa - Investing in Privacy to Develop New Products and Services 361 pean Charter of Rights (Article 8) provides for the protection of personal data as a fundamental right to be exercised under the principles it sets forth. The third reason is economical. It is very expensive for corporations to process data; to send promotional messages to individuals who do not want to receive them is very costly both in terms of the materials (paper, ink, print, posting cost, phone cost) and in terms of the management (they are very complex operations). One can easily understand that corporations do not want to send promotional messages to persons who do not want to receive them; they are useless, annoying, they are either not read or thrown away as soon as they are received. Corporations are thus the first to be interested in knowing the persons who do not want to receive promotional messages, thus saving time and money. These three reasons put together have given rise to the ethical and economic need to develop an agile and effective tool to meet the needs of those persons who do not want to be disturbed by commercial or fund collection communications, and have made the satisfaction of that need compatible with a regular and fluid operation of the business activities. The service is free for the citizens who decide to use it, while corporations have to pay for it. I think that this is a good example of the way in which corporations take privacy on themselves, provide it as an additional service to its customers and implement the passage of a mass market to an individual market. We hope that the Italian system will adopt solutions that other nations adopted or have adopted, integrate its law, self-regulation and technology. I think this is the right way to help put order in the dusty archives of our unsatisfied rights and to face the future without fear, looking ahead at the new frontier of our society and the global and individual markets. Privacy is a vital, multiform, dynamic and ever-developing right; it is the condition itself for affirming our rights both in the real and virtual markets. In view of this, we have to foster the development of the privacy law using all the available tools: laws, self-regulation, technology and especially common sense. 362 Da costo a risorsa - Attività produttive e protezione dei dati personali Growth Expectations for a Global Marketplace That is Mindful of Individuals Mozelle W. Thompson(1) Good afternoon. I would like to thank Chairman Rodotà and members of the Commission for sponsoring this important conference. We have heard a variety of different views and approaches to the issue of privacy protection, and its has been helpful for me to learn more about the Italian experience. The Conference Organizers have asked me to address the topic of Growth Expectations for a Global Marketplace that is Mindful of Individuals. In America we might call this Creating an Individual-Friendly Global Marketplace. This is a somewhat difficult topic to address, partly because I have no crystal ball to predict the future, and partly because I have learned that it is dangerous for senior government officials to make public predictions. Notwithstanding my reservations, I have had an opportunity to observe consumer and government issues around the world from my work as president of the International Marketing Supervision Network [IMSN] and as chair of the OECD Committee on Consumer Policy. So perhaps I can share some of my observations and give you some insight about future issues. Before I begin, my General Counsel requires that I provide you with the same statement that you heard yesterday from Commissioner Swindle – that my comments today are my own and do not necessarily reflect the views of the Commission or any of the other Commissioners. At the outset, I would say that an “individual-friendly global marketplace” is one that has a foundation that places the consumer at the center of its “value proposition.” In other words, it is a market that recognizes the importance of providing consumers with a basket of tools that provide consumers with a means to feel safe and confident to participate in the marketplace. Among those tools are rights and remedies that can protect them from harm harm that can result from fraud, deception, security breaches [an area where my colleague Commissioner Swindle has done excellent work with the OECD], and privacy violations. And these tools can be exercised by government, businesses [in the form of self regulation] and consumers themselves. There are two reasons that this perspective is more important now than at any other time. First, it is no secret that most Western economies are experiencing a period of economic distress. It has also been said that consumer spending repre(1) Federal Trade Commission – Usa M o z e l l e W . T h o m p s o n - Growth Expectations for a Global Marketplace That is Mindful of Individuals 363 sents 80% of the American economy. In France, it is 50% and other European countries fall somewhere in between. A small change in consumer confidence, up or down, can have a significant impact on and country’s economy. As a result, government and businesses alike are focusing on the importance of consumer spending and consumer confidence in maintaining economic health and stimulating future economic growth. While there has been relatively little hard economic study that connects privacy to consumer confidence, many commentators have claimed that consumer privacy concerns result in a failure to achieve billions of dollars in potential sales in the electronic marketplace. Second, one of the important byproducts of globalization and deployment of the Internet is that markets have become more “demand driven.” Because consumers can have easy access to information, consumers can rapidly move their money to many different places. Consequently, they have a greater expectation that their merchants and their governments will be more responsive to their individual demands. Privacy has to be viewed in this context. Although we all have been somewhat self absorbed about the principles of privacy, how we actually deliver privacy depends on how we: - manage consumer expectation - and we have all a long way to go on that front; - define what constitutes “value” for purposes of privacy; and - determine how we measure success. Ideally, we provide guidance through our own combination of laws, rules, and self-regulatory programs. But, there is no “one size fits all” approach to this issue, nor is there a magic answer. Moreover, neither government, consumers nor industry can address these questions alone. Now, I know what some of you are thinking, that I am taking a typically Anglo-Saxon approach because I am focusing on the practical. I most often hear this statement when someone is implying that Americans have no principles. That is not true. What I am saying is that we all have to be measured by what our citizens experience, and none of us have been perfect in this regard. Let me tell you why. First, we need to build a foundation based upon consumers who understand what is reasonable, and not reasonable, to expect in terms of privacy. This foundation is a cornerstone for a demand driven market that measures companies based on how they respond. These consumer expectations need to be considered within the bundle of concerns that we term consumer confidence. This must be done, not because that is the way we in the United States or in Italy consider privacy issues, but because that is the way most of the public experiences privacy issues. We also need to use our expertise to tell industry and governments about what 364 Da costo a risorsa - Attività produttive e protezione dei dati personali we think is appropriate and inappropriate behavior, including providing incentives for innovation – technological or otherwise. And, when industry or government fails to live up to the expectations and requirements imposed through those means, we need to take appropriate enforcement action. That action should not only include the typical government tools of fines, penalties, injunctions and public embarrassment, but should also allow for more creative solutions in appropriate cases that enable wrongdoers to become models for improved practices. So, the question isn’t really what we can expect from an individual friendly global marketplace, but how we create one and ensure that it continues to exist — and in the context of this conference’s topics, how the issue of privacy plays a role in ensuring the development of consumer confidence. Let me take a minute to talk about my experience with this issue. Although you heard something about this yesterday, my personal views might be slightly different than those expressed yesterday by my colleague Commissioner Swindle. It is no secret that the United States and Europe have different approaches to the issue of data privacy. Most countries in the European Union have broad-based privacy laws, while we take a more sectoral approach. However, work done by Consumers International illustrates that: “Despite tight EU legislation in this area, researchers did not find that [Web] sites based in the EU gave better information or a higher degree of choice to their users than sites based in the US” While there has been similar criticism of Web sites in the United States, Consumers International found that “US-based sites tended to set the standard for decent privacy policies” and that US-based most popular sites were the most likely to have a privacy policy and were more likely to post that policy in an easily accessible place. I believe this statement is accurate. Although I have publicly suggested that America’s on-line consumers would benefit from some Federal law that would allow us to address the “holes in our Swiss cheese,” [e.g. companies who are not providing consumers with data protection or otherwise governed by Federal Law], European criticism of the US privacy approach fails to take into account our record of effective prosecution. You heard something about that record yesterday, but to give you further information: To date, the US Federal Trade Commission has brought approximately 255 Internet cases and handled 31 matters with a privacy component. In addition, 279 companies have self-certified under the US-EU Safe Harbor. As the US FTC has undertaken strong enforcement action, we have also spent a great deal of time publicly discussing our cases in order to build consumer de- M o z e l l e W . T h o m p s o n - Growth Expectations for a Global Marketplace That is Mindful of Individuals 365 mand for privacy. Consequently, as consumers have increasingly demanded privacy protection, industry has responded. This visible enforcement activity, clearly has a dual purpose: (1) to send a message to industry about what is acceptable conduct, and in so doing shape the marketplace; and (2) to educate consumers about what they should reasonably expect in the marketplace. In conjunction with strong enforcement, there is a need to educate consumers and businesses as to why privacy is a value – government saying so is not enough. As more people know about privacy, consumer demand will help drive the marketplace. Privacy must be something that consumers understand and that businesses know must be included as part of the value proposition. In a global marketplace it is important for all of us to work together, while at the same time to recognize that countries have different legal and value systems and therefore approach problems differently. Our differences, however, should be valued and we should learn from each other in order to benefit consumers around the world. When we build a global marketplace that recognizes all elements that are important to the consumer, including privacy, we will have an individual-friendly global marketplace that realizes the great potential it has for all of our citizens. 366 Da costo a risorsa - Attività produttive e protezione dei dati personali The Privacy Resource Spiros Simitis (1) I was especially intrigued by the word “resource” in the title of this Conference. Indeed, I decided to look it up in an English dictionary to find the precise definition, which includes many different meanings such as device, supply, riches, but also ingenuity and inner force. I think that, especially after listening to the presentations in these two days, all these definitions apply to a different extent. My first consideration regarding the issue at stake has to do with the approach adopted to address it. In my opinion, we should avoid using obsolete tools to cope with an issue that has wholly different features compared with those one might have descried, say, thirty years ago. Thirty years ago one could reasonably argue that the right to privacy was one facet of personality rights. I think it is high time we relinquished these views, because otherwise we are in danger of admitting that privacy rights may or actually must be placed in parallel with other rights – such as ownership. In fact, as pointed out by Stefano Rodotà a few minutes ago, we are not dealing with personality rights. We have to do with a wholly new legal approach, and this was explained most clearly by the German Constitutional Court in 1983 – when they ruled that respect for private life, and awareness of the ways in which personal data are used are a fundamental prerequisite for any democratic society. Therefore, in debating privacy we actually discuss the structure of our society – and leniency in the application of the rules on personal data will undermine any democratic society. It is not a matter of striking the right balance; there can be no balance when you have to do with data protection, as this is one of the fundamental prerequisites for our societies. This is all the more evident if we consider that, firstly, today we are not deliberating whether to collect certain data – as was the case in the ‘70s, when scholarly papers on privacy started being published – but rather how to use the data that have already been collected; and secondly, that there is no longer any distinction to be drawn between public and private entities, as public entities often avail themselves for their purposes (such as preventing and detecting crimes) of devices and tools that had been originally developed by private entities for private purposes. Therefore, we should bear in mind that any privacy rules to be developed will have to take account of the possible implications related to their implementation in a democratic society. Thus, I think that the key issue is nowadays, how to possibly deny access to (1) Frankfurt University - Germany Spiros Simitis - The Privacy Resource 367 data that are already available. And I believe that the solution, if any, can only be found by re-considering the very core of the rules applying to data protection. This means, firstly, that there should not be any use of personal data unless there are no available alternatives. Therefore, no a priori data collection is to be allowed: it is necessary to prove that the data are necessary for the specific purposes to be achieved, and that the purposes in question may only be attained by using personal data. Such an approach postulates the existence of an independent control entity as well as of clear-cut rules on purposes and mechanisms of use. Secondly, I think that special attention should be paid to the ever-growing practice of marketing personal data. We all are aware of this, and a look at the Internet is enough to realise that you can buy practically any personal data you may wish at a reasonable price. But this commodification of personal data is against the very nature of the fundamental rights involved. You cannot talk about benefit-sharing in this sector – as has been done with regard to the collection and use of genetic data in some countries. Thirdly, the approach based on the opt-out mechanism has always been quite popular in connection with data protection, and has recently been advocated also in respect of the collection of genetic data by “biobanks” – which might be enabled to “buy” a person’s genetic data unless the person in question “opts out”, i.e. objects to this type of processing. The point is, how can one object? This is nowhere explained very clearly. Based on these considerations, I think it is high time we decided whether we are to consider consent as important as it was in the past. Or rather, we should reconsider the way the consent requirement is applied in respect of the processing of personal data. We are faced with a situation in which what matters are no longer the data, but the context of their use. This means we should change our way of thinking and simply set out a few truly unambiguous, binding principles that can then be applied to the specific context. And, what is then the outcome, if any, of our meeting? It seems clear to me, further to what has been said so far, that self-regulation is indeed essential – but only up to a certain extent. We do not need conventional self-regulation; rather, we should think of what has been termed “regulated self-regulation”. Which means that any code developed, for instance, by a corporation or trade association (and in Italy there are excellent examples in this regard) should be submitted to the supervisory authority and only become applicable after being evaluated and approved by the authority. Regulated self-regulation is an elementary component of a new concept of data protection, as no law-making body can impose extensive and apparently comprehensive regulations in this area – necessary though they may be – without deal- 368 Da costo a risorsa - Attività produttive e protezione dei dati personali ing with an endless list of details and thus severely endangering its credibility. For precisely this reason self-regulation is obviously helpful. We nevertheless must elaborate a new concept in which self-regulatory approaches are integrated – keeping in mind that this integration does not mean replacing binding regulatory principles, in respect of which (let me say it once again) no balancing is admissible. Thus, there may indeed be cases in which the duty to provide information to third parties is directly applicable, for instance as regards the police or judicial authorities. At the same time, however, there should be little doubt that any limitation on the information to which data subjects are entitled must be compensated for by the intervention of an independent authority – which has to verify and check whether, for instance, the relevant requirements have been met as formally stipulated. Thank you for your attention. Spiros Simitis - The Privacy Resource 369 AVVISO PER I LETTORI (art. 13 Codice in materia di protezione dei dati personali, d.lg. 30 giugno 2003, n. 196) I nominativi e gli indirizzi utilizzati per inviare questa pubblicazione sono trattati con strumenti anche informatici (senza una loro particolare elaborazione), non verranno comunicati a terzi e saranno utilizzati solo ai fini dell’invio. L’interessato potrà rivolgersi in ogni momento al Garante per la protezione dei dati personali (Roma, Piazza di Monte Citorio n. 121, fax: 06 69677785, e-mail: [email protected]) per verificarli o farli integrare, aggiornare o rettificare e/o per esercitare gli altri diritti previsti dalla normativa in materia di protezione dei dati personali (art. 7 del Codice in materia di protezione dei dati personali, d.lg. 30 giugno 2003, n. 196). Stefano Rodotà, Presidente Giuseppe Santaniello, Vice Presidente Gaetano Rasi, Componente Mauro Paissan, Componente Giovanni Buttarelli, Segretario generale Redazione Garante per la protezione dei dati personali Piazza di Monte Citorio, 121 00186 Roma fax 06 69677785 www.garanteprivacy.it www.dataprotection.org e-mail: [email protected] Pubblicazione della Presidenza del Consiglio dei Ministri Dipartimento per l’informazione e l’editoria Direttore: Mauro Masi Via Po, 14 - 00198 Roma - tel. 06 85981 Stampa e distribuzione: Ufficio grafico dell’Istituto Poligrafico e Zecca dello Stato presso il Dipartimento per l’informazione e l’editoria Piazza di Monte Citorio, 121 00186 Roma www.garanteprivacy.it www.dataprotection.org Progetto grafico: Vertigo Design CONTRIBUTI Da costo a risorsa Da costo a risorsa L A TUTEL A DEI DATI PERSONALI NELLE AT TIVITÀ PRODUT TIVE Questo volume si propone di valutare l’impatto della tutela dei dati personali nell’attività delle imprese e quale funzione essa può svolgere nell’economia dei mercati aperti. L’approccio vuole essere di natura di- A cura di Gaetano Rasi namica e non statica, nonché di confronto fra indirizzi ed esperienze diverse. Il volume è ripartito in quattro sessioni: la prima tratta della tutela dei dati personali nel mercato globale; la seconda della libertà di impresa e del diritto alla riservatezza; la terza della tutela dei dati personali nel rapporto tra impresa, utenti e consumatori e la quarta indica la nuova frontiera della privacy come risorsa per lo sviluppo economico. www.garanteprivacy.it