Nobody downloaded yet

Privacy and Misuse of Private Information - Essay Example

Comments (0) Cite this document
Course Instructor Institution Name Date In regard to the case of Melinda, there is breach of human rights according to the privy law. This is due to the posting of photos to the public as well as the demeaning of Baking! Magazine by foregoing its initial plan of posting the photos which were decent, under the privy law, for there to be breach, the information should have the right quality of confidence where the question, which is underlying, is under disclosure to the public…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Privacy and Misuse of Private Information
Read TextPreview

Extract of sample "Privacy and Misuse of Private Information"

Download file to see previous pages Thus, basing to the case of Campbell v mirror group newspapers, Melinda has the bases for suing splat! Magazine due to the publication of her photos to the public without her consent, my advice would be in relation to the convention of human rights of Europe. According to the convention, there should be a ruling in favour of Melinda considering the tort in the English tort action relating to breaching of confidence as seen in this case. I would advise her to sue the company considering the provisions in the ECHR which upholds the rights that individuals have in relation to their family and private lives. Thus, the court should make a ruling in favour of Melinda because there is breach of privacy by the publication of the photos to the public as seen in the case of Douglas v. Hello, where Hello Company did publish wedding photos of Douglas without his consent leading to breach of human rights (Franklin, 2010). Relating to Baking! Magazine, the magazine had the right to publish Melinda’s photos. Thus by the publication of the photos by splat! Magazine, there was misuse of private information. ...
I would advise Baking! Magazine to take legal action against Splat! Magazine because in case, the claimant has an expectation which is reasonable to privacy regarding the information under disclosure, Melinda expects the Baking! Magazine to publish the photos that are showing her better self but Splat! Magazine goes ahead and publishes the photos that show the unpleasant side of Melinda; thus the initial magazine considers the person’s right to privy more than the second magazine’s freedom of expression. Further, the court may rule that, Splat! Magazine is not liable because the photographs were under publication of peripherals that require publication showing the bright side of Melinda. Thus, the magazine did the publication with appreciation to the well being of Melinda’s image. Hence, I would advise the initial magazine to go ahead and sue for aforementioned confidence breach, which is under the clause of human rights rules and regulations relating to privacy. This is as seen in the case of the Prince of Wales v. Associated newspaper, where the newspaper took the diary of the prince and made a publication which was embarrassing to the Prince. In the case, it is clear that there is breach in the right of privacy of the Prince (Daniel, 2008). Under the law, for the case to be valid, there should be impacting of information in circumstances that impose the obligation of confidence. Where Melinda can sue for giving out of private information by Splat! Magazine. The information which the magazine gives out includes photos that Melinda does not know of their existence, this arises to infringement of privacy where the magazine was stalking Melinda even in the supermarket so as to get her photos. They also take Melinda’s photographs that are demeaning in that ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Privacy and Misuse of Private Information Essay - 1”, n.d.)
Privacy and Misuse of Private Information Essay - 1. Retrieved from
(Privacy and Misuse of Private Information Essay - 1)
Privacy and Misuse of Private Information Essay - 1.
“Privacy and Misuse of Private Information Essay - 1”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Privacy and Misuse of Private Information

The Tort Misuse of Private Information

...surveillance operations against its citizens. 4 In Kaye v Robertson which involves a well known actor who had undergone extensive surgery and was in hospital when he was photographed and allegedly interviewed by a tabloid newspaper. His rights could not be protected by an action for breach of privacy. The Court of appeal noted that the case “highlighted, yet again, the failure of both the common law and of statute to protect in an effective way the personal privacy of individual citizens."5 The lack of right to privacy in the UK prior to the enactment of the Human Rights Act 1998 (HRA) had been rectified with the introduction of HRA and the general right under Article 8 was...
18 Pages(4500 words)Essay

Privacy and Misuse of Private Information

...on breach of confidence and protection of personal information. Privacy and misuse of Private Information According to Crone et al (2002, p 93), the enactment of the law on breach of confidence and protection of personal information resulted from the need to protect personal secrets. In the recent years, people have used the law to prevent the publication of confidential information, especially in the mass media. In Clive’s case, the Daily Scandal wants to publish information about him. An action for breach of confidence can be the most appropriate to prevent against publication of personal...
4 Pages(1000 words)Essay

Information privacy

...Justin Ellsworth's emails? Is it alright to violate the trust that he gave Yahoo mail simply because he is now dead and will never know what they did? This paper hopes to delve deeper into the privacy concerns surrounding the case and hopefully answer the question as to whether it was right for Yahoo to have eventually turned over the emails of Ellsworth to his parents. To begin with, in order to understand why Yahoo refused to turn over the access codes of Justin to his parents, we first have to understand the privacy policy of Yahoo! Mail when it comes to who has access to the contents of an email account. Their privacy policy clearly states that: “... the company's terms of service...
3 Pages(750 words)Coursework

Internet Privacy --private individual

...? Internet Security for On-line Banking (An Essay Plan) ID Number Group Presented of the University School Location Estimated Word Count: 982 Due on: August 15, 2013 Introduction The Internet has become so pervasive today in modern life, one cannot think of how to live each day without at least accessing the Internet once a day, to check on e-mails, read news, get entertainment, research information, buy products and services, inquire on something, or get updated on the latest developments in the lives of friends, relatives, and acquaintances. The rate of Internet penetration per country has also increased due to lower cost of broadband connections, the number of Internet-enabled mobile devices such as cellular phones,...
3 Pages(750 words)Essay

Protection of Private Information

...could exchange private information in the private and public segment (Data Protection and Privacy. n.d). The European Union authorities have signed a pact with United States that enables officials in the United States to have a wide access to private information like credit card transactions, travel histories and internet surfing nature of people in Britain. The United States law enforcement organisations and security agencies will have the liberty to access private information of European Union citizens. The pact will undermine the privacy of individuals and American will have the...
3 Pages(750 words)Essay

Information Security and Privacy

...Information Security and Privacy/Legal Concerns Introduction Networks are built in order to allow users to share, however it also allows other users the possibility to obtain information and other data that are not meant for them. This is becoming a bigger problem as organizations connect their private networks onto the internet. Despite the security problems the internet posses, businesses need to be connected to be able to compete as the use f the internet offer many advantages such as internet mail, file transfers and homepages for business. As organizations need to be connected to the internet, protection and security is required to prevent unauthorised users from...
6 Pages(1500 words)Essay

Customer Information Privacy

... and the customer should not exhibit any displeasure in this regard. Once the company performs this unethical practice, its reputation and credibility as a trusted company will be endangered and the company will lose confidence among customers and the public and eventually result in loss of business and profit. References Customer Information and Privacy (n.d.), ABA Section of Business Law. Safe, Retrieved 20 June 2009, from Disclosure of information (n. d.), DPA Privacy policy, DELL, Retrieved 20 June 2009, from Sandoval, Greg Failed dot-coms may be selling your private information, CNET NEWS, 2000, Retrieved 20 June 2009, from<>... Information...
2 Pages(500 words)Essay

Information Privacy and Electronic Privacy

...not limited to information stored in computer systems alone but in other electronic devices as well such as fax machines, mobile phones, telephones and even in emails. It pertains to any information that is transmitted or stored electronically in a digital manner. This paper is going to focus on differentiating the two kinds of privacy mentioned above. Even though they seem interrelated, they have their own differences including differences in legislative acts governing them as well as their sources and the potential privacy breaches as well as what measures can be taken to ensure the information remains private unless it is absolutely...
3 Pages(750 words)Essay

Privacy of Information

...Privacy of Information Question In considering the issue of privacy of information as pertains to online transactions, there are a number of key issues that need to be considered. These issues include the fact that some websites can be able to automatically collect information every time that an individual visits them. Other websites either plant cookies on the user’s system or ask for the user to provide personal information such as name, phone number and email address before a user can be allowed to view the website’s content or even become a member. A number of serious privacy of information security...
1 Pages(250 words)Assignment

Private and corporate information

...Private and Corporate Information al Affiliation) Information systems face the exposure to a number of threats that can cause serious damages leading to huge financial losses. Information security damages can lead to significant information system destruction. Various threats could attack an information system, including virus threats that alter the way a computer operates without the consent of the user Straub. In addition, there is the spyware threat, a program that monitors an individual’s online activity or installs programs without their knowledge, to access the user’s personal information (Straub, 2008). Moreover,...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Privacy and Misuse of Private Information for FREE!

Contact Us