SlideShare a Scribd company logo
1 of 20
Privacy in Media Life
Discussion Primer
Ryland Sherman
Hunter Moore: “The Most Hated Man onThe Internet”
One story that represents the best and the worst of ‘Privacy’:
Revenge porn
Some background:
• Sexting
• Fun private use
of recording tech
“The Most Hated Man onThe Internet”
Hunter Moore and IsAnyoneUp
• His attitude and basic actions
• Cultivated fandom through other social media likeTwitter
andTumblr.
• The money he’s made and the lives he’s ruined
• Why he wasn’t stopped sooner
• How he has gradually been shut down
“Privacy is something which has emerged out of the urban
boom coming from the industrial revolution. […]
Privacy may actually be an anomaly.”
- Dr. Cerf, Google’s Chief Internet Evangelist and a lead engineer
on the Army’s early 1970′s Internet prototype, ARPANET.
The Concept of Privacy
•Throughout history, privacy has largely been determined
by community norms.
•However, media technologies have constantly required
that we reexamine our community and legal standards.
From a legal perspective,
there are two general legal areas.
•Privacy rights between individuals and the government.
•Privacy rights between individuals.
• But . . . .
Privacy Rights between the Gov’t and you. (USA)
Largely Constitutional protections from illegal invasions.
• 4Th Amendment - (Privacy of the Person and Possessions)
• The right of the people to be secure in their persons, houses,
papers, and effects, against unreasonable searches and seizures,
shall not be violated, and noWarrants shall issue, but upon
probable cause, […] describing the place to be searched, and the
persons or things to be seized.
Yeah, so what does that mean?
It’s always been a challenge.  cars, phones, computers, and
now, portable devices and the web.
14th Amendment – (Substantive due process)
• No State shall make or enforce any law which shall abridge the
privileges or immunities of citizens of the United States; nor shall
any State deprive any person of life, liberty, or property, without due
process of law; nor deny to any person within its jurisdiction the
equal protection of the laws.
• Roe v. Wade (1973)  a right to privacy and liberty extended to
women’s health concerns like abortion decisions, balanced against
the States’ concerns for the fetus.
• Laurence v.Texas (2003)  a right to sexual privacy and liberty in
the home, overturning states’ sodomy laws that were used to
discriminate against the LGBT community
Privacy between Individuals:Torts
As time progressed, the different laws of different states began to fit
a pattern, even if they often evolved separately, and legal scholars
began to identify that pattern.
• publicity placing a person in a false light (libel/slander)
• misappropriation of the image of another (right of publicity)
• publicity given to private facts
• intrusion upon the seclusion of another
Consider their interrelationship with co-evolving media technologies.
Back to Privacy between Individuals:Torts
• publicity placing a person in a false light (libel/slander)
• misappropriation of the image of another (right of publicity)
• publicity given to private facts
• intrusion upon the seclusion of another
There is a natural tension between them and
The 1st Amendment:
Congress shall make no law respecting an establishment of religion, or
prohibiting the free exercise thereof; or abridging the freedom of speech, or
of the press; or the right of the people peaceably to assemble […].
• publicity given to private facts
• intrusion upon the seclusion of another
There is also a natural tension between them
and the idea of what a public space really is.
Where do you have
expectations of privacy
in the physical world?
the idea of what a public space really is
• publicity given to private facts
• intrusion upon the seclusion of another
Where do you have expectations of privacy in the media world?
• Have you ever ‘Google’d yourself?
• When do you ‘Google’ others?
• Should a single news-worthy act be a permanent visible tattoo
on your digital identity?
If we’re so dependent upon businesses,
they’ll take care of our needs, right?
The "Google policy is to get right up to the creepy line
and not cross it."
- Google Chairman Eric Schmidt 10-1-10 in The Atlantic
If we’re so dependent upon businesses,
they’ll take care of our needs, right?
"It's a future where you don't forget
anything…
In this new future you're never lost...
We will know your position down to the foot and down to the
inch over time."
- Google Chairman Eric Schmidt atTechCrunch, 9-28-10
On getting caught on Google StreetView:
"With StreetView, we drive by exactly once,
so you can just move.“
- Eric Schmidt
2010http://www.cnn.com/video/data/2.0/video/us/2010/10/2
5/ps.google.schmidt.ceo.cnn.html
“No harm, no foul.”
- Eric Schmidt told theTimes of London in May 2010
In response to Google's
unauthorized collection
of Wi-Fi signals from
tens of millions of homes
in 33 countries over 3 years.
"Show us 14 photos of yourself and
we can identify who you are"
- Eric Schmidt told the 2010Techonomy conference.
"If you have something that you don't want anyone to know,
maybe you shouldn't be doing it in the first place."
- Eric Schmidt told CNBC's Maria Bartiromo 12-7-09
Privacy in Special Industries
• Healthcare
• For ex., HIPAA (Health Insurance Portability & Accountability Act)
• Banks, Accounting, Finance, and Debt Collection
• Education
Various other services . . .
So much of the Privacy challenge lies in all of us
Is it getting better or worse?
We’ve already talked a great deal about the role smartphones
have played in many different instances.
• Russian car cameras . . .
• What is a “Glasshole?”
Wait, ARE we living inTheTruman Show?
Remember the Panopticon concept?

More Related Content

What's hot

Failure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human RightsFailure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human RightsMathias Klang
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?Mathias Klang
 
Claws to the Weak: internet and rights
Claws to the Weak: internet and rightsClaws to the Weak: internet and rights
Claws to the Weak: internet and rightsMathias Klang
 
How to make people happy with tech
How to make people happy with techHow to make people happy with tech
How to make people happy with techNoah Bloom
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
Media Ethics: Privacy
Media Ethics: PrivacyMedia Ethics: Privacy
Media Ethics: PrivacyRachel Khan
 
Corso pisa-7 dh-2017
Corso pisa-7 dh-2017Corso pisa-7 dh-2017
Corso pisa-7 dh-2017Luca De Biase
 
Information politics
Information politicsInformation politics
Information politicsMathias Klang
 
Corso pisa-6 dh-2017
Corso pisa-6 dh-2017Corso pisa-6 dh-2017
Corso pisa-6 dh-2017Luca De Biase
 
Will technology set us free
Will technology set us freeWill technology set us free
Will technology set us freeMathias Klang
 
Lec2 netiquette legal issues and security
Lec2   netiquette legal issues and securityLec2   netiquette legal issues and security
Lec2 netiquette legal issues and securityMelchor Castro
 
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to ComeMercatus Center
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and lawsjcmonnett
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Matthew Asbell
 

What's hot (20)

Failure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human RightsFailure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human Rights
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?
 
Claws to the Weak: internet and rights
Claws to the Weak: internet and rightsClaws to the Weak: internet and rights
Claws to the Weak: internet and rights
 
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
 
How to make people happy with tech
How to make people happy with techHow to make people happy with tech
How to make people happy with tech
 
Social media law
Social media law Social media law
Social media law
 
3-D Printing Firearms
3-D Printing Firearms3-D Printing Firearms
3-D Printing Firearms
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Media Ethics: Privacy
Media Ethics: PrivacyMedia Ethics: Privacy
Media Ethics: Privacy
 
copyright Infringement
copyright Infringementcopyright Infringement
copyright Infringement
 
Vonnegut's Narrator
Vonnegut's NarratorVonnegut's Narrator
Vonnegut's Narrator
 
Corso pisa-7 dh-2017
Corso pisa-7 dh-2017Corso pisa-7 dh-2017
Corso pisa-7 dh-2017
 
Ethics & Etiquette Online
Ethics & Etiquette OnlineEthics & Etiquette Online
Ethics & Etiquette Online
 
Information politics
Information politicsInformation politics
Information politics
 
Corso pisa-6 dh-2017
Corso pisa-6 dh-2017Corso pisa-6 dh-2017
Corso pisa-6 dh-2017
 
Will technology set us free
Will technology set us freeWill technology set us free
Will technology set us free
 
Lec2 netiquette legal issues and security
Lec2   netiquette legal issues and securityLec2   netiquette legal issues and security
Lec2 netiquette legal issues and security
 
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and laws
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10
 

Similar to Privacy guest lecture 3.31.15 T316

We Media 10 surveillance 1
We Media 10 surveillance 1We Media 10 surveillance 1
We Media 10 surveillance 1chrisianwelch
 
The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy Laurent Liscia
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technologyorrenprunckun
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)Felipe Prado
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010DCL2701A
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationHinne Hettema
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issueThe PRactice
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismUniversity of Sydney
 
661 lead discussion
661   lead discussion661   lead discussion
661 lead discussionguest62b6b81
 

Similar to Privacy guest lecture 3.31.15 T316 (13)

We Media 10 surveillance 1
We Media 10 surveillance 1We Media 10 surveillance 1
We Media 10 surveillance 1
 
The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technology
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issue
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Vgl13 t2
Vgl13 t2Vgl13 t2
Vgl13 t2
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
661 lead discussion
661   lead discussion661   lead discussion
661 lead discussion
 

Recently uploaded

Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxmarielouisetulaytay
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 

Recently uploaded (20)

Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 

Privacy guest lecture 3.31.15 T316

  • 1. Privacy in Media Life Discussion Primer Ryland Sherman
  • 2. Hunter Moore: “The Most Hated Man onThe Internet” One story that represents the best and the worst of ‘Privacy’: Revenge porn Some background: • Sexting • Fun private use of recording tech
  • 3. “The Most Hated Man onThe Internet” Hunter Moore and IsAnyoneUp • His attitude and basic actions • Cultivated fandom through other social media likeTwitter andTumblr. • The money he’s made and the lives he’s ruined • Why he wasn’t stopped sooner • How he has gradually been shut down
  • 4. “Privacy is something which has emerged out of the urban boom coming from the industrial revolution. […] Privacy may actually be an anomaly.” - Dr. Cerf, Google’s Chief Internet Evangelist and a lead engineer on the Army’s early 1970′s Internet prototype, ARPANET.
  • 5. The Concept of Privacy •Throughout history, privacy has largely been determined by community norms. •However, media technologies have constantly required that we reexamine our community and legal standards.
  • 6. From a legal perspective, there are two general legal areas. •Privacy rights between individuals and the government. •Privacy rights between individuals. • But . . . .
  • 7. Privacy Rights between the Gov’t and you. (USA) Largely Constitutional protections from illegal invasions. • 4Th Amendment - (Privacy of the Person and Possessions) • The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and noWarrants shall issue, but upon probable cause, […] describing the place to be searched, and the persons or things to be seized. Yeah, so what does that mean? It’s always been a challenge.  cars, phones, computers, and now, portable devices and the web.
  • 8. 14th Amendment – (Substantive due process) • No State shall make or enforce any law which shall abridge the privileges or immunities of citizens of the United States; nor shall any State deprive any person of life, liberty, or property, without due process of law; nor deny to any person within its jurisdiction the equal protection of the laws. • Roe v. Wade (1973)  a right to privacy and liberty extended to women’s health concerns like abortion decisions, balanced against the States’ concerns for the fetus. • Laurence v.Texas (2003)  a right to sexual privacy and liberty in the home, overturning states’ sodomy laws that were used to discriminate against the LGBT community
  • 9. Privacy between Individuals:Torts As time progressed, the different laws of different states began to fit a pattern, even if they often evolved separately, and legal scholars began to identify that pattern. • publicity placing a person in a false light (libel/slander) • misappropriation of the image of another (right of publicity) • publicity given to private facts • intrusion upon the seclusion of another Consider their interrelationship with co-evolving media technologies.
  • 10. Back to Privacy between Individuals:Torts • publicity placing a person in a false light (libel/slander) • misappropriation of the image of another (right of publicity) • publicity given to private facts • intrusion upon the seclusion of another There is a natural tension between them and The 1st Amendment: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble […].
  • 11. • publicity given to private facts • intrusion upon the seclusion of another There is also a natural tension between them and the idea of what a public space really is. Where do you have expectations of privacy in the physical world?
  • 12. the idea of what a public space really is • publicity given to private facts • intrusion upon the seclusion of another Where do you have expectations of privacy in the media world? • Have you ever ‘Google’d yourself? • When do you ‘Google’ others? • Should a single news-worthy act be a permanent visible tattoo on your digital identity?
  • 13. If we’re so dependent upon businesses, they’ll take care of our needs, right? The "Google policy is to get right up to the creepy line and not cross it." - Google Chairman Eric Schmidt 10-1-10 in The Atlantic
  • 14. If we’re so dependent upon businesses, they’ll take care of our needs, right? "It's a future where you don't forget anything… In this new future you're never lost... We will know your position down to the foot and down to the inch over time." - Google Chairman Eric Schmidt atTechCrunch, 9-28-10
  • 15. On getting caught on Google StreetView: "With StreetView, we drive by exactly once, so you can just move.“ - Eric Schmidt 2010http://www.cnn.com/video/data/2.0/video/us/2010/10/2 5/ps.google.schmidt.ceo.cnn.html
  • 16. “No harm, no foul.” - Eric Schmidt told theTimes of London in May 2010 In response to Google's unauthorized collection of Wi-Fi signals from tens of millions of homes in 33 countries over 3 years.
  • 17. "Show us 14 photos of yourself and we can identify who you are" - Eric Schmidt told the 2010Techonomy conference.
  • 18. "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place." - Eric Schmidt told CNBC's Maria Bartiromo 12-7-09
  • 19. Privacy in Special Industries • Healthcare • For ex., HIPAA (Health Insurance Portability & Accountability Act) • Banks, Accounting, Finance, and Debt Collection • Education Various other services . . .
  • 20. So much of the Privacy challenge lies in all of us Is it getting better or worse? We’ve already talked a great deal about the role smartphones have played in many different instances. • Russian car cameras . . . • What is a “Glasshole?” Wait, ARE we living inTheTruman Show? Remember the Panopticon concept?