公共场所的匿名权与隐私权(Jeffrey M. Skopek)
《公职人员的隐私权与公众知情权的冲突与协调》范文
《公职人员的隐私权与公众知情权的冲突与协调》篇一一、引言在信息社会,隐私权与公众知情权日益成为公众关注的焦点。
特别是对于公职人员而言,其隐私权与公众知情权之间的平衡显得尤为重要。
公职人员因其身份的特殊性,不仅享有基本的隐私权保护,还需承担向公众公开其部分信息的责任。
本文旨在探讨公职人员的隐私权与公众知情权之间的冲突及其协调方式。
二、公职人员的隐私权与公众知情权的内涵(一)公职人员的隐私权公职人员的隐私权是指其在工作及个人生活中享有的个人空间、个人信息和个人事务不被他人侵扰的权利。
尽管公职人员因公职身份受到社会监督,但依然应享有与其个人生活有关的私密信息的保护。
(二)公众知情权公众知情权是指公众有权知道与其利益相关的政府工作信息、社会公共事务的知情权利。
在公职人员领域,公众对公职人员的行为、品行、能力等有知情权,以便对其履行公职的能力和诚信度进行评估。
三、公职人员的隐私权与公众知情权的冲突(一)冲突的表现在现实操作中,公职人员的隐私权与公众知情权常常发生冲突。
如公职人员的家庭住址、联系方式等个人信息被公开,可能侵犯其隐私权;而公职人员在执行公务过程中的行为和决策,又需接受公众的监督和审查。
(二)冲突的原因这种冲突的主要原因在于法律规定的模糊性、社会价值观的差异以及权力运行的不透明性等。
此外,媒体报道的片面性、公众情绪的极端化等因素也加剧了这种冲突。
四、协调公职人员的隐私权与公众知情权的策略(一)完善法律法规应完善相关法律法规,明确公职人员隐私权与公众知情权的界限,如哪些信息属于应公开的信息,哪些属于个人隐私范畴等。
同时,加强法律监督和执行力度,确保公职人员的隐私权和公众的知情权都得到合法保护。
(二)提高透明度政府应提高权力运行的透明度,将公职人员的决策和行为置于公众的监督之下。
同时,建立健全信息披露制度,及时向公众公开相关信息。
(三)平衡利益关系在处理公职人员的隐私权与公众知情权的冲突时,应平衡各方利益关系。
《公职人员的隐私权与公众知情权的冲突与协调》范文
《公职人员的隐私权与公众知情权的冲突与协调》篇一一、引言在当代社会,公职人员的隐私权与公众知情权之间的冲突已成为一个备受关注的社会问题。
公职人员作为社会公共事务的管理者和执行者,其职责的特殊性使得他们的行为和决策对公众产生重要影响。
然而,与此同时,公职人员也享有隐私权,其个人生活应受到一定程度的保护。
本文旨在探讨公职人员的隐私权与公众知情权之间的冲突与协调,分析两者之间的平衡点,并提出相应的解决方案。
二、公职人员的隐私权与公众知情权的概念及意义1. 公职人员的隐私权:隐私权是指个人对自己私密信息的控制权,包括个人生活、家庭生活、个人信息等方面的内容。
公职人员的隐私权是指公职人员在履行职责之外的私人生活和信息的保护权利。
2. 公众知情权:公众知情权是指公众有权知晓与其利益相关的公共事务和政府决策的权力。
在民主社会中,公众知情权是保障公民参与、监督政府行为的重要手段。
三、公职人员的隐私权与公众知情权的冲突公职人员的隐私权与公众知情权之间存在天然的冲突。
一方面,公职人员作为社会公共事务的管理者和执行者,其职责的特殊性使得公众对其个人生活和信息的关注度较高;另一方面,过度关注公职人员的隐私可能侵犯其合法权益。
此外,在特殊情况下,如公职人员涉及贪污腐败等违法行为时,公众对知情权的追求与公职人员隐私权的保护也会产生冲突。
四、冲突的协调与平衡1. 法律制度建设:建立健全相关法律法规,明确公职人员隐私权与公众知情权的边界,为平衡两者之间的冲突提供法律依据。
同时,加强对违法行为的惩治力度,确保公众知情权的合理行使。
2. 政府信息公开:政府应积极推进信息公开制度,及时、准确地向公众公开政府决策、公共事务等信息。
通过公开透明的信息披露,满足公众的知情权需求,减少对公职人员隐私的过度关注。
3. 媒体责任担当:媒体作为信息传播的重要渠道,应承担起社会责任,客观、公正地报道公职人员的行为和决策。
避免过度炒作公职人员的隐私,保障其合法权益。
公众人物隐私权与新闻自由的冲突与平衡
公众人物隐私权与新闻自由的冲突与平衡摘要伴随着时代的进步,社会主义市场经济的进一步开放,新闻行业得到了空前的发展,新闻报道和传播方式也越来越多样化,新闻自由的观念逐渐深入人。
这一时期,公民在对个人隐私权的保护意识逐渐提高的同时,也对他人的生活包括个人隐私信息越来越感兴趣,新闻媒体就是传播和报道这些信息的主要渠道。
由于新闻自由的目的是将真实的信息传播给社会公众,而隐私权的目的则是尽可能地保护个人私生活,因此两者一旦相遇,便会产生难以平衡的冲突与矛盾。
当前,这两者在我国都处于发展阶段。
一方面,在2023年颁布的《侵权责任法》第一次将隐私权规定为民事权利,在这之前隐私权一直都属于名誉权的范畴,而且《侵权责任法》也仅对隐私权进行了简单的罗列,并没有对其进行详细规定。
另一方面,目前我国对新闻自由并无明确的法律规定,只在《宪法》中涉及到关于出版自由和言论自由的内容。
在法律滞后的情况下,如何正确理解新闻自由和隐私权的关系,解决二者之间的冲突,便是本文写作需要解决的主要问题。
本文主要通过梳理新闻自由和公众人物隐私权的基本理论,分析新闻自由与公众人物隐私权发生冲突的内在原因与表现形式,探讨新闻媒体免受处罚的例外情形,并提出平衡新闻自由和隐私权关系的措施,寻找两者之间关系的制衡点。
关键词:隐私权;新闻自由;公众人物导论1.1选题背景和选题意义1.2文献综述1.2.1国内文献综述1.公众人物隐私权与新闻自由权的权利属性王利明(2023)指出:“隐私权作为一项具体人格权,就是指自然人享有的私人生活安宁与私人信息秘密依法受到保护,不被他人非法侵扰、知悉、搜集、利用和公开的一种人格权。
”在生活中,对于公众人物的隐私权保护问题,人们一贯认为公众人物无隐私的观点是不严密的。
准确地说,公众人物并非没有隐私,只是因为公共利益、公众兴趣、舆论监督、社会治理等因素的需要,对其隐私权进行了必要的限制。
同时,对公众人物隐私权的限制,应当根据具体案件的具体情况进行考虑,也就是说,法官需要根据具体案情,综合考虑相关因素加以判断。
公开场合隐性采访有没有底线?隐性采访最新案例2018
《公开场合隐性采访有没有底线?:隐性采访最新案例2018》摘要:目前中国新闻界,由于受众阅读期待和追求报道真实性的驱动,隐性采访有愈演愈烈之势,甚至成为某些媒体的“镇山之宝”,因此,隐性采访的实施,公开场合不应该成为它的理由,或者说,认为公开场合中可以进行隐性采访这一观点存有疏漏之处,在关于公开场合中隐性采访问题的讨论中,人们经常会提及这样的例子:公开场合中的情侣亲吻可不可以进行隐性采访目前中国新闻界,由于受众阅读期待和追求报道真实性的驱动,隐性采访有愈演愈烈之势,甚至成为某些媒体的“镇山之宝”。
记者自然是满心欢喜,而学院派的研究者则从权利与义务的对等、隐私权的保护和诸种利益之间的平衡等因素出发,提出对隐性采访应该加以若干限制,隐性采访应该有自己的实施底线和应遵从的原则,但同时也提出:对于在公开场合中活动的人可以使用隐性采访这种采获新闻信息的方式。
何为公开场合?研究者在讨论公开场合中的隐性采访问题时所说的公开场合,一般是指“用于公共活动的物理空间”(顾理平《隐性采访论》第183页,新华出版社2004年),如道路、公园、广场、剧院等场所。
在这些场合里,顾理平认为,人们的行为“是一种主动昭示于人的行为,即使不是主动昭示,在法律上也应该认为是可以通过新闻进行报道而不必事先征得被采访者的许可。
否则,许多新闻活动就无法开展”(《隐性采访论》第184页)。
也就是说,这种情况下不存在隐私(宁居)的侵扰问题,顾理平还引张新宝、普洛赛尔等人的论述来支持自己的观点。
显然,顾理平的这一主张是已经被人们普遍接受的观念,但在我们看来,这一主张恰恰有待于重新进行反思。
公开场合中隐性采访存不存在隐私侵权的问题,归根到底就是公开场合中存不存在私人空间的问题。
如果我们承认公开场合里存在私人空间,那我们就必须对在其中进行的隐性采访进行必要的限制,不能随便对一个处在公开场合里的普通人实施隐性采访。
那么,公开场合里有无私人空间呢?根据我们的个人体验,这个空间显然是存在的。
对公共场所隐私权的认定和保护
对公共场所隐私权的认定和保护关于隐私权,王利民教授认为:隐私权是自然人享有的对其个人的与公共利益无关的个人信息、私人活动和私有领域进行支配的一种人格权。
〔私密不受侵害的权利。
所以一般讨论隐私,都是指私密空间里的个人活动。
显而易见,一旦自然人进入公共区域,那么对自然人隐私权的保护会受到很大的限制。
那么我们首先要讨论的就是何为公共区域。
公共区域顾名思义就是公众都可以活动的区域,个人不享有独立支配权的地方。
以北京二中院审判的这个案子为例,原告所主张的在楼梯内被拍到,楼层中的过道、楼梯肯定是公共区域无疑,即使空间狭窄,即使人口稀少,但也不可否认,每个人都有从此通过的权利,每个人也必须同时忍受他人在此区域内的活动。
对公共空间的认定毫无争议,那么这就意味着原告在公共区域内活动,其隐私必然要受到一定的限制。
不可否认的是,在公共区域内,公民也有隐私权,比方商场试衣间内,商场的厕所里面就禁止摄像头,这些区域虽然也属于公共区域,但是公民在独占排他使用的时候,在那个时间段内公民就对这局部区域取得了暂时性的控制权,此时公共场所就转变成私密场所,并且試衣服、上厕所这些活动本身就极具私密性和不可公开性,理应得到保护,因此成认公民享有隐私权。
据此我们可以得出如下推断:当公民对某个公共区域取得暂时性的排他性控制并且在进行私密性活动,推定其享有隐私权。
这是毋庸置疑的。
因此关于如何认定公共场所的隐私权,笔者认为需要从三个方面讨论:1.是否对此公共区域取得暂时性排他性权利;2.是否在进行私密性活动;3.是否给当事人带来事实上的损害,也即是否侵扰到私人生活的安宁或是泄露私人秘密。
笔者认为这三个方面只要具备任何一个,就应当享有隐私权。
首先,当公民对这片公共区域暂时性排他性控制,那么在那个时间段,那个空间于公民而言就具有私密性,公民对这片区域已取得控制权,无论公民在此空间内从事什么活动,无论是否具备私密性,那都是个人的自由,均属于个人的隐私;其次,毫无疑问,只要是在进行私密活动,具备私密性,那肯定是个人的隐私,这点毫无争议,无论是在公共场合或者是私密场合,至于对这种隐私保护与否,那是我们下一个局部讨论的内容,在此不再赘述;第三,当公民在公共区域内活动的时候,尽管他对这片区域并未取得暂时性排他控制权,但是也有保障自己私人生活安宁的权利。
公共场所隐私权的悖论
公共场所隐私权的悖论作者:刘泽刚来源:《现代法学》2008年第03期摘要:“公共场所隐私权”是个悖论式的问题。
实践中,西方国家已经承认了公共场所隐私权的合法性。
隐私权保护重心从“场所”到“人”的转变,以及由此产生的“合理隐私预期”是公共场所隐私权的法律依据,然而,“合理隐私预期”至今仍然缺乏明确的标准和法理依据,这根源于对“公共场所”之“公共性”的误解。
“公共场所”大都是公、私混合的“社会场所”。
这不仅决定了“公共场所隐私权”的正当性,也决定了对公共场所隐私权进行保护必须突破僵化的公私法分立格局。
关键词:隐私权;宪法隐私权;公共领域;公私法关系;人格权中图分类号:DF34文献标识码:美国法学家沃伦(Warren)和布兰代斯(Brandeis)1890年首次提出“隐私权(the right to privacy)”时,曾将其描述为“一个人待着的权利(the right to be let alone )”[1]。
如果坚持这种定义,“公共场所的隐私权”也可被表述为“一个人在公共场所独处的权利”。
但一个人如何才能在公共场所独处?这的确是个荒谬的问题。
更荒谬的是人类技术能力的发展远远超前于其德性的进步。
信息时代的人身处公共场所时,其隐私处于前所未有的危机之中:监控设备泛滥,“狗崽队”猖獗,偷拍频发。
直觉告诉我们:隐私在公共场所也应当受到法律的保护,但这种直觉是否有法理的依据?一、“合理的隐私期待”:公共场所隐私权的关键从实证角度看,公共场所的隐私权已获得立法和司法实践支持,因此是一种现实存在的权利,绝非理论杜撰的产物。
当然,仍有许多人质疑公共场所隐私权的正当性。
因为它与我们对“公共场所”的直觉相抵触。
一般认为,“所谓公共场所,是指任何不特定的第三人可以出入的场所,其标准是该场所的用途。
”[2]也有学者认为:“公共场所,是指根据该场所的所有者(或者占有者)的意志,用于公共大众进行活动的空间”[3]。
可见,公共场所概念的核心是用途。
公众人物隐私边界在哪?
公众人物隐私边界在哪?作者:潘书鸿来源:《上海人大月刊》2021年第11期你还记得英语课本中的“钢琴王子”李云迪吗?10月21日晚,各大媒体对李云迪嫖娼事件进行了通报,瞬时让这名肖邦国际钢琴比赛史上最年轻的金奖获得者声名狼藉。
指名道姓公开报道嫖娼,会侵犯个人隐私吗?公众人物嫖娼案的大型报道早已不是第一次了,关于是否侵犯个人隐私,首先要弄明白什么是隐私权。
实际上,我国直到今年1月1日《民法典》正式实施后,才把“隐私权”作为一项独立的人格权纳入法律规定之中,在第1032条中作出了具体规定。
此外,今年11月2日,《个人信息保护法》正式实施,进一步加强了个人信息的保护。
那么,指名道姓公开报道嫖娼是否会侵犯个人隐私或个人信息?抛开李云迪事件,若是对于普通人公开报道嫖娼情况,必然会侵犯隐私权。
原因有两点:第一,此类负面信息公开必定会对个人名誉、尊严等人格权造成重大影响,是属于“不愿为他人知晓”的私密信息,故符合个人隐私的定义;第二,早在我国将隐私权正式纳入法规之前,公安部就因东莞、武汉等多起派出所公开报道嫖娼的事件,在2010年专门下发通知,要求各地公安机关在查处卖淫嫖娼违法犯罪活动时,要坚决制止游街示众等有损违法人员人格尊严的做法,既要坚持执法公开,又要充分尊重和保障人权。
十年前的法治观念尚且如此,如今在《民法典》明确规定了隐私权的情形下,法治环境更不能倒退。
因此,网络媒体指名道姓公开报道嫖娼的行为,已经侵犯了个人隐私权。
在很多人意识中,嫖娼对社会造成了恶劣影响,就该让“坏人”接受社会舆论的监督,但从法治思维的角度来看,这样做并不妥当。
在《治安管理处罚法》第66条对卖淫、嫖娼的处罚规定中包括拘留、罚款,但并不包括通报批评。
根据“法无授权即禁止”的原则,行政机关亦无权指名道姓公开报道嫖娼,否则会让行为人接受法律以外的惩罚,超出惩罚的必要限度,不符合行政法的“比例原则”。
公开报道公众人物嫖娼,与报道普通人有什么不同吗?《民法典》第1036条规定了处理个人信息的免责事由,即若行为人是为维护公共利益或为了维护行为人合法权益,在合理处理个人信息情况下,行为人就不承担民事责任。
互联网时代的公共空间与个人隐私
互联网时代的公共空间与个人隐私在互联网时代,随着信息技术的快速发展和普及,网络空间已经成为人们日常生活中不可或缺的一部分。
互联网为人们提供了一个全新的交流渠道和信息获取途径,同时也为公共空间和个人隐私带来了前所未有的挑战。
公共空间的定义与特点公共空间是指供公众聚集、交流和活动的地方,在现实生活中,公共空间通常包括街道、广场、公园、图书馆等地方。
而在互联网时代,公共空间的概念得到了拓展,除了传统的实体场所,社交媒体平台、网络论坛、博客等也被视为一种虚拟的公共空间。
在这些虚拟公共空间中,人们可以自由表达观点、分享信息、交流经验,这为民主社会和信息社会的建设提供了重要支撑。
在互联网上,公共空间具有以下特点:开放性:互联网是一个开放的平台,任何人都可以自由加入和参与其中;匿名性:在网络上,人们可以选择匿名身份进行交流,这既有利于自由表达意见,又增加了信息安全的挑战;交互性:网络空间可以实现实时交流和互动,人们可以立即回应他人言论,形成多向交流模式;无界限性:互联网打破了地域限制,使得全球范围内的用户都可以参与其中。
个人隐私面临的挑战然而,在享受公共空间带来便利的同时,个人隐私也面临着严峻挑战。
在互联网时代,个人隐私泄露问题日益突出,以下是一些引起关注的方面:数据泄露:在网络上留下的个人信息可能被不法分子获取并利用,导致个人隐私泄露;监控感知:互联网科技的应用使得监控日益普及,个人在网络上的行为和数据可能被监控、记录和分析;信息过度共享:在社交媒体等平台上分享过多个人生活细节可能导致个人隐私曝光;网络攻击:黑客攻击、网络钓鱼等手段威胁着个人信息安全。
寻找公共空间与个人隐私之间的平衡如何在互联网时代寻找公共空间与个人隐私之间的平衡成为摆在我们面前的一个重要课题。
以下是一些思考和建议:加强信息安全意识:个人在使用互联网时要注意保护好自己的账号密码等信息,避免落入不法分子手中;谨慎分享个人信息:在社交媒体等平台上分享信息时要谨慎,避免过度透露个人隐私;支持数据保护政策:政府和企业应加强对用户数据的保护和管理,建立完善的数据保护制度;提倡网络道德:倡导网络用户文明用语、遵守法律法规,提高整个网络空间的品质。
公众知情权应大于个人隐私权 辩论赛
公众知情权应大于个人隐私权首先明确前提(在公众知情权和个人隐私权为了利益冲突时辩题才有意义),那么再明确知情权与好奇心的区别,其次说明个人利益与公众利益在同一情况下孰轻孰重(当然是公众利益),在理出论点如社会价值导向,公众监督作用等等一辩陈词大家好,开宗明义,我方观点是:公众知情权应大于个人隐私权。
知情权是公民的宪法性的权利。
在1949年实施的联邦德国基本法中首先明确规定:人人享有语言、文字和自由发表传播其言论的权利并无阻碍的依通常途径了解信息的权利。
首先我方明确表示:公众知情权和个人隐私权都是公民最基本的权利,在大多数情况下二者并不冲突,只有在少数由于利益关系出现矛盾时辩题才有意义,任何单方面的仅仅是侵犯隐私权或知情权的行为都不该被纳入讨论范围。
并且,我们所有的讨论的展开都是以正当行使公众知情权为前提,只有这时,公众知情权才是大于个人隐私权。
其次,我方从不否认个人隐私权的重要性。
但是,个人隐私权,顾名思义属于私权范畴,而公众知情权更多作为公权存在。
国家的组成是公民出让自己的一部分权利,授予管理者用于维护全体公民的福祉和社会秩序。
也就是说:公权来自于公众,是为公众利益服务,因此当公权与私权出现冲突时,公权应首先予以维护,只有这样才能保护大多数人的利益。
而每一位公民对公权的尊重恰恰就是对他人、对自己私权的维护。
既然说到“大于”,就应该体现在取舍之中。
恩格斯曾经说过:个人隐私一般受到保护,但当个人私事甚至阴私与最重要的公共利益——既政治生活发生联系的时候,个人的私事就已经不是一般意义的私事,而属于政治的一部分,它不受隐私权的保护,应成为历史记载和新闻报道不可回避的内容。
也就是说:当个人隐私触犯了公众的利益时,个人隐私权有义务做出让步,以此来保证多数人的利益。
最后我要提的是:在构建文明社会中保障知情权的作用。
毋庸置疑,在维护社会稳定发展方面公众知情权显然更重要。
一旦公众发现自己连最基本的知情权都没有得到起码的满足时,整个社会的稳定就极有可能受到影响,由此便会产生一系列不可预料的社会动荡。
关于公众人物隐私权的限制和保护
公众人物隐私权的限制和保护近年来,随着互联网技术的迅速发展,人们对公众人物的关注度越来越高,同时也更关注公众人物的隐私权。
但是,公众人物在某些情况下,他们的隐私权可能会受到限制。
因此,本篇文章将探讨公众人物隐私权的限制和保护,并且会列举三个案例。
首先,为了维护公众人物的形象和声誉,有时候他们的隐私权可能会受到限制。
例如,如果一位公众人物涉嫌违法或者有不端行为,那么公众就有权知道真相。
这是为了保证社会公正和维护人民的权益。
此时,公众人物的隐私权会受到限制,在合法的情况下,媒体可以对其相关信息进行报导。
但是,对于没有证据的诽谤性报道,是不能被允许的,因为这样就涉及到了公众人物的名誉权。
其次,公众人物的隐私权受到保护的情况也存在。
例如,在某些情况下,公众人物可能会面临粉丝或者媒体的追踪骚扰,这就涉及到了公众人物的私生活以及个人隐私。
在这种情况下,公众人物有权利维护自己的隐私权,追踪骚扰者可能会被判刑,甚至被罚款。
不仅如此,在媒体报道中,对于公众人物的家庭、财产,婚姻等一些私人信息也需要被充分保护。
接下来,我们来看几个案例。
第一个案例是关于名人的隐私保护。
当年,周润发在新加坡登机时,被一位网友拍摄并上传至网络上。
这件事引起了广泛的讨论,许多网友都认为这是对周润发隐私的侵犯。
即使是公众人物,他们也有隐私权的保护。
这种没有得到周润发的同意,擅自发布他的照片的行为,是不被公众所接受的。
第二个案例是关于媒体诽谤的案例。
在美国,前田总统体重问题曾被某家杂志搞成了头条新闻。
但在经过多次的调查和咨询之后,这篇报道被质疑是诋毁性的,因为它没有任何事实根据,严重侵犯了前田总统的隐私权。
第三个案例是关于黑冰女孩的案例。
李某某(黑冰女孩)因曾经犯罪嫌疑,被警方抓获。
但是,当她没有被判罪时,媒体就已经通过各种方式将她的个人信息公之于众,这就涉及到了她的隐私权。
黑冰女孩这个案例反映出媒体在报道时,应该尊重当事人的隐私权,并且在待证实的情况下,不应该轻易散布、诽谤。
论隐私权与公共利益的冲突与平衡
论隐私权与公共利益的冲突与平衡[摘要]安全和隐私一直是人们争议的焦点,隐私权强调的是个人利益,而公共利益强调的是社会的整体利益。
公共利益的“公”的特点与隐私权“私”的特点,使得两者的冲突不可避免。
平衡两者间冲突的途径和方法有以下几个方面:正确界定公共利益与隐私利益;公共利益应当由特定机关(主要是立法机关)加以界定;公共利益的实现必须遵守正当法律程序。
[关键词]隐私权;公共利益;冲突;平衡2008年7月14日,乌鲁木齐市市民郭女士在乘坐出租车时,发现车内装有摄像头。
认为个人隐私和肖像权受到侵犯的她,在与驾驶员发生争执时折断了摄像头,最后由相关部门介入调解,这是据公开报道的围绕“安全与隐私”之争的首次冲突事件。
①2009年12月25日,美国发生了影响巨大的“圣诞惊魂”事件,以此引发了机场“裸检”时代来临,安装“裸体安检仪”国家开始接受隐私换安全的现实。
②2010年6月底,沈阳在全市街头新增10万个“电子眼”,③这一次新增加的10万个电子眼,监控范围进一步扩大,将根据各分局辖区派出所的实际需要,安装在治安复杂路段、易发案路段、商场、企事业单位、学校门口及周边。
届时,全市视频监控探头将达到20万个。
以上三则新闻报道,都涉及到一个共同的话题:隐私权和公共利益的冲突问题。
如蛛网般精织密集的摄像头或“裸体安检仪”等设备,已形成一张无形大网,把公众罩于网中,让隐私与“暴露”字眼也格外显眼。
在公共场合安装安全监控系统包括摄像头或“裸体安检仪”等目的是为了保护国民或市民的安全,确保国家的安定。
但我们要注意的是它是一把双刃剑,在保护安全的同时极有可能会侵犯到公民的个人隐私。
而协调隐私权与公共利益两者的关系又是实现个人与社会的基本和谐关系时一个不容忽视的问题。
因此,认真对待和思考隐私权与公共利益间的冲突,并设法寻求解决途径和方法,具有非常重要的理论意义和实际价值。
一、隐私权与公共利益冲突的现状隐私权作为人身权的一种,是以隐私为研究对象的权利。
论公共场所隐私权保护
论公共场所隐私权的保护摘要:随着我国社会主义市场经济的日益繁荣,市民社会逐渐兴起和成熟,人们的权利意识也随之逐步增强。
在隐私权保护领域,隐私权的保护已经不再局限于最初的“一个人独处的权利”,而开始扩展到公共场所的隐私保护。
实践中,西方国家已经承认了公共场所隐私权的合法性。
然而,对公共场所隐私权的保护存在理论和实践两方面的困境。
理论上,“公共场所”大都是公私混合的社会场所。
实践中,公共场所隐私权的保护缺乏必要的法律依据,而且隐私权保护本身也因为社会权利意识的缺乏麻烦不断,这也直接导致了公共场所隐私权保护陷入困境。
公共场所的隐私权保护要走出现在的困境必须突破现有的立法格局,从民法与行政法、刑法等公法的协调中找寻出路。
关键词:隐私权;公共场所;立法缺失;实践困境;立法完善一、引言随着信息化社会的兴起、媒体的发达和科技的进步,实际生活中侵害隐私权的现象也更加普遍。
如医院等社会公共机构擅自公布、泄露当事人的病历、病体照片、个人资料等;为了达到“更好的管理”目的,在公司、超市甚至学生宿舍中,越来越广泛地安装了“窃听监视”系统;电信、银行、保险、房地产、网络公司等随意公布客户、员工的电话号码、邮件地址、住址、收入等;利用高科技产品如红外线摄像仪、可拍照的手机进行偷拍。
种种侵害现象让人们对自己的隐私安全感到恐慌,几乎每天我们的隐私权都会受到或多或少的侵犯。
在侵害隐私权现象大量增加的同时,隐私权被侵害的方式也在发生变化,呈现出由简单到复杂、由单一到多样的发展趋势。
过去,侵害人以频繁搅扰的方式干扰他人的宁静生活;如今,这种侵扰方式已经落伍,电话骚扰成为时尚。
过去,侵害人通过跟踪、偷窥等方式非法获得他人的隐私;如今,利用窃听器、远红外线等装置,可以易如反掌地获得他人的隐私。
公共场所隐私权保护的问题由此进入人们的视野并在学术界引发激烈的探讨。
传统观点认为“隐私止于屋门之前”,现代人格权的发展,使隐私从私人住宅扩及公共空间。
当代西方对公共领域隐私问题的研究及其启示-上海师范大学学报
一、 隐私研究的传统定位 西方传统的隐私研究, 一般将隐私问题锁定 ① 在与公共领域相分离的私人领域。 在沃伦 ( Warren) 和布兰代斯( Brandeis) 发表于 1890 年且产生 [1 ] 《隐私权 》 了重大影响的 一文中, 这一点就已初 显端倪。沃伦和布兰代斯的《隐私权 》 一文, 虽然 , 还未给出隐私权的完整定义 但却已指出隐私权 “独处的权利” 。所谓 “独处 ” , 意味着 即蕴涵撤离 公共领域而封闭于私人空间的意思 。 实际上, 沃伦和布兰代斯的论文并非隐私研 究的绝对起点。 在他们之前, 就已经有一些西方 学者关注隐私问题。 例如, 英国法学家和哲学家 斯蒂芬( Stephen ) 在沃伦和布兰代斯的著名论文
要:
西方传统的隐私研究, 基于公域与私域的分 离, 主要关注私人领域的隐私问题。 随着社会的 发展, 尤其是信息社会的逐渐形成, 公共领域的隐 私问题日益引起人们的担忧。西方学界对这一新 突破传统的公共与私人二 的隐私问题展开研究, 分法的限制, 力图使隐私理论能够适应当代社会 的客观需要。本文主要对西方学者的公共领域隐 并针对当代中国社 私问题研究进行评述和分析, 就建立符合中国国情的公共领域 会的实际情况, 隐私理论提出初步的看法。本文的论述侧重于公 伦理学方面, 暂不涉及与 共领域隐私问题的哲学、 隐私有关的具体法律规范或立法问题 。
将隐私限制在私人领域, 因为这里的“亲密 ” 是在 封闭的私人领域中发生的。 在弗雷德 ( Fried ) 看 来, 隐 私 是“我 们 对 有 关 我 们 自 身 信 息 的 控 , 但这种对 “自身信息的控制” 制” 其实就是“个 6
[8 ]
吕耀怀: 当代西方对公共领域隐私问题的研究及其启示
。 征的去个性化和自制的补充”
浅议公共场所隐私权的法律保护
浅议公共场所隐私权的法律保护一、公共场所隐私权的产生及各国立法实践(一)公共场所隐私权的产生历程自从1890年美国法学家Warren和Brandeis首次在《哈佛法律评论》中提出“隐私权”,并将其描述为“一个人待着的权利”,[1]隐私权一直被认为是公民享有的私人生活安宁和私人信息不受他人侵扰、知悉、披露的权利。
我国民法大家江平也认为“隐私权是自然人的自由权在私法上的保护,是指自然人所享有的私生活领域及个人信息不受侵扰的人格权”。
[2]所以长期以来隐私权的法理基础是个人自治,公共领域和私人领域之间的区分正是建构隐私权的基础。
随着资讯科技的发展,隐私权这一消极的“不受干扰”之内涵开始向积极的“资讯控制”扩展。
1970年,美国法学Arthur ler从积极的角度将隐私权定义为“控制有关自己信息传播的权利”。
[3] 1985年,德国学者迪特尔进一步提出了“个人信息自决权”的概念,标志着隐私权的内涵已经从消极被动的“私生活不受干扰”向积极能动的“控制自己的信息”转变。
个人空间的隐私权保护是隐私权的题中之议,在世界范围内已得到了较为一致的认可,即“隐私止于屋门之前”。
在19世纪的资产阶级社会中,隐私权法律制度主要表现为对住宅家庭和通信秘密的保障,在19世纪60年代以前,美国法律的信条是公共场所不存在合法的隐私利益。
然而,随着科技的日益发展,对公共场所是否存在隐私权的意见不一,争议较多:一种观点笼统的认为公共场所无隐私权,这种观点认为“隐私”即自己不愿为他人所知的私人隐秘,而大庭广众之下,公众的眼皮底下有何隐私可言;另一种观点截然相反,正如革命导师马克思说:“权利永远不能超出社会的经济结构及由经济结构所制约的社会文化发展。
”任何社会主体权利都离不开其所在的社会环境,传统的“隐私止于门前”的理念已满足不了现代公民对自由的追求。
公共场所也存在某些私人场合即私人生活不仅在住宅内,也依赖于外在环境构成。
隐私也存在于公共场所,只要此时权利人相信其活动不在公众视野中即当事人有对隐私不被侵犯的合理预期。
隐私权、肖像权——公众人物必要的权利牺牲_0
隐私权、肖像权——公众人物必要的权利牺牲_0隐私权、肖像权——公众人物必要的权利牺牲余秋雨的又一场官司,把前一段关于公众人物的权利保护问题的讨论又掀起了一个高潮,很多人都在讨论公众人物的权利保护问题。
是呀!不管余秋雨的官司的结果是什么,讨论一下这个问题,总还是有些意义的。
不是有些司法机关在审理公众人物的权利保护纠纷案件中,总是拿不定主意吗?说说清楚,大概还会有很大的好处呢!公众人物,是人格权及其保护中的一个概念,是民法的概念,同时也是新闻学的概念。
民法研究这个概念研究的是,公众人物在民法上究竟享有什么样的权利,他们享有的权利究竟应当怎样保护,换言之,公众人物的某些权利受到限制,究竟要限制到什么样的程度。
我们在起草《民法典草案专家建议稿》的时候,写了一条关于公众人物的条文,这就是人格权法编第五十五条:“为社会公共利益进行舆论监督,可以披露社会公众人物的有关隐私。
”“被监督人不得就此主张侵害隐私权。
”这个建议稿发表在中国人民大学民商事法律科学研究中心主办的《民商法前沿》上。
在此之前,曾经还有一个更为详细的条文草案,详细地说明了公众人物的界定,就是“领导人、艺术家、影视明星、体育明星、社会活动家等”。
当然,说的这些都是专家的意见,并不是法律的规定,而且在全国人大常委会审议的民法草案中,也并没有规定这一不过,这总还是专家的意见,是学理解释吧?应当明确的是,公众人物总还是人,是民法规定的民事主体中的自然人。
公众人物这种主体,他们的人格没有缺陷,不存在任何形式的人格缺损,具有完完全全的民事主体资格。
因此,公众人物也就应当享有一般的民事主体(当然是自然人)所享有的全部民事权利,对此,不得有任何含糊之处。
但是,尽管公众人物与其他自然人是一样的,但是他们的知名度超过常人,或者承担的职责涉及到公共利益或者国家利益,他们的行为关乎到国家、社会的利益或者公众的知情权,因此,人们对他们的关注和观察就远远地超出对一般的自然人所关注的程度。
公众人物的认定标准及隐私报道的界限的论文
公众人物的认定标准及隐私报道的界限的论文本文从网络收集而来,上传到平台为了帮到更多的人,如果您需要使用本文档,请点击下载按钮下载本文档(有偿下载),另外祝您生活愉快,工作顺利,万事如意!摘要本文对公众人物的认定标准及其隐私报道的界限进行了分析。
关键词公众人物隐私报道公众人物是媒体报道的焦点,也是与媒体发生诉讼纠纷最多的人群之一。
导致纠纷不断的重要原因是法律上没有关于公众人物的规定,司法实践中没有明确的判决标准,理论研究也极为薄弱,学术界至今尚未形成明确的公众人物的系统理论,从媒体角度探讨如何避免侵害公众人物隐私权的文章更是阙如。
这种实践和理论研究的现状使媒体在报道过程中常常会有损害公众人物甚至普通人隐私利益的“越界”情况发生。
本文认为,媒体把握好以下两个问题,就可以做到尽量避免侵害公众人物隐私权:一是公众人物认定的标准;二是公众人物隐私利益保护的界限。
一、公众人物的认定标准对于公众人物的认定标准,我国现行法律上没有明确规定,法学界学者的意见也多有分歧,不过占多数的学者认为:公共利益是界定公众人物的核心要素。
这一标准的提出与两位美国联邦最高法院的两位大法官的意见有关。
大法官沃伦认为。
“公众人物是指其在关系到公共问题和公共事件的观点与行为上涉及公民的程度,常常与政府官员对于相同问题及事件的态度和行为上涉及公民的程度相当。
”哈兰大法官也认为,“公众人物是卷入被证明为正当和重要的公共利益问题的人。
”两位大法官虽然做了不同的表述,但都提到了公众人物与公共利益密切相关。
以公共利益作为公众人物的认定标准存在很多问题。
因为,普通人若卷入与公共利益有关的纠纷中也将被认定为公众人物,随即就会减少对其人格权的保护,对普通人来说极为不公平。
美国联邦最高法院也曾试图以公共利益作为认定公众人物的标准,但最后因过分偏袒新闻自由而放弃。
在1971年的罗森布鲁姆诉市新闻公司案中,法院将纽约时报诉沙利文案中建立的实质恶意标准适用于官员、公众人物以外的与公共利益相关的一切人,试图以公共利益作为降低人格利益的标准。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Further information about the University of Cambridge Faculty of Law Legal StudiesResearch Paper Series can be found at /ssrn/ Reasonable Expectations of Anonymity Jeffrey SkopekPAPER NO. 6/2015FEBRUARY 2015REASONABLE EXPECTATIONS OF ANONYMITY 101 V IRGINIA L AW R EVIEW ___ (forthcoming May 2015)Jeffrey M. Skopek*The Supreme Court has concluded that the Fourth Amendment’s protections do not apply to information that has been exposed to the public. This conclusion is deeply flawed and derives from the mistaken conflation of anonymity and privacy. Although anonymity and privacy are similar in that both maintain the secrecy of personal information, they differ in a fundamental and legally relevant way: privacy hides the information, whereas anonymity hides what makes it personal. Understanding this difference reveals compelling substantive and formal reasons for interpreting the Fourth Amendment to protect not only reasonable expectations of privacy, but also “reasonable expectations of anonymity.” Further, the incorporation of this new analytic concept into Fourth Amendment jurisprudence yields significant value: first, by identifying otherwise-unrecognizable ways in which new techniques of big data implicate the Constitution, and second, by delivering on the unfulfilled promise of the Supreme Court’s teaching that the Fourth Amendment “protects people, not places.”* University of Cambridge Faculty of Law. Comments welcome: jms212@. Thanks to David Barron, Yochai Benkler, John Coates, Glenn Cohen, John Goldberg, Matt Lawrence, Nicholson Price, Chris Robertson, Todd Rakoff, Joe Singer, Holger Spamann, Carol Steiker, Matthew Stephenson, Larry Tribe, Mark Wu, and workshop participants at Harvard Law School, the University of Cambridge Faculty of Law, and the New England Regional Junior Faculty Workshop for helpful conversations and comments. This work was made possible by a fellowship from Harvard Law School’s Petrie-Flom Center.11/11/14] REASONABLE EXPECTATIONS OF ANONYMITYT ABLE OF C ONTENTSI NTRODUCTION (1)I. R EASONABLE E XPECTATIONS OF P RIVACY (5)A. The Fourth Amendment (5)B. Privacy in the Fourth Amendment (7)1. Normative vs. descriptive conceptions of privacy (7)2. The Fourth Amendment and epistemic privacy (10)C. The Limits of the Privacy Framework (15)1. The public exposure and third party doctrines (15)2. The critical scholarship (18)II. P RIVACY VS.A NONYMITY (20)A. Differentiating Privacy and Anonymity (21)B. The Nature of Anonymity (25)C. Finding Anonymity in the Fourth Amendment (30)III. R EASONABLE E XPECTATIONS OF A NONYMITY (35)A. Genetic Identification (36)1. Familial searching and the limits of privacy (37)2. Virtual profiles and genetic anonymity (44)B. Locational Tracking (46)1. Recognizing the constitutional problem (48)2. Protecting people, not places (57)C ONCLUSION (61)11/11/14] REASONABLE EXPECTATIONS OF ANONYMITY 1I NTRODUCTIONNew technologies and methods of data analysis are being used bythe government to monitor the public in ways that were unimaginable a decade ago. Law enforcement agencies ranging from municipal police forces to the Department of Homeland Security are using tools such as genetic databanks,1 biometric scanners,2 roadside cameras,3 and internet and cell-phone metadata analysis4 to gather detailed information about the lives of individuals who are not suspected of any wrongdoing. The meaningful question in this area is no longer what information the government can obtain about us, but rather what information is beyond its reach.The reason for this is that Supreme Court has concluded that the Fourth Amendment’s protections do not apply to any information that has been exposed to the public or third parties. This includes information about our public movements, internet usage, cell phone calls, and so on. Such information is per se fair game for police collection by any means.This Article argues that this conclusion derives from a mistaken conflation of privacy and anonymity, and that understanding the difference between these concepts reveals strong substantive and formal reasons for interpreting the Fourth Amendment to protect not only reasonable expectations of privacy, but also “reasonable expectations of anonymity.” Further, it demonstrates that the incorporation of this new analytic concept into Fourth Amendment jurisprudence yields significant value: first, by identifying otherwise-unrecognizable ways in which new techniques of big data implicate the Constitution, and second, by delivering on the unfulfilled promise of the Supreme Court’s teaching that the Fourth Amendment “protects people, not places.” A more detailed roadmap of this argument follows:1 The police in nearly every state and the FBI are creating genetic profile databases. N AT’L C ONF.S T.L EGISLATURES,S TATE L AWS ON DNA D ATA B ANKS, available at /default.aspx?tabid=12737. Originally, only those convicted of felonies were required to submit DNA samples, but the federal government and most states now require profiling of arrestees as well. Id.; 28 C.F.R. §28.12(b) (2010).2See, e.g., Charlie Savage, Facial Scanning Is Making Gains in Surveillance, N.Y. T IMES,August 21, 2013 (describing the Department of Homeland Security’s Biometric Optical Surveillance System, which will be able to scan crowds in public spaces and automatically identify and track individuals).3See, e.g., A MERICAN C IVIL L IBERTIES U NION,Y OU A RE B EING T RACKED:H OW L ICENSE P LATE R EADERS A RE B EING U SED TO R ECORD A MERICANS’M OVEMENTS(2013) (describing the widespread use of road-side cameras to amass millions of digital records on the location and movement of every vehicle with a license plate).4See, e.g., Richard Lempert, PRISM and Boundless Informant: Is NSA Surveillance a Threat? B ROOKINGS, June 13, 2013 (describing the NSA’s Boundless Informant program, which captured a vast and indiscriminate class of metadata from U.S. citizens’ phone calls, and its PRISM program, which monitored communications with foreign targets by tapping directly into the central servers of nine leading U.S. internet companies).11/11/14] REASONABLE EXPECTATIONS OF ANONYMITY 2The argument begins, in Part I, with an analysis of the FourthAmendment right to be free from unreasonable “searches”—a term that the Supreme Court has, ever since Katz v. United States,5 interpreted to mean “violations of reasonable expectations of privacy.” The key contribution of this Part is clarifying what the Court means by “privacy” in the Fourth Amendment context, which has been the subject of much confusion in the literature. A close analysis of the case law reveals that the Court has adopted what can be termed an “epistemic,” rather than a normative, conception of privacy. The clarification of this point provides the foundation for a discussion of two doctrines that significantly limit the scope of the Fourth Amendment’s protections: the public exposure and third party doctrines, under which the Supreme Court has concluded that the Fourth Amendment’s protections do not apply to any information that has been exposed to the public or third parties.The question that motivates this Article is whether the Supreme Court has erred in reaching this conclusion. The dominant view in the privacy scholarship is that the Court has failed to account for the ways in which privacy can exist in degrees. While this critique is correct as far as it goes, this Article demonstrates that it only identifies part of the problem.The even deeper problem, identified in Part II, is that courts—along with most scholars—have incorrectly assumed that there is only one way of protecting a piece of personal information from public access: the one we call “privacy.” In doing so, they have overlooked a distinct and equally important way of doing so: through anonymity. This oversight derives from the fact that anonymity and privacy have been mistakenly conflated.An example helps introduce the key distinction that has gone unrecognized. Imagine, for instance, that a person’s medical file contains a piece of paper with the results from his blood test, but his doctor removes the paper and places it in a blank file. If we subsequently obtained access to this person’s medical file, without the test results, we would describe the situation using the concept of privacy: we would say “the privacy of the person is protected,” or “the associated information is private.” If, on the other hand, we obtained access to the test results, without the medical file, we would describe the situation using the concept of anonymity: we would say “the anonymity of the test results is protected,” or “the associated person is anonymous.”What this example illustrates is two basic points about anonymity and privacy that have been misunderstood. The first is a point about their substantive difference. While both anonymity and privacy prevent others from gaining access to a piece of personal information, they do so in opposite ways: privacy involves hiding the information, whereas anonymity involves hiding what makes it personal. The second point is about their5 Katz v. United States, 389 U.S. 347 (1967).11/11/14] REASONABLE EXPECTATIONS OF ANONYMITY 3 formal relationship. Anonymity and privacy have the same causal origin and thus are flip sides of each other: they describe opposite sides of a single underlying event.This account of the nature of anonymity, when combined with the insight that Katz and its progeny adopt a purely epistemic conception of privacy, has significant legal implications. As identified in the final section of Part II, it reveals strong substantive and formal reasons for reading the Fourth Amendment to protect not only reasonable expectations of privacy, but also “reasonable expectations of anonymity.”It is perhaps worth highlighting here that this is not a normative argument about what our constitutional law should be, but rather a legal argument about the best way to interpret the Fourth Amendment precedents that we have. Thus, I do not question whether Katz and its progeny provide the best interpretation of the text of the Fourth Amendment, but rather make a claim about the best reading of this case law, accepting that it provides a controlling reading of the text. Further, and relatedly, I do not question the premise that the Fourth Amendment does not prohibit the government from collecting personal information that has been knowingly exposed to the public, but rather show that this premise does not support the conclusions reached by courts in many of the public exposure cases—that the logic of the public exposure doctrine imposes limits that have not been recognized. This is not to say, however, that my argument is at odds with those of scholars who argue for more radical revisions of Fourth Amendment jurisprudence on normative grounds.6 Rather, a normative approach might reach the same conclusions on many issues, as will become clear in Part III.The practical payoff of incorporating the concept of “reasonable expectations of anonymity” into Fourth Amendment jurisprudence is the focus of Part III, which identifies two general dimensions in which it yields significant insights. The first dimension is analytic, where thinking in terms of anonymity identifies otherwise-unrecognizable ways in which many new techniques of big data implicate the Fourth Amendment. This is demonstrated by reference to the question of whether two new techniques of data aggregation and analysis can constitute Fourth Amendment searches. One is a form of genetic identification known as “familial searching,” in which a criminal DNA database is used to identify persons who not meet the legal criteria for inclusion, but happen to be related to people who do. The other is the use of tools such as biometric-equipped video cameras, GPS, 6See, e.g., David Alan Sklansky, Too Much Information: How Not to Think About Privacy and the Fourth Amendment, 102 C AL.L.R EV. 1069 (2014) (arguing that the Fourth Amendment should be interpreted to protect not only informational privacy, but also “zones of personal refuge”)..11/11/14]REASONABLE EXPECTATIONS OF ANONYMITY 4and the metadata from cell phone calls to conduct long-term locational tracking of people’s movements in public.Both of these techniques have faced significant criticism in theprivacy scholarship, and there is language in judicial opinions questioning their legitimacy, but neither the literature nor the judicial opinions have offered a strong legal argument for how they can constitute Fourth Amendment searches. The reason for this is that the constitutional problem cannot be sufficiently explained in terms of privacy.What is needed is the concept of reasonable expectations ofanonymity, which not only reveals the Fourth Amendment interests that are violated by these specific techniques, but also provides a meaningful standard that can be used more generally to determine when data aggregation implicates the Fourth Amendment and when it does not. In these ways, the concept helps solve difficult puzzles left open by the concurring opinions of United States v. Jones .7In addition to providing the analytic power necessary to understandthe unconstitutionality of many new techniques of big data, the incorporation of anonymity in Fourth Amendment jurisprudence will help deliver on the unfulfilled promise of the Supreme Court’s teaching that the Fourth Amendment is meant to protect “people, not places.”8 There are two central ways in which it does so, as the final section of Part III demonstrates.The first is by revealing that the structural features of the world thatare capable of protecting Fourth Amendment interests are far more complex and expansive than the Supreme Court has recognized. Although the Court has moved beyond a property-based conception of Fourth Amendment interests, the only structural features of the world that the Court has recognized as protecting these interests are those that protect the “privacy” side of secrecy: homes, car trunks, envelopes, and other containers all hide facts about a person whose identity might be known. Yet the structures that are capable of maintaining the secrecy of “personal information” are not limited to those that hide the piece of information . Rather, as this Article makes clear, they can also include structures that hide what makes that information personal —i.e., that make it anonymous. For example, the size7In United States v. Jones , Justice Alito explained in concurrence—joined by Justices Ginsburg, Breyer, and Kagan—that he would have held that the 28-day-long GPS tracking of the defendant’s car violated his reasonable expectations of privacy. See United States v. Jones, 132 S.Ct. 945 (2012) (Alito, J., concurring). Justice Sotomayor expressed sympathy with this view in her concurrence, but she ultimately joined the Court’s narrower holding that placing the GPS on the car violated the Fourth Amendment on the grounds that it involved trespass onto the defendant’s private property. Jones , 132 S.Ct. 945 (Sotomayor, J., concurring). However, neither concurrence articulated a rule or standard that could be applied in other cases, nor did they explain why public surveillance information is not—as most courts and scholars have thought—categorically exempted from Fourth Amendment protection by the public exposure doctrine. 8 Katz v. United States, 389 U.S. 347, 351 (1967).11/11/14]REASONABLE EXPECTATIONS OF ANONYMITY 5of a city, the layout of its streets, and the presence of crowds can all contribute to making someone’s public actions anonymous. By uncovering the legal significance of these structures, attention to anonymity opens up new types of public spaces to the Fourth Amendment’s protections.The second and related way in which attention to anonymity canhelp deliver on the promise of the Fourth Amendment is by expanding the sources of law and norms that can provide the basis for its protections. While property law is often cited as the quintessential enabling source of law for reasonable expectations of privacy, reasonable expectations of anonymity may be created by sources of law ranging from whistle-blowing statutes and agency law to copyright and the First Amendment, all of which protect anonymity.9 In the First Amendment context, for example, the Supreme Court has held that “an author’s decision to remain anonymous . . . is an aspect of freedom of speech.”10 Thus, an anonymity-based understanding of Fourth Amendment claims could ground them in new legal and normative foundations, including other constitutionally protected liberties.Further, these two lessons—along with the other insights of thisArticle—are not only applicable to the Fourth Amendment. Rather, as is suggested in the Conclusion, they are relevant to the many other sources of law that provide legal protection to reasonable expectations of privacy. Across all of these domains, attention to the distinct concept of anonymity can reveal important and viable interests in the secrecy of personal information that have gone unrecognized, clarify new ways in which these interests are being threatened, and provide insights into how they can be better protected by our courts and our law.I. R EASONABLE E XPECTATIONS OF P RIVACYA. The Fourth AmendmentThe Fourth Amendment provides people with the right to be “securein their persons, houses, papers, and effects, against unreasonable searches and seizures.”11 Thus, the threshold question in Fourth Amendment jurisprudence is whether a particular government action constitutes a search9See Jeffrey M. Skopek, Anonymity, the Production of Goods, and Institutional Design , 82 F ORDHAM L. R EV . 1751, 1759–62 (2014). 10 McIntyre v. Ohio Elections Comm’n, 514 U.S. 334, 342 (1995). This is just one of many Supreme Court cases to recognize the right. See Chesa Boudin, Publius and the Petition: Doe v. Reed and the History of Anonymous Speech , 120 Y ALE L.J. 2140, 2164–2168 (2011) (discussing the many other Supreme Court cases that have recognized an anonymity right in the First Amendment). 11 U.S. C ONST . AMEND . IV.11/11/14]REASONABLE EXPECTATIONS OF ANONYMITY 6or seizure. If it does, the action must be “reasonable,” which means that it must be based on probable cause and carried out pursuant to a warrant (unless it falls within a judicially defined exception to one of both of these requirements). This Article is concerned with the preliminary question of whether government conduct constitutes a constitutional “search,” which the Supreme Court has defined with two tests.The first test—which was in place from the Founding until 1967,when it was seemingly rejected by the Court, but which the Court has just reaffirmed—is based in property law.12 Under this test, a search consists of a physical trespass onto constitutionally protected areas (i.e., “persons, houses, papers, and effects”) with the intent to collect information.13 A paradigmatic example of this approach is the wiretapping case of Olmstead v. United States ,14 in which the police inserted small wires into the telephone lines outside the defendants’ residences and main office, thereby intercepting conversations that uncovered an illegal conspiracy. Because the insertion of the wires did not require any physical trespass onto the defendants’ property, the Court determined that no Fourth Amendment search had occurred.The second test comes from the Court’s attempt—in the 1967 caseof United States v. Katz 15—to address the limits of the property-based approach in an era of surveillance technologies that no longer required physical trespass.16 Returning to the question of the constitutionality of warrantless wiretapping, the Court held that FBI agents had violated the Fourth Amendment when they attached an electronic recording device to the top of two public telephone booths being used by Katz. In rejecting the property-based approach of Olmstead , the Court explained—in a now canonical line—that the Fourth Amendment “protects people, not places.”17 In addition, in a concurring opinion that created what is now known as the “Katz test,” Justice Harlan explained that a Fourth Amendment “search” occurs when the government intrudes upon “reasonable expectations of privacy.”18 This test consists of both a subjective and an objective prong and asks whether an individual exhibited an actual expectation of privacy, and if so, whether that expectation was one society recognizes as reasonable.12See Jones , 132 S.Ct. 945.13 Id. at n.5. 14 Olmstead v. United States, 277 U. S. 438 (1928). 15 Katz v. United States, 389 U.S. 347 (1967). 16 These technologies were beginning to lead to technical and arbitrary distinctions. For example, in Goldman v. United States , the Court held that no Fourth Amendment search had occurred when a listening device was placed against a wall to monitor conversations in the adjacent office. 316 U.S. 129, 135 (1942). But in Silverman v. United States , the Court found that a Fourth Amendment search had taken place when a “spike mike” penetrated through the defendants’ wall. 365 U.S. 505, 509-10 (1961). 17 Katz , 398 U.S. at 351. 18 Id . (Harlan, J., concurring).11/11/14] REASONABLE EXPECTATIONS OF ANONYMITY 7The case of Katz was a watershed moment in Fourth Amendmentlaw. Under its privacy-based approach, the Fourth Amendment’s protections—which were once limited to an individual’s private property—were extended to the interior of cars, luggage, public restrooms, hospital rooms, changing rooms, hotel rooms, and workplaces.19 The meaning of its reference to “privacy,” however, has been the subject of much confusion.20B. Privacy in the Fourth AmendmentIn order to understand the concept of privacy embedded in the Katz test, one must appreciate the difference between descriptive and normative conceptions of privacy—a topic that has received insufficient attention in the literature. It is therefore worth taking a moment to clarify some of the core the distinctions between and within these categories before turning to an analysis of the conception of privacy that is adopted in Fourth Amendment jurisprudence.1. Normative vs. descriptive conceptions of privacyNormative conceptions of privacy, which have dominated the privacy scholarship, define privacy in terms that incorporate into its meaning the idea that privacy is good thing that deserves moral and legal protection. There are two general forms that this approach has taken.The first defines privacy in terms of the values, or human goods, that privacy fosters or protects. On this type of definition, saying that information about an activity or object is “private” means that it is involved in maintaining or fostering these goods or values. For example, the statement “my inner thoughts are private” might mean something like “my inner thoughts are integral to my autonomy.” This is perhaps the most common approach to defining privacy and can be found in a wide range of scholarship. Some scholars have focused on values that are individually-centered, such as dignity,21 individuality,22 and autonomy;23 others have 19See Allyson Haynes, Virtual Blinds: Finding Online Privacy in Offline Precedents, V AND.J.E NT.&T ECH.L., 621–22 nn. 120–125 (2012) (citing cases).20 The test has been criticized as vague, circular, and ungrounded in the text of the Fourth Amendment. See, e.g., W AYNE R.L A F AVE,S EARCH AND S EIZURE §2.1(d), at 393-95 (3d ed. 1996); Anthony G. Amsterdam, Perspectives on the Fourth Amendment, 58 M INN.L. R EV.349, 358 (1974); Tracey Maclin, What Can Fourth Amendment Doctrine Learn from Vagueness Doctrine?, 3 U.P A.J.C ONST.L. 398, 428-29 (2001); Richard A. Posner, The Uncertain Protection of Privacy by the Supreme Court, 1979 S UP.C T.R EV. 173, 188.21See, e.g., Edward Bloustein, Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser, 39 N.Y.U.L. REV. 962, 971 (1964) (privacy protects an “individual’s independence, dignity and integrity”).22See, e.g.,Jed Rubenfeld, The Right of Privacy, H ARV.L.R EV. 737, 751 (1989) (privacy is “the fundamental freedom not to have one’s life too totally determined by a11/11/14]REASONABLE EXPECTATIONS OF ANONYMITY 8focused on values that are inter-personal, such as friendship,24 intimacy,25 and love;26 and yet others have focused on combinations of these.27 But the key point is that they all take privacy claims to be claims about the protection of certain human goods or values.The second way in which privacy is defined as a normative concept is as a prescriptive feature of certain types of information. On this approach, saying that information about an activity or object is “private” means that is a type of information that others should not try to discover. For example, as Stanley Benn argues, “private matters” are not those that are actually “kept out of sight or from the knowledge of others,” but rather those “that it would be inappropriate for others to try to find out about . . . without one’s consent.”28 Two features of this general approach are worth highlighting. One is that only certain types of information can be properly classified as “private.” For example, Tom Gerety argues that information only implicates privacy concerns if it is related to intimacy, identity, or autonomy.29 Likewise, Richard Parker argues that a loss of secrecy does not always involve a loss of privacy, citing the example of an examination that reveals a student did not study.30 Another important feature is that information can be private even if it is known to others.31 For example, Dan Solove argues that there are activities that “we deem as private” that do not progressively more normalizing state”); Jeffrey H. Reiman, Privacy, Intimacy, and Personhood , 6 P HILOSOPHY & P UBLIC A FFAIRS 26, 43–44 (1976) (“The right to privacy . . . protects the individual’s interest in becoming, being, and remaining a person.”). 23 See, e.g., Ruth Gavison, Privacy and the Limits of Law , 89 Y ALE L.J. 421, 423 (1980) (privacy is valuable in furthering liberty, autonomy, and freedom). 24 See, e.g., James Rachels, Why Privacy Is Important , 4 P HILOSOPHY & P UBLIC A FFAIRS 323, 292 (1975) (“there is a close connection between our ability to control who has access to us and to information about us, and our ability to create and maintain different sorts of social relationships with different people”). 25 See, e.g., Robert S. Gerstein, Intimacy and Privacy , 89 E THICS 76 (1978) (“intimate relationships simply could not exist if we did not continue to insist on privacy for them”); J EFFREY R OSEN , T HE U NWANTED G AZE : T HE D ESTRUCTION OF P RIVACY IN A MERICA 8 (2011). 26 See, e.g., Charles Fried, Privacy , 77 Y ALE L.J. 475, 482 (1968) (defining privacy as “control over knowledge about oneself” that is necessary to protect “fundamental relations” of “respect, love, friendship and trust”). 27 See, e.g., Ronald J. Krotoszynski, The Polysemy of Privacy , 88 I ND . L. J. 881 (2013) 28 Stanley I. Benn, Privacy, Freedom, and Respect for Persons , in P RIVACY AND P ERSONALITY 1-25, at 2 (J. Roland Pennock & John W. Chapman, eds. 1971). 29 Tom Gerety, Redefining Privacy , 12 H ARV . CR-CLL R EV . 233, 281–95 (1977). 30 Richard B. Parker, A Definition of Privacy , 27 R UTGERS L. R EV . 275, 282 (1973). Solove makes a similar point, arguing that “there is a significant amount of information identifiable to us that we do not deem as private.” Daniel J. Solove, Conceptualizing Privacy , 90 C AL . L. R EV . 187, 1111–12 (2002). He suggests, for example, that the fact that a person is a well-known politician is identifiable to that person, but that this fact does not implicate privacy. Id. 31 For a discussion of scholars advancing this general view, see Solove, Conceptualizing Privacy , supra note 30, at 1109.。