No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Data Privacy

Functional Privacy: A New Concept to Simplify Legal Analysis

In-house counsel & practicing attorneys face challenges as advancement of technology outpaces regulatory response

by Joe Andrieu, Scott David and Lynn Parker Dupree
July 22, 2024
in Data Privacy, Risk
closed door representing privacy

As digital interactions and AI-driven processes advance more rapidly than regulatory frameworks, traditional legal approaches to privacy and identity are falling behind — and in-house counsel and other legal professionals face the challenge of providing sound advice amid these changes. Joe Andrieu, Scott David and Lynn Parker Dupree introduce a new concept for attorneys: Functional privacy, which links historical legal precedents to modern technological realities.

Few concepts in law are as challenging as identity and privacy.

“Identity” is ubiquitous in law. It’s relevant in contracts, evidence, title, intellectual property, agency, services and a host of other legal settings. The ambiguity and jurisdictional complexity of “privacy” results in complications and frictions in all sorts of communications, interactions and information-sharing arrangements.

Practicing attorneys and in-house counsel find it increasingly difficult to provide advice on privacy and digital identity issues in a world where legal authorities lag behind real-world information risks. The challenges continue to grow, as AI-fueled interactions are adopted by more individuals and organizations. How can practitioners deal with the gap between legal precedents in all jurisdictions and the potential risks upon which they provide advice? How is counsel supposed to guide corporate activity in the rapidly and continually changing face of the digital world?

We have a suggestion: functional privacy, which links yesterday’s legal precedents and solutions with tomorrow’s tough legal questions. The approach focuses on the degree to which a given legal structure supports the expected performance of the functions of real-world systems through which people and institutions recognize, remember and respond (3Rs) to specific people and things. 

Introducing functional privacy

In short, functional privacy is the voluntary alignment of expectations about how we recognize, remember and respond to specific people and things. 

This definition builds on the concept of “functional identity,” which describes identity systems in terms of how they function: how identity works and how we use it. This focus on objectively testable functional metrics (the 3Rs of identity systems) harnesses the power of identity across domains and jurisdictions while also disambiguating privacy commitments. All identity systems can be described, analyzed and regulated based on how they perform the three functions of recognizing, remembering and responding to specific people and things.

By linking privacy to measurable performance elements of functioning identity systems, attorneys are better able to provide specific and actionable advice on the sorts of contractual arrangements and other structures through which people and entities can reliably and predictably reduce their risk and leverage their effects in today’s networked interaction and information environments. 

Functional privacy supports objective and auditable measurements through which lawyers and their clients can more confidently and consistently navigate the transitions in law and business that are driven by advances in networked information, AI and other future technologies that affect our interactions and to effectively identify, isolate and mitigate the new risks.

Setting the stage for shared expectations

Functional privacy naturally integrates legal precedents (and cultural preferences) from existing laws and across jurisdictions. Existing precedents and cultural preferences reflect and reaffirm established expectations about system functions. 

By focusing on how we use identity and privacy in the real world — and how these concepts guide functionality in identity systems at present and in the future — we can naturally embrace and build on prior and current practice and precedent, reducing risk and cost for all parties. The 3Rs focus provides a logical, scalable and common-sense framing that can help manage organizational changes consistent with evolving expectations and developing legal precedent.

In prior decades, existing legal precedent has both reflected and shaped organizational 3R processes that render identity- and privacy-related functions reliable and predictable. 

For example, identity authentication processes at all organizations (a.k.a. how we “recognize” each other), are shaped by local privacy and data security laws and regulations. The phenomenon of law informing organizational policies and functions continues to be reflected in the organizational function-shaping effects of technical requirements and policy imperatives compelled by identity and privacy-related laws and precedents, such as the EU’s GDPR and HIPAA and Gramm-Leach-Bliley in the U.S. 

However, the statutory and regulatory public law lags behind rapidly changing technologies. Advances in telecommunications and online information networks continue to transform society, yet the public law inevitably reflects a time capsule of expectations of identity and privacy frozen in precedent. The laws are not wrong but are continually rendered anachronistic by advances in technology and, in particular, advances in information-related technologies.

The faster technology advances, the more the legal precedent lags real-world functional practices. The result is a legal narrative void that provides insufficient support in helping to establish shared expectations about system and organization function performance expectations in the gap between fast-moving technical practices and slow-responding law. 

Risk emerges in the absence of shared expectations.

Functional privacy focuses attention on dynamic party expectations regarding identity (3R) interactions and asks what is needed to satisfy those expectations — in the absence of coherent legal precedent. When party expectations about 3R activities are explicitly managed, in business, operating, legal, technical and social domains, the degree to which those expectations are shared offers the foundation for agreement and the degree and ways in which party expectations vary inform topics for clarification and negotiation by the parties. 

In this way, functional approaches documented in contracts provide a bridge from past precedent (and expectations) to future shared expectations and best practices. The contractual duties established in contracts (whether bilateral, multilateral or mass contracts) help to fill the duties gap between law and technology. It is from duties (whether established by contract or public law) that all rights are made legally cognizable and realizable. Privacy rights, without corresponding actionable duties, are merely words on paper.

Risks arise when the functions of 3R systems don’t meet the expectations of one or more parties to an interaction. The meeting of the minds in a well-prepared contract represents the alignment of party expectations and a minimization of risks to the parties. When expectations about the performance of elements of any 3R systems are not aligned, risk arises for both parties. 

Functional privacy invites attorneys and their clients to incrementally and specifically reduce risk by focusing on detailed functional aspects of operational identity systems in a given context, jurisdiction and culture, and documents those expectations in terms of rights and duties in agreements and education. When systems operate across borders, languages and contexts, functional analysis of identity systems helps identify anomalies to be addressed in contracts — either directly through performance service-level agreement  terms, representations and warranties (for known risks), etc., or indirectly (for unknown risks) through mechanisms of indemnity, insurance, etc.

Functional privacy frames all interactions among people, organizations and inanimate things, not just interactions among humans, further amplifying its potential for applications in legal analysis and advice. The broad application and the focus on expectations enable scaling of application, while the focus on objectively measurable expectations of performance of identity systems enables accountability and enforcement of expectations across myriad formerly isolated domains. The ability to deliver localizable scale and accountability hints at the potential power of the functional approach. 

Functionality puts legal counsel in the position to identify and document their clients’ expectations in contracts and other legal arrangements from which their respective identity and privacy requirements can be more efficiently satisfied.

company retaining customer data in files
Data Privacy

New York Strengthens Data Retention & Disposal Requirements

by Joseph Shepley
February 19, 2024

Companies may find existing systems need augmenting to meet new rules

Read moreDetails

Understanding the 3Rs

The 3Rs may initially sound mysterious, but a few examples reveal how familiar they are, particularly in legal practice. In fact, most (and possibly all) of the interactions that lawyers deal with can be usefully categorized as being associated with recognizing, remembering, and responding among entities. 

System elements through which an entity recognizes another entity are pervasive in commercial and social circles and are foundational to trust in those systems. Systems of procurement and inventory management, qualification/certification, value transfer, evidence rules and a host of others all implement different mechanisms for recognition. 

Authentication systems are recognition systems that connect a current participant with a known record. We regularly do this with usernames and passwords, credentials, biometrics and cryptographic challenges. In fact, the levels of assurance (LOA) concept reflects different levels of expectations of parties associated with different risks in interactions. As noted previously, the functional approach comprises a new framing, but it reflects myriad practices, including systems for recognizing, that are as old as society itself.

The systems through which humans and other entities remember each other are evidenced throughout social systems and the legal systems that they depend on. Systems of membership, land title, professional certification, employment, payment, warehousing, banking, voting, supply chains and a host of others all depend on systems to reliably remember their relationship to other entities. 

Land title is a system of reliably and intergenerationally remembering who owns land. The 3Rs approach even helps to analytically position new types of interactions. Consider, for example, that blockchain technologies underlying bitcoin are distributed ledgers that are intended to create decentralized systems of collective remembering to prevent double spend.

Finally, systems of responding include all manner of mechanisms for interaction and communication, many of which are shaped by legal considerations. For example, how a company uses stored (remembered) information to respond to customers and other recognized parties is affected by a host of laws and regulations relating to data usage and security, consumer protection, payment processing, advertising rules, sectoral regulation, FTC applications of trade law, anti-discrimination laws, state privacy laws and a host of other legal considerations. 

In short, responding is how any computational or cognitive system uses identity information to moderate or provide services. A functional approach can help frame emerging risks. For example, use of artificial intelligence to respond to customers creates new legal and financial liabilities. Proposals to provide notice to consumers about AI usage in commercial contexts (such as in online services, chat functions, advertising, advice, etc.) are intended to help assure that recipients of communications are aware of the source of the responses they receive and to protect themselves accordingly. Such notice is just one way a firm might establish an alignment of expectations with its counterparties.

Examples of 3R framing of everyday identity and privacy system functions
Setting Recognize Remember Respond
Parking lot Key Lock Correct key opens lock
Retail store Credit card Bank record Access to credit given
Factory/office Key card Employee ID registry Unlock door
Computer login Password/biometric Authorization registry Grant access to system
Law office Law school diploma Law school records Admission to practice
Banking withdrawal Debit card PIN ATM/bank records Dispense cash
Loan security UCC-1 Central filing location Perfect security interest
Online interactions Username Cookies Custom content/ads
HOV tolling License olate DMV registry Send toll bill to driver
Grocery store Trademark Consumer recalls ads Purchase trusted brand
Work for hire Role-based access Permission structure Adopt employee output
USCIS Form I-9 Passport Archive form I-9 Hire

There is a growing global trend and aspiration in privacy laws to provide individuals with greater control about whether and how their personal information is shared and sold, which invites that companies better respond to consumer choices. 

The application of functional privacy focuses attention on the measurable and auditable performance of identity systems across a variety of business, operating, legal, technical and social considerations and can help attorneys and their clients to respond to this trend and have greater insight into the degree of reliability and predictability and overall integrity of networked information systems, even as those systems continue their torrid rate of growth fueled by network effects and AI. 

The functional approach and the 3R framing of identity provide greater leverage in strategies for future interactions and a basis upon which to mitigate risks with greater confidence.


Previous Post

Alveo Merges With Gresham Technologies

Next Post

New EU Rules on Digital Resilience Are Coming Soon; Are You Ready?

Joe Andrieu, Scott David and Lynn Parker Dupree

Joe Andrieu, Scott David and Lynn Parker Dupree

Joe Andrieu is founder and CEO of Legendary Requirements, a tech consultancy focused on requirements engineering for decentralized identity. He is former co-chair of the credentials community group and lead author of the use-case documents for verifiable credentials and decentralized identifiers, both recommendations from at the Worldwide Web Consortium. He is also the creator and editor of the "DID Method Rubric," an approach for evaluating DID Methods published by the consortium.
Scott David, J.D., LL,M., is director of the Information Risk and Synthetic Intelligence Research Initiative at the University of Washington Seattle's applied physics laboratory and was formerly the executive director of the law, technology and arts Group at UW School of Law. Over the past decade, Scott has been active in several programs of the World Economic Forum, the United Nations Sustainable Development Solutions Network, the IEEE and a host of other organizations addressing the challenges associated with global information network and interaction system transitions.
Lynn Parker Dupree, leader of Finnegan’s privacy practice, focuses on privacy compliance, governance and counseling for clients navigating the dynamic legal and regulatory privacy landscape. Her years of privacy experience provide her with the sharp ability to provide actionable privacy advice and guidance, and a keen understanding of the ways technology can be used to protect individual privacy. Prior to joining the firm, she served as chief privacy officer of the Department of Homeland Security.

Related Posts

hal 9000

Agentic AI: The Promise and Peril of Autonomous Intelligence

by Steve Durbin
September 12, 2025

Shift from passive AI tools requires rethinking accountability, security and human oversight

news roundup data grungy

Finance Teams Double Use of AI

by Staff and Wire Reports
September 11, 2025

Workers increasingly abandon 9-to-5 schedules as employers offer flexible options

paint samples diversity concept

The DOJ Released Guidelines on Non-Discriminatory DEI for Federal Contractors; Have You Audited Your Program Lately?

by Cara Crotty
September 10, 2025

In July, the DOJ released updated guidance on what might constitute “illegal DEI” by government contractors under an executive order...

talent management concept

How to Use the 4 Bs Talent Framework: Build, Buy, Borrow & Bots

by Asha Palmer
September 9, 2025

Integrating compliance talent requires structured approach that aligns with today’s reality

Next Post
flags at eu

New EU Rules on Digital Resilience Are Coming Soon; Are You Ready?

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights