摘要(Abstract):
Web2.0标志着大数据时代的到来,也意味着隐私危机的到来:隐私侵权变得十分容易、普遍,行为方式变得更加隐秘,性质更难以确定,后果多样化且程度更严重,行为与结果之间的因果关系更松散。我国传统的间接保护隐私权的方式已远远落后于时代。为扩大隐私侵权救济之可能性,有必要重新构筑侵权规则:明确以隐私权保护而非个人数据保护为基点的路线;采取形式的隐私权定义加实质判断标准相结合的方法判定隐私利益的存在;扩张隐私损害结果的范围;适用过错推定原则以增加被侵权人胜诉之可能性。
关键词(KeyWords): 大数据;隐私权;侵权法;责任扩张;过错推定
Abstract:
Keywords:
基金项目(Foundation): 湖北省医事卫生法律治理研究中心资助的博士项目(项目批准号:D2014007)的阶段性成果
作者(Author): 徐明;
Email:
参考文献(References):
- (1)Danah boyd and Kate Crawford,Six Provocations for Big Data.A Decade in Internet Time:Symposium on the Dynamics of the Internet and Society,September 2011.
- (2)See Danah Boyd&Kate Crawford,Critical Questions for Big Data:Provocations for a Cultural,Technological,and Scholarly Phenomenon,15 INFORMATION,COMMUNICATION,&SOCIETY p.662-679(2012).
- (3)Charles Duhigg,How Companies Learn Your Secrets,N.Y.Times,Feb.19,2012,http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html.
- (4)Omer Tene&Julos Polonetsky,Privacy in the age of Big data:A Time for Big Decisions,64.STAN L.REV.ONLINE 63(2012)。
- (5)Daniel J Solove,‘A Taxonomy of Privacy(2006)154 Penn.Law Review 477,506.Dirk Helbing and Stefano Balietti,Big Data,Privacy,and Trusted Web:What to Be Done,From social data mining to forecasting socio-economic crises.EPJ Special Topics 195,3-68(2011)
- (6)http://www.euronews.com/2014/01/06/big data big brother and the death of privacy in the digital age/
- (7)David Brin,The Transparent Society Will Technology Force US to Choose Between Privacr And Freedom?245(1998)
- (8)L.Sweeney.k-anonymity:a model for protecting privacy.International Journal on Uncertainty,Fuzziness and Knowledgebased Systems,10(5),2002;557-570.
- (9)Helen Nissenbaum,Privacy in Context:Technology,Policy,And The Integrity of Social Life(Stanford Law Books 2009).
- (10)Omer Tene and Jules Polonetsky,'Big Data for All:Privacy and User Control in the Age of Analytics,'(forthcoming)Northwestern Journal of Technology and Intellectual Property.
- (11)Ira Rubinstein,Big Data:The End of Privacy or a New Beginning,NYU School of Law,Public Law Research Paper No.12-56.
- (12)U M Fayyad et al.,'From Data Mining to Knowledge Discovery,An Overview,'in U M Fayyad et al.(eds),Advances in Knowledge Discovery and Data Mining 6(Menlo Park;AAAI,1996),cited in Tal Z Zarsky,'Mine Your Own Business!Making the Case for the Implications of the Data Mining of Personal Information in the Forum of Public Opinion'(2003)5Yale Journal of Law and Technology 1.
- (13)Charles Duhigg,How Companies Learn Your Secrets,N.Y.Times,Feb.19,2012,http://wwrw.nytimes.com/2012/02/19/magazine/shopping-habits.html.
- (14)Stan Karas,Privacy,Identity,Databases,American University Law Review.Volume52.Issue 2.p.393-443(2002).
- (15)See In re DoubleClick,154 F.Supp.2d at 526(dismissing the plaintiffs'claims in part because their Computer Fraud and Abuse Act claim did not support a sufficient claim for damages).
- (16)Fed.Trade Comm'N,FTC Staff Report:Self-Regulatory Principles For Online Behavioral AdvertisingⅠ-Ⅱ(2009)[hereinafter Principles].p.33-37.
- (17)Latanya Sweeney,Simple Demographics Often Identify People Uniquely 16(Laboratory for Int'1 Data Privacy,Working Paper No.3,2000);cf.Daniel C.Barth-Jones,The"Re-Identification"of Governor William Weld's Medical Information:A Critical ReExamination of Health Data Identification Risks and Privacy Protections,Then and Now 2-3(July 24,2012)(pre-publication working paper),available at http://dx.doi.org/10.2139/ssrn.2076397;see also Latanya Sweeney,Akua Abu&Julia Winn,Identifying Participantsin the Personal Genome Project by Name 2(Harvard Coll.,Data Privacy Lab,White Paper No.1021-1,Apr.24,2013).
- (18)Michael Barbara&Tom Zeller Jr.,A Face is Exposed for AOL Searcher No.4417749,N.Y.TIMES,Aug.9,2006,at A2,available at http://www.nytimes.com/2006/08/09/technology/09aol.html.
- (19)Kyllo v.United States,533 U.S.27(2001).
- (20)htlp;//www.godeyes.cn/html/2008/04/07/google_earth_1610.html.
- (21)See John Schwartz,Child Pornography,and an Issue of Restitution,N.Y.Times,Feb.3,2010,http://www.nytimes.com/2010/02/03/us/03offender.html.
- (22)Daniel J.Solove,The Future of Reputation:Gossip,Rumor And Privacy on The Intenert,p.100(2007).
- (23)参见张新宝:《隐私权的法律保护》,群众出版社1997年版,第12页脚注。
- (24)参见《最高人民法院关于精神损害赔偿的司法解释》第1条、第8条。
- (25)参见《徐大雯与宋祖德、刘信达侵害名誉权民事纠纷案》,北大法宝。
- (26)参见《蔡继明与百度公司侵害》,北大法宝。
- (27)参见《北京金山安全软件有限公司与周鸿祎侵犯名誉权纠纷案》,北大法宝。
- (27)参见《赵雅芝与上海琪姿贸易有限公司、上海诺宝丝化妆品有限公司侵害姓名权纠纷、肖像权纠纷案》,北大法宝。
- (29)参见《范冰冰与毕成功、贵州易赛德文化传媒有限公司侵犯名誉权纠纷案》,北大法宝。
- (30)参见《闫某与北京新浪互联信息服务有限公司、北京百度网讯科技有限公司侵犯名誉权、隐私权纠纷案》,北大法宝。
- (31)中外名人名誉侵权案层出不穷媒体败诉率占60%,载http://news.tuxi.com.en/news/119999990123403/34037271.html.最后访问时间:2016年8月17日。
- (32)A Comprehensive Approach on Personal Data Protection in the European Union,COM(2010)609 final(Nov.4,2010)[hereinafter A Comprehensive Approach],available at http://ec.europa.eu/health/data_collection/docs/eom_2010_0609_en.pdf.
- (33)Omer Tene&JuloPoIonetsky,Big Data for All:Privacy and User Control in the Age of Analytics,11 Northwestern Journal of Technology and Intellectual Property 239(2013).
- (34)Fred H Cate,'The Failure of Fair Information Practice Principles,'in Jane K Winn(ed.),Consumer Protection in the Age of the Information Economy 360(Burlington:Ashgate,2006).
- (35)Notice of Inquiry,75 Fed.Reg.21226-31(Apr.23,2010).
- (36)The White House,Consumer Data Privacy in a Networked World:A Framework For Protecting Privacy And Promoting Innovation in The Global Digital Economy 32 n.39(Feb.2012)[hereinafter The White House Blurptiny],available at http://www.whilehouse.gov/sites/default/files/privacy-final.pdf.An annex to the Report includes a table comparing the Consumer Privacy Bill of Rights to the OECD Guidelines and other documents.Id.At7.
- (37)4 Ira S.Rubinstein&Nathaniel Good,Privacy by Design;A Counterfactual Analysis of Google and Facebook Privacy Incidents,28 BERKELEY TECH.L.J.(forthcoming 2013),available at http://lsr.nellco.org/nyu_plltwp/347.
- (38)郭瑜:《个人数据保护法研究》,北京大学出版社2012年版,第89-92页。
- (39)参见前引(38),郭瑜书,第89页。
- (40)Stan Karas,Privacy,Identity,Databases,American University Law Review.Volume 52.Issue 2.P.393443(2002).
- (41)Robert C.Post,Three Concepts of Privacy,89 Geo.LI 2087,2087(2001).
- (42)See Ken Gormley,One Hundred Years of Privacy,1992 Wis.L.Rev.1335,1339.
- (43)Samuel D.Warren&Louis D.Brandeis,The Right to Privacy,4 Harv.L.Rev.193(1890).
- (44)参见张民安主编:《美国当代隐私权研究》,中山大学出版社2013年,第14页。
- (45)E.L.Godkin,The Rights of the Citizen,Ⅳ-To His Own Reputation,Scribner's Magazine,July-Dee.1890,at 65.
- (46)Sissela Bok,Secrets;On The Ethics Of Concealment And Revelation 10-11(1983).
- (47)Sidney M.Jourard,Some Psychological Aspects of Privacy,31 Law&Contemp.Probs.307,307(1966).
- (48)See United States Dep't of Justice v.Reportere Comm.For Freedom of the Press,489 U.S.749.763(1989).
- (49)Jed Rubenfeld,The Right of Privacy,102 Harv.L.Rav.737,750(1989).
- (50)See Robert S.Gerstein,Intimacy and privacy,in Philosophical Dimensions of Privacy.
- (51)王利明:《隐私权的新发展》,载《人大法学评论》2009年第1期。
- (52)张新宝:《隐私权的法律保护》,群众出版社2004年版,第12页。
- (53)William L.Prosser,Privacy,48 Cal.L.Rev.383,389(1960).
- (54)Daniel J.Solove,Conceptualizing Privacy,California Law Review,Vol.90,p.1087,2002.
- (55)Daniel J.Solove,Universily of Pennsylvania Law Review,Vol.154,No.3,p.477,January 2006,GWU Law School Public Law Research Paper No.129.
- (56)389 U.S.347(1967).
- (57)载http://baike.baidu.com/view/542894.html?reforce=人肉搜索引擎&hold=synstd,最后访问时间:2015年12月16日。
- (58)Google Street View被起诉侵犯隐私-Google Map应用-上帝之眼—Google Earth[谷歌地球]资讯门户,载http://www.godeyes.cn/html/2008/04/07/google_earth_1610.html,最后访问时间:2016年8月17日。
- (59)480U.S.709(1987).
- (60)AnitaL.Allen,Lying to Protect Privacy,44 VILL.L.Rev.161.177(1999).
- (61)See BrBert,the Civilizing Process 114(edmund Jephcott trans.,1994)(1939).
- (62)816A.2d1001,1005-1006(N.H.2003).本案中,一名精神错乱的男子对AmyLymn Boyer非常迷恋,他从一家数据库经营公司购买了Boyer的SSN和工作场所的地质,并到其工作场所将其杀害。
- (63)参见[美]波斯纳:《法律的经济分析》,蒋兆康译,法律出版社2012年版,第105页。
- (64)See Richard A.Posner,Privacy,Surveillance,and Law,75 U.CHI.L.REV.245,249-51(2008).
- (65)See Helen Nissenbaum,Privacy in Context:Technology,Policy,And The Integrity of Social Life 1-4(2010);Westin,supra note 157,at 42;Ruth Gavison,Privacy and the Limits of the Law,89 YALE L.J.421,422-24(1980);William L.Prosser,Privacy,48 CALIF.L.REV.383,422-23(1960);Samuel D.Warren&Louis D.Brandeis,The Right to Privacy,4 HARV.L.REV.193,214-20(1890).
- (66)See Org.for Econ.Co-operation&Dev.[OECD],Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data,OECD Doc.C(80)58/FINAL(Sept.23,1980)[hereinafter OECD Guidelines],available at http://www.oecd.org/internet/iecon omy/oecdguidelinesonlheprotectionofprivacyandtransborderflowsofpersonaldata.htm.
- (67)See Omer Tene&JuloPolonetsky,Big Data for All:Privacy and User Control in the Age of Analytics,11 Northwestern Journal of Technology and Intellectual Property 239(2013).
- (68)See Cynthia Dwork&Deirdre K.Mulligan,It's Not Privacy,and It's Not Fair,66 STAN.L.REV.ONLINE 35,36-38(2013).
- (69)2013年人力资源蓝皮书:就业歧视仍较普遍,载http://www.china.com.cn/news/txt/2013-10/10/content_30249267.htm,最后访问时间:2015年5月25日。
- (70)John Leland&Tom Zeller Jr.,Technology and Easy Credit Give Identity Thieves an Edge,N.Y.TIMES,May 30,2006,http://www.nytimes.com/2006/05/30/us/30identity.html.
- (71)张新宝:《侵害名誉权的后果极其民事救济方式探讨》,载《法商研究》1997年第6期。
- (72)参见张磊:《司法实践中侵犯公民个人信息犯罪的疑难问题及其对策》,载《当代法学》2011年第1期。
- (73)参见张新宝:《侵权责任法》(第2版),中国人民大学出版社2010年版,第29页;杨立新:《侵权责任法》(第2版),法律出版社2012年版,第77页。
- (74)参见叶名怡:《真实叙事的边界——隐私侵权抗辩论纲》,载《中外法学》2014年第4期。
- (75)See Daniel J.Solove,Understanding Privacy 177(2008).
- (76)参见最高人民法院《关于审理名誉权案件若干问题的解答》(1993年8月7日)。