-
1
-
-
77955323465
-
-
MySpace-Barack Obama, last visited Nov. 13
-
MySpace-Barack Obama, http://www.myspace.com/barackobama (last visited Nov. 13, 2009).
-
(2009)
-
-
-
2
-
-
77955341316
-
-
Although Andy's story is of my imagination, it may soon be routine if we permit Government 2.0 to proceed unchecked
-
Although Andy's story is of my imagination, it may soon be routine if we permit Government 2.0 to proceed unchecked.
-
-
-
-
3
-
-
77955326179
-
-
Federal agencies share intelligence and information with state and federal agencies and law enforcement through fusion centers, which facilitate the "information sharing environment" mandated by Congress in the Intelligence Reform and Terrorism Prevention Act of 2004
-
Federal agencies share intelligence and information with state and federal agencies and law enforcement through fusion centers, which facilitate the "information sharing environment" mandated by Congress in the Intelligence Reform and Terrorism Prevention Act of 2004.
-
-
-
-
4
-
-
77955324766
-
-
See Danielle Keats Citron & Frank Pasquale, Fixing Fusion Centers: Restoring Liberty and Enhancing Security in the Post-9/11 World 10 unpublished manuscript, on file with author
-
See Danielle Keats Citron & Frank Pasquale, Fixing Fusion Centers: Restoring Liberty and Enhancing Security in the Post-9/11 World 10 (unpublished manuscript, on file with author).
-
-
-
-
5
-
-
77955338709
-
Are you on the list?
-
Sept. 30
-
Gerri Willis, Are You on the List?, CNN, Sept. 30, 2009, http://www.cnn.com/video/#/video/crime/2009/09/30/willis.fusion. centers.cnn.
-
(2009)
Cnn
-
-
Willis, G.1
-
6
-
-
77955317944
-
Arrest exposes state's threats list: Activist's rights trampled, rett, state lawmakers say
-
Jan. 9
-
Gregory B. Hladky, Arrest Exposes State's Threats List: Activist's Rights Trampled, Rett, State Lawmakers Say, NEW HAVEN REG., Jan. 9, 2007, at A1.
-
(2007)
New Haven Reg.
-
-
Hladky, G.B.1
-
7
-
-
77955341625
-
-
Id
-
Id.
-
-
-
-
8
-
-
77955340439
-
Arrest of activist troubles hartford officials
-
Jan. 9
-
Jennifer Medina, Arrest of Activist Troubles Hartford Officials, N. Y. TIMES, Jan. 9, 2007, at B6.
-
(2007)
N. Y. Times
-
-
Medina, J.1
-
9
-
-
77955333899
-
-
Transparency and Open Government, Jan. 21
-
Transparency and Open Government, 74 Fed. Reg. 4685 (Jan. 21, 2009).
-
(2009)
Fed. Reg
, vol.74
, pp. 4685
-
-
-
10
-
-
77955315096
-
-
White House, last visited Nov. 13, urging the public to connect with the White House on MySpace, Facebook, Twitter, iTunes, YouTube, Vimeo, LinkedIn, and Flickr
-
The White House, http://www.whitehouse.gov/(last visited Nov. 13, 2009) (urging the public to connect with the White House on MySpace, Facebook, Twitter, iTunes, YouTube, Vimeo, LinkedIn, and Flickr).
-
(2009)
-
-
-
11
-
-
77955332996
-
-
Social Media at CDC, last visited Nov. 13
-
Social Media at CDC, http://www.cdc.gov/socialmedia/(last visited Nov. 13, 2009).
-
(2009)
-
-
-
12
-
-
77955322762
-
-
Outreach at Earth System Research Laboratory, last visited Nov. 13
-
Outreach at Earth System Research Laboratory, http://www.esrl.noaa.gov/ outreach/(last visited Nov. 13, 2009).
-
(2009)
-
-
-
13
-
-
77955310299
-
-
This Essay focuses on government's use of social media, i.e., networked technologies that enable the production and sharing of digital content in mediated social settings. This characterization includes social-network sites where users post personal information, view their network of relations to others, and communicate with others in their network
-
This Essay focuses on government's use of social media, i.e., networked technologies that enable the production and sharing of digital content in mediated social settings. This characterization includes social-network sites where users post personal information, view their network of relations to others, and communicate with others in their network.
-
-
-
-
14
-
-
37249053884
-
Social network sites: Definition, history, and scholarship
-
See danah m. boyd, &, discussing social-network sites like MySpace, Facebook, YouTube, Flickr, Bebo, LinkedIn, etc.
-
See danah m. boyd & Nicole B. Ellison, Social Network Sites: Definition, History, and Scholarship, 13 J. COMPUTER-MEDIATED COMM. 210, 211 (2008) (discussing social-network sites like MySpace, Facebook, YouTube, Flickr, Bebo, LinkedIn, etc.);
-
(2008)
J. Computer-Mediated Comm
, vol.13
, Issue.210
, pp. 211
-
-
Ellison, N.B.1
-
16
-
-
77955672754
-
Emergency managers and first responders use twitter and facebook to update communities
-
July 27
-
See Hilton Collins, Emergency Managers and First Responders Use Twitter and Facebook to Update Communities, EMERGENCY MGMT., July 27, 2009, http://www.emergency mgmt.com/safety/Emergency-Managers-and-First.htral.
-
(2009)
Emergency Mgmt.
-
-
Collins, H.1
-
17
-
-
77955327360
-
-
Data.gov, "The purpose of Data.gov is to increase public access to high value, machine readable datasets generated by the Executive Branch of the Federal Government."
-
See, e.g., Data.gov, http://www.data.gov/("The purpose of Data.gov is to increase public access to high value, machine readable datasets generated by the Executive Branch of the Federal Government.").
-
-
-
-
18
-
-
77955327029
-
-
Beth Simone Noveck, Wiki Government: How Technology Can Make Government Better, Democracy Stronger, and Citizens More Powerful
-
Beth Simone Noveck, Wiki Government: How Technology Can Make Government Better, Democracy Stronger, and Citizens More Powerful 20-21, 40-42 (2009);
-
(2009)
, vol.40-42
, pp. 20-21
-
-
-
19
-
-
77955337076
-
Twitter: Five lessons for emergency managers from iran
-
Opinion, June 23
-
Eric E. Holdeman, Opinion, Twitter: Five Lessons for Emergency Managers from Iran, GOV'T TECH., June 23, 2009, http://www.govtech.com/gt/697201;
-
(2009)
Gov't Tech.
-
-
Holdeman, E.E.1
-
20
-
-
79951867801
-
Open code governance
-
see also, arguing that an open code model for governance can encourage public participation in the administrative state, improve political accountability, and marshal expertise
-
see also Danielle Keats Citron, Open Code Governance, 2008 U. CHI. LEGAL F. 355, 358 (arguing that an open code model for governance can encourage public participation in the administrative state, improve political accountability, and marshal expertise).
-
(2008)
U. Chi. Legal F.
, vol.355
, pp. 358
-
-
Citron, D.K.1
-
21
-
-
77955311091
-
-
Many individuals might not have interacted with government about policy due to the considerable transaction costs associated with writing letters, calling agency staffers, and submitting comments on rulemaking. They also may have declined to do so due to their age and life experiences. In the past, younger Americans may not have engaged with executive agencies and the White House because government may have seemed too remote or disinterested in their concerns. As the 2008 presidential election demonstrates, today's youth has become increasingly involved with political campaigns and government decisionmaking, both offline and online
-
Many individuals might not have interacted with government about policy due to the considerable transaction costs associated with writing letters, calling agency staffers, and submitting comments on rulemaking. They also may have declined to do so due to their age and life experiences. In the past, younger Americans may not have engaged with executive agencies and the White House because government may have seemed too remote or disinterested in their concerns. As the 2008 presidential election demonstrates, today's youth has become increasingly involved with political campaigns and government decisionmaking, both offline and online.
-
-
-
-
22
-
-
77955334911
-
-
Pew Internet and American Life Project recently reported that thirty-seven percent of social-network site users expect updates from the Obama Administration via social-network sites and thirty-four percent expect to hear from the Administration via email, available
-
The Pew Internet and American Life Project recently reported that thirty-seven percent of social-network site users expect updates from the Obama Administration via social-network sites and thirty-four percent expect to hear from the Administration via email. AARON SMITH, PEW INTERNET & AM. LIFE PROJECT, PEW INTERNET PROJECT DATA MEMO 1 (2008), available at http://www.pewinternet.org/~/media//Files/Reports/PIP-Voter-Engagement-2008.df;
-
(2008)
Aaron Smith, Pew Internet & Am. Life Project, Pew Internet Project Data Memo
, vol.1
-
-
-
23
-
-
77955311280
-
-
see also, &, available at, documenting the public's avid involvement in the 2008 campaign
-
see also AARON SMITH, PEW INTERNET & AM. LIFE PROJECT, THE INTERNET'S ROLE IN CAMPAIGN 2008 (2009), available at http://www.pewinternet.org/~/media// Files/Reports/2009/The-Internets-Role-in-Campaign-2008.df (documenting the public's avid involvement in the 2008 campaign).
-
(2009)
Am. Life Project, the Internet's Role in Campaign 2008
-
-
Aaron, S.1
Pew, I.2
-
24
-
-
33845336522
-
Friends, friendsters, and top 8: Writing community into being on social network sites
-
See danah boyd, Dec. 4, suggesting that social-network sites create a community through the process of "friending"
-
See danah boyd, Friends, Friendsters, and Top 8: Writing Community into Being on Social Network Sites, FIRST MONDAY, Dec. 4, 2006, http://firstmonday. org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1418/1336 (suggesting that social-network sites create a community through the process of "friending").
-
(2006)
First Monday
-
-
-
25
-
-
68949182898
-
Saving facebook
-
James Grimmelmann, Saving Facebook, 94 IOWA L. REV. 1137, 1159 (2009).
-
(2009)
Iowa L. Rev.
, vol.94
, Issue.1137
, pp. 1159
-
-
Grimmelmann, J.1
-
26
-
-
77955326343
-
-
Id
-
Id. at 1159-60.
-
-
-
-
27
-
-
77955333189
-
Social-network sites like myspace and facebook are less about networking as they are about socializing inside of preexisting networks. Danah boyd
-
Feb. 26
-
Social-network sites like MySpace and Facebook are less about networking as they are about socializing inside of preexisting networks. danah boyd, Social Media Is Here to Stay... Now What?, Feb. 26, 2009, http://www.danah.org/papers/ talks/MSRTechFest2009.html.
-
(2009)
Social Media is Here to Stay... Now What?
-
-
-
28
-
-
77955328888
-
-
Although this Essay refers to microblogging sites like Twitter in passing, it does not focus on them, as they may engender privacy norms that differ from social-network sites and the like. Compare danah boyd, supra note 20 explaining that Twitter users see their activities as involving the "public square" and hope to garner the attention of the wider public, with Stutzman & Hartzog, supra note 12, explaining that individuals often maintain separate work and personal Twitter accounts due to privacy concerns
-
Although this Essay refers to microblogging sites like Twitter in passing, it does not focus on them, as they may engender privacy norms that differ from social-network sites and the like. Compare danah boyd, supra note 20 (explaining that Twitter users see their activities as involving the "public square" and hope to garner the attention of the wider public), with Stutzman & Hartzog, supra note 12, at 13 (explaining that individuals often maintain separate work and personal Twitter accounts due to privacy concerns).
-
-
-
-
29
-
-
77955335747
-
-
As Part I explains, social-media providers treat agencies like any other users of their service, thus permitting them to access their friends' social-media information if their privacy settings permit. To date, only Facebook does not follow this model; instead, agencies generate "fans, " not friends, there. While agency Facebook "fans" can comment on an agency's postings and interact on live chats about policymaking, government cannot view their fans' profiles in their entirety
-
As Part I explains, social-media providers treat agencies like any other users of their service, thus permitting them to access their friends' social-media information if their privacy settings permit. To date, only Facebook does not follow this model; instead, agencies generate "fans, " not friends, there. While agency Facebook "fans" can comment on an agency's postings and interact on live chats about policymaking, government cannot view their fans' profiles in their entirety.
-
-
-
-
30
-
-
77955328422
-
-
This Essay uses the terms social-media data, social-network information, and social-network data interchangeably to refer to information revealed on social-media sites that does not involve feedback on policy matters
-
This Essay uses the terms social-media data, social-network information, and social-network data interchangeably to refer to information revealed on social-media sites that does not involve feedback on policy matters.
-
-
-
-
31
-
-
77955314227
-
-
See ARISTOTLE, Book 1, in POLITICS, H. Rackham trans., Harvard Univ. Press, explaining his concept of the public state and the private family
-
See ARISTOTLE, Book 1, in POLITICS 3-13 (H. Rackham trans., Harvard Univ. Press 1944) (1932) (explaining his concept of the public state and the private family);
-
(1932)
, pp. 3-13
-
-
-
32
-
-
77955331086
-
-
Gertrude Himmelfarb ed., Penguin Books, discussing the interaction between the struggle of liberty-the private self-and authority-the public sphere
-
JOHN STUART MILL, ON LIBERTY 68-74 (Gertrude Himmelfarb ed., Penguin Books 1974) (1859) (discussing the interaction between the struggle of liberty-the private self-and authority-the public sphere).
-
(1859)
On Liberty
, pp. 68-74
-
-
John, S.M.1
-
33
-
-
0040441903
-
The stages of the decline of the public/private distinction
-
Duncan Kennedy has explained that the public/private distinction is so incoherent that it cannot help us describe, explain, or justify anything
-
Duncan Kennedy has explained that the public/private distinction is so incoherent that it cannot help us describe, explain, or justify anything. Duncan Kennedy, The Stages of the Decline of the Public/Private Distinction, 130 U. PA. L. REV. 1349 (1982).
-
(1982)
U. Pa. L. Rev.
, vol.130
, pp. 1349
-
-
Kennedy, D.1
-
34
-
-
0038922566
-
The public-private distinction in american law and life
-
arguing that the public/private distinction collapses on itself, has no objective content, and is incoherent. For example, the economy involves the public arena for some; it implicates the private sphere for others
-
Alan Freeman & Elizabeth Mensch, The Public-Private Distinction in American Law and Life, 36 BUFF. L. REV. 237, 247-50 (1987) (arguing that the public/private distinction collapses on itself, has no objective content, and is incoherent). For example, the economy involves the public arena for some; it implicates the private sphere for others.
-
(1987)
Buff. L. Rev.
, vol.36
, Issue.237
, pp. 247-50
-
-
Freeman, A.1
Mensch, E.2
-
35
-
-
77955326519
-
-
Id
-
Id. at 250-52.
-
-
-
-
36
-
-
77955311447
-
-
Cf. JEFFREY ROSEN, THE UNWANTED GAZE: THE DESTRUCTION OF PRIVACY IN AMERICA 66-70, noting that employees create privacy spaces in public workplaces. Stutzman and Hartzog argue that social-network sites defy the public/private categorization-users have privacy expectations that instead fall along a continuum, from complete anonymity, to practical obscurity, to complete transparency. Stutzman & Hartzog, supra note 12
-
Cf. JEFFREY ROSEN, THE UNWANTED GAZE: THE DESTRUCTION OF PRIVACY IN AMERICA 66-70 (2001) (noting that employees create privacy spaces in public workplaces). Stutzman and Hartzog argue that social-network sites defy the public/private categorization-users have privacy expectations that instead fall along a continuum, from complete anonymity, to practical obscurity, to complete transparency. Stutzman & Hartzog, supra note 12, at 14.
-
(2001)
, pp. 14
-
-
-
37
-
-
77955318601
-
Government agencies make friends with new media
-
Mar. 25
-
Chris Snyder, Government Agencies Make Friends with New Media, WIRED, Mar. 25, 2009, http://www.wired.com/epicenter/2009/03/government-agen/.
-
(2009)
Wired
-
-
Snyder, C.1
-
38
-
-
77955333899
-
-
Transparency and Open Government, Jan. 21
-
Transparency and Open Government, 74 Fed. Reg. 4685 (Jan. 21, 2009);
-
(2009)
Fed. Reg
, vol.74
, pp. 4685
-
-
-
39
-
-
77955333899
-
White house 2.0
-
see also, posting to The White House Blog May 1, 14:03 EDT, Transparency and Open Government, Jan. 21, 2009
-
see also Macon Phillips, White House 2.0, posting to The White House Blog (May 1, 2009, 14:03 EDT), http://www.whitehouse.gov/blog/09/05/01/WhiteHouse/.
-
(2009)
Fed. Reg.
, vol.74
, pp. 4685
-
-
Phillips, M.1
-
40
-
-
77955333899
-
Transparency and Open Government
-
Jan. 21
-
Transparency and Open Government, 74 Fed. Reg. 4685 (Jan. 21, 2009).
-
(2009)
Fed. Reg.
, vol.74
, pp. 4685
-
-
-
41
-
-
77955329726
-
-
posting to The White House Blog June 10, 13:08 EDT
-
Beth Noveck, Enhancing Citizen Participation in Decision-Making, posting to The White House Blog (June 10, 2009, 13:08 EDT), http://www.whitehouse.gov/ blog/Enhancing-Citizen-Participation-in-Decision-Making/.
-
(2009)
Enhancing Citizen Participation in Decision-Making
-
-
Noveck, B.1
-
42
-
-
77955324605
-
Facebook hits a quarter billion users
-
Facebook now has over 250 million members, July 15, MySpace has over 100 million members
-
Facebook now has over 250 million members. Caroline McCarthy, Facebook Hits a Quarter Billion Users, CNET NEWS (July 15, 2009), http://news.cnet.com/ 8301-13577-3-10287336-36.html. MySpace has over 100 million members.
-
(2009)
Cnet News
-
-
Mccarthy, C.1
-
43
-
-
77955338875
-
-
Doe v. MySpace, Inc., n. 8 W. D. Tex
-
Doe v. MySpace, Inc., 474 F. Supp. 2d 843, 851 n. 8 (W. D. Tex. 2007);
-
(2007)
F. Supp. 2d
, vol.474
, Issue.843
, pp. 851
-
-
-
44
-
-
77955328421
-
Myspace cranks up heat in facebook turf war
-
see also, Dec. 23, at 1B. They have different audiences in these networked environments-MySpace and Facebook communities tend to have different socioeconomic backgrounds, ages, nationalities, etc
-
see also Jon Swartz, MySpace Cranks Up Heat in Facebook Turf War, USA TODAY, Dec. 23, 2007, at 1B. They have different audiences in these networked environments-MySpace and Facebook communities tend to have different socioeconomic backgrounds, ages, nationalities, etc.
-
(2007)
Usa Today
-
-
Swartz, J.1
-
45
-
-
77955315905
-
-
See danah boyd, supra note 20
-
See danah boyd, supra note 20.
-
-
-
-
46
-
-
77955338874
-
-
posting to The New York Times Bits Blog Mar. 5, 14:57 EST
-
Saul Hansell, The Nation's New Chief Information Officer Speaks, posting to The New York Times Bits Blog (Mar. 5, 2009, 14:57 EST), http://bits.blogs. nytimes.com/2009/03/05/thenations-new-chief-information-officer-speaks/.
-
(2009)
The Nation's New Chief Information Officer Speaks
-
-
Hansell, S.1
-
47
-
-
77955329728
-
-
White House, posting to Facebook-The White House Aug. 6, 14:20 EST
-
The White House, posting to Facebook-The White House (Aug. 6, 2009, 14:20 EST), http://www.facebook.com/WhiteHouse.
-
(2009)
-
-
-
48
-
-
77955328887
-
-
YouTube-FEMA's Channel, last visited Nov. 13, The Federal Trade Commission has a YouTube channel as well. You-Tube-FTCvideo's Channel, http://www.youtube.com/user/FTCvideos, last visited Nov. 13, 2009
-
YouTube-FEMA's Channel, http://www.youtube.com/user/fema?blend=1&ob=4 (last visited Nov. 13, 2009). The Federal Trade Commission has a YouTube channel as well. You-Tube-FTCvideo's Channel, http://www.youtube.com/user/ FTCvideos (last visited Nov. 13, 2009).
-
(2009)
-
-
-
49
-
-
77955323803
-
-
U. S. Department of State Company Profile, LinkedIn, last visited Nov. 13
-
U. S. Department of State Company Profile, LinkedIn, http://www.linkedin. com/companies/u.s.-department-of-state (last visited Nov. 13, 2009).
-
(2009)
-
-
-
50
-
-
77649107205
-
From wikinomics to government 2.0
-
Opinion, May 12
-
L. Gordon Crovitz, Opinion, From Wikinomics to Government 2.0, WALL ST. J., May 12, 2008, at A13.
-
(2008)
Wall St. J.
-
-
Crovitz, L.G.1
-
51
-
-
77955317110
-
Emergency managers and first responders use twitter and facebook to update communities
-
July 27
-
See Hilton Collins, Emergency Managers and First Responders Use Twitter and Facebook to Update Communities, GOV'T TECH., July 27, 2009, http://www.govtech.com/gt/701799.
-
(2009)
Gov't Tech.
-
-
Collins, H.1
-
52
-
-
77955323632
-
-
Id
-
Id.
-
-
-
-
53
-
-
77955333251
-
-
posting to The New York Times Bits Blog May 4, 10:24 EDT
-
Saul Hansell, Should the White House Be a Place for Friends?, posting to The New York Times Bits Blog (May 4, 2009, 10:24 EDT), http://bits.blogs. nytimes.com/2009/05/04/should-thewhite-house-be-a-place-for-friends/.
-
(2009)
Should the White House Be A Place for Friends?
-
-
Hansell, S.1
-
54
-
-
77955330765
-
-
Id
-
Id.
-
-
-
-
55
-
-
77955330062
-
-
Interview with Clay Shirky by Meet the Innovators June 15, available online in mp3 format
-
Interview with Clay Shirky by Meet the Innovators (June 15, 2009), http://media.bonnint.net/wtop/15/1560/156071.mp3 (available online in mp3 format).
-
(2009)
-
-
-
56
-
-
77955316575
-
-
NAACP v. Alabama, 466, striking down Alabama court order requiring NAACP to produce list of its members on the grounds that privacy in group association is indispensable to preserving the freedom to associate
-
NAACP v. Alabama, 357 U. S. 449, 453, 466 (1958) (striking down Alabama court order requiring NAACP to produce list of its members on the grounds that privacy in group association is indispensable to preserving the freedom to associate).
-
(1958)
U. S.
, vol.357
, Issue.449
, pp. 453
-
-
-
58
-
-
77955331545
-
Spying uncovered
-
July 18
-
Nick Madigan, Spying Uncovered, BALT. SUN, July 18, 2008, at 1A.
-
(2008)
Balt. Sun
-
-
Madigan, N.1
-
59
-
-
80052772870
-
Spying on pacifists: Greens and nuns
-
Dec. 7, available
-
Bob Drogin, Spying on Pacifists: Greens and Nuns, L. A. TIMES, Dec. 7, 2008, at A18, available at http://articles.latimes.com/2008/dec/07/nation/na- cop-spy7;
-
(2008)
L. A. Times
-
-
Drogin, B.1
-
60
-
-
77955320632
-
Maryland police surveillance listed some activists as terrorists
-
Oct. 8
-
Lisa Rein, Maryland Police Surveillance Listed Some Activists as Terrorists, WASH. POST, Oct. 8, 2008, at B1.
-
(2008)
Wash. Post
-
-
Rein, L.1
-
61
-
-
77955323802
-
-
See supra note 3
-
See supra note 3.
-
-
-
-
62
-
-
77955310622
-
-
MO. INFO. ANALYSIS CTR., available
-
MO. INFO. ANALYSIS CTR., MIAC STRATEGIC REPORT: THE MODERN MILITIA MOVEMENT (2009), available at http://www.firearmscoalition.org/images/news/miac- militia-2009.df.
-
(2009)
Miac Strategic Report: The Modern Militia Movement
-
-
-
63
-
-
77955332677
-
Agency apologizes for militia report on candidates
-
Mar. 25, The fusion center intended the report only for the eyes of police officers-it was made public after being leaked on the Internet
-
Chad Livengood, Agency Apologizes for Militia Report on Candidates, SPRING-FIELD NEWS-LEADER (MO.), Mar. 25, 2009, at 1A. The fusion center intended the report only for the eyes of police officers-it was made public after being leaked on the Internet.
-
(2009)
Spring-Field News-Leader (Mo.)
-
-
Livengood, C.1
-
64
-
-
77955339114
-
-
Id. The fusion center apologized to former presidential candidates Ron Paul, Bob Barr, and Chuck Baldwin for linking them to the modern militia movement in the report
-
Id. The fusion center apologized to former presidential candidates Ron Paul, Bob Barr, and Chuck Baldwin for linking them to the modern militia movement in the report.
-
-
-
-
65
-
-
77955334240
-
-
Id. The Missouri fusion center has ceased distribution of the February 20, report
-
Id. The Missouri fusion center has ceased distribution of the February 20, 2009 report.
-
(2009)
-
-
-
67
-
-
77955325731
-
-
While a traditional investigation might require police to obtain a warrant to gain access to sensitive personal information residing on a person's computer, for instance, there is no such requirement for Government 2.0 sites, which may give government access to similarly revealing personal information that individuals voluntarily post
-
While a traditional investigation might require police to obtain a warrant to gain access to sensitive personal information residing on a person's computer, for instance, there is no such requirement for Government 2.0 sites, which may give government access to similarly revealing personal information that individuals voluntarily post.
-
-
-
-
69
-
-
77955327201
-
-
Id.
-
Id. at 129-33;
-
-
-
-
70
-
-
77955324276
-
Visionary pragmatism and the value of privacy in the information age
-
see, & 1114, reviewing Daniel J. Solove's Understanding Privacy
-
see Danielle Keats Citron & Leslie Meltzer Henry, Visionary Pragmatism and the Value of Privacy in the Information Age, 108 MICH. L. REV. 1107, 1114 (2010) (reviewing Daniel J. Solove's Understanding Privacy).
-
(2010)
Mich. L. Rev.
, vol.108
, pp. 1107
-
-
Citron, D.K.1
Henry, L.M.2
-
71
-
-
77955317435
-
-
It is crucial to note that nothing suggests that agencies have already engaged in such secondary use of their friends' social-media data. This Essay urges government to adopt policies that would preclude this possibility, which the law, to date, largely does not
-
It is crucial to note that nothing suggests that agencies have already engaged in such secondary use of their friends' social-media data. This Essay urges government to adopt policies that would preclude this possibility, which the law, to date, largely does not.
-
-
-
-
72
-
-
77955337075
-
-
supra note 3
-
Citron & Pasquale, supra note 3, at 12-13.
-
-
-
Citron1
Pasquale2
-
73
-
-
77955340438
-
-
GOV'T TECH., Sept, at, In The Netherlands, law enforcement agencies use social-network data to learn about criminal activity and to monitor affiliates of known criminals
-
Jim McKay, The New Neighborhood Watch, GOV'T TECH., Sept. 2009, at 24. In The Netherlands, law enforcement agencies use social-network data to learn about criminal activity and to monitor affiliates of known criminals.
-
(2009)
The New Neighborhood Watch
, pp. 24
-
-
Mckay, J.1
-
74
-
-
77955336902
-
-
unpublished manuscript, available
-
Joseph Bonneau et al., Prying Data Out of a Social Network (2008) (unpublished manuscript), available at http://www.cl.cam.ac.uk/~jra40/ publications/2009-ASONAM-prying-data.df.
-
(2008)
Prying Data out of a Social Network
-
-
Bonneau, J.1
-
75
-
-
77955310783
-
-
supra note 55, at, I use this example not to suggest that law enforcement may never use social-network data in their investigations. Quite the contrary. As Part III discusses, the one-way mirror policy ought to be cabined to instances where government uses social-network sites to garner feedback on government policy and to engage citizens in democratic discourse. Government could use other social-network data for investigative purposes if the law so permits
-
McKay, supra note 55, at 28. I use this example not to suggest that law enforcement may never use social-network data in their investigations. Quite the contrary. As Part III discusses, the one-way mirror policy ought to be cabined to instances where government uses social-network sites to garner feedback on government policy and to engage citizens in democratic discourse. Government could use other social-network data for investigative purposes if the law so permits.
-
-
-
Mckay1
-
76
-
-
77955312452
-
-
GOV'T TECH., July 30, It appears that the Denver fusion center obtained social-media data from the Internet, i.e., information that individuals released to the public through blogging and social-network sites. This example demonstrates law enforcement's use of social-media data generally, not the sharing of Government 2.0 data with fusion centers and the like
-
Jeannette Sutton, The Public Uses Social Networking During Disasters to Verify Facts, Coordinate Information, GOV'T TECH., July 30, 2009, http://www.govtech.com/gt/706523. It appears that the Denver fusion center obtained social-media data from the Internet, i.e., information that individuals released to the public through blogging and social-network sites. This example demonstrates law enforcement's use of social-media data generally, not the sharing of Government 2.0 data with fusion centers and the like.
-
(2009)
The Public Uses Social Networking During Disasters to Verify Facts, Coordinate Information
-
-
Sutton, J.1
-
77
-
-
77955314407
-
Pentagon sets its sights on social networking sites
-
Paul Marks, Pentagon Sets Its Sights on Social Networking Sites, NEW SCIENTIST, June 9, 2006, http://www.newscientist.com/article/iTigl9025556.200- pentagon-sets-its-sights-on-social-net working-websites.html?full=true.
-
New Scientist, June 9
-
-
Marks, P.1
-
78
-
-
77955312960
-
-
See supra notes 5-7 and accompanying text discussing the arrest of Ken Krayeske at a gubernatorial inaugural parade in Connecticut because law enforcement identified him as a potential threat due to his blog posts urging others to protest the parade, his work on Green Party campaigns, and his prior arrest at an antiwar rally
-
See supra notes 5-7 and accompanying text (discussing the arrest of Ken Krayeske at a gubernatorial inaugural parade in Connecticut because law enforcement identified him as a potential threat due to his blog posts urging others to protest the parade, his work on Green Party campaigns, and his prior arrest at an antiwar rally).
-
-
-
-
79
-
-
77955329092
-
Police pay flying visit to halt 30th birthday party
-
London, July 17
-
Police Pay Flying Visit to Halt 30th Birthday Party, TIMES (London), July 17, 2009, at 27.
-
(2009)
Times
, pp. 27
-
-
-
80
-
-
77955336405
-
-
Id. According to the host, the police arrived in a helicopter to "stop 15 people eating burgers." Id
-
Id. According to the host, the police arrived in a helicopter to "stop 15 people eating burgers." Id.
-
-
-
-
81
-
-
77954749027
-
Technological due process
-
1274-75, discussing the misidentifications that occur because of the "No Fly" computer matching system
-
See Danielle Keats Citron, Technological Due Process, 85 WASH. U. L. REV. 1249, 1274-75 (2008) (discussing the misidentifications that occur because of the "No Fly" computer matching system).
-
(2008)
Wash. U. L. Rev.
, vol.85
, pp. 1249
-
-
Citron, D.K.1
-
83
-
-
77955321939
-
Mainstreaming privacy torts
-
forthcoming, exploring the reputational damage inflicted when information is read online out of its original context
-
See Danielle Keats Citron, Mainstreaming Privacy Torts, 98 CAL. L. REV. (forthcoming 2010) (exploring the reputational damage inflicted when information is read online out of its original context).
-
(2010)
Cal. L. Rev.
, vol.98
-
-
Citron, D.K.1
-
84
-
-
77955331085
-
-
This concern might apply to social-network sites that permit users to become fans of government agencies if government can access the names of their fans' friends, which it appears that Facebook does. See Facebook Help Center, last visited Nov. 13, 2009 "Pages cannot see the profiles of their fans. They can only see the profile photo and the name of each of their fans."
-
This concern might apply to social-network sites that permit users to become fans of government agencies if government can access the names of their fans' friends, which it appears that Facebook does. See Facebook Help Center, http://www.facebook.com/heIp/?faq=12277 (last visited Nov. 13, 2009) ("Pages cannot see the profiles of their fans. They can only see the profile photo and the name of each of their fans.");
-
-
-
-
85
-
-
77955331408
-
-
see also, supra note 55
-
see also Bonneau et al., supra note 55.
-
-
-
Bonneau1
-
86
-
-
77955313707
-
-
supra note 19
-
Grimmelmann, supra note 19, at 1174.
-
-
-
Grimmelmann1
-
87
-
-
77955313434
-
Project 'gaydar,'
-
Sept. 20, at, available
-
Carolyn Y. Johnson, Project 'Gaydar,' BOSTON GLOBE, Sept. 20, 2009, at K1, available at http://www.boston.com/bostonglobe/ideas/articles/2009/09/20/ project-gaydar-an-mit-experiment-raises-new-questions-about-online-privacy?mode= PF.
-
(2009)
Boston Globe
-
-
Johnson, C.Y.1
-
88
-
-
77955339410
-
-
Id
-
Id.
-
-
-
-
89
-
-
77955337413
-
-
Id
-
Id.
-
-
-
-
90
-
-
70449815865
-
Freedom of association in a networked world: First amendment regulation of relational surveillance
-
759-60
-
Katherine J. Strandburg, Freedom of Association in a Networked World: First Amendment Regulation of Relational Surveillance, 49 B. C. L. REV. 741, 759-60 (2008).
-
(2008)
B. C. L. Rev.
, vol.49
, pp. 741
-
-
Strandburg, K.J.1
-
91
-
-
77955338246
-
-
Id
-
Id.
-
-
-
-
92
-
-
77955317434
-
-
Individuals may find it easier to censor themselves than to de-friend an agency or executive department. Individuals also may be unaware that they could de-friend an agency
-
Individuals may find it easier to censor themselves than to de-friend an agency or executive department. Individuals also may be unaware that they could de-friend an agency.
-
-
-
-
93
-
-
77955323974
-
-
3d ed, Christopher Slobogin has argued that governmental surveillance of expressive activities, such as a speech at a park rally, can chill conduct, even though it takes place in public and is meant to be seen by others
-
DANIEL J. SOLOVE & PAUL SCHWARTZ, INFORMATION PRIVACY LAW 525-26 (3d ed. 2009). Christopher Slobogin has argued that governmental surveillance of expressive activities, such as a speech at a park rally, can chill conduct, even though it takes place in public and is meant to be seen by others.
-
(2009)
Information Privacy Law
, pp. 525-26
-
-
Daniel, J.S.1
Paul, S.2
-
94
-
-
13344274350
-
Public privacy: Camera surveillance of public places and the right to anonymity
-
253-55
-
Christopher Slobogin, Public Privacy: Camera Surveillance of Public Places and the Right to Anonymity, 72 MISS. L. J. 213, 253-55 (2002).
-
(2002)
Miss. L. J.
, vol.72
, pp. 213
-
-
Slobogin, C.1
-
95
-
-
84865170988
-
As solobogin recognized, the supreme court rejected a similar assertion
-
Laird v. Tatum, Id. Nonetheless, Laird might not foreclose a First Amendment argument against automated surveillance if social-network site users appreciated the risk, as it might present a direct "compulsion" against speech acts that the First Amendment would prohibit. Id
-
As Solobogin recognized, the Supreme Court rejected a similar assertion in Laird v. Tatum, 408 U. S. 1 (1972). Id. Nonetheless, Laird might not foreclose a First Amendment argument against automated surveillance if social-network site users appreciated the risk, as it might present a direct "compulsion" against speech acts that the First Amendment would prohibit. Id.
-
(1972)
U. S.
, vol.408
, pp. 1
-
-
-
96
-
-
77955315579
-
-
supra note 19
-
See Grimmelmann, supra note 19, at 1174-75.
-
-
-
Grimmelmann1
-
97
-
-
77955328420
-
-
This is true if the privacy settings of government's contacts' contacts permit. Many people allow friends of friends to see their profiles. See id. at, Indeed, some permit anyone living in their geographic area to see their profiles. On the other end, some only allow friends to do so. Research suggests that some users do not use these settings at all, id. at 1185, meaning that the social-network site's default privacy rules govern who can view their profile which is often not protective of users' privacy
-
This is true if the privacy settings of government's contacts' contacts permit. Many people allow friends of friends to see their profiles. See id. at 1174. Indeed, some permit anyone living in their geographic area to see their profiles. On the other end, some only allow friends to do so. Research suggests that some users do not use these settings at all, id. at 1185, meaning that the social-network site's default privacy rules govern who can view their profile (which is often not protective of users' privacy).
-
-
-
-
98
-
-
77955335058
-
-
Id.
-
Id. at 1174.
-
-
-
-
99
-
-
77955337074
-
-
See id.
-
See id. at 1174-75.
-
-
-
-
101
-
-
1842538795
-
Privacy as contextual integrity
-
138-40, hereinafter Nissenbaum, Privacy as Contextual Integrity. Daniel Solove offers a comprehensive, pragmatic theory of privacy that requires decisionmakers to balance the multitude of interests at stake in a given situation
-
Helen Nissenbaum, Privacy as Contextual Integrity, 79 WASH. L. REV. 119, 138-40 (2004) [hereinafter Nissenbaum, Privacy as Contextual Integrity]. Daniel Solove offers a comprehensive, pragmatic theory of privacy that requires decisionmakers to balance the multitude of interests at stake in a given situation.
-
(2004)
Wash. L. Rev.
, vol.79
, pp. 119
-
-
Nissenbaum, H.1
-
102
-
-
77955325879
-
-
supra note 51
-
SOLOVE, supra note 51, at 87-88.
-
-
-
Solove1
-
104
-
-
77955322760
-
-
supra note 19
-
Grimmelmann, supra note 19, at 1151.
-
-
-
Grimmelmann1
-
106
-
-
77955339286
-
-
supra note 19
-
Grimmelmann, supra note 19, at 1160-64.
-
-
-
Grimmelmann1
-
107
-
-
77955318437
-
-
Id.
-
Id. at 1162.
-
-
-
-
108
-
-
77955316240
-
-
Id.
-
Id. at 1161-62.
-
-
-
-
109
-
-
61349084302
-
Cyber civil rights
-
My previous work Cyber Civil Rights explores how an online group's feeling of anonymity breeds destructive behavior online, 81-84
-
My previous work Cyber Civil Rights explores how an online group's feeling of anonymity breeds destructive behavior online. Danielle Keats Citron, Cyber Civil Rights, 89 B. U. L. REV. 61, 81-84 (2009).
-
(2009)
B. U. L. Rev.
, vol.89
, pp. 61
-
-
Citron, D.K.1
-
110
-
-
56749172256
-
Social network sites: Public, private, or what?
-
7
-
Danah Boyd, Social Network Sites: Public, Private, or What?, 13 THE KNOWLEDGE TREE 4, 7 (2007), http://kt.flexibleleammg.net.au/tkt2007/wp- contentyuploads/2007/05/edition-13.df.
-
(2007)
The Knowledge Tree
, vol.13
, pp. 4
-
-
Boyd, D.1
-
111
-
-
77955310298
-
-
supra note 19
-
Grimmelmann, supra note 19, at 1161.
-
-
-
Grimmelmann1
-
112
-
-
77955339113
-
-
Id.
-
Id. at 1168.
-
-
-
-
113
-
-
47549106092
-
Can you see me now? Audience and disclosure regulation in online social network sites
-
31
-
Zeynep Tufekci, Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites, 28 BULL. SCI., TECH. & SOC'Y 20, 31 (2008).
-
(2008)
Bull. Sci., Tech. & Soc'y
, vol.28
, pp. 20
-
-
Tufekci, Z.1
-
114
-
-
77955317263
-
Casting a digital shadow; Your reputation precedes you
-
This view is, of course, mistaken-more than half of all employers check a person's social-network activities in making interviewing and hiring decisions. A 2006 survey of 100 executive recruiters reported that 77% of recruiters used search engines to find background data on candidates and 35% eliminated a candidate based on what they uncovered, July 17, Ralph Gross attributes people's willingness to divulge a wealth of personal information on social-network sites to a herd effect-they see others doing so and follow their lead
-
This view is, of course, mistaken-more than half of all employers check a person's social-network activities in making interviewing and hiring decisions. A 2006 survey of 100 executive recruiters reported that 77% of recruiters used search engines to find background data on candidates and 35% eliminated a candidate based on what they uncovered. Casting a Digital Shadow; Your Reputation Precedes You, BRIAN SOLIS, July 17, 2009, http://www.briansolis.com/ 2009/07/casting-a-digital-shadowyour-reputation-precedes-you. Ralph Gross attributes people's willingness to divulge a wealth of personal information on social-network sites to a herd effect-they see others doing so and follow their lead.
-
(2009)
Brian Solis
-
-
-
115
-
-
34548200947
-
-
Facebook Case, Nov. 7, unpublished manuscript, available
-
Ralph Gross et al., Information Revelation and Privacy in Online Social Networks (The Facebook Case) 80 (Nov. 7, 2005) (unpublished manuscript), available at http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-gross- acquisti.df.
-
(2005)
Information Revelation and Privacy in Online Social Networks
, pp. 80
-
-
Gross, R.1
-
116
-
-
77955322761
-
-
supra note 19, at, Because Government 2.0 is so new, social scientists have yet to study individuals' privacy expectations associated with it
-
Grimmelmann, supra note 19, at 1162. Because Government 2.0 is so new, social scientists have yet to study individuals' privacy expectations associated with it.
-
-
-
Grimmelmann1
-
117
-
-
57649174994
-
Facebook's privacy trainwreck: Exposure, invasion, and social convergence
-
13
-
danah boyd, Facebook's Privacy Trainwreck: Exposure, Invasion, and Social Convergence, 14 CONVERGENCE 13, 13 (2008).
-
(2008)
Convergence
, vol.14
, pp. 13
-
-
Boyd, D.1
-
118
-
-
77955331084
-
-
Id
-
Id.
-
-
-
-
119
-
-
77955320295
-
-
Id.
-
Id. at 14-15.
-
-
-
-
120
-
-
77955335221
-
-
Id.
-
Id. at 15.
-
-
-
-
121
-
-
77955337717
-
-
Id. at, In an ironic but perhaps expected turn of events, News Feed is now one of Facebook's most popular features
-
Id. at 13-14. In an ironic but perhaps expected turn of events, News Feed is now one of Facebook's most popular features.
-
-
-
-
122
-
-
77955314597
-
-
I thank Woody Hartzog for this insightful point
-
I thank Woody Hartzog for this insightful point.
-
-
-
-
123
-
-
77955334909
-
The one-way mirror: Law, privacy, and the media
-
327
-
Lawrence M. Friedman, The One-Way Mirror: Law, Privacy, and the Media, 82 WASH. U. L. Q. 319, 327 (2004).
-
(2004)
Wash. U. L. Q.
, vol.82
, pp. 319
-
-
Friedman, L.M.1
-
124
-
-
77955339918
-
-
Anonymous, posting to eParticipation Mar. 27, 19:54 EDT
-
Anonymous, posting to eParticipation (Mar. 27, 2009, 19:54 EDT), http://eparticipation.com/content/government-agencies-use-social-networking- sites.
-
(2009)
-
-
-
126
-
-
77955332355
-
Facebook should compete on privacy, not hide it away
-
U. K., July 15
-
Bruce Schneier, Facebook Should Compete on Privacy, Not Hide It Away, GUARDIAN (U. K.), July 15, 2009, http://www.guardian. co.uk/technology/2009/jul/ 15/privacy-internet-facebook.
-
(2009)
Guardian
-
-
Schneier, B.1
-
127
-
-
77955315578
-
-
May 14, unpublished manuscript, available, Privacy information does not appear anywhere on the MySpace homepage, and although it allows users to change their settings, it is not user-friendly
-
Richard Goettke & Joseph Christiana, Privacy and Online Social Networking Websites 2 (May 14, 2007) (unpublished manuscript), available at http://www.eecs.harvard.edu/csl99r/fp/RichJoe.df. Privacy information does not appear anywhere on the MySpace homepage, and although it allows users to change their settings, it is not user-friendly.
-
(2007)
Privacy and Online Social Networking Websites
, pp. 2
-
-
Goettke, R.1
Christiana, J.2
-
128
-
-
77955322120
-
-
Id. at, Social-network sites also discourage users from invoking restrictive privacy settings; they tell users that doing so would "make it more difficult for them to network with their friends."
-
Id. at 4. Social-network sites also discourage users from invoking restrictive privacy settings; they tell users that doing so would "make it more difficult for [them] to network with their friends."
-
-
-
-
129
-
-
77955340785
-
-
Id.
-
Id. at 2.
-
-
-
-
130
-
-
77955326518
-
-
supra note 88
-
Gross et al., supra note 88.
-
-
-
Gross1
-
131
-
-
77955324128
-
Federal gov't (gsa) refuses to make public agreements with facebook, myspace, etc.
-
Apr. 30, 13:38 EDT
-
Jeff Chester, Federal Gov't (GSA) Refuses to Make Public Agreements with Facebook, MySpace, etc., posting to Digital Destiny (Apr. 30, 2009, 13:38 EDT), http://www.democraticmedia.org/jcblog/?p=801;
-
(2009)
Posting to Digital Destiny
-
-
Chester, J.1
-
132
-
-
77955318600
-
-
supra note 28
-
Snyder, supra note 28.
-
-
-
Snyder1
-
133
-
-
77955340934
-
-
Presentation at the U. S. Dep't of Homeland Security, Government 2.0: Privacy and Best Practices Workshop, June 22, available
-
David Temoshok, Presentation at the U. S. Dep't of Homeland Security, Government 2.0: Privacy and Best Practices Workshop 157 (June 22, 2009), available at http://www.dhs.gov/xlibrary/assets/privacy/privacy-gov20-June2009- transcripts-dayl.df.
-
(2009)
, pp. 157
-
-
Temoshok, D.1
-
134
-
-
77955337259
-
-
Id.
-
Id. at 157-59.
-
-
-
-
135
-
-
30144439568
-
-
5 U. S. C. § 552a (2006).
-
(2006)
U. S. C.
, vol.5
-
-
-
136
-
-
77955334085
-
Chairman of info. Sec. & Privacy advisory bd., to peter orszag
-
See Letter from, May 27, available
-
See Letter from Daniel J. Chenok, Chairman of Info. Sec. & Privacy Advisory Bd., to Peter Orszag, Dir. of Office of Mgmt. & Budget 11 (May 27, 2009), available at http://csrc.nist.gov/groups/SMA/ispab/documents/ correspondence/ispab-report-may2009.df.
-
(2009)
Dir. of Office Of Mgmt. & Budget
, pp. 11
-
-
Chenok, D.J.1
-
137
-
-
30144439568
-
-
m
-
5 U. S. C. § 552a (m).
-
U. S. C.
, vol.5
-
-
-
138
-
-
77955320294
-
Big brother's Little helpers: How choicepoint and other commercial data brokers collect and package your data for law enforcement
-
595-97
-
Chris Jay Hoofnagle, Big Brother's Little Helpers: How ChoicePoint and Other Commercial Data Brokers Collect and Package Your Data for Law Enforcement, 29 N. C. J. INT'L L. & COM. REG. 595, 595-97 (2004).
-
(2004)
N. C. J. Int'l L. & Com. Reg
, vol.29
, pp. 595
-
-
Hoofnagle, C.J.1
-
139
-
-
30144439568
-
-
k
-
5 U. S. C. § 552a (k).
-
U. S. C.
, vol.5
-
-
-
140
-
-
77955338245
-
-
Id. The Privacy Act precludes agencies from collecting information that exclusively concerns individuals' First Amendment activities. That restriction does not, however, apply when the information gathered addresses more than just the person's speech acts. In turn, its protections, in practice, reach too few scenarios, as law enforcement routinely collects, uses, and distributes information relevant to far more than a person's political, religious, and other expressive activities. Andy's story demonstrates the point
-
Id. The Privacy Act precludes agencies from collecting information that exclusively concerns individuals' First Amendment activities. That restriction does not, however, apply when the information gathered addresses more than just the person's speech acts. In turn, its protections, in practice, reach too few scenarios, as law enforcement routinely collects, uses, and distributes information relevant to far more than a person's political, religious, and other expressive activities. Andy's story demonstrates the point.
-
-
-
-
141
-
-
84884680452
-
-
E-Government Act of 2002, Pub. L. No. 107-347, § 208 b, 2921
-
E-Government Act of 2002, Pub. L. No. 107-347, § 208 (b), 116 Stat. 2899, 2921.
-
Stat.
, vol.116
, pp. 2899
-
-
-
142
-
-
77955336736
-
-
Memorandum from, Dir. of Office of Mgmt. & Budget, to the Heads of Executive Dep'ts & Agencies, at Attachment A, Part II. E.2.f Sept. 26, available
-
Memorandum from Joshua B. Bolten, Dir. of Office of Mgmt. & Budget, to the Heads of Executive Dep'ts & Agencies, at Attachment A, Part II. E.2.f (Sept. 26, 2003), available at http://www.whitehouse.gov/omb/memoranda-m03-22/.
-
(2003)
-
-
Bolten, J.B.1
-
143
-
-
77955339287
-
-
Id
-
Id.
-
-
-
-
144
-
-
77955336901
-
-
This Essay uses the image of a one-way mirror to help guide our thinking about the government's ability to use, collect, and distribute individuals' personal information on socialnetwork sites. I recognize that the precise image of a mirror may not map perfectly onto every nuance of the proposal. For instance, one could argue that government's ability to obtain individuals' policy advice means that it has glanced back into individuals' views. Nonetheless, the image provides a powerful way to understand the extent to which government can use its Government 2.0 sites to obtain personal information about individuals
-
This Essay uses the image of a one-way mirror to help guide our thinking about the government's ability to use, collect, and distribute individuals' personal information on socialnetwork sites. I recognize that the precise image of a mirror may not map perfectly onto every nuance of the proposal. For instance, one could argue that government's ability to obtain individuals' policy advice means that it has glanced back into individuals' views. Nonetheless, the image provides a powerful way to understand the extent to which government can use its Government 2.0 sites to obtain personal information about individuals.
-
-
-
-
145
-
-
77955313706
-
-
Government could not view a fan's entire list of contacts
-
Government could not view a fan's entire list of contacts.
-
-
-
-
146
-
-
77955341125
-
-
See notes 63-79 and accompanying text discussing the privacy problems associated with government's use of social-media data to infer individuals' group associations
-
See notes 63-79 and accompanying text (discussing the privacy problems associated with government's use of social-media data to infer individuals' group associations).
-
-
-
-
147
-
-
77955321763
-
Real id: The devil you don't know
-
Short Essay and Book Note, 445-46, This might be a particularly fruitful time to consider legislative action, as privacy advocates such as the Center on Democracy and Technology have devoted much time to thinking of ways to update the Privacy Act to account for networked technologies. But, as Paul Schwartz notes, such legislative change may come at too steep a price-the preemption of state privacy laws and ossification of legislation
-
See Geoffrey D. Kravitz, Short Essay and Book Note, REAL ID: The Devil You Don't Know, 3 HARV. L. & POL'Y REV. 431, 445-46 (2009). This might be a particularly fruitful time to consider legislative action, as privacy advocates such as the Center on Democracy and Technology have devoted much time to thinking of ways to update the Privacy Act to account for networked technologies. But, as Paul Schwartz notes, such legislative change may come at too steep a price-the preemption of state privacy laws and ossification of legislation.
-
(2009)
Harv. L. & Pol'y Rev.
, vol.3
, pp. 431
-
-
Kravitz, G.D.1
-
148
-
-
66749171195
-
Preemption and privacy
-
929-30
-
See Paul M. Schwartz, Preemption and Privacy, 118 YALE L. J. 902, 929-30 (2009).
-
(2009)
Yale L. J.
, vol.118
, pp. 902
-
-
Schwartz, P.M.1
-
149
-
-
77955325730
-
-
I thank Peter Swire for his helpful comments on how we might implement the one-way mirror proposal
-
I thank Peter Swire for his helpful comments on how we might implement the one-way mirror proposal.
-
-
-
-
150
-
-
77955325245
-
-
Of course, agencies should adopt technology-neutral policies to prevent obsolescence. The policy should provide means for individuals to protest an agency's infringement of its terms
-
Of course, agencies should adopt technology-neutral policies to prevent obsolescence. The policy should provide means for individuals to protest an agency's infringement of its terms.
-
-
-
-
151
-
-
77950398987
-
-
Public Workshop Government 2.0: Privacy and Best Practices, 876, Dep't of Homeland Sec. Apr. 17
-
Public Workshop Government 2.0: Privacy and Best Practices, 74 Fed. Reg. 17, 876 (Dep't of Homeland Sec. Apr. 17, 2009).
-
(2009)
Fed. Reg
, vol.74
, pp. 17
-
-
-
152
-
-
77955333899
-
-
Transparency and Open Government, Jan. 21
-
Transparency and Open Government, 74 Fed. Reg. 4685 (Jan. 21, 2009).
-
(2009)
Fed. Reg
, vol.74
, pp. 4685
-
-
-
153
-
-
77955330764
-
-
other words, law enforcement cannot contact the White House or other agency to view a government friend's profile now criminal target without legal process
-
In other words, law enforcement cannot contact the White House or other agency to view a government friend's profile (now criminal target) without legal process.
-
-
-
-
154
-
-
77955333188
-
-
Law enforcement agents could continue to pursue undercover operations online so long as those operations comported with law
-
Law enforcement agents could continue to pursue undercover operations online so long as those operations comported with law.
-
-
-
-
155
-
-
0005462742
-
Internet privacy and the state
-
837
-
Paul M. Schwartz, Internet Privacy and the State, 32 CONN. L. REV. 815, 837 (2000).
-
(2000)
Conn. L. Rev.
, vol.32
, pp. 815
-
-
Schwartz, P.M.1
-
156
-
-
0347358112
-
Privacy and democracy in cyberspace
-
1651
-
Paul M. Schwartz, Privacy and Democracy in Cyberspace, 52 VAND. L. REV. 1609, 1651 (1999).
-
(1999)
Vand. L. Rev.
, vol.52
, pp. 1609
-
-
Schwartz, P.M.1
-
157
-
-
77955312453
-
-
supra note 51
-
SOLOVE, supra note 51, at 79-80.
-
-
-
Solove1
-
158
-
-
59249098571
-
Intellectual privacy
-
416-17
-
Neil M. Richards, Intellectual Privacy, 87 TEX. L. REV. 387, 416-17 (2008).
-
(2008)
Tex. L. Rev.
, vol.87
, pp. 387
-
-
Richards, N.M.1
-
159
-
-
77955310935
-
-
supra note 123
-
See Schwartz, supra note 123, at 837.
-
-
-
Schwartz1
-
160
-
-
77955310621
-
-
supra note 124
-
Schwartz, supra note 124, at 1651.
-
-
-
Schwartz1
-
161
-
-
77955318948
-
-
Id
-
Id.
-
-
-
-
162
-
-
21844523056
-
Setting standards for fair information practice in the U. S. Private sector
-
497-98
-
Joel R. Reidenberg, Setting Standards for Fair Information Practice in the U. S. Private Sector, 80 IOWA L. REV. 497, 497-98 (1995).
-
(1995)
Iowa L. Rev.
, vol.80
, pp. 497
-
-
Reidenberg, J.R.1
-
163
-
-
0001006507
-
A right to read anonymously: A closer look at copyright management in cyberspace
-
1003-19, arguing that digital copyright-management technologies violate First Amendment freedom of speech and thought
-
Julie E. Cohen, A Right to Read Anonymously: A Closer Look at Copyright Management in Cyberspace, 28 CONN. L. REV. 981, 1003-19 (1996) (arguing that digital copyright-management technologies violate First Amendment freedom of speech and thought).
-
(1996)
Conn. L. Rev.
, vol.28
, pp. 981
-
-
Cohen, J.E.1
-
164
-
-
77955314764
-
-
Individuals' personal information seems out of place in any discussion of the Open Government initiative. Indeed, White House spokesperson Moira Mack remarked via email "we are focused on opening government to the people and not the other way around." The White House Is Now Following You on Twitter..., posting to The Podium May 4, 2009, This suggests that the White House and executive agencies have no interest in that information
-
Individuals' personal information seems out of place in any discussion of the Open Government initiative. Indeed, White House spokesperson Moira Mack remarked via email "we are focused on opening government to the people (and not the other way around)." The White House Is Now Following You on Twitter..., posting to The Podium (May 4, 2009), http://internetinnovation.org/ blog/entry/the-white-house-is-now-following-you-on-twitter. This suggests that the White House and executive agencies have no interest in that information.
-
-
-
-
165
-
-
2542452461
-
Expressive theories of law: A general restatement
-
1571
-
Elizabeth S. Anderson & Richard H. Pildes, Expressive Theories of Law: A General Restatement, 148 U. PA. L. REV. 1503, 1571 (2000).
-
(2000)
U. Pa. L. Rev.
, vol.148
, pp. 1503
-
-
Anderson, E.S.1
Pildes, R.H.2
-
166
-
-
0348199090
-
On the expressive function of law
-
2022
-
Cass R. Sunstein, On the Expressive Function of Law, 144 U. PA. L. REV. 2021, 2022 (1996);
-
(1996)
U. Pa. L. Rev.
, vol.144
, pp. 2021
-
-
Sunstein, C.R.1
-
167
-
-
71949096865
-
Law's expressive value in combating cyber gender harassment
-
cf, 404-14, exploring law's expressive power in conveying government's commitments
-
cf. Danielle Keats Citron, Law's Expressive Value in Combating Cyber Gender Harassment, 108 MICH. L. REV. 373, 404-14 (2009) (exploring law's expressive power in conveying government's commitments).
-
(2009)
Mich. L. Rev.
, vol.108
, pp. 373
-
-
Citron, D.K.1
-
168
-
-
20444503560
-
-
U. S. Dep't of Justice v. Reporters Comm. for Freedom of the Press, 770
-
U. S. Dep't of Justice v. Reporters Comm. for Freedom of the Press, 489 U. S. 749, 770 (1989);
-
(1989)
U. S.
, vol.489
, pp. 749
-
-
-
169
-
-
79251570245
-
Promises and privacy: Promissory estoppel and confidential disclosure in online communities
-
see also, forthcoming, available at, at, describing the disclosure of personal information in online communities and its potential consequences
-
see also Woodrow Hartzog, Promises and Privacy: Promissory Estoppel and Confidential Disclosure in Online Communities, 82 TEMPLE L. REV. (forthcoming 2010), available at http://papers.ssrn.com/sol3/papers.cfm?abstract-id=1473561, at 8-13 (describing the disclosure of personal information in online communities and its potential consequences).
-
(2010)
Temple L. Rev.
, vol.82
, pp. 8-13
-
-
Hartzog, W.1
-
170
-
-
77955338556
-
-
Consider Lior Strahilevitz's critique of the public disclosure tort, where an individual's sharing of information with a few people or, in some jurisdictions, with one other person can waive a person's expectation of privacy
-
Consider Lior Strahilevitz's critique of the public disclosure tort, where an individual's sharing of information with a few people or, in some jurisdictions, with one other person can waive a person's expectation of privacy.
-
-
-
-
171
-
-
25144444373
-
A social networks theory of privacy
-
As Strahilevitz explains, a restrictive view of privacy fails to capture how information actually flows in given relationships. Id. In other words, a binary view of privacy-where disclosure to more than one person eviscerates any privacy protection-cannot capture the fact that something may be public vis-a-vis coworkers yet private vis-a-vis the outside world
-
Lior Jacob Strahilevitz, A Social Networks Theory of Privacy, 72 U. CHI. L. REV. 919 (2005). As Strahilevitz explains, a restrictive view of privacy fails to capture how information actually flows in given relationships. Id. In other words, a binary view of privacy-where disclosure to more than one person eviscerates any privacy protection-cannot capture the fact that something may be public vis-a-vis coworkers yet private vis-a-vis the outside world.
-
(2005)
U. Chi. L. Rev.
, vol.72
, pp. 919
-
-
Strahilevitz, L.J.1
-
172
-
-
77955316238
-
-
Id. at, Strahilevitz's social-network theory would instead examine the actual structure of social networks and the "extent of dissemination the plaintiff should have expected to follow his disclosure of that information" to decide whether information would have become widely known
-
Id. at 940. Strahilevitz's social-network theory would instead examine the actual structure of social networks and the "extent of dissemination the plaintiff should have expected to follow his disclosure of that information" to decide whether information would have become widely known.
-
-
-
-
173
-
-
77955328244
-
-
Id.
-
Id. at 921.
-
-
-
-
174
-
-
77955334425
-
-
supra note 90
-
boyd, supra note 90, at 18.
-
-
-
Boyd1
-
175
-
-
77955334910
-
Why we should care about privacy in a government 2.0 world
-
June 20, 18:05 EDT, Comment by Jake "If you put stuff on the Internet, expect people to read it. Most folks who put stuff on the Internet probably expect this."
-
Danielle Citron, Why We Should Care About Privacy in a Government 2.0 World, posting to Concurring Opinions (June 20, 2009, 18:05 EDT), http://www.concurringopinions.com/archives/2009/06/why-should-we-care-about-the- privacy-implications-of-government-20.html (Comment by Jake) ("If you put stuff on the Internet, expect people to read it. Most folks who put stuff on the Internet probably expect this.").
-
(2009)
Posting to Concurring Opinions
-
-
Citron, D.1
-
176
-
-
77955314226
-
-
See supra notes 80-100 and accompanying text discussing social-network users' privacy expectations
-
See supra notes 80-100 and accompanying text (discussing social-network users' privacy expectations).
-
-
-
-
177
-
-
77955318781
-
-
It may be more likely that individuals perceive government as more akin to distant acquaintances than corporations they friend online. Individuals may be more likely to appreciate that corporations have a profit motive to use their data. We expect Coca-Cola, Amazon, or Verizon not to act in our best interests. On the other hand, we may get confused as to the government's motives and whether they are aligned with our own. Social scientists have yet to study these nuances
-
It may be more likely that individuals perceive government as more akin to distant acquaintances than corporations they friend online. Individuals may be more likely to appreciate that corporations have a profit motive to use their data. We expect Coca-Cola, Amazon, or Verizon not to act in our best interests. On the other hand, we may get confused as to the government's motives and whether they are aligned with our own. Social scientists have yet to study these nuances.
-
-
-
-
179
-
-
77955333753
-
-
supra note 27
-
ROSEN, supra note 27, at 195.
-
-
-
Rosen1
-
180
-
-
77955317778
-
-
Presentation at the U. S. Dep't of Homeland Security, Government 2.0: Privacy and Best Practices Workshop, 140-41 June 22, available at, asking panelists whether a notice regime might suffice to address privacy concerns of Government 2.0
-
Martha Landesberg, Presentation at the U. S. Dep't of Homeland Security, Government 2.0: Privacy and Best Practices Workshop 121, 140-41 (June 22, 2009), available at http://www.dhs.gov/xlibrary/assets/privacy/privacy-gov20-June2009- transcripts-dayl.df (asking panelists whether a notice regime might suffice to address privacy concerns of Government 2.0).
-
(2009)
, pp. 121
-
-
Landesberg, M.1
-
181
-
-
77955321938
-
-
supra note 19
-
Grimmelmann, supra note 19, at 1181.
-
-
-
Grimmelmann1
-
182
-
-
77955336404
-
-
Id
-
Id.
-
-
-
-
183
-
-
77955313879
-
-
Id
-
Id.
-
-
-
-
184
-
-
77955313435
-
-
Id
-
Id.
-
-
-
|