Language

The WeRead Case: Discussion on Reasonable Digital Privacy Expectation

Authored by Yingying Zhu

 

March 2021

Each of us leaves a lasting digital footprint on the internet and would expect businesses that we are dealing with could treat our digital privacy with reasonable care and consideration. Can users have a reasonable privacy expectation in the friends made and the books read online? The Beijing Internet Court in its recently released WeRead judgment holds that, friends list and reading data are not eligible for privacy protection in the case under dispute but nevertheless entitled to protection as personal information.

Background

The judgment is in relation to a dispute between an individual, Huang, a user of a book reading app named WeRead, and the digital giant, Tencent, the operator of the most successful social media in China, WeChat, and its sister app WeRead. The WeRead app wishes to set up an app-based reading community, where people who enjoy reading can read & connect. The plaintiff Huang was complaining that WeRead sneaked away her friends list from WeChat and then automatically turned those who are also subscribers of WeRead as her connections. Huang was also complaining that the information regarding the books she read and how she felt about the reading was widely open to all her connections without her permission while she intended to keep such information private. In its defense, the defendant Tencent alleged that users’ friends list and reading data were obtained with a preapproval from users therefore it should not be held liable for the utilization of the data.

Decision of Beijing Internet Court[1]

The Beijing Internet Court (hereinafter the “BIC”), the Court of First Instance, decides that Huang’s friends list and reading data shall not be categorized as private information, hence not eligible for privacy protection.

To define what constitutes private information, the BIC’s reasoning is based on the classification of the following three layers of personal information:

1.     personal information reasonably recognized by the society as private information, such as one’s sextual orientation, sex life, history of disease and unreleased criminal records, etc.

2.     personal information on which one may hold a defensive expectation or a utilization expectation; and

3.     general information that has no traits of privacy at all.

 

The BIC holds, because one’s friends list and reading data do not constitute private information as listed in layer 1 in the above classification, Tencent is not liable for invasion of the plaintiff’s privacy.

 

The BIC goes on to reason that one’s friends list and reading data shall be classified under layer 2 in the above classification, where the information is considered personal but not private and therefore the emphasis of protection is to give the data subject a right to decide whether to hide or to use such information.

 

The BIC further holds that in this case the plaintiff did not get the chance to decide how to deal with her personal information, because Tencent failed to give proper and transparent notices to the plaintiff and failed to obtain her affirmative consent before utilizing the information under dispute. The BIC then decides that Tencent should be held liable for violation of the plaintiff’s legitimate interests in her personal information. The BIC’s decision is majorly based on Article 43 of the Cybersecurity Law of China. [2]

Discussion

1.    What is Privacy?

According to Eric Hughes, an American mathematician, computer programmer, and cypherpunk, “Privacy is the power to selectively reveal oneself to the world.” [3] Broadly speaking, privacy is the right to be let alone, or freedom from interference or intrusion. Information privacy is the right to have some control over how your personal information is collected and used.[4]

 

The Civil Code of China (2021) defines privacy as peace in a person’s private life and the private space, private activities and private information that a person does not intend for others to know.[5]

 

As a governing law, the Civil Code’s definition of privacy is vague. As we know, privacy varies greatly from person to person: while one person may be comfortable with showing his or her diet recipe online, another person may be embarrassed to let others know how little (or how much) he or she eats over a meal. Similarly, while one person may be at ease with disclosing many details of his or her personal life to online social connections, another person may feel ashamed of posting anything personal on the internet. So exactly what kind of privacy does the Civil Code protect? Some guidance from a concurring opinion in a US Supreme Court decision might shed some light on this.

 

2.    Reasonable Expectation of Privacy

To define the right to privacy under the Fourth Amendment, [6]  the US Supreme Court Justice John Marshall Harlan, in his concurring opinion in Katz, [7]  formulated a “reasonable expectation of privacy” test. The test has two prongs:

1)     the person must exhibit an “actual (subjective) expectation of privacy”; and

2)     society recognizes the expectation as “reasonable.”

The Katz “reasonable expectation of privacy” test, while particularly useful in terms of defining privacy, also provokes further questions: what is reasonable? where to draw the line between “reasonable” expectation and expectation that is “unreasonable”? These questions matter hugely in today’s digital world, because every time a user creates a new account at an online platform, the user provides information with personal details, including name, birthdate, geographic location, and personal interests, etc. Users are entitled to know if they can have a “reasonable expectation of privacy” in such information and if such expectation could be respected by the platform.

 

3.    Exceptions to the Reasonable Expectation of Privacy

 

There are several recognized exceptions to the reasonable expectation of privacy, such as the Third-Party Doctrine, which means once an individual invests a third party with information, and voluntarily agrees to share information with a recipient, the individual loses any reasonable expectation of privacy in that information, [8] and the Voluntary consent Doctrine, which means individuals lose a reasonable expectation of privacy when they consent to a search of private information.[9]Other exceptions include the following: unlawful information is not protectable by the law and therefore there should be no reasonable expectation of privacy,[10] and public disclosure of private information will cause forfeiture of any reasonable expectation of privacy.[11]

 

4.    Where did the Court draw the Line?

 

The BIC obviously referenced the Katz test by reasoning that “the privateness in the information that one does not intend to disclose depends on a subjective intent, however, such subjective intent shall be reasonably recognized by the society.”

 

Then the BIC made the point that the information about one’s social relationship could only invoke reasonable expectation of privacy under the following circumstances: the relationship between the data subject and certain connections would be too intimate to let others know, or the disclosure of some social relationship would negatively affect the data subject’s social image.

 

With respect to the book reading data, the BIC made another similar point that one could only have reasonable expectation of privacy in one’s reading data if certain reading contents fall into some private and secret information region or the reading data, when generated at certain amounts, would reflect negatively on the data subject.

 

Then the BIC commented that the plaintiff’s online social relationship, i.e., the listed friends, is being identified by open-ID, profile and nickname, which should not show the real social relationship or the degree of intimacy between the plaintiff and her social connections. The BIC also went through the contents of the plaintiff’s reading data and found that neither of the two books displayed to her connections would cause any damage to the plaintiff’s social image. The plaintiff’s reading data therefore should not be categorized as private information, hence no reasonable privacy expectation in the data.

 

In a nutshell, the BIC was defining “reasonable expectation of privacy” in the digital world based on the content of certain information. If a piece of information contains nothing intimate or cannot reflect negatively on the data subject, then the data subject should not have a “reasonable expectation of privacy” in the information. The content-based approach is how the BIC drew the line between privacy and non-privacy related information.

 

5.    Content-based Approach is not Fair

 

The BIC’s views on this issue are deeply disturbing. Back to the definition of privacy, broadly speaking, privacy is the right to be “let alone”. It means when a person walks into an isolated space, the person could expect to be in a state in which one is not observed or disturbed by other people,[12] as long as nothing illegal is ongoing under the roof. By applying the Katz test, this person has a reasonable expectation of privacy because the person demonstrates a subjective expectation of privacy by “walking into the isolated space”, which is well recognized by the society as reasonable.  Furthermore, the person’s act does not fall into any of the aforesaid exceptions.

 

 In solitude, a decent citizen could expect the same degree of privacy as much as anyone would. The right to privacy does not depend on whether something shameful is being conducted inside that isolated space. The right to privacy does not depend on the activity happened inside. Instead, it depends on whether one’s demonstration of intent to be let alone could be accepted as reasonable by the society. However, under the content-based approach, a decent citizen would have less expectation of privacy than someone who conducts shameful behaviour in solitude, and this approach apparently leads to unfair results.

 

Here comes the digital world version of the above scenario. When an individual, like the plaintiff Huang, subscribes to open an account at an online platform, like WeRead, and secures it with a password, this would create an isolated space where this person could expect digital privacy. By applying the Katz test, this individual has a reasonable expectation of privacy as he or she demonstrates a subjective expectation of privacy by “creating a password-secured account”, which is well recognized by the society as reasonable.  Likewise, the person’s act does not fall into any of the aforesaid exceptions.

 

This person is fully entitled to assert a digital privacy right to be “let alone”. One can choose not to have any improper friends, and not to read any obscene books, but can still enjoy full privacy rights over one’s personal information. It literally means that being a decent netizen should not compromise one’s digital privacy rights. The content of the information stored in a password-secured account, if it is nothing unlawful, should not dictate if and how the person would enjoy the right to privacy.

 

The above scenario shows that the content-based approach taken by the BIC is not fair because it makes users’ digital privacy rights conditional on the content of personal information, i.e., if the information includes any embarrassing content or not. This approach leads to the unfair conclusion that being a decent netizen, one has nothing shameful to hide and therefore would not have reasonable expectation of digital privacy.

 

Conclusion

 

With the storage and processing of exabytes of data, social media users’ concerns about their privacy have been on the rise in recent years. Incidents of illegal use of data and data breaches have alerted many users and caused them to reconsider their interaction with social media and the security of their personal data.

The disputes caused by unauthorized use of personal information over the internet have spiked in the privacy law landscape. The Beijing Internet Court’s present decision, which echoes with the same court’s decision on the “Dou Yin (Tik Tok Chinese version) collection of personal information” case, [13] is among the first few decisions made by Chinese courts on this controversial issue. Significantly, the decision might impact ongoing litigation stemming from similar disputes. Other courts around the country might follow suit. Therefore, it is imperative to have a more clear and fair approach towards defining reasonable digital privacy expectation.

In the era of big data, defining privacy is under pressure in the digital world. As Bill Gates put it: “whether it’s digital cameras or satellites or just what you click on, we need to have more explicit rules — not just for governments but for private companies.” [14]

 

 




[1] Beijing Internet Court, (2019) Jing 0491Min Chu Zi No. 16142.

[2]  China Cybersecurity Law, Article 43, provides, “Where an individual finds that any network operator collects or uses his or her personal information in violation of the provisions of any law, administrative regulation or the agreement of both parties, the individual shall be entitled to request the network operator to delete his or her personal information. If the individual finds that his or her personal information collected or stored by the network operator has any error, he or she shall be entitled to request the network operator to make corrections. The network operator shall take measures to delete the information or correct the error.”

[3] Eric Hughes, The Cypherpunk Manifesto (1993), see https://www.activism.net/cypherpunk/manifesto.html.

[4] See https://iapp.org/about/what-is-privacy/.

[5] Article 1032, China Civil Code (2021).

[6] The Fourth Amendment of the US Constitution, ratified on December 15, 1791, protects the right of people “to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.”

[7]See Katz v. United States, 389 U.S. 347 (1967). Concurring opinion written by Justice Harlan.

[8] See Smith v. Maryland, 442 U.S. 735, 743-44 (1979).

[9] See Katz v. United States, 389 U.S. 347 (1967).

[10] See https://civillaw.com.cn/bo/t/?id=37410.

[11] Ibid.

[12] See https://www.igi-global.com/dictionary/privacy-data-protection-towards-elderly/23405.

[13]See Beijing Internet Court, (2019) Jing 0491Min Chu Zi No. 6694.

[14] See https://www.oipc.bc.ca/news/quote-of-the-day-bill-gates/.


  • 相关资讯 More
  • 点击次数: 0
    2024 - 07 - 19
    作者:刘艳玲中国商标法第48条规定了商标的使用,是指将商标用于商品、商品包装或者容器以及商品交易文书上,或者将商标用于广告宣传、展览以及其他商业活动中,用于识别商品来源的行为。商标性使用一般用于商业活动,目的是引导消费者购买其认可的商品,帮助商品提供者与消费者在市场上建立起重要的联系。司法审判中区分商标性使用和非商标性使用非常重要,是否侵害他人商标专用权,主要看商标使用是否属于“商标性使用”。非商标性使用一般用于非商业活动,其目的不是引导消费者识别商品或服务来源。即使在商业活动中使用,如果属于描述性使用或指示性使用,也会被认为是商标的正当使用,不侵犯他人商标权。中国商标法第59条第1款列举了商标的描述性使用方式。指示性使用在我国司法实践中存在用于不侵权抗辩,这种使用需限定在合理使用范围内,因此称为指示性合理使用更确切。相对比地,美国商标法“Lanham Act”中也有商标正当使用的概念。美国商标法的正当使用原则包括描述性正当使用和指示性正当使用。在指示性正当使用中,可以未经他人许可使用他人的商标,用于比较广告、新闻报道、新闻评论、学术工作、模仿和批评和评论等目的。 下面展开讨论非商标性使用的情形,这有助于企业或个人初步了解自己对他人商标的使用是否会侵犯商标权。    非商标性使用-描述性使用  商标或服务提供者除标识自己的商标,以便于消费者识别外,还会对商品的质量、主要原料、功能、用途、重量、数量、产地、型号或者生产者的名称等其他特点予以说明,从而使消费者了解商品的特性、使用方法等,以达到促销其商品或服务的目的。根据中国商标法第59条的规定,注册商标权人无权禁止他人正当使用。 例如,A公司在销售网页链接中使用“Dliziz椰子款”标识销售鞋类商品,其中,“Dliziz”是A公司的注册商标,而“椰子”标识是另一B公司...
  • 点击次数: 1000000
    2024 - 07 - 05
    作者:金涟伊在当今互联网迅猛发展的背景下,电子商务已经成为人们最普遍的交易手段。然而,由于法律的相对滞后性,与电子商务相关的法规亟需进一步完善。对于未经商标注册人授权,在网络店铺名称使用与他人注册商标相同或相似的标识的行为,现行的商标法并未对此提供明确的指导。相关权利人在维权过程中通常同时援引商标法和反不正当竞争法,而不同法院在判决时所依据的法律也存在差异。 经检索相关判决书,我们发现法院判决主要有两种不同观点,一是认为网络店铺名称可类比于企业名称,以反不正当竞争法予以规制,二是认为网络店铺名称侵权导致相关公众混淆误认的,应认定为商标侵权。 2018年河北省高级人民法院所持的观点即为第一种观点。在(2018)冀民429号判决书中,河北省高级人民法院支持了一审法院的观点,即“……官方旗舰店的店铺名称属于一种企业(店铺)字号,而将他人注册商标用于自己企业字号的行为,已被《中华人民共和国商标法》第五十八条‘将他人注册商标、未注册的驰名商标作为企业名称中的字号使用,误导公众,构成不正当竞争的,依照《中华人民共和国反不正当竞争法》处理。’的规定吸纳,不属于《中华人民共和国商标法》第五十七条规定的侵害商标专用权的情形。” 故此,法院依据反不正当竞争法作出裁判,维护了权利人的相关权益。 但更多判决倾向于第二种观点。2020年北京市西城区人民法院在(2020)京0102民初27860号判决中认为,被诉侵权店铺将商标使用于店铺名称、店铺内宣传、商品名称及商品图片等位置,此种使用系为标明商品来源,属于商标性使用,因此适用商标法第五十七条第一款的规定,被告的行为侵害了原告的商标专用权。 2022年义乌市人民法院在(2022)浙0782民初6308号判决中认为,“对于被告滔馨公司在其网店名称及网店LOGO中使用‘泉日记’字样的行为,并未经过原告的授...
  • 点击次数: 1000005
    2024 - 06 - 28
    作者:张嘉畅 在对美贸易当中,商标保护是至关重要的一环。注册美国商标有利于商标在海关备案,有利于避免商标侵权,同时,经营亚马逊平台商家也需要注册美国商标从而进行亚马逊店铺的品牌备案。与中国商标法不同,美国商标制度更加注重商标在商业当中的实际使用。从申请到注册甚至续展,申请人在许多环节需要向美国专利商标局提供使用证据,以确保商标有效。本文旨在整理美国商标申请注册需提交使用证据的关键环节,以便外贸企业快速了解,避免商标因错过提交使用证据时间而影响商标效力。 美国注册商标需要提供使用声明及证据的时间节点如下表: 一、申请阶段 美国商标申请的申请依据有五种:1. 根据商标法第 1(a) 条,在商业中使用商标;(2) 根据商标法第 1(b) 条,有在商业中使用商标的真实意图;(3) 根据商标法第 44(d) 条,基于在先提交的外国申请,要求优先权;(4) 根据商标法第 44(e) 条,拥有申请人原籍国的商标注册所有权;以及 (5) 根据商标法第 66(a) 条,将国际注册的保护延伸至美国。 当申请人选择商标法1(a)条款,即以实际使用为依据提交申请时,需要在申请的同时提交商标已使用声明,并在每个类别提交使用证据,说明申请人如何在商业经营当中使用该商标。 如果申请商标尚未在美国实际投入使用,申请人也可以选择以意图使用为依据提交申请。此种方式提交申请时无需提交使用证据,但需要基于其在商业中使用商标的真实意图。在商标经过实质审查被核准后的6个月内,申请人需要像1(a)申请一样提交使用声明,并且同时提交使用证据。用此种依据提交美国申请,有助于商标权利人在商业经营当中更早地进行商标申请,也有更多的准备时间将商标投入使用。 其他申请依据通...
  • 点击次数: 1000003
    2024 - 06 - 21
    作者:陈巴特【基本案情】2019年1月,B公司作为承包人,与发包人A公司签订了《建设工程施工合同》,约定由B公司承包A公司发包的某项目工程施工。合同对工期、总价款、工程款的结算和支付、质量标准、违约责任等诸多事项进行了详细约定。自然人C某在项目所在地多年承包工程施工,具有较强的施工能力及经济实力。C某欲承包该项工程,找到B公司,请求B公司将该项工程全部转包给C某施工,B公司同意以“内部承包”的方式将该项工程转包。随后,C某委托自然人D某与B公司签订了《施工项目内部管理目标责任书》(以下简称《目标责任书》),约定双方权利义务,并约定C某安排D某作为该工程项目负责人具体组织施工。在施工过程中,管理人员及劳务队均由C某聘用,前期垫资均由C某通过财务人员支出。但C某因有其他工程项目需要亲自管理,极少到该工程施工现场,更没有和B公司、A公司相关人员直接对接联系。D某作为项目负责人,则常与B公司、A公司相关人员直接对接联系。在精心组织下,该项目工程在工期内顺利完工,并于2020年10月通过竣工验收合格,依法在当地建设管理中心备案。2021年11月,发包人A公司委托第三方对该项目工程造价进行结算审核。经审核,结算造价为人民币850万余元。2023年5月,因尚有285万余元的工程款长时间未支付,且多次主张权利未果的情况下,C某以实际施工人名义,作为原告,将A公司和B公司列为共同被告,一纸诉状诉至项目所在地人民法院。在诉讼过程中,B公司为推卸责任,主张C某不具备诉讼主体资格,实际施工人应是D某和C某,并安排其财务人员及D某出庭作证。财务人员证明其一直和D某对接联系,并未见过C某,D某是实际施工人。D某本人则出庭作证,陈述自己和C某合伙,享有15%合伙份额,是共同的实际施工人,D某无权单独提起诉讼。但C某同时表示自己从未投入资金,亦未有书面合伙协议证实。【争议焦点】本案在工程价款、质量等其他问...
× 扫一扫,关注微信公众号
北京市铭盾律师事务所 www.mdlaw.cn
Copyright© 2008 - 2020北京市铭盾律师事务所京ICP备09063742号-1犀牛云提供企业云服务
X
1

QQ设置

3

SKYPE 设置

4

阿里旺旺设置

5

电话号码管理

6

二维码管理

展开