Mapping Privacy Jacqueline D Lipton, Ph.D. Case Western Reserve University School of Law.

Slides:



Advertisements
Similar presentations
JEOPARDY! Cyberbullying and Relational Aggression Creative Response to Conflict 2011 PLAY!
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
The Law of Privacy Prof. Michael Madison – University of Pittsburgh School of Law – January 22, 2004 [1] What is privacy? [2] What law regulates privacy?
Haygrove School – E Safety Induction E Safety Update #protecting your professional identity.
Our Digital World Second Edition
Social Media Policy ADM – E 21. CHS Social Media Policy Social media = media designed to be disseminated through social interaction, created using highly.
Who are You Online? An Advisory Discussion February
Forms of Cyberbullying
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
What is Personal Publishing? If you’ve ever written a blog entry, posted a comment or reply on a website, uploaded a video to YouTube, posted a picture.
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
Ethical and Social Issues in Information Systems
UNIVERSITY OF CANTERBURY. The Tort of Privacy The Tort of Privacy.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Enabling the Social Web Krishna P. Gummadi Networked Systems Group Max Planck Institute for Software Systems.
What Do People Do Online? Implications For the Future of Media Cindy Royal Assistant Professor School of Journalism and Mass Communication Texas State.
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
Social media is media for social interaction, using highly accessible and scalable communication techniques.
Ethics in a Computing Culture
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 16 and 17: March 27 and 29, 2007 Solove’s taxonomy of privacy.
Online communities 1 Theory revision Complete some of the activities in this powerpoint and use the revision book to answer questions.
Online social networking tools (Web 2.0) and their implications for Health and Social Care Rod Ward HSC ICT.
Social Media and Recordkeeping Allegra Huxtable Manager Government Recordkeeping Tasmanian Archive and Heritage Office.
E-safety resources Lucinda Searle Senior ICT Adviser Ian Gover Education Technology Adviser E-Safety Live 09 SWGfL.
Dilip S. Mutum 1. Making your blog more interactive  Search engine optimisation  Optimum length of posts  Connecting to other blogs  Links to social.
Electronic Portfolios DIGITAL CITIZENSHIP & THE CREATION OF E-PORTFOLIOS.
Privacy and Security Risks in Higher Education
Consider ways to use social software in your professional learning and school.
1 Lesson 29 Web Content Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
+ Privacy in the Information Age Year 12, 2012 Lesson 3 January
Social Media Operating in the Digital Age March 5, 2010 Chapel Hill, NC Terry Bledsoe, Chief Information Officer Catawba County, NC Matures.
Welcome to E.L. Wright iPad Safety Night I. Using Technology and Protecting Your Child E.L. Wright Technology Department and Richland County Sheriff's.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
1 Web 2.0 and Government September /Translates to… Why care? IBM 2006 Global CEO Study identifies the key problems that Web 2.0 can help with.
AVI/Psych 358/IE 340: Human Factors Web 2.0 November
WEB 2.0 and SOCIAL NETWORKING Mike Wood Executive Director Media Resources Center.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Legal Considerations Sports Med 2.
Chapter 17 Direct and Online Marketing: Building Direct Customer Relationships.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
STUDENTS AND THE INTERNET WHAT WE NEED TO KNOW. Issues  Internet Safety  Cyberbullying  Social Media  Digital Citizenship.
Mayer Brown is a global legal services organization comprising legal practices that are separate entities ("Mayer Brown Practices"). The Mayer Brown Practices.
Helping you and your family to stay in control. YouTubeWhatsApp Instagram Facebook Google Moviestar Planet Twitter Oovoo Amazon Club Penguin.
Social Media and the School by Lori Lieberman, Susan Robertson, and Mary-Catherine McElroy-Fuchs.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Higher Education PKI Summit Meeting August 8, 2001 The ABA PAG Rodney J. Petersen, J.D. Director, Policy and Planning Office of Information Technology.
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
The Law of Managing Social Media Sport and Recreation Alliance Mike Patrick and Alastair Cotton 4 October 2011.
Invasion of Privacy in Digital Media Basic Concepts.
Using Web 2.0 Tools to Support Teachers, Students, and Parents WVPT Education Services.
SHARING SOCIAL MEDIA academic and professional information through.
WEB 2.0 PATTERNS Carolina Marin. Content  Introduction  The Participation-Collaboration Pattern  The Collaborative Tagging Pattern.
E-Safety. A great place… Image by: Shutterstock/nasirkhan As we have discussed over the last few lessons, the Internet is a great tool for sharing information,
Creating Open Data whilst maintaining confidentiality Philip Lowthian, Caroline Tudor Office for National Statistics 1.
Defining Social Media Social Media Marketing Communications Digital Marketing Characteristics Types of Internet Advertising Mobile Marketing Social Behavior.
Lecture 11 Emergent Knowledge Management Practices Md. Mahbubul Alam, PhD Associate Professor Dept. of AEIS 1.
What does Web 2.0 mean?  Dictionary.com defines Web 2.0 as the internet as an interactive experience, rather than something to be absorbed  With web.
Privacy Evaluation Framework Overview TCAB Privacy Subcommittee Meeting February 21, 2014.
Ethical dilemmas working with new media channels Philip Young University of Sunderland.
Expert Consultation on Bullying Florence 9-10 May 2016 The role of legislation in preventing and addressing bullying and cyberbullying Mánus de Barra Child.
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
Privacy. Some Web Science Issues Kieron O’Hara 29 November 2011.
Amy Randolph-Chernis. Blogging Facebook LinkedIn Twitter YouTube Social Networking!
OCR Nationals - Unit 8 E-commerce – go to slide 11.
O nline R eputation. Paris Brown She was 17 She was 17 From Kent From Kent She was Britain’s first youth crime commissioner She was Britain’s first.
Ethical, Social, and Political Issues in E-commerce
Web 2.0 Technologies and Community Building Online by
STRUCTURE OF THE CHAPTER
Presentation transcript:

Mapping Privacy Jacqueline D Lipton, Ph.D. Case Western Reserve University School of Law

Characteristics of Web 2.0 Participatory Culture Many-to-many communication User-generated content Wikis, blogs, online social networks etc Consumers become producers Convergence Culture Internet is one aspect of interconnected communications culture (eg Henry Jenkins) Convergence in terms of devices and content

Web 2.0 Challenges … Politics Business Models Intellectual Property Law (& consumer-oriented business models) Emerging Social Norms and……PRIVACY

Web 1.0 Privacy Concerns Data Aggregation (eg consumer profiling) E.U. Data Protection Directive U.S. law more limited e.g. Whalen v Roe, Dwyer v AMEX E.U. recognized more “dignitary” harms whereas U.S. based on ascertaining “economic damage” (more difficult to prove in privacy context eg Dwyer v AMEX).

Web 2.0 Privacy Challenges Increased potential for legally unclassified/unrecognized privacy harm in participatory web Chang v Virgin Mobile Justice Scalia/Prof Reidenberg Star Wars Kid, Dog Poop Girl, Bus Uncle Mosley v News Group (UK) AutoAdmit Bob Quick resignation (UK Counterrorism expert) Importance of timing; identify problems/develop responses before privacy-destroying norms become entrenched (see Bernstein) Limitations of Web 1.0 privacy laws even more pronounced

Existing Privacy Theory… Search for a common denominator (rejected recently by Solove) Solove’s “taxonomy of privacy” Relationships of confidence (Richardson/Solove) Doctrinal attempts eg updating individual privacy torts (Sánchez Abril on public disclosure of private facts) Might it help to develop a “meta”-theory at a higher level of abstraction?

Privacy Umbrella Helps illustrate “reasonable expectations” of privacy for Web 2.0 culture Illustrates latent connections between disparate-seeming privacy incursions Assist development of privacy policy for Web 2.0 Help identify gaps in reach of current privacy laws?

Six Dimensions of Privacy… Mechanics of Privacy Incursion 1. Actors/Relationships 2. Conduct (data gathering, aggregation, dissemination) 3. Motivations 4. Harms /Remedies Information 5. Substance of information (content) 6. Format of information (text, audio, video, multi-media)

1. Actors/Relationships Individuals Friends Acquaintances Strangers Business entities Online service providers (eg Facebook, Google, YouTube, Flickr, Amazon, Linden/Second Life, Twitter) Financial services Online health services Government agencies/Politicians’ websites Web Obama administration = government accessing more personal information in a “participatory” context (Danielle Citron, ent_obama_2.html#more)

2. Conduct Solove’s taxonomy, eg: Collection (surveillance, interrogation) Processing (aggregation, identification, exclusion etc) Dissemination (disclosure, exposure etc) Invasion (intrusion, decisional interference) Web 2.0 raises new types of potentially privacy-intrusive activities eg “friending”, tagging, compilations of information by groups (rather than individual entities)

3. Motivations Innocent Harmful Negligent Public interest (cf “interesting to the public”) Profit (paparazzi?) Relevance of motivation? Link between actor and activity Plays into harm/remedy Currently plays into some privacy actions - “Evidence of outrageous, intentional, and systematic campaigns to harass, discredit, or embarrass have been widely held to indicate invasions of privacy” – Abril, Recasting Privacy Torts, 21 Harvard JOLT 1, 36 (2007). How does this play out in Web 2.0 context?

4. Harms/Remedies Shame Embarrassment Ridicule Economic loss (incl. loss of employment, health insurance, academic opportunities etc, identity theft) Criminal harm (eg cyberstalking, pedophilia) Culture of “unease” Should remedies be compensatory/financial or something else? Should remedies be based on litigation or something else?

5. Substance of information Innocuous personal details Embarrassing personal information Consumer spending profiles Personally identifying information Sensitive health information Sensitive financial information Criminal record

6. Format of Information Text (eg consumer profiles on Amazon, Netflix etc) Audio (eg NASA space shuttle case) Still Image (eg Mosley v News Group; death scene images of deceased; Solove, /2009/04/family_privacy.html#more) Moving Image (video) (eg Star Wars Kid, Mosley v News Group) Multi-Media (mashup or collaborative aggregation eg Dog Poop Girl)

The Professor, the Judge, and the Internet… Should Judge Scalia have a privacy action against Prof Reidenberg and his students? 1.Actors? 2.Activities? 3.Motivations? 4.Harms? 5.Substance/content? 6.Format? Does this scenario fit the criteria in the different categories? Why/why not? Does this exercise help develop/refine the contours of digital age privacy rights?