Confidentiality 26th November 2015. Vatican Law on leaking documents ‘Whoever illicitly obtains or reveals information or documents whose publication.

Slides:



Advertisements
Similar presentations
The Nature Of Crime Chapter 6.
Advertisements

Information Governance, Love it or Hate it!
Biomedical Ethics and Legal Principles
Whistleblowing and the Economic Recession: 10 years of the PIDA Catherine Hobby, School of Law, University of East London.
CHAPTER TWELVE THE LAW RELATING TO EMPLOYEE RELATIONS.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
CREDIT INFORMATION BUREAUS. Banks and Insurances Examiner Office of Ecuador Dr. Camilo Valdivieso Cueva National Legal Commissioner.
1/06/2015Copyright, Dan Svantesson Law 105 Communication and the law.
Confidentiality Professional obligation – moral duty Hippocratic oath
1 WHY IS WHISTLEBLOWING IMPORTANT AND ON WHAT PRINCIPLES SHOULD PROTECTIVE LEGISLATION BE BASED? David Lewis, Professor of Employment Law, MiddlesexUniversity,
Public Interest Whistleblowing: Mandatory Reporting? Catherine Hobby University of East London IER Conference: Workplace Issues: Taking up the issues with.
Data Protection Overview
The Information Commissioner’s Office David Evans.
Topic 8 “Responsibility and Protection of Taxpayers’ Rights” 1. Financial responsibility for violation of tax legislation 2. Criminal liability of taxpayers.
Implementation of Security and Confidentiality in GP Practices.
6.01 Analyze the legal responsibilities that apply to Torts.
Marta Tomlinson Solicitor Shakespeares LLP. Dictionary definition of leadership: NOUN 1. the position or function of a leader, a person who guides or.
Whistle-blowing and the Law – Part I Gavin Millar QC and Dr Andrew Scott.
Why the Office of Compliance and Ethics was Created
LEE BURGUNDER LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed. LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed.
Information Management in FSS: A Legal Perspective Paul Hinton Ian Mason Barlow Lyde & Gilbert LLP 17 September 2009.
Copyright legislation Copyright (Computer Programs) Regulations 1992 Elma Graham.
COPYRIGHT. WHAT THE LAW SAYS  The law of Copyright protects “intellectual property” – the product of a person’s skill, creativity or labour.  It protects.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Data Protection Act & Freedom of Information Simon Mansell Corporate Governance and Information Team.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Do You Have One?. “I represent the city as an organization and I do not represent you and I cannot guarantee the confidentiality of what you tell me.”
DIRECT WORKS FORUM 10 June 2008 Andy Ballard. COMMON LAW MANSLAUGHTER Effectively – Death by gross negligence Test – (a) was a (common law) duty of care.
Information Management in Telco: A Legal Perspective Sheila Tormey Barlow Lyde & Gilbert LLP Ronan Lupton Barrister at Law 17 September 2009.
CONFIDENTIALITY. BREACH OF CONFIDENCE  Breach of confidence is based on the principle that a person who has obtained material “in confidence” should.
OHS Seminar DO THE TIME – avoid the crime! Miles Crawley 8 June 2007.
John Steele, Attorney at Law. 2 Confidentiality 3 Topics 1. Definitions 2. Comparison 3. ABA Approach 1. Rule; Exceptions; Other rules 4. California.
CRIMES Used by permission. For Educational purposes only.
Session 7 Key Concepts (2) Confidentiality. arises in particular relationships when one party has conveyed (entrusted) information on the understanding.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Legal Terminology Biomedical Technology Legal implications in health care  Malpractice: harmful, incorrect, or negligent practice or treatment of a.
Session 7 Compliance failure policy. 1 Contents Part 1: COLP and COFA duties Part 2: What do we have to comply with and why does it matter? Part 3: Compliance.
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
Legal Terminology Biomedical Technology Curriculum/ 2004.
Information Management in Retail: A Legal Perspective Chris Hill Barlow Lyde & Gilbert LLP 17 September 2009.
Chapter 4: Laws, Regulations, and Compliance
Journalists’ Sources 19th November 2015.
Copyright ©2012 Delmar, Cengage Learning. All rights reserved. Chapter 5 Legal Issues.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
BREACH OF CONFIDENCE 3/3/ What is Breach of Confidence? Spans several areas of law Intellectual property Tort (a civil wrong) Equity Based on principle.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
BREACH OF CONFIDENCE 3/12/ What is Breach of Confidence? Spans several areas of law - Intellectual property, Tort and Equity Based on principle.
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
The Health Information Protection Act. What is the Health Information Protection Act (HIPA)? HIPA is legislation that speaks to access to, and protection.
REFORMS ON IMPROVING KAZAKHSTAN’S POSITION IN «PROTECTING MINORITY INVESTORS» INDICATOR IN DOING BUSINESS.
SEMINAR: Copyright 2012 All rights reserved. This presentation and/or any part thereof is intended for personal use and may not be reproduced or distributed.
6/14/20161 Types of Crimes Criminal Justice 6/14/20162 Types of Crimes There are two types of crimes : There are two types of crimes : Malum prohibitum.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
HEALTH CARE & LAW. HEALTH CARE & THE LAW The integrity of health care is dependent upon providing individualized, competent, and safe care to clients.
Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing.
Information Management in Government: A Legal Perspective
What are HR policies and procedures?
Data Protection and Confidentiality
PSNI Management of Sex Offenders Detective Chief Superintendent George Clarke Public Protection Branch.
Tim Wright Principal Airworthiness Surveyor 8th December 2016
Restrictions, including those restrictions permitted by the European Convention on Human Rights Duty of confidentiality Official Secrets Legislation.
Restrictions, including those restrictions permitted by the European Convention on Human Rights Duty of confidentiality Breach of Confidence.
General Data Protection Regulation
Learning Lab Workshop: Protecting Human Rights through PSIRA’s Code of Conduct 13 November 2017 Margaret Gichanga: Research and Development Unit
Whistleblowing Flowchart Appendix A
PDA Amendment Bill Submission to the Ad Hoc Committee by ODAC
Privacy Unit 8.
Move this to online module slides 11-56
Data protection & FOIA considerations
Presentation transcript:

Confidentiality 26th November 2015

Vatican Law on leaking documents ‘Whoever illicitly obtains or reveals information or documents whose publication is forbidden is punishable by a sentence of six months to 2 years in prison, or a fine of 1000 – 5000 euros.’

Journalists and Confidentiality Journalists Sources Material Breach of Confidence Privacy protection

Sandra Haynes Kirkbright

Public Interest Disclosure Act 1998 (as amended by the Enterprise and Regulatory Reform Act 2013) Protection of employees who make disclosures of information. Protected disclosures That a criminal act has been, is being or likely to be committed A failure to comply with legal obligations, is occurring, has occurred, or is likely to occur A miscarriage of justice has occurred, is occurring, or likely to occur The health and safety of an individual is being, has been or is likely to be endangered The environment has been or is being, or is likely to be damaged Information relating to any one of these categories, is being, has been, or likely to be deliberately concealed.

Breach of Duty of Confidence

Prince Albert v Strange (1849)

Breach of Confidence 3 stage test developed by Megarry J in Coco v A.N Clark (1968) 1.Does the information have the necessary quality of confidence? 2.Has the information been obtained in circumstances where an obligation of confidence is imposed? 3.Has unauthorised use of the information been made which is detrimental to the original communicator of the information?

Campbell v Mirror Group Newspapers(2004)

Creation Records v News Group Newspapers(1997)

The obligation of confidence

Detrimental uses No need to show an actual detriment to person claiming breach of confidence. Arguable that detriment could be seen to be a wider detriment to the public in having confidences broken.

Defences Consent Information that is in the public domain – Lennon v News Group Newspapers (1978) Public Interest – In the public interest or just of interest to the public? Lion Laboratories v Evans (1984); Attorney General v Guardian Newspapers (No. 2) (1988).

Remedies Order to deliver up confidential information Account of profits Damages Injunctions

AMM v HXW (2010) Jeremy Clarkson – “injunctions don’t work. You take out an injunction against somebody or some organisation and immediately news of that injunction and the people involved and the story behind the injunction is in a legal-free world on Twitter and the internet. It’s pointless.”