GROUP TWO

From Identifying Difficult Problems in Cyberlaw
Revision as of 11:25, 11 December 2010 by Rene (talk | contribs)
Jump to navigation Jump to search

Introduction

Importance of Online Identity and Reputation

  • "75% of US recruiters and human-resource professionals report that their companies require them to do online research about candidates, and many use a range of sites when scrutinizing applicants", recent Microsoft study [1]
  • With quickly improving facial-recognition technology, there will be a stark challenge to "our expectation of anonymity in public" [2]
  • Viral dynamics of the internet may amplify reputation damage (e.g. search engine rankings)
  • COPPA protection ends at age 13 and has proven ineffective:
  • 37% of children aged 10-12 have Facebook accounts and 4.4 million Facebook users under age 13 in the US despite Facebook policy in compliance with COPPA (see video [3])
  • "If there are no private pictures of you online, anything made up will seem made up. Treasure your privacy. The future money making on the web will not be social networking but information search and destroy." ("As Bullies Go Digital, Parents Play Catch-Up", New York Times [4])

The Recent Scholarship and Other Proposed Solutions

Law-Based

  • Extending Public Disclosure of Private Fact Tort
    • "Disclosure" tort - bars dissemination of "non-newsworthy" personal information that most people would find highly private (some state laws are more specific, e.g. "criminal laws forbidding the publication of the names of rape victims" (for discussion against see [5])
    • Strengthened tort for public disclosure of private fact (Anupam Chander) (forthcoming in "The Offensive Internet" 2011 [6])
  • Law Restricting Employers
    • Law barring employers from firing or hiring based on legal off-duty conduct found in social networking profiles (Paul Ohm) [7]
    • Germany considers law to ban employers from mining information on job candidates from social networking sites such as Facebook to protect people's privacy. [8]
  • Existing Children Online Protection Laws
    • Children's Online Privacy Protection Act (COPPA) [9]
      • Scope: "If you operate a commercial Web site or an online service directed to children under 13 that collects personal information from children or if you operate a general audience Web site and have actual knowledge that you are collecting personal information from children, you must comply with the Children's Online Privacy Protection Act." -- too narrow
    • Cf. Children's Online Protection Act (COPA) [10]
      • Restricting minor's access to potentially harmful material on the internet
  • Dan Solove: Give legal right to sue Facebook friends where confidence has been breached
  • Peter Taylor: Constitutional right to privacy/“oblivion” allowing more anonymity online
  • Cass Sunstein: DMCA Notice-and-Takedown Model

Code-Based

  • Jonathan Zittrain: Rating systems that allow you to declare reputation bankruptcy in certain area [11]
  • Victor Mayer-Schonberger: Digital Forgetting/Expiration dates (in “Delete” [12]; "Vanish" [13] - new technology developed by researchers at University of Washington, for electronic messages to "self-destruct" after certain period)

Market- and Norm- Based

  • Private companies to defend reputation, e.g. Reputation Defender
  • Educate the public, especially young people
  • Society norms to adapt to new media: "Please don't tweet this" (via [14])
  • Tim Berners-Lee: establish market norm of employers barred from accessing Facebook data of prospective employees

Proposed Solution

  • Creation of a personal legal right to control content depicting or identifying oneself as a minor, supported by norms and code
  • Minor's Online Identity Protection Act (MOIPA)
  • Scope: all content depicting and identifying minors (under the age of 18)
  • Form: Notice-and-takedown system (Proof of Scope: digital watermark as prima facie evidence; absent watermark/metadata one could prove minor status with government-issued ID/notary based on date of photo and/or content upload)
  • Requires affirmative action on the part of the individual. Nothing would be removed or deleted automatically (cf. Juvenile record sealing and expungement)
  • Standardized simple notice form could be available to fill out and send online
  • Best-practices norm/code for Content Intermediaries to watermark content depicting minors:
  • Photos/Videos: meta data (Compare: [15])
  • Text: RDFa tags for identity information (See: [16])
  • Could either automatically tag to accounts identified as belonging to minors or require affirmative check box (or both) if content depicts or identifies minors (similar to “I have accepted the terms of service” or “I have the right to post this content” boxes)
  • Possible objective limitation similar to that seen in many torts, including the public disclosure of private fact tort, which provides a cause of action where the disclosure would be “highly offensive to a reasonable person."
  • Consider simple or stream-lined ways to implement such a standard to avoid prolonged legal battles. One potential option would be crowd-sourcing to a number others (possibly a "jury" of 12) for their opinion on whether the content is objectively embarrassing or unfavorable. Or, possibly a determination simply of whether it is "reasonable" for the individual to request that the identifying or depicting content be taken down. A simple majority finding that the content is embarrassing or unfavorable could suffice. Such participants would not be able to download the content and would be subject to an agreement not to share or disclose the content themselves.

Scope

  • Identity-related content: Pictures, Videos, Text
  • All pieces of content that depict or identify minors (i.e. a general discussion of Star Wars Kid [17] is not necessarily bad; however pieces of content linking Star Wars Kid's real name to the footage are potentially harmful for the person and moreover add very little value. While this content should not be removed or deleted automatically, the person should have the right to have the identifying information removed)
  • Reference point: provision to wipe juvenile criminal record (e.g. expungement) [18]
  • Minors present a particularly compelling case. The age of 18 is a cutoff already recognized by the government and drawn in numerous instances
  • Question: What about the following scenario: 25 year-old uploads pictures of when 16 (exception for content of you as a minor poster by another)
  • Question: What about minors who are of "legitimate public interest" i.e. celebrities, performers/actors, (what about: children of famous public figures)

Involved Parties

  • Individual Identified or Depicted
  • Content Creator (Person who creates content i.e. takes a picture)
  • Content Sharer (Person who uploads content to Content Storage/Distribution Platform)
  • Content Intermediaries (Personal Blog vs Facebook)
  • Search Engines
  • Note: some of these parties could be the same person in a given scenario


Is a Legal Measure Necessary?

It is possible that the burgeoning problems of online identity and reputation will dissipate on their own in a natural fashion. Thus, it might not ultimately be necessary to respond with a law or other significant change, so we do not recommend the immediate adoption of our proposal. Instead, it may be worthwhile to observe the trends in hopes that less drastic yet effective solutions appear.

For example, some believe that society will adapt to the ramifications of the internet and either adjust its (online) behavior accordingly, or such transgressions will become so commonplace that any negative impact will be lost. Much of the information available now, however, suggests that will not be the case. The internet has been a household staple for many for well over a decade, but no change in behavior has occurred. If anything, young and older users alike have grown more comfortable with the internet and therefore more willing than ever to share their private information, personal photos, and more on the internet. Our sensibilities to transgressions, however, do not appear to have similarly evolved. Employers continue to conduct internet and social network site research on prospective (and current) employees, and then make hiring and firing decisions based on that information. The public has not grown to accept these circumstances as normal over time: embarrassing situations continue to be embarrassing and can carry severe consequences, seemingly no matter how universal they are or how many times similar conduct occurs (see, e.g. Chander’s discussion on whether “society will become inured to the problem”). Ideally, society would evolve and adapt to the changes naturally, but so far in this area there has been no significant change. Moreover, children and adolescents are probably the least likely to pick up on these social cues and to understand the full ramifications of their online behavior. Our primarily legal-based solution is thus a possible avenue for government to protect the online identity and reputation of minors absent any other meaningful changes.

Before adopting such a law, which carries some significant ramifications of its own, some time should be taken to see if other solutions will appear. But at the current time such solutions seem unlikely. For example, at present there is no real pressure on content-hosting platforms or search engines to adopt any code-based or norm-based solutions, and there is no reason to suspect that they will spend time, money, and other resources to voluntarily adopt any protective measures that are not required. To the extent that companies such as Reputation Defender exist to solve these problems, they are problematic in that they are (i) limited to only those who can afford them, and (ii) cannot offer full protection because they lack any real power or authority over the sources. Thus, absent any unexpected and meaningful changes, the MOIPA proposal is an effort to adequately protect the most vulnerable segment of the population.

Implications and Potential Concerns

  • Entanglement: who "owns" what information about a person and thus what can be managed / deleted, i.e. reposts of images, comments, wall posts
  • How far to go on the identity "continuum“
  • Authentication > pseudonymity > anonymity (Ardia)
  • Total deletion or selective management?
  • Reputations would be meaningless if they could be subject to a legal right to manipulate (Chander)
  • First Amendment Concerns
  • Could include exception for minors who are of "legitimate public interest" i.e. celebrities, performers/actors, (what about: children of famous public figures)
  • On the other hand, protection of minors is a category for which the Supreme Court has recognized a legitimate (and even compelling) state interest (see, e.g., NY v. Ferber; US v. American Library Association; FCC v. Pacifica Foundation)
  • Also, only the identifying or depicting information or content would be removed (so, for example, need only redact the minor's name from a discussion; blur, crop or cut minor from photo or video). Other content not related specifically to the minor's identity would remain untouched by MOIPA
  • Distribution of liability: who is responsible for what? Does an intermediary like Facebook have the same degree of liability as its third-party partners who create apps and make use of Facebook data?
  • Technical limitations
  • Easy to remove metadata?
  • Abuse/overuse of the digital watermark/metadata
  • International standards?
  • Notice-and-takedown system: how would this work? How to scale?
  • Notice-and-takedown system should not require payment -- the right to control should be available to all
  • Both code-based solutions are solutions ex post. How about preventing or making it more difficult to happen in the first place? Perhaps we could require settings to be invisible-by-default for minor users?
  • Advantage for Content Intermediaries:
  • Public goodwill (parents might feel more comfortable with children using the site)
  • Gain additional insights from enhanced user/content meta data
  • Potential new market for content management systems: i.e. search, track, and delete material across the Internet
  • Disadvantage for Content Intermediaries:
  • Penalties for violating MOIPA?
  • Could databases and archives include references to deleted data? i.e. write "removed"?
  • What if aggregators include copies of photos that lack metadata?
  • Differentiate liability of main intermediaries and third-party app makers?
  • What about content posted by adults from when the adult was a minor?
  • How might this change behavior of minors?
  • New market for material about minors?
  • How might this segregate the Net between minors and adults?

Relevant Sources

  • “The End of Forgetting” NY Times 7/25/10, Jeffrey Rosen (law professor at George Washington University) [19]
  • Web takes away "second chances": "the worst thing you've done is often the first thing everyone knows about you"
  • ReputationDefender a "promising short-term solution", but not enough given fast advances of "facial-recognition technology"
  • "Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People From Speaking About You", Eugene Volokh [20]
  • Scope: restrictions on communication
  • "recognition of one free speech exception certainly does not mean the end of free speech generally"
  • "possible unintended consequences of various justifications for information privacy speech restrictions [...] sufficiently troubling"
  • "disclosure" tort - bars dissemination of "nonnewsworthy" personal information that most people would find highly private (some state laws more specific, e.g. "criminal laws forbidding the publication of the names of rape victims"
  • (II)D. Contracts with Children: the "discussion of contracts presupposes that both parties are legally capable of entering into the contract and of accepting a disclaimer of any implied warranty of confidentiality. If a cyber-consumer is a child, then such an acceptance might not be valid" (Source: Children's Online Privacy Protection Act of 1998 [21], 15 U.S.C. §§ 6501 et seq.; Matlick, note 245 infra; Singleton, infra note 251, text accompanying nn.76-79.)
  • "Youthful Indiscretion in an Internet Age," Anupam Chander
  • Supports a strengthening of the public disclosure tort
  • Recognizes two principal legal hurdles:
  • (1) the youth’s indiscretion may itself be of legitimate interest to the public (newsworthy)
  • (2) intermediaries can escape demands to withdraw info posted by others because of special statutory immunity
  • Society will not become accustomed to the problem; fascination has continued, and embarrassing behavior has not been accepted as normal over time. Embarrassment or humiliation does not turn on whether some activity is out of the ordinary or freakish (for example, bodily functions are often considered embarrassing)
  • "Reputation Bankruptcy" Blog Post, 9/7/2010, on The Future of the Internet and How to Stop it, Jonathan Zittrain [22]
  • Eric Schmidt (the CEO of Google ) made a statement to the effect that in the future "every young person... will be entitled automatically to change his or her name on reaching adulthood in order to disown youthful hijinks stored on the friends' social media sites" (even though he has later asserted this was only a "joke").
  • Suggests that intermediaries who demand an individual's identity on the internet "ought to consider making available a form of reputation bankruptcy. Like personal financial bankruptcy, or the way in which a state often seals a juvenile criminal record and gives a child a 'fresh start' as an adult, we ought to consider how to implement the idea of a second or third chance into our digital spaces."
  • "Reputation in a Networked World," by David S. Ardia
  • Argues that the focus should be on ensuring the reliability of reputational information rather than on imposing liability
  • Advocates community governance: deploy communities’ assistance in resolving disputes (enforcing its norms and ensuring the reliability of reputational information)
  • "Reputation is disaggregated; information is disaggregated; and liability is disaggregated”