From pli’s Course Handbook Communications Law in the Digital Age 2009


F. Videos Lead to Accusations of Breaking Privacy



Download 445.44 Kb.
Page5/10
Date20.10.2016
Size445.44 Kb.
#6112
1   2   3   4   5   6   7   8   9   10

F. Videos Lead to Accusations of Breaking Privacy

Laws
1. ESPN Reporter Filmed in the Nude
ESPN reporter Erin Andrews was secretly videotaped in the nude while she was alone in a hotel room and the video was posted online in July. An attorney for Andrews, a mainstay on the sidelines for many college football and basketball games broadcast on the sports network, said he planned to seek criminal charges and file civil lawsuits against the person who shot the video and anyone who published the material.166 The grainy video showed Andrews combing her hair and looking in a mirror and generated a lot of attention when the video was posted online.

The video led to conflicting accounts about whether it is illegal to watch or download the video. CBS News reported through its legal analyst Lisa Bloom that such activity was illegal.167 Marc Randazza, a legal analyst for the blog “Photography is Not a Crime” countered that viewing and downloading the video is completely legal.168 Sam Bayard, assistant director of the Citizen Media Law Project at the Berkman Center for Internet and Society at Harvard University, believes publishing the video could lead to civil liability for invasion of privacy through the publication of private facts or violate state criminal surveillance laws that prohibit publication of “video voyeurism” images.169 For example, Bayard pointed to a New York statute that criminalizes the publication of images that are known to be unlawfully obtained.170

Media coverage of the incident also raised ethical questions about how to report on an incident surrounding an invasion of privacy claim. ESPN decided not to cover the issue as a news story since it had no bearing on Andrews’ work as a reporter, but several newspapers and television stations published or aired images of the video, including the New York Post.171 In response, ESPN banned all Post staffers from appearing on the network.172

2. Google Executives Face Trial in Italy

Four Google executives were scheduled to go on trial September 29 in Italy on accusations of defamation and violating privacy for allowing a video of an autistic boy being bullied to be posted online. The result of the case could alter the rules for how far video-sharing Web sites must go to control content.

“What is at issue is whether or not privacy laws that apply to newspapers or to the radio also apply on the Web, or whether it is a sort of free port where anything goes,” said Alfredo Robledo, one of the prosecutors in Milan who brought the charges. “We are raising the issue to show that there are holes in Italian legislation.”173

The charges stem from an incident at a school in Turin in 2006 when four boys were filmed teasing another boy, who has Down’s syndrome. A three-minute cell phone recording of the incident was uploaded to Google Video, where it remained for nearly two months before Google removed it after the Italian government and police intervened.174

Prosecutors allege the company should have prevented broadcast of the video and that it did not have enough automatic filters in place or enough workers in Italy to react to videos flagged as inappropriate by viewers. Google countered that it removed the video as soon as the company learned of it and then cooperated with authorities to help identify the boys involved.175

“We feel that bringing this case to court is totally wrong,” Google said in a statement. “It’s akin to prosecuting mail service employees for hate speech letters sent in the post. Seeking to hold neutral platforms liable for content posted on them is a direct attack on a free, open Internet.”176

The trial opened in February with the court addressing procedural matters. The family of the boy withdrew from the trial, leaving Vivi Down, an advocacy group, as the lead plaintiff in a corresponding civil case. The trial was scheduled to resume June 22, but was continued when an interpreter did not show up to court.177

The defendants, who are being tried in absentia, are Google’s senior vice president and chief legal officer David Drummond, former chief financial officer George Reyes, senior product marketing manager Arvind Desikan, and global privacy counsel Peter Fleischer.



G. Entrusting Google, Amazon With Personal, Public Records

1. UK Considers Putting Medical Records

Online
The United Kingdom’s Conservative Party proposed transferring public health records to Google or Microsoft in lieu of a central database, The Times of London reported July 6 in a story178 that drew the ire of those skeptical of Google’s commitment to protecting privacy. The proposal came on the heels of news that Connecting for Health, a centralized government database of health records, would not be completed until 2014, four years behind schedule. The newspaper reported that Conservative Party leaders hoped to give patients a choice among several private companies to store their records. That plan, however, would pose practical difficulties such as what would happen to the records of those who choose not to participate and how to handle the estimated nine million British households that do not have Internet access.179

Microsoft and Google launched similar personal health records services in 2007 on the promise that users can more easily control and share an electronic record with multiple health care providers. The services, Google Health and Microsoft’s Health Vault, respectively, are not alone in the industry, with Web MD and Revolution Health also offering the ability to build a personal online health record. 180

David Davis, a Conservative Party Member of Parliament, blasted his own party for the idea of giving Google the reins of patients’ health information because of what he described as the company’s “cavalier approach to European privacy legislation.”181 Davis supported transferring health records to private companies, but under the conditions that an entity cannot profit from the venture and the data must be stored on computers within the UK to assure compliance with UK privacy laws. Peter Fleischer, global privacy counsel for Google, quickly defended Google’s commitment to privacy and the value of its health-related services, including “Flu Trends,” which “offers an early warning system for flu outbreaks based on the anonymous actions of millions of people searching for symptoms.”182


2. Los Angeles Officials Raise Concerns

About Google Apps
The city of Los Angeles proposed replacing its outdated computer records system by moving government e-mails, reports and other internal data onto Google Apps, prompting concerns about the program’s ability to handle records securely for the nation’s second-largest city. Known as “cloud computing,” the city’s records would be housed on Google servers off city property, raising fears that hackers could gain access to confidential information, particularly of ongoing police investigations.183

“Any time you go to a Web-based system, that puts you just a little further out than you were before,” said Paul Weber, president of the Los Angeles Police Protective League. “Drug cartels would pay any sum of money to be aware of our progress on investigations.”184 Google has assured users that the application is secure and that more than 1.75 million businesses use the technology. As of July 2009, Google said Washington, D.C., was the only major city using Google Apps for its e-mail and office applications, although other cities were considering also using it.185 The Los Angeles Times reported that city officials wondered whether the obligation to respond to public information requests would fall to Google as host of the city’s records. Peter Scheer, director of the California First Amendment Coalition, said the switch to Google could improve access to public information because of Google’s immense search and storage capabilities. “If you’re asking for information, it’s more likely you’ll get a more complete and accurate response to your request, sooner rather than later.”186



3. Groups Urge Strict Privacy in Google Books

A trio of privacy watchdogs urged Google to implement strict privacy controls in Google Books, a service that would make a wide variety of books readily available online. The groups were concerned that Google can track the books people browse and read in the virtual library and that the record could be turned over to the government or another third party. To combat the concern, the group that included the American Civil Liberties Union of Northern California, urged Google to adopt several measures. These include releasing browsing information only in response to a court order, not keeping logging information for more than 30 days, and giving users the ability to delete their records.187 Google assured potential users that it has a strong privacy policy in place for Google Books. The company said it could not publicize the policy until the U.S. District Court for the Southern District of New York approves a preliminary settlement with book publishers and authors that would enable Google to provide access to the books.188 However, the Department of Justice informed the court on July 2, 2009, that it had opened an antitrust investigation into the proposed agreement. 189



4. Student Leads Suit Against Amazon Over

Deletion of Kindle Books

A Michigan high school student is a lead plaintiff in a proposed class action suit against Amazon.com after the company deleted George Orwell books from customers’ Kindles. The student, Justin Gawronski, purchased a Kindle copy of Orwell’s “1984” in early June 2009 and took notes in the electronic novel as part of a summer homework assignment, according to the complaint filed July 30 in federal court in Seattle where Amazon Digital Services, the distributor of the Kindle device, is headquartered.190 At some point in July, Gawronski powered into his Kindle to find that his copy of “1984,” including his notes, had been deleted, according to the complaint.

Amazon has explained that it deleted copies of “1984” and “Animal Farm” after it discovered they were added to the Kindle store by a company that did not own the rights to distribute the novels. Amazon says it gave customers a refund for the price of the books.191

In addition to those who had digital content deleted, the suit proposes to represent all people who have owned a Kindle and seeks an injunction prohibiting Amazon from accessing customers’ Kindles. The suit alleges various contract claims, including that Amazon violated its own terms of use by revoking a promise that users can keep a permanent digital copy of their purchases. The suit also seeks damages for the loss of work product sustained by the deletion.


H. Bloggers in Court


1. Blogger Arrested for Inciting Violence


Against Judges
New Jersey blogger and Internet radio host Hal Turner was charged with violating state and federal laws for separate inflammatory posts on his blog, including what authorities said amounted to death threats against three Seventh Circuit judges.192 The posts on Turner’s now-defunct blog, turnerradionetwork.com, denounced a Seventh Circuit ruling that upheld two local handgun bans in Chicago. “Let me be the first to say this plainly: These judges deserve to be killed,” Turner wrote June 2, 2009, according to a criminal complaint filed against him June 24 in the U.S. District Court for the Northern District of Illinois.193 “Their blood will replenish the tree of liberty. A small price to pay to assure freedom for millions.” Turner also posted the photographs, phone numbers, work addresses and courtroom numbers of the three judges, William Bauer, Frank Easterbrook, and Richard Posner. The FBI said in its complaint that it believed Turner’s comments constituted “a threat to assault or murder a United States judge,” in violation of 18 U.S.C. § 115(a)(1)(B). On Aug. 10, a federal judge denied Turner bail, calling “a danger to the community.”194

Prior to the federal charges, Turner had surrendered to Connecticut authorities on state charges of inciting violence against two state lawmakers – Sen. Andrew McDonald (D-Stamford and Darien) and Rep. Michael Lawlor (D-East Haven) – who introduced a controversial bill that would have given lay members of Roman Catholic churches more control over their parishes’ finances. Law enforcement officials believe Turner violated Conn. Gen. Stat. § 53a-179a(a), which criminalizes “inciting injury to persons or property.”

Michael Orozco, Turner’s defense attorney, said Turner worked for the Federal Bureau of Investigation from 2002 to 2007 during which time the FBI taught him how to purposefully make comments that would incite others to act and lead to their arrest. Prosecutors have acknowledged Turner spied on radical right-wing organizations, but that he was not working for the FBI when he made the comments that led to the criminal charges in Illinois and Connecticut.195

It is unclear whether the charges against Turner will hold up in court. Gene Policinski, vice president and executive director of the First Amendment Center, mentioned in a June 14 post on the center’s Web site that the principles in Brandenburg v. Ohio, 395 U.S. 444 (1969), should prevent any criminal charges against pundits such as Turner.196 In Brandenburg, the Court held that the First Amendment protected statements advocating use of force or illegal activity “except where such advocacy is directed to inciting or producing imminent lawless action and is likely to incite or produce such action.”197




2. Blogger Cannot Invoke New Jersey Shield

Law
In Too Much Media LLC v. Hale, MON-L-2736-08 (Monmouth County Ct. June 30, 2009), a New Jersey trial court judge ruled that a blogger and online commentator who was sued for defamation could not claim the state’s journalist shield law to protect the confidential sources she used as a basis for publishing allegedly defamatory statements about a corporation. Monmouth County Judge Louis Locascio ruled that Shellee Hale, a Washington-state based blogger, licensed private investigator, and “life coach,” could not claim the statutory privilege, N.J.S.A. 2A:84A-21 -21.8, because Hale did not show that she was “in any way involved with” any of the “news media” listed in the statute: “newspapers, magazines, press associations, news agencies, wire services, radio or television.”

Too Much Media, a computer software company that provides advertising programming for the online pornography industry, sued Hale for statements she made in an Internet forum that accused the company, and two of its officers, of engaging in criminal behavior, including making physical threats, and profiting from a security breach that jeopardized the privacy of subscribers to pornography Web sites. The company planned to compel her to reveal her sources in a deposition.

Locascio wrote that Hale’s online forum statements did not display accepted practices of journalism that the law was meant to protect. “There is no fact-checking required, no editorial review and so little accountability for the statements posted that it is virtually impossible to discern the author or source of the posts,” Locascio wrote. “To extend the newspaper’s privilege to such posters would mean anyone with an email address, with no connection to any legitimate news publications, could post anything on the internet and hide behind the Shield Law’s protections.” On July 22, 2009, Hale filed a motion for reconsideration in Monmouth County Court.

Sam Bayard, Assistant Director of the Citizen Media Law Project at Harvard’s Berkman Center for Internet and Society, wrote in a July 9 blog post that it would be “a mistake … to read Judge Locascio’s opinion broadly as saying that New Jersey’s shield law categorically does not protect bloggers.”198 Bayard pointed to several “peculiar facts” in Locascio’s ruling, including that the judge appeared to discount some of Hale’s testimony because she could not provide specifics about articles in newspapers and trade journals she claimed to have published, and because she apparently lied in a previous court document in the case.


I. Advances in Phone Technology Bring Benefits, Risks

1. Breach Highlights Security Risk of Smart

Phones
Blackberry users in Dubai and Abu Dhabi in July 2009 unknowingly installed what was probably spy software on their phones instead of an application they believed would upgrade their phones. While the circumstances surrounding the breach were not entirely known, including who ordered the upgrade, the incident reinforced privacy concerns surrounding the phones. An Associated Press story on the breach quoted Richard M. Smith, an Internet security and privacy consultant at Boston Software Forensics as saying that smart phones are “the perfect personal spying devices” because as tiny computers they can be programmed to send back a broad range of information.199

The Associated Press reported that the incident occurred after Etisalat, an Abu Dhabi-based mobile service provider, sent text messages to BlackBerry customers asking them to follow a link to update their phones. Customers who installed the software complained that it quickly drained their batteries. Research in Motion, the Canadian company that makes the BlackBerry, distanced itself from the request to install the software and said the application users installed was a surveillance program that could have possibly allowed access to personal or private information.200


2. Google Voice App Not Allowed in iTunes

App Store
In what may be a move to protect itself against a competitor, Apple refused to allow Google to distribute its Google Voice application on iTunes, meaning iPhone users cannot use the software.201 The move prompted the Federal Communications Commission to launch an inquiry into Apple’s decision.202

Google Voice allows users to make free or low-cost calls and provides free text messaging, call routing and a universal voice mailbox. The feature users may find the most beneficial is the ability to consolidate multiple phone numbers – home, cell phone, office – into one Google Voice number. Users can then decide which devices will ring depending on the caller. For example, calls from a boss could be set to ring only a BlackBerry while calls from a mother-in-law could be sent straight to voice mail.203 Google Voice was already on BlackBerrys prior to Apple’s decision to block the application.204

Technology analyst Martin Pyykkonen suggested that Apple’s move was likely a means to protect its business partner, AT&T Inc., from losing money from subscribers who would use Google Voice instead of its services.205 A New York Times blogger later reported that Google said it was looking to replace the Voice application with a specialized Web page that would perform the same functions.206
J. Redaction Methods May Not Serve Their Purpose
A thick black marker used to suffice for redacting information in legal documents. Some attorneys may still use that tool even though electronic redacting technology is available. Both methods, however, may not accomplish the goal of keeping sensitive information from view. During a 2008 sexual discrimination suit in Connecticut,207 it was discovered that the black bars intended to serve as a redaction tool in PACER’s federal court filing system would disappear when the bars were copied and then pasted into Microsoft Windows’ Notepad or Microsoft Word, allowing the underlying words to be read.208

Redaction remains an important part of many legal offices, particularly in the public sector as the Obama administration makes a push for a more transparent government. The Federal Bureau of Investigation has a redaction tool in its own document management system that allows judges to privately view redacted information. The tool reveals the initials of the person who made the redaction along with margin notes that indicate why the information was hidden.209 Readily-available automated redaction software can search for words that may need to be redacted and automatically obscure certain material such as Social Security numbers, but the software does have its limitations. It may miss words in a document that has been scanned and it often cannot read embedded items in a document such as tables and spreadsheets.

Those who commonly redact information say that human review should remain a part of any successful redacting process. “Tools can help, but you can never assume it’s foolproof,” said Christine Musil, vice president of communication for Informative Graphics Corp., which makes Redact-It, a redaction tool. “Using a redaction tool can help demonstrate a good-faith effort to redact information, but you still need to use it properly.”210

IV. DATA PRIVACY IN THE WORKPLACE AND

ON CAMPUS
A. Requests for Passwords to Social Networking Sites
1. Bozeman, Mont., Stops Asking Job Applicants for Facebook Passwords
On June 22, 2009, the city of Bozeman, Mont., eliminated its policy of asking job applicants to give their passwords for all personal and business Web sites, including social networking sites such as Facebook and MySpace, during the hiring process.211 Applicants were required to sign a waiver agreeing to a criminal background and references check. The bottom of the waiver included this request: “Please list any and all, current personal or business websites, web pages or memberships on any Internet-based chat rooms, social clubs, or forums, to include, but not limited to: Facebook, Google, Yahoo, YouTube.com, MySpace, etc.”212 The request for passwords to Google and Yahoo meant city officials had the ability to read applicants’ e-mails.

Bozeman had previously checked job applicants’ social networking sites for about three years. City administrators first began asking for the passwords of police and fire department applicants, but that procedure was never presented to the city commission for approval because that body does not typically set hiring policies.213 Bozeman City Manager Chris Kukulski said the city viewed personal Web sites in order to make sure applicants were honest and reputable as part of its background check that includes checking credit reports, criminal history, references and past employment.214 City officials recalled one instance in which content of an applicant’s social networking site was a factor in the person not being hired.

News of the city’s hiring practice prompted a wave of attention by media outlets and bloggers when it became widely known in June, prompting the city to revisit the practice. At the meeting to rescind the practice, city Commissioner Jeff Krauss apologized for not acting more quickly to avoid “wandering down a road that violated basic rights of our citizens.”215 The city commission has since approved spending up to $10,000 to hire an outside investigator to examine the former hiring practice, including whether an applicants’ refusal to submit the information negatively affected their chances of being hired and how the city used its reviews of the Web sites.216



Download 445.44 Kb.

Share with your friends:
1   2   3   4   5   6   7   8   9   10




The database is protected by copyright ©ininet.org 2024
send message

    Main page