Pages

Sunday, June 21, 2015

Data Destruction


Our class readings this week included an article that considered whether web sites that provide mugshots from local arrest records are an ethical way for newspapers to raise money to support traditional reporting (Grabowski and Yeng in Heider and Massanal, 2012).  One of the issues raised by the article was the question of the persistence of the records. Specifically, does the publisher of the mug shot web site have the responsibility, to the community at large and to the owners of the mugs, to update these records with follow-up information on the arrest? Were the charges dropped? Was there a conviction?  Was it a wrongful arrest?, etc.

Fingerprint
By MetrĂ³nomo (Own work) [CC BY-SA 4.0-3.0-2.5-2.0-1.0
(http://creativecommons.org/licenses/
by-sa/4.0-3.0-2.5-2.0-1.0)], via Wikimedia Commons
In another article this week (brought to my attention by Cathy’s Diigo post) I read about the extra-serious scenario where the holder of personal data (like an employer) suffers a data breach and what is lost are not passwords and credit card numbers, but VERY personal, permanently connected data like fingerprints or iris scans (Jaeger, 2015). For me, this was an eye opener. I’ve never thought of my credit card number as an integral part of myself or my identity.  Mine has been stolen multiple times. You change it and move on. But my fingerprints? Theft of data about my fingerprints would have very practical, very permanent and probably very psychological implications. 


Together these two articles made me wonder about what practices and policies surround the destruction of our personal data after it is collected, coded and used to identify us. We all know that our personal data can have a life of its own after it has been published, shared or reposted. And in these cases data destruction is not within our grasp. But what about what we don’t choose to share? What about information that is collected from us?

Protecting companies’ data is the focus of many of the data destruction services offered online and that is certainly an important link in the chain of my data’s life cycle. If businesses are clearing my old data carefully from their databases and hard drives, that protects me as well as them. But, as an individual, do I really have to monitor the dispersion of my information personally? Am I responsible for monitoring the reliability of every company that holds a password file for me or has my thumbprint?

As I looked for some reassurance in the form of guidelines for data destruction policies I was led to several “best practices” recommendations, but no actual policies. The U.S. Department of Education’s Privacy Technical Assistance Center (PTAC) has a detailed guidelines document that distinguishes among various levels of information sensitivity and recognizes the difficulty of identifying specific destruction techniques in an evolving, cloud-based, multi-backup system (PTAC 2014). The document focuses on the responsibility that schools have for caring for students’ personally identifiable information (PII) and includes recommendations for data destruction specifically as part of the lifecycle of collected data. There are also efforts by the U.S. Department of Commerce’s National Institute of Standards and Technology to set standards for the collection of PII (McCallister, Grance & Kent, 2010). This document recommends the use of strict standards of necessity in the collection of data, but offers less specific information about getting rid of collected data once it is no longer needed.

Heider, Don & Massanaal, Adreienne, L. (Eds.). (2012). Digital Ethics Research & Practice. New York, NY: Peter Lang Publishing Inc.

Jaeger, J. (2015). Managing Data Security and Privacy Risks 2.0. Compliance Week, 12(136), 56-59. 

McCallister, E., Grance, T., & Kent, K. (2010). Guide to protecting the confidentiality of Personally Identifiable Information (PII) [electronic resource] : recommendations of the National Institute of Standards and Technology / Erika McCallister, Tim Grance, Karen Scarfone. Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2010].

Privacy Technical Assistance Center, U.S. Department of Education, Best Practices for Data Destruction. (2014). Retrieved from: http://ptac.ed.gov/sites/default/files/Best%20Practices%20for%20Data%20Destruction%20%282014-05-06%29%20%5BFinal%5D.pdf