GROUP TWO: Difference between revisions

From Identifying Difficult Problems in Cyberlaw
Jump to navigation Jump to search
No edit summary
mNo edit summary
Line 4: Line 4:


*"75% of US recruiters and human-resource professionals report that their companies require them to do online research about candidates, and many use a range of sites when scrutinizing applicants", recent Microsoft study (via [http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html])
*"75% of US recruiters and human-resource professionals report that their companies require them to do online research about candidates, and many use a range of sites when scrutinizing applicants", recent Microsoft study (via [http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html])
:*With quickly improving facial-recognition technology, there will be a stark challenge to "our expectation of anonymity in public" (via [http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html])
*With quickly improving facial-recognition technology, there will be a stark challenge to "our expectation of anonymity in public" (via [http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html])


'''Scope'''
'''Scope'''

Revision as of 11:54, 19 November 2010

Reputation Bankruptcy

Motivation To Discuss Reputation Bankruptcy

  • "75% of US recruiters and human-resource professionals report that their companies require them to do online research about candidates, and many use a range of sites when scrutinizing applicants", recent Microsoft study (via [1])
  • With quickly improving facial-recognition technology, there will be a stark challenge to "our expectation of anonymity in public" (via [2])

Scope

  • Identity-related content:
  • Pictures, Videos
  • all pieces of content that would reveal the identity of a person [i.e. we believe a general discussion of Star Wars Kid [3] is not necessarily bad; however pieces of content linking Star Wars Kid's real name to the footage are potentially harmful for the person and moreover add very little value]
  • Minors:
  • Content uploaded by minors about themselves or other minors
  • excludes: 25 year-old uploads pictures of when 16 (exception for content of you as a minor poster by another)
  • Reference point: provision to wipe juvenile criminal record (e.g. expungement) [4]

Involved Parties

  • Individual Identified or Depicted
  • Content Creator (Person who creates content i.e. takes a picture)
  • Content Sharer (Person who uploads content to Content Storage/Distribution Platform)
  • Content Storage/Distribution Platforms (Personal Blog vs Facebook)
  • Search Engines
  • Note: some of these parties could be the same person in a given scenario

The Recent Scholarship and Proposed Solutions

  • Law-Based:
  • Anupam Chander: Strengthened tort for public disclosure of private fact
  • Paul Ohm: Law barring employers from firing based on legal off-duty conduct found in social networking profiles
  • Dan Solove: Give legal right to sue Facebook friends where confidence has been breached
  • Peter Taylor: Constitutional right to privacy/“oblivion” allowing more anonymity online
  • Cass Sunstein: DMCA Notice-and-Takedown Model
  • Germany considers law to ban employers from mining information on job candidates from social networking sites such as Facebook to protect people's privacy. [5]
  • Code-Based:
  • Jonathan Zittrain: Rating systems that allow you to declare reputation bankruptcy in certain area
  • Victor Mayer-Schonberger: Digital Forgetting/Expiration dates (in “Delete” [6]); "Vanish" [7] - new technology developed by researchers at University of Washington, for electronic messages to "self-destruct" after certain period
  • Market- and Norm- Based:
  • Private companies to defend reputation, e.g. Reputation Defender
  • Educate the public, especially young people
  • Society norms to adapt to new media: "Please don't tweet this" (via [8])
  • Tim Berners-Lee: establish market norm of employers barred from accessing Facebook data of prospective employees

Concerns

  • Entanglement: who "owns" what information about a person and thus what can be managed / deleted, i.e. reposts of images, comments, wall posts
  • How far to go on the identity "continuum“
  • Authentication > pseudonymity > anonymity (Ardia)
  • Total deletion or selective management?
  • Reputations would be meaningless if they could be subject to a legal right to manipulate (Chander)

Sources

  • “The End of Forgetting” NY Times 7/25/10, Jeffrey Rosen (law professor at George Washington University) [9]
  • Web takes away "second chances": "the worst thing you've done is often the first thing everyone knows about you"
  • ReputationDefender a "promising short-term solution", but not enough given fast advances of "facial-recognition technology"
  • "Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People From Speaking About You", Eugene Volokh [10]

<work in progress>