ANALYSISMEMBER

Dressing old laws in class-action suits: Tracking technologies that disclose personal information

Published
Subscribe to IAPP Newsletters

Contributors:

William Simpson

AIGP, CIPP/US

Westin Fellow

IAPP

Editor's note: This is the second article in a three-part series that tracks class action litigation at the nexus of privacy, artificial intelligence, and other digital technology. The first article, "Dressing old laws in class-action suits: Applying anti-wiretapping laws to AI transcription services," looks at how decades-old anti-wiretapping laws have found new significance due to the emergence of automated technologies capable of eavesdropping. 

As discussed in the first part in this series, the plaintiff's bar continues to repurpose old laws in the context of emerging technologies, attempting to enforce privacy rights using class-action lawsuits. Recent legal theories have applied the California Invasion of Privacy Act and the Video Privacy Protection Act to prevent the disclosure of personal information through tracking technology. One of these suits resulted in a rare jury verdict and another in a novel class certification. 

CIPA violation gets a plaintiff-friendly jury verdict

Software development kits allow app developers to incorporate ready-made features into their products. That said, "SDKs have caused particular regulatory consternation due to their role in tracking location" and those that enable real time interception of CIPA covered communications carry real risk for developers and vendors alike. 

In August, a unanimous jury found that Meta violated CIPA Section 632 in the case of Frasco v. Flo Health by intentionally eavesdropping on plaintiffs' confidential communications without consent. Plaintiffs alleged Flo Health, the developers of a sexual and reproductive health app, shared personal information with Meta and Google without their consent, including menstrual cycle timing, preferred birth control methods, and details about sexual activity. The app allegedly recorded user interactions that were then intercepted by the SDKs and collected by Meta and Google for advertising, marketing, and research and development purposes. 

Contributors:

William Simpson

AIGP, CIPP/US

Westin Fellow

IAPP

MEMBER

Unlock this exclusive content and more

Join the IAPPAlready a member? Sign in

Membership opens up a world of resources

In-depth knowledge

From original research reports and daily news coverage to legislative trackers and infographics, we have the information you need to stay ahead of change.

A global network

Make valuable professional connections through more than 160 local IAPP KnowledgeNet chapters in 70 countries.

Access to the experts

Connect with top thinkers in privacy, AI governance and cybersecurity for fresh ideas and insights.

Learn what you get from membership