Privacy and Misuse of Private Information - Essay Example

Comments (0) Cite this document
Abstract Personal information consists of information about a person, which should not be released to the public. People do not want their private life to be intruded and people notified about their secrets. Laws on the protection of personal information aim at regulating the gathering and eventual processing of personal information…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
Privacy and Misuse of Private Information
Read TextPreview

Extract of sample "Privacy and Misuse of Private Information"

Download file to see previous pages More specifically, the essay will address whether Clive can prevent publication of information regarding him, based on the law on breach of confidence and protection of personal information. Privacy and misuse of Private Information According to Crone et al (2002, p 93), the enactment of the law on breach of confidence and protection of personal information resulted from the need to protect personal secrets. In the recent years, people have used the law to prevent the publication of confidential information, especially in the mass media. In Clive’s case, the Daily Scandal wants to publish information about him. An action for breach of confidence can be the most appropriate to prevent against publication of personal information. Clive can easily obtain an injunction restraining the publication of information regarding cheating on his wife and attending the notorious club. He should take legal action, in which the court will apply an action called ‘blanket ban’ that prevents the magazine from publishing the photos. Under the law of breach of confidence, the Clive can prove several facts to prevent the daily scandal from publishing the information. One of these facts can be showing that the information contains adequate quality of confidence. The daily scandal has threatened to publish secret information about Clive, without his authority. ...
This gives Clive the opportunity to take an action against them on the basis of ‘imputed confidential relationship.’ The court will grant the action of injunction since the differences between Clive and wife have not featured in the public domain (Aplin 2007, p 145). Tanya (2007, p 334) asserts that a person has the right to prevent the publication of this information since it does not affect the public in any way. Under this law, the media should not publish information about a person if the information does not touch on the public. Matters regarding marital unfaithfulness can be considered to be private. As such, they should not be made public; the information only refers to Clive and his wife. The media do not have an obligation to make public Clive’s personal information. Aplin observes that the law states that secrecy should not be exposed; instead, Clive and wife should be allowed to settle their differences using the due court process. Publicizing the wrongs of Clive will only worsen the relationship with his wife. As such, he can be in a position to deter the daily scandal from publicizing his photos and other information about him (Aplin 2007, p 150). He has the right to prevent the newspaper from publishing information regarding him since the information cannot be considered to be of public interest. Therefore, the ‘daily scandal’ cannot defend itself on grounds of ‘iniquity.’ The court does not intervene in the publication of public information concerning an iniquity (Stanley, 2009). In this case, the information concerning Clive attending the club and cheating on his wife cannot be regarded to be of public interest. Based on this, the daily scandal does not have an obligation to expose Clive’s conduct. Thus, they should not publicize the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Privacy and Misuse of Private Information Essay”, n.d.)
Retrieved from
(Privacy and Misuse of Private Information Essay)
“Privacy and Misuse of Private Information Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Privacy and Misuse of Private Information

The Tort Misuse of Private Information

...surveillance operations against its citizens. 4 In Kaye v Robertson which involves a well known actor who had undergone extensive surgery and was in hospital when he was photographed and allegedly interviewed by a tabloid newspaper. His rights could not be protected by an action for breach of privacy. The Court of appeal noted that the case “highlighted, yet again, the failure of both the common law and of statute to protect in an effective way the personal privacy of individual citizens."5 The lack of right to privacy in the UK prior to the enactment of the Human Rights Act 1998 (HRA) had been rectified with the introduction of HRA and the general right under Article 8 was...
18 Pages(4500 words)Essay

Privacy and Misuse of Private Information

...which the magazine gives out includes photos that Melinda does not know of their existence, this arises to infringement of privacy where the magazine was stalking Melinda even in the supermarket so as to get her photos. They also take Melinda’s photographs that are demeaning in that the photographs show Melinda eating and when she is sweaty. The publishing of these photos demeans the figure of Melinda to the public because Melinda is a public figure. Splat magazine uses the photos so as to attract the audience of people who would read the magazine due to the presence of the images of Melinda. This arise to misuse of private information for personal gains, which is...
6 Pages(1500 words)Essay

Information privacy

...Justin Ellsworth's emails? Is it alright to violate the trust that he gave Yahoo mail simply because he is now dead and will never know what they did? This paper hopes to delve deeper into the privacy concerns surrounding the case and hopefully answer the question as to whether it was right for Yahoo to have eventually turned over the emails of Ellsworth to his parents. To begin with, in order to understand why Yahoo refused to turn over the access codes of Justin to his parents, we first have to understand the privacy policy of Yahoo! Mail when it comes to who has access to the contents of an email account. Their privacy policy clearly states that: “... the company's terms of service...
3 Pages(750 words)Coursework

Internet Privacy --private individual

...? Internet Security for On-line Banking (An Essay Plan) ID Number Group Presented of the University School Location Estimated Word Count: 982 Due on: August 15, 2013 Introduction The Internet has become so pervasive today in modern life, one cannot think of how to live each day without at least accessing the Internet once a day, to check on e-mails, read news, get entertainment, research information, buy products and services, inquire on something, or get updated on the latest developments in the lives of friends, relatives, and acquaintances. The rate of Internet penetration per country has also increased due to lower cost of broadband connections, the number of Internet-enabled mobile devices such as cellular phones,...
3 Pages(750 words)Essay

Protection of Private Information

...could exchange private information in the private and public segment (Data Protection and Privacy. n.d). The European Union authorities have signed a pact with United States that enables officials in the United States to have a wide access to private information like credit card transactions, travel histories and internet surfing nature of people in Britain. The United States law enforcement organisations and security agencies will have the liberty to access private information of European Union citizens. The pact will undermine the privacy of individuals and American will have the...
3 Pages(750 words)Essay

Information Security and Privacy

...Information Security and Privacy/Legal Concerns Introduction Networks are built in order to allow users to share, however it also allows other users the possibility to obtain information and other data that are not meant for them. This is becoming a bigger problem as organizations connect their private networks onto the internet. Despite the security problems the internet posses, businesses need to be connected to be able to compete as the use f the internet offer many advantages such as internet mail, file transfers and homepages for business. As organizations need to be connected to the internet, protection and security is required to prevent unauthorised users from...
6 Pages(1500 words)Essay

Customer Information Privacy

... and the customer should not exhibit any displeasure in this regard. Once the company performs this unethical practice, its reputation and credibility as a trusted company will be endangered and the company will lose confidence among customers and the public and eventually result in loss of business and profit. References Customer Information and Privacy (n.d.), ABA Section of Business Law. Safe, Retrieved 20 June 2009, from Disclosure of information (n. d.), DPA Privacy policy, DELL, Retrieved 20 June 2009, from Sandoval, Greg Failed dot-coms may be selling your private information, CNET NEWS, 2000, Retrieved 20 June 2009, from<>... Information...
2 Pages(500 words)Essay

Information Privacy and Electronic Privacy

...not limited to information stored in computer systems alone but in other electronic devices as well such as fax machines, mobile phones, telephones and even in emails. It pertains to any information that is transmitted or stored electronically in a digital manner. This paper is going to focus on differentiating the two kinds of privacy mentioned above. Even though they seem interrelated, they have their own differences including differences in legislative acts governing them as well as their sources and the potential privacy breaches as well as what measures can be taken to ensure the information remains private unless it is absolutely...
3 Pages(750 words)Essay

Privacy of Information

...Privacy of Information Question In considering the issue of privacy of information as pertains to online transactions, there are a number of key issues that need to be considered. These issues include the fact that some websites can be able to automatically collect information every time that an individual visits them. Other websites either plant cookies on the user’s system or ask for the user to provide personal information such as name, phone number and email address before a user can be allowed to view the website’s content or even become a member. A number of serious privacy of information security...
1 Pages(250 words)Assignment

Private and corporate information

...Private and Corporate Information al Affiliation) Information systems face the exposure to a number of threats that can cause serious damages leading to huge financial losses. Information security damages can lead to significant information system destruction. Various threats could attack an information system, including virus threats that alter the way a computer operates without the consent of the user Straub. In addition, there is the spyware threat, a program that monitors an individual’s online activity or installs programs without their knowledge, to access the user’s personal information (Straub, 2008). Moreover,...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Privacy and Misuse of Private Information for FREE!

Contact Us