LIVE AS IF YOU WERE TO DIE TOMORROW. LEARN AS IF YOU WERE TO LIVE FOREVER (GANDHI)
Monday, January 30, 2017
QUESTION OF THE WEEK NO. 3
When reporting on allegations of sexual assault
against women, most news organizations will identify the alleged perpetrator
but will not identify the name of the alleged victim. Some argue this policy is unfair to the
accused and allows women to make false accusations without any
accountability. Others argue that
identifying the victim is too privacy-invasive, will discourage women from
coming forward, and will essentially victimize the woman a second time. Do you agree with the policy?
Friday, January 27, 2017
TAKEAWAYS FOR WEEK 3
Protections for
rights of publicity
-
38 states recognize common law protection of
one’s name or likeness
-
22 states have adopted statutory protections for
names and images
-
NY, CA, and TN illustrate the differing
approaches
o
In NY, the right terminates upon one’s death
o
In CA, the right survives death for 70 years,
against commercial purposes, and the rights only pass to your immediate family
o
In TN, name and image rights pass to any heir,
and the right can be transferred
EU vs US Privacy
Protections
-
The EU views personal protection as akin to a
property right that is owned by the subject; the US does not.
-
Europe generally values privacy interests over
free speech interests; it is the opposite in the US.
-
Europe requires express, affirmative consent
before personal data may be collected by others; the US allows implied consent
and often requires “opting out” of default sharing.
-
Europe addresses privacy globally; the US
addresses in specific contexts (industry to industry: medical records are dealt
with HIPA, student records are protected by FIRPA).
-
Europe recognizes a general “right to forget”;
the US has done so only in very narrow and limited circumstances (in CA, the
Internet Eraser Law allows someone who posted something as a minor to request
that the post be removed). The Right to Forget hides links in search engines,
while the Internet Eraser Law removes the post itself. One removes the card
from the card catalog; the other removes the book.
-
Forgetting that one bad night
o
Suppose you were charged with a misdemeanor a
long time ago, for reckless driving, or you were arrested for some reason.
o
In Europe, you may request the search engine
remove links to a news article if it is, “inaccurate, inadequate, irrelevant,
or excessive.” The article remains on the newspaper website, but it would be,
“practically obscure.” It wouldn’t be searchable under your name.
o
In the United States, the First Amendment
protects freedom to speak and publish. No comprehensive law that allows
deletion; California has the Internet Eraser Law, and many states have
expungement laws. Expungement laws allow that after a certain period of good behavior,
you can ask the court to expunge a conviction from your public record; does not
change any potential news articles about the event.
-
Surprise! Your bank has been hacked.
o
In Europe, any company with data breach must
notify a central authority and the subject of the breach within 3 days or face
fines.
o
In the United States, breach notification laws
vary from state to state and do not cover all types of personal data. HIPA has
its own laws for medical records.
-
Monitoring your online activities
o
In Europe, companies must have express
permission to collect data about you. You can request that the company send you
details about what info has been collected and how it is used.
o
In the United States, breach notification laws
vary from state to state and do not cover all types of personal data. No single
law allows access to information about data use.
-
Data collected on children
o
In Europe, digital services must obtain parental
consent before collecting data on anyone under 16.
o
In the US, COPPA requires web sites and apps
targeted to children to obtain parental consent before collecting data on
anyone under the age of 13.
The Star Wars Kid
-
How would the invasion of Raza’s privacy have
been addressed in Europe or the United States?
-
We discussed Jessica Craig and Simon’s comments
on the post (Last line of Jessica’s post, and the part of Simon’s post about
the insecurity of things that exist outside [his] mind).
“Should the US Congress statutorily recognize
a ‘right to be forgotten’?” 14 said yes, 4 said no.
-
The
search engine balances the individual’s right to privacy against the public’s
right to information, freedom of speech, etc.
-
From May
2014 to January 2016, Google received 678,593 requests, and have evaluated
1,874,609 URLs for removal. Of those, 43.2% of URLs were removed, while 56.8%
were not. Google claims to have expended millions of dollars to comply with
this directive.
-
Google’s
Content Removal Policies: they voluntarily remove four types of content from
search engine results:
o
Child
sexual abuse imagery
o
Nude or
sexually explicit images posted without consent of person (“revenge porn”).
“Revenge porn” is illegal in most states; in some states, it depends on whether
the person knew the images were being created, while in others the distribution
itself is illegal (Utah is the better version)
o
Violations
of copyright (mostly to follow federal copyright laws)
o
Certain
sensitive personal information (SSNs, credit card numbers, bank account
numbers, images of signatures)
Should the “right to forget” apply here:
-
Joe
Young pled guilty to child sexual abuse when 18 years old for inappropriately
touching the buttocks of a young girl while working at his mother’s day care
center. As a result, he had to register on the state’s online sex offender
registry. 25 years pass and Joe has no more problems with the law. His mother
wants him to take over her day care center. Before he assumes the business,
which he intends to rename Young’s Daycare, he seeks to delink his name from
the registry when people search his name.
o
Simon
and Valerie said yes, arguing that the passage of time and mildness of the
crime make the register excessive and/or irrelevant. They believe that his
privacy outweighs the public interest.
o
Kate
said that she believes the public availability of the information outweighs
Joe’s privacy, and that him having a different career other than owning a day
care would change her mind.
o
The two
that said they would apply the “right to forget” changed their mind when it was
changed to only happening 5 years ago.
Thursday, January 26, 2017
Real Identities vs. The Internet's Ring of Gyges
Glaucon, an
associate of Socrates, once used a parable, the “ring of
Gyges,” to illustrate how accountability controls human behavior. He proposed that if a man were given a ring
that would make him invisible, he would commit a plethora of misdeeds that he
would not otherwise do, simply because no one would know who he was.
Internet
users today have a sort of ring of Gyges – anonymous user names. To combat the foul and sometimes merciless
online content of such “invisible” users, several websites are adopting “real
name” policies. Facebook,
Google, and Huffington Post
are a few of these sites that encourage, and in some cases, require users to
make their identity known when posting online.
Safety – the main
concern behind real name policies
Who here remembers
Rebecca Black’s 2011 song, “Friday”? Say what you want about it, but it’s no
question that the pop song went viral
in a matter of days. With her instant
fame came a downpour of mean-spirited jibes, criticism, and even anonymous
death threats from online viewers. I
checked out the music video just today (see the link above) and even still, 6
years later, spite litters the comments section. Some of these commenters have first and last
names listed (presumably their real names); some do not. The point is that then and now, anyone can
pose death threats to a teenage girl for something as trivial as disliking
Black’s “partying, partying, yeah!” and mask their identity while doing
it! The right to remain anonymous certainly
falls under the concept of privacy, but several websites are attempting to
combat the abuse of this right – e.g. threatening someone’s life for the sake
of some silly song.
That is why
Facebook asks its users to identify themselves by “the
name they go by in their everyday life” and why Huffington Post requires
readers to link
their comments to a Facebook profile – to promote “safety” and
“civility.” The intent of these real
name policies are noble; we’re trying to protect the Rebecca Black’s of
tomorrow, aren’t we?
But is identification really going to guarantee a safer online community?
Unfortunately,
it’s not that simple. Domenick Scudera
wrote a scathing
criticism about Facebook’s authentic name policy**, including its requirement
to submit documents verifying
the identity. Scudera posed an
argument that pokes a hole in the safety-conscious aspect of Facebook’s real
name policy.
“Facebook is filled with fake names. But because most of
these names sound authentic, the profiles are not flagged. If you are an online
predator, use “Bob Smith” as your name. Facebook will most likely ignore you.
If this is how Facebook is keeping “our community safe,” we are all in
trouble.”
I’m
sure most of us can think of a Facebook persona that is not who they claim to
be, but their Facebook profile exists anyway.
I became “friends” with my cousin’s cat a few years ago before I became
friends with my actual cousin on Facebook.
So, while we can appreciate Facebook’s efforts to keep the online
community safe, it seems that requiring real names may be too simplistic of an
approach.
“Incivility” – the other downside of anynomyity
Not
surprisingly, many newspapers
have grown impatient with anonymous readers word-vomiting hostility all over
their articles. One
psychologist points out that anonymous comments are more than twice as
likely to be uncivil than identified ones.
They also are more likely to be one-sided and not as well thought-out,
because an anonymous commenter may not feel as obligated to thoroughly consider
his/her point of view.
Washington
Post even conducted an informal
experiment on how anonymous comments impacted other readers’ attitudes
about the news piece. They found that
anonymous comments, whether they were negative or positive, decreased the audience’s
opinion of the article. So, it looks
like anonymity is a source of annoyance for reporters and readers alike.
But
would a real names policy stop the hateful comments online? Facebook’s attempt to filter out online
predators through a real name policy has proven to be flawed, so how can we be
sure dissolving anonymity would remedy the negativity online? As the LA
Times put it:
“The problem is,
requiring people to comment under their real names is no guarantee that they'll
behave less like trolls.”
Too little, too late
It
is evident all over the Internet that too many users are taking advantage of
the Internet’s “ring of Gyges.” But
enforcing a real name policy is not going to stop dangerous individuals or
derogatory content. It has its benefits,
but it is inadequate to cover this large of an issue. Individual entities, such as Huffington Post,
are certainly within their rights to require identification of users if they
deem that to best for their company. But
enforcing identification all over the web would create more disturbances than
it would solve.
** In response to Scudera and
others’ criticism, Facebook made the statement
that it does not require users to post their legally given name, but the name they go by on an everyday basis. See also this news update on
Facebook’s name policy.
Monday, January 23, 2017
QUESTION OF THE WEEK NO. 2
Should the U.S. Congress statutorily recognize a
“right to be forgotten” similar to the right recognized in the European Union?
Friday, January 20, 2017
A Jedi's Tragedy
How it happened
There are a painful number of embarrassing videos on the
internet today. But there was a time not too long ago when Star Wars Kid (<-
Watch this before reading) was among only a few. More than 30 million views since
then, the video survives, and its lifespan has brought numerous parodies, as
well as considerable pain for the sole star, Ghyslian Raza. Raza’s lightsaber
twirling home video landed him in the center of the internet’s all pervasive
gaze, sparking a lawsuit, a campaign against cyberbullying, and—as I’m sure
you’ve guessed—a continuing debate about our privacy.
The video was discreetly recorded over the middle of a
homemade basketball video in the Raza family’s basement when some of Ghyslian’s
school mates found it. The Raza family sued the families of those children for
publishing the video online without permission, on the grounds that they had
invaded Raza’s privacy. The
Katz test tells us that Raza has a right to privacy because Ghyslian showed
an expectation of privacy by hiding the video, and I’m pretty sure we’ve all
hidden some photos that we wouldn’t want shared around, so his expectation
seems reasonable to me. Hence, Raza’s privacy was obviously infringed—but the Raza
family didn’t even recuperate their own expenses from the settlement
of that lawsuit, and the video has haunted Ghyslian ever since.
Who’s to blame?
A camera shot the video, then the VHS was converted into a
digital format with some sort of software, then the internet did the rest, sharing
non-discriminately around the globe. So, when exactly was Raza’s privacy
harmed? It obviously wasn’t the camera that invaded Raza’s privacy, as he
captured the video intentionally, for himself. Digitizing software was just
becoming popular in 2003, as DVD’s stole the market from
VHS, and converting the video to a digital format was instrumental in the defeat
of Raza’s privacy. Between the digital format which was easy to share, and the
internet which made sharing trivial, Raza’s “friends” made quick work of their
sabotage. Today there are thousands of embarrassing home videos scattered about
the web—in 2003 there were only a handful. Today, these sorts of videos appear
and disappear in a day, for Raza however, the timing was impeccably bad, and
even now his story is revived by special effects, and university
discussions.
I have a hard time pointing a finger at the video
technologies, and the internet that made the breach in Raza’s privacy possible.
Ghyslian’s anxiety was at the hands of bullies
and cyberbullies who made fun of him for the video—and if I’m entirely
honest, it’s funny, not hilarious, but worth a chuckle. That said, the internet
is full of all types of people—but the most memorable are always the rudest,
and that’s just part of being a member of the internet village. Trying to
regulate the internet with legislation is fraught with difficulties, and
typically only succeeds at making
people mad, and regulating video conversion is downright impossible when anyone
with a VHS-DVD player can do it from home.
Are privacy breaches like Raza’s simply a part of this
internet age? I hesitate to say yes, because we can see from Raza’s plight what
that could mean for the rest of us. On the other hand, it’s very difficult to
implement useful legislation when it’s not clear how to solve the problem, and
any solution is bound to be met by vehement resistance. The internet is largely
free, and exceptionally useful; perhaps our privacy is the price we pay for its
power and convenience.
Can we forget?
The EU, has a policy known as the “Right
to be Forgotten” which enables citizens to ask their search engines to
remove links to personal information about them when that information is
“inaccurate, inadequate, irrelevant or excessive.” On paper, it seems like a great
rule to have. It’s exactly the kind of thing that Ghyslian would have used to
deal with Star Wars Kid. One court
case, and then nobody would be able to search for Raza’s video, right? Wrong. With
sites like Internet
Archive backing up every video, sound clip, and page that’s ever
existed, there will always be ways to find content that has been “forgotten.” I
remember an incident not long ago where UC
Davis tried to cover up a video in which some students were pepper sprayed
for protesting. Trying to hide the video backfired on UC Davis—their actions
generated considerable interest and caused the video to go viral. While Raza
could have tried to invoke a right to be forgotten, doing so could have caused
the video to blow up just as much as it did, or even more, on social media
websites, blogs and forums.
What does it mean?
Despite all his strife, I have a hard time feeling bad for
Raza. I’m reminded of a similar YouTube video that aired a couple years after Star Wars Kid. The video featured a Live
Action Role Playing (LARP) battle, where one player hilariously shouts “Lightning Bolt” as he
pelts the other contestants with bean bags. The electric mage, Brandon Boucher,
received the same sort of criticisms that hit Raza so hard, as well as
opportunities to appear on late night shows or in comedy central skits. Where
Raza declined all the television spotlights he was offered, Boucher stood up
for himself and appeared in one of Tosh.0’s web redemption skits—a move that I
think worked really well for Boucher. The conviction that he would not be embarrassed
by something he enjoyed doing saved Brandon Boucher’s image from perpetual
mockery.
I put some serious thought into the idea of emailing Raza
some questions, but undoubtedly he just wants to move on. Now a law school
graduate, Raza speaks
out against cyberbullying, talking about how painful it was for him. Had Raza
stood his ground, and embraced his Star Wars alter ego, I think the incident
would have blown over quickly—but trying to hide from his internet footprint,
ironically, just made things worse. Wrong was done to Raza, without a doubt,
but at some point, you’ve just got to roll with the punches. Raza's story reminds us about what our privacy is worth, and the price we might pay for abiding in this internet age.
Wednesday, January 18, 2017
TAKEAWAYS FOR WEEK TWO
- In class and in the readings, we learned about the "Nothing to Hide" argument
- The argument says that law-abiding citizens have nothing to hide, so should not protest government surveilance
- This argument does not hold up to intense scrutiny:
- Just because I have "Nothing to Hide" (I have done nothing illegal) doesn't mean I have anything I want to show you
- Surveilance creates a "chilling effect" because people behave differently when they know they are being watched. This stifles creativity and innovation
- Constant government surveillance is a requirement of a police state. Social dissidents need some privacy to operate to avoid being targeted by an overreaching government.
- Aggregated meta-information, such as phone numbers dialed and total value of online purchases, could reveal more sensitive information, so even high-level dragnet surveillance of all citizens should be a concern.
- As we saw in the TED talk, even information people publicly reveal about themselves can be aggregated to astonishing results!
- We had a vibrant discussion about the question of the week
- Some students that privacy was contextual:
- Privacy interests of an individual may differ from the privacy interests of a corporation
- Leaders (of government, corporations, etc.) should allow some degree of transparency to generate trust and prove they are acting in the interest of the group they claim to represent
- In some cases, an individual's privacy rights are subservient to the greater good
- The justice system allows lawsuits to be filed under a pseudonym, provided the need can be justified
- We got into a discussion about anonymity
- Knowing a speaker's identity is important to establish the credibility of information presented
- Posting anonymously on the Internet could protect someone from future enemies using their words against them. Since the Internet never forgets, the only protection is to ensure your identity cannot be connected to damaging thoughts (Related Comic - be sure to mouse over the image)
- The pressure is on our anonymous classmate to talk to Professor Dryer about why they prefers to remain anonymous (or not)!
- Many students talked about privacy in context of disclosure and access to personal information. But are there other facets?
- Information once revealed cannot be retracted. If friends turn into enemies, one could find oneself being blackmailed or having private photos posted on the internet as a form of revenge
- So, the way information is used is important to privacy
Monday, January 16, 2017
QUESTION OF THE WEEK NO. 1
Do you agree with the following statement?:
“Privacy depends on context; there are no common core characteristics of privacy.”
“Privacy depends on context; there are no common core characteristics of privacy.”
Friday, January 13, 2017
TAKEAWAYS FOR WEEK ONE
1.
The word privacy does not appear anywhere in the U.S. Constitution.
However, a right of privacy has been inferred from the First, Third and
Fourth Amendments.
2. The right of privacy is difficult to conceptualize and has been defined in many different ways. It is a flexible right and not an absolute right. A right of privacy may be legally recognized and protected under constitutional law, statutory enactment, common law and by contract.
2. The right of privacy is difficult to conceptualize and has been defined in many different ways. It is a flexible right and not an absolute right. A right of privacy may be legally recognized and protected under constitutional law, statutory enactment, common law and by contract.
3.
The legal touchstone of a right of privacy in the U.S. is whether there is a
"reasonable expectation of privacy." To be recognized the
person claiming the right of privacy must exhibit a subjective expectation of
privacy and that expectation must be deemed reasonable by society. This
test was formulated in the 1967 U.S. Supreme Court decision of U.S. v. Katz.
4. There are four common law privacy torts: intrusion upon seclusion, casting someone in a false light, misappropriation of name or likeness and disclosure of private facts. Utah recognizes all four torts.
4. There are four common law privacy torts: intrusion upon seclusion, casting someone in a false light, misappropriation of name or likeness and disclosure of private facts. Utah recognizes all four torts.
5.
Technology is having a profound impact on privacy. Some new technologies protect privacy while
others threaten privacy.
6.
The third-party doctrine was established by the U.S. Supreme Court in the 1970’s
and stands for the principle that if you voluntarily provide information to a
third-party you have no reasonable expectation of privacy in that information
and thus the government does not need a search warrant to access the information.
7.
The third-party doctrine has been criticized as being outmoded because much has
changed since the 1970’s. In today’s
digital world people pass enormous amounts of personal and confidential information
through the hands of third parties when using the internet, cloud services and
mobile phones. Critics of the doctrine
argue it is no longer reasonable to believe that when using these services and
devices that people abandon any expectation their information will remain
private.
8. One’s digital footprints and posts are often
everlasting due to internet archiving and databases.
Subscribe to:
Posts (Atom)