SlideShare une entreprise Scribd logo
1  sur  49
Only goldfishes can live without privacy? Qian Tao,  Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
-----Intermediary Liability of Website Operators in Privacy Cases Privacy protection in cyberspace in China Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Privacy in Cyberspace Internet industries disclose users’ privacy Internet users disclose others’ privacy  users: direct liability website operators: indirect liability  Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Part 1 Privacy rules in China Part 2 Case studies Part 3  Freedom of expression and public concern Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Privacy Protection in China Constitutional law privacy doesn’t be clearly mentioned. Article 38. The personal dignity of citizens of China is inviolable. (considered as the constitutional basis) Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Privacy Protection in China In General Principles of the Civil Law (GPCL),1987, the section of rights of personality(reputation, name, image, etc): privacy isn’t included. Three Interpretations of the Supreme People`s Court ,1988 1993,2001 anyone discloses the privacy of others……should be determined as infringing upon right to reputation Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Privacy Protection in China  Tort Liability Law (July 1,2010)  privacy is written clearly in the article 2 as one of civil rights Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Chinese rules for cyber torts Tort liability Law 2010 (Article 36) The Administrative Provisions on Internet Audiovisual Program Services 2007 The Administrative regulation on Internet Information Service 2000 The Administrative Provisions on Internet Electronic Messaging Services 2000 Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Summary of these rules: website operator’s duties Warn/remind:      properly inform its users about the obligations which they are subjected to by law and about the risks implied by non-compliance Monitor:      Shall discover the apparently illegal contents Take down timely (in time):      take necessary measures timely when knowing its user violating others’ privacy by its service.  Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Liability  Know but have not taken down timely   (Knowledge based liability) Knowledge:  Have Known after notice of the infringement Should know the apparently illegal contents  Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Case studies Internet forums(Message Boards):                      Zhang  Xinlin v. Tianya.cn 2006 Wang Fei v. Tianya.cn 2008 Search engine:               Yin Hong v. Baidu.com 2010 Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Zhang Xinlin v. Tianya.cn Tianya.cn is the most popular forum in China with more than 30 million registered members. a registered user named “toochache girl” who was quite active and famous on Tianya was doubted to be a man by another user named“one hundred flavors”.  After a wrong investigation, “toochache girl” mistook Zhang for “one hundred flavors”.  Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Zhang Xinlin v. Tianya.cn  For revenge, “toochache girl” posted  Zhang’s landline number, mobilephone number,home adress, family member information on Tianya.cn.   She also posted that “Zhang had previously been detained and is now a fugitive from the law” (it is not true) Tianya took down the contents 35 hours later after his complaint. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Zhang Xinlin v. Tianya.cn Zhang sued that: Tianya’s slow response (in monitor and take down) resulted in :           his privacy being  exposed to the public 72 hours in total.            Reputation being damaged  Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Zhang Xinlin v. Tianya.cn Tianya argued that:   (1)   no editorial responsibility: not able to give pre-publication control.     (2) The filtering technology not able to  filter contents including personal information  automatically    (3)  taken down the contents as soon as they could after complaints were received. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Zhang Xinlin v. Tianya.cn Main  dispute: “timely”                    37 hours                          35 hours              monitor                            take down User Posting               victim complaint (notice)    website takedown Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Zhang Xinlin v. Tianya.cn The court avoided discussing this question given that there is no clear definition under the present laws. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Zhang Xinlin v. Tianya.cn The court held that: It is true that Electronic Messaging Service providers are not able to edit and control the contents in advance, but they can monitor after being posted. This monitor should be active and comprehensive, rather than passive.  Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Zhang Xinlin v. Tianya.cn If the service provider’s responsibility to take down unlawful information is based on victim’s notice,     it is unfair to victim because his right to complain is treated as an obligation in order to protect his legitimate right.   Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Zhang Xinlin v. Tianya.cn Ultimately, the court held  that Tianya failed to comply with the monitoring duty sufficiently, waited for victim’s complaint passively and indulged unlawful information disseminating on its system, Therefore, Tianya is liable for Zhang’s damages. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Question:If we should impose monitoring liability? Such an active moonitoring mode may cause problems: Place web operators in a difficult position of evaluating complaints and consequently removing all contents in question in order to aviod any possible liability. Chilling effect to freedom of expression Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Two years later..... In the case: Wang Fei v.Tianya.cn,      similiar cases, different outcomes. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Wang Fei v.Tianya.cn A post on Tianya.cn January 10, 2008 stated the whole process  of a recent hot news: a wife killed herself because of her hansband’s betray. Wangfei is this hansband. Numbers of persons have followed this post, and added comments.
Wang Fei v.Tianya.cn Among these comments, Wangfei’s personal information (such as phone number, email adress, home adress, family member etc.) was repeatedly exposed. There were also many insulting words to blame him. The contents were taken down March 15, 2008 Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Wang Fei v.Tianya.cn Wangfei sued Tianya for privacy and reputation damages. Tianya argued:  terms of use ,warning when users post    Taken down before the lawsuit (3 days before) Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Wang Fei v.Tianya.cn Main disputes: Monitor  and take down in time Terms of use as a way to immunity Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Wang Fei v.Tianya.cn The Court held: fulfilled the requirement of law by setting up monitor and filter  measures and publishing terms of use. had the monitor duty,     but  impossible to monitor every post based on the existing and common web managing mode and technological methods.  Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Wang Fei v.Tianya.cn Therefore:     Tianya shall take down the unlawful posts in question when discovering them itself or after victim’s complaint     Tianya is not liable since the posts in question were taken down before this lawsuit. (decision on December 18th, 2008) Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Question remained: timely.   35 hours V. 66 days Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
New question:terms of use If the Terms of use/ user agreement can  release the website operators of  liability? Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Changes learned From the case: Active monitor             passive monitor Problems: Passive monitoring mode may cause fringement increasingly. In order to get more visits,  some website operators post unlawful contents in the name of users. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Two years later, in 2010 Yin Hong v. Baidu.com Yin is a graduate  from  Shanghai Maritime University Baidu is the leading search engine service provider in China (as Google in US) Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Yin Hong v. Baidu Yin’s exboyfriend posted Yin’s nude photos on Internet for revenge on May 8, 2009.  Yin made a declaration on Shi Dai Newspaper asking all websites  to take measures to remove them as well as related news on 13th May 2009.  By searching “Yin Hong” , “Maritime scandal” or “Maritime Girl” as keywords on Baidu.com, thousands of links, which included photos and personal information of Yin ,could be found out. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Yin Hong v. Baidu Yin sued : Baidu’s service promoted the dissemination of photos and  increased her damage. Qian Tao, Scuola Supriore Sant'Anna,Italy taoqianchina@gmail.com
Yin Hong v. Baidu Baidu argued  (1) the search engine can’t identify contents  automatically; Baidu kept monitoring illegal contents and removed the links even before Yin’s cliam (2) the declaration on a local newspaper didn’t constitute a valid notice  (3)  new posts continually, new URLs. it was impossible to screen all links  even manually.  Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Yin Hong v. Baidu Main disputes: Valid notice If not valid,  should Baidu have known of illegal contents Take down effciently Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Yin Hong v. Baidu About the notice: The court held: who made the declaration on Newspaper is unclear because it was ended with “Ms. YH” instead of Yin’s full name. So didn’t constitute a valid notice Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Yin Hong v. Baidu About the knowledge The court held:  Because:  After May 8, 2009, it became the hottest topic Baidu received an anonymous complaint on May 15, 2009,   ------Therefore, Baidu should have had  knowledge of the infringement no later than May 15.  Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Yin Hong v. Baidu take-down standard hasn’t been mentioned. Ultimately, Baidu was held to be liable on June 30, 2010 Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Question:“Notice” requirement---- lack of legal guidance What are the formal requirements this notice must comply with?    any form? Who can effectively bring the notice ?     anyone?  Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Problems: “Notice” requirement  If  regardless of the validity of the complaints, it would result in intentional or unintentional abuses of reporting and wrong accusations Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Changes learned From the case: Passive monitor               moderate monitor : Implied consciousness (hot news) Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Put three cases together: Summary of questions: Monitor standard Knowleage standard Notice standard Take-down standard Self-regulation standard Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Put three cases together:Summary of changes:  2006-----2008------2010 Strict----loose-----moderate  Background: 2006  cyber targeting and cyber bullying  began. control the information on internet . 2008 promote internet market, especially the social networking websites. 2010 balance, control the increasing infringements In this process, freedom of expression has never been mentioned. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Freedom of expression Constitutional Law in ChinaArticle 35. Citizens of the People's Republic of China enjoy freedom of expression, and …… Legal status:  Freedom of expression> privacy? Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Dabate on “public concern” Public figures have a lesser expectation of privacy  But when someone who is not public figure but is nonetheless in postion of influence and is involved in a public debate or general concern? Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Dabate on “public concern” If the contents in question is truthful and  newsworthy information about a matter of public significance? Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
hypothesis:If these three cases happened in EU or US or any other countries where you are from, How will be the courts’ decision? Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
Thank you!   Qian Tao,  Sant'Anna School of Advanced Studies,Pisa,Italy China University of Political Science and Law, Beijing ,China taoqianchina@gmail.com Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com

Contenu connexe

Similaire à Privacy protection in cyberspace in China------ -----Intermediary Liability of Website Operators in Privacy Cases

Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate ResponsibilityCharles Mok
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityrmackinnon
 
Module 03. Livestreaming
Module 03. LivestreamingModule 03. Livestreaming
Module 03. LivestreamingJulian Matthews
 
Fireman Thank You.Pdf - Google Drive Fire Safety
Fireman Thank You.Pdf - Google Drive Fire SafetyFireman Thank You.Pdf - Google Drive Fire Safety
Fireman Thank You.Pdf - Google Drive Fire SafetyHolly Vega
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...Emily Võ
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case StudyDylan Holbrook
 
Chinafinal Letter To Clinton Internet Frdom 2 3 10
Chinafinal Letter To Clinton Internet Frdom 2 3 10Chinafinal Letter To Clinton Internet Frdom 2 3 10
Chinafinal Letter To Clinton Internet Frdom 2 3 10bkawamura
 

Similaire à Privacy protection in cyberspace in China------ -----Intermediary Liability of Website Operators in Privacy Cases (11)

Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate Responsibility
 
Fallows_Deborah---What has China earthquake done to its internet?
Fallows_Deborah---What has China earthquake done to its internet?Fallows_Deborah---What has China earthquake done to its internet?
Fallows_Deborah---What has China earthquake done to its internet?
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
 
Zhang Wenyu, Work Samples
Zhang Wenyu, Work SamplesZhang Wenyu, Work Samples
Zhang Wenyu, Work Samples
 
Module 03. Livestreaming
Module 03. LivestreamingModule 03. Livestreaming
Module 03. Livestreaming
 
Fireman Thank You.Pdf - Google Drive Fire Safety
Fireman Thank You.Pdf - Google Drive Fire SafetyFireman Thank You.Pdf - Google Drive Fire Safety
Fireman Thank You.Pdf - Google Drive Fire Safety
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case Study
 
Internet Law Primer
Internet Law PrimerInternet Law Primer
Internet Law Primer
 
Cyber law1
Cyber law1Cyber law1
Cyber law1
 
Chinafinal Letter To Clinton Internet Frdom 2 3 10
Chinafinal Letter To Clinton Internet Frdom 2 3 10Chinafinal Letter To Clinton Internet Frdom 2 3 10
Chinafinal Letter To Clinton Internet Frdom 2 3 10
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Privacy protection in cyberspace in China------ -----Intermediary Liability of Website Operators in Privacy Cases

  • 1. Only goldfishes can live without privacy? Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 2. -----Intermediary Liability of Website Operators in Privacy Cases Privacy protection in cyberspace in China Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 3. Privacy in Cyberspace Internet industries disclose users’ privacy Internet users disclose others’ privacy users: direct liability website operators: indirect liability Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 4. Part 1 Privacy rules in China Part 2 Case studies Part 3 Freedom of expression and public concern Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 5. Privacy Protection in China Constitutional law privacy doesn’t be clearly mentioned. Article 38. The personal dignity of citizens of China is inviolable. (considered as the constitutional basis) Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 6. Privacy Protection in China In General Principles of the Civil Law (GPCL),1987, the section of rights of personality(reputation, name, image, etc): privacy isn’t included. Three Interpretations of the Supreme People`s Court ,1988 1993,2001 anyone discloses the privacy of others……should be determined as infringing upon right to reputation Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 7. Privacy Protection in China Tort Liability Law (July 1,2010) privacy is written clearly in the article 2 as one of civil rights Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 8. Chinese rules for cyber torts Tort liability Law 2010 (Article 36) The Administrative Provisions on Internet Audiovisual Program Services 2007 The Administrative regulation on Internet Information Service 2000 The Administrative Provisions on Internet Electronic Messaging Services 2000 Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 9. Summary of these rules: website operator’s duties Warn/remind: properly inform its users about the obligations which they are subjected to by law and about the risks implied by non-compliance Monitor: Shall discover the apparently illegal contents Take down timely (in time): take necessary measures timely when knowing its user violating others’ privacy by its service. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 10. Liability Know but have not taken down timely (Knowledge based liability) Knowledge: Have Known after notice of the infringement Should know the apparently illegal contents Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 11. Case studies Internet forums(Message Boards): Zhang Xinlin v. Tianya.cn 2006 Wang Fei v. Tianya.cn 2008 Search engine: Yin Hong v. Baidu.com 2010 Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 12. Zhang Xinlin v. Tianya.cn Tianya.cn is the most popular forum in China with more than 30 million registered members. a registered user named “toochache girl” who was quite active and famous on Tianya was doubted to be a man by another user named“one hundred flavors”. After a wrong investigation, “toochache girl” mistook Zhang for “one hundred flavors”. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 13. Zhang Xinlin v. Tianya.cn For revenge, “toochache girl” posted Zhang’s landline number, mobilephone number,home adress, family member information on Tianya.cn. She also posted that “Zhang had previously been detained and is now a fugitive from the law” (it is not true) Tianya took down the contents 35 hours later after his complaint. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 14. Zhang Xinlin v. Tianya.cn Zhang sued that: Tianya’s slow response (in monitor and take down) resulted in : his privacy being exposed to the public 72 hours in total. Reputation being damaged Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 15. Zhang Xinlin v. Tianya.cn Tianya argued that: (1) no editorial responsibility: not able to give pre-publication control. (2) The filtering technology not able to filter contents including personal information automatically (3) taken down the contents as soon as they could after complaints were received. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 16. Zhang Xinlin v. Tianya.cn Main dispute: “timely” 37 hours 35 hours monitor take down User Posting victim complaint (notice) website takedown Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 17. Zhang Xinlin v. Tianya.cn The court avoided discussing this question given that there is no clear definition under the present laws. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 18. Zhang Xinlin v. Tianya.cn The court held that: It is true that Electronic Messaging Service providers are not able to edit and control the contents in advance, but they can monitor after being posted. This monitor should be active and comprehensive, rather than passive. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 19. Zhang Xinlin v. Tianya.cn If the service provider’s responsibility to take down unlawful information is based on victim’s notice, it is unfair to victim because his right to complain is treated as an obligation in order to protect his legitimate right. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 20. Zhang Xinlin v. Tianya.cn Ultimately, the court held that Tianya failed to comply with the monitoring duty sufficiently, waited for victim’s complaint passively and indulged unlawful information disseminating on its system, Therefore, Tianya is liable for Zhang’s damages. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 21. Question:If we should impose monitoring liability? Such an active moonitoring mode may cause problems: Place web operators in a difficult position of evaluating complaints and consequently removing all contents in question in order to aviod any possible liability. Chilling effect to freedom of expression Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 22. Two years later..... In the case: Wang Fei v.Tianya.cn, similiar cases, different outcomes. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 23. Wang Fei v.Tianya.cn A post on Tianya.cn January 10, 2008 stated the whole process of a recent hot news: a wife killed herself because of her hansband’s betray. Wangfei is this hansband. Numbers of persons have followed this post, and added comments.
  • 24. Wang Fei v.Tianya.cn Among these comments, Wangfei’s personal information (such as phone number, email adress, home adress, family member etc.) was repeatedly exposed. There were also many insulting words to blame him. The contents were taken down March 15, 2008 Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 25. Wang Fei v.Tianya.cn Wangfei sued Tianya for privacy and reputation damages. Tianya argued: terms of use ,warning when users post Taken down before the lawsuit (3 days before) Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 26. Wang Fei v.Tianya.cn Main disputes: Monitor and take down in time Terms of use as a way to immunity Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 27. Wang Fei v.Tianya.cn The Court held: fulfilled the requirement of law by setting up monitor and filter measures and publishing terms of use. had the monitor duty, but impossible to monitor every post based on the existing and common web managing mode and technological methods. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 28. Wang Fei v.Tianya.cn Therefore: Tianya shall take down the unlawful posts in question when discovering them itself or after victim’s complaint Tianya is not liable since the posts in question were taken down before this lawsuit. (decision on December 18th, 2008) Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 29. Question remained: timely. 35 hours V. 66 days Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 30. New question:terms of use If the Terms of use/ user agreement can release the website operators of liability? Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 31. Changes learned From the case: Active monitor passive monitor Problems: Passive monitoring mode may cause fringement increasingly. In order to get more visits, some website operators post unlawful contents in the name of users. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 32. Two years later, in 2010 Yin Hong v. Baidu.com Yin is a graduate from Shanghai Maritime University Baidu is the leading search engine service provider in China (as Google in US) Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 33. Yin Hong v. Baidu Yin’s exboyfriend posted Yin’s nude photos on Internet for revenge on May 8, 2009. Yin made a declaration on Shi Dai Newspaper asking all websites to take measures to remove them as well as related news on 13th May 2009. By searching “Yin Hong” , “Maritime scandal” or “Maritime Girl” as keywords on Baidu.com, thousands of links, which included photos and personal information of Yin ,could be found out. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 34. Yin Hong v. Baidu Yin sued : Baidu’s service promoted the dissemination of photos and increased her damage. Qian Tao, Scuola Supriore Sant'Anna,Italy taoqianchina@gmail.com
  • 35. Yin Hong v. Baidu Baidu argued (1) the search engine can’t identify contents automatically; Baidu kept monitoring illegal contents and removed the links even before Yin’s cliam (2) the declaration on a local newspaper didn’t constitute a valid notice (3) new posts continually, new URLs. it was impossible to screen all links even manually. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 36. Yin Hong v. Baidu Main disputes: Valid notice If not valid, should Baidu have known of illegal contents Take down effciently Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 37. Yin Hong v. Baidu About the notice: The court held: who made the declaration on Newspaper is unclear because it was ended with “Ms. YH” instead of Yin’s full name. So didn’t constitute a valid notice Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 38. Yin Hong v. Baidu About the knowledge The court held: Because: After May 8, 2009, it became the hottest topic Baidu received an anonymous complaint on May 15, 2009, ------Therefore, Baidu should have had knowledge of the infringement no later than May 15. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 39. Yin Hong v. Baidu take-down standard hasn’t been mentioned. Ultimately, Baidu was held to be liable on June 30, 2010 Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 40. Question:“Notice” requirement---- lack of legal guidance What are the formal requirements this notice must comply with? any form? Who can effectively bring the notice ? anyone? Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 41. Problems: “Notice” requirement If regardless of the validity of the complaints, it would result in intentional or unintentional abuses of reporting and wrong accusations Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 42. Changes learned From the case: Passive monitor moderate monitor : Implied consciousness (hot news) Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 43. Put three cases together: Summary of questions: Monitor standard Knowleage standard Notice standard Take-down standard Self-regulation standard Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 44. Put three cases together:Summary of changes: 2006-----2008------2010 Strict----loose-----moderate Background: 2006 cyber targeting and cyber bullying began. control the information on internet . 2008 promote internet market, especially the social networking websites. 2010 balance, control the increasing infringements In this process, freedom of expression has never been mentioned. Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 45. Freedom of expression Constitutional Law in ChinaArticle 35. Citizens of the People's Republic of China enjoy freedom of expression, and …… Legal status: Freedom of expression> privacy? Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 46. Dabate on “public concern” Public figures have a lesser expectation of privacy But when someone who is not public figure but is nonetheless in postion of influence and is involved in a public debate or general concern? Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 47. Dabate on “public concern” If the contents in question is truthful and newsworthy information about a matter of public significance? Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 48. hypothesis:If these three cases happened in EU or US or any other countries where you are from, How will be the courts’ decision? Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com
  • 49. Thank you! Qian Tao, Sant'Anna School of Advanced Studies,Pisa,Italy China University of Political Science and Law, Beijing ,China taoqianchina@gmail.com Qian Tao, Scuola Superiore Sant'Anna,Italy taoqianchina@gmail.com