SlideShare a Scribd company logo
Right to Personality
and Privacy
in South Korea
K.S. Park
@unbeatenpath kyungsinpark@korea.ac.kr
Professor, Korea University Law School
Exec Director, Open Net Korea
Exec Director, PSPD Law Center
Presentation at UN Special Rapporteur Joseph Cannataci’s
Consultation on July 19-20, NY, NY
If we define personality as:
•How one is perceived by others and in the
society
•How one feels about oneself
Laws protecting right to personality
• Criminal Code, Article 311 – Insult
• Criminal Code, Article 307 (1) – Truth defamation
• Criminal Code, Article 307 (2) - Falsity defamation
• Personal Data Protection Act
• Portrait Right Cases
• Korean Communication Commission’s so-called “RTBF”
Guideline – can take down own postings after misplacing
id/pw#
 Seems like Strong Protections of Right to Personality
Laws protecting privacy (spatial privacy)
• Electronic Communication Privacy Act – judicial order
requirement for wiretapping and meta data acquisition for
police purposes
• Criminal Procedure Act – warrant requirement for search and
seizure
• Telecommunications Business Act – warrantless seizure of
identity data of communicating parties
• Practice: very bad  Weak on spatial privacy
Insult
• Any public epithet against another is indictable to 1 year in prison
or
• Every year about 9,000 indictments and about 50 incarcerations,
about 10% for insulting police officers
• Mostly fines
• Requires the supposed victim’s filing of criminal complaint
• (Dispute: Pro-FOX scholars try to narrow coverage by defining its
goal as protecting reputation (‘external honor’) but because of the
Transmission Theory and the practice, actually protecting an inner
sense of honor (‘internal honor’))
• Cf. German Privateklage, Japan petty infractions
Critique of Insult law
• All true evaluations risk insulting those being evaluated. Any
evaluation lower than expected causes a sense of insult in the
person being evaluated. But, entire civilization is about evaluation,
i.e., imputing values to things, people, and places. How can the
State ban people from insulting one another?
• Only extremely offensive words? What is extreme? Restricting
words for being offensive to another is restricting feelings and
thoughts.
• Cf. hate speech regulation – designed to protect the oppressed.
How about insult law? – tending to protect the powerful?
• Are not one’s evaluations of others and one’s feelings and
thoughts about others part of his/her personality?
Truth Defamation
• Any non-false statement lowering another’s reputation is
indictable for 3 yrs
• Exemption for stmts made “solely for public interest”
• Critiques:
• Chilling Effects on even publicly-interested stmts
• Narrow scope of public interest – Examples
• a worker criticizing the employer not paying wages
• a elderly criticizing the elderly association officer’s violence against its
members
• a drug wholesaler criticizing pharmaceutical companies monopolizing.
Critique: Pluralistic Ideal of Freedom of
Speech
• Why should we be restricted in speaking truths even if
uncomfortable to others? – as long as not revealing something
otherwise held private - Isn’t truth important to various people in
various different ways that the collectivity cannot imagine?
• “Public Interest” exception? Who decides on the public interest? If
public interest is defined collectivistically, what happens to the
pluralistic ideal of freedom of speech ? – such as ‘One’s vulgarity
may be another’s lyrics’; ‘As long as no harm is clearly and
presently forced upon another, one should be allowed to speak
freely.’
• Is freedom to speak truths about others essential to development
of one’s personality? - whether internal or external
Falsity Defamation
• Any false stmt lowering another’s reputation is indictable
• Practice 1: Every year about 2,000 indictments and about 50
incarcerations  accounted for 28% of all incarcerations for
reason of defamation around the world
• Practice 2: Many seditious libel cases
• Critique: Where is “my” personality? Is it in me? Is it what
others think of me? So, if personality is subject to capricious
thinking of Others, on what basis can the State punish people
for
Portrait Right Cases
• Right to control physical features identifiable with oneself
(almost always ‘face’, hence “portrait” right)
• Critique : Is a face really private? Why do we expose faces
when we leave home in the morning? Is it a private
information or a public symbol? Is a name really private?
Why do we have names?
Personal Information Protection Act
• All data identifiable with a person; applicable only to data
processors (i.e. one handling data for business purposes)
• Exception: Media “Institutions” cf. EU “journalistic activities”
exception – bloggers?
• Data Breach: Presumed Damages up to about USD 3K for
breach w/o actual abuse; Punitive Damages up to 3 times
Compensatory Damages
• No “function creep” on Resident Registration Number
E.g. court judgments not open to public, all most all news
articles pseudonimized,
Critique of PIPA
• Should you actually own data “about you”? E.g. “I had
pastrami for lunch with you.” Who owns that data? I? You?
How about “I had pastrami for lunch with you at a restaurant
where persons A, B, C. . . Z were also having lunch.” Who
owns that data? I? You? A? Z? Is data ownership a proper
metaphor?  where does data ownership metaphor come
from?
Origins of the concept of data
ownership (“I own data about me”)
• Inadequacy of contract law on protecting privacy when
powerless individuals turn over private data about themselves
to governments or companies (“data transaction”)
• Equalizer for inability to negotiate over or enforce the
conditions of that data transaction
• how about publicly available data that is already out there so
that there is no data transaction that needs be equalized?
• Restricting people from sharing publicly available data
also cause restriction on those people’s right to develop
their personalities!
Spatial Privacy
Prosser on Four Categories (1960): (1) Intrusion, (2) Disclosure,
(3) False Light, and (4) Misappropriation
Prosser: “I Wrote To Catalogue Cases on Warren-Brandeis
Notion (1890) of Privacy But Only 2nd Category Corresponds to
WB”  Spatial Privacy = taking out what is private to where
it is public
Spatial Privacy (1, 2) vs. “Personality-based” Privacy (3, 4)
Communication Surveillance: all about
spatial privacy
• Wiretapping – 9.5 times the U.S. per capita – NK Factor? 95%
done by NIS
• Search and seizure of stationery content -?? 400K warrants issued
a year
• Metadata acquisition – 30-40 million records year -–
Demonstration “Cell Tower Search” Factor? – chronological
metadata access  200 K /yr
• Unmasking of “anonymous communication” – about 10 million per
year – 50 times the U.S. per capita
Conclusion
• Korea seems strong on personality-based privacy but
restricts other peoples’ right to develop personalities by
talking about others, and yet weak on spatial privacy.

More Related Content

What's hot

Media law
Media lawMedia law
Media law
Mo Krochmal
 
Ethics in Media
Ethics in Media Ethics in Media
Ethics in Media
Krish SJ
 
Online Defamation
Online DefamationOnline Defamation
Online Defamation
Andrew Wellman
 
Censorship
CensorshipCensorship
Censorship
HHSome
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
rmackinnon
 
Bullying
BullyingBullying
Bullying
Barbara M. King
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
ryangregory55
 
Anonymous sources in Journalism
Anonymous sources in JournalismAnonymous sources in Journalism
Anonymous sources in Journalism
CubReporters.org
 
Censorship
CensorshipCensorship
Censorship
belinda mclean
 
Press Law
Press LawPress Law
What is censorship?
What is censorship?What is censorship?
What is censorship?
solankipintu
 
The Law of Print Media
The Law of Print MediaThe Law of Print Media
The Law of Print Media
Kia Sales Soneja
 
3 ways cops are catching crooks
3 ways cops are catching crooks3 ways cops are catching crooks
3 ways cops are catching crooks
hunterfithen
 
Online pornography
Online pornographyOnline pornography
Online pornography
Morgane Mahler
 
Pornography and Censorship
Pornography and CensorshipPornography and Censorship
Pornography and Censorship
JemFlorece
 
Digital Sex: Pornography and the Pornification of Society
Digital Sex: Pornography and the Pornification of SocietyDigital Sex: Pornography and the Pornification of Society
Digital Sex: Pornography and the Pornification of Society
Colm Walsh
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
Barbara M. King
 
Pornography
PornographyPornography
Pornography
Antonio Bernard
 
Libel Law
Libel LawLibel Law
ALJ724 defamation lecture 2013
ALJ724 defamation lecture 2013ALJ724 defamation lecture 2013
ALJ724 defamation lecture 2013
Martin Hirst
 

What's hot (20)

Media law
Media lawMedia law
Media law
 
Ethics in Media
Ethics in Media Ethics in Media
Ethics in Media
 
Online Defamation
Online DefamationOnline Defamation
Online Defamation
 
Censorship
CensorshipCensorship
Censorship
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
 
Bullying
BullyingBullying
Bullying
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
 
Anonymous sources in Journalism
Anonymous sources in JournalismAnonymous sources in Journalism
Anonymous sources in Journalism
 
Censorship
CensorshipCensorship
Censorship
 
Press Law
Press LawPress Law
Press Law
 
What is censorship?
What is censorship?What is censorship?
What is censorship?
 
The Law of Print Media
The Law of Print MediaThe Law of Print Media
The Law of Print Media
 
3 ways cops are catching crooks
3 ways cops are catching crooks3 ways cops are catching crooks
3 ways cops are catching crooks
 
Online pornography
Online pornographyOnline pornography
Online pornography
 
Pornography and Censorship
Pornography and CensorshipPornography and Censorship
Pornography and Censorship
 
Digital Sex: Pornography and the Pornification of Society
Digital Sex: Pornography and the Pornification of SocietyDigital Sex: Pornography and the Pornification of Society
Digital Sex: Pornography and the Pornification of Society
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Pornography
PornographyPornography
Pornography
 
Libel Law
Libel LawLibel Law
Libel Law
 
ALJ724 defamation lecture 2013
ALJ724 defamation lecture 2013ALJ724 defamation lecture 2013
ALJ724 defamation lecture 2013
 

Viewers also liked

Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
Brian Rowe
 
May 24, 2012 ELA Webinar
May 24, 2012 ELA WebinarMay 24, 2012 ELA Webinar
May 24, 2012 ELA Webinar
Employment Law Alliance
 
bs1 slide
bs1 slidebs1 slide
bs1 slide
Lam Wee
 
System Overview
System OverviewSystem Overview
System Overview
Alytics
 
Critique How To
Critique How ToCritique How To
Critique How To
tdaddario
 
La locanda di Giusto
La locanda di GiustoLa locanda di Giusto
La locanda di Giusto
enrico fulvio zanibelli
 
English II assignment II report
English II assignment II reportEnglish II assignment II report
English II assignment II report
Lam Wee
 
Pieza
PiezaPieza
Pieza
Lam Wee
 
Progressive policy making
Progressive policy makingProgressive policy making
Progressive policy making
K.s. Park
 
Stella van Acker
Stella van AckerStella van Acker
Stella van Acker
Esther Hagen
 
Oracle assignment help
Oracle assignment helpOracle assignment help
Oracle assignment help
Need Assignment Help
 
Unit 1
Unit 1Unit 1
Paper 30
Paper 30Paper 30
Paper 30
JoanaSantosAlex
 
Spring 2015 JP Dolphin Final Capstone Project Submission
Spring 2015 JP Dolphin Final Capstone Project SubmissionSpring 2015 JP Dolphin Final Capstone Project Submission
Spring 2015 JP Dolphin Final Capstone Project Submission
John-Peter (JP) Dolphin
 
Marketing strategy
Marketing strategyMarketing strategy
Marketing strategy
Adam Pestka
 
SP nr 34 w Gdyni
SP nr 34 w GdyniSP nr 34 w Gdyni
SP nr 34 w Gdyni
Piotrandruszko
 

Viewers also liked (17)

Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
May 24, 2012 ELA Webinar
May 24, 2012 ELA WebinarMay 24, 2012 ELA Webinar
May 24, 2012 ELA Webinar
 
bs1 slide
bs1 slidebs1 slide
bs1 slide
 
System Overview
System OverviewSystem Overview
System Overview
 
Critique How To
Critique How ToCritique How To
Critique How To
 
La locanda di Giusto
La locanda di GiustoLa locanda di Giusto
La locanda di Giusto
 
English II assignment II report
English II assignment II reportEnglish II assignment II report
English II assignment II report
 
Pieza
PiezaPieza
Pieza
 
Progressive policy making
Progressive policy makingProgressive policy making
Progressive policy making
 
Stella van Acker
Stella van AckerStella van Acker
Stella van Acker
 
Oracle assignment help
Oracle assignment helpOracle assignment help
Oracle assignment help
 
Unit 1
Unit 1Unit 1
Unit 1
 
Paper 30
Paper 30Paper 30
Paper 30
 
Spring 2015 JP Dolphin Final Capstone Project Submission
Spring 2015 JP Dolphin Final Capstone Project SubmissionSpring 2015 JP Dolphin Final Capstone Project Submission
Spring 2015 JP Dolphin Final Capstone Project Submission
 
ARTISTIC
ARTISTICARTISTIC
ARTISTIC
 
Marketing strategy
Marketing strategyMarketing strategy
Marketing strategy
 
SP nr 34 w Gdyni
SP nr 34 w GdyniSP nr 34 w Gdyni
SP nr 34 w Gdyni
 

Similar to Right to personality and privacy in south korea

Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
Ryland Sherman
 
Ethics, definitions & theories
Ethics, definitions & theoriesEthics, definitions & theories
Ethics, definitions & theories
Tobore Oshobe
 
Misinformation and Freedom of Expression
Misinformation and Freedom of ExpressionMisinformation and Freedom of Expression
Misinformation and Freedom of Expression
Étienne Brown
 
UKSG Conference 2016 Breakout Session - The new research data environment: im...
UKSG Conference 2016 Breakout Session - The new research data environment: im...UKSG Conference 2016 Breakout Session - The new research data environment: im...
UKSG Conference 2016 Breakout Session - The new research data environment: im...
UKSG: connecting the knowledge community
 
final presentasi free speech
final presentasi free speechfinal presentasi free speech
final presentasi free speech
Kimp Hermawan
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technology
orrenprunckun
 
justice in usa and law enforcement in America
justice in usa and law enforcement in Americajustice in usa and law enforcement in America
justice in usa and law enforcement in America
MuntahaShamim
 
Assignment 2 ethics 16th jan 2013
Assignment 2 ethics 16th jan 2013Assignment 2 ethics 16th jan 2013
Assignment 2 ethics 16th jan 2013
btecmedia12
 
Concepts of privacy in Japan and New Zealand
Concepts of privacy in Japan and New ZealandConcepts of privacy in Japan and New Zealand
Concepts of privacy in Japan and New Zealand
Marcelo Gomes Freire
 
Privacy in the Workplace: How Much Snooping is Legal and Proper?
Privacy in the Workplace: How Much Snooping is Legal and Proper?Privacy in the Workplace: How Much Snooping is Legal and Proper?
Privacy in the Workplace: How Much Snooping is Legal and Proper?
Parsons Behle & Latimer
 
Put your left leg in, put your left leg out: the exclusions and exemptions of...
Put your left leg in, put your left leg out: the exclusions and exemptions of...Put your left leg in, put your left leg out: the exclusions and exemptions of...
Put your left leg in, put your left leg out: the exclusions and exemptions of...
Werksmans Attorneys
 
Social Lawyers: Avoiding the Ethical Pitfalls of Using Social Media
Social Lawyers: Avoiding the Ethical Pitfalls of Using Social MediaSocial Lawyers: Avoiding the Ethical Pitfalls of Using Social Media
Social Lawyers: Avoiding the Ethical Pitfalls of Using Social Media
Nicole Hyland
 
SHORT ANSWER QUESTIONS (15-20 LINES EACH)1. What is white collar.docx
SHORT ANSWER QUESTIONS (15-20 LINES EACH)1. What is white collar.docxSHORT ANSWER QUESTIONS (15-20 LINES EACH)1. What is white collar.docx
SHORT ANSWER QUESTIONS (15-20 LINES EACH)1. What is white collar.docx
edmondpburgess27164
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
Gerwin Ocsena
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
Mark Jhon Oxillo
 
Law ch 1 notes
Law ch 1 notesLaw ch 1 notes
Law ch 1 notes
mikecalvert
 
Public service ethics brian 2-9-12
Public service ethics brian 2-9-12Public service ethics brian 2-9-12
Public service ethics brian 2-9-12
cityofls
 
Public service ethics brian 2-9-12
Public service ethics brian 2-9-12Public service ethics brian 2-9-12
Public service ethics brian 2-9-12
cityofls
 
Legal issues facing journalists
Legal issues facing journalistsLegal issues facing journalists
Legal issues facing journalists
Ellyn Angelotti
 
Ch3 1 powerpoint Tort Law
Ch3 1 powerpoint Tort LawCh3 1 powerpoint Tort Law
Ch3 1 powerpoint Tort Law
gellenberger
 

Similar to Right to personality and privacy in south korea (20)

Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
 
Ethics, definitions & theories
Ethics, definitions & theoriesEthics, definitions & theories
Ethics, definitions & theories
 
Misinformation and Freedom of Expression
Misinformation and Freedom of ExpressionMisinformation and Freedom of Expression
Misinformation and Freedom of Expression
 
UKSG Conference 2016 Breakout Session - The new research data environment: im...
UKSG Conference 2016 Breakout Session - The new research data environment: im...UKSG Conference 2016 Breakout Session - The new research data environment: im...
UKSG Conference 2016 Breakout Session - The new research data environment: im...
 
final presentasi free speech
final presentasi free speechfinal presentasi free speech
final presentasi free speech
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technology
 
justice in usa and law enforcement in America
justice in usa and law enforcement in Americajustice in usa and law enforcement in America
justice in usa and law enforcement in America
 
Assignment 2 ethics 16th jan 2013
Assignment 2 ethics 16th jan 2013Assignment 2 ethics 16th jan 2013
Assignment 2 ethics 16th jan 2013
 
Concepts of privacy in Japan and New Zealand
Concepts of privacy in Japan and New ZealandConcepts of privacy in Japan and New Zealand
Concepts of privacy in Japan and New Zealand
 
Privacy in the Workplace: How Much Snooping is Legal and Proper?
Privacy in the Workplace: How Much Snooping is Legal and Proper?Privacy in the Workplace: How Much Snooping is Legal and Proper?
Privacy in the Workplace: How Much Snooping is Legal and Proper?
 
Put your left leg in, put your left leg out: the exclusions and exemptions of...
Put your left leg in, put your left leg out: the exclusions and exemptions of...Put your left leg in, put your left leg out: the exclusions and exemptions of...
Put your left leg in, put your left leg out: the exclusions and exemptions of...
 
Social Lawyers: Avoiding the Ethical Pitfalls of Using Social Media
Social Lawyers: Avoiding the Ethical Pitfalls of Using Social MediaSocial Lawyers: Avoiding the Ethical Pitfalls of Using Social Media
Social Lawyers: Avoiding the Ethical Pitfalls of Using Social Media
 
SHORT ANSWER QUESTIONS (15-20 LINES EACH)1. What is white collar.docx
SHORT ANSWER QUESTIONS (15-20 LINES EACH)1. What is white collar.docxSHORT ANSWER QUESTIONS (15-20 LINES EACH)1. What is white collar.docx
SHORT ANSWER QUESTIONS (15-20 LINES EACH)1. What is white collar.docx
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
Law ch 1 notes
Law ch 1 notesLaw ch 1 notes
Law ch 1 notes
 
Public service ethics brian 2-9-12
Public service ethics brian 2-9-12Public service ethics brian 2-9-12
Public service ethics brian 2-9-12
 
Public service ethics brian 2-9-12
Public service ethics brian 2-9-12Public service ethics brian 2-9-12
Public service ethics brian 2-9-12
 
Legal issues facing journalists
Legal issues facing journalistsLegal issues facing journalists
Legal issues facing journalists
 
Ch3 1 powerpoint Tort Law
Ch3 1 powerpoint Tort LawCh3 1 powerpoint Tort Law
Ch3 1 powerpoint Tort Law
 

Recently uploaded

一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
cadyzeo
 
Asian legal busiess india you are invited
Asian legal busiess india you are invitedAsian legal busiess india you are invited
Asian legal busiess india you are invited
digitalrashi12
 
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations DemystifiedSafeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
PROF. PAUL ALLIEU KAMARA
 
一比一原版林肯大学毕业证(lincoln毕业证)如何办理
一比一原版林肯大学毕业证(lincoln毕业证)如何办理一比一原版林肯大学毕业证(lincoln毕业证)如何办理
一比一原版林肯大学毕业证(lincoln毕业证)如何办理
fexbqa
 
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptxTHE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
Namrata Chakraborty
 
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
mecyyn
 
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
hedonxu
 
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
onduyv
 
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
AHRP Law Firm
 
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
onduyv
 
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
meboh
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
Parsons Behle & Latimer
 
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
aypxuyw
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
15e6o6u
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
RoseZubler1
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
Corporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal FrameworkCorporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal Framework
devaki57
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
15e6o6u
 

Recently uploaded (20)

一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
 
Asian legal busiess india you are invited
Asian legal busiess india you are invitedAsian legal busiess india you are invited
Asian legal busiess india you are invited
 
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations DemystifiedSafeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
 
一比一原版林肯大学毕业证(lincoln毕业证)如何办理
一比一原版林肯大学毕业证(lincoln毕业证)如何办理一比一原版林肯大学毕业证(lincoln毕业证)如何办理
一比一原版林肯大学毕业证(lincoln毕业证)如何办理
 
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptxTHE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
 
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
 
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
 
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
 
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
 
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
 
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
 
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
Corporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal FrameworkCorporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal Framework
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
 

Right to personality and privacy in south korea

  • 1. Right to Personality and Privacy in South Korea K.S. Park @unbeatenpath kyungsinpark@korea.ac.kr Professor, Korea University Law School Exec Director, Open Net Korea Exec Director, PSPD Law Center Presentation at UN Special Rapporteur Joseph Cannataci’s Consultation on July 19-20, NY, NY
  • 2. If we define personality as: •How one is perceived by others and in the society •How one feels about oneself
  • 3. Laws protecting right to personality • Criminal Code, Article 311 – Insult • Criminal Code, Article 307 (1) – Truth defamation • Criminal Code, Article 307 (2) - Falsity defamation • Personal Data Protection Act • Portrait Right Cases • Korean Communication Commission’s so-called “RTBF” Guideline – can take down own postings after misplacing id/pw#  Seems like Strong Protections of Right to Personality
  • 4. Laws protecting privacy (spatial privacy) • Electronic Communication Privacy Act – judicial order requirement for wiretapping and meta data acquisition for police purposes • Criminal Procedure Act – warrant requirement for search and seizure • Telecommunications Business Act – warrantless seizure of identity data of communicating parties • Practice: very bad  Weak on spatial privacy
  • 5. Insult • Any public epithet against another is indictable to 1 year in prison or • Every year about 9,000 indictments and about 50 incarcerations, about 10% for insulting police officers • Mostly fines • Requires the supposed victim’s filing of criminal complaint • (Dispute: Pro-FOX scholars try to narrow coverage by defining its goal as protecting reputation (‘external honor’) but because of the Transmission Theory and the practice, actually protecting an inner sense of honor (‘internal honor’)) • Cf. German Privateklage, Japan petty infractions
  • 6. Critique of Insult law • All true evaluations risk insulting those being evaluated. Any evaluation lower than expected causes a sense of insult in the person being evaluated. But, entire civilization is about evaluation, i.e., imputing values to things, people, and places. How can the State ban people from insulting one another? • Only extremely offensive words? What is extreme? Restricting words for being offensive to another is restricting feelings and thoughts. • Cf. hate speech regulation – designed to protect the oppressed. How about insult law? – tending to protect the powerful? • Are not one’s evaluations of others and one’s feelings and thoughts about others part of his/her personality?
  • 7. Truth Defamation • Any non-false statement lowering another’s reputation is indictable for 3 yrs • Exemption for stmts made “solely for public interest” • Critiques: • Chilling Effects on even publicly-interested stmts • Narrow scope of public interest – Examples • a worker criticizing the employer not paying wages • a elderly criticizing the elderly association officer’s violence against its members • a drug wholesaler criticizing pharmaceutical companies monopolizing.
  • 8. Critique: Pluralistic Ideal of Freedom of Speech • Why should we be restricted in speaking truths even if uncomfortable to others? – as long as not revealing something otherwise held private - Isn’t truth important to various people in various different ways that the collectivity cannot imagine? • “Public Interest” exception? Who decides on the public interest? If public interest is defined collectivistically, what happens to the pluralistic ideal of freedom of speech ? – such as ‘One’s vulgarity may be another’s lyrics’; ‘As long as no harm is clearly and presently forced upon another, one should be allowed to speak freely.’ • Is freedom to speak truths about others essential to development of one’s personality? - whether internal or external
  • 9. Falsity Defamation • Any false stmt lowering another’s reputation is indictable • Practice 1: Every year about 2,000 indictments and about 50 incarcerations  accounted for 28% of all incarcerations for reason of defamation around the world • Practice 2: Many seditious libel cases • Critique: Where is “my” personality? Is it in me? Is it what others think of me? So, if personality is subject to capricious thinking of Others, on what basis can the State punish people for
  • 10. Portrait Right Cases • Right to control physical features identifiable with oneself (almost always ‘face’, hence “portrait” right) • Critique : Is a face really private? Why do we expose faces when we leave home in the morning? Is it a private information or a public symbol? Is a name really private? Why do we have names?
  • 11. Personal Information Protection Act • All data identifiable with a person; applicable only to data processors (i.e. one handling data for business purposes) • Exception: Media “Institutions” cf. EU “journalistic activities” exception – bloggers? • Data Breach: Presumed Damages up to about USD 3K for breach w/o actual abuse; Punitive Damages up to 3 times Compensatory Damages • No “function creep” on Resident Registration Number E.g. court judgments not open to public, all most all news articles pseudonimized,
  • 12. Critique of PIPA • Should you actually own data “about you”? E.g. “I had pastrami for lunch with you.” Who owns that data? I? You? How about “I had pastrami for lunch with you at a restaurant where persons A, B, C. . . Z were also having lunch.” Who owns that data? I? You? A? Z? Is data ownership a proper metaphor?  where does data ownership metaphor come from?
  • 13. Origins of the concept of data ownership (“I own data about me”) • Inadequacy of contract law on protecting privacy when powerless individuals turn over private data about themselves to governments or companies (“data transaction”) • Equalizer for inability to negotiate over or enforce the conditions of that data transaction • how about publicly available data that is already out there so that there is no data transaction that needs be equalized? • Restricting people from sharing publicly available data also cause restriction on those people’s right to develop their personalities!
  • 14. Spatial Privacy Prosser on Four Categories (1960): (1) Intrusion, (2) Disclosure, (3) False Light, and (4) Misappropriation Prosser: “I Wrote To Catalogue Cases on Warren-Brandeis Notion (1890) of Privacy But Only 2nd Category Corresponds to WB”  Spatial Privacy = taking out what is private to where it is public Spatial Privacy (1, 2) vs. “Personality-based” Privacy (3, 4)
  • 15. Communication Surveillance: all about spatial privacy • Wiretapping – 9.5 times the U.S. per capita – NK Factor? 95% done by NIS • Search and seizure of stationery content -?? 400K warrants issued a year • Metadata acquisition – 30-40 million records year -– Demonstration “Cell Tower Search” Factor? – chronological metadata access  200 K /yr • Unmasking of “anonymous communication” – about 10 million per year – 50 times the U.S. per capita
  • 16. Conclusion • Korea seems strong on personality-based privacy but restricts other peoples’ right to develop personalities by talking about others, and yet weak on spatial privacy.