Free

Invasion of privacy - Essay Example

Comments (0) Cite this document
Summary
Invasion of privacy became a tort when the Boston lawyer Samuel Warren (1852 – 1910) was upset because the local press reported about the conduct of his wife at a party. Warren had graduated second in his class at Harvard Law School (1877) and, together with his friend Louis…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Invasion of privacy
Read TextPreview

Extract of sample "Invasion of privacy"

Invasion of privacy Invasion of privacy became a tort when the Boston lawyer Samuel Warren (1852 – 1910) was upset because the local press reportedabout the conduct of his wife at a party. Warren had graduated second in his class at Harvard Law School (1877) and, together with his friend Louis Brandeis (1856 – 1941) (who was to become a justice of the United states Supreme Court), who had been the first-place student in the same generation, decided to publish an article arguing for a right of privacy. (www.bigsiteofamazingfacts.com) Their article "A Right to Privacy" was published in 1890 in the Harvard Law Review. The article complained about the intrusion of the media into the private and domestic life and argued that gossip had become a trade, with the goal of generally informing people about other people`s intimate activities.
Gradually, the courts began to recognize invasion of privacy. Today almost all the states of the U.S. recognize all four sub-torts as common law: intrusion (any form of intrusion into someone`s private space), appropriation of publicity rights (use of a person`s name, likeness or identity without consent), public disclosure of private facts and false light (publication of false, highly offensive information about an individual).
We can look at this case study: Steve recently joined a church. Church doctrine required that members reveal any personal indiscretions to the leaders of the church. Steve disclosed some of his personal indiscretions to the leaders of the church. After his disclosures, these leaders informed Steve that they intended to tell other members of the church about his indiscretions because they thought the church leaders might help him overcome his problems. Steve was dismayed that this personal information might be disclosed. He told the church leaders about his intention to leave the church rather than have his problems disclosed. The church leaders informed him that their next step was to tell the members of the church, his neighbours, and his employer about his problems.
In this case we can look at the sub-tort public disclosure of private facts , from the tort invasion of privacy. Steve`s personal indiscretions are true and they were consented, but they were disclosed to church members for spiritual purposes and not in order to be discussed with the other members. In no way can that information be considered newsworthy to any part of the public, and its disclosure to other church members who might help Steve overcome his problems is an entirely separate issue that should have been discussed previously and also consented to. Without knowing the exact nature of the disclosures, one cannot tell for sure the outcome of a law suit, but given it was not murder or anything serious, Steve would normally win the law-suit.
Regarding the legal difference between disclosing facts to church elders, church members or members of the public, it is the following: Steve disclosed those facts to the church elders because he considered them his superiors, spiritually, and because he wanted to be a part of that church. Any of those elders that were also formally priests were forbidden from disclosing anything Steve told them. As for the church members, Steve did not wish to disclose anything to them, personally, so neither should the church elders. In this matter, though, Steve would only have a case against the elders who would disclose his past, and not against anybody present at the very moment of the disclosure, be they members of the church or the greater public.
As to the issue of a law-suit for libel, it is unlikely that Steve should win such a law-suit, as the facts to be disclosed are true, and it is generally required both that the claims be fake and that the publication is made to some other that the defamed person. If there had been a disclosure of fake information, then Steve would have had a libel case. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Invasion of privacy Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Invasion of privacy Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/journalism-communication/1579081-invasion-of-privacy
(Invasion of Privacy Essay Example | Topics and Well Written Essays - 500 Words)
Invasion of Privacy Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/journalism-communication/1579081-invasion-of-privacy.
“Invasion of Privacy Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/journalism-communication/1579081-invasion-of-privacy.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Invasion of privacy

Invasion of Privacy

...?Running Head: INVASION OF PRIVACY Invasion of privacy Lecturer: Introduction Every person has the right to privacy, which cannot and should not be compromised without the authority of the courts or in a situation whereby the right conflicts with other fundamental rights enshrined in the constitution (Alderman, 2001). The right to privacy in this context means that no individual or organization has the absolute right to divulge information relating to a person’s private life, which may portray such person in bad light. This is essential especially in protecting vulnerable persons such as celebrities and other public figures that are...
8 Pages(2000 words)Research Paper

Invasion of Privacy and the Potential Abuse

...?Invasion of Privacy and the Potential Abuse In the world of today, invasion of privacy has reached new levels. This is because it has affected the world of IT and computing like never before. This is one of the main reasons why people view the phenomenon of IT as a potentially disadvantageous one – one that can mar the very basis of success and harmony within the related ranks. Invasion of privacy has become a huge problem because it creates rifts among the people who are directly involved with the use of sensitive data and information, as they believe that their rights have been transgressed upon and such violations usually mean that...
3 Pages(750 words)Essay

Are Traffic Cameras an Invasion of Privacy

...? Traffic Cameras: An Invasion of Privacy of Introduction The question of whether traffic cameras is or, not an invasion of privacy is debatable and determined based on the prevailing state of affairs. Notably, insecurity in a particular place prompts the use of traffic cameras to act as surveillance in curbing criminal activities. Through using such cameras, it becomes easy to monitor the driver’s adherence to traffic rules, leading to enhanced safety. However, many drivers have raised concerns about the cameras, arguing that their use infringes on the human rights to privacy. In this regard, the essay presents an analysis on whether the traffic cameras...
4 Pages(1000 words)Essay

The Invasion of Privacy

...The Invasion of Privacy 1) What are some of the possible moral issues raised by the movie Inception? Assuming that it was possible to have access to another person’s dreams, would it be morally acceptable to do so. What would Marcuse who subscribed to the Freud’s theory of the unconscious have to say about the movie Inception?  From the very core concept of the film, it can be argued that everything is already morally wrong. Probing other people’s thoughts without consent is already a grave offense of one’s privacy on its own, much more in order to steal and redeem fatal secrets and to manipulate someone into doing an action. The invasion of privacy is...
4 Pages(1000 words)Essay

Is technology an invasion of privacy

...of science in equipping the authority with methods of spying is not expected to end with wiretapping. Brand eisprescient and haunting words evidently apply nowadays, as the mark between science fiction and science is incessantly redrawn. This paper will show how technology is an invasion of privacy. Contemporary technologies for amassing personal information that surpass the physical, freedom enhancing restrictions of the ancient means are relentlessly appearing. They prod more deeply, extensively and quietly than traditional techniques, transcending obstructions (whether distance, walls, darkness, time or skin) that historically sheltered personal data. The boundaries that have defined as well as given...
5 Pages(1250 words)Essay

Analysis of a Company Act 2006: Sections 170-177

12 Pages(3000 words)Essay

Ethical Framework: Computerized Invasion of Privacy

...Running Head: Ethical Framework: Computerized Invasion of Privacy Ethical Framework: Computerized Invasion of Privacy Goes Here Institutional Affiliation Goes Here Abstract This research will be used to substantiate the need for an ethical framework in regards to the specific area of computerized invasion of privacy and the legal ramifications of this. Through literary means, this paper sets out to implement and develop this idea for improved ethics in computer technology with regard to individual privacy. This is in relation to the need for individuals, using the net to surf or other computer programs online to still...
2 Pages(500 words)Essay

Are traffic cameras an invasion of privacy

...,Seventh Circuit January 5, 2009). BBB Inc. (2010). A review of Federal and State Privacy laws. Retrieved October 20, 2011, from Council of Better Business Bureaus, Inc: http://www.bbbonline.org/understandingprivacy/library/fed_stateprivlaws.pdf IIHS. (2011, september). Red Light Cameras. Retrieved October 20, 2011, from Insurance Institute of Highway Safety: http://www.iihs.org/research/qanda/rlr.html Johnson, A. (2011, June 24). Challenges to red light cameras span US. Retrieved October 20, 2011, from MSNBC Today News: http://today.msnbc.msn.com/id/43521646/ns/today-today_news/t/challenges-red-light-cameras-span-us/#.Tp_lzd5hKdE McDonald, A. M., & Cranor, L. F. (2005). How Technology Drives Vehicular...
2 Pages(500 words)Assignment

Are law enforcement cameras an invasion of privacy

...." The Telegraph. Telegraph Media Group, 10 July 2013. Web. 28 Feb. 2014. http://www.telegraph.co.uk/technology/10172298/One-surveillance-camera-for-every-11-people-in-Britain-says-CCTV-survey.html Maverick, Mellow. "Are Surveillance Cameras Good Security or an Invasion of Privacy?." Palm Desert Patch. N.p., 24 Apr. 2012. Web. 28 Feb. 2014. http://palmdesert.patch.com/groups/bk-holthauss-blog/p/bp--are-surveillance-cameras-good-security-or-an-inva3f633c6b44 Raab, Charles, and Benjamin Goold. Protecting Information Privacy. London: Equality and Human Rights Commission, 2011. Print. Richardson, Neil. The Globalization of Surveillance: The Origin of the Securitarian Order. Cambridge: Havard Law, 2013. Print.... Module Law Enforcement Cameras In...
3 Pages(750 words)Essay

Invasion of Privacy in the Business World

... Invasion of Privacy Introduction Privacy is an essential human right to all natural or artificial persons. Individuals, groups and corporations are, therefore, able to seclude themselves or their information. This enables them to freely interact and express themselves with ease. As a result, several countries have laid a lot of legislations to ensure that rights of privacy are observed. There are several forms of privacy these include personal privacy, informational privacy, organizational privacy and spiritual and intellectual privacy (United States Congress, 1692). Personal...
3 Pages(750 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Invasion of privacy for FREE!

Contact Us