Language

The WeRead Case: Discussion on Reasonable Digital Privacy Expectation

Authored by Yingying Zhu

 

March 2021

Each of us leaves a lasting digital footprint on the internet and would expect businesses that we are dealing with could treat our digital privacy with reasonable care and consideration. Can users have a reasonable privacy expectation in the friends made and the books read online? The Beijing Internet Court in its recently released WeRead judgment holds that, friends list and reading data are not eligible for privacy protection in the case under dispute but nevertheless entitled to protection as personal information.

Background

The judgment is in relation to a dispute between an individual, Huang, a user of a book reading app named WeRead, and the digital giant, Tencent, the operator of the most successful social media in China, WeChat, and its sister app WeRead. The WeRead app wishes to set up an app-based reading community, where people who enjoy reading can read & connect. The plaintiff Huang was complaining that WeRead sneaked away her friends list from WeChat and then automatically turned those who are also subscribers of WeRead as her connections. Huang was also complaining that the information regarding the books she read and how she felt about the reading was widely open to all her connections without her permission while she intended to keep such information private. In its defense, the defendant Tencent alleged that users’ friends list and reading data were obtained with a preapproval from users therefore it should not be held liable for the utilization of the data.

Decision of Beijing Internet Court[1]

The Beijing Internet Court (hereinafter the “BIC”), the Court of First Instance, decides that Huang’s friends list and reading data shall not be categorized as private information, hence not eligible for privacy protection.

To define what constitutes private information, the BIC’s reasoning is based on the classification of the following three layers of personal information:

1.     personal information reasonably recognized by the society as private information, such as one’s sextual orientation, sex life, history of disease and unreleased criminal records, etc.

2.     personal information on which one may hold a defensive expectation or a utilization expectation; and

3.     general information that has no traits of privacy at all.

 

The BIC holds, because one’s friends list and reading data do not constitute private information as listed in layer 1 in the above classification, Tencent is not liable for invasion of the plaintiff’s privacy.

 

The BIC goes on to reason that one’s friends list and reading data shall be classified under layer 2 in the above classification, where the information is considered personal but not private and therefore the emphasis of protection is to give the data subject a right to decide whether to hide or to use such information.

 

The BIC further holds that in this case the plaintiff did not get the chance to decide how to deal with her personal information, because Tencent failed to give proper and transparent notices to the plaintiff and failed to obtain her affirmative consent before utilizing the information under dispute. The BIC then decides that Tencent should be held liable for violation of the plaintiff’s legitimate interests in her personal information. The BIC’s decision is majorly based on Article 43 of the Cybersecurity Law of China. [2]

Discussion

1.    What is Privacy?

According to Eric Hughes, an American mathematician, computer programmer, and cypherpunk, “Privacy is the power to selectively reveal oneself to the world.” [3] Broadly speaking, privacy is the right to be let alone, or freedom from interference or intrusion. Information privacy is the right to have some control over how your personal information is collected and used.[4]

 

The Civil Code of China (2021) defines privacy as peace in a person’s private life and the private space, private activities and private information that a person does not intend for others to know.[5]

 

As a governing law, the Civil Code’s definition of privacy is vague. As we know, privacy varies greatly from person to person: while one person may be comfortable with showing his or her diet recipe online, another person may be embarrassed to let others know how little (or how much) he or she eats over a meal. Similarly, while one person may be at ease with disclosing many details of his or her personal life to online social connections, another person may feel ashamed of posting anything personal on the internet. So exactly what kind of privacy does the Civil Code protect? Some guidance from a concurring opinion in a US Supreme Court decision might shed some light on this.

 

2.    Reasonable Expectation of Privacy

To define the right to privacy under the Fourth Amendment, [6]  the US Supreme Court Justice John Marshall Harlan, in his concurring opinion in Katz, [7]  formulated a “reasonable expectation of privacy” test. The test has two prongs:

1)     the person must exhibit an “actual (subjective) expectation of privacy”; and

2)     society recognizes the expectation as “reasonable.”

The Katz “reasonable expectation of privacy” test, while particularly useful in terms of defining privacy, also provokes further questions: what is reasonable? where to draw the line between “reasonable” expectation and expectation that is “unreasonable”? These questions matter hugely in today’s digital world, because every time a user creates a new account at an online platform, the user provides information with personal details, including name, birthdate, geographic location, and personal interests, etc. Users are entitled to know if they can have a “reasonable expectation of privacy” in such information and if such expectation could be respected by the platform.

 

3.    Exceptions to the Reasonable Expectation of Privacy

 

There are several recognized exceptions to the reasonable expectation of privacy, such as the Third-Party Doctrine, which means once an individual invests a third party with information, and voluntarily agrees to share information with a recipient, the individual loses any reasonable expectation of privacy in that information, [8] and the Voluntary consent Doctrine, which means individuals lose a reasonable expectation of privacy when they consent to a search of private information.[9]Other exceptions include the following: unlawful information is not protectable by the law and therefore there should be no reasonable expectation of privacy,[10] and public disclosure of private information will cause forfeiture of any reasonable expectation of privacy.[11]

 

4.    Where did the Court draw the Line?

 

The BIC obviously referenced the Katz test by reasoning that “the privateness in the information that one does not intend to disclose depends on a subjective intent, however, such subjective intent shall be reasonably recognized by the society.”

 

Then the BIC made the point that the information about one’s social relationship could only invoke reasonable expectation of privacy under the following circumstances: the relationship between the data subject and certain connections would be too intimate to let others know, or the disclosure of some social relationship would negatively affect the data subject’s social image.

 

With respect to the book reading data, the BIC made another similar point that one could only have reasonable expectation of privacy in one’s reading data if certain reading contents fall into some private and secret information region or the reading data, when generated at certain amounts, would reflect negatively on the data subject.

 

Then the BIC commented that the plaintiff’s online social relationship, i.e., the listed friends, is being identified by open-ID, profile and nickname, which should not show the real social relationship or the degree of intimacy between the plaintiff and her social connections. The BIC also went through the contents of the plaintiff’s reading data and found that neither of the two books displayed to her connections would cause any damage to the plaintiff’s social image. The plaintiff’s reading data therefore should not be categorized as private information, hence no reasonable privacy expectation in the data.

 

In a nutshell, the BIC was defining “reasonable expectation of privacy” in the digital world based on the content of certain information. If a piece of information contains nothing intimate or cannot reflect negatively on the data subject, then the data subject should not have a “reasonable expectation of privacy” in the information. The content-based approach is how the BIC drew the line between privacy and non-privacy related information.

 

5.    Content-based Approach is not Fair

 

The BIC’s views on this issue are deeply disturbing. Back to the definition of privacy, broadly speaking, privacy is the right to be “let alone”. It means when a person walks into an isolated space, the person could expect to be in a state in which one is not observed or disturbed by other people,[12] as long as nothing illegal is ongoing under the roof. By applying the Katz test, this person has a reasonable expectation of privacy because the person demonstrates a subjective expectation of privacy by “walking into the isolated space”, which is well recognized by the society as reasonable.  Furthermore, the person’s act does not fall into any of the aforesaid exceptions.

 

 In solitude, a decent citizen could expect the same degree of privacy as much as anyone would. The right to privacy does not depend on whether something shameful is being conducted inside that isolated space. The right to privacy does not depend on the activity happened inside. Instead, it depends on whether one’s demonstration of intent to be let alone could be accepted as reasonable by the society. However, under the content-based approach, a decent citizen would have less expectation of privacy than someone who conducts shameful behaviour in solitude, and this approach apparently leads to unfair results.

 

Here comes the digital world version of the above scenario. When an individual, like the plaintiff Huang, subscribes to open an account at an online platform, like WeRead, and secures it with a password, this would create an isolated space where this person could expect digital privacy. By applying the Katz test, this individual has a reasonable expectation of privacy as he or she demonstrates a subjective expectation of privacy by “creating a password-secured account”, which is well recognized by the society as reasonable.  Likewise, the person’s act does not fall into any of the aforesaid exceptions.

 

This person is fully entitled to assert a digital privacy right to be “let alone”. One can choose not to have any improper friends, and not to read any obscene books, but can still enjoy full privacy rights over one’s personal information. It literally means that being a decent netizen should not compromise one’s digital privacy rights. The content of the information stored in a password-secured account, if it is nothing unlawful, should not dictate if and how the person would enjoy the right to privacy.

 

The above scenario shows that the content-based approach taken by the BIC is not fair because it makes users’ digital privacy rights conditional on the content of personal information, i.e., if the information includes any embarrassing content or not. This approach leads to the unfair conclusion that being a decent netizen, one has nothing shameful to hide and therefore would not have reasonable expectation of digital privacy.

 

Conclusion

 

With the storage and processing of exabytes of data, social media users’ concerns about their privacy have been on the rise in recent years. Incidents of illegal use of data and data breaches have alerted many users and caused them to reconsider their interaction with social media and the security of their personal data.

The disputes caused by unauthorized use of personal information over the internet have spiked in the privacy law landscape. The Beijing Internet Court’s present decision, which echoes with the same court’s decision on the “Dou Yin (Tik Tok Chinese version) collection of personal information” case, [13] is among the first few decisions made by Chinese courts on this controversial issue. Significantly, the decision might impact ongoing litigation stemming from similar disputes. Other courts around the country might follow suit. Therefore, it is imperative to have a more clear and fair approach towards defining reasonable digital privacy expectation.

In the era of big data, defining privacy is under pressure in the digital world. As Bill Gates put it: “whether it’s digital cameras or satellites or just what you click on, we need to have more explicit rules — not just for governments but for private companies.” [14]

 

 




[1] Beijing Internet Court, (2019) Jing 0491Min Chu Zi No. 16142.

[2]  China Cybersecurity Law, Article 43, provides, “Where an individual finds that any network operator collects or uses his or her personal information in violation of the provisions of any law, administrative regulation or the agreement of both parties, the individual shall be entitled to request the network operator to delete his or her personal information. If the individual finds that his or her personal information collected or stored by the network operator has any error, he or she shall be entitled to request the network operator to make corrections. The network operator shall take measures to delete the information or correct the error.”

[3] Eric Hughes, The Cypherpunk Manifesto (1993), see https://www.activism.net/cypherpunk/manifesto.html.

[4] See https://iapp.org/about/what-is-privacy/.

[5] Article 1032, China Civil Code (2021).

[6] The Fourth Amendment of the US Constitution, ratified on December 15, 1791, protects the right of people “to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.”

[7]See Katz v. United States, 389 U.S. 347 (1967). Concurring opinion written by Justice Harlan.

[8] See Smith v. Maryland, 442 U.S. 735, 743-44 (1979).

[9] See Katz v. United States, 389 U.S. 347 (1967).

[10] See https://civillaw.com.cn/bo/t/?id=37410.

[11] Ibid.

[12] See https://www.igi-global.com/dictionary/privacy-data-protection-towards-elderly/23405.

[13]See Beijing Internet Court, (2019) Jing 0491Min Chu Zi No. 6694.

[14] See https://www.oipc.bc.ca/news/quote-of-the-day-bill-gates/.


  • 相关资讯 More
  • 点击次数: 1000005
    2025 - 03 - 28
    作者:赵丹青 不同于普通商品广告,药品由于其治病救人、直接关乎人民生命、健康安全的特殊性,对于药品的广告,我国设立了严格的监管措施。 根据药品的属性,不同药品在广告方面的规定大致分为以下三种: 第一、特殊药品不得作广告,包括麻醉药品、精神药品、医疗用毒性药品、放射性药品等特殊药品,药品类易制毒化学品,以及戒毒治疗的药品、医疗器械和治疗方法,不得作广告。第二、处方药,只能在国务院卫生行政部门和国务院药品监督管理部门共同指定的医学、药学专业刊物上作广告。并且应当显著标明本广告仅供医学药学专业人士阅读。第三、非处方药可以作广告,但广告的内容受到严格限制,包括但不限于:1、药品广告的内容不得与国务院药品监督管理部门批准的说明书不一致,并应当显著标明禁忌、不良反应。2、非处方药广告应当显著标明请按药品说明书或者在药师指导下购买和使用。3、不得含有表示功效、安全性的断言或者保证。4、不得说明治愈率或有效率。5、不得与其他药品进行功效和安全性比较。6、不得利用广告代言人作推荐、证明。 同时,我国对于药品广告实行审批制度。发布药品广告,应当向药品生产企业所在地省、自治区、直辖市人民政府药品监督管理部门报送有关材料,取得《医疗广告审查证明》。并且,药品生产企业不得篡改经批准的药品广告内容。 需要注意的是,伴随自媒体时代的快速发展,在所谓私域如微信朋友圈、微信群里发布药品广告,也应遵守法律法规,对广告内容的真实性尽到审核、把关义务,否则也将承担相应的法律责任。比如,如果广告中涉及的药品为处方药,显然朋友圈不属于法律规定的医学、药学专业刊物,那么该广告发布行为就构成违法发布处方药广告。即便该药品为非处方药,该广告内容是否合法,是否取得《医疗广告审查证明》等都需要仔细审核。 了解这些知识,可以帮助普通消费者在日常生活中判断药品广告的真实性...
  • 点击次数: 100007
    2025 - 03 - 14
    作者:张嘉畅在品牌竞争愈发激烈的当下,商标不仅是企业的身份标识,更是市场竞争中的宝贵资产。然而,不少企业由于种种原因未能及时完成商标注册,导致商标遭他人抢注。面对这一挑战,如何有效维权成为企业关注的重点议题。以下为您详细解析在中国,若商标尚未注册却遭遇抢注,应采取哪些策略进行维权。首先,即便商标未经注册,只要符合特定条件,依然能够获得法律庇护。如果您的商标已在中国大陆使用,则可以受到在先使用的保护。如果您的商标未经注册但已经使用获得了较高知名度,可以依据《商标法》第十三条向法院申请认证为驰名商标。如果您的商标标识具有独创性,则该标识可以受到著作权保护。其次,《商标法》明确规定,商标申请应当出于善意,且不得侵犯他人权利。因此,如遇商标抢注行为,您可以援引《商标法》第四条、第九条、第十条、第十三条、第十五条、第三十条、第三十二条,对恶意抢注商标采取措施,以维护自身权利。依据《商标法》的相关条款,您可以采取以下行动维护权益。一、提起商标异议若抢注者的商标申请尚未获准注册,仍处于初审公告阶段,您可以根据《商标法》三十三条提出商标异议。在此阶段,您需准备充足的证据,如商标使用记录、推广范围、宣传资料及销售合同等,以证实您的针对争议商标具有在先使用权利。二、申请商标无效宣告若抢注者的商标已成功注册,您可以根据《商标法》第四十五条的规定,在商标注册后五年内,向商标评审委员会申请宣告该注册商标无效。这种方法与异议相同,您需要证明对争议商标具有在先权利,也需要证明抢注商标申请注册具有恶意。三、提起三年不使用撤销若抢注商标注册已满三年,且经检索您发现该商标已连续三年无使用,则可以对该抢注商标提起三年不使用撤销。这个方法相较于其他方法来讲,举证责任要求较低,您仅需要提供简单的检索记录,证明该商标未使用即可。四、提起民事诉讼根据现行《民法典》、《商标法》规定,商标行政程序及后续行政诉讼仅解决抢注商...
  • 点击次数: 1000003
    2025 - 03 - 07
    作者:张琳张琳律师历经劳动仲裁、一审、二审等程序,于近日成功办结了一起劳动争议案件,为劳动者争取到了违法解除劳动关系赔偿金、应付未付的工资差额等款项共计三十余万元。 一、基本案情用人单位(以下称YYY分公司,注册地在北京,其总公司的注册地在河北)与劳动者(以下称XXX)签订了劳动合同,约定工作地点为河北、北京及YYY分公司规定的工作地点。XXX在北京安家,在劳动合同履行期间长期在北京工作,偶尔去河北出差,去河北出差时公司给XXX报销差旅费并提供住宿。疫情期间,YYY分公司的总公司及其关联公司通知全体员工公司因经营困难停工停产、全体员工待岗。在YYY分公司的总公司及其关联公司通知全体员工返岗复工时,一并通知XXX所在部门全体员工的工作地点均为河北。XXX客观上无法长期在河北上班,因此明确表示不同意公司单方变更工作地点的决定,仍坚持在北京工作。YYY分公司又向XXX发送了旷工警告函,但XXX仍明确表示不认可该旷工警告并继续在北京工作。YYY分公司就以XXX未去河北返岗复工、无故旷工多日为由,认为XXX严重违反公司规章制度,通知XXX解除劳动合同。XXX遂以YYY分公司违法解除劳动关系、欠付工资等为由,向劳动仲裁机构申请劳动仲裁,要求YYY分公司支付违法解除劳动关系赔偿金、应付未付的工资差额等款项。 二、裁判结果1、劳动仲裁机构、一审法院、二审法院均认为双方签订的劳动合同约定了多个工作地点,过于宽泛,应视为双方对工作地点约定不明。一审法院认定双方就XXX的工作地点达成合意即约定工作地点为北京,劳动仲裁机构和二审法院认定XXX入职后一直在北京工作,应认定劳动合同的实际履行地在北京。2、劳动仲裁机构、一审法院、二审法院均认为YYY分公司因自身原因需要调整XXX工作地点、岗位的,应与XXX协商达成一致,协商不成仍应按原劳动合同履行;而YYY分公司在未经与XXX协商的...
  • 点击次数: 1000002
    2025 - 02 - 28
    作者:金涟伊在经济全球化的今天,跨境贸易日益频繁,与域外企业签订合同已成为商业活动中的常态。然而,不同国家地区的法律制度对合同的签字和盖章效力有着不同的规定,稍有不慎就可能引发法律风险,给企业带来损失。因此在与域外主体签订合同的时候,应当注意确认相关国家地区法律适用,注意域外主体签章的效力,避免因为签章效力瑕疵而导致损失。一、法律体系差异在不同法律体系下,各国对公章效力存在显著差异。大陆法系国家如中国、德国、日本等普遍重视公章(法人章)的法定效力,通常要求公司正式文件必须加盖在政府部门备案的实体公章,同时签字人需通过公司章程明确授予的职务权限或持有书面授权文件,方可产生法律约束力。相比之下,普通法系国家包括美国、英国、新加坡等地更侧重签字的法律效力,公章并不作为法定必备要素,实践中多用于内部文件管理。其核心在于签署人是否经过公司合法授权,只要个人持有董事会决议或授权委托书,即使不盖公章,签字本身即可对公司产生法律约束力。二、重点国家/地区细则1. 美国在美国,合同的效力主要取决于签署人的签字权限。签约时,最好要求域外主体提供公司决议文件(Board Resolution)证明签署权限。此外,部分州还要求对签字进行公证。2. 德国在德国,签字权限通常体现在其主体资格证明上,有些公司有备案的公章,则最好要求其在合同上签字并盖章。3. 日本在日本,合同效力的关键是“代表取缔役”签字,在正式场合,也应当加盖公司印章。因此签约时,最好由域外主体在合同上加盖其在法务局登记过的印章,即圆印。4. 香港地区在香港地区,签字优先于公章。签约时,应当注意公司名称印刷章上必须具有董事签字,仅空白的公司名称印章是没有效力的。而我们常见的“小圆章”通常仅用于行政用途,如签收文件、签收货物、签发收据发票或改错。三、通用签约核查清单总结来说,为了确保合同的有效性,与域外主体签约时应进行以下核查:...
× 扫一扫,关注微信公众号
铭盾MiNGDUN www.mdlaw.cn
Copyright© 2008 - 2025 铭盾京ICP备09063742号-1犀牛云提供企业云服务
X
1

QQ设置

3

SKYPE 设置

4

阿里旺旺设置

5

电话号码管理

6

二维码管理

展开