Law of Privacy - Essay Example

Only on StudentShare

Extract of sample
Law of Privacy

They did not identify a new tort, but rather a new right that ought to be protected by tort law. That new right in turn was derived from an old right, perhaps a natural right, namely the right to be let alone. In light f these origins, it would have been surprising if the tort protection given to privacy remained confined within the narrow bounds f public disclosure. The very theory f torts upon which privacy was based implied its fluidity.
I have sought in the preceding sections to show how Warren and Brandeis viewed tort law as the law defining and protecting rights, and how this view was at odds with other conceptions f tort law that emerged at the end f the nineteenth century and eventually prevailed. Holmes's defendant-based instrumentalist vision provided the conceptual foundation f tort law well into the twentieth century. Strict liability largely gave way to negligence, even in such bastions f rights-based thinking as property. The common law, and most particularly the law f torts, became the domain f reasonableness rather than rights. Intentional torts, once the focus f torts, receded to near irrelevance. ...
Download paper

Summary

Few torts have developed as diverse offspring as the invasion f the right f privacy. Seventy years after Warren and Brandeis, William Prosser sought to bring order to the "'haystack in a hurricane'" that privacy law had arguably become. Prosser identified four distinct torts: intrusion upon seclusion or solitude, public disclosure f private facts, false light in the public eye, and appropriation ("exploitation f attributes f the plaintiff's identity")…
Author : amosciski

Related Essays

Employment Law (Testing & Privacy Rights)
They could be covered by state laws affecting who may or may not be tested.
...
2 pages (502 words) Essay
Employee privacy rights
Many employees stealing from companies send the purloined data to their personal e-mail21 percent burned the information onto CDs." Due to these technological security issues, employers feel the need and have the capability to monitor their employees. E-mails, voice mails, the Internet, telephones, and computers can be use for unregulated monitoring. Employees say this is an invasion of their privacy. Companies say this is a protection of their assets. The law is not clear on whether companies are invading employees' privacy rights regarding information technology so policies must be set and...
2 pages (502 words) Essay
Privacy and Digital Investigations
Therefore, upon the detection of suspicious computer incidents, the organization immediately launches a forensics/digital investigation which is fully compliant with a policy which has been jointly drawn up by both the legal and the IT departments. This report will begin with a brief overview of privacy considerations, following which it will describe the organization's policy and highlight both its strengths and weaknesses.
...
5 pages (1255 words) Essay
Customer Information Privacy
It is indisputable that no confidential information concerning the customers and their buying behavior should be disclosed to other businesses either for consideration or otherwise. The CNET News reports that companies like Boo.com, Toysmart and CraftShop.com have tried to sell their customers' data (phone number, home address and credit card number) to other business entities (Sandoval, 2000). The report further documents that "it is inappropriate and illegal to sell customer information when it was collected under the assumption that it wouldn't be shared" (Sandoval, 2000). Since it has been...
2 pages (502 words) Essay
The lack of specific statutory legislation to deal with media intrusion can be regarded as a weakness in English law. The Irish Privacy Bill 2006 represents a m
In UK there is no specific statutory provision for the protection of privacy. However, because the violation of personal life cannot remain in certain circumstances without punishment, for this reason, the courts use instead the principles of law that are related with Human Rights in general. In this context, Human Rights Act of 1998 is the most common legislative text used by courts in UK in order to provide protection to people that have suffered an intrusion to their personal life by media. It has to be noticed though that English courts deal with the issue only at the level that the...
16 pages (4016 words) Essay
Law Of Privacy
This evaluation fundamentally misses the conceptual approach to tort law advanced by Warren and Brandeis in finding a right to privacy and elaborating some aspects οf that right. They did not identify a new tort, but rather a new right that ought to be protected by tort law. That new right in turn was derived from an old right, perhaps a natural right, namely the right to be let alone. In light οf these origins, it would have been surprising if the tort protection given to privacy remained confined within the narrow bounds οf public disclosure. The very theory οf torts upon which privacy...
10 pages (2510 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!