Computer Ethics Third-Party Doctrine reasonable expectation of privacy

Qualified Writers
Rated 4.9/5 based on 2480 reviews

100% Plagiarism Free & Custom Written - Tailored to Your Instructions

Third-Party Doctrine

Do you have a “reasonable expectation of privacy” — in the sense of police surveillance — for data held by others?

The “third-party doctrine” says no, or at least that, if we do, it’s too bad for us and the government still does not need a warrant. This was originally determined in the context of:

  • banking records (US v Miller 1976)
  • informants wearing a wire
  • How broadly should the third-party doctrine apply? And if itdoes contradict a reasonable expectation of privacy, which rules should apply?
  • Should the third-party doctrine apply to email? Generally, if you write a letter to someone, and they open it, your letter can be subpoenaed from the recipient. But they can object. No third party ever sees your letter. Email, on the other hand, can usually be subpoenaed directly from the ISP.
  • What about phone metadata? For the metadata of a single individual, this was decided by the Supreme Court in Smith v Maryland, 1979. In that era, third parties held a lot less digital data on each of us than they do now.
  • What about cellphone location data? Traditionally, nearest-tower data has been considered to be a business record. GPS data, however, conceptually requires involvement of your phone, and often isnot considered a business record, though this is a narrow distinction.
  • What about library records? Internet search records? Facebook history? Sometimes the third-party doctrine is defended on the grounds of thetransaction theory of privacy: the third party has just as much interest in the data as you do. This makes some sense for bank records, which the bank does need and use; what about these other records?
  • The Patriot Act made it mandatory to turn over most subpoenaed business records on third parties. Would it help if this were simply voluntary, with a warrant available in case a third party refused and the requirements for a warrant could be met? Or should “business records” be interpreted narrowly, and perhaps not so as to include other data?
  • One common pro-warrant, anti-third-party argument is that it’s just not that hard for the police to get a warrant, and they should have to do so whenever the information sought is moderately intrusive.

See the course notes Orin Kerr, in defending the third-party doctrine, acknowledged it is sometimes thought of as the Fourth Amendment rule scholars love to hate

 

Topic option 2: Defamation Policy

You and two friends, Alice and Bob, are starting a new website in which user comments figure prominently. Users comment on various products and also on the reviews and comments provided by other users. Users can also post pictures. Your goal is to create a social-network feel to the site, although all posts will be public and users will be rewarded with coupons. You anticipate that the majority of users will use their real names on the site, though pseudonyms are permitted.

Right now you’ve agreed to a policy allowing the deletion of profanity and obvious insults. However, you’re having more trouble agreeing to a policy for dealing with defamatory comments that don’t fit into the obvious profanity/insult categories. Alice has argued
We don’t need to do anything; section 230 of the CDA clearly means we have no liability for what our users post, and thus no obligation to remove false, hostile or libelous content. Many other sites, such as youtube.com and aol.com, don’t seem to remove such content. How would we determine if an allegedly defamatory post is in fact true? Would we have to post the other side’s position? The bottom line is that we’d be censoring someone’s post based on a complaint that may or may not be well founded. We already know from prior experience that if users say something negative about a product, corporate sock puppets will take offense and demand action. We have to stand firm.

Bob is not so sure; his position is that
We simply should not let hostile or defamatory content remain. At the very least, the possibility that they could be the victim of such an attack will discourage other users; we want toencourage our users! We need to have a clear standard of behavior; this is about “takedown” and not about arguing the points of libel.The bottom line is that we cannot side with injustice, any more than we can side with harassment.
Your job is to propose a policy and then argue in support of it. If you leave something out of the policy, such as a way for users to complain that they have been unfairly depicted, be sure you explain why you don’t think the feature is necessary. You should also make clear whether features of your policy are there to address legal risk to the site or are there to make users feel more comfortable.

You can take a legalistic approach, an ethical approach, or a combination. When making ethical arguments in a business context it is sometimes helpful to recognize that ethical behavior can be closely tied to a business’s own long-term self-interest.

Option 2a: Discuss the legal conflicts between “revenge-porn” bans and §230. For this you will have to be prepared to do a little more research.

Your paper (either topic) will be graded primarily on organization (that is, how you lay out your sequence of paragraphs), focus (that is, whether you stick to the topic), and the nature and completeness of your arguments.

It is essential that all material from other sources be enclosed in quotation marks (or set off as a block quote), and preferably with a citation to the original source as well.

Expected length: 3-5 pages (1000+ words)

Price: £69

100% Plagiarism Free & Custom Written - Tailored to Your Instructions