在与密友团聚时,人们往往会展现其不为众人所知的一面。但若稍不提防或不留心,与朋友在一起的场面便被拍摄并以数字化形式瞬间传遍全世界,那将会怎样?请别觉得不可思议,因为现在我们已经拥有了这样的技术。
然而现在,即便上传者和照片中的人并不认识,新的面部识别系统也使计算机用人名来标记照片成为可能。众所周知的照片搜索引擎之一是PolarRose;它先从整个网络上搜寻照片,然后把查寻到的照片中的人脸与以前被标记过的照片中的人脸进行比较、匹配,之后便标记新的照片,并且使它的数据库完全可查。
{2}E-mailfromSheilaTran,MediaRelationsContact,Yahoo!SearchandSocialMedia,totheHarvardLawReview(Jan.25,2007,00:09:28EST)(onfilewiththeHarvardLawSchoolLibrary).
{4}SeeMichaelL.Rustad&ThomasH.Koenig,CybertortsandLegalLag:AnEmpiricalAnalysis,13S.Cal.Interdisc.L.J.77,80(2003);JoNapolitano,HoldItRightThere,andDropThatCamera,N.Y.Times,Dec.11,2003,atG1(“[T]echnologyhasdevelopedatthespeedoflightandAmericanlawisstuckintheStoneAges.”’(quotingBarrySteinhardt,Dir.,ACLUTech.andLibertyProgram).
{5}SamuelD.Warren&LouisD.Brandeis,TheRighttoPrivacy,4Harv.L.Rev.193,193(1890).Severalscholarlyarticlesprovidemoredepthonthedevelopmentofprivacyscholarshipandcaselaw.See,e.g.,JonathanKahn,BringingDignityBacktoLight:PublicityRightsandtheEclipseoftheTortofAppropriationofIdentity,17CardozoArts&Ent.L.J.213(1999);Coleman,supranote35,at209-14;AlanKatoKu,Comment,TalkIsCheap,butaPictureIsWorthaThousandWords:PrivacyRightsintheEraofCameraPhoneTechnology,45SantaClaraL.Rev.679,681-86(2005);AimeeJodoiLum,Comment,Don′tSmile,YourImageHasJustBeenRecordedonaCamera-Phone:TheNeedforPrivacyinthePublicSphere,27U.Haw.L.Rev.377,380-84(2005).
{6}SeeWilliamL.Prosser,Privacy,48Cal.L.Rev.383,389-407(1960).
{7}SeeAndrewJayMcClurg,BringingPrivacyLawoutoftheCloset:ATortTheoryofLiabilityforIntrusionsinPublicPlaces,73N.C.L.Rev.989,998-99(1995).
{9}SeePhillipE.Hassman,Annotation,TakingUnauthorizedPhotographsasInvasionofPrivacy,86A.L.R.3d374,375(1978)(“Wherethepictureistakenonthepublicstreets,orinapublicplacesuchasacourtroomorasportingevent,thecourtshaverefusedtoconsiderthetakingasaninvasionofprivacy.”).
{10}Fogelv.Forbes,Inc.,500F.Supp.1081,1087(E.D.Pa.1980);seealsoForsterv.Manchester,189A.2d147,150(Pa.1963).
{11}SeeAcmeCircusOperatingCo.v.Kuperstock,711F.2d1538,1542(11thCir.1983)(discussinghowtheplaintiffsnamehasa“secondarymeaning”thatactsashisbrand).
{12}SeeEugeneVolokh,FreedomofSpeechandInformationPrivacy:TheTroublingImplicationsofaRightToStopPeoplefromSpeakingAboutYou,52Stan.L.Rev.1049,1057-62(2000).
{14}SeeJonathanZittrain,InternetPointsofControl,44B.C.L.Rev.653,660-64(2003).
{15}TitanSports,Inc.v.ComicsWorldCorp.,870F.2d85,88(2dCir.1989).
{16}SeeVolokh,supranote12,at1076-80.ProfessorVolokhisalsoconcernedthatcourtsmayusetheirroleasarbitersofprivacyrightstoexertcontroloverwhatpeoplesay.Seeid.at1089-90.
{17}SeeUnitedStatesv.EdgeBroad.Co.,509U.S.418,427-28(1993);Cent.HudsonGas&Elec.Corp.v.Pub.Serv.Comm′nofN.Y.,447U.S.557,564(1980).
{19}Courtshavecreditedsuchanargument,see,e.g.,MCW,Inc.v.Badbusinessbureau.com,L.L.C.,No.Civ.A.3:02-CV-2727-G,2004WL833595,at*10(N.D.Tex.Apr.19,2004);Carafanov.Metrosplash.com,Inc.,207F.Supp.2d1055,1067(C.D.Cal.2002),butonlyrarely.
{20}SeeKenS,Myers,Wikimmunity:FittingtheCommunicationsDecencyActtoWikipedia,20Harv.J.L.&Tech.163,197-98&n.204(2006)(listingthefewcasesinwhichcourtshavenotgrantedsafeharborimmunity).
{21}StevenD.Levitt&JackPorter,SampleSelectionintheEstimationofAirBagandSeatBeltEffectiveness,83Rev.Econ.&Stat.603,614(2001).
{22}SeeJonathanZittrain,TheFutureoftheInternet-AndHowToStopIt(forthcoming2007)(manuscriptatch.9,onfilewiththeHarvardLawSchoolLibrary).