{"id":35986,"date":"2019-01-06T08:05:01","date_gmt":"2019-01-06T13:05:01","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=35986"},"modified":"2019-01-06T08:33:22","modified_gmt":"2019-01-06T13:33:22","slug":"wapo-our-privacy-regime-is-broken-congress-needs-to-create-new-norms-for-a-digital-age","status":"publish","type":"post","link":"https:\/\/fourthamendment.com\/?p=35986","title":{"rendered":"WaPo: Our privacy regime is broken. Congress needs to create new norms for a digital age."},"content":{"rendered":"<p>WaPo: <a href=\"https:\/\/www.washingtonpost.com\/opinions\/our-privacy-regime-is-broken-congress-needs-to-create-new-norms-for-a-digital-age\/2019\/01\/04\/c70b228c-0f9d-11e9-8938-5898adc28fa2_story.html?utm_term=.02fe295ef420\">Our privacy regime is broken. Congress needs to create new norms for a digital age.<\/a><br \/>\n<!--more--><\/p>\n<blockquote><p>OUR PRIVACY regime is not working. This fact became painfully apparent over the past year as Americans realized how much of their information Internet companies possess and how little they have done to protect it. The most popular proposal so far doubles down on the same system that has failed. We need a better approach.<\/p>\n<p>Every recent scandal about today\u2019s technology titans has a familiar bottom line: The sites that have become inescapable features of day-to-day existence know where we live and work, what we buy and think about buying, whom we talk to and about what. They use their deep knowledge of us to make money, insufficiently mindful of any risk. All the while, most of us remain unaware.<\/p>\n<p>It\u2019s not hard to see how this happened. Privacy in the United States runs on a model of \u201cnotice and consent,\u201d which is what it sounds like:  &#8230;<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>WaPo: Our privacy regime is broken. Congress needs to create new norms for a digital age.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[42,76],"tags":[],"class_list":["post-35986","post","type-post","status-publish","format-standard","hentry","category-informational-privacy","category-surveillance-technology"],"_links":{"self":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/35986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=35986"}],"version-history":[{"count":1,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/35986\/revisions"}],"predecessor-version":[{"id":35987,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/35986\/revisions\/35987"}],"wp:attachment":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=35986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=35986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=35986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}