Invasion of Privacy Appropriation and Intrusion
Invasion of Privacy The right to privacy in the United States has been diminishing for the past 100 years because of: The growth of the government The growth of the mass media Technological innovations
Growth of Privacy Laws Privacy laws arise at the end of the 19 th century because of: Movement from a rural to urban society Yellow journalism
Appropriation It is illegal to appropriate an individual s name or likeness for commercial or trade purposes without consent
Appropriation Two rights involved: 1. Right to Privacy protects an individual from the embarrassment and humiliation that can occur when a name or picture is used without consent for advertising purposes It is a personal right Protects individuals from emotional harm
Appropriation 2. Right of Publicity protects individuals from the exploitation of their name or likeness for commercial purposes It is a property right protects the economic value of the name or likeness
Appropriation Use of Name or Likeness -- What are names? Not limited to full names Can be nicknames, stage names, pen names
Appropriation Use of Name or Likeness -- What is a likeness? Photographs, paintings, sketches, cartoons Fictional characters Look alikes Sound alikes
Appropriation Advertising and Trade Purposes -- Examples of commercial use: Use of someone s name or likeness in an advertisement in any media outlet including websites A testimonial falsely suggesting an individual uses a product Use of someone s name or likeness in a commercial entertainment vehicle (television show, movie)
Appropriation News and Information Exception Individuals cannot sue for appropriation in a news report News has been widely interpreted by the courts to include anything that is not an explicit advertisement
Appropriation Other Exceptions -- Booth Rule The use of a person s name or likeness in an advertisement for a media product is usually not regarded as an appropriation if the name or likeness has been or will be part of the content
Appropriation Consent as a Defense Written consent is generally uncontestable Oral consent does not offer the same protection; it can be easily contested
Appropriation When Consent Might Not Work Consent today may not be valid in the distant future Some people (minors, wards of the state) cannot give consent Consent to use a photograph does not apply if the image is materially altered or changed
Appropriation Life After Death The right to privacy is a personal right that dies with the individual Several states have passed laws stating the right to publicity may live on after death (with heirs controlling these rights)
Intrusion It is illegal to intrude, physically or otherwise, upon the seclusion or solitude of an individual Trespass the intentional and unauthorized entry onto land or property occupied or possessed by another Intrusion may occur without trespass
Intrusion Intrusion and the Press -- Intrusion may occur in many ways, for example: Eavesdropping to overhear a conversation Gathering personal information from an individual s private records Using a telephoto lens
Intrusion Intrusion and the Press -- All courts will ask whether the plaintiff enjoyed a reasonable expectation of privacy when the information was collected
Intrusion No Privacy in Public There is no expectation of privacy in public Anything that is visible or audible by any person in the vicinity is public, not private There is no expectation of privacy in places where people gather (restaurants, airplanes)
Intrusion No Privacy in Public While photographers can take photos in public places, they may be limited in how close they can come to individuals without engaging in harassment California has passed an anti-paparazzi law that creates tort liabilities for physical and constructive invasions through photographing, videotaping or recording a person engaged in personal or familial activity.
Intrusion The Use of Hidden Recording Devices -- There are expectations of privacy in homes, but not in public places or businesses where people are invited in
Intrusion Hidden Recording Devices -- Ethical guidelines for when to use hidden recording devices: When the information is of profound importance When all other alternatives for obtaining the same information have been exhausted When the individuals involved and their news organizations apply the excellence needed to pursue the story fully
Intrusion Hidden Recording Devices -- Ethical guidelines for when to use hidden recording devices: When the harm prevented by the information revealed outweighs any harm caused by the deception When the journalists involved have conducted a meaningful, collaborative and deliberative decision to justify deception
Intrusion Intrusion and the Publication of Information Obtained Illegally Journalists are not held accountable for information obtained illegally by another party and passed on to them Journalists are held accountable for information they have obtained illegally
Intrusion and the Internet - - Assumption of Risk Analysis - There is no expectation of privacy when information is voluntarily made accessible to another person or placed in the flow of commerce
Intrusion and the Internet Legislative Action Electronic Communications Privacy Act Makes it illegal to: Intentionally intercept a cellular telephone conversation Forbids the manufacturers and importers of radio scanners from making or selling scanners that can intercept communication used for cell phones Outlaws intentional interception of online communications
Intrusion on the Internet Legislative Action -- Drivers License Protection Act Barred state departments of motor vehicles from disclosing personal information about individuals that is contained in driver s license records
Intrusion on the Internet Legislative Action -- Children s Online Privacy Protection Act Allows the FTC to regulate Internet sites that collect personal information from users under the age of 13