Copyright © 2009 – Jeffrey Pittman

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
A Brief History of Information Privacy IC211. Colonial America Eavesdropping “listen[ing] under walls or windows, or the eaves of a house, to hearken.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
The Right of Publicity Hastings College of the Law November 19, 2008.
Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
Civil Liberties and Public Policy Chapter 4. The Bill of Rights– Then and Now Civil Liberties – Definition: The legal constitutional protections against.
© 2012 Lathrop & Gage LLP Presented by: Lincoln D. Bandlow, Esq. Lathrop & Gage LLP 1888 Century Park East, Suite 1000 Los Angeles, CA
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
2 Crimes & Torts Crimes Intentional Torts
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Your Rights Under the Internet Law By: Sannita S. Lam.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.
+ Protecting Individual Liberties Section 1 Chapter 14.
(Edited) WORKPLACE PRIVACY.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
The Privacy Torts Public Disclosure of a Private Fact Intrusion False Light Appropriation.
EMPLOYEE PRIVACY RIGHTS
Copyright © 2010 – Jeffrey Pittman. Introduction The following slides expand the textbook coverage of the topic “Invasion of Privacy” Privacy Law - Jeffrey.
Civil Liberties and Public Policy
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Unit 3 Regulation. 2 Regulation of Nursing Practice l Protection of Public l Licensure l Certification.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Chapter 5 – The Constitution and the Regulation of Business Copyright © 2011 by Jeffrey Pittman.
The Bill of Rights The First Fundamental Changes of the Constitution.
14.1 Chapter 14 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
The Privacy Torts Public Disclosure of a Private Fact Intrusion False Light Appropriation.
1-1 CHAPTER 7 MATERIALS TO SUPPLEMENT TEXTBOOK J. Pittman, Instructor.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
AP U.S. GOVERNMENT & POLITICS – Civil Liberties Civil Liberties part 3.
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Unit 3 The Fourth Amendment. The Fourth Amendment To The United States Constitution The right of the people to be secure in their persons, houses, papers,
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Chapter 5 Constitutional Authority To Regulate Business.
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Recognizing the Client
Privacy and the Law.
Surveillance around the world
Chapter 9: Internet Law, Social Media, and Privacy
STATES AREN’T DUNN DISAGREEING ON THE FOURTH AMENDMENT
Limiting the Right of Search
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
4th and 5th Amendment issues in sport and physical activity
Chapter 10 Cyberlaw, Social Media, and Privacy
Civil Law An overview of Tort Law – the largest branch of civil law
Welcome!.
Enforcement of Fourth Amendment Protections Is a man’s home his castle
The Law of Journalism & Mass Communication
Civil Liberties and Public Policy
Grab a book off the shelf and look it up. (Article V)
Essentials of the Legal Environment today, 5E
Obligations and Services of Government
Privacy=Secret CHIHUA WANG.
The American Court Structure
Understanding Law: Mr Thompson, APT Academy
Fourth Amendment And Probable Cause.
THE BILL OF RIGHTS “Place Founding Fathers quotation here & give credit to who said it” Write your name here & class period.
Is it reasonable?.
The Surveillance State
IA455 Chris Danieli and Zachary gibson
City of Ontario v. Quon.
Search & Seizure in Schools:
Presentation transcript:

Copyright © 2009 – Jeffrey Pittman Privacy Copyright © 2009 – Jeffrey Pittman

A Right to Privacy Writing in the Harvard Law Review in 1890, Louis Brandeis and Samuel Warren proposed that the courts recognize a new legal right, the right to privacy The right to privacy, as proposed, was a basic right to be left alone Privacy Law - Jeffrey Pittman

Privacy Concerns Today - Monitoring by Employers Around four out of five major U.S. firms record or review employee workplace activities and communications The activities monitored include telephone calls, e-mail messages, Internet activities, and computer files Employer surveillance techniques include videotaping employees, recording telephone conversations, logging Internet sites visited, and analyzing computer use regarding time logged on and keystroke counts Privacy Law - Jeffrey Pittman

Privacy Concerns Today - Monitoring by the Government Government monitoring of individuals has increased post-9/11 We will not focus on government monitoring as this is primarily a political versus a business issue Privacy Law - Jeffrey Pittman

Privacy Concerns Today - Monitoring by Private Companies Individual private information is available from companies such as www.secret-info.com The information available includes an individual’s social security number, unlisted telephone number, license plate number, information on neighbors and relatives, and property ownership Privacy Law - Jeffrey Pittman

Privacy Rights under the Law US Constitution Federal Statutory Law –various miscellaneous statutes State Constitutions & Statutes State Common Law Privacy Law - Jeffrey Pittman

Privacy & the United States Constitution The Unites States Constitution, specifically the Bill of Rights, is designed to protect individuals from government intrusion into their lives The protections for individuals found in the Constitution only provide protection from the government - private (nongovernmental) action is not regulated by the Constitution Privacy Law - Jeffrey Pittman

Privacy & the United States Constitution Privacy is not directly mentioned in the Constitution The courts have inferred privacy protection from other Constitutional provisions in the First, Fourth, Fifth, and Ninth Amendments Rosario v. United Staes of America (privacy handout) provides an example of privacy under the Fourth Amendment Privacy Law - Jeffrey Pittman

The Constitution & the Bill of Rights Amendment IV The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized Privacy Law - Jeffrey Pittman

The Fourth Amendment and Searches If the searching party is a government employee: US Constitution – The Fourth Amendment applies, protecting against unreasonable searches and seizures in areas where a reasonable expectation of privacy exists If the searching party is not a government employee: No federal law is applicable; look to state law Privacy Law - Jeffrey Pittman

The Fourth Amendment and Searches Regarding searches by government employees under the Fourth Amendment: If the employee is a police officer, a search warrant is usually required If the employee is not a police officer, the intrusiveness of the search is balanced against the need for the search The searched party’s expectation of privacy is a key component of this analysis Privacy Law - Jeffrey Pittman

Privacy & Various Federal Statutes The Computer Fraud and Abuse Act The Fair Credit Reporting Act The Right to Financial Privacy Act The Cable Communications Policy Act The Video Privacy Protection Act The Financial Services Modernization Act The Privacy Act Privacy Law - Jeffrey Pittman

A Key Federal Statute - The Electronic Communication Privacy Act (ECPA) Title I of the ECPA (the Wiretap Act), provides a civil cause of action against “any person who … intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication.” Privacy Law - Jeffrey Pittman

The ECPA Title II of the ECPA (the Stored Communications Act) establishes civil liability for one who: “(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or (2) intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system. Privacy Law - Jeffrey Pittman

ECPA Defenses Under the ECPA, employers are free to monitor or intercept electronic messages where employees have consented to such monitoring, made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public, or whenever such monitoring is in the ordinary course of business Privacy Law - Jeffrey Pittman

ECPA Case Example – Bailey v. Bailey How was the ECPA applied in Bailey? Privacy Law - Jeffrey Pittman

ECPA Case Example - Fisher v. Mt. Olive Lutheran Church Mt. Olive Lutheran Church employed Randall Fischer as a youth minister. While at the church, an employee intercepted an explicit homosexual telephone conversation between Fischer and another man Later, the church used a computer expert to gain access to Fischer’s private Hotmail account to view his email messages Privacy Law - Jeffrey Pittman

The Fischer case – Key Actors Ray O’Connor Senior Pastor Randall Fischer Youth Minister Rose Salzmann Secretary Sandra Janiszewski Business Manager Privacy Law - Jeffrey Pittman

The Fischer case The church argues that, according to plaintiff, he was counseling a homosexual man, a task that falls within his job description In contrast, plaintiff argues that his call was personal and that the church employees had an obligation to stop listening as soon as they determined that the call was personal in nature Privacy Law - Jeffrey Pittman

State Constitutional and Statutory Privacy Protections Most states, including Arkansas, have privacy protections that are similar in scope to federal laws Some states provide additional protections for medical records, insurance, school records, credit and banking information, for example Privacy Law - Jeffrey Pittman

State Common Law Privacy Rights Through the common law process, state courts have developed the following torts, providing additional privacy protections Intrusion Upon Seclusion Public Disclosure of Private Facts Causing Injury to Reputation Publicity Placing Another in a False Light in the Public eye Misappropriation of a Person’s Name or Likeness Privacy Law - Jeffrey Pittman

Intrusion This tort is an intrusion upon a person’s right to seclusion or solitude There is liability only if the interference with the plaintiff's seclusion is a substantial one, highly offensive to the ordinary reasonable person The “offensiveness” of the intrusion is by guided by whether a reasonable expectation of privacy was violated Privacy Law - Jeffrey Pittman

False Light in the Public Eye This tort involves the defendant revealing information about a person that places that person in a false light. A plaintiff here must demonstrate: The false light in which he was placed by the publicity would be highly offensive to a reasonable person, and The defendant had knowledge of or acted in reckless disregard as to the falsity of the publicized matter and the false light in which the plaintiff would be placed Privacy Law - Jeffrey Pittman

Public Disclosure of Private Facts This tort requires public disclosure of private information about a person that, even though true, generates publicity of a highly objectionable kind An example might be the disclosure of names and details about employees fired for viewing pornography at work Privacy Law - Jeffrey Pittman

Appropriation Here a defendant is charged with use of a person’s name or likeness without permission This invasion of privacy would include activities such as the unauthorized use of a person’s name in an advertising campaign Privacy Law - Jeffrey Pittman

Case Example - Appropriation The following “Sex and the City” advertisement was placed on New York buses and subways by TBS, the cable television network “What is the definition of “yogasm” a. A type of yo-yo trick b. Sex with Yogi Berra c. What Samantha has with a guy from yoga class” Privacy Law - Jeffrey Pittman

Case Example - Appropriation Yogi Berra sued for appropriation and damage to his reputation Yogi Berra was a catcher for the New York Yankees from 1946-63, and he successfully managed the New York Yankees and the New York Mets professional baseball teams Yogi Berra agreed to drop his lawsuit against TBS in exchange for an undisclosed settlement (Sept. 2005) Privacy Law - Jeffrey Pittman

Case Example – Appropriation Dobby or V. Putin Privacy Law - Jeffrey Pittman

Case Example - Appropriation Doe v. TCI Cablevision 110 S.W.3d 363 (Mo. 2003) A former professional hockey player, Anthony Twist, brought an action against the creators and publishers of a comic book titled Spawn Privacy Law - Jeffrey Pittman

Case Example - Appropriation Spawn contained a villainous character "Tony Twist" that is a Mafia don whose list of evil deeds includes multiple murders, abduction of children and sex with prostitutes The Missouri Supreme Court held that Twist presented sufficient evidence that defendants used his name as a symbol of his identity, as required to make submissible case for right-of-publicity tort, defendants used Twist’s name to attract consumer attention to their products, and the use of Twist’s name was not protected speech Privacy Law - Jeffrey Pittman

Case Examples - Appropriation Vanna White as a robot (Ms. White prevailed in her suit against Samsung and its advertisement) George Wendt as a robot (Mr. Wendt won initial battles against Host International’s “Cheers” bars) Privacy Law - Jeffrey Pittman

Case Example - Appropriation The Vanna White and George Wendt victories in California were probably negated by a recent decision, Winter v. D.C. Comics, 69 P.3d 473 (2003) There the California Supreme Court held that the First Amendment overrides state tort law where an individual’s name or likeness is involved in a “transformative” use Privacy Law - Jeffrey Pittman

Winter v. D.C. Comics “Celebrities have a statutory right of publicity by which they can prohibit others from using their likeness. . . . An obvious tension exists between this right of publicity and the First Amendment to the United States Constitution.” Privacy Law - Jeffrey Pittman

Winter v. D.C. Comics “In [Comedy III Productions, Inc. v. Saderup], we considered when constitutional free speech rights may trump the statutory right of publicity.” Privacy Law - Jeffrey Pittman

Winter v. D.C. Comics “We formulated "what is essentially a balancing test between the First Amendment and the right of publicity based on whether the work in question adds significant creative elements so as to be transformed into something more than a mere celebrity likeness or imitation. In [Comedy III Productions, Inc. v. Saderup], we concluded that lithographs and T-shirts bearing the likeness of The Three Stooges were not sufficiently transformative to receive First Amendment protection.” Privacy Law - Jeffrey Pittman

Winter v. D.C. Comics “In this case, we apply the same balancing test to comic books containing characters that evoke musician brothers Johnny and Edgar Winter.” Johnny Winters Jonah Hex Privacy Law - Jeffrey Pittman

Winter v. D.C. Comics “We conclude that, in contrast to a drawing of The Three Stooges, the comic books do contain significant creative elements that transform them into something more than mere celebrity likenesses. Accordingly, the comic books are entitled to First Amendment protection.” Privacy Law - Jeffrey Pittman

Winter v. D.C. Comics In considering whether a work is “transformative,” The California Supreme Court stated a relevant inquiry is whether the transformed work has value independent of the celebrity's fame, that is, value in its own right Andy Warhol pictures were used by the court as an example of protected, transformative art Privacy Law - Jeffrey Pittman