Balancing Privacy and Free Speech
eBook - ePub

Balancing Privacy and Free Speech

Unwanted Attention in the Age of Social Media

Mark Tunick

  1. 222 pagine
  2. English
  3. ePUB (disponibile sull'app)
  4. Disponibile su iOS e Android
eBook - ePub

Balancing Privacy and Free Speech

Unwanted Attention in the Age of Social Media

Mark Tunick

Dettagli del libro
Anteprima del libro
Indice dei contenuti
Citazioni

Informazioni sul libro

In an age of smartphones, Facebook and YouTube, privacy may seem to be a norm of the past. This book addresses ethical and legal questions that arise when media technologies are used to give individuals unwanted attention. Drawing from a broad range of cases within the US, UK, Australia, Europe, and elsewhere, Mark Tunick asks whether privacy interests can ever be weightier than society's interest in free speech and access to information.

Taking a comparative and interdisciplinary approach, and drawing on the work of political theorist Jeremy Waldron concerning toleration, the book argues that we can still have a legitimate interest in controlling the extent to which information about us is disseminated. The book begins by exploring why privacy and free speech are valuable, before developing a framework for weighing these conflicting values. By taking up key cases in the US and Europe, and the debate about a 'right to be forgotten', Tunick discusses the potential costs of limiting free speech, and points to legal remedies and other ways to develop new social attitudes to privacy in an age of instant information sharing.

This book will be of great interest to students of privacy law, legal ethics, internet governance and media law in general.

Domande frequenti

Come faccio ad annullare l'abbonamento?
È semplicissimo: basta accedere alla sezione Account nelle Impostazioni e cliccare su "Annulla abbonamento". Dopo la cancellazione, l'abbonamento rimarrà attivo per il periodo rimanente già pagato. Per maggiori informazioni, clicca qui
È possibile scaricare libri? Se sì, come?
Al momento è possibile scaricare tramite l'app tutti i nostri libri ePub mobile-friendly. Anche la maggior parte dei nostri PDF è scaricabile e stiamo lavorando per rendere disponibile quanto prima il download di tutti gli altri file. Per maggiori informazioni, clicca qui
Che differenza c'è tra i piani?
Entrambi i piani ti danno accesso illimitato alla libreria e a tutte le funzionalità di Perlego. Le uniche differenze sono il prezzo e il periodo di abbonamento: con il piano annuale risparmierai circa il 30% rispetto a 12 rate con quello mensile.
Cos'è Perlego?
Perlego è un servizio di abbonamento a testi accademici, che ti permette di accedere a un'intera libreria online a un prezzo inferiore rispetto a quello che pagheresti per acquistare un singolo libro al mese. Con oltre 1 milione di testi suddivisi in più di 1.000 categorie, troverai sicuramente ciò che fa per te! Per maggiori informazioni, clicca qui.
Perlego supporta la sintesi vocale?
Cerca l'icona Sintesi vocale nel prossimo libro che leggerai per verificare se è possibile riprodurre l'audio. Questo strumento permette di leggere il testo a voce alta, evidenziandolo man mano che la lettura procede. Puoi aumentare o diminuire la velocità della sintesi vocale, oppure sospendere la riproduzione. Per maggiori informazioni, clicca qui.
Balancing Privacy and Free Speech è disponibile online in formato PDF/ePub?
Sì, puoi accedere a Balancing Privacy and Free Speech di Mark Tunick in formato PDF e/o ePub, così come ad altri libri molto apprezzati nelle sezioni relative a Jura e Naturwissenschaft- & Technologierecht. Scopri oltre 1 milione di libri disponibili nel nostro catalogo.

Informazioni

Editore
Routledge
Anno
2014
ISBN
9781317650362

1 Introduction

DOI: 10.4324/9781315763132-1

Unwanted attention

In between pitches during a major league baseball game, Fox Sports Network television cameras focused in on a portly man, one of about 15,000 fans in the stadium, showing him intently eating a salad as one of the Fox announcers remarked, with a chuckle, “Salad won’t be enough for this guy!”
The fan may never have learned that he was on television; if he had, he might not have cared. Yet a case might be made that Fox Sports Network acted badly: that it invaded his privacy—his right to be left alone and not be thrust into the public eye and publicly humiliated—by giving him attention that one might assume was unwelcome. On the other hand, can anyone reasonably expect privacy while attending a public sporting event in plain view of thousands? Did the baseball fan not consent to the possibility that he would appear on television simply by being in a public place in plain view of others?
This is one of an exploding number of examples of potentially unwelcome attention in which the interest in gathering and disseminating information, protected in the United States by the First Amendment rights of free speech and a free press, and in the European Union by the right of freedom of expression laid out in Article 10 of the European Convention on Human Rights (ECHR), may conflict with an interest in privacy. Unlike the baseball fan, those receiving unwanted attention in some of these cases clearly suffer severe consequences:
Rutgers college student Tyler Clementi did not welcome the attention when his roommate secretly captured video of Tyler kissing another man in their dormitory room and shared the video with others. Soon after, Tyler committed suicide by jumping off a bridge.1
1 John Schwartz, “Bullying, Suicide, Punishment,” New York Times, October 2, 2010.
Texas assistant district attorney Louis Conradt did not welcome the attention when a SWAT team entered his home in the company of camera crews from NBC’s program “To Catch a Predator.” Conradt had apparently engaged in sexually explicit online chat with a decoy posing as an underage teen. He had turned down the decoy’s offer to meet her in person, so instead NBC came to him. Unable to face the public shame of being accused of being a child predator before a national television audience, he shot and killed himself.2
2 See Mark Tunick, “Reality TV and the Entrapment of Predators,” in Robson and Silbey, eds., Law and Justice on the Small Screen (Oxford: Hart Publishing, 2012).
Marvin Briscoe did not welcome the attention when Reader’s Digest published a story about hijacking that disclosed his name and the fact that he committed a crime twelve years before, a crime for which he had already received his punishment and which he had tried to put behind him. Because of the article, Briscoe’s daughter and friends found out about his past crime, which he had kept a secret, and abandoned him.3
3 Briscoe v. Readers Digest Assn., 4 Cal.3d 529 (1971).
Police have not welcomed the attention when citizens secretly recorded them making traffic stops or arrests. Some of these citizens were subsequently charged with violating anti-wiretap laws or interfering with police business.4 Nor did a married man welcome the attention when CBS filmed him walking down a street hand in hand with a female co-worker who was not his wife as part of a story about romance in New York City.5
4 See Commonwealth v. Hyde, 434 Mass. 594 (2001); Commonwealth v. Manzelli, 864 N.E.2d 566 (2007); and Dana Mishra, “Undermining Excessive Privacy for Police: Citizen Tape Recording,” Yale Law Journal 117:1549–1558 (2008). 5 DeGregorio v. CBS, 473 N.Y.S.2d 922 (1984).
In each of these cases, there is a conflict between those who want to gather and disseminate information and those who do not welcome the attention. While each of these cases is from the United States, unwanted attention is a global phenomenon. In Kenya, for example, viewers of a show entitled “Road Hog” that is part of a primetime news program on CitizenTV are encouraged to submit videos of bad drivers. The producers air the video, zoom in on the vehicle’s license plate number, and broadcast the name of the owner as a chorus shouts “Ahhhh … Shame on You!”6
6 I thank Mumbi Ngugi for making me aware of this program.

The democratization of the media

Some of the above examples involve traditional media, which include newspapers, magazines, and television. But over the last several years the likelihood of receiving unwanted attention has risen dramatically because of the proliferation of new technologies such as smartphones and the widespread use of Internet video-hosting services and social media such as social networking sites and weblogs. As a result, information that the traditional media exposed in an original broadcast or publication—information that in the past might have been soon forgotten— can now be archived and readily accessible years later. Episodes of “To Catch a Predator” that were first broadcast in the early 2000s are available on NBC’s website, and video clips from “Road Hog” are available on YouTube.7 But another, distinct feature of the age of social media is that anyone and not just the news and entertainment media can now broadly disseminate information. Individuals use the Internet and social media to accuse people of a wide range of uncivil behavior and in some cases to seek out and punish them.8 Disgruntled clients used one U.K. website to name and shame solicitors with whom they were dissatisfied, until a court ordered that the website, called “Solicitors from Hell,” be taken down.9 Some websites display mugshots of individuals who have been convicted of a sexual offense, or of driving under the influence, or who were merely arrested but not yet convicted.10 Sometimes information is shared with an intent to be punitive, as when individuals use “revenge porn” websites or Twitter to share naked pictures of people they once dated.11 But sometimes it may be shared with the best of intentions, as when a catechist in a Swedish parish set up a website to share information with parishioners, and revealed that a colleague had a foot injury—information that the court in Sweden regarded as protected personal data.12 In one case that received considerable press, a Korean woman refused to pick up the mess that her dog left in the middle of a subway car, and someone shared a photo of the incident through social media. Some individuals who viewed the photo identified and shared details about her and as a result she received threats, was publicly humiliated, and reportedly left her university.13 To anyone who looks at her with Google Glass with face recognition she will be known as “Dog Poop Girl.” (Google Glass enables one to access information about objects in one’s sight;14 it is a technology with significant implications for privacy that I will discuss in later chapters.)
Unlike in any previous period in human history, virtually any individual can now cast unwanted attention on someone by making their image or information about them readily accessible to millions of people. Over 2.4 billion people around the world use the Internet on any given day;15 and by one estimate 1 billion people will have smart phones by 2016 and therefore the ability to easily capture images and share them on the Internet.16 YouTube reports that there have been over 1 trillion playbacks of user-uploaded videos from its website as of 2012 and that 100 hours of video is uploaded to its site every minute, which is nearly three times the number of hours of video uploaded per minute that it reported in 2011.17 The boundaries that distinguish journalists from ordinary people are becoming blurred, with some self-proclaimed citizen watchdogs taking on the role of “citizen journalist.”18
7 See www.nbcnews.com/id/10912603/; www.YouTube.com/watch?v=K9HvhmKWc8Y. “Road Hog” also has its own Twitter page: https://twitter.com/CitizenRoadHog. 8 See Daniel Solove, The Future of Reputation (New Haven: Yale University Press, 2007), Chapter 4; and Tom Downey, “China’s Cyberposse,” New York Times Magazine, March 3, 2010 (on “human flesh search”). 9 The Law Society v. Kordowski [2011] EWHC 3185. 10 See, e.g., www.mugshotsonline.com; www.azduimugshots.com; http://offender.fdle.state.fl.us. 11 See www.myex.com/ ; and www.womenagainstrevengeporn.com/ (both accessed February 27, 2014). Cf. Oren Yaniv, “Judge Dismisses Case against Brooklyn Man Who Shared Nude Photos of [Ex-] girlfriend on his Twitter Account,” New York Daily News, February 19, 2014. 12 Criminal Proceedings against Bodil Linqvist, Case C-101/01 (Sweden, 2002); online at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:62001J0101:EN:HTML. 13 Jonathan Krim, “Subway Fracas Escalates Into Test of the Internet’s Power to Shame,” Washington Post, July 7, 2005. Cf. Solove, The Future of Reputation, pp. 1–4. 14 See www.google.com/glass/start/, accessed December 21, 2013. 15 Internetworldstats.com, accessed January 10, 2013. The figure is for internet usage on June 30, 2012. 16 Zack Whittaker, “One Billion Smartphones by 2016, says Forrester,” zdnet.com, February 13, 2013. 17 www.YouTube.com/t/press_statistics, accessed January 7, 2013, December 24, 2013, and June 7, 2011. 18 See Anderson, “The Mythical Right to Obscurity,” I/S 7:544-602 (2012), p. 552, citing Krim, “Subway Fracas Escalates.”
We might refer to this phenomenon as the democratization of the media. Prior to the age of social media, it took considerable resources to convey information to a broad audience beyond the circle of one’s friends, family, and coworkers, and the obstacles to publishing served as a check on those who might otherwise act impulsively. But today’s technology makes it possible for anyone to share information widely with a click of a button and little incentive to think about the implications. The unintended consequences of sharing information through social media have included the downfall of politicians, as when New York Representative Anthony Weiner used Facebook and Twitter to send promiscuous text messages and risqué photos of himself to women not his wife. This material got into the hands of a conservative web blogger and quickly went viral, creating national headlines and possibly ruining his political career.19 Online postings similarly led to the downfall of a German state legislator and a Chinese official.20
19 Raymond Hernandez, “Weiner Resigns in Chaotic Final Scene,” New York Times, June 17, 2011. The threat to his career might have arisen also from his originally lying by denying what he did; see Michael Barbaro and David Chen, “Weiner Faces Calls to Resign and Tries to Make Amends,” New York Times, June 7, 2011. Weiner unsuccessfully reentered the race for mayor of New York in the summer of 2013. 20 Nicholas Kulish, “Affair with Teenage Girl and Facebook Postings Sink German Politician,” New York Times, August 18, 2011; and Andrew Jacobs, “Web Tell-All on an Affair Brings Down a Chinese Official,” New York Times, January 19, 2013.
The democratization of the media has been associated with profound social changes. Some suggest that the new social media dulls us by having us communicate in short snippets with the result that our attention span is shortened and we form snap judgments that distort the truth.21 Others point to its benefits. Some have suggested that the use of Facebook and Twitter to organize political protests contributed to the resignation of Egypt’s President Mubarak in 2011.22 Non-journalists have captured images of the police beat down of Rodney King in 1991, the devastating Asian tsunami of 2004, and abuses at the Abu Ghraib prison facility in Iraq.23 A Craigslist ad and Facebook postings reportedly helped lead to the capture of a suspect in an attempted car bombing in New York City’s Times Square.24
21 Bill Keller, “The Twitter Trap,” New York Times, May 18, 2011. 22 Jennifer Preston, “Movement Began with Outrage and a Facebook Page That Gave It an Outlet,” New York Times, February 5, 2011; cf. Emily Parker, Now I know Who My Comrades Are (New York: Farrar, Straus and Giroux, 2014), pp. 1–5. For a contrary view, see Evgeny Morozov, The Net Delusion (New York: Public Affairs, 2012). 23 Seth Kreimer, “Pervasive Image Capture and the First Amendment: Memory, Discourse, and the Right to Record,” University of Pennsylvania Law Review 159(2):335–409 (2011), pp. 347–50. See also “Visibility Before All,” Economist, January 14–20, 2012, pp. 58–59. 24 See Bianca Bosker, “Faisal S...

Indice dei contenuti