The release of hacked emails written by well-known climate scientists has been widely reported around the world, as those emails have raised questions about whether the science behind global warming has been overstated.
This New York Times blog post by the paper's science reporter caused a mini-furor of its own in the blogosphere. In the post, Andrew Revkin writes of the hacked emails:
The documents appear to have been acquired illegally and contain all manner of private information and statements that were never intended for the public eye, so they won’t be posted here.
While Revkin's statement was rather unclear, some critics wondered whether this constituted a new Times policy, one that was not in effect, for example, when the Pentagon Papers were published or when various leaked documents from the Bush Administration were published. In a follow up to his post, Revkin points out that, from the beginning of the story, the Times has quoted the emails and provided links to other sites that have them posted.
Leaving aside the merits of the blogstorm in this case, the controversy does raise -- once again -- the question of how a media outlet should handle the receipt of documents that it has reason to believe were obtained illegally.
The answer, as a legal matter, is fairly simple. Since the United States Supreme Court case of Bartnicki v. Vopper, the law is clear that when a media outlet lawfully obtains information from a third party -- even if the third party obtained it illegally -- publication of that material is protected by the First Amendment. In Bartnicki, which involved the broadcast of the contents of a cell phone call that had been illegally taped, the Court recognized the important government interest in protecting the privacy interests of the public at large, but held that, "[i]n this case, privacy concerns give way when balanced against the interest in publishing matters of public importance."
Of course, the answer would be different had the radio station that broadcast the tapes actually recorded the conversations itself. The First Amendment does not immunize a reporter from his or her own illegal activity. The answer might also be different if the disclosure did not concern a matter of public importance, or if the party releasing the material had some independent legal duty not to disclose it (as was the case in Boehner v. McDermott).
The policy question for media outlets is far more complicated. Should the fact that the climate science emails contained "private" information give a media outlet legitimate pause before deciding to publish them? Perhaps, though Andrew Revkin can probably tell you that deciding when to publish and when not to publish "private" information opens you up to charges of hypocrisy.
And yet, a blanket rule favoring publication may be problematic in some cases. For example, to the degree any of these emails containing "private" information came from a government source, the Federal Privacy Act may be implicated. Thus, if the government or a private individual pursues a Privacy Act action against whoever leaked the documents, the media outlet that received those documents may find itself being forced to reveal its sources (or facing the consequences for refusing to do so).
Check back later this week for a story from New Hampshire that implicates both Bartnicki and the developing case law on anonymous internet commentary.
Add a comment
Archives
- January 2022
- June 2021
- March 2020
- August 2019
- March 2019
- October 2018
- July 2016
- June 2016
- May 2016
- February 2016
- November 2015
- September 2015
- July 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- July 2014
- March 2014
- July 2013
- June 2013
- April 2013
- March 2013
- October 2012
- September 2012
- August 2012
- April 2012
- March 2012
- February 2012
- January 2012
- November 2011
- September 2011
- June 2011
- May 2011
- April 2011
- February 2011
- January 2011
- December 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- September 2009
- August 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2006
- February 2006
Recent Posts
- Rethinking Your Cyber Insurance Needs as Your Workplace Evolves
- Data Breach Defense for Educational Institutions
- COVID-19 and the Increased Cybersecurity Risk in a Work-From-Home World
- Like Incorporating Facebook into your Website? EU Decision Raises New Issues
- Lessons Learned: Key Takeaways for Every Business from the Capital One Data Breach
- Will Quick Talks to WRAL About Privacy Issues Related to Doorbell Cameras
- About Us
- Not in My House - California to Regulate IoT Device Security
- Ninth Circuit Says You’re Going to Jail for Visiting That Website without Permission
- Ninth Circuit Interprets “Without Authorization” under the Computer Fraud and Abuse Act
Topics
- Data Security
- Data Breach
- Privacy
- Defamation
- Public Records
- Cyberattack
- FCC Matters
- Reporters Privilege
- Political Advertising
- Newsroom Subpoenas
- Shield Laws
- Internet
- Miscellaneous
- Digital Media and Data Privacy Law
- Indecency
- First Amendment
- Anti-SLAPP Statutes
- Fair Report Privilege
- Prior Restraints
- Wiretapping
- Education
- Access to Courtrooms
- FOIA
- HIPAA
- Drone Law
- Access to Court Dockets
- Access to Search Warrants
- Intrusion
- First Amendment Retaliation
- Mobile Privacy
- Newsroom Search Warrants
- About This Blog
- Disclaimer
- Services