StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Privacy and Misuse of Private Information - Essay Example

Cite this document
Summary
Abstract Personal information consists of information about a person, which should not be released to the public. People do not want their private life to be intruded and people notified about their secrets. Laws on the protection of personal information aim at regulating the gathering and eventual processing of personal information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
Privacy and Misuse of Private Information
Read Text Preview

Extract of sample "Privacy and Misuse of Private Information"

Download file to see previous pages

More specifically, the essay will address whether Clive can prevent publication of information regarding him, based on the law on breach of confidence and protection of personal information. Privacy and misuse of Private Information According to Crone et al (2002, p 93), the enactment of the law on breach of confidence and protection of personal information resulted from the need to protect personal secrets. In the recent years, people have used the law to prevent the publication of confidential information, especially in the mass media.

In Clive’s case, the Daily Scandal wants to publish information about him. An action for breach of confidence can be the most appropriate to prevent against publication of personal information. Clive can easily obtain an injunction restraining the publication of information regarding cheating on his wife and attending the notorious club. He should take legal action, in which the court will apply an action called ‘blanket ban’ that prevents the magazine from publishing the photos. Under the law of breach of confidence, the Clive can prove several facts to prevent the daily scandal from publishing the information.

One of these facts can be showing that the information contains adequate quality of confidence. The daily scandal has threatened to publish secret information about Clive, without his authority. . This gives Clive the opportunity to take an action against them on the basis of ‘imputed confidential relationship.’ The court will grant the action of injunction since the differences between Clive and wife have not featured in the public domain (Aplin 2007, p 145). Tanya (2007, p 334) asserts that a person has the right to prevent the publication of this information since it does not affect the public in any way.

Under this law, the media should not publish information about a person if the information does not touch on the public. Matters regarding marital unfaithfulness can be considered to be private. As such, they should not be made public; the information only refers to Clive and his wife. The media do not have an obligation to make public Clive’s personal information. Aplin observes that the law states that secrecy should not be exposed; instead, Clive and wife should be allowed to settle their differences using the due court process.

Publicizing the wrongs of Clive will only worsen the relationship with his wife. As such, he can be in a position to deter the daily scandal from publicizing his photos and other information about him (Aplin 2007, p 150). He has the right to prevent the newspaper from publishing information regarding him since the information cannot be considered to be of public interest. Therefore, the ‘daily scandal’ cannot defend itself on grounds of ‘iniquity.’ The court does not intervene in the publication of public information concerning an iniquity (Stanley, 2009).

In this case, the information concerning Clive attending the club and cheating on his wife cannot be regarded to be of public interest. Based on this, the daily scandal does not have an obligation to expose Clive’s conduct. Thus, they should not publicize the

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy and Misuse of Private Information Essay”, n.d.)
Retrieved from https://studentshare.org/law/1442224-privacy-and-misuse-of-private-information-see
(Privacy and Misuse of Private Information Essay)
https://studentshare.org/law/1442224-privacy-and-misuse-of-private-information-see.
“Privacy and Misuse of Private Information Essay”, n.d. https://studentshare.org/law/1442224-privacy-and-misuse-of-private-information-see.
  • Cited: 0 times

CHECK THESE SAMPLES OF Privacy and Misuse of Private Information

The Tort Misuse of Private Information

This essay analyzes that breach of confidence is a civil wrong, concerning the unauthorized release of confidential information and is a type of tort.... The English Courts have established publishing unauthorized photographs or information constitutes a breach of confidence.... “It may be hardly doubted that the lack of a clear legal remedy in respect of the non-consensual disclosure of personal information is one of the most serious lacunae in English Law” 3 Radical developments in breach of confidence have been ushered-in since The Human Rights Act 1998, and privacy, confidentiality and information sharing are now covered comprehensively under this Act....
18 Pages (4500 words) Essay

Role of the Nurse in Substance Misuse

Role of the Nurse in Substance misuse Introduction Nurses are preferably assigned to work with patients who have problems with substance misuse because they are ones who initially deal with patients in primary care (Kim & Kollak 2006).... Patients with issues of substance misuse frequently show varied and complicated health requirements and addressing these obliges the nurse to use professional and personal skills to build productive solutions to complex health issues....
16 Pages (4000 words) Literature review

Network Societies and the Implications for Their Privacies

Often user inexperience and a general unawareness coupled with inappropriate SNS website designing, unintentionally help in the misuse of private information by various commercial organisations.... Boyd and Ellison, defined SNSs as services provided that are internet-based and allow its users to: Create user profiles which can be kept partially public or completely public, within the provide domain of the site; Create a ‘friends' list and a group where they can upload and share private information; Have an access to the friends' profiles, and to these friends' ‘friend list,' where the user can view all the connections made by their friends and often by ‘other users' (who are not direct friends, but may have common friends or common interests) within the domain of the same SNS (Boyd, and Ellison, 2007, 210-211)....
6 Pages (1500 words) Essay

Privacy Laws related to Information Technology use

Privacy Laws in IT use Instructor Institution Date Privacy Laws in IT use All individuals are entitled to privacy of private information and protection from unauthorized access and use of private data (Canoni, 2004).... that organizations and individuals are protected from unauthorized use of private information by internal or external intruders to information systems (Miller and Tucker, 2007).... However, organizations have laid security policies which are geared at promoting the enforcement of legal framework on the privacy of private information (Bernstein, 2007)....
3 Pages (750 words) Research Paper

Copyright and the 1st Amendment

Democracy will be cut by such actions of misuse of private information The democratic right to innovate too is tied up by such practice, as the case of ElcomSoft proves.... In cases where the use of the MATRIX program is not kept in check then, the misuse of the privatized information is bound to happen (McLeod 247).... The main aim of the following literature review "Copyright and the 1st Amendment" is to concern the public issue of gathering and protection of personal information among citizens for homeland security purposes, primary with reference to McLeod's works....
10 Pages (2500 words) Literature review

Freedom of Information and Privacy

The private organization in this case will be more alert as it will be aware that now it is dealing directly with the government other than any other private information collecting company (Workplace fraud - how private investigation companies can help, 2012).... Public funding should be declared solemnly for the betterment of the public using it for any other purpose such as paying salaries to the employees, or investing in any other business venture can be counted as a crime and the government has every right to charge the organization; therefore it is better that the organization must make sure that the public funding is not being used for any purpose other than public welfare (misuse of Public Funds, 2013)....
2 Pages (500 words) Essay

E-Mail, Internet Use, and Privacy Policies

Even though the internet can play the vital role in helping human resource management in performing various functions like recruiting, training and knowledge management, it also has negative sides of employee misuse of email and internet at workplaces When employees are at the workplace, the main emphasis is normally given on improving the overall productivity and employee performance.... The main objective of internet policy is to increase employee productivity and reduce legal liabilities that may happen due to the employee misuse of the internet....
4 Pages (1000 words) Assignment

Cloud Computing and Threats to Corporate Privacy

This study will specifically address a framework for ensuring the privacy of private information.... This framework will require proper storage of private information, a mechanism to utilize cloud computing, and better corporate strategies to protect information.... The cloud computing paradigm has changed how private information is used, but end-users' lack of prior knowledge of and experience in cloud computing techniques has increases risks which could be reduced through the services of experts....
18 Pages (4500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us