Free Essay

Confidentiality of Sources

In:

Submitted By fblgrijalva
Words 1548
Pages 7
Confidentiality of Sources
Professionals like attorneys, doctors, counselors, and church leaders have ethical duties and responsibilities to keep the confidentiality of information. Protecting communications is important for people seeking for legal and spiritual advice in situations that involve any type of illegal activities. If not offered, individuals might reject to cooperate in obtaining help, for instance. Journalism is not the exception; on the contrary, confidentiality is a sensitive and crucial part of the practice. That a journalist could offer confidentiality to a source puts him or her in a different level that allows accessing to information otherwise impossible to obtain. Some courts have decided that the First Amendment does not provide the writers, reporters, and journalists with the right to refuse to reveal their sources if required in a court. Journalists that had refused to go against to their profession’s trust have been jailed and fined. Shield laws are a mechanism to protect the journalist, in some way, against punishment for refusing to disclose confidentiality of sources. Even though shield laws have been enacted in 37 states, they vary from state to state. In this paper, some sensitive topics will be covered, taking the case of Branzburg v. Hayes as a base for the analysis.
Branzburg v. Hayes
Background
This case considers that reporters are to be held to the same standards as other citizens, which would subject them to grand jury testimony. The petitioner claimed that the First Amendment of the United States Constitution gives the reporters the protection of keeping confidentiality of their sources of information. The reporter at the Courier-Letter in Louisville, Kentucky, and one of the petitioners Paul Branzburg, wrote two articles about drug use in this state. The first article, written in 1969, covered the drug use in Jefferson County, and it contained a photograph of hashish held by an unidentified person. The other article was written in 1971 pertaining on drug use in Frankfort, Kentucky. For this second article, Branzburg spoke with marijuana users and obtained their cooperation for his work, under the condition of remain unidentified. When published, these articles caught the attention of law enforcement personnel. Branzburg was called to testify before a grand jury concerning his knowledge of drug activities described in the articles, and to name his sources. The reporter refused to reveal the identity and other details about his collaborators, under the statement of Freedom of the Press Clauses of the First Amendment protecting this confidentiality. Kentucky judges heard the cases; they disagreed and held that Branzburg had to identify his sources. Branzburg appealed the decision.
What did the court decide in Branzburg v. Hayes regarding a journalist's right to withhold confidential sources? The decision is this case was five to four against the possibility of confidentiality privilege. The First Amendment denied the news reporter a privilege to keep their sources confidential from the government. Reporters are subject to the same civic duties as are other citizens, and they must share information about criminal activities with the grand jury investigations. Writing for a majority of the Court, Justice Byron White held that the First Amendment does not provide members of the press with the right to withhold from a grand jury the names of confidential sources. Moreover, the Court stated that there was a lack of statistical evidence providing that such a deterrent effect existed (United States Courts, n.a.).

How have lower courts interpreted the Branzburg v. Hayes decision based on whether the cases involved civil, criminal, or grand jury proceedings?
In the aftermath of this case, the Supreme Court’s decision created that many states enacted legislation to protect journalists and reporters from being punished for refusing to disclose their sources. This legislation is commonly known as “shield laws.” The United States Courts of Appeals have interpreted the holding in Branzburg v. Hayes case in a different way. The Sixth Circuit, for instance had interpreted the decision in a strict manner, sustaining that the First Amendment does not provide the reporters and journalists with any right to withhold the identities of their sources. On the other hand, the Fifth Circuit exercised a balancing test based on the three criteria that differentiates between criminal and civil cases. This Circuit does not provide protection to confidential sources in criminal cases (United States Courts, n.a.).
Confidentiality
Summarize the approach journalists should take pertaining to promising confidentiality to sources.
Newspaper attorney, David Utevsky shared some suggestions to writers, journalists, and reporters at a seminar in Seattle, regarding the approach these media professionals should take pertaining to promising confidentiality to their sources:
A journalist should not promise confidentiality as an interview technique (Pember & Calvert, 2011). He or she should try different approaches to obtain information before offering confidentiality. Utevsky also suggested avoiding giving an absolute promise of confidentiality, trying to persuade the source to agree that the reporter may reveal the source’s name or names, if he or she faces subpoena (Pember & Calvert, 2011). The third suggestion was not to rely exclusively on information from a confidential source; it would be wise to obtain corroboration from a nonconfidential source as well (Pember & Calvert, 2011). Utevsky suggested considering other individuals, such as police or attorneys, who would want to know the identity of the source before the distribution of the material (Pember & Calvert, 2011). As the last suggestion, Utevsky advised considering if the reporter can use the information without revealing that it was obtained from a confidential source. In addition, reporters, writers, and journalists should always consult with an editor before any promise of anonymity to a source of information because if a legal action takes place, he or she will have to rely on the news outlet to assist in defending the action (Pember & Calvert, 2011).
What advice should journalists give to sources who demand confidentiality?
In some cases, the sources demand confidentiality because they fear retaliation; in other situations, the journalist may wish to promise confidentiality because in some places that promise makes it harder for someone to require the reporter to reveal the source in court. By promising confidentiality to a source, the writer, reporter, or journalist may incur legal obligations to the source, and it may turn it difficult to change in the future. The journalist should try to persuade to agree his or her identity if needed in an investigation, for example. It is important that the reporter inform the source that demanding confidentiality that it is illegal to withhold information when subpoena is issued to give testimony in court.

Shield Laws
There are no uniform shield laws. They vary from state to state, and vary between courts. Journalists typically operate at a local level where they may, or may not be protected by state shield laws. What protections do shield laws provide, if any, in addition to federal constitutional protections supporting nondisclosure of news sources? Explain your response.
A shield law protects individuals from certain lines of legal inquiry. Shield laws are commonly implemented to protect journalists’ integrity, and to offer certain protection to individuals involved in sexual assault cases. Not all countries count with shield laws; in the United States, these laws are not uniformed, they vary from state to state. In the specific field of journalism, these laws protect journalistic sources. Individuals might be afraid to approach a reporter with confidential data if they knew that the reporter could be required or obligated to disclose his or her source, compromising the integrity of the material. Shield laws allow journalists to ensure confidentiality to their sources to obtain better information and stories. By November 2009, all states except Wyoming offered some form of legally recognized protection for journalists seeking to preserve confidentially of their sources. Thirty-seven states have adopted shield laws that give a reporter a measure of protection against punishment for refusing to give testimony in a court (Pember & Calvert, 2011). In February 2005, Senator Christopher Dodd, D-Conn, introduced a federal shield law bill in Congress to protect journalists and reporters from disclosing information about their sources. However, they could be required to give information to a judge if there was no other way to obtain it (United States Courts, n. a.).

Conclusion
With the technological advancements in almost every aspect of modern society, it is more common to hear that more journalists are required to testify in court, and often they are asked to cooperate in legal proceedings by reveling confidential information. Refusing to release this information represents punishments to reporters. Even though shield laws have many limitations, writers, reporters, and journalists can still benefit from them. The ideal would be the enactment of a uniform shield law that also protects the people, providing confidence to cooperate releasing valuable information that could be beneficial to other individuals or situations. Governments around the world are in capacity to collect unthinkable amount of citizen’s information, but they are expected to use it in a responsible manner.

References
Citizen Media Law Project (2012, August 20). Promising confidentiality to your sources. Retrieved August 20, 2012, from http://www.citmedialaw.org/legal-guide/promising-confidentiality-your-sources
Pember, D. R., & Calvert, C. (2011). Mass media law (17 ed.). Boston, MA: McGraw-Hill.
United States Courts (n. a.). Journalists and Grand Juries. Retrieved August 21, 2012, from http://www.uscourts.gov/EducationalResources/ClassroomActivities/SixthAmendment/JournalistsAndGrandJuries/Background.aspx

Similar Documents

Premium Essay

Self-Serving Leak Case Study

...would be dismissed on the grounds that grand jury information had been leaked. Fainaru-Wada and Williams continued to keep their promise of confidentiality when a judge ordered they spend time in jail. They refused to talk about the case even after Ellerman admitted to leaking...

Words: 665 - Pages: 3

Free Essay

Counselor Confidentiality

...to be answered is, "If a counselor is an associate Pastor on staff or even just solely a counselor should the Senior/Sole Pastor be made aware of details on every client, since it is important for the Pastors to know their flock in order to best know how to lead and tend them, or does confidentiality apply always strictly between counselor and counselee". It is important to start off understanding what Counselor confidentiality is at its most fundamental nature. It is the responsibility of a therapist or counselor to hold any proprietary or personal information supplied by a patient in the strictest of confidence. It is a generally accepted ethic that breaking counselor confidentiality by revealing the type of information stated above, without the expressed permission of the patient, is considered highly unethical. Keep in mind, however, that in Standards B.1.d, the ACA Code of Ethics requires counselors to fully inform their clients of the limits of confidentiality (ACA, 2005). Also, HIPPA- Health Insurance Portability and Accountability Act-actually gives a list of nearly two pages of things where confidentiality may be breached legally (hhs.gov). Counselor confidentiality in a "classical" setting, which is the viewpoint we have been speaking from thus far, is designed to allow patients the freedom to share information about themselves that is private in nature, but is important to the process of helping the individual overcome whatever emotional or other...

Words: 2412 - Pages: 10

Premium Essay

Cooking

...(2000) Privacy and Confidentiality of Health Information. This book explores the emerging risks to patients’ confidentiality and privacy. The author of the book finds some solutions to this problem. He is sure that every health care organization should be responsible for protecting patients’ confidentiality. The author also describes some laws and ethical codes which should be taken into consideration by health care providers. He states that it is necessary to train the medical staff “to protect the information they generate and handle”. (Dennis, 2000, p.2) This source of information is very useful for my research paper, as it gives a lot of useful facts concerning the issue discussed in the paper. Dorodny, V. (1998) Security and confidentiality of health information systems: implications for physicians. (Surfing the Information Technology Wave). This article is found in the Journal Physician Executive. It represents a lot of useful information concerning the issue of the research paper. The author discusses the process of patient privacy protection, the use of different security methods. The author of the article is sure that “the advent of new technologies in the field of authentication”, digital signatures and other methods will help to ensure patient privacy in a proper way. (Dorodny, 1998, para.7) Rinehart-Thompson, L., Hjort, B., Cassidy, B. (2011) Redefining the Health Information Management Privacy and Security Role. This source of information...

Words: 259 - Pages: 2

Premium Essay

Ethical and Critical Thinking Law

...business and professional communications to avoid misunderstandings and misconceptions about the paralegal’s role and responsibilities. When Carl took a third person into the interview, that was a breach of confidentiality. (NFPA 1.5 A PARALEGAL SHALL PRESERVE ALL CONFIDENTIAL INFORMATION PROVIDED BY THE CLIENT OR ACQUIRED FROM OTHER SOURCES BEFORE, DURING, AND AFTER THE COURSE OF THE PROFESSIONAL RELATIONSHIP) ABA 1.6 Carl was advising the client about alimony, fees, and other matters, which crossed the line on practicing law. (NFPA EC-1.8(a) A paralegal shall comply with the applicable legal authority governing the unauthorized practice of law in the jurisdiction in which the paralegal practices) ABA 5.5 Carl allowed the friend of the client to possibly see names and information on Attorney Howe’s desk. (NFPA 1.5 A PARALEGAL SHALL PRESERVE ALL CONFIDENTIAL INFORMATION PROVIDED BY THE CLIENT OR ACQUIRED FROM OTHER SOURCES BEFORE, DURING, AND AFTER THE COURSE OF THE PROFESSIONAL RELATIONSHIP.) ABA 1.6 When Jane and Zeke walk through the reception area, Carl starts talking loudly about the case, mentioning alimony—another breach of confidentiality. (NFPA 1.5 A PARALEGAL SHALL PRESERVE ALL CONFIDENTIAL INFORMATION PROVIDED BY THE CLIENT OR ACQUIRED FROM OTHER SOURCES BEFORE, DURING, AND AFTER THE COURSE OF THE PROFESSIONAL RELATIONSHIP.) ABA 1.6 Comments: Carl did not follow the rules of a paralegal. He was not upfront with Jane on being a Paralegal not a Attorney act...

Words: 362 - Pages: 2

Premium Essay

Class Work

...Cybersecurity DR / BCP Presentation Summary: For this assignment, you must research three or more commercially available technology solutions which could be used by a business as part of its recovery during disaster recovery or business continuity operations. You may focus upon the incident reported upon in your cybersecurity research paper OR you may take a more general approach. Your research will then be used to prepare a presentation (Power Point slides) in which you discuss how your selected solutions could be used to address cybersecurity problems specific to DR / BCP operations. Your presentation must also address the importance of disaster recovery planning and/or business continuity planning with respect to maintaining the confidentiality, integrity, and availability of information and information systems. Consult the grading rubric for specific content and formatting requirements for this assignment. The focus of your research for this assignment should be DR / BCP technology solutions for response and recovery after a cyber security incident of sufficient duration and impact to require activation of the organization’s Disaster Recovery and/or Business Continuity Plan. Suggested technology solutions include: * General DR/BCP Services * Palindrome http://www.youtube.com/watch?v=d60m6hUpgvs * Data Backup Solutions * Acronis http://www.acronis.com/solutions/smallbusiness/ * Cloud Computing (Infrastructure as a Service, Software as a Service...

Words: 646 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 1

...Threat Identification A threat is the potential for a particular threat source to exercise a particular vulnerability. Vulnerability involves accidentally triggered or intentionally exploiting a weakness (Panko & Panko, 2015). A threat source does not present a risk when there is no threat. If an IT system has not yet been designed, the search for vulnerabilities should focus on the organization’s security policies, planned security procedures, and system requirement definitions, and the vendors’ or developers’ security product analyses. The identification of vulnerabilities should be expanded to include more specific information, such as the planned security features described in the security design documentation and the results of system certification test and evaluation if the IT system is being implemented (Stoneburner et al., 2002). Once an IT system is operational, the process of identifying vulnerabilities should include an analysis of system security features and the security controls, technical and procedural, used to protect the system. Impact Analysis Confidentiality. Confidentiality refers to the protection of information from unauthorized disclosure. The impact of unauthorized disclosure of confidential information can range from the jeopardizing of national security to the disclosure of...

Words: 434 - Pages: 2

Free Essay

Test

...annual savings on account of licensing fees alone would amount to about $4,000,000. U.S. banking is regulated a both the state and federal level, and that makes navigating the specific regulations and legislation a difficult task. There are a number of specific regulations and legislations that apply to statutory compliance criteria as stated below: 1. Sarbanes-Oxley – This Act applies to integrity and privacy of financial data in publically traded corporations. 2. Health Insurance Portability and Accountability Act (HIPAA) – This act refers to the integrity, confidentiality, and availability of health care information. PCI (Payment Card Industry Data Security Standard) – This act pertains to credit card information confidentiality that is later stored and used by the merchants. GLBA (Gramm-Leachy Bliley Act) – This act pertains to personal financial information and the corresponding integrity and confidentiality to maintain while storing the same by financial institutions. SB 1386 – This act is exclusive to the state of California and pertains to customer’s personal and confidential information stored by the organization. BASEL II –...

Words: 452 - Pages: 2

Free Essay

Windows 7

...Certificates in the company’s product may be accomplished by embedding the Root Certificate either within the product or through a patch or update release. A root certificate is the top most certificate in the highest position, the private key of which is used to sign other certificates. All certificates immediately below the root certificate inherit the trustworthiness of the root certificate and a signature by a root certificate is basically analogous to notarizing. Using a PKI would establish and maintain a trustworthy networking environment by providing key and certificate management services that enable encryption and digital signature capabilities across applications all in a manner that is easy to use. For our organization confidentiality, authentication, integrity, and non-repudiation are the four most important ingredients required for trust in an e-commerce type transaction. PKI employs digital certificates,...

Words: 840 - Pages: 4

Premium Essay

Importance Of Confidentiality Classification

...Abstract— Confidentiality-preservation is now a major field of interest .In real world, many companies would like to extract the information of the other without actually giving out their own information. This is particularly useful in many applications. In this paper, we aim to advance a worldwide classification model based on the Naïve Bayes classification scheme. The Naïve Bayes classification is chosen because of its applicability in case of its previous history. For Confidentiality-preservation of the data, the concept of counterweight providing reliable party is used. Keywords- Confidentiality-preservation, Naïve Bayes, distributed databases, partition. I. INTRODUCTION In current years, There has been an advancement of computing and...

Words: 1684 - Pages: 7

Premium Essay

Dispenser Ethical Issues

...There are going to be several ethical concerns in dealing with adolescents that are smoking an illegal drug. I will discuss all the ethical issues that can be a concern to the IRB. The ethical issues will range from consent to confidentiality. A critical issue is going to be achieving valid results in this study. When looking at the THC levels, this process is going to be hard to regulate because the strength of the cannabis is not regulated and it can be hard to determine. The THC strength varies even when it comes from a reputable source for instance a dispenser of medical cannabis. This measure is important and if inconstant will cause issues. I want the subjects to have close to the same amount of THC in them or the amount they consume,...

Words: 886 - Pages: 4

Free Essay

Survival of Small Business in Us - Proposal Paper

...Confidentiality Confidentiality can be defined as an explicit or implied guarantee by a researcher to a respondent in social science research whereby the respondent is confident that any information provided to the researcher cannot be attributed back to that respondent. According to IRB Guidebook, U.S. National Institutes of Health (1993), Office for Protection from Research Risks, Protecting Human Research Subjects assert that: Confidentiality pertains to the treatment of information that an individual has disclosed in a relationship of trust and with the expectation that it will not be divulged to others in ways that are inconsistent with the understanding of the original disclosure without permission. (p. 3)  The data that is collected should be kept very confidential, as research involves the people of the United States of America. The people were informed about their rights to confidentiality and anonymity before interviewing them. Very good care is taken to maintain the confidentiality of the information they provided. Documents will be stored safely in a bank locker and they are accessed only by the researcher. Documents will be destroyed after 5 years.  Data Collection The data were collected from 100 people of the United States of America, whose age will be 21-55. This age group is selected because generally this age group people are the ones who are directly or indirectly involved in setting-up their own small business. They are divided into two groups...

Words: 897 - Pages: 4

Premium Essay

1.3 Explain The National Intelligence Model (NIM)

...A3. Explain how information and sources of information are graded for intelligence. (CB1 1.3) Police officers usually report information intelligence on a 5x5x5 Information Intelligence Report Form. The source evaluation is evaluated from A to E, A being ‘Always reliable and E being ‘untested source’. The information and intelligence is graded to 1 to 5, 1 being ‘Known to be true without reservation‘ and 5 being ‘suspected to be false’. It is essential that any information received or recorded must be evaluated for reliability this is why the grading is in place in relation to CHIS (Covert Human Intelligence Source). A covert human intelligence source is defined as a person who establishes or maintains a personal or other relationship with another person for the covert purpose of facilitating information and intelligence. A4. Explain the National Intelligence Model (NIM) and how the model is used by police officers. (CB1 1.4) The National Intelligence Model is used by the police service to ensure policing is delivered in a targeted manner through the development of information and intelligence. NIM is based on identifying, understanding and addressing underlying problems and trends. The NIM is a validated model of policing, representing the best practise in using intelligence to combat crime. All police forces in...

Words: 984 - Pages: 4

Premium Essay

Drexel Ct395 Assignment01

...Unit One Assignment 6/26/2011 Problem 1.1 Consider an automated tell machine (ATM) in which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirements. Confidentiality is provided by two factors: a unique access card and a PIN that functions as a password. A user must have both of these to access the system. Confidentiality is compromised by the fact that most ATM systems connect to various banks, and the source of information cannot be guaranteed to be from a proper ATM. Also, ATMs are public, and can be accessed by the entire population, allowing things like card swipe readers to be used to attack them. The importance of confidentiality is medium to high. If it is the loss of confidence in a limited number of accounts, it is medium, because it does not stop the main functions of the organization and can be corrected. It would be high if a large number of accounts were compromised. Integrity of information at the ATM is provided by the very limited interface that the machine provides to the data stored on the back end. There is no comprehensive GUI or CLI to provide a point of attack. However, the previously mentioned public access and data exchange are threats to integrity. The importance of integrity is medium to high. The alteration of a small number of accounts...

Words: 594 - Pages: 3

Premium Essay

Administrative Ethics

...Administrative Ethics When it comes down to ethical issues involving administration, some aspects always seem to be overlooked. On May 17, 2011, Ricardo Alonzo-Zaldivar wrote an article for azcentral.com relating to the vulnerability of electronic medical records and its effects on patient privacy. In this document I will be discussing the issue on patient privacy and confidentiality. I will be touching base on the population it affects, arguments used within this article that support electronic medical records, ethical and legal issues involved. Along with the issues I will be discussing the managerial responsibilities and proposed solutions that may help in maintaining patient privacy under regulation that are being proposed within this article. The issue on patient privacy is nothing new and out of the ordinary within the health care field. According to the American Medical Association’s (AMA) Council on Ethical and Judicial Affairs the main purpose of a healthcare professional’s ethical duty is to maintain patient confidentiality and to allow the patient to be able to make a truthful disclosure of their personal information to the physician placing their trust that the physician will protect the confidential nature of the information disclosed. Unfortunately, physicians cannot entirely control the access to electronic medical records. If patients distrust and have the anxiety that their medical records will not be private, they might tend to tell their doctors less, or...

Words: 1061 - Pages: 5

Premium Essay

Ethical Issues In Health Care

...patient privacy and confidentiality at all times. However, healthcare practitioners face diverse types and levels of privacy- and confidentiality-associated ethical dilemmas while dealing with specific types of patients. One such special case that presents ethical dilemmas on patient privacy and confidentiality is when a physician handles a criminal patient (Gardiner, 2003). The scenario becomes more complicated if it involves giving an emergency care to a patient who has been involved in a criminal act such as robbery, during which he or she has been shot or injured in some other ways. It is of the essence that physicians and other healthcare providers are conversant with the work...

Words: 845 - Pages: 4