Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Privacy and data protection in the wake of Dobbs

By Heather Federman
data-privacy-freepik1170x6.jpg

Image via Freepik

September 29, 2022

The United States was rocked by last summer’s U.S. Supreme Court (SCOTUS) ruling in Dobbs v. Jackson Women’s Health Organization, a landmark decision overruling both Roe v. Wade and Planned Parenthood v. Casey. While I expect much political discourse to continue, this article focuses on the direct implications for privacy and data protection regarding abortion. 


What is “Privacy”?

It is important to understand what privacy is and how it is defined before determining what protecting privacy in the context of abortion may require. While the scope of privacy is wide-ranging, at its core, privacy is a dignitary right focused on knowledge someone may or may not possess about a person. 


Regarding our U.S. Constitution, there is no recognized right to privacy. Several states do have a right to privacy in their constitutions, though whether this state right will be legally interpreted to protect access to abortion remains to be seen. Definitions get muddy here as privacy becomes enmeshed with concepts of freedom and liberty that are emboldened by the constitution.


The Dobbs majority points out a distinction between privacy and liberty: “As to precedent, citing a broad array of cases, the Court found support for a constitutional ‘right of personal privacy.’ But Roe conflated the right to shield information from disclosure and to make and implement important personal decisions without governmental interference.” 


There are various definitions for what privacy is and isn’t — none of which have helped as a legal concept. 

 

Privacy ≠ Data Protection

These muddied definitions end up causing more confusion as to what “privacy” really means. One place this rings true is the ease with which we throw around the term “privacy” vs. “data protection.” While data protection stems from the right to privacy, it focuses on the data to ensure it has been fairly processed — from collection, use, storage, dissemination, retention, deletion, and more. 


Most “privacy” regulations that have been enacted or are up for discussion in the last several decades are focused on data protection. Even new comprehensive state privacy laws focus on “consumer rights.” At their core, these laws are not meant to protect one’s dignitary right to privacy but instead protect a type of data associated with a person. 

 

Data Protection & Reproductive Rights

So how does the current U.S. data protection landscape help (or potentially harm) people seeking access to reproductive healthcare?


We can start by acknowledging that data is a byproduct of our information society. Security expert Bruce Schneir stated, “everything we do leaves a data shadow, and that shadow is under constant surveillance.” This surveillance occurs not just with governmental actors but also with tech corporations — big and small — that process data on a mass scale. These “technology intermediaries” must comply with law enforcement requests for information under statutory and constitutional law (which, in this case, could be used by states with restrictive abortion laws and “bounty hunter” programs). For instance, Planned Parenthood, one of the main providers of abortion care, must be mindful of its data practices — as third-party cookie pixels were discovered on their web scheduler, which could subsequently be used for law enforcement purposes.


Tech corporations can design their services with built-in encryption, limited analytics, minimization, and anonymization capabilities, making it harder for law enforcement to obtain data. However, with no clear requirement to do so, we are at the mercy of whether they choose to practice “data protection by design.” 

 

Healthcare

As abortion is tied up with healthcare, we start by looking at our health laws. The U.S. has the HIPAA Privacy Rule, which governs how Protected Health Information (PHI) is processed. Disclosing PHI requires informed consent, except in certain circumstances, such as providing information to law enforcement. Following Dobbs, the U.S. Department of Health and Human Services (HHS) issued guidance that unless a state law “expressly requires” reporting on certain health conditions, the HIPAA exemption for disclosure to law enforcement would not apply. 


In addition, to be in scope for HIPAA, this PHI must be governed by “Covered Entities” — this includes doctors’ offices and hospitals, insurance companies, and employer health care plans, but currently excludes commercial health services like period tracking apps. There’s concern that evidence of missing a period documented through such apps could be subpoenaed and used to bolster a case against someone suspected of an illegal abortion. The data from these apps are also frequently shared with third parties — as a recent study pointed out. And unfortunately, popular period tracking apps have been dinged for data protection failures. Some are launching features like “anonymous mode” that removes one’s identity from the fertility data. Other apps still have no explicit requirement for law enforcement to provide a signed warrant or subpoena before data is disclosed in their public-facing privacy policies. 

 

Location Services 

Period tracking apps are not the only major data point regarding reproductive health care. Another one is location. The data protection challenges around location services have been well documented — from domestic violence/stalking to covert tracking on social networking apps that have been used to surveil protestors at public rallies. Several lawmakers have inquired into such services, e.g., how Meta provides “sensitive” private user data for state criminal investigations. 


In 2017, an adtech agency in Massachusetts agreed to stop using geofencing technology to target women entering abortion clinics with prolife advertisements on their smartphones. This has simultaneously created legal uncertainty for abortion providers that would like to use location technology but are concerned this would be considered “aiding and abetting” an abortion. In a post-Dobbs world, there is a high likelihood that geofencing advertising will not only increase around abortion clinics but that the use of “geofencing warrants” (the use of location data to identify people near a crime scene at a specific time) will also increase. 

 

Data Brokers & Third Parties

These issues only become more complicated when we realize that data points around health and location can be compiled to create a profile that may interest law enforcement. Following the draft leak of Dobbs, Vice discovered that SafeGraph, a company leveraging geographical data to create trend insights, directly used data related to abortion visits. For under $200, data could be purchased on how often, for how long, and where people went following a visit to a Planned Parenthood clinic — potentially bypassing the need for a warrant or subpoena.


Safegraph and similar firms have since pledged to stop selling location data of people who visit abortion clinics, though this has not stopped house lawmakers from launching a formal investigation into how health data is processed by data brokers and period tracking apps. 

 

There’s Nothing New Under the Sun

It says in the Book of Ecclesiastes that “there is nothing new under the sun.” This phrase from the Old Testament applies to privacy and data protection in the context of reproductive rights. Looking back at the recent (and ongoing) pandemic, heated conversations have focused on how our data is processed. This is nothing new, from mobile location tracking for COVID exposure to whether testing positive for the virus is protected under HIPAA to how to handle vaccination status. 


So, where does this leave us with data and our reproductive rights? Despite calls to codify “intimate privacy as a civil right,” the Biden Administration’s Executive Order to protect sensitive data, the Federal Trade Commission’s inquiry into “commercial surveillance” activities and Congressional proposals to prohibit data brokers from sharing health location data, the likely impact is minimal. Even the potential for federal privacy law is limited. There’s no clear answer as to how this will all play out, but hopefully, these issues won’t fall by the wayside.


The overturning of Roe v. Wade may have sparked a real urgency to upgrade the technologies and legal system we depend on. And while a constitutional “right to privacy” may be a dreamer’s folly, responsible data protection that’s practiced by tech corporations and codified through our nation’s laws could be a real possibility in our future. 

KEYWORDS: cyber security data protection privacy risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Heather Federman is Chief Privacy Officer at BigID. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • data_security_-_blog_-768x423

    EDPB issues guidance for cross-border data transfers in wake of Schrems II judgment

    See More
  • Encryption Future - Security Magazine

    Don't Disarm Individuals in the Battle for Data Protection, Privacy and Security

    See More
  • Coding on screen

    Dangers of DeepSeek’s privacy policy: Data risks in the age of AI

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!