Government Access to Mobile Phone Data for Contact Tracing

Page created by Dwight West
 
CONTINUE READING
Government Access
to Mobile Phone Data
for Contact Tracing
A Statutory Primer
By Harsha Panduranga and Laura Hecht-Felella with Raya Koreh               PUBLISHED MAY 21, 2020

I
    n an effort to contain the coronavirus, companies           but constraints on other entities that collect similar infor-
    and governments across the globe are developing             mation are markedly weaker. Aggregate data that does
    technological tools to trace its spread. Many of these      not explicitly divulge individuals’ locations, identities, or
tools seek to monitor individuals and groups in order to        associations is subject to even fewer limitations, despite
help identify potential carriers of the virus, alert people     evidence that it can sometimes be disaggregated and
who may have been infected, flag places that may be at          de-anonymized.4
high risk, and measure the impact of public health initia-         Moreover, there are few limits on the sharing of loca-
tives such as social distancing directives. While proposals     tion information among government agencies.5 Instead,
run the gamut from analyzing networked thermometer              several laws promote government-wide information shar-
data nationwide to deploying remote heat sensors for            ing.6 For example, location data collected by the U.S.
fever detection,1 in the U.S. attention is focused mostly on    Department of Health and Human Services (HHS) for the
using location or proximity data produced by cell phones        ostensible purpose of combating the coronavirus might
to track movements and interactions at both the individ-        easily be shared with local governments, other federal
ual and population levels.2                                     agencies, or law enforcement.7
   Many of these tools are being developed by the private          Any effort to use location or proximity tracking must
sector, but the federal government and state governments        compensate for the lack of a regulatory framework that
are clearly interested in influencing their design and          protects Americans’ civil liberties. As the Supreme Court
accessing the data they generate.3 At the same time, the        has repeatedly recognized, location information can
patchwork of laws governing the disclosure of location          reveal intimate details of a person’s life, including visits
data to the government — by cell phone companies,               to a lawyer, psychiatrist, specialized health clinic, or reli-
smartphone application developers, data brokers, indi-          gious site.8 Absent meaningful safeguards, government
viduals, and others — does not adequately protect Amer-         collection of revealing information might infringe on core
icans’ privacy. Cell phone carriers are fairly heavily          civil liberties such as freedom of association and freedom
regulated when it comes to individually identifiable data,      of expression, especially if the data is misappropriated.

1                                  Brennan Center for Justice at New York University School of Law
The government’s use of location or proximity data also      ises not to disclose particular types of data. But it can only
raises equity concerns. In the United States, one out of        be enforced by the federal government itself, which is
every five adults does not own a smartphone — with older        unlikely to happen where it is the federal government
and low-income Americans representing a disproportion-          seeking the data (see sidebar on p. 5). The main types and
ate share of those without such a device.9 Using location       sources of location and proximity data, as well as the rele-
data to inform a government response to the coronavirus         vant governing statutes, are outlined in the appendices to
will be less effective and less successful due to these gaps.   this report.
On the flip side, inequities might also be manifested if           Whether each statute prohibits the disclosure of loca-
measures of aggregate foot traffic generated by cell phone      tion or proximity data to the government depends on a
location data are used to calibrate the enforcement of          number of factors. There are a number of key
social distancing measures. Communities where people            considerations:
move around more because they must commute to a job,
need to travel farther to buy groceries, or are looking for     ƒ Have people opted into an application or other program
shelter may become targets of outsize policing.10                 through which they know data may be shared with the
                                                                  government for the purpose of combating the
                                                                  coronavirus?

Statutory Overview                                              ƒ If not, does a company with this data have its custom-
There is no comprehensive data privacy law in the United          ers’ consent to disclose it?
States; instead, a piecemeal statutory structure protects
certain types of personal data.11 The Stored Communica-         ƒ In what capacity was a wireless carrier, a developer of
tions Act (SCA) and the Telecommunications Act are most           a smartphone application or platform, a data broker or
relevant to the question of when private companies may            analytics provider, or another source acting while
voluntarily disclose location data (revealing where a             collecting the data? For example, was the entity provid-
person is) or proximity data (revealing how close a person        ing messaging, data storage, or data processing
is to another) to the government. Together, these two laws        services?
limit companies providing certain services to the public
from voluntarily revealing an individual’s personally iden-     ƒ Is the data aggregated in a fashion that makes it impos-
tifiable location or proximity information to the govern-         sible to connect to individuals?
ment, whether it originates from cell tower data, GPS,
Bluetooth, Wi-Fi, a combination of these sources, or some       ƒ Has the data been sufficiently de-identified? That is,
other source entirely.                                            have individual data points been stripped of details —
   Specifically, the SCA prohibits entities that provide          such as a name, phone number, or address — that
phone, messaging, data storage, or data processing                would make them immediately linkable to a given
services to the public from voluntarily disclosing to the         person?
government the content of communications they carry
or maintain, or their customer’s records.12 Whether loca-          Gaps in this regulatory framework permit workarounds
tion or proximity data might be categorized as “content”        for governments seeking people’s location or proximity
or a “record” within the meaning of the SCA is a fact-spe-      data without their knowledge or consent. For example,
cific question that depends in part on the purpose for          while the government could not get an individual’s loca-
which it is logged or transmitted, as described in further      tion information from a cell service provider, such as
detail below.13 The Telecommunications Act prohibits            AT&T or Verizon, without a warrant,15 it may be able to
phone carriers from disclosing their customers’ personally      buy it from a data broker who is legally able to purchase
identifiable call location information to any entity, includ-   similar information from a smartphone application devel-
ing the government and data brokers.14                          oper who collects it. Constitutional arguments, not
   The Federal Trade Commission (FTC) Act might also            discussed here, may provide fodder for additional
protect Americans where companies have violated prom-           constraints.16

2 Brennan Center for Justice                                     Government Access to Mobile Phone Data for Contact Tracing
Tracking Initiatives

P
      roposals to mitigate the spread of the coronavirus through phone location or
      proximity data have emerged from a range of sources, including academic
      institutions, for-profit companies, and governments. This primer divides
discussion of these proposals into two categories: individualized and aggregate data.17

Individualized data is linked to a specific person who is        can achieve the levels of adoption necessary to be effec-
sometimes identified by details such as name, phone              tive, or whether compulsory approaches that do not
number, or specific smartphone. For instance, location           require user knowledge or consent are better suited to
data revealing the path of an individual diagnosed with          combat the virus.
the coronavirus over the past 14 days, which might be               One category of voluntary proposals — location-based
used to determine whom she could have infected, is a type        programs — would use GPS and Bluetooth technologies
of individualized data.                                          to create and store an encrypted, time-stamped log of
   In contrast, aggregate data collects, combines, and           where a user has been over the past month.20 People who
communicates information in terms of totals, summaries,          test positive for the coronavirus can choose to share this
or statistics, rather than in reference to a specific individ-   log with health officials, who may then use it to help
ual.18 The percentage decrease of people at a waterfront         patients jog their memory about where they had been and
park after implementation of social distancing protocols         with whom they may have come in contact. Some plat-
is an example of aggregate data.                                 forms, such as MIT’s Private Kit: Safe Paths, use “over-
                                                                 lapped GPS and Bluetooth trails” to allow healthy app
                                                                 users to check — against location data logged locally on

Individualized Data                                              their phones — if they may have crossed paths with some-
                                                                 one who has tested positive for the disease and chosen
Proposals deploying individualized location or proximity         to share their data with public health officials for dissem-
data to fight the coronavirus aim to use the information         ination in an “anonymized, redacted, and blurred” form.21
for a range of purposes: to track the paths of people who        Without further details, however, it is unclear whether
are infected with the virus in order to identify those might     patients could be re-identified with relative ease.22 Accord-
have been exposed to it (a process known as contact trac-        ing to a spokesperson for MIT’s Private Kit, three local
ing or exposure notification), to pinpoint disease hot           governments in the U.S. plan to use the app, and 17 more
spots, to model infection rates and spread, or to inform         are considering doing so.23 Utah and North Dakota have
public health decisions.19 Many such proposals would use         confirmed rollouts of apps that incorporate loca-
location data that reveals where an identified person was        tion-based functionalities similar to those described here,
or is at a given point in time. Some contact tracing propos-     though it is unclear whether they are built on Private Kit
als would track proximity rather than location, using Blue-      or the extent to which they are decentralized.24
tooth technology to determine when two people have                  Another category of voluntary proposals would use
been close enough to each other for enough time to               individual data for proximity tracking. Apple and Google
enable transmission. This information might be stored            recently announced a joint effort to allow applications on
on a central server or decentralized on local devices. The       Apple’s iOS and Google’s Android platforms — whether
proximity-based proposals that are gaining traction in the       created by governments or private companies associated
United States are designed to be anonymous: they would           with public health authorities — to use Bluetooth tech-
make it difficult to link a person’s identity with their prox-   nology for exposure notification.25 These applications
imity history or diagnosis, and they would rely on a decen-      would enable phones close to each other for a period of
tralized process to match contacts.                              time to log that contact by exchanging anonymous iden-
   As a general matter, both location-based and proximi-         tifier keys, sent directly from phone to phone in a decen-
ty-based proposals in the United States contemplate              tralized model. A user who later tested positive for the
asking people to voluntarily download smartphone appli-          coronavirus could enter a code that would upload 14 days’
cations that would solicit user consent for information          worth of proximity keys to a cloud server. The server
sharing and take some steps to protect user privacy. These       would then push those keys to other app users’ phones,
apps vary with respect to their features, mechanics, and         which would check to see if there was a match.26 Since
privacy measures. Many are or will be run by governments,        the transmitted keys would be randomized and change
but they need not be. Nonetheless, there is a debate both        intermittently, and because they would be generated at
in the U.S. and overseas about whether a voluntary system        great volume, it would be difficult to associate a key with

3 Brennan Center for Justice                                      Government Access to Mobile Phone Data for Contact Tracing
a particular phone. Some contact tracing apps that use           Prevention Act, which allows health officials to use phone
location-based data, such as Care19, an application devel-       location information with the permission of law enforce-
oped by the North Dakota Department of Health in part-           ment and other government stakeholders.34 The program
nership with ProudCrowd, also incorporate this                   relies on phone GPS data, along with sources like credit
proximity-based technology.27                                    card records, to map the paths of confirmed cases,
   So far, it appears that Apple and Google would require        making these routes public or accessible to those in the
that developers decentralize matches, meaning matches            region at a level of detail that has been sufficient to iden-
would be confirmed on an individual’s phone rather than          tify the infected person.35 This has resulted in the harass-
on a central server.28 Other Bluetooth proximity-tracking        ment and stigmatization of some of those identified as
applications have varying levels of privacy protections.         positive for the virus.36
For example, Singapore’s TraceTogether permits author-
ities to know user identities and makes matches of poten-
tial contacts centrally, and the UK’s National Health
Service plans to implement a similar program.29
                                                                 Aggregate Data
                                                                 Some virus response efforts contemplate drawing aggre-
                                                                 gate location data from a large number of cell phones,
   Further Uses of Location Information                          with the goal of discerning population-level trends rather
                                                                 than the movement of any particular individual. This
   Some of the apps described here would use location            information can help policymakers assess compliance
   information collected with users’ consent for purposes        with social distancing orders and map the spread of the
   other than direct contact tracing. For example, North         disease. News reports indicate that mobile advertising
   Dakota’s app says the data will help identify places with     companies are sharing such data with the U.S. Centers
   clusters of people who test positive for the coronavirus so   for Disease Control and Prevention (CDC), as well as with
   it can “more proactively act to reduce the rate of spread,”   state and local governments, to display the degree to
   as well as model infection rates and health-care demand.30    which people are congregating in public places, going
                                                                 shopping, or moving from one place to another.37
                                                                    The federal government has also reportedly been in
   Programs in Israel and South Korea are more coercive.         discussions with large tech companies, including Google
In March, Israel’s Health Ministry began using individual,       and Facebook, on how it can use aggregated location data
identifiable cell phone location data, initially funneled        for these purposes.38 For example, Google is using aggre-
from wireless carriers to a counterterrorism database, to        gated data culled from users who have enabled the loca-
map where people known to have the coronavirus had               tion history setting on their Google account to track
been over the previous two weeks and ascertain with              movement trends.39 This project, called COVID-19
whom they might have crossed paths.31 Those who could            Community Mobility Reports, is intended to help public
have been exposed were sent a text and told to self-iso-         health officials make decisions about transportation to
late.32 The monitoring was done without securing                 certain high-volume destinations, business hours, and
customer consent. At the end of April, Israel’s Supreme          guidance regarding essential trips and deliveries. The
Court ruled that if the government wanted to continue            mobility reports display a percentage point increase or
tracking people’s phones, it had to bring the program            decrease in the number of visits to a location but not the
under legislation within the coming weeks.33                     absolute number of visits. Apple has announced it is doing
   A similar effort in South Korea operates under the            something similar with Apple Maps data.40
authority of the country’s Infectious Disease Control and

4 Brennan Center for Justice                                      Government Access to Mobile Phone Data for Contact Tracing
Applicable Statutes

T
      his section evaluates the degree to which relevant statutes — namely, the Stored
      Communications Act (SCA) and the Telecommunications Act — limit
      companies’ voluntary disclosure of individualized location or proximity data to
the government.41 Though the statutory landscape is rapidly evolving — for example,
two Covid-19-related data privacy bills were introduced in the Senate in May42 — it does
not seem that the SCA or the Telecommunications Act significantly constrain any of
the U.S. proposals in their current form, for two reasons.
First, current proposals to use individualized data involve             users who volunteer to share their diagnosis keys would
people granting permission to the government to collect                 be agreeing to share this information with the govern-
and use their information, against which there is no legal              ment.47 Since proximity keys would be stored locally, on
bar.43 A conceivable scenario down the road, though, is                 individual phones rather than in a central database, there
one in which a privately administered app — using the                   would be little else of value for the government to collect.
Private Kit template, for example — gives location or                      Second, with respect to the proposals to use aggregate
proximity information it has logged to the government                   data, there are few legal limitations on private companies’
without authorization from its users.44 If this information             voluntarily disclosing aggregate cell phone location data to
— arguably protected as “content” or a “record or other                 the government. For example, the Telecommunications Act
information” under the SCA45 — is stored or processed                   affirmatively allows wireless carriers, such as Verizon and
remotely by the application, the SCA may restrict disclo-               AT&T, to disclose aggregate customer information when
sure.46 In contrast, the decentralized Apple/Google                     “individual customer identities and characteristics have
proposal is restricted to use by public health authorities;             been removed.”48 While the SCA prohibits companies such

  The Federal Trade Commission Act

  The Federal Trade Commission (FTC) Act applies to companies           recently announced that Facebook would pay a $5 billion
  that collect or maintain location data, such as Google, Apple,        penalty and agree to a 20-year settlement order to resolve
  Facebook, Twitter, and Uber, and to data brokers that compile         allegations that the company deceived users about their ability
  consumers’ personal information and resell or share that              to control their personal information using Facebook’s privacy
  information with others.49 It also applies to the privacy practices   settings.55
  of phone providers, such as Verizon, AT&T, and T-Mobile, though          As seen in the Facebook example, the act might facilitate
  its jurisdiction over these common carriers is much more              meaningful privacy protections for individuals’ data. However,
  limited.50 The FTC does not, however, have jurisdiction over          companies that collect or maintain location data — including
  most nonprofit organizations, including many universities,            operating systems like Google’s Android and Apple’s iOS, phone
  which have been proposed as trusted organizations through             applications like Facebook and Twitter, and data brokers — tend
  which to run contact tracing programs.                                to have privacy policies that distinguish between identifiable
      Unlike the SCA and the Telecommunications Act, the FTC Act        and nonidentifiable data. Their policies generally explicitly
  does not impose additional regulations on companies’                  permit disclosure of nonidentifiable data to third parties,56 so
  disclosure of customer information. Rather, the act holds             the FTC is unlikely to provide a barrier to the disclosure of
  companies to the privacy commitments they have made to                anonymized, aggregated data.
  their customers. Under Section 5 of the act, the FTC can                 Moreover, the FTC Act has no private right of action, meaning
  investigate and bring enforcement actions to hold companies           that individuals cannot seek a remedy under it; instead, the
  accountable for misleading privacy policies,51 including those        federal government would have to enforce any violation of the
  pertaining to location data, which it has recognized as sensitive     act. Where the federal government is the one seeking disclosure
  information that implicates significant privacy concerns.52           in a time of crisis, it is unlikely to turn to the act to halt its own
  Notably, some of the companies reportedly in discussion with          data-solicitation practices. However, the act could perhaps be a
  government entities regarding sharing of location information,        tool to deter organizations administering digital coronavirus
  such as Google and Facebook,53 are already under consent              containment programs from selling the data they collect to
  decrees with the FTC for privacy lapses.54 For example, the FTC       private actors or disclosing it to state and local governments.

5 Brennan Center for Justice                                             Government Access to Mobile Phone Data for Contact Tracing
as Facebook, Gmail, and YouTube, in the course of provid-        tions Act.66 The enforcement notice highlighted how
ing public messaging, data storage, or data processing           the wireless carriers had failed to safeguard customers’
services,57 from voluntarily disclosing their customer           information as it was transmitted to aggregators that
records to the government, it does not explicitly address        sent it to companies providing location-based services
aggregate data. Notably, the Department of Justice has           — navigation, local weather, or fraud prevention, for
interpreted the act to permit the disclosure of aggregate        example. The carriers were alleged to be responsible
records as long as they do not “identify or otherwise            for the downstream unauthorized disclosure of custom-
provide information about a particular subscriber or             ers’ location data to a state sheriff’s office. It is also
customer.”58                                                     possible that the SCA would prohibit a wireless phone
   For more coercive contact tracing initiatives that use        company or other entity providing a covered service
individualized, identifiable data without explicit consent,      from selling location data directly to an aggregator or
such as those from Israel and South Korea, the legal             broker with the knowledge that the government would
framework is largely dependent upon the type of service          eventually get it, though this has not been tested in
a company provides to the public:59                              court.67

ƒ Wireless carriers. The SCA and the Telecommunica-              As described above, user consent and voluntary adop-
  tions Act prohibit wireless carriers like Verizon, AT&T,    tion are key components of the proposals currently being
  or Sprint from disclosing individualized call location      considered in the United States. Both the SCA and the
  data to the government without a warrant or other           Telecommunications Act contain user-consent excep-
  legal authorization.60                                      tions to their prohibitions on the disclosure of identifiable
                                                              information. More coercive proposals, in which compa-
ƒ Smartphone app developers and platforms. Whether            nies would voluntarily disclose identifiable data without
  the SCA covers developers of smartphone applications        user consent, might implicate the statutes’ emergency
  that collect location data depends on whether they          exceptions.
  collect that data in the course of providing messaging,
  data storage, or data processing services. Social media
  services like Facebook or Twitter and email clients like
  Gmail have been found to be covered when they serve
                                                              Consent
  primarily to allow people to exchange and store messag-     The SCA and the Telecommunications Act, as well as FCC
  es.61 Services that mainly let users upload and store or    regulations implementing the Telecommunications Act,
  process content, such as YouTube or DropBox, may also       explicitly require customers to consent to the disclosure
  be covered.62 So too may services that exist for the        of identifiable data.68 Without specific customer consent
  purpose of logging a person’s location — for example,       for the disclosure of location or proximity data, or a
  Google’s Location History function.63 The same rules        privacy policy permitting the practice, it is unlikely that
  apply to built-in functionalities of smartphone operat-     courts would find that people have legally consented to
  ing systems, such as iMessage or iCloud in Apple’s iOS.64   the disclosure of this data to the government in order to
                                                              operationalize a location-based contact tracing proposal
ƒ Data brokers. If the U.S. government were looking to        mapping out individuals’ travels, akin to South Korea’s.69
  implement a tracking initiative like Israel’s or South      We reviewed privacy policies and terms-of-service agree-
  Korea’s, it might approach firms that buy or otherwise      ments governing customer-provider relationships from
  obtain location data to aggregate and resell it to other    some major companies, including wireless carriers (Veri-
  parties, to provide analytics to optimize advertising or    zon and AT&T), a social media company (Facebook), and
  other functions, or for some other reason. The SCA          tech companies (Apple and Google).70 Notably, none
  does not prohibit these companies from disclosing           could reasonably be read to permit the blanket disclosure
  their data to the government.65                             of user data to the government, though it is unclear to
                                                              what degree that finding is generalizable to the industry
  This is not a complete workaround, though. Wireless         as a whole.71
  carriers and other companies that collect location data
  may be held accountable in other ways for the down-
  stream consequences of selling or sharing the data with
  third-party data brokers. For example, in February 2020
                                                              Emergencies
  the Federal Communications Commission (FCC)                 The emergency exception of the SCA could conceivably
  formally proposed fining AT&T, Sprint, T-Mobile, and        be invoked in support of coronavirus containment
  Verizon more than $200 million for disclosing customer      measures involving contact tracing. Under the SCA, a
  location data through a chain of third-party brokers to     provider using the exception needs to believe in good faith
  law enforcement in violation of the Telecommunica-          (1) that there is an emergency involving danger of death

6 Brennan Center for Justice                                   Government Access to Mobile Phone Data for Contact Tracing
or serious physical injury to any person, (2) that it requires   members when an individual is in a “situation that
disclosure of information without delay, and (3) that the        involves the risk of death or serious physical harm.”73
information relates to the emergency. Historical uses have       Although these exceptions have not been used in the past
included locating a missing person thought to be immi-           to permit something like widespread contact tracing, they
nently at risk of harm and tracking a suspect fleeing a          could be invoked now if the government asks companies
crime who is believed to pose an imminent danger to              to provide location data voluntarily in light of the severity
others.72 The Telecommunications Act’s emergency excep-          of the public health crisis and the exponentially increasing
tion is narrower, focusing on facilitating 911 services and      costs of delaying action.74
permitting the disclosure of information to family

Conclusion

P
       roposals that would map individuals’ movements for disease-tracking purposes
       in the U.S. — in contrast to many other countries — have so far envisioned
       voluntary rather than compulsory participation. If individuals decide to share
their data, the information can be used in accordance with the terms of that disclosure.
However, digital contact tracing or exposure notification        users given the significant gaps in the statutory frame-
needs a high rate of nationwide buy-in to work, and poli-        work, particularly regarding the disclosure of information
cymakers looking to avoid the continuation of broad lock-        to third parties and the disclosure of aggregate data. This
downs will be looking for ways to increase participation         crisis has made clear the need for strong, reliable protec-
and data collection as the coronavirus pandemic contin-          tions for the privacy and security of personal data, espe-
ues. The statutory law outlined in this primer will be most      cially the highly sensitive health and location information
applicable in such scenarios. As proposals are developed,        resulting from testing and contact tracing.
it is essential that they include privacy protections for

7 Brennan Center for Justice                                      Government Access to Mobile Phone Data for Contact Tracing
Appendix 1

                                  SOURCES OF LOCATION AND PROXIMITY DATA

                          Cell phones connect to nearby cell towers several times a minute when they are turned on. Each
                          connection generates a time-stamped record containing the identity of the phone and location
 Cell towers              of the cell tower. This data, which can be used to determine a cell phone’s approximate location,
                          is called cell-site location information (CSLI) and is stored by some phone providers for up to five
                          years.75

                          Some cell phones contain a GPS chip, which generates location information by calculating its
 Global Positioning
                          distance from four or more of the GPS satellites orbiting Earth.76 This data may be stored locally
 System (GPS)
                          on a device or transmitted to a central database.

                          Some cell phones contain a Bluetooth chip, which continuously broadcasts probe signals using
                          short-range radio when it is turned on. As these signals are received by nearby Bluetooth devices,
 Bluetooth
                          they can be used to generate proximity information. Signals received by fixed Bluetooth beacons
                          can also be used to generate location information.77

                          It is possible to approximate the location of a cell phone by tracking its unique hardware identifier,
 Wi-Fi
                          called a Media Access Control (MAC) address, as it connects to nearby Wi-Fi networks.78

8 Brennan Center for Justice                                      Government Access to Mobile Phone Data for Contact Tracing
Appendix 2

               STATUTES GOVERNING DISCLOSURE OF LOCATION AND PROXIMITY INFORMATION

                  Stored Communications Act              Telecommunica-           Federal Trade           Health Insurance
                             (SCA)                           tions Act             Commission                Portability
                       (18 U.S.C. § 2702)                (47 U.S.C. § 222)          (FTC) Act            and Accountability
                                                                                 (15 U.S.C. § 45)           Act (HIPAA)
                                                                                                            Privacy Rule
                                                                                                          (45 C.F.R. §§ 160
                                                                                                              and 164)

 Summary         The SCA prohibits entities that        The Telecommunica-     The FTC Act               The HIPAA Privacy
                 provide phone, messaging, data         tions Act prohibits    prohibits companies       Rule provides
                 storage, or data processing            phone carriers from    that collect or           national standards
                 services to the public from            disclosing their       compile customer          that define and
                 voluntarily disclosing the             customers’ personal-   data, such as social      restrict the ability of
                 content of communications they         ly identifiable call   media sites, online       health-care provid-
                 carry or maintain, as well as cus-     location information   stores, or data           ers and their
                 tomer records or information in        to any entity,         brokers, from             associates to save,
                 connection with their provision        including the          deceiving or mislead-     access, and share
                 of those services.                     government or data     ing consumers about       individuals’ medical
                     Disclosure of proximity or         brokers.82 The         their privacy policies.   records and other
                 location information to any third      degree to which it     The FTC enforces          individually identifi-
                 party, whether to the govern-          prohibits the          this provision by         able health informa-
                 ment or to a private data broker       disclosure of          investigating and         tion.87 The HIPAA
                 from which the government can          de-identified          bringing enforce-         Privacy Rule does
                 buy it, may be prohibited if it is     information dis-       ment actions against      not meaningfully
                 considered the “content” of a          closed in bulk is      companies that have       restrict disclosure of
                 communication under the SCA.           unclear.83             misrepresented their      aggregate data,
                 If it is a “record or other informa-                          privacy policies.84       de-identified data, or
                 tion” connected to a customer,                                The FTC Act has           non-health informa-
                 disclosure to the government is                               been enforced             tion.88
                 barred but the data may be                                    against companies
                 shared with other third parties.79                            for improperly
                     Whether location information                              disclosing custom-
                 is categorized as “content” or a                              ers’ location data.85
                 “record” is a fact-specific                                   There is no reason to
                 question that depends in part on                              think the unautho-
                 the purpose for which it is                                   rized disclosure of
                 collected or transmitted.80                                   proximity data would
                 The SCA probably restricts the                                be treated differently
                 disclosure of de-identified data                              than that of any
                 tied to discrete individuals, even                            other customer
                 if it is transmitted in bulk.81                               data.86
                 Court decisions bearing on the
                 SCA’s application to the
                 proposals of concern to this
                 primer have considered location
                 — as opposed to proximity
                 — information.

9 Brennan Center for Justice                                       Government Access to Mobile Phone Data for Contact Tracing
Stored Communications Act           Telecommunica-           Federal Trade          Health Insurance
                             (SCA)                        tions Act             Commission               Portability
                       (18 U.S.C. § 2702)             (47 U.S.C. § 222)          (FTC) Act           and Accountability
                                                                              (15 U.S.C. § 45)          Act (HIPAA)
                                                                                                        Privacy Rule
                                                                                                      (45 C.F.R. §§ 160
                                                                                                          and 164)

  Covered        The SCA’s coverage89 has been       The act applies to     The act gives the        HIPAA’s coverage
  entities or    found to include                    wireless carriers,     FTC the authority to     includes health
  activities                                         such as Verizon,       regulate most            plans, health-care
                 ƒ Verizon, Sprint, AT&T,            Sprint, AT&T, and      “persons, partner-       clearinghouses,
                    T-Mobile, and other phone        T-Mobile, and any      ships, or corpora-       most health-care
                    carriers;90                      other providers of     tions,”96 including      providers, and
                                                     telecommunications                              business associates
                 ƒ Facebook, Dropbox, Gmail,         services.95            ƒ companies that         and subcontractors
                    and other companies when                                   collect or            of those entities that
                    providing social media                                     maintain location     create, receive, main-
                    messaging, storage, or email                               data, such as         tain, or transmit
                    services;91 and                                            Google, Apple,        protected health
                                                                               Facebook, Twitter,    information.100
                 ƒ YouTube and other compa-                                    other cell phone      Business associates
                    nies when providing services                               applications, and     of covered entities
                    that permit users to upload                                online stores; and    can include medical
                    content.92                                                                       billing agencies,
                                                                            ƒ data brokers that      accountants, and IT
                 The SCA may apply to cell                                     compile consum-       consultants, as well
                 phone operating systems, such                                 ers’ personal         as tech firms that
                 as Apple’s iOS and Google’s                                   information and       help hospitals
                 Android, to the extent they                                   resell or share       manage and analyze
                 provide messaging, data                                       that information      patient data.
                 processing, or data storage                                   with others.97
                 services.93
                    The SCA likely does not apply                           The FTC has limited
                 in cases where the primary                                 jurisdiction over
                 purpose of a service at issue is                           “common carriers”
                 not best characterized as                                  like Verizon, AT&T,
                 storage, processing, or messag-                            and T-Mobile, though
                 ing. For example, where                                    the FTC can regulate
                 companies like eBay or Amazon                              their privacy
                 provide such features in a                                 practices.98 It cannot
                 manner incidental to their retail                          enforce the FTC Act
                 or auctioneering functions, the                            against most
                 SCA has been found not to                                  nonprofit organiza-
                 apply.94                                                   tions.99

10 Brennan Center for Justice                                   Government Access to Mobile Phone Data for Contact Tracing
Stored Communications Act             Telecommunica-            Federal Trade          Health Insurance
                             (SCA)                          tions Act              Commission               Portability
                       (18 U.S.C. § 2702)               (47 U.S.C. § 222)           (FTC) Act           and Accountability
                                                                                 (15 U.S.C. § 45)          Act (HIPAA)
                                                                                                           Privacy Rule
                                                                                                         (45 C.F.R. §§ 160
                                                                                                             and 164)

  Covered        Companies providing covered           Covered companies       Covered companies        The HIPAA Privacy
  data           services are generally prohibited     are generally           are prohibited from      Rule covers “protect-
                 from voluntarily disclosing a         prohibited from         engaging in “unfair or   ed health informa-
                 customer’s “record or other           disclosing customer     deceptive acts or        tion” — patients’
                 information” to the govern-           proprietary network     practices,”105 which     medical records and
                 ment.101 There is no definition of    information (CPNI),     would include false      other individually
                 “record” in the statute, but          which explicitly        or misleading privacy    identifiable health
                 courts have interpreted the term      includes a custom-      policies pertaining to   information — in
                 to include some data revealing a      er’s location           location or proximity    paper and electronic
                 customer’s location, most             information logged in   data.106                 formats.107
                 notably cell-site location data.102   connection with
                    Location data may also be          making or receiving a
                 considered the “content” of a         call.104
                 communication, especially if the
                 purpose of a service is to record
                 or communicate it. For instance,
                 Google has argued that its
                 Location History feature acts as
                 a journal logging a person’s
                 whereabouts, with the retained
                 data therefore being the
                 “content” of an entry.103
                 Disclosure to any third party is
                 prohibited when location data is
                 “content.”

11 Brennan Center for Justice                                      Government Access to Mobile Phone Data for Contact Tracing
Stored Communications Act            Telecommunica-            Federal Trade          Health Insurance
                             (SCA)                         tions Act              Commission               Portability
                       (18 U.S.C. § 2702)              (47 U.S.C. § 222)           (FTC) Act           and Accountability
                                                                                (15 U.S.C. § 45)          Act (HIPAA)
                                                                                                          Privacy Rule
                                                                                                        (45 C.F.R. §§ 160
                                                                                                            and 164)

  Prohibitions   As described above, entities         Covered companies       Companies that          In general, protected
  on             may be barred from voluntarily       are barred from         engage in “unfair and   health information
  disclosure     sharing customer location data       disclosing CPNI to      deceptive acts,”        may be used or
                 obtained in the course of            any other entity        including data          disclosed as
                 providing phone, messaging,          unless an exception     collection, use, and    necessary without
                 data storage, or data processing     applies, such as        sharing practices       patient consent for
                 services, unless an exception        customer consent or     that contradict the     the purposes of
                 applies, such as customer            an emergency.110        commitments they        delivering treat-
                 consent or an emergency.                Companies can        have made to their      ment,112 seeking
                    Absent consent given for a        disclose aggregate      customers, may          payment, or running
                 discrete purpose, courts may         customer informa-       become the target of    health-care opera-
                 look to privacy policies and         tion, defined as data   FTC investigations or   tions only.
                 terms-of-service contracts to        that relates to a       enforcement actions.       Aside from those
                 determine whether a disclosure       group of customers                              purposes, entities
                 was authorized. The emergency        and from which                                  are barred from
                 exception applies if the provider    individual identities                           voluntarily sharing
                 believes in good faith (1) that      and characteristics                             protected informa-
                 there is an emergency involving      have been re-                                   tion unless an
                 danger of death or serious           moved.111                                       exception applies,
                 physical injury to any person, (2)                                                   such as to prevent or
                 that it requires disclosure of                                                       control disease113 or
                 information without delay, and                                                       to prevent or lessen
                 (3) that the information relates                                                     a serious and
                 to the emergency.108                                                                 imminent threat to
                    The SCA does not specifically                                                     the health and safety
                 address the disclosure of                                                            of a person or the
                 de-identified or aggregate data.                                                     public.114
                 However, the U.S. Department of                                                         During the
                 Justice has interpreted the act                                                      Covid-19 emergency,
                 to permit companies to                                                               business associates
                 voluntarily disclose to the                                                          of covered entities
                 government aggregated data                                                           — such as billing
                 “that does not identify or                                                           agencies or IT
                 otherwise provide information                                                        consultants — can
                 about a particular subscriber or                                                     make good-faith use
                 customer.”109                                                                        of and disclose
                                                                                                      protected health
                                                                                                      information for
                                                                                                      public health
                                                                                                      activities without
                                                                                                      penalty.115

12 Brennan Center for Justice                                     Government Access to Mobile Phone Data for Contact Tracing
Endnotes
1 See, e.g., Ed Garsten, “Drive-By Heat Sensors Could Help Detect             C.F.R. §§ 164.500 to 164.534 (2019). Similarly, HIPAA, which
Vehicle Occupants with COVID-19,” Forbes, April 1, 2020, https://www.         establishes the conditions by which a health-care provider or
forbes.com/sites/edgarsten/2020/04/01/drive-by-heat-sensors-                  associate may disclose individually identifiable health information,
could-help-detect-vehicle-occupants-with-covid-                               does not meaningfully restrict disclosure of aggregate or de-identi-
19/#455a60b62b0e; “Taking People’s Temperatures Can Help Fight                fied data or non-health information. In addition, in light of Covid-19,
the Coronavirus,” Economist, March 26, 2020, https://www.                     HHS recently released a waiver that significantly curtails the scope of
economist.com/science-and-technology/2020/03/26/taking-peo-                   HIPAA protections and facilitates information sharing. See Office of
ples-temperatures-can-help-fight-the-coronavirus; and Donald                  the Secretary, U.S. Department of Health and Human Services,
McNeil Jr., “Can Smart Thermometers Track the Spread of the                   “Enforcement Discretion Under HIPAA to Allow Uses and Disclosures
Coronavirus?,” New York Times, March 18, 2020, https://www.                   of Protected Health Information by Business Associates for Public
nytimes.com/2020/03/18/health/coronavirus-fever-thermome-                     Health and Health Oversight Activities in Response to COVID–19,”
ters.html.                                                                    Federal Register 85, no. 67 (April 7, 2020), https://www.govinfo.gov/
2 This primer focuses on location data obtained through cell                  content/pkg/FR-2020-04-07/pdf/2020-07268.pdf.
phones, though such data may also be gleaned from other surveil-              6 For example, the National Counterterrorism Center (NCTC) is
lance technologies, like video, facial recognition, or automated              directed by statute to “ensure that agencies . . . have access to and
license plate readers. See, e.g., Caroline Haskins and Ryan Mac, “A US        receive all-source intelligence support needed to execute their
Senator Wants to Know Which Federal Authorities Are Using                     counterterrorism plans or perform independent, alternative analysis”
Clearview AI to Track the Coronavirus,” BuzzFeed News, April 30,              and to ensure that such agencies “have access to and receive
2020, https://www.buzzfeednews.com/article/carolinehaskins1/                  intelligence needed to accomplish their assigned activities.” 50 U.S.C.
senator-markey-clearview-ai-covid-contact-tracing; and Catherine              § 3056 (2020). A recent memorandum written by U.S. Deputy
Crump, You Are Being Tracked: How License Plate Readers Are Being             Attorney General Jeffrey Rosen designating the coronavirus as a
Used to Record Americans’ Movements, American Civil Liberties                 “biological agent” means that information collected by government
Union, July 2013, https://www.aclu.org/issues/privacy-technology/             health officials to counter the coronavirus might be shared with other
location-tracking/you-are-being-tracked.                                      agencies and law enforcement within the NCTC. See Jeffrey Rosen,
3 Elliot Setzer, “Contact-Tracing Apps in the United States,”                 U.S. Deputy Attorney General, to All Heads of Law Enforcement
Lawfare, May 6, 2020, https://www.lawfareblog.com/contact-trac-               Components, Heads of Litigating Divisions, and United States
ing-apps-united-states; Ryan Browne, “How Governments and Big                 Attorneys, memorandum, March 24, 2020, Department of Justice
Tech Are Looking to Curb the Spread of Coronavirus with Your                  Enforcement Actions Related to COVID-19, https://www.justice.gov/
Smartphone,” CNBC, April 16, 2020, https://www.cnbc.                          file/1262771/download.
com/2020/04/16/coronavirus-apple-google-and-governments-us-                   7 Within HHS, data sharing practices vary widely. In a 2018 report,
ing-contact-tracing-tech.html; and Enlisting Big Data in the Fight            the agency noted: “The Department lacks a consistent, transparent,
Against Coronavirus: Hearing Before the Senate Committee on                   and standardized framework for sharing restricted and nonpublic
Commerce, Science, and Transportation, 116th Cong. (2020), https://           data among its agencies in a timely and efficient manner. Each
www.commerce.senate.gov/2020/4/enlisting-big-data-in-the-fight-               agency, and often agency personnel for each dataset, has the
against-coronavirus.                                                          autonomy to interpret the rules for data sharing processes. Data
4 Although aggregate data conveys information about groups                    sharing processes can range from non-existent and informal, to
rather than individuals, it may be possible to identify individuals,          formal and consistent. . . . The data governance rules are not
especially if the data refers to a small geographic area or group, or if it   formalized. The sharing of those datasets can be ruled by individual
is combined with publicly available information and examined over             relationships and/or staff availability.” Office of the Chief Technology
time. See Sidney Fussell and Will Knight, “The Apple-Google Contact           Officer, U.S. Department of Health and Human Services, The State of
Tracing Plan Won’t Stop Covid Alone,” Wired, April 14, 2020, https://         Data Sharing at the U.S. Department of Health and Human Services,
www.wired.com/story/apple-google-contact-tracing-wont-stop-                   September 2018, https://www.hhs.gov/sites/default/files/HHS_
covid-alone; Ling Yin et al., “Re-Identification Risk versus Data Utility     StateofDataSharing_0915.pdf. One significant concern is that
for Aggregated Mobility Research Using Mobile Phone Location                  location data collected by HHS or another government agency might
Data,” PLoS ONE 10, no. 10 (2015), https://www.ncbi.nlm.nih.gov/              eventually find its way into the hands of law enforcement, which
pmc/articles/PMC4607417; Ed Felten, “Is Aggregate Data Always                 would ordinarily be required to obtain a warrant or court order before
Private?,” Tech@FTC Blog, Federal Trade Commission, May 21, 2012,             obtaining such data. Both the Privacy Act and HIPAA Privacy Rule
https://www.ftc.gov/news-events/blogs/techftc/2012/05/                        contain exceptions for disclosures to law enforcement. 5 U.S.C. §
aggregate-data-always-private; and Joseph A. Calandrino et al., “‘You         552a (2020); 45 C.F.R. §§ 164.500 to 164.534.
Might Also Like:’ Privacy Risks of Collaborative Filtering,” IEEE             8 Several recent U.S. Supreme Court decisions regarding Fourth
Symposium on Security and Privacy (May 2011): 231–246, http://                Amendment protections for location data have highlighted the
www.cs.utexas.edu/~shmat/shmat_oak11ymal.pdf.                                 sensitivity of this information. For example, the U.S. Supreme Court
5 Neither the Privacy Act of 1974 nor the Health Insurance                    noted in Carpenter v. United States that location data reveals a wealth
Portability and Accountability Act (HIPAA) provides sufficient                of detail about a person’s “familial, political, professional, religious,
protection against information sharing. The Privacy Act, which                and sexual associations.” Carpenter v. United States, 138 S. Ct. 2206,
protects records about individuals retrieved by personal identifiers          2217 (2018). In United States v. Jones, Justice Sotomayor discussed
like name or date of birth, does not apply to aggregate or anonymized         that disclosed in location data will be things that are indisputably
location data, or databases that contain personally identifiable              private in nature — including “trips to the psychiatrist, the plastic
information but do not retrieve information using that data.                  surgeon, the abortion clinic, the AIDS treatment center, the strip club,
Moreover, the act contains substantial exceptions, including                  the criminal defense attorney, the by-the-hour motel, the union meet-
permitting information sharing with law enforcement and disclosures           ing, the mosque, synagogue or church, the gay bar and on and on.”
for “routine uses,” which agencies often reserve when giving notice of        United States v. Jones, 132 S. Ct. 945, 955 (2012) (Sotomayor, J.,
a data collection proposal. Privacy Act of 1974, 5 U.S.C. § 552a              concurring) (quoting People v. Weaver, 12 N.Y.3d 433, 441–442 (N.Y.
(2020); Privacy of Individually Identifiable Health Information, 45           2009)).

13 Brennan Center for Justice                                                  Government Access to Mobile Phone Data for Contact Tracing
9 “Mobile Fact Sheet,” Pew Research Center, June 12, 2019, https://         ruling). A 2016 FCC order would have expanded the definition of CPNI
www.pewresearch.org/internet/fact-sheet/mobile.                             in a manner confirmed to cover location information intermittently
10 Amos Toh, “Big Data Could Undermine the Covid-19 Response,”              logged in the course of a phone’s connection to the network, but this
Wired, April 12, 2020, https://www.wired.com/story/big-data-could-          order was repealed in 2017. “CPNI,” Electronic Privacy Information
undermine-the-covid-19-response.                                            Center.

11 Zachary S. Heck, “A Litigator’s Primer on European Union and             15 In Carpenter v. United States, the U.S. Supreme Court addressed
American Privacy Laws and Regulations,” Litigation 44, no. 2 (2018):        the application of Section 2703 of the SCA to cell phone location
59 (“The United States has a patchwork of laws at both the federal          data. The Court held that a warrant was required to obtain seven days
and state levels relating to data protection and information shar-          of historical CSLI from a suspect’s wireless carrier. Carpenter, 138 S.
ing.”).                                                                     Ct. at 2206.

12 The Stored Communications Act (SCA) prohibits covered                    16 See, e.g., Alan Z. Rozenshtein, “Disease Surveillance and the
entities from knowingly divulging to any person or entity the contents      Fourth Amendment,” Lawfare, April 7, 2020, https://www.lawfareblog.
of a communication. It also prohibits covered entities from knowingly       com/disease-surveillance-and-fourth-amendment.
divulging to any governmental entity customer records or other              17 This primer focuses generally on the federal statutory frame-
information. See Stored Communications Act of 1986, 18 U.S.C.               work pertaining to the voluntary disclosure of cell phone location
§ 2702(a) (2020).                                                           data to the government by entities that collect or maintain it. It does
13 There is no definition of “record” in the SCA, but courts have           not, however, cover specific privacy protections available to children
interpreted the term to include some data revealing a customer’s            through the Children’s Online Privacy Protection Act (COPPA).
location, most notably cell-site location data. For example, in             Children’s Online Privacy Protection Act of 1998, 15 U.S.C. 6501–
Carpenter v. United States, the U.S. Supreme Court addressed the            6505 (2020). Neither does this primer discuss state law. Some states
application of § 2703 of the SCA to cell phone location data. The           might have more rigorous data protections. For example, California’s
Court held that a warrant was required to obtain seven days of              Consumer Privacy Act (CCPA) provides consumers with the “right to
historical cell-site location information (CSLI) obtained from a            know” information that businesses have collected or sold about
suspect’s wireless carrier, pursuant to an order issued by a federal        them, a “right to opt out” of the sale of their personal information,
magistrate judge under the act. Carpenter, 138 S. Ct. at 2213.              and the right, in certain cases, to request that a business delete
Location or proximity data may also be considered the “content” of a        information collected about them. California Consumer Privacy Act,
communication, especially if the purpose of a service is to record or       Cal. Civ. Code §§ 1798.105, 1798.100-1798.120 (2020). Geolocation
communicate such data. For example, Google has argued that its              data is included as a category of personal information subject to the
location history feature acts as a journal logging a person’s where-        CCPA. Cal. Civ. Code § 1798.140(o)(1)(G). Enforcement of the CCPA
abouts, with the retained data therefore being the “content” of an          by the California attorney general is scheduled to begin on July 1,
entry. Brief of Amicus Curiae Google LLC in Support of Neither Party        2020. A coalition of civil liberties and consumer groups have called on
Concerning Defendant’s Motion to Suppress Evidence from a                   the California Attorney General to investigate Grindr, Tinder, and
“Geofence” General Warrant (ECF No. 29), United States v. Chatrie,          other smartphone apps and ad tech companies for CCPA violations
No. 3:19-CR-00130 (E.D. Va.), https://www.nacdl.org/getattach-              for sharing location data. ACLU of California et al. to Attorney General
ment/723adf0b-90b1-4254-ab82-e5693c48e951/191220-chatrie-                   Xavier Becerra, “Re: Norwegian Consumer Council’s Report
google-amicus-brief.pdf.                                                    Demonstrates How the Adtech Industry Fails to Respect Consumers
                                                                            Rights and Preferences,” January 14, 2020, https://www.citizen.org/
14 The Telecommunications Act prohibits covered entities from               wp-content/uploads/CA-AG-Out-of-Control-NCC-1.14.20.pdf.
disclosing customer proprietary network information (CPNI) to any
entity, including the government, unless an exception applies. See          18 Jacob Hoffman-Andrews and Andrew Crocker, “How to Protect
Communications Act of 1934, 47 U.S.C. § 222(c)(1) (2020) (“Except           Privacy When Aggregating Location Data to Fight COVID-19,”
as required by law or with the approval of the customer, a telecom-         Electronic Frontier Foundation, April 6, 2020, https://www.eff.org/
munications carrier that receives or obtains customer proprietary           deeplinks/2020/04/how-protect-privacy-when-aggregating-loca-
network information by virtue of its provision of a telecommunica-          tion-data-fight-covid-19.
tions service shall only use, disclose, or permit access to individually    19 See, e.g., “COVID-19 Forecasts,” Centers for Disease Control and
identifiable customer proprietary network information in its provision      Prevention, updated May 6, 2020, https://www.cdc.gov/coronavi-
of (A) the telecommunications service from which such information           rus/2019-ncov/covid-data/forecasting-us.html; David A. Drew et al.,
is derived, or (B) services necessary to, or used in, the provision of      “Rapid Implementation of Mobile Technology for Real-Time
such telecommunications service, including the publishing of                Epidemiology of COVID-19,” Science, May 6, 2020, https://science.
directories.”). Express prior authorization is required for a customer      sciencemag.org/content/early/2020/05/05/science.abc0473/
to approve the disclosure of their call location information. 47 U.S.C. §   tab-pdf; “Privacy-Preserving Contact Tracing,” Apple, accessed May 7,
222(f)(1). See also “FCC Proposes Over $200M in Fines for Wireless          2020, https://www.apple.com/covid19/contacttracing; and Steve
Location Data Violations,” Federal Communications Commission,               Hendrix and Ruth Eglash, “Israel Is Using Cellphone Surveillance to
February 28, 2020, https://www.fcc.gov/document/fcc-propos-                 Warn Citizens: You May Already Be Infected,” Washington Post, March
es-over-200m-fines-wireless-location-data-violations. In the course         19, 2020, https://www.washingtonpost.com/world/middle_east/
of bringing this enforcement action, the FCC interpreted CPNI —             israel-is-using-cellphone-surveillance-to-warn-citizens-you-may-al-
without binding precedential effect — to broadly encompass                  ready-be-infected/2020/03/19/68267294-69e7-11ea-b199-
“location information collected by carriers from a mobile device            3a9799c54512_story.html.
during a telephone call and . . . when the device is turned on and          20 See, e.g., Courtney Linder, “This MIT App Tracks the Spread of
available for calls but not engaged in transmitting a voice conversa-       Coronavirus While Protecting Your Privacy,” Popular Mechanics,
tion.” In the Matter of AT&T, Inc., Notice of Apparent Liability for        March 18, 2020, https://www.popularmechanics.com/technology/
Forfeiture and Admonishment, 35 FCC Rcd. 1743, 2020 WL 1024412,             apps/a31742763/coronavirus-app-private-kit-safe-paths; “Care19,”
at *11 (F.C.C. Feb. 28, 2020), https://docs.fcc.gov/public/attach-          North Dakota Response, accessed May 4, 2020, https://ndresponse.
ments/FCC-20-26A1.pdf. However, as confirmed in a 2013 FCC                  gov/coronavirus-resources/care19; and “Healthy Together Beta App,”
declaratory ruling, the clearly established scope of location data          accessed May 7, 2020, https://coronavirus.utah.gov/healthy-togeth-
protected as CPNI is limited to location information logged in              er-app.
connection with the use of a “telecommunication service” that is,
when making or receiving a call. See “CPNI (Customer Proprietary            21 MIT Media Lab, “Safe Paths: A Privacy-First Approach to Contact
Network Information),” Electronic Privacy Information Center,               Tracing,” Massachusetts Institute of Technology News, April 10, 2020,
accessed May 5, 2020, https://epic.org/privacy/cpni (citing 2013            http://news.mit.edu/2020/safe-paths-privacy-first-approach-con-

14 Brennan Center for Justice                                                Government Access to Mobile Phone Data for Contact Tracing
You can also read