YouTube Kids – Luring Kids in, One App at a Time

Kids

Whether you’re an overnight sensation like Justin Bieber or you’re uploading a tutorial on how to apply the perfect make up; YouTube has become the go-to site for watching all the hottest videos. Technologically speaking, the cyber world has significantly changed over the years, especially with the Internet now being easily accessible from mobile devices. But the most alarming and overlooked trend is the ubiquitous use of the Internet by children.

Today, children use iPhones, tablets and computers to access the Internet as early as three-years-old. With the amount of time children spend online, some have become skilled navigators. The Internet offers children a lot of great advantages. Kids can access educational videos and gain exposure to new concepts and ideas all at the click of the mouse. However, everyone knows as great as the Internet is, there are a ton of risks associated with its use. A particular drawback is the privacy issues that come with such widespread access to information. Children on the Internet alone creates a lot of public concern. Not to mention the development of new devices including cell phones, tablets, and applications (apps), that have now created an alterative way to expose children to a number of privacy related issues online.

On February 23, 2015, Google launched a new app called “YouTube Kids” that is specifically tailored towards the younger YouTube audience. The app creates a site that allows children to search and explore YouTube more easily and safely while locating the videos they want. The app is currently available in the United States for free and can be downloaded on iOS and Android devices.

YouTube Kids features four categories of videos, which include: child-friendly videos; educational clips; music; and shows. The categories raise a number of questions regarding what is going to be done to protect the privacy of children using this app.

How is Google going to receive consent from parents before allowing children to access the app? Will there be ads marketed towards children using the app? If the app is to be used solely by children, what filters are going to be implemented to make sure there are age appropriate videos? Also, it is going to be interesting to see if children are able to upload their own videos, and if so, what type of sensitive information will this potentially disclose? These questions are just a number of those parents may pose; questions that hopefully parents are seeking the answers to by doing research before allowing children to access any services linked to the Internet.

The law that regulates children’s privacy online is the Children’s Online Privacy Protection Act (COPPA). Passed in 1998, Congress created the statute to ensure online service providers and organizations comply with certain standards to help protect children’s information online. This pertains to companies that collect the private information, or data, of children under the age of thirteen online. COPPA does not apply to operators that do not collect information. In other words, COPPA protects information that is gathered from children, but not necessarily the information collected about children.

In 2013, COPPA strengthened children’s privacy protections online by expanding some requirements to ensure the law reflected the new technology that has been developed since 1998. The expansion covers tablets, cell phones and the apps that can be downloaded onto these devices. The law applies to sites and apps that are geared towards children and collect the data of children under the age of thirteen. COPPA also applies to sites and apps that have general audiences but have actual knowledge that data is collected from children under thirteen.

COPPA is complicated. Essentially, the law aims to provide notice to parents that a child’s personal information is going to be collected, consent to verify the collection is authorized, and to let the parent know the child’s information is going to be protected. The law goes into depth as to all the requirements, but varies depending on the specific service provided and what type of information is collected. In any case, if a site or app is collecting a child’s personal information, the parent has the power to access the information collected, to demand the cease of the collection of information at any point, and requires the data collected be deleted at any time.

Looking closely at the language of COPPA, the law does not require that operators investigate the age of the children using their sites or apps. As long as a company does not collect information from children under thirteen and explicitly says so, the company does not have an obligation to make sure children under thirteen are not actually using their service. This means parents are responsible for making sure children are observed while online and are not consenting to use a site or app themselves. The Federal Trade Commission (FTC) is the governmental agency that regulates unfair and deceptive practices against consumers, and this includes practices against children.

Since YouTube Kids is definitely geared towards a young audience and if Google plans to collect the information of the children using the app, YouTube Kids will need to comply with COPPA. Specifically, in regard to consent. But the concern still remains regarding how parents are going to be given notice about data collected on their children, and what kind of consent is appropriate for an app like YouTube. Currently, consent standards that adhere to COPPA include: emailing a parent; requiring a permission slip that is signed and sent back; a 1-800 number that allows a parent to call in to confirm; video-conferencing; governmental identification check; or any other reasonable efforts to obtain consent. This also poses the question as to how many times consent is going to be needed and what efforts are in place to assure the children are not consenting themselves. Realistically, there is no definite way to prevent children from accessing the Internet or downloading apps in general, besides parental oversight. However, YouTube Kids is going to have to get ready for any issues that may arise with consent.

Another issue is the area of marketing. If adults are being targeted with specific ads, children could very well be susceptible to the same. Users of the app have already mentioned child-friendly ads are used pervasively. This also raises the question as to whether third party companies that are advertising on the app are also complying with the same level of privacy standards as Google. Additionally, it also becomes a concern if parents will have to provide consent to allow these third parties to collect the child’s information as well.

The content available on YouTube Kids is going to be another issue that parents are going to have to examine. Depending on whether children are going to have the capability of uploading their own videos, COPPA now categorizes voice and video uploads as personal information. Thus, if children can upload content on YouTube Kids, there will likely be issues regarding how consent is obtained, and if it will be required just once or every time a video is uploaded.

Another obvious concern is who is going to be able to access and upload videos onto YouTube Kids if there are people out there specifically looking to target children with inappropriate content. On the other hand, there is optimism about Google taking appropriate measures to ensure children are protected and the content on YouTube Kids is filtered. This is also mentioned as a positive move in the right direction, since a number of Internet and app providers moved away from offering any child-friendly services after COPPA made updates to the law. The app also provides preferences for parents including removing the search bar entirely, thereby only allowing children to watch videos. However, users of the app say the parental controls are not secured by password and therefore give children that are old enough to read the opportunity to change the settings. The comments are also disabled which is another filter YouTube Kids offers; probably to remove any inappropriate content and potentially to prevent cyber-bullying.

Whatever Google has in store for providing online services tailored for children, offering YouTube Kids through the app is one way to test through trial and error. This includes the number of privacy issues that will be present if and when the app moves to the web. For now, COPPA offers at the very least protective measures to keep children’s information collected online private. This framework is not perfect and may leave room for leeway by operators, however it is better than nothing. Either way, there is still the possibility that children under thirteen are using YouTube now. If so, hopefully Google is tailoring this app to the younger children who have not accessed the Internet yet. It will be interesting to see how YouTube Kids complies with COPPA, and if not, the FTC will be watching closely.

Advertisements

Celebrity Nude Photo Leak: Just One More Reminder That Privacy Does Not Exist Online and Legally, There’s Not Much We Can Do About It

FilmOn August 31, 2014, the Internet nearly exploded.  A website called 4chan.org uploaded nude images of over 100 women, including many well-known celebrities.  Though this was not the first incident of private celebrity photos (or videos) being made public on the Internet, it was the largest leak of its kind to happen all at once.  The intimate photos posted on 4chan were taken from each celebrity’s personal iCloud account.  A few days after the leak, Apple confirmed that individual iCloud accounts were hacked in a “targeted attack” where hackers used “brute force” to gain access to individual usernames and passwords.  Since the initial leak, several more rounds of stolen private celebrity photos have been released by 4chan.org.

Additionally, less than six weeks after the initial 4chan celebrity photo leak, a website called viralpop.com posted a database of at least 100,000 Snapchat photos which were intercepted by hackers and then later downloaded onto 4chan’s website.  Snapchat is an app where users send photos or video clips to their friends which self-destruct within 10 seconds of receipt.  Once the database was posted on viralpop, users of 4chan downloaded the files and created a searchable database where people can find photos by searching for Snapchat usernames.  Aside from the obvious privacy concerns of users who believed that their photos were deleted, the Snapchat leak is perhaps even more disturbing than the celebrity photo leak because many of the nude photos released are of underage boys and girls (half of Snapchat’s users are between the ages of 13 and 17).  It is not clear whether Snapchat will be sued over this incident, though Snapchat maintains that the leak originated from third party apps which Snapchat’s Terms of Use expressly prohibits.

In the weeks following the celebrity nude photo leak, a heated discourse emerged from online and traditional media outlets and from the celebrities themselves via social media.  While most people agree that it was a criminal breach of privacy when someone hacked into the iCloud accounts of celebrities and publicly exposed their private pictures, some also believe that the victims of the breach should take responsibility for their part in the incident.  These critics believe that the celebrities should have taken better care to secure the photos or not taken nude photos in the first place, because they knew that being famous would make them a target for this type of attack.  Most of the celebrities involved in this breach were women, which has led some critics to suggest that this violation of privacy is yet another example of female oppression in our male dominated society.  This sensationalized exploitation reminds women that they have no right to privacy in the age of the Internet when it comes to their own bodies.  Actress Jennifer Lawrence, a victim of multiple rounds of the 4chan photo leaks, said in a recent interview that the leaks amounted to a sex crime and accused people who viewed the photos of perpetuating a sexual offense.  It is important to note that less than a handful of male celebrities have had private photos stolen from their iCloud accounts and released as part of this celebrity photo leak.  Also, though not surprisingly, the public indignation about the incident is primarily centered on the victims we recognize.  Very little of the discourse even refers to the hundreds of photos of not-famous women which were also released in these leaks.

We have also learned from this massive breach that there is little legal recourse for victims of hacking.  After the photo release, celebrity victims turned to lawyers and copyright infringement law to resolve their problem.  Martin Singer represents a group of unnamed celebrities whose photos were released on 4chan.  Singer sent a letter (and released it to the press) threatening to sue Google for over 100 million dollars for not acting quickly enough to remove links to the photos from its search lists.  Singer’s letter cites the Digital Millennium Copyright Act of 1998 which provides a safe harbor from liability to internet service providers who do not have actual knowledge that its users are posting “infringing” materials.  In the letter, Singer maintains that Google has had actual knowledge of the infringement by its users because Singer himself sent Google “dozens of notices” since the initial photo leak demanding that Google remove the content.  Google has since responded that it removed thousands of photos within hours of each request and closed hundreds of user accounts.

It may seem odd that Google is the target of this lawsuit because Google is primarily a search engine; Singer’s letter does not accuse Google of hacking into the iCloud accounts or posting the leaked photos online for all to see.  But, aside from having deep pockets, there is another reason that Singer could be targeting Google: the real photo hacker(s) are unknown and may never be discovered.  Other hacking incidents over the past couple of years highlight the near impossibility of prosecuting these types of criminals.  Numerous times, anonymous yet extremely sophisticated hackers have stolen sensitive customer information from large retailers and even banks, without any legal repercussions.

Although there are a host of laws in place that criminalize hacking, because of the nature of the crime and the nature of the Internet itself, hackers are rarely punished.  Most attempts to curb photo leaking on the Internet do little to protect victims.  Recently, California enacted laws that criminalize “revenge porn,” similar to laws already in place in 12 other states.  Both SB 1255 and AB 2643 were signed by Governor Brown on September 30, 2014.  Largely, these laws aim to prevent jilted former lovers (or anyone else who might have nude photos of someone) from posting private photos online to publicly humiliate the victim.  SB1255 states that a person who intentionally distributes naked photos or videos of a person engaging in a sex act “knowing that the depicted person does not consent, is guilty of disorderly conduct.”  AB2643, alternatively, gives victims of revenge porn the right to file a civil action against the perpetrator who distributed the material without the victim’s consent, provided that the victim suffered severe emotional distress.  Although these laws are a significant step in the right direction toward protecting individual privacy, the circumstances under which these laws apply are very narrow, and thus not very effective.  The laws only apply to the person who makes the recording, not third party distributors who publish the photos for all to see.  Also, if the victim took the recording or photo of him or herself, these laws do not apply.  Neither the victims of the leaked celebrity photos nor the victims of the stolen Snapchat photos will benefit from these laws.  The frustrating reality is that there is little to no legal recourse for many victims of these types of privacy breaches.  It is unclear how the law will develop to provide greater individual privacy protections around the Internet in the future, but as it stands now, it is doubtful that any law could fully protect privacy on the web.  For now, it seems the only way to protect your privacy is to rely on yourself.

Maintaining complete privacy over material stored or sent online is undoubtedly impossible to achieve, but for those who enjoy the convenience of technological innovations, there are a few simple steps one can take to help increase the protection of their privacy.  First, if you choose to use cloud storage systems to store personal photos or information, be sure to take advantage of the highest security system that that provider allows.  Since the celebrity photo leak, Apple and other companies have written about how to do this.  The most important take-away for protecting any online account is to have effective password protection; passwords that are difficult to crack, using different passwords for different accounts, and changing passwords regularly.  Second, if you are using internet capable devices to take private photos, be sure to disable any feature that automatically uploads photos to a cloud storage system or social network application.  In other words, store private photos locally on devices or external hard drives that only you can access.  Third, do not send private photos to third parties via electronic device unless you are absolutely sure that you can both trust that person (today and in the future) not to share the photo and trust that the person’s devices and online accounts are also secure.  The bottom line is that it only takes a few taps on a smartphone to make something very private turn into something very public, and once something is online, it is out of your hands forever.  With so few effective legal protections in place, it is up to each individual to vigilantly take precautions to protect private material.

More Than Meets the Eye with New Google Contact Lenses

contacts patent applicationTechnology informs privacy.

This is the lesson we relearn every time a company puts out a new product that changes the way we interact with the world and each other.  The recent disclosure of Google’s filings with the United States Patent and Trademark Office last year for a contact-imbedded “image capture component” (read: camera) caused a flurry of commentary by privacy hawks and tech fans alike.

The proposed contacts will contain a camera, sensor, and control circuit, and will likely communicate wirelessly with a remote device (smart phone) to store and process the pictures, or send them straight to the cloud.  The contacts appear to be controlled by the included sensor to take pictures via eyewinks or other eye gestures, which will make using the contacts virtually imperceptible to others.

This raises the question: if the contacts are invisible to others so that it’s impossible to know if someone is wearing them, how can you know if they are being used to record you without your consent?  Traditional cameras and smartphones require the user to obviously point and click to take a picture, giving you the opportunity to get out of the frame if you do not wish to be photographed.  Even Google Glass wearers are obtrusive enough that they provide notice to those around them that they might get recorded.  In contrast, Google Contacts would provide no such notice to others.  Someone wearing Google Contacts would be free to snap away, and those around them would be completely oblivious.  These issues continue to draw a bright line between those understandably worried about the privacy concerns the futuristic contacts will impinge, and those excited about the more positive potential applications of the new mini cameras.

The debate is nothing new.  As far back as 1890, Warren and Brandeis wrote their famed piece on privacy inspired by the invention of the handheld instant camera.  Prior to this, anyone who wanted their picture taken had to pose for a long time, and so only those who were really into having their picture taken would put up with the hassle to do so.  With the advent of the handheld camera, for the first time a camera owner could snap your picture without your consent.  Warren and Brandeis worried about the consequences for privacy in a world where all anonymity is lost because anyone may take your picture at any time.

The emergence of Google Glass sparked privacy concerns over the potential for well-equipped strangers to record you without your consent. In response, some establishments have banned Google Glass at the door outright in an effort to ease their customers’ minds and prevent situations where a Glasshole enrages other patrons by blatantly filming them against their wishes.  The danger of Google Contacts is they bypass the social issues of Google Glass and can be worn invisibly by anyone.  If they do indeed come to market, what remedies will be available to those who wish to go about their lives unrecorded?

Although you usually do not have a reasonable expectation of privacy in a public place that does not mean that you give up all privacy protections when you step out your door.  A celebrity is expected to put up with a certain amount of publicity for their private affairs, and they make the decision to give up their anonymity in exchange for the other benefits celebrity offers.  But Google Contacts have the potential to make us all celebrities without our permission.  We should not have to give up our anonymity without our consent.

Additionally, while it appears the contacts do not currently have video recording capability, such technology is likely not far off.  While public video cameras are increasingly becoming an unfortunately ubiquitous fact of life, there is a difference between being recorded by a building-mounted camera without sound while you walk down the street, and being recorded by the person at the next stool over while you talk with your friend at the bar.  Even absent video capability, the idea of a user at a bar or restaurant secretly taking photos and processing them instantly with facial recognition software in the cloud is enough to raise anyone’s privacy hackles.  Google currently prohibits facial recognition software on Google Glass, but it is more than probable that third parties will implement such software in the near future.

Even with a ban on facial recognition, Google is a company that makes its money off of targeted advertising.  It is hard to believe that the company would not employ some analytics to the camera on Google Contacts, and there would be no way to know how many were running at any given time.  The Contacts would also allow Google to stream ads directly to your eyeballs, and while wearing the Contacts there would be no way to look away.  This would enable Google to charge a premium for Contacts ad space, increasing its incentive to analyze everything that the Google Contacts wearer saw.

Furthermore, the rise of Big Data and the drive to collect anything and everything and store it in the cloud for future use, in addition to the NSA’s interception of massive amounts of customer data from Silicon Valley companies, would combine with Google Contacts to create a recipe for privacy violations of enormous proportions.

All this brings us to the conclusion that perhaps, just as Warren and Brandeis felt, we need a new conception of privacy.  The thought of Google Contact users capturing pictures of those around them without their knowledge just feels creepy.  While we all admittedly give up a certain amount of privacy when we walk out our door each day, there must be a limit to what we give up.  We still maintain the right to associate with others, and speak our minds freely without being constantly recorded.  If we are to be recorded, then we need to be notified and given an opportunity to consent.  The problem with camera contacts is that they are invisible, making any effort to enforce or regulate their usage a daunting task.  While they undoubtedly would have some exciting applications, their potential for abuse just seems too great.

The Historical Significance, Modernization, and Future of the Video Privacy Protection Act

Mouse

In the twenty first century, we are accustomed to the privacy protections that prohibit video rental service companies from releasing our consumer service history to other sources without first obtaining our written, signed consent.  However, most consumers likely do not know the historical significance of why we came to appreciate these privacy protections or what the exact terms of these privacy protections are….

 The Consumers’ Perspective

Businesses have gained significant momentum by the Video Privacy Protection Act’s (“VPPA”) 2013 amendment in present and future video industry markets, such as online video streaming and social networking partnerships – and these impacts extend to the consumers.  These changes can be considered as either beneficial or harmful.  And even though the VPPA has “modernized” to some extent by incorporating modern technology and communications, it has not fully “modernized” to preserve the privacy rights the VPPA was enacted to protect.

First, now that “Online Consent” is permissible, it is as easy as clicking “I accept” on a browser webpage to share your favorite movies and video service providers within your network.  “It’s about time!” is the response most likely to come from the network-friendly user.  Everything else we do online can be accepted and shared just as simply, but we did not have to wait until 2013 for this to happen.  For those who have been waiting to share their most recently viewed television series with their friends, this is a great benefit.  However, this can also be a scary concept for the cautionary user who prefers to keep his “Personally Identifiable Information” (PII) private.  If this latter user decides he wants to share memories of a childhood movie with his childhood friend whom he connects with online only, he will be able to.  But he will have to weigh how important it is to him to share this memory when he must conjointly allow his service providers to share his PII with their business partners.  This amendment may have its social networking perks, but there is no provision here that furthers the interest of consumer privacy by allowing the video industry to obtain consent to share PII online.  With so many people utilizing the web, it is probable that consumers will affirmatively eradicate the need for consumer privacy laws by over-sharing their information such as their video preferences on their social networks.  And it will not matter the extent to which their service providers gather and take advantage of the consumers’ PII, unless each consumer takes the “time and tenacity” required to erase herself from the Internet.

The second provision provides that video rental companies must obtain consent in a “distinct and separate” manner outside other terms and conditions.  This requirement is the biggest benefit consumers could have asked for.  This is because modern usage of fine print is illusory where only less than one in one thousand persons actually read the fine print online when accepting service contracts.  As Andy Greenberg puts it in his article, Who Reads The Fine Print Online? Less Than One Person in 1000: “take a look at the actual statistics that show who reads the fine print, and the numbers are so close to zero that they call into question whether those legal disclosures should even be considered a safeguard for consumers.”  At the very least, the amendment grants consumers who are truly against allowing their service providers to share their PII with the providers’ business partners an explicit opportunity to say NO.

The stalest portion of the amendment in furthering consumer privacy is that the consent period has increased to a two-year maximum if it is obtained in advance.  Fortunately, the consumer can withdraw consent if he feels this time period is too long for him to trust a video company and their partners with his PII.  This portion of the amendment adds absolutely no value for the consumer, who obtains zero financial benefit.  It takes only a second to click a button, and an individual can simply accept to share their PII on a case-by-case basis just as easily as sharing their video preferences with their social networks.  However, providing blanket consents and even limited consents to video companies and their partners to PII for two years is nothing but intrusive to the consumer’s privacy.

If a person truly wants to revoke every video company’s right to share their PII, she can.  This is because the last significant portion of the amendment requires video rental companies to provide consumers with the opportunity to withdraw their consent.  So if she changes her mind and decides she does not want her video service provider to share her PII, even though she shared her video preference(s) with her best friend in a private message on her social network, she can prevent her video provider’s access going forward – she just has a bit of footwork to put in. First, she will need to remember how much consent she has provided (whether it was one blanket consent or several, unique consents).  Next, she will need to link these consents back to the individual video companies and track them down (either in person, via phone, or online).  Finally, she will need to contact them and submit her revocation request.  It is simple.  And it is as unlikely as it is simple that most people will go through these steps – only less than one person in 1000 even reads fine print… It is an extreme improbability that people in our “on demand world” would bother to re-trace their video rental and purchase history in order to eradicate any possible exploitation of their PII.

***

This online article is a shortened-summary of the in-depth research paper I wrote in Fall 2013. In that paper, I focused on the history of the Video Privacy Protection Act (VPPA) of 1988, an online streaming company’s lawsuit, the resulting lobbying for change in the VPPA, the 2013 amendment of the VPPA, and the benefits and consequences of these changes.  Here, I state only the 2013 amendment’s impact on the consumers.  However, the complete research paper is available on my LinkedIn page at http://lnkd.in/bKnFHy7 or you may click on it under my “Experience” section of my full profile at http://www.linkedin.com/pub/erica-williams/41/81/808/.

The Sky is the Limit: Regulating the Next Generation of Privacy Invasion

sky

Last year in Texas, a man sent a drone up into the sky and inadvertently exposed an environmental nightmare.  Images taken from a digital camera mounted on his remotely controlled drone, also referred to as an Unmanned Aircraft System (UAS), captured what appeared to be a creek running red with blood.  As it turned out, Columbia Packing Company, a small meatpacking plant in a suburb of Dallas, had been pumping pig’s blood into nearby Cedar Creek through a pipe originating in the back of its slaughterhouse.  The pipe was not connected to the slaughterhouse’s waste water system.  Even more alarming, the creek flows directly into the Trinity River, an increasingly popular destination for kayaking and recreation.

Unbeknownst to this drone enthusiast, his little joy ride would result in an indictment on water pollution charges for two of the plant’s leaders, with potential fines of up to $1.5 million.  And how did Texas respond?  Not by tightening regulation of the meatpacking industry or increasing penalties for this type of heinous conduct.  Instead, the Lone Star State passed a law restricting private citizens’ use of drones.

As of September 1, 2013, using a drone to capture unauthorized images of persons or private property in Texas is now punishable by a fine of up to $500.  The law also allows for the imposition of up to $10,000 in civil penalties against those who improperly photograph and distribute the captured images of another’s person or property.  Although the law is perhaps the strictest in the country in terms of protecting privacy rights from this new-age technological intrusion by ordinary citizens, it affords gracious exceptions for law enforcement’s use of drones.  It seems the law’s main goal is to make explicit that the average Joe shouldn’t use drones to snoop on his neighbors.

Two thoughts come to mind. 1) Don’t mess with the meatpacking lobby in Texas.  2) Texas got it right.  More states should limit the reach of surveillance that private citizens are capable of due to technological advances.  As an extremely new issue for legislators, only nine states currently have laws restricting the use of drones.  The first state to pass drone legislation, Virginia, only did so on April 3, 2013.  Among the states that have passed or proposed legislation restricting drone use, there is a wide variance in the substantive law.

Some of these states, like Texas and Idaho, address the use of drones by ordinary civilians, but most states’ laws focus on the implications of law enforcement use of drones.  Idaho arguably has the most restrictive legislation regarding the use of drones by law enforcement, but stops a little short of Texas in restricting drone use by private citizens.  Because the Idaho law carves out an exemption for civilians flying drones for purely sport or recreational use, it is second to Texas, which has no such exception.  But it is still a front-runner among other states in protecting privacy from intrusion by private citizens.

The farther we go down the technological rabbit hole, the more our interactions with the world and the people around us change.  Drone technology is only one of many recent innovations that have left people with the uneasy feeling of being watched.  We are constantly photographed and recorded by people who use their mobile devices to catalogue the details of their day.  Google Glass, the latest in “wearable technology,” allows users to record videos of everything in their view.  Further, there now exists the capability for inanimate objects to watch you while you’re watching them.  By tracking the movements of viewers’ eyes, advertisers will be able to make ads more effective based on what has drawn the viewers’ attention.  This flood of new capabilities borne of technological advances comes at a price, leaving many with the uncomfortable feeling of being under constant surveillance.

While the ship may have sailed regarding cell phones, Google Glass, and eye tracking, we must draw the line at allowing private citizens to remotely record one another using drones.  More states should follow Texas’s lead by restricting the ability to capture images of one’s person or property without consent.  As technological advances inevitably persist and technology capable of surveillance becomes more accessible, it will become increasingly important to consider the impact that civilian use of this technology will have on privacy.