SlideShare ist ein Scribd-Unternehmen logo
1 von 45
Omar Ha-Redeye May 3, 2016
AAS, BHA (Hons.), PGCert, JD, LLM
CNMT, RT(N)(ARRT)
New and Newer Privacy Torts:
Public Disclosure and the Next Frontier
• Privacy law and Private Investigators
• Jones v. Tsige
• The formal establishment of privacy torts and intrusion upon seclusion:
• Jane Doe 464533 v. ND
• Public disclosure
• Applications of these new torts regarding Private Investigators
• Potential liability under these new torts
• Examples of Legitimate investigations
• Exmaples of Illegitimate investigations
• Elements the Court considers for liability
• The next frontier – privacy in the technological era
• Conclusion
Overview
• In recent years, Privacy Legislations have been used as a shield against obtaining
private information. However, Statutes such as PIPEDA has limited jurisdiction,
especially in civil tort litigations.
• The Courts confirmed, in the past, investigatory tools such as surveillance are
legitimate tools in some circumstances.
• Druken v R.G. Fewer and Associates Inc. [1998] N.J. No. 312
• Amalgamated Transit Union Local No. 569 v Edmonton (City), 2004 ABQB 280
• Lawful activities of private investigators are generally not caught by application of
privacy legislation.
Privacy and Private Investigators
• On the other hand, the trend to the protection of personal information in terms of
civil liability has been moving towards certainty
• Historically, legal actions around privacy:
• stemmed from concepts of trespass in the common law, and
• Were recognized only actionable where stipulated by statute law
• Aspects of Privacy have long been protected against actions such as breach of
confidence, defamation, breach of copyright, nuisance and various property rights,
• But the right of action for breach of privacy continued to remain uncertain for the
past 120 years of debate
Privacy and Private Investigators
• Jones v. Tsige, 2012 ONCA 32 (CanLII)
• Two things were established in this case:
1. the right to action for invasion of privacy
2. The tort of intrusion upon seclusion
• Jane Doe 464533 v. ND
1. Public Disclosure, a second type of tort for privacy intrusion was established
• If, and how will these new torts affect Private Investigators?
Tort of invasion of privacy were established
• The action arose between two employees in a bank who did not know or work with
each other.
• The plaintiff, Sandra Jones, discovered the Winnie Tsige, the defendant, looked into
Jones' banking records at least 174 times over a period of four years. The defendant
had formed a common law relationship with the former husband of the plaintiff.
• The defendant acknowledged looking at the plaintiff’s bank information without just
cause or reason, contrary to the bank’s policy and her professional duty.
Jones v. Tsige
• Jones initiated legal actions against Tsige.
• Jones asserts that her privacy interest in her confidential banking information has
been "irreversibly destroyed" and claims damages of $70,000 for invasion of privacy
and breach of fiduciary duty, and punitive and exemplary damages of $20,000.
• The plaintiff moved for summary judgment, but the action was dismissed when the
defendant was successful on the motion in claiming that there was no tort for breach
of privacy in Ontario.
• The motion judge found that Tsige did not owe Jones a fiduciary obligation, and
added that given the existence of privacy legislation protecting certain rights, any
expansion of those rights should be dealt with by statute rather than common law.
Jones v. Tsige
• Jones successfully appealed this decision to the Court of Appeal, and was awarded
$10,000.
• The central question to this case is:
• Does Ontario law recognize a cause of action for invasion of privacy?
Jones v. Tsige
• The Judge considered several aspects:
1. Influenitial relevant texts
2. Case law
3. Charter
4. Statute law regarding private information
• And then defined the tort of intrusion upon seclusion
Analysis
• Sharpe J.A. reviewed the seminal articles of S.D. Warren and L.D. Brandeis, "The
Right to Privacy" (1890), and William L. Prosser, "Privacy" (1960)
• Sharpe J.A. accepted the proposition by William L. Prosser in his 1960 article,
“Privacy,” on the four different types of related torts for breach of privacy:
• 1. Intrusion upon the plaintiff’s seclusion or solitude, or into his private affairs.
• 2. Public disclosure of embarrassing private facts about the plaintiff.
• 3. Publicity which places the plaintiff in a false light in the public eye.
• 4. Appropriation, for the defendant’s advantage, of the plaintiff’s name or likeness
• This case is within the first category, intrusion upon seclusion
Previous Commentary
• The Judge looked for case law for two aspects:
• Recognition of a cause of action for privacy, or the trend to that recognition
• The Court’s willingness to dismiss claims based on no cause of action
• Sharpe J.A. listed several case laws dating back to 1981 on the Court awarding
damaging for the invasion of privacy, and decisions where the Judge refused to
dismiss a claim due to the lack of certainty on the existence of a proper cause of
action
Case law
• Charter jurisprudence identifies privacy as being worthy of constitutional protection
and integral to an individual's relationship with the rest of society and the state.
• Charter jurisprudence has recognized three distinct privacy interests:
1. personal privacy
2. territorial privacy
3. informational privacy
• Although the Charter would not necessarily apply to actions between private parties,
however it was consistent to develop the common law to reflect Charter values.
Charter
• The court confirmed the existence of a right of action for intrusion upon seclusion
• The court adopted the wording of the American Restatement§652B to define
intrusion of seclusion, which was itself imported from Prosser:
• One who intentionally intrudes, physically or otherwise, upon the seclusion of another or
his private affairs or concerns, is subject to liability to the other for invasion of his privacy,
if the invasion would be highly offensive to a reasonable person.
• Non-physical forms of investigation were also included
• The intrusion itself makes the defendant subject to liability
Defining the Tort of invasion of privacy
• The court lay out the elements of this cause of action:
1. the defendant’s conduct must be intentional, including recklessness;
2. the defendant must have invaded, without lawful justification, the plaintiff’s private
affairs or concerns;
3. a reasonable person would regard the invasion as highly offensive causing distress,
humiliation or anguish.
Defining the Tort of invasion of privacy
• The trend of Court decisions regarding this matter has always been moving towards
this recognition
• Technology changes rapidly, affecting ways of communication and the storage of
personal, private information.
• Sharpe J.A. recognized the threat to the right of privacy from the changing
technology, and it is within the capacity of the common law to evolve in response to
this problem
Rationale for this definition
• The most important reason:
• The facts in this case “cry out for a remedy”
• This reason is recently echoed in another privacy invasion tort case, Jane Doe
464533 v. ND
Rationale for this definition
• The Court of Appeal in Jones drew upon the American Restatement (Second) of
Torts(2010), which identified the following privacy torts at para 18:
1. Intrusion upon the plaintiff’s seclusion or solitude, or into his private affairs.
2. Public disclosure of embarrassing private facts about the plaintiff.
3. Publicity which places the plaintiff in a false light in the public eye.
4. Appropriation, for the defendant’s advantage, of the plaintiff’s name or likeness.
• Jane Doe 464533 v. ND, a recent case, formall established the second type of privacy
torts: public disclosure
Public disclosure
• The parties in this case were high school sweethearts. Things turned slightly less
sweet once the plaintiff moved away for university, but they remained in touch.
• The parties communicated via text message and the Internet. The defendant sent
the plaintiff explicit photos of himself, and eventually, convinced her to do the same
for him, even though they were no longer in a relationship. He provided assurances
that nobody else would see the explicit video.
• Within one month he had posted this video to an Internet forum with the title,
“college girl pleasures herself for ex boyfriends (sic) delight”. He showed the video to
several of his friends from their hometown.
Jane Doe 464533 v. ND
• The plaintiff was “devastated, humiliated and distraught.”
• The consequences and impact of the defendant’s actions on the plaintiff was
significant and long-lasting. The defendant could not sleep and barely ate, she
deferred her Christmas exams because she was physically and mentally distraught.
• Her took her to a crisis intervention centre at a hospital. She cried for most days and
"had no emotion or life." In her words, she "felt like a very cold person and felt like
everything in my life and all of my beliefs and morals had been stolen from me.“
• This incident has haunted the plaintiff for more than four years, and will likely to
continue to in the future.
Jane Doe 464533 v. ND
• In Court, Justice Stinson reviewed existing areas of tort liability, including breach of
confidence, intentional infliction of mental distress, and invasion of privacy.
• For invasion of privacy, Justice Stinson consulted the decision of Jones in great detail,
and found that the Charter protected value of privacy, as well as the effect of rapidly
evolving technology, to be highly applicable in this case.
Jane Doe 464533 v. ND
• Justice Stinson found the facts of this case are more closely aligned with Public
disclosure than intrusion upon seclusion.
• "Public disclosure of embarrassing private facts about the plaintiff" is described by
the Restatement (Second) of Torts (2010) at 652D as follows :
• one who gives publicity to a matter concerning the private life of another is subject
to liability to the other for invasion of his privacy, if the matter publicized is of a kind
that
• (a) would be highly offensive to a reasonable person, and
• (b) is not of legitimate concern to the public.
Public disclosure
• Prosser, in “Privacy”, listed the feature of this tort as follows :
1. the disclosure of the private facts must be a public disclosure, and not a private
one;
2. the facts disclosed to the public must be private facts, and not public ones; and
3. the matter made public must be one which would be offensive and objectionable
to a reasonable man of ordinary sensibilities.
Public disclosure
• The Court issued:
• a total monetary award in favour of the plaintiff of $141,708.03, including damages,
aggravated damages, and punitive damages, and
• an injunction ordering the defendant to destroy all copies of this video in his possession,
preventing him from posting this video online or sharing it with others, and from having
any contact with the plaintiff or her family.
Outcome
• The significance of this new tort affects the protection of privacy on several aspects:
1. Legislatures have struggled to find Charter-compliant means to curb inappropriate
conduct online. The Criminal Code has proven too heavy-handed to address the
same. And existing civil remedies have not proven effective enough.
2. The large damages award granted here, and the powerful and sweeping nature of
the injunction, ensures that this new tort will certainly pop its head up in the
future. More importantly, it sends an extremely powerful message to those who
would engage in similar behaviour that there are now significant consequences in
law.
Significance
• Privacy torts are relatively new in Canada.
• The recent, formal recognition of Privacy torts reveals a limited amount of relevant
case law on this topic, especially in relation to Private Investigations
• Aside from what we already have, we could look to US jurisdictions for references
Limited Case law
• Caltagirone v. Scozzari-Cloutier
• The Court attempted to establish a framework for torts of privacy breach
• The Court recognized not all personal information is private. The tort of invasion of
privacy involves a balancing between competing public and private interests
Manner of Conduct
• Deputy Justice Criger set out the following questions as a framework to guide the
balancing:
• 1. Is the information acquired, collected, disclosed or published of a kind that a
reasonable person would consider private?
• 2. Has the Plaintiff consented to acquisition or collection of the information?
• 3. If not, has the information been acquired or collected for a legal process or public interest
reason? If so, what is that reason?
• 4. Has the Plaintiff consented to disclosure or publication of the information?
• 5. If not, has the information been disclosed or published for a legal process or public interest
reason? If so, what is that reason?
• 6. Is the legal process or public interest reason put forward for acquisition, collection,
disclosure or publication one that a reasonable person would consider outweighing the
interest of the individual in keeping the information private?
Manner of Conduct
• Actions of investigations on personal information is potentially liable for privacy torts.
• The determination of liability can be examined through relevant case law.
Determination of Liability
• In this case, the Superior Court of Pennsylvania found that there is a social utility to
be gained form fraud investigations being conducted. It is in the best interest of
society that valid claims be ascertained and fabricated claims be exposed.
• The Court mainly considered if Tagouma, the Appellant, had a reasonable
expectation of privacy, and thus a right to be free from intrusion upon seclusion.
• The Court further discussed whether surveillance should be limited to sight and
hearing, and not to include the use of technologically advanced tools (video camera)
that may be used to intrude privacy.
Legitimate Investigations
• Facts of the case:
• In 2004 the Appellant suffered a fall at work and acute fracture on his right hand. He
sought worker’s compensation benefits. His employer contested his claim and while
his claim was pending, the employee retained a private investigator to preform
surveillance on the appellant.
• The investigator video taped the appellant in his prayer through a window, which
consisted of standing up, kneeling and placing his head upon the floor.
Tagouma v. Investigative Consultant Services
Inc. 2010
• The Court ultimately found in favor of the investigator:
• Appellant had failed to establish an expectation of privacy while praying in public.
• There is a social utility to be gained form these investigations. It is in the best interest of
society that valid claims be ascertained and fabricated claim be exposed.
Tagouma v. Investigative Consultant Services
Inc. 2010
• Essential elements to intrusion upon seclusion
1. the defendant’s conduct must be intentional, including recklessness;
2. the defendant must have invaded, without lawful justification, the plaintiff’s private
affairs or concerns;
3. a reasonable person would regard the invasion as highly offensive causing distress,
humiliation or anguish.
Reasons behind this decision
• The Supreme Court of the United States has noted, that a plaintiff who claims
worker’s compensation, has demised expectation of privacy. Citing that it is not
uncommon for defendants in accidents cases to employ investigators to check the
validity of claims against them. The plaintiff must expect reasonable inquiry and
investigation to be made into her their claim and to this extent their interest in
privacy is circumscribed.
• The question of whether the investigator’s conduct is reasonable, the court found
that there is a social utility to be gained form these investigations. It is in the best
interest of society that valid claims be ascertained and fabricated claim be exposed
Reasons behind this decision
• Schmidt v. Ameritech Illinois
• The plaintiff claimed to have a knee injury and went on disability leave.
• The plaintiff's supervisor became suspicious and placed him under investigation as
the plaintiff attempted to take vacation against disability policy
• In addition to staking out the plaintiff's home, Ameritech, the employers also
checked certain of the plaintiff's phone records in an attempt to prove his
whereabouts during the week in question.
• The plaintiff brought an intrusion-upon-seclusion claim against Ameritech, alleging
that the company had improperly reviewed his phone records.
Justification: “protection of its property
interest and rights”
• Although the jury found in the plaintiff's favor, the verdict was overturned on appeal.
On appeal the court found that “Ameritech's conduct was a necessary incident to the
protection of its rights or property,” and that “ ‘rights or property’ includes
Ameritech's monetary resources.”
Justification: “protection of its property
interest and rights”
• Shred-Tech Corp v. Viveen.
• The Investigators obtained telephone records, and made video and audio recordings
while posing as a prospective customer at one of the defendants’ business premises.
• The Judge recognized this to be a breach of the defendant’s right to privacy, and this
issue is of important public interest.
Illegitimate Private Investigation
• In the case of R. v. Cole, the accused was a high school teacher who was charged
with possession of child pornography and unauthorized use of a computer.
• He was permitted to use his work-issued laptop computer for incidental personal
purposes which he did. While performing maintenance activities, a technician found
on the accused’s laptop a hidden folder containing nude and partially nude
photographs of an underage female student.
• The technician notified the principal, and copied the photographs to a compact
disc. The principal seized the laptop, and school board technicians copied the
temporary Internet files onto a second disc.
Applications – assessment of liability
• In light of Jones, Cole, and Tagouma, it is evident that when it comes to the use of
investigations, courts could assess liability based on:
• Location of surveillance
• Reasonable expectation of an individual
• Legitimacy of the cause of investigation
• Conduct of the investigator
The Next Frontier for Investigators
• If employers hire investigators to investigate an employee, they may be of vicarious
liability for the intrusion upon seclusion.
• In Cole, we see the significance of examining the existing policies that may affect the
reasonable expectation of privacy: if the employer allows the employee to take
laptops home and use them personally, there is a reasonable expectation of privacy.
Applications – assessment of liability
• In another US jurisdiction case law, where an employer was successfully sued for the
actions of the Private Investigators hired by the employer.
• North American Corporation of Illinois retained a firm to investigate whether its
former salesperson, Kathleen Lawlor, had violated a noncompetition agreement.
• The Private Investigators used information provided by the employer, such as birth
date, address, home and mobile phone numbers, and social security number, to
obtain the personal phone records from the employee’s telephone carrier.
• The jury returned a verdict in favor of the employee, and awarded her $65,000 in
compensatory damages and $1.75 million in punitive damages.
• The Court however, capped punitive damages at $65,000 because there was no
evidence that North American orchestrated an “intentional, premeditated scheme to
harm Lawlor.”
Applications
• In a very recent case, a tenant refused to allow the landlord access to the property
for the purpose of photographing it, under concerns of privacy.
• The lease allowed the landlord entry “in any circumstances”, but the Ontario
Divisional Court Judges found entry for the purpose of photography without consent
was not a legitimate reason.
Applications
• The Court has stresses the evolving and adaptive nature of common law in response
to the constantly evolving technology.
• As far as privacy torts go, should we expect the other two American torts to
influence or modify Canadian common law?
1. Intrusion upon the plaintiff’s seclusion or solitude, or into his private affairs.
2. Public disclosure of embarrassing private facts about the plaintiff.
3. Publicity which places the plaintiff in a false light in the public eye.
4. Appropriation, for the defendant’s advantage, of the plaintiff’s name or likeness.
Future Frontiers?
• The trend of the Court’s decision regarding privacy in this technological era concerns
with two main aspects:
1. Conduct on acquiring information
2. Conduct on what to do with the information
• Intrusion upon seclusion protects privacy from unwanted attention and investigation
• Public disclosure protects privacy from illegitimate and mal-intentioned publication
of personal information
Protection of information
3. Publicity which places the plaintiff in a false light in the public eye.
4. Appropriation, for the defendant’s advantage, of the plaintiff’s name or likeness.
• We could imagine these two types of tort being used to regulate conduct regarding
acquired personal information.
• The aim is to prevent illegitimate, unwanted and unwelcomed gather and use of
personal information.
Protection of information
Contact Information:
e-mail: Omar@FleetStreetLaw.com
LinkedIn: https://ca.linkedin.com/in/torontolawyer
Twitter: @omarharedeye
QUESTION AND ANSWER PERIOD

Weitere ähnliche Inhalte

Was ist angesagt?

Law Final stop and frisk
Law Final stop and friskLaw Final stop and frisk
Law Final stop and frisk
leandra_budhram
 
English Final stop & frisk
English Final stop & friskEnglish Final stop & frisk
English Final stop & frisk
leandra_budhram
 
Assignment 2 ethics 16th jan 2013
Assignment 2 ethics 16th jan 2013Assignment 2 ethics 16th jan 2013
Assignment 2 ethics 16th jan 2013
btecmedia12
 
COM 101 Chapter 16
COM 101 Chapter 16COM 101 Chapter 16
COM 101 Chapter 16
Val Bello
 
Bill of Rights
Bill of RightsBill of Rights
Bill of Rights
Sam Brandt
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpoint
mmentis117
 

Was ist angesagt? (16)

Law Final stop and frisk
Law Final stop and friskLaw Final stop and frisk
Law Final stop and frisk
 
Social media law
Social media law Social media law
Social media law
 
English Final stop & frisk
English Final stop & friskEnglish Final stop & frisk
English Final stop & frisk
 
Assignment 2 ethics 16th jan 2013
Assignment 2 ethics 16th jan 2013Assignment 2 ethics 16th jan 2013
Assignment 2 ethics 16th jan 2013
 
5. privacy
5. privacy5. privacy
5. privacy
 
COM 101 Chapter 16
COM 101 Chapter 16COM 101 Chapter 16
COM 101 Chapter 16
 
7.ethics.2020
7.ethics.20207.ethics.2020
7.ethics.2020
 
3-D Printing Firearms
3-D Printing Firearms3-D Printing Firearms
3-D Printing Firearms
 
Bill of Rights
Bill of RightsBill of Rights
Bill of Rights
 
8.advert.2020.online
8.advert.2020.online8.advert.2020.online
8.advert.2020.online
 
Balita media loves pinoy watchdog.com
Balita media loves pinoy watchdog.comBalita media loves pinoy watchdog.com
Balita media loves pinoy watchdog.com
 
Dna daddy a quest for legitimacy in indian law
Dna daddy a quest for legitimacy in indian lawDna daddy a quest for legitimacy in indian law
Dna daddy a quest for legitimacy in indian law
 
2013 05-29 Advertising and Marketing Law Presentation
2013 05-29 Advertising and Marketing Law Presentation2013 05-29 Advertising and Marketing Law Presentation
2013 05-29 Advertising and Marketing Law Presentation
 
Legally Correct But Technologically Off the Mark - The Case of Arie Genger
Legally Correct But Technologically Off the Mark - The Case of Arie GengerLegally Correct But Technologically Off the Mark - The Case of Arie Genger
Legally Correct But Technologically Off the Mark - The Case of Arie Genger
 
Derrick Carr and Shawn Betty
Derrick Carr and Shawn BettyDerrick Carr and Shawn Betty
Derrick Carr and Shawn Betty
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpoint
 

Andere mochten auch

Commercial Litigation 2014 Year in Review.PDF
Commercial Litigation 2014 Year in Review.PDFCommercial Litigation 2014 Year in Review.PDF
Commercial Litigation 2014 Year in Review.PDF
Nola Pearce
 

Andere mochten auch (8)

Commercial Litigation 2014 Year in Review.PDF
Commercial Litigation 2014 Year in Review.PDFCommercial Litigation 2014 Year in Review.PDF
Commercial Litigation 2014 Year in Review.PDF
 
Trial Practice Before the Patent Trial and Appeal Board
Trial Practice Before the Patent Trial and Appeal BoardTrial Practice Before the Patent Trial and Appeal Board
Trial Practice Before the Patent Trial and Appeal Board
 
CORD Academic Assembly 2015 - lecture slides - Interview Skills & Contract Ne...
CORD Academic Assembly 2015 - lecture slides - Interview Skills & Contract Ne...CORD Academic Assembly 2015 - lecture slides - Interview Skills & Contract Ne...
CORD Academic Assembly 2015 - lecture slides - Interview Skills & Contract Ne...
 
04 PROFESSIONAL OPPORTUNITIES IN ALTERNATE DISPUTE RESOLUTION (ADR)
04 PROFESSIONAL OPPORTUNITIES IN ALTERNATE DISPUTE RESOLUTION (ADR) 04 PROFESSIONAL OPPORTUNITIES IN ALTERNATE DISPUTE RESOLUTION (ADR)
04 PROFESSIONAL OPPORTUNITIES IN ALTERNATE DISPUTE RESOLUTION (ADR)
 
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...Preservation and Proportionality: Lowering the Burden of Preserving Data in C...
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...
 
Commercial Mediation
Commercial MediationCommercial Mediation
Commercial Mediation
 
BoyarMiller - The Rules Have Changed: Recent Developments that Impact the La...
BoyarMiller - The Rules Have Changed:  Recent Developments that Impact the La...BoyarMiller - The Rules Have Changed:  Recent Developments that Impact the La...
BoyarMiller - The Rules Have Changed: Recent Developments that Impact the La...
 
Arbitration
ArbitrationArbitration
Arbitration
 

Ähnlich wie New and Newer Privacy Torts: Public Disclosure and the Next Frontier.

Ray dowd copyright, ethics & social media- what the connected lawyer needs t...
Ray dowd  copyright, ethics & social media- what the connected lawyer needs t...Ray dowd  copyright, ethics & social media- what the connected lawyer needs t...
Ray dowd copyright, ethics & social media- what the connected lawyer needs t...
Raymond Dowd
 
SAVE-VAWA-Restraining-Orders
SAVE-VAWA-Restraining-OrdersSAVE-VAWA-Restraining-Orders
SAVE-VAWA-Restraining-Orders
L. Gabriel Womack
 
Unit V Significant U.S. Supreme Court Rulings and the Imp.docx
Unit V Significant U.S. Supreme Court Rulings and the Imp.docxUnit V Significant U.S. Supreme Court Rulings and the Imp.docx
Unit V Significant U.S. Supreme Court Rulings and the Imp.docx
marilucorr
 
Edited basic newsgathering and publication speech (00006477)[1]
Edited basic newsgathering and publication speech (00006477)[1]Edited basic newsgathering and publication speech (00006477)[1]
Edited basic newsgathering and publication speech (00006477)[1]
internewsarmenia
 
Privacy tort and your workplace
Privacy tort and your workplacePrivacy tort and your workplace
Privacy tort and your workplace
Dan Michaluk
 
Pollock ethics 8e_ch08
Pollock ethics 8e_ch08Pollock ethics 8e_ch08
Pollock ethics 8e_ch08
windleh
 

Ähnlich wie New and Newer Privacy Torts: Public Disclosure and the Next Frontier. (20)

Missouri Bankers Employment Law Conference
Missouri Bankers Employment Law ConferenceMissouri Bankers Employment Law Conference
Missouri Bankers Employment Law Conference
 
1 Tort of Privacy (1).pptx
1 Tort of Privacy (1).pptx1 Tort of Privacy (1).pptx
1 Tort of Privacy (1).pptx
 
Social Lawyers (slide deck to accompany hypotheticals)
Social Lawyers (slide deck to accompany hypotheticals)Social Lawyers (slide deck to accompany hypotheticals)
Social Lawyers (slide deck to accompany hypotheticals)
 
Social Media Content and Discovery Practice
Social Media Content and Discovery Practice Social Media Content and Discovery Practice
Social Media Content and Discovery Practice
 
Ray dowd copyright, ethics & social media- what the connected lawyer needs t...
Ray dowd  copyright, ethics & social media- what the connected lawyer needs t...Ray dowd  copyright, ethics & social media- what the connected lawyer needs t...
Ray dowd copyright, ethics & social media- what the connected lawyer needs t...
 
SAVE-VAWA-Restraining-Orders
SAVE-VAWA-Restraining-OrdersSAVE-VAWA-Restraining-Orders
SAVE-VAWA-Restraining-Orders
 
Law of Torts PPT for Students.pptx
Law of Torts PPT for Students.pptxLaw of Torts PPT for Students.pptx
Law of Torts PPT for Students.pptx
 
Privacy in the Workplace: How Much Snooping is Legal and Proper?
Privacy in the Workplace: How Much Snooping is Legal and Proper?Privacy in the Workplace: How Much Snooping is Legal and Proper?
Privacy in the Workplace: How Much Snooping is Legal and Proper?
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal Perspective
 
Scheuerman on Snowden & Civil Disobedience
Scheuerman on Snowden & Civil DisobedienceScheuerman on Snowden & Civil Disobedience
Scheuerman on Snowden & Civil Disobedience
 
Privacy , defamation; sting operation Under Media Law
Privacy , defamation; sting operation Under Media Law Privacy , defamation; sting operation Under Media Law
Privacy , defamation; sting operation Under Media Law
 
Fitness to stand trial 01
Fitness to stand trial 01Fitness to stand trial 01
Fitness to stand trial 01
 
Unit V Significant U.S. Supreme Court Rulings and the Imp.docx
Unit V Significant U.S. Supreme Court Rulings and the Imp.docxUnit V Significant U.S. Supreme Court Rulings and the Imp.docx
Unit V Significant U.S. Supreme Court Rulings and the Imp.docx
 
motion to dismiss
motion to dismissmotion to dismiss
motion to dismiss
 
Voir dire and jury selection social media use and other complex jury issues...
Voir dire and jury selection   social media use and other complex jury issues...Voir dire and jury selection   social media use and other complex jury issues...
Voir dire and jury selection social media use and other complex jury issues...
 
Edited basic newsgathering and publication speech (00006477)[1]
Edited basic newsgathering and publication speech (00006477)[1]Edited basic newsgathering and publication speech (00006477)[1]
Edited basic newsgathering and publication speech (00006477)[1]
 
Privacy tort and your workplace
Privacy tort and your workplacePrivacy tort and your workplace
Privacy tort and your workplace
 
Co-Owners And Hannon Case Study
Co-Owners And Hannon Case StudyCo-Owners And Hannon Case Study
Co-Owners And Hannon Case Study
 
Privacy in digital_age_ john_ervin
Privacy in  digital_age_ john_ervinPrivacy in  digital_age_ john_ervin
Privacy in digital_age_ john_ervin
 
Pollock ethics 8e_ch08
Pollock ethics 8e_ch08Pollock ethics 8e_ch08
Pollock ethics 8e_ch08
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Kürzlich hochgeladen (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

New and Newer Privacy Torts: Public Disclosure and the Next Frontier.

  • 1. Omar Ha-Redeye May 3, 2016 AAS, BHA (Hons.), PGCert, JD, LLM CNMT, RT(N)(ARRT) New and Newer Privacy Torts: Public Disclosure and the Next Frontier
  • 2. • Privacy law and Private Investigators • Jones v. Tsige • The formal establishment of privacy torts and intrusion upon seclusion: • Jane Doe 464533 v. ND • Public disclosure • Applications of these new torts regarding Private Investigators • Potential liability under these new torts • Examples of Legitimate investigations • Exmaples of Illegitimate investigations • Elements the Court considers for liability • The next frontier – privacy in the technological era • Conclusion Overview
  • 3. • In recent years, Privacy Legislations have been used as a shield against obtaining private information. However, Statutes such as PIPEDA has limited jurisdiction, especially in civil tort litigations. • The Courts confirmed, in the past, investigatory tools such as surveillance are legitimate tools in some circumstances. • Druken v R.G. Fewer and Associates Inc. [1998] N.J. No. 312 • Amalgamated Transit Union Local No. 569 v Edmonton (City), 2004 ABQB 280 • Lawful activities of private investigators are generally not caught by application of privacy legislation. Privacy and Private Investigators
  • 4. • On the other hand, the trend to the protection of personal information in terms of civil liability has been moving towards certainty • Historically, legal actions around privacy: • stemmed from concepts of trespass in the common law, and • Were recognized only actionable where stipulated by statute law • Aspects of Privacy have long been protected against actions such as breach of confidence, defamation, breach of copyright, nuisance and various property rights, • But the right of action for breach of privacy continued to remain uncertain for the past 120 years of debate Privacy and Private Investigators
  • 5. • Jones v. Tsige, 2012 ONCA 32 (CanLII) • Two things were established in this case: 1. the right to action for invasion of privacy 2. The tort of intrusion upon seclusion • Jane Doe 464533 v. ND 1. Public Disclosure, a second type of tort for privacy intrusion was established • If, and how will these new torts affect Private Investigators? Tort of invasion of privacy were established
  • 6. • The action arose between two employees in a bank who did not know or work with each other. • The plaintiff, Sandra Jones, discovered the Winnie Tsige, the defendant, looked into Jones' banking records at least 174 times over a period of four years. The defendant had formed a common law relationship with the former husband of the plaintiff. • The defendant acknowledged looking at the plaintiff’s bank information without just cause or reason, contrary to the bank’s policy and her professional duty. Jones v. Tsige
  • 7. • Jones initiated legal actions against Tsige. • Jones asserts that her privacy interest in her confidential banking information has been "irreversibly destroyed" and claims damages of $70,000 for invasion of privacy and breach of fiduciary duty, and punitive and exemplary damages of $20,000. • The plaintiff moved for summary judgment, but the action was dismissed when the defendant was successful on the motion in claiming that there was no tort for breach of privacy in Ontario. • The motion judge found that Tsige did not owe Jones a fiduciary obligation, and added that given the existence of privacy legislation protecting certain rights, any expansion of those rights should be dealt with by statute rather than common law. Jones v. Tsige
  • 8. • Jones successfully appealed this decision to the Court of Appeal, and was awarded $10,000. • The central question to this case is: • Does Ontario law recognize a cause of action for invasion of privacy? Jones v. Tsige
  • 9. • The Judge considered several aspects: 1. Influenitial relevant texts 2. Case law 3. Charter 4. Statute law regarding private information • And then defined the tort of intrusion upon seclusion Analysis
  • 10. • Sharpe J.A. reviewed the seminal articles of S.D. Warren and L.D. Brandeis, "The Right to Privacy" (1890), and William L. Prosser, "Privacy" (1960) • Sharpe J.A. accepted the proposition by William L. Prosser in his 1960 article, “Privacy,” on the four different types of related torts for breach of privacy: • 1. Intrusion upon the plaintiff’s seclusion or solitude, or into his private affairs. • 2. Public disclosure of embarrassing private facts about the plaintiff. • 3. Publicity which places the plaintiff in a false light in the public eye. • 4. Appropriation, for the defendant’s advantage, of the plaintiff’s name or likeness • This case is within the first category, intrusion upon seclusion Previous Commentary
  • 11. • The Judge looked for case law for two aspects: • Recognition of a cause of action for privacy, or the trend to that recognition • The Court’s willingness to dismiss claims based on no cause of action • Sharpe J.A. listed several case laws dating back to 1981 on the Court awarding damaging for the invasion of privacy, and decisions where the Judge refused to dismiss a claim due to the lack of certainty on the existence of a proper cause of action Case law
  • 12. • Charter jurisprudence identifies privacy as being worthy of constitutional protection and integral to an individual's relationship with the rest of society and the state. • Charter jurisprudence has recognized three distinct privacy interests: 1. personal privacy 2. territorial privacy 3. informational privacy • Although the Charter would not necessarily apply to actions between private parties, however it was consistent to develop the common law to reflect Charter values. Charter
  • 13. • The court confirmed the existence of a right of action for intrusion upon seclusion • The court adopted the wording of the American Restatement§652B to define intrusion of seclusion, which was itself imported from Prosser: • One who intentionally intrudes, physically or otherwise, upon the seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the invasion would be highly offensive to a reasonable person. • Non-physical forms of investigation were also included • The intrusion itself makes the defendant subject to liability Defining the Tort of invasion of privacy
  • 14. • The court lay out the elements of this cause of action: 1. the defendant’s conduct must be intentional, including recklessness; 2. the defendant must have invaded, without lawful justification, the plaintiff’s private affairs or concerns; 3. a reasonable person would regard the invasion as highly offensive causing distress, humiliation or anguish. Defining the Tort of invasion of privacy
  • 15. • The trend of Court decisions regarding this matter has always been moving towards this recognition • Technology changes rapidly, affecting ways of communication and the storage of personal, private information. • Sharpe J.A. recognized the threat to the right of privacy from the changing technology, and it is within the capacity of the common law to evolve in response to this problem Rationale for this definition
  • 16. • The most important reason: • The facts in this case “cry out for a remedy” • This reason is recently echoed in another privacy invasion tort case, Jane Doe 464533 v. ND Rationale for this definition
  • 17. • The Court of Appeal in Jones drew upon the American Restatement (Second) of Torts(2010), which identified the following privacy torts at para 18: 1. Intrusion upon the plaintiff’s seclusion or solitude, or into his private affairs. 2. Public disclosure of embarrassing private facts about the plaintiff. 3. Publicity which places the plaintiff in a false light in the public eye. 4. Appropriation, for the defendant’s advantage, of the plaintiff’s name or likeness. • Jane Doe 464533 v. ND, a recent case, formall established the second type of privacy torts: public disclosure Public disclosure
  • 18. • The parties in this case were high school sweethearts. Things turned slightly less sweet once the plaintiff moved away for university, but they remained in touch. • The parties communicated via text message and the Internet. The defendant sent the plaintiff explicit photos of himself, and eventually, convinced her to do the same for him, even though they were no longer in a relationship. He provided assurances that nobody else would see the explicit video. • Within one month he had posted this video to an Internet forum with the title, “college girl pleasures herself for ex boyfriends (sic) delight”. He showed the video to several of his friends from their hometown. Jane Doe 464533 v. ND
  • 19. • The plaintiff was “devastated, humiliated and distraught.” • The consequences and impact of the defendant’s actions on the plaintiff was significant and long-lasting. The defendant could not sleep and barely ate, she deferred her Christmas exams because she was physically and mentally distraught. • Her took her to a crisis intervention centre at a hospital. She cried for most days and "had no emotion or life." In her words, she "felt like a very cold person and felt like everything in my life and all of my beliefs and morals had been stolen from me.“ • This incident has haunted the plaintiff for more than four years, and will likely to continue to in the future. Jane Doe 464533 v. ND
  • 20. • In Court, Justice Stinson reviewed existing areas of tort liability, including breach of confidence, intentional infliction of mental distress, and invasion of privacy. • For invasion of privacy, Justice Stinson consulted the decision of Jones in great detail, and found that the Charter protected value of privacy, as well as the effect of rapidly evolving technology, to be highly applicable in this case. Jane Doe 464533 v. ND
  • 21. • Justice Stinson found the facts of this case are more closely aligned with Public disclosure than intrusion upon seclusion. • "Public disclosure of embarrassing private facts about the plaintiff" is described by the Restatement (Second) of Torts (2010) at 652D as follows : • one who gives publicity to a matter concerning the private life of another is subject to liability to the other for invasion of his privacy, if the matter publicized is of a kind that • (a) would be highly offensive to a reasonable person, and • (b) is not of legitimate concern to the public. Public disclosure
  • 22. • Prosser, in “Privacy”, listed the feature of this tort as follows : 1. the disclosure of the private facts must be a public disclosure, and not a private one; 2. the facts disclosed to the public must be private facts, and not public ones; and 3. the matter made public must be one which would be offensive and objectionable to a reasonable man of ordinary sensibilities. Public disclosure
  • 23. • The Court issued: • a total monetary award in favour of the plaintiff of $141,708.03, including damages, aggravated damages, and punitive damages, and • an injunction ordering the defendant to destroy all copies of this video in his possession, preventing him from posting this video online or sharing it with others, and from having any contact with the plaintiff or her family. Outcome
  • 24. • The significance of this new tort affects the protection of privacy on several aspects: 1. Legislatures have struggled to find Charter-compliant means to curb inappropriate conduct online. The Criminal Code has proven too heavy-handed to address the same. And existing civil remedies have not proven effective enough. 2. The large damages award granted here, and the powerful and sweeping nature of the injunction, ensures that this new tort will certainly pop its head up in the future. More importantly, it sends an extremely powerful message to those who would engage in similar behaviour that there are now significant consequences in law. Significance
  • 25. • Privacy torts are relatively new in Canada. • The recent, formal recognition of Privacy torts reveals a limited amount of relevant case law on this topic, especially in relation to Private Investigations • Aside from what we already have, we could look to US jurisdictions for references Limited Case law
  • 26. • Caltagirone v. Scozzari-Cloutier • The Court attempted to establish a framework for torts of privacy breach • The Court recognized not all personal information is private. The tort of invasion of privacy involves a balancing between competing public and private interests Manner of Conduct
  • 27. • Deputy Justice Criger set out the following questions as a framework to guide the balancing: • 1. Is the information acquired, collected, disclosed or published of a kind that a reasonable person would consider private? • 2. Has the Plaintiff consented to acquisition or collection of the information? • 3. If not, has the information been acquired or collected for a legal process or public interest reason? If so, what is that reason? • 4. Has the Plaintiff consented to disclosure or publication of the information? • 5. If not, has the information been disclosed or published for a legal process or public interest reason? If so, what is that reason? • 6. Is the legal process or public interest reason put forward for acquisition, collection, disclosure or publication one that a reasonable person would consider outweighing the interest of the individual in keeping the information private? Manner of Conduct
  • 28. • Actions of investigations on personal information is potentially liable for privacy torts. • The determination of liability can be examined through relevant case law. Determination of Liability
  • 29. • In this case, the Superior Court of Pennsylvania found that there is a social utility to be gained form fraud investigations being conducted. It is in the best interest of society that valid claims be ascertained and fabricated claims be exposed. • The Court mainly considered if Tagouma, the Appellant, had a reasonable expectation of privacy, and thus a right to be free from intrusion upon seclusion. • The Court further discussed whether surveillance should be limited to sight and hearing, and not to include the use of technologically advanced tools (video camera) that may be used to intrude privacy. Legitimate Investigations
  • 30. • Facts of the case: • In 2004 the Appellant suffered a fall at work and acute fracture on his right hand. He sought worker’s compensation benefits. His employer contested his claim and while his claim was pending, the employee retained a private investigator to preform surveillance on the appellant. • The investigator video taped the appellant in his prayer through a window, which consisted of standing up, kneeling and placing his head upon the floor. Tagouma v. Investigative Consultant Services Inc. 2010
  • 31. • The Court ultimately found in favor of the investigator: • Appellant had failed to establish an expectation of privacy while praying in public. • There is a social utility to be gained form these investigations. It is in the best interest of society that valid claims be ascertained and fabricated claim be exposed. Tagouma v. Investigative Consultant Services Inc. 2010
  • 32. • Essential elements to intrusion upon seclusion 1. the defendant’s conduct must be intentional, including recklessness; 2. the defendant must have invaded, without lawful justification, the plaintiff’s private affairs or concerns; 3. a reasonable person would regard the invasion as highly offensive causing distress, humiliation or anguish. Reasons behind this decision
  • 33. • The Supreme Court of the United States has noted, that a plaintiff who claims worker’s compensation, has demised expectation of privacy. Citing that it is not uncommon for defendants in accidents cases to employ investigators to check the validity of claims against them. The plaintiff must expect reasonable inquiry and investigation to be made into her their claim and to this extent their interest in privacy is circumscribed. • The question of whether the investigator’s conduct is reasonable, the court found that there is a social utility to be gained form these investigations. It is in the best interest of society that valid claims be ascertained and fabricated claim be exposed Reasons behind this decision
  • 34. • Schmidt v. Ameritech Illinois • The plaintiff claimed to have a knee injury and went on disability leave. • The plaintiff's supervisor became suspicious and placed him under investigation as the plaintiff attempted to take vacation against disability policy • In addition to staking out the plaintiff's home, Ameritech, the employers also checked certain of the plaintiff's phone records in an attempt to prove his whereabouts during the week in question. • The plaintiff brought an intrusion-upon-seclusion claim against Ameritech, alleging that the company had improperly reviewed his phone records. Justification: “protection of its property interest and rights”
  • 35. • Although the jury found in the plaintiff's favor, the verdict was overturned on appeal. On appeal the court found that “Ameritech's conduct was a necessary incident to the protection of its rights or property,” and that “ ‘rights or property’ includes Ameritech's monetary resources.” Justification: “protection of its property interest and rights”
  • 36. • Shred-Tech Corp v. Viveen. • The Investigators obtained telephone records, and made video and audio recordings while posing as a prospective customer at one of the defendants’ business premises. • The Judge recognized this to be a breach of the defendant’s right to privacy, and this issue is of important public interest. Illegitimate Private Investigation
  • 37. • In the case of R. v. Cole, the accused was a high school teacher who was charged with possession of child pornography and unauthorized use of a computer. • He was permitted to use his work-issued laptop computer for incidental personal purposes which he did. While performing maintenance activities, a technician found on the accused’s laptop a hidden folder containing nude and partially nude photographs of an underage female student. • The technician notified the principal, and copied the photographs to a compact disc. The principal seized the laptop, and school board technicians copied the temporary Internet files onto a second disc. Applications – assessment of liability
  • 38. • In light of Jones, Cole, and Tagouma, it is evident that when it comes to the use of investigations, courts could assess liability based on: • Location of surveillance • Reasonable expectation of an individual • Legitimacy of the cause of investigation • Conduct of the investigator The Next Frontier for Investigators
  • 39. • If employers hire investigators to investigate an employee, they may be of vicarious liability for the intrusion upon seclusion. • In Cole, we see the significance of examining the existing policies that may affect the reasonable expectation of privacy: if the employer allows the employee to take laptops home and use them personally, there is a reasonable expectation of privacy. Applications – assessment of liability
  • 40. • In another US jurisdiction case law, where an employer was successfully sued for the actions of the Private Investigators hired by the employer. • North American Corporation of Illinois retained a firm to investigate whether its former salesperson, Kathleen Lawlor, had violated a noncompetition agreement. • The Private Investigators used information provided by the employer, such as birth date, address, home and mobile phone numbers, and social security number, to obtain the personal phone records from the employee’s telephone carrier. • The jury returned a verdict in favor of the employee, and awarded her $65,000 in compensatory damages and $1.75 million in punitive damages. • The Court however, capped punitive damages at $65,000 because there was no evidence that North American orchestrated an “intentional, premeditated scheme to harm Lawlor.” Applications
  • 41. • In a very recent case, a tenant refused to allow the landlord access to the property for the purpose of photographing it, under concerns of privacy. • The lease allowed the landlord entry “in any circumstances”, but the Ontario Divisional Court Judges found entry for the purpose of photography without consent was not a legitimate reason. Applications
  • 42. • The Court has stresses the evolving and adaptive nature of common law in response to the constantly evolving technology. • As far as privacy torts go, should we expect the other two American torts to influence or modify Canadian common law? 1. Intrusion upon the plaintiff’s seclusion or solitude, or into his private affairs. 2. Public disclosure of embarrassing private facts about the plaintiff. 3. Publicity which places the plaintiff in a false light in the public eye. 4. Appropriation, for the defendant’s advantage, of the plaintiff’s name or likeness. Future Frontiers?
  • 43. • The trend of the Court’s decision regarding privacy in this technological era concerns with two main aspects: 1. Conduct on acquiring information 2. Conduct on what to do with the information • Intrusion upon seclusion protects privacy from unwanted attention and investigation • Public disclosure protects privacy from illegitimate and mal-intentioned publication of personal information Protection of information
  • 44. 3. Publicity which places the plaintiff in a false light in the public eye. 4. Appropriation, for the defendant’s advantage, of the plaintiff’s name or likeness. • We could imagine these two types of tort being used to regulate conduct regarding acquired personal information. • The aim is to prevent illegitimate, unwanted and unwelcomed gather and use of personal information. Protection of information
  • 45. Contact Information: e-mail: Omar@FleetStreetLaw.com LinkedIn: https://ca.linkedin.com/in/torontolawyer Twitter: @omarharedeye QUESTION AND ANSWER PERIOD

Hinweis der Redaktion

  1. Druken: Investigators were retained to investigate the validity of the plaintiff’s claims through surveillance. The Court confirmed that the courts recognize surveillance as a legitimate tool in defense of personal injury claims, and the actions of the companies involved were reasonable.  The surveillance was not without purpose, and the insurance company had a lawful right to pursue such surveillance. The Court further confirmed that video surveillance did not require the plaintiff’s consent.  http://www.canlii.org/en/nl/nlsctd/doc/1998/1998canlii18731/1998canlii18731.html?resultIndex=1 Amalgamated: An employee went on disability leave. His employer ordered video surveillance to demonstrate that the employee was performing strenuous physical tasks. The employee argued the surveillance breached s.8 Charter rights. The Court of Queen’s Bench of Alberta, on review, held that the Charter had not been breached as the employee had no reasonable expectation of privacy, given that the surveillance occurred in a public place and was a public activity engaged in by the employee. http://www.canlii.org/en/ab/abqb/doc/2004/2004abqb280/2004abqb280.html?autocompleteStr=Amalgamated%20Transit%20Union%20Local%20No.%20569%20v%20Edmonton%20&autocompletePos=1
  2. In July 2009, Sandra Jones, the plaintiff, discovered the Winnie Tsige, the defendant, had been surreptitiously looking at Jones' banking records.  Jones and Tsige worked at different branches of the Bank of Montreal(“BMO”), but did not know each other. Tsige formed a common-law relationship with Jones’ former husband. As a bank employee, Tsige had full access to Jones' banking information and, contrary to the bank's policy, looked into Jones' banking records at least 174 times over a period of four years. The information displayed included transactions details as well as personal information, such as date of birth, marital status and address. Tsige did not publish, distribute or record the information in any way. When Jones became suspicious and confronted the Tsige, Tsige admitted to her actions. She admitted that she had looked at Jones’ banking information without legitimate reasons, and that she understood it was against the business code of BMO. Tsige explained that she was involved in a financial dispute with Jones’ former husband and wanted to find out whether he was paying child support. Jones did not accept this explanation. Tsige apologized for her actions, and BMO disciplined Tsige by suspending her for one week without pay and denying her a bonus.
  3. In Saccone v. Orr (1981), 1981 CanLII 1708 (ON SC), the judge dimissed the defendant’s argument against the existence of a tort of invasion of privacy In Roth v. Roth (1991), 1981 CanLII 1708 (ON SC), the judge found the cumulative effect of the defendant’s actions could best be described as an invasion of privacy, and rejected the contention that there is no such tort in common law
  4. Statute law: The Court reviewed privacy legislation such as the Personal Information Protection and Electronic Documents Act (PIPEDA), Personal Health Information Protection Act (PHIPA), Freedom of Information and Protection of Privacy Act (FIPPA), Municipal Freedom of Information and Protection of Privacy Act (MFIPPA), and Consumer Reporting Act, privacy law and legislation in other jurisdictions. The Ontario legislation essentially deals with freedom of information and the protection of certain private information with respect to government and other public institutions. Like PIPEDA, it has nothing to do with private rights of action between individuals.
  5. Including the use of the defendant’s senses, with or without mechanical aids, to oversee or overhear the plaintiff’s private affairs, as by looking into his upstairs windows with binoculars or tapping his telephone wires. It may be by some other form of investigation or examination into his private concerns, as by opening his private and personal mail, searching his safe or his wallet, examining his private bank account, or compelling him by a forged court order to permit an inspection of his personal documents. The intrusion itself makes the defendant subject to liability, even though there is no publication or other use of any kind of the photograph or information outlined.
  6. To ensure that intrusion of seclusion was not applied to broadly, the court defined the type of privacy interests that would be affected: financial or health records sexual practices and orientation employment diary or private correspondence that could be reasonably considered highly offensive
  7. Intrusion upon seclusion and public disclosure
  8. Charter value: the right to privacy is a constitutional value to be protected by the law Digital media and its effect on the storage and distribution of private data
  9. Legitimate concern to the public is an exemption to public disclosure. Therefore the investigation and prevention of Fraud is potentially exempt from this tort. Comment section of the Restatement: Every individual has some phases of his life and his activities and some facts about himself that he does not expose to the public eye, but keeps entirely to himself or at most reveals only to his family or to close friends. Sexual relations, for example, are normally entirely private matters, as are family quarrels, many unpleasant or disgraceful or humiliating illnesses, most intimate personal letters, most details of a man's life in his home, and some of his past history that he would rather forget. When these intimate details of his life are spread before the public gaze in a manner highly offensive to the ordinary reasonable man, there is an actionable invasion of his privacy, unless the matter is one of legitimate public interest.
  10. [2007] O.J. No. 4003, The plaintiff in this case was HIV positive, and then disclosed this information to his aunt, the defendent. The defendant disclosed this information to others without the plaintiff’s consent, and the plaintiff commenced actions for intentional infliction of mental pain and invasion of privacy. http://www.lexisnexis.com.eztest.ocls.ca/lnacui2api/api/version1/getDocCui?lni=4R05-FFD0-TWVB-30PT&csi=285689,285686&hl=t&hv=t&hnsd=f&hns=t&hgn=t&oc=00240&perma=true
  11. We could see the echo of this case in Jane Doe v ND: private information about the plaintiff had been disclosed without his consent or a legal process/public interest reason and therefore, an actionable breach of privacy had occurred.
  12. Tagouma v. Investigative Consultant Services Inc. 2010 (Superior Court of Pennsylvania) August 10, 2010, 4 A.3d 170. US Jurisdiction The investigation company videotaped the employee worshiping at an Islamic Center, alleging invasion of privacy—“intrusion on seclusion”. The Appellant, Tagouma, filed a complaint against Investigative Consultant Services Inc. (ICS). ICS was hired by the Appellant’s Employer—worker’s compensation carrier to preform surveillance on the employee Case on Appeal after a judgment was in favour of ICS and the investigator. The justice noted the employee failed to show he has reasonable expectation of privacy while praying in public and furthermore the employee did not establish invasion of privacy cause of action for intrusion upon seclusion. Tagouma is appealing the decision to the Superior Court of Pennsylvania
  13. The location of the Islamic Centre is relevant in the case (weather it was considered “secluded” from public (i.e. parking lot, local businesses in the vicinity, public sidewalks, etc). The record indicates that there are no public sidewalks or public parking. The investigator parked across the center, 70-80 yards and video taped the employee walking into the Islamic Centre and recorded him with a camera with a zoom feature. The investigator testified that as soon as the subject is in “plain view” or in “public” or inside a public building they are permitted to video tape and its is not considered private.  
  14. To establish all the elements, the Court found that the intrusion must be into privacy matters, and that the reasonable person standard applies. The defendant is only subject to liability under this section when he has intruded into a private place, or otherwise has invaded a private seclusion that the plaintiff has placed himself into. The appellants contends that an act of worship is entitled to reasonable expectation of privacy. The Court concluded the appellant cannot ask the court to create a privacy expectation based on religion. Merely assigning a purpose to the activity cannot save the appellant’s claim for intrusion upon seclusion for the purposes of a tort action. Kneeling in the Islamic Centre is no different than kneeling in another public forum. His thoughts prayers during his activity remained private. Bases on the evidence the judge dismissed the appellants claim of intrusion upon seclusion.
  15. Schmidt v. Ameritech Illinois, 329 Ill.App.3d 1020, 263 Ill.Dec. 543, 768 N.E.2d 303 (Ill.App.Ct.2002) US Jurisdiction
  16. Because Ameritech's investigation into an unnecessary depletion of its monetary resources necessarily involves a protection of its rights and property, especially in light of [the plaintiff's] admittedly deceitful actions, we find that Ameritech's conduct was authorized and protected specifically by this statute. Accordingly, because plaintiffs cannot demonstrate that Ameritech's conduct was unauthorized, i.e., the first element of the tort, we find that the jury's verdict in favor of the plaintiffs was against the manifest weight of the evidence
  17. [2007] O.J. No. 1658 http://www.lexisnexis.com.eztest.ocls.ca/lnacui2api/api/version1/getDocCui?lni=4NP4-7HJ0-TWVB-301B&csi=285689,285686&hl=t&hv=t&hnsd=f&hns=t&hgn=t&oc=00240&perma=true The plaintiff in Shred-Tech retained a private investigator to look into a competing business started by one of its former employees. After receiving disclosure, the defendants learned that the investigator had obtained their telephone records without their consent or a court order. And that secretly and without permission, the investigator had made a video and audio recording while posing as a prospective customer at one of the defendants’ business premises. The defendants sought an order to relieve them of the deemed undertaking rule so that they could use the information obtained in discovery to file a complaint with the authorities. The Judge granted the relief.
  18. R. v. Cole, [2012] 3 SCR 34 http://www.canlii.org/en/ca/scc/doc/2012/2012scc53/2012scc53.html?autocompleteStr=R.%20v.%20Cole&autocompletePos=1 This case is a s.8 Charter issue, but the factors the Court considered are of referential values for the reasonable expectations of privacy: he had exclusive possession of the laptop; the laptop was password protected by a password he created; the school board policy permitted personal use of the computer; he had permission to take the laptop home on evenings, weekends and summer vacations; there was no evidence the board actively monitored teachers’ use of laptops; and the board had no clear and unambiguous policy allowing the board to monitor, search or police the teacher’s use of the laptop.
  19. We still lack directions on what is considered a lawful justification in torts regarding privacy, but we can speculate from the relevant case law that it may be legitimate concerns for business, or if there is a public interest in seeing the investigation done. Investigating fraud perhaps is a good example.
  20. https://www.insideprivacy.com/united-states/employer-liable-for-conduct-of-private-investigators/
  21. Does this case have an implication on the use of photography on private properties based on vaguely written policies and agreements? PIs would perhaps be liable if they take photos in similar circumstances, thinking that they(or whoever hired them) have justification under an agreement.
  22. Defamation, identity theft, all made easier with technology, not to mention the easily accessible personal data stored online. How will the court assess the other two categories when there are already recognized torts such as defamation and fraud? The difference may lie in the sensitive nature of the information used in these claims: personal and private.
  23. Technology may allow a person to reveal personal information regarding another individual that would mislead the public by the incompleteness of the information This is different from defamation, and the major concern remains to be privacy. Appropriation may deal with personable identity, and it is not limited to commercial use. The commentary on Restatement (Second) of Torts (2010) at 652C, Appropriation of Name or Likeness notes: It applies also when the defendant makes use of the plaintiff's name or likeness for his own purposes and benefit, commercial or not.