公共场所的匿名权与隐私权(Jeffrey M. Skopek)

合集下载

《公职人员的隐私权与公众知情权的冲突与协调》范文

《公职人员的隐私权与公众知情权的冲突与协调》范文

《公职人员的隐私权与公众知情权的冲突与协调》篇一一、引言在信息社会,隐私权与公众知情权日益成为公众关注的焦点。

特别是对于公职人员而言,其隐私权与公众知情权之间的平衡显得尤为重要。

公职人员因其身份的特殊性,不仅享有基本的隐私权保护,还需承担向公众公开其部分信息的责任。

本文旨在探讨公职人员的隐私权与公众知情权之间的冲突及其协调方式。

二、公职人员的隐私权与公众知情权的内涵(一)公职人员的隐私权公职人员的隐私权是指其在工作及个人生活中享有的个人空间、个人信息和个人事务不被他人侵扰的权利。

尽管公职人员因公职身份受到社会监督,但依然应享有与其个人生活有关的私密信息的保护。

(二)公众知情权公众知情权是指公众有权知道与其利益相关的政府工作信息、社会公共事务的知情权利。

在公职人员领域,公众对公职人员的行为、品行、能力等有知情权,以便对其履行公职的能力和诚信度进行评估。

三、公职人员的隐私权与公众知情权的冲突(一)冲突的表现在现实操作中,公职人员的隐私权与公众知情权常常发生冲突。

如公职人员的家庭住址、联系方式等个人信息被公开,可能侵犯其隐私权;而公职人员在执行公务过程中的行为和决策,又需接受公众的监督和审查。

(二)冲突的原因这种冲突的主要原因在于法律规定的模糊性、社会价值观的差异以及权力运行的不透明性等。

此外,媒体报道的片面性、公众情绪的极端化等因素也加剧了这种冲突。

四、协调公职人员的隐私权与公众知情权的策略(一)完善法律法规应完善相关法律法规,明确公职人员隐私权与公众知情权的界限,如哪些信息属于应公开的信息,哪些属于个人隐私范畴等。

同时,加强法律监督和执行力度,确保公职人员的隐私权和公众的知情权都得到合法保护。

(二)提高透明度政府应提高权力运行的透明度,将公职人员的决策和行为置于公众的监督之下。

同时,建立健全信息披露制度,及时向公众公开相关信息。

(三)平衡利益关系在处理公职人员的隐私权与公众知情权的冲突时,应平衡各方利益关系。

《公职人员的隐私权与公众知情权的冲突与协调》范文

《公职人员的隐私权与公众知情权的冲突与协调》范文

《公职人员的隐私权与公众知情权的冲突与协调》篇一一、引言在当代社会,公职人员的隐私权与公众知情权之间的冲突已成为一个备受关注的社会问题。

公职人员作为社会公共事务的管理者和执行者,其职责的特殊性使得他们的行为和决策对公众产生重要影响。

然而,与此同时,公职人员也享有隐私权,其个人生活应受到一定程度的保护。

本文旨在探讨公职人员的隐私权与公众知情权之间的冲突与协调,分析两者之间的平衡点,并提出相应的解决方案。

二、公职人员的隐私权与公众知情权的概念及意义1. 公职人员的隐私权:隐私权是指个人对自己私密信息的控制权,包括个人生活、家庭生活、个人信息等方面的内容。

公职人员的隐私权是指公职人员在履行职责之外的私人生活和信息的保护权利。

2. 公众知情权:公众知情权是指公众有权知晓与其利益相关的公共事务和政府决策的权力。

在民主社会中,公众知情权是保障公民参与、监督政府行为的重要手段。

三、公职人员的隐私权与公众知情权的冲突公职人员的隐私权与公众知情权之间存在天然的冲突。

一方面,公职人员作为社会公共事务的管理者和执行者,其职责的特殊性使得公众对其个人生活和信息的关注度较高;另一方面,过度关注公职人员的隐私可能侵犯其合法权益。

此外,在特殊情况下,如公职人员涉及贪污腐败等违法行为时,公众对知情权的追求与公职人员隐私权的保护也会产生冲突。

四、冲突的协调与平衡1. 法律制度建设:建立健全相关法律法规,明确公职人员隐私权与公众知情权的边界,为平衡两者之间的冲突提供法律依据。

同时,加强对违法行为的惩治力度,确保公众知情权的合理行使。

2. 政府信息公开:政府应积极推进信息公开制度,及时、准确地向公众公开政府决策、公共事务等信息。

通过公开透明的信息披露,满足公众的知情权需求,减少对公职人员隐私的过度关注。

3. 媒体责任担当:媒体作为信息传播的重要渠道,应承担起社会责任,客观、公正地报道公职人员的行为和决策。

避免过度炒作公职人员的隐私,保障其合法权益。

公众人物隐私权与新闻自由的冲突与平衡

公众人物隐私权与新闻自由的冲突与平衡

公众人物隐私权与新闻自由的冲突与平衡摘要伴随着时代的进步,社会主义市场经济的进一步开放,新闻行业得到了空前的发展,新闻报道和传播方式也越来越多样化,新闻自由的观念逐渐深入人。

这一时期,公民在对个人隐私权的保护意识逐渐提高的同时,也对他人的生活包括个人隐私信息越来越感兴趣,新闻媒体就是传播和报道这些信息的主要渠道。

由于新闻自由的目的是将真实的信息传播给社会公众,而隐私权的目的则是尽可能地保护个人私生活,因此两者一旦相遇,便会产生难以平衡的冲突与矛盾。

当前,这两者在我国都处于发展阶段。

一方面,在2023年颁布的《侵权责任法》第一次将隐私权规定为民事权利,在这之前隐私权一直都属于名誉权的范畴,而且《侵权责任法》也仅对隐私权进行了简单的罗列,并没有对其进行详细规定。

另一方面,目前我国对新闻自由并无明确的法律规定,只在《宪法》中涉及到关于出版自由和言论自由的内容。

在法律滞后的情况下,如何正确理解新闻自由和隐私权的关系,解决二者之间的冲突,便是本文写作需要解决的主要问题。

本文主要通过梳理新闻自由和公众人物隐私权的基本理论,分析新闻自由与公众人物隐私权发生冲突的内在原因与表现形式,探讨新闻媒体免受处罚的例外情形,并提出平衡新闻自由和隐私权关系的措施,寻找两者之间关系的制衡点。

关键词:隐私权;新闻自由;公众人物导论1.1选题背景和选题意义1.2文献综述1.2.1国内文献综述1.公众人物隐私权与新闻自由权的权利属性王利明(2023)指出:“隐私权作为一项具体人格权,就是指自然人享有的私人生活安宁与私人信息秘密依法受到保护,不被他人非法侵扰、知悉、搜集、利用和公开的一种人格权。

”在生活中,对于公众人物的隐私权保护问题,人们一贯认为公众人物无隐私的观点是不严密的。

准确地说,公众人物并非没有隐私,只是因为公共利益、公众兴趣、舆论监督、社会治理等因素的需要,对其隐私权进行了必要的限制。

同时,对公众人物隐私权的限制,应当根据具体案件的具体情况进行考虑,也就是说,法官需要根据具体案情,综合考虑相关因素加以判断。

公开场合隐性采访有没有底线?隐性采访最新案例2018

公开场合隐性采访有没有底线?隐性采访最新案例2018

《公开场合隐性采访有没有底线?:隐性采访最新案例2018》摘要:目前中国新闻界,由于受众阅读期待和追求报道真实性的驱动,隐性采访有愈演愈烈之势,甚至成为某些媒体的“镇山之宝”,因此,隐性采访的实施,公开场合不应该成为它的理由,或者说,认为公开场合中可以进行隐性采访这一观点存有疏漏之处,在关于公开场合中隐性采访问题的讨论中,人们经常会提及这样的例子:公开场合中的情侣亲吻可不可以进行隐性采访目前中国新闻界,由于受众阅读期待和追求报道真实性的驱动,隐性采访有愈演愈烈之势,甚至成为某些媒体的“镇山之宝”。

记者自然是满心欢喜,而学院派的研究者则从权利与义务的对等、隐私权的保护和诸种利益之间的平衡等因素出发,提出对隐性采访应该加以若干限制,隐性采访应该有自己的实施底线和应遵从的原则,但同时也提出:对于在公开场合中活动的人可以使用隐性采访这种采获新闻信息的方式。

何为公开场合?研究者在讨论公开场合中的隐性采访问题时所说的公开场合,一般是指“用于公共活动的物理空间”(顾理平《隐性采访论》第183页,新华出版社2004年),如道路、公园、广场、剧院等场所。

在这些场合里,顾理平认为,人们的行为“是一种主动昭示于人的行为,即使不是主动昭示,在法律上也应该认为是可以通过新闻进行报道而不必事先征得被采访者的许可。

否则,许多新闻活动就无法开展”(《隐性采访论》第184页)。

也就是说,这种情况下不存在隐私(宁居)的侵扰问题,顾理平还引张新宝、普洛赛尔等人的论述来支持自己的观点。

显然,顾理平的这一主张是已经被人们普遍接受的观念,但在我们看来,这一主张恰恰有待于重新进行反思。

公开场合中隐性采访存不存在隐私侵权的问题,归根到底就是公开场合中存不存在私人空间的问题。

如果我们承认公开场合里存在私人空间,那我们就必须对在其中进行的隐性采访进行必要的限制,不能随便对一个处在公开场合里的普通人实施隐性采访。

那么,公开场合里有无私人空间呢?根据我们的个人体验,这个空间显然是存在的。

对公共场所隐私权的认定和保护

对公共场所隐私权的认定和保护

对公共场所隐私权的认定和保护关于隐私权,王利民教授认为:隐私权是自然人享有的对其个人的与公共利益无关的个人信息、私人活动和私有领域进行支配的一种人格权。

〔私密不受侵害的权利。

所以一般讨论隐私,都是指私密空间里的个人活动。

显而易见,一旦自然人进入公共区域,那么对自然人隐私权的保护会受到很大的限制。

那么我们首先要讨论的就是何为公共区域。

公共区域顾名思义就是公众都可以活动的区域,个人不享有独立支配权的地方。

以北京二中院审判的这个案子为例,原告所主张的在楼梯内被拍到,楼层中的过道、楼梯肯定是公共区域无疑,即使空间狭窄,即使人口稀少,但也不可否认,每个人都有从此通过的权利,每个人也必须同时忍受他人在此区域内的活动。

对公共空间的认定毫无争议,那么这就意味着原告在公共区域内活动,其隐私必然要受到一定的限制。

不可否认的是,在公共区域内,公民也有隐私权,比方商场试衣间内,商场的厕所里面就禁止摄像头,这些区域虽然也属于公共区域,但是公民在独占排他使用的时候,在那个时间段内公民就对这局部区域取得了暂时性的控制权,此时公共场所就转变成私密场所,并且試衣服、上厕所这些活动本身就极具私密性和不可公开性,理应得到保护,因此成认公民享有隐私权。

据此我们可以得出如下推断:当公民对某个公共区域取得暂时性的排他性控制并且在进行私密性活动,推定其享有隐私权。

这是毋庸置疑的。

因此关于如何认定公共场所的隐私权,笔者认为需要从三个方面讨论:1.是否对此公共区域取得暂时性排他性权利;2.是否在进行私密性活动;3.是否给当事人带来事实上的损害,也即是否侵扰到私人生活的安宁或是泄露私人秘密。

笔者认为这三个方面只要具备任何一个,就应当享有隐私权。

首先,当公民对这片公共区域暂时性排他性控制,那么在那个时间段,那个空间于公民而言就具有私密性,公民对这片区域已取得控制权,无论公民在此空间内从事什么活动,无论是否具备私密性,那都是个人的自由,均属于个人的隐私;其次,毫无疑问,只要是在进行私密活动,具备私密性,那肯定是个人的隐私,这点毫无争议,无论是在公共场合或者是私密场合,至于对这种隐私保护与否,那是我们下一个局部讨论的内容,在此不再赘述;第三,当公民在公共区域内活动的时候,尽管他对这片区域并未取得暂时性排他控制权,但是也有保障自己私人生活安宁的权利。

公共场所隐私权的悖论

公共场所隐私权的悖论

公共场所隐私权的悖论作者:刘泽刚来源:《现代法学》2008年第03期摘要:“公共场所隐私权”是个悖论式的问题。

实践中,西方国家已经承认了公共场所隐私权的合法性。

隐私权保护重心从“场所”到“人”的转变,以及由此产生的“合理隐私预期”是公共场所隐私权的法律依据,然而,“合理隐私预期”至今仍然缺乏明确的标准和法理依据,这根源于对“公共场所”之“公共性”的误解。

“公共场所”大都是公、私混合的“社会场所”。

这不仅决定了“公共场所隐私权”的正当性,也决定了对公共场所隐私权进行保护必须突破僵化的公私法分立格局。

关键词:隐私权;宪法隐私权;公共领域;公私法关系;人格权中图分类号:DF34文献标识码:美国法学家沃伦(Warren)和布兰代斯(Brandeis)1890年首次提出“隐私权(the right to privacy)”时,曾将其描述为“一个人待着的权利(the right to be let alone )”[1]。

如果坚持这种定义,“公共场所的隐私权”也可被表述为“一个人在公共场所独处的权利”。

但一个人如何才能在公共场所独处?这的确是个荒谬的问题。

更荒谬的是人类技术能力的发展远远超前于其德性的进步。

信息时代的人身处公共场所时,其隐私处于前所未有的危机之中:监控设备泛滥,“狗崽队”猖獗,偷拍频发。

直觉告诉我们:隐私在公共场所也应当受到法律的保护,但这种直觉是否有法理的依据?一、“合理的隐私期待”:公共场所隐私权的关键从实证角度看,公共场所的隐私权已获得立法和司法实践支持,因此是一种现实存在的权利,绝非理论杜撰的产物。

当然,仍有许多人质疑公共场所隐私权的正当性。

因为它与我们对“公共场所”的直觉相抵触。

一般认为,“所谓公共场所,是指任何不特定的第三人可以出入的场所,其标准是该场所的用途。

”[2]也有学者认为:“公共场所,是指根据该场所的所有者(或者占有者)的意志,用于公共大众进行活动的空间”[3]。

可见,公共场所概念的核心是用途。

公众人物隐私边界在哪?

公众人物隐私边界在哪?

公众人物隐私边界在哪?作者:潘书鸿来源:《上海人大月刊》2021年第11期你还记得英语课本中的“钢琴王子”李云迪吗?10月21日晚,各大媒体对李云迪嫖娼事件进行了通报,瞬时让这名肖邦国际钢琴比赛史上最年轻的金奖获得者声名狼藉。

指名道姓公开报道嫖娼,会侵犯个人隐私吗?公众人物嫖娼案的大型报道早已不是第一次了,关于是否侵犯个人隐私,首先要弄明白什么是隐私权。

实际上,我国直到今年1月1日《民法典》正式实施后,才把“隐私权”作为一项独立的人格权纳入法律规定之中,在第1032条中作出了具体规定。

此外,今年11月2日,《个人信息保护法》正式实施,进一步加强了个人信息的保护。

那么,指名道姓公开报道嫖娼是否会侵犯个人隐私或个人信息?抛开李云迪事件,若是对于普通人公开报道嫖娼情况,必然会侵犯隐私权。

原因有两点:第一,此类负面信息公开必定会对个人名誉、尊严等人格权造成重大影响,是属于“不愿为他人知晓”的私密信息,故符合个人隐私的定义;第二,早在我国将隐私权正式纳入法规之前,公安部就因东莞、武汉等多起派出所公开报道嫖娼的事件,在2010年专门下发通知,要求各地公安机关在查处卖淫嫖娼违法犯罪活动时,要坚决制止游街示众等有损违法人员人格尊严的做法,既要坚持执法公开,又要充分尊重和保障人权。

十年前的法治观念尚且如此,如今在《民法典》明确规定了隐私权的情形下,法治环境更不能倒退。

因此,网络媒体指名道姓公开报道嫖娼的行为,已经侵犯了个人隐私权。

在很多人意识中,嫖娼对社会造成了恶劣影响,就该让“坏人”接受社会舆论的监督,但从法治思维的角度来看,这样做并不妥当。

在《治安管理处罚法》第66条对卖淫、嫖娼的处罚规定中包括拘留、罚款,但并不包括通报批评。

根据“法无授权即禁止”的原则,行政机关亦无权指名道姓公开报道嫖娼,否则会让行为人接受法律以外的惩罚,超出惩罚的必要限度,不符合行政法的“比例原则”。

公开报道公众人物嫖娼,与报道普通人有什么不同吗?《民法典》第1036条规定了处理个人信息的免责事由,即若行为人是为维护公共利益或为了维护行为人合法权益,在合理处理个人信息情况下,行为人就不承担民事责任。

互联网时代的公共空间与个人隐私

互联网时代的公共空间与个人隐私

互联网时代的公共空间与个人隐私在互联网时代,随着信息技术的快速发展和普及,网络空间已经成为人们日常生活中不可或缺的一部分。

互联网为人们提供了一个全新的交流渠道和信息获取途径,同时也为公共空间和个人隐私带来了前所未有的挑战。

公共空间的定义与特点公共空间是指供公众聚集、交流和活动的地方,在现实生活中,公共空间通常包括街道、广场、公园、图书馆等地方。

而在互联网时代,公共空间的概念得到了拓展,除了传统的实体场所,社交媒体平台、网络论坛、博客等也被视为一种虚拟的公共空间。

在这些虚拟公共空间中,人们可以自由表达观点、分享信息、交流经验,这为民主社会和信息社会的建设提供了重要支撑。

在互联网上,公共空间具有以下特点:开放性:互联网是一个开放的平台,任何人都可以自由加入和参与其中;匿名性:在网络上,人们可以选择匿名身份进行交流,这既有利于自由表达意见,又增加了信息安全的挑战;交互性:网络空间可以实现实时交流和互动,人们可以立即回应他人言论,形成多向交流模式;无界限性:互联网打破了地域限制,使得全球范围内的用户都可以参与其中。

个人隐私面临的挑战然而,在享受公共空间带来便利的同时,个人隐私也面临着严峻挑战。

在互联网时代,个人隐私泄露问题日益突出,以下是一些引起关注的方面:数据泄露:在网络上留下的个人信息可能被不法分子获取并利用,导致个人隐私泄露;监控感知:互联网科技的应用使得监控日益普及,个人在网络上的行为和数据可能被监控、记录和分析;信息过度共享:在社交媒体等平台上分享过多个人生活细节可能导致个人隐私曝光;网络攻击:黑客攻击、网络钓鱼等手段威胁着个人信息安全。

寻找公共空间与个人隐私之间的平衡如何在互联网时代寻找公共空间与个人隐私之间的平衡成为摆在我们面前的一个重要课题。

以下是一些思考和建议:加强信息安全意识:个人在使用互联网时要注意保护好自己的账号密码等信息,避免落入不法分子手中;谨慎分享个人信息:在社交媒体等平台上分享信息时要谨慎,避免过度透露个人隐私;支持数据保护政策:政府和企业应加强对用户数据的保护和管理,建立完善的数据保护制度;提倡网络道德:倡导网络用户文明用语、遵守法律法规,提高整个网络空间的品质。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Further information about the University of Cambridge Faculty of Law Legal StudiesResearch Paper Series can be found at /ssrn/ Reasonable Expectations of Anonymity Jeffrey SkopekPAPER NO. 6/2015FEBRUARY 2015REASONABLE EXPECTATIONS OF ANONYMITY 101 V IRGINIA L AW R EVIEW ___ (forthcoming May 2015)Jeffrey M. Skopek*The Supreme Court has concluded that the Fourth Amendment’s protections do not apply to information that has been exposed to the public. This conclusion is deeply flawed and derives from the mistaken conflation of anonymity and privacy. Although anonymity and privacy are similar in that both maintain the secrecy of personal information, they differ in a fundamental and legally relevant way: privacy hides the information, whereas anonymity hides what makes it personal. Understanding this difference reveals compelling substantive and formal reasons for interpreting the Fourth Amendment to protect not only reasonable expectations of privacy, but also “reasonable expectations of anonymity.” Further, the incorporation of this new analytic concept into Fourth Amendment jurisprudence yields significant value: first, by identifying otherwise-unrecognizable ways in which new techniques of big data implicate the Constitution, and second, by delivering on the unfulfilled promise of the Supreme Court’s teaching that the Fourth Amendment “protects people, not places.”* University of Cambridge Faculty of Law. Comments welcome: jms212@. Thanks to David Barron, Yochai Benkler, John Coates, Glenn Cohen, John Goldberg, Matt Lawrence, Nicholson Price, Chris Robertson, Todd Rakoff, Joe Singer, Holger Spamann, Carol Steiker, Matthew Stephenson, Larry Tribe, Mark Wu, and workshop participants at Harvard Law School, the University of Cambridge Faculty of Law, and the New England Regional Junior Faculty Workshop for helpful conversations and comments. This work was made possible by a fellowship from Harvard Law School’s Petrie-Flom Center.11/11/14] REASONABLE EXPECTATIONS OF ANONYMITYT ABLE OF C ONTENTSI NTRODUCTION (1)I. R EASONABLE E XPECTATIONS OF P RIVACY (5)A. The Fourth Amendment (5)B. Privacy in the Fourth Amendment (7)1. Normative vs. descriptive conceptions of privacy (7)2. The Fourth Amendment and epistemic privacy (10)C. The Limits of the Privacy Framework (15)1. The public exposure and third party doctrines (15)2. The critical scholarship (18)II. P RIVACY VS.A NONYMITY (20)A. Differentiating Privacy and Anonymity (21)B. The Nature of Anonymity (25)C. Finding Anonymity in the Fourth Amendment (30)III. R EASONABLE E XPECTATIONS OF A NONYMITY (35)A. Genetic Identification (36)1. Familial searching and the limits of privacy (37)2. Virtual profiles and genetic anonymity (44)B. Locational Tracking (46)1. Recognizing the constitutional problem (48)2. Protecting people, not places (57)C ONCLUSION (61)11/11/14] REASONABLE EXPECTATIONS OF ANONYMITY 1I NTRODUCTIONNew technologies and methods of data analysis are being used bythe government to monitor the public in ways that were unimaginable a decade ago. Law enforcement agencies ranging from municipal police forces to the Department of Homeland Security are using tools such as genetic databanks,1 biometric scanners,2 roadside cameras,3 and internet and cell-phone metadata analysis4 to gather detailed information about the lives of individuals who are not suspected of any wrongdoing. The meaningful question in this area is no longer what information the government can obtain about us, but rather what information is beyond its reach.The reason for this is that Supreme Court has concluded that the Fourth Amendment’s protections do not apply to any information that has been exposed to the public or third parties. This includes information about our public movements, internet usage, cell phone calls, and so on. Such information is per se fair game for police collection by any means.This Article argues that this conclusion derives from a mistaken conflation of privacy and anonymity, and that understanding the difference between these concepts reveals strong substantive and formal reasons for interpreting the Fourth Amendment to protect not only reasonable expectations of privacy, but also “reasonable expectations of anonymity.” Further, it demonstrates that the incorporation of this new analytic concept into Fourth Amendment jurisprudence yields significant value: first, by identifying otherwise-unrecognizable ways in which new techniques of big data implicate the Constitution, and second, by delivering on the unfulfilled promise of the Supreme Court’s teaching that the Fourth Amendment “protects people, not places.” A more detailed roadmap of this argument follows:1 The police in nearly every state and the FBI are creating genetic profile databases. N AT’L C ONF.S T.L EGISLATURES,S TATE L AWS ON DNA D ATA B ANKS, available at /default.aspx?tabid=12737. Originally, only those convicted of felonies were required to submit DNA samples, but the federal government and most states now require profiling of arrestees as well. Id.; 28 C.F.R. §28.12(b) (2010).2See, e.g., Charlie Savage, Facial Scanning Is Making Gains in Surveillance, N.Y. T IMES,August 21, 2013 (describing the Department of Homeland Security’s Biometric Optical Surveillance System, which will be able to scan crowds in public spaces and automatically identify and track individuals).3See, e.g., A MERICAN C IVIL L IBERTIES U NION,Y OU A RE B EING T RACKED:H OW L ICENSE P LATE R EADERS A RE B EING U SED TO R ECORD A MERICANS’M OVEMENTS(2013) (describing the widespread use of road-side cameras to amass millions of digital records on the location and movement of every vehicle with a license plate).4See, e.g., Richard Lempert, PRISM and Boundless Informant: Is NSA Surveillance a Threat? B ROOKINGS, June 13, 2013 (describing the NSA’s Boundless Informant program, which captured a vast and indiscriminate class of metadata from U.S. citizens’ phone calls, and its PRISM program, which monitored communications with foreign targets by tapping directly into the central servers of nine leading U.S. internet companies).11/11/14] REASONABLE EXPECTATIONS OF ANONYMITY 2The argument begins, in Part I, with an analysis of the FourthAmendment right to be free from unreasonable “searches”—a term that the Supreme Court has, ever since Katz v. United States,5 interpreted to mean “violations of reasonable expectations of privacy.” The key contribution of this Part is clarifying what the Court means by “privacy” in the Fourth Amendment context, which has been the subject of much confusion in the literature. A close analysis of the case law reveals that the Court has adopted what can be termed an “epistemic,” rather than a normative, conception of privacy. The clarification of this point provides the foundation for a discussion of two doctrines that significantly limit the scope of the Fourth Amendment’s protections: the public exposure and third party doctrines, under which the Supreme Court has concluded that the Fourth Amendment’s protections do not apply to any information that has been exposed to the public or third parties.The question that motivates this Article is whether the Supreme Court has erred in reaching this conclusion. The dominant view in the privacy scholarship is that the Court has failed to account for the ways in which privacy can exist in degrees. While this critique is correct as far as it goes, this Article demonstrates that it only identifies part of the problem.The even deeper problem, identified in Part II, is that courts—along with most scholars—have incorrectly assumed that there is only one way of protecting a piece of personal information from public access: the one we call “privacy.” In doing so, they have overlooked a distinct and equally important way of doing so: through anonymity. This oversight derives from the fact that anonymity and privacy have been mistakenly conflated.An example helps introduce the key distinction that has gone unrecognized. Imagine, for instance, that a person’s medical file contains a piece of paper with the results from his blood test, but his doctor removes the paper and places it in a blank file. If we subsequently obtained access to this person’s medical file, without the test results, we would describe the situation using the concept of privacy: we would say “the privacy of the person is protected,” or “the associated information is private.” If, on the other hand, we obtained access to the test results, without the medical file, we would describe the situation using the concept of anonymity: we would say “the anonymity of the test results is protected,” or “the associated person is anonymous.”What this example illustrates is two basic points about anonymity and privacy that have been misunderstood. The first is a point about their substantive difference. While both anonymity and privacy prevent others from gaining access to a piece of personal information, they do so in opposite ways: privacy involves hiding the information, whereas anonymity involves hiding what makes it personal. The second point is about their5 Katz v. United States, 389 U.S. 347 (1967).11/11/14] REASONABLE EXPECTATIONS OF ANONYMITY 3 formal relationship. Anonymity and privacy have the same causal origin and thus are flip sides of each other: they describe opposite sides of a single underlying event.This account of the nature of anonymity, when combined with the insight that Katz and its progeny adopt a purely epistemic conception of privacy, has significant legal implications. As identified in the final section of Part II, it reveals strong substantive and formal reasons for reading the Fourth Amendment to protect not only reasonable expectations of privacy, but also “reasonable expectations of anonymity.”It is perhaps worth highlighting here that this is not a normative argument about what our constitutional law should be, but rather a legal argument about the best way to interpret the Fourth Amendment precedents that we have. Thus, I do not question whether Katz and its progeny provide the best interpretation of the text of the Fourth Amendment, but rather make a claim about the best reading of this case law, accepting that it provides a controlling reading of the text. Further, and relatedly, I do not question the premise that the Fourth Amendment does not prohibit the government from collecting personal information that has been knowingly exposed to the public, but rather show that this premise does not support the conclusions reached by courts in many of the public exposure cases—that the logic of the public exposure doctrine imposes limits that have not been recognized. This is not to say, however, that my argument is at odds with those of scholars who argue for more radical revisions of Fourth Amendment jurisprudence on normative grounds.6 Rather, a normative approach might reach the same conclusions on many issues, as will become clear in Part III.The practical payoff of incorporating the concept of “reasonable expectations of anonymity” into Fourth Amendment jurisprudence is the focus of Part III, which identifies two general dimensions in which it yields significant insights. The first dimension is analytic, where thinking in terms of anonymity identifies otherwise-unrecognizable ways in which many new techniques of big data implicate the Fourth Amendment. This is demonstrated by reference to the question of whether two new techniques of data aggregation and analysis can constitute Fourth Amendment searches. One is a form of genetic identification known as “familial searching,” in which a criminal DNA database is used to identify persons who not meet the legal criteria for inclusion, but happen to be related to people who do. The other is the use of tools such as biometric-equipped video cameras, GPS, 6See, e.g., David Alan Sklansky, Too Much Information: How Not to Think About Privacy and the Fourth Amendment, 102 C AL.L.R EV. 1069 (2014) (arguing that the Fourth Amendment should be interpreted to protect not only informational privacy, but also “zones of personal refuge”)..11/11/14]REASONABLE EXPECTATIONS OF ANONYMITY 4and the metadata from cell phone calls to conduct long-term locational tracking of people’s movements in public.Both of these techniques have faced significant criticism in theprivacy scholarship, and there is language in judicial opinions questioning their legitimacy, but neither the literature nor the judicial opinions have offered a strong legal argument for how they can constitute Fourth Amendment searches. The reason for this is that the constitutional problem cannot be sufficiently explained in terms of privacy.What is needed is the concept of reasonable expectations ofanonymity, which not only reveals the Fourth Amendment interests that are violated by these specific techniques, but also provides a meaningful standard that can be used more generally to determine when data aggregation implicates the Fourth Amendment and when it does not. In these ways, the concept helps solve difficult puzzles left open by the concurring opinions of United States v. Jones .7In addition to providing the analytic power necessary to understandthe unconstitutionality of many new techniques of big data, the incorporation of anonymity in Fourth Amendment jurisprudence will help deliver on the unfulfilled promise of the Supreme Court’s teaching that the Fourth Amendment is meant to protect “people, not places.”8 There are two central ways in which it does so, as the final section of Part III demonstrates.The first is by revealing that the structural features of the world thatare capable of protecting Fourth Amendment interests are far more complex and expansive than the Supreme Court has recognized. Although the Court has moved beyond a property-based conception of Fourth Amendment interests, the only structural features of the world that the Court has recognized as protecting these interests are those that protect the “privacy” side of secrecy: homes, car trunks, envelopes, and other containers all hide facts about a person whose identity might be known. Yet the structures that are capable of maintaining the secrecy of “personal information” are not limited to those that hide the piece of information . Rather, as this Article makes clear, they can also include structures that hide what makes that information personal —i.e., that make it anonymous. For example, the size7In United States v. Jones , Justice Alito explained in concurrence—joined by Justices Ginsburg, Breyer, and Kagan—that he would have held that the 28-day-long GPS tracking of the defendant’s car violated his reasonable expectations of privacy. See United States v. Jones, 132 S.Ct. 945 (2012) (Alito, J., concurring). Justice Sotomayor expressed sympathy with this view in her concurrence, but she ultimately joined the Court’s narrower holding that placing the GPS on the car violated the Fourth Amendment on the grounds that it involved trespass onto the defendant’s private property. Jones , 132 S.Ct. 945 (Sotomayor, J., concurring). However, neither concurrence articulated a rule or standard that could be applied in other cases, nor did they explain why public surveillance information is not—as most courts and scholars have thought—categorically exempted from Fourth Amendment protection by the public exposure doctrine. 8 Katz v. United States, 389 U.S. 347, 351 (1967).11/11/14]REASONABLE EXPECTATIONS OF ANONYMITY 5of a city, the layout of its streets, and the presence of crowds can all contribute to making someone’s public actions anonymous. By uncovering the legal significance of these structures, attention to anonymity opens up new types of public spaces to the Fourth Amendment’s protections.The second and related way in which attention to anonymity canhelp deliver on the promise of the Fourth Amendment is by expanding the sources of law and norms that can provide the basis for its protections. While property law is often cited as the quintessential enabling source of law for reasonable expectations of privacy, reasonable expectations of anonymity may be created by sources of law ranging from whistle-blowing statutes and agency law to copyright and the First Amendment, all of which protect anonymity.9 In the First Amendment context, for example, the Supreme Court has held that “an author’s decision to remain anonymous . . . is an aspect of freedom of speech.”10 Thus, an anonymity-based understanding of Fourth Amendment claims could ground them in new legal and normative foundations, including other constitutionally protected liberties.Further, these two lessons—along with the other insights of thisArticle—are not only applicable to the Fourth Amendment. Rather, as is suggested in the Conclusion, they are relevant to the many other sources of law that provide legal protection to reasonable expectations of privacy. Across all of these domains, attention to the distinct concept of anonymity can reveal important and viable interests in the secrecy of personal information that have gone unrecognized, clarify new ways in which these interests are being threatened, and provide insights into how they can be better protected by our courts and our law.I. R EASONABLE E XPECTATIONS OF P RIVACYA. The Fourth AmendmentThe Fourth Amendment provides people with the right to be “securein their persons, houses, papers, and effects, against unreasonable searches and seizures.”11 Thus, the threshold question in Fourth Amendment jurisprudence is whether a particular government action constitutes a search9See Jeffrey M. Skopek, Anonymity, the Production of Goods, and Institutional Design , 82 F ORDHAM L. R EV . 1751, 1759–62 (2014). 10 McIntyre v. Ohio Elections Comm’n, 514 U.S. 334, 342 (1995). This is just one of many Supreme Court cases to recognize the right. See Chesa Boudin, Publius and the Petition: Doe v. Reed and the History of Anonymous Speech , 120 Y ALE L.J. 2140, 2164–2168 (2011) (discussing the many other Supreme Court cases that have recognized an anonymity right in the First Amendment). 11 U.S. C ONST . AMEND . IV.11/11/14]REASONABLE EXPECTATIONS OF ANONYMITY 6or seizure. If it does, the action must be “reasonable,” which means that it must be based on probable cause and carried out pursuant to a warrant (unless it falls within a judicially defined exception to one of both of these requirements). This Article is concerned with the preliminary question of whether government conduct constitutes a constitutional “search,” which the Supreme Court has defined with two tests.The first test—which was in place from the Founding until 1967,when it was seemingly rejected by the Court, but which the Court has just reaffirmed—is based in property law.12 Under this test, a search consists of a physical trespass onto constitutionally protected areas (i.e., “persons, houses, papers, and effects”) with the intent to collect information.13 A paradigmatic example of this approach is the wiretapping case of Olmstead v. United States ,14 in which the police inserted small wires into the telephone lines outside the defendants’ residences and main office, thereby intercepting conversations that uncovered an illegal conspiracy. Because the insertion of the wires did not require any physical trespass onto the defendants’ property, the Court determined that no Fourth Amendment search had occurred.The second test comes from the Court’s attempt—in the 1967 caseof United States v. Katz 15—to address the limits of the property-based approach in an era of surveillance technologies that no longer required physical trespass.16 Returning to the question of the constitutionality of warrantless wiretapping, the Court held that FBI agents had violated the Fourth Amendment when they attached an electronic recording device to the top of two public telephone booths being used by Katz. In rejecting the property-based approach of Olmstead , the Court explained—in a now canonical line—that the Fourth Amendment “protects people, not places.”17 In addition, in a concurring opinion that created what is now known as the “Katz test,” Justice Harlan explained that a Fourth Amendment “search” occurs when the government intrudes upon “reasonable expectations of privacy.”18 This test consists of both a subjective and an objective prong and asks whether an individual exhibited an actual expectation of privacy, and if so, whether that expectation was one society recognizes as reasonable.12See Jones , 132 S.Ct. 945.13 Id. at n.5. 14 Olmstead v. United States, 277 U. S. 438 (1928). 15 Katz v. United States, 389 U.S. 347 (1967). 16 These technologies were beginning to lead to technical and arbitrary distinctions. For example, in Goldman v. United States , the Court held that no Fourth Amendment search had occurred when a listening device was placed against a wall to monitor conversations in the adjacent office. 316 U.S. 129, 135 (1942). But in Silverman v. United States , the Court found that a Fourth Amendment search had taken place when a “spike mike” penetrated through the defendants’ wall. 365 U.S. 505, 509-10 (1961). 17 Katz , 398 U.S. at 351. 18 Id . (Harlan, J., concurring).11/11/14] REASONABLE EXPECTATIONS OF ANONYMITY 7The case of Katz was a watershed moment in Fourth Amendmentlaw. Under its privacy-based approach, the Fourth Amendment’s protections—which were once limited to an individual’s private property—were extended to the interior of cars, luggage, public restrooms, hospital rooms, changing rooms, hotel rooms, and workplaces.19 The meaning of its reference to “privacy,” however, has been the subject of much confusion.20B. Privacy in the Fourth AmendmentIn order to understand the concept of privacy embedded in the Katz test, one must appreciate the difference between descriptive and normative conceptions of privacy—a topic that has received insufficient attention in the literature. It is therefore worth taking a moment to clarify some of the core the distinctions between and within these categories before turning to an analysis of the conception of privacy that is adopted in Fourth Amendment jurisprudence.1. Normative vs. descriptive conceptions of privacyNormative conceptions of privacy, which have dominated the privacy scholarship, define privacy in terms that incorporate into its meaning the idea that privacy is good thing that deserves moral and legal protection. There are two general forms that this approach has taken.The first defines privacy in terms of the values, or human goods, that privacy fosters or protects. On this type of definition, saying that information about an activity or object is “private” means that it is involved in maintaining or fostering these goods or values. For example, the statement “my inner thoughts are private” might mean something like “my inner thoughts are integral to my autonomy.” This is perhaps the most common approach to defining privacy and can be found in a wide range of scholarship. Some scholars have focused on values that are individually-centered, such as dignity,21 individuality,22 and autonomy;23 others have 19See Allyson Haynes, Virtual Blinds: Finding Online Privacy in Offline Precedents, V AND.J.E NT.&T ECH.L., 621–22 nn. 120–125 (2012) (citing cases).20 The test has been criticized as vague, circular, and ungrounded in the text of the Fourth Amendment. See, e.g., W AYNE R.L A F AVE,S EARCH AND S EIZURE §2.1(d), at 393-95 (3d ed. 1996); Anthony G. Amsterdam, Perspectives on the Fourth Amendment, 58 M INN.L. R EV.349, 358 (1974); Tracey Maclin, What Can Fourth Amendment Doctrine Learn from Vagueness Doctrine?, 3 U.P A.J.C ONST.L. 398, 428-29 (2001); Richard A. Posner, The Uncertain Protection of Privacy by the Supreme Court, 1979 S UP.C T.R EV. 173, 188.21See, e.g., Edward Bloustein, Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser, 39 N.Y.U.L. REV. 962, 971 (1964) (privacy protects an “individual’s independence, dignity and integrity”).22See, e.g.,Jed Rubenfeld, The Right of Privacy, H ARV.L.R EV. 737, 751 (1989) (privacy is “the fundamental freedom not to have one’s life too totally determined by a11/11/14]REASONABLE EXPECTATIONS OF ANONYMITY 8focused on values that are inter-personal, such as friendship,24 intimacy,25 and love;26 and yet others have focused on combinations of these.27 But the key point is that they all take privacy claims to be claims about the protection of certain human goods or values.The second way in which privacy is defined as a normative concept is as a prescriptive feature of certain types of information. On this approach, saying that information about an activity or object is “private” means that is a type of information that others should not try to discover. For example, as Stanley Benn argues, “private matters” are not those that are actually “kept out of sight or from the knowledge of others,” but rather those “that it would be inappropriate for others to try to find out about . . . without one’s consent.”28 Two features of this general approach are worth highlighting. One is that only certain types of information can be properly classified as “private.” For example, Tom Gerety argues that information only implicates privacy concerns if it is related to intimacy, identity, or autonomy.29 Likewise, Richard Parker argues that a loss of secrecy does not always involve a loss of privacy, citing the example of an examination that reveals a student did not study.30 Another important feature is that information can be private even if it is known to others.31 For example, Dan Solove argues that there are activities that “we deem as private” that do not progressively more normalizing state”); Jeffrey H. Reiman, Privacy, Intimacy, and Personhood , 6 P HILOSOPHY & P UBLIC A FFAIRS 26, 43–44 (1976) (“The right to privacy . . . protects the individual’s interest in becoming, being, and remaining a person.”). 23 See, e.g., Ruth Gavison, Privacy and the Limits of Law , 89 Y ALE L.J. 421, 423 (1980) (privacy is valuable in furthering liberty, autonomy, and freedom). 24 See, e.g., James Rachels, Why Privacy Is Important , 4 P HILOSOPHY & P UBLIC A FFAIRS 323, 292 (1975) (“there is a close connection between our ability to control who has access to us and to information about us, and our ability to create and maintain different sorts of social relationships with different people”). 25 See, e.g., Robert S. Gerstein, Intimacy and Privacy , 89 E THICS 76 (1978) (“intimate relationships simply could not exist if we did not continue to insist on privacy for them”); J EFFREY R OSEN , T HE U NWANTED G AZE : T HE D ESTRUCTION OF P RIVACY IN A MERICA 8 (2011). 26 See, e.g., Charles Fried, Privacy , 77 Y ALE L.J. 475, 482 (1968) (defining privacy as “control over knowledge about oneself” that is necessary to protect “fundamental relations” of “respect, love, friendship and trust”). 27 See, e.g., Ronald J. Krotoszynski, The Polysemy of Privacy , 88 I ND . L. J. 881 (2013) 28 Stanley I. Benn, Privacy, Freedom, and Respect for Persons , in P RIVACY AND P ERSONALITY 1-25, at 2 (J. Roland Pennock & John W. Chapman, eds. 1971). 29 Tom Gerety, Redefining Privacy , 12 H ARV . CR-CLL R EV . 233, 281–95 (1977). 30 Richard B. Parker, A Definition of Privacy , 27 R UTGERS L. R EV . 275, 282 (1973). Solove makes a similar point, arguing that “there is a significant amount of information identifiable to us that we do not deem as private.” Daniel J. Solove, Conceptualizing Privacy , 90 C AL . L. R EV . 187, 1111–12 (2002). He suggests, for example, that the fact that a person is a well-known politician is identifiable to that person, but that this fact does not implicate privacy. Id. 31 For a discussion of scholars advancing this general view, see Solove, Conceptualizing Privacy , supra note 30, at 1109.。

相关文档
最新文档