Skip to main content

The Need for Privacy Torts in an Era of Ubiquitous Disclosure and Surveillance

  • Chapter
  • First Online:
Core Concepts and Contemporary Issues in Privacy

Part of the book series: AMINTAPHIL: The Philosophical Foundations of Law and Justice ((AMIN,volume 8))

  • 1003 Accesses

Abstract

The distinction between private vis à vis public is central to human society. Not surprisingly, the application of such a binary framework to the complexity of life presents conceptual challenges concerning the private sphere and the right to privacy. From a legal perspective, these challenges are complicated by the distinction between public law involving the state and private law governing areas like property, contract, and tort. Partly as a result of these problems, there are fundamental disagreements concerning the nature and value of privacy. These disagreements complicate the development and application of a “right to privacy” in the context of rapidly evolving digital technology.

This paper addresses these problems in six parts. Section 1 addresses issues concerning the nature and value of privacy and argues: (1) human behavioral patterns indicate that maintaining the privacy of certain types of information is important, (2) the protection of such private information is an essential component of the liberal concept of autonomous personhood, and (3) balancing conflicts between privacy and other values should be done within a fair, reliable process that is able to address the contextual complexity involved. Section 2 discusses the impact of digital technology for surveillance and disclosure of private information. Section 3 addresses legal protections of privacy and argues that, because of the threat to autonomy from improper use of private social actions like shunning, censure, and ridicule, a robust scheme of privacy torts is necessary to provide adequate protection of a private sphere. Section 4 discusses the role of tort law in protecting privacy and develops a conceptual framework for the application of doctrine. Section 5 addresses several doctrinal issues raised by the new digital technologies. Section 6 concludes by arguing that courts have an important responsibility in the shaping of norms about privacy in the context of ubiquitous surveillance and disclosure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See infra note 2 and accompanying text.

  2. 2.

    See, e.g., Ind. Code §§ 35-45-4-1(d) (defining “nudity” to include bare female breasts), 35-45-4-1.5 (prohibiting “public nudity”); McGuire v. State (489 So. 2d 729, Fla. 1986), (upholding conviction for topless exposure on public beach); O’Neill (2008), (noting that “topless sunbathing is . . . not technically legal” and that authorities “basically look the other way”).

  3. 3.

    Havel refers to a retreat to “trenches of deep privacy.” See also George Orwell’s Nineteen Eighty-Four, where Winston seeks space “outside the range of the telescreen” (1949, 7).

  4. 4.

    For examples of others with this view, see Benn (1984); Bloustein (1964); Crocker (2014); Reiman (1984).

  5. 5.

    See, for example, National Ass’n for the Advancement of Colored People v. Alabama (357 U.S. 449, 1958). The case was significant because it barred the disclosure of personal data about members because of the inhibiting effect that such disclosure had on freedom of association.

  6. 6.

    See text accompanying supra note 5.

  7. 7.

    See, e.g., United States v. Graham (824 F.3d 421, 4th Cir., 2016), (holding that government did not violate Fourth Amendment by obtaining, without warrant, cell site location data from cell phone provider).

  8. 8.

    See infra note 37 and accompanying text.

  9. 9.

    See, e.g., Privacy Act of 1974, 5 U.S.C. §§ 552a et seq.; see generally Westin (1967); Westin (1972); Fox (2013).

  10. 10.

    E.g., Video Privacy Protection Act of 1988, 18 U.S.C. § 2710 (prohibiting “disclosure of personally identifiable records of rental, sale or delivery of prerecorded video cassette tapes or similar audio-visual materials”); Federal Educational Rights and Privacy Act (FERPA), 20 U.S.C. § 1232(g). For a discussion of libraries’ duties concerning users’ privacy, see Sect. 5.1.

  11. 11.

    See Sect. 4.2 for a discussion of an Australian case imposing equitable duty of confidentiality of nude and sexually explicit photographs and videos voluntarily sent to person who published them.

  12. 12.

    See, e.g., S.C. Code Ann. § 16-17-470(A) (It is unlawful for a person to be an eavesdropper or a peeping tom on or about the premises of another or to go upon the premises of another for the purpose of becoming an eavesdropper or a peeping tom. The term “peeping tom,” as used in this section, is defined as a person who peeps through windows, doors, or other like places, on or about the premises of another, for the purpose of spying upon or invading the privacy of the persons spied upon and any other conduct of a similar nature, that tends to invade the privacy of others. The term “peeping tom” also includes any person who employs the use of video or audio equipment for the purposes set forth in this section.” (emphasis added)).

  13. 13.

    See, e.g., S.C. Code Ann. §§ 16-11-600, -610, -625, -630, -640.

  14. 14.

    See, e.g., Blevins v. Sorrell (589 N.E.2d 438, Ohio Ct. App. 1990), (finding that surveillance constituted nuisance but not intrusion).

  15. 15.

    See, e.g., Sherman v. Field Clinic (392 N.E.2d 154, Ill. App. Ct. 1979), (intentional infliction of emotional distress claim and statutory claim recognized for harassing phone calls and other abusive conduct that interferes with seclusion). The “privacy tort” of intrusion also protects the right to be free from harassment in a private sphere. See American Law Institute (1977, § 652B illus. 5, 8). The information aspect of section 652B is addressed in Sect. 3.2.

  16. 16.

    The Restatements provide a neutral authoritative summary of basic doctrinal areas in American law. They are prepared by the American Law Institute (ALI). The website for the ALI describes its work as follows:

    The American Law Institute is the leading independent organization in the United States producing scholarly work to clarify, modernize, and otherwise improve the law. The Institute (made up of 4000 lawyers, judges, and law professors of the highest qualifications) drafts, discusses, revises, and publishes Restatements of the Law, model statutes, and principles of law that are enormously influential in the courts and legislatures, as well as in legal scholarship and education.

  17. 17.

    See, e.g., Zacchini v. Scripps-Howard Broad. Co. (433 U.S. 562, 573, 1977), (referring to claim as protecting a “proprietary interest”); Winter v. DC Comics (69 P.3d 473, Cal. 2003), (protection of right to images of “The Three Stooges”); (ALI 1977, § 652A cmt. 6).

  18. 18.

    See, e.g., Elm Med. Lab., Inc. v. RKO Gen., Inc. (532 N.E.2d 675, 681, Mass. 1989); Lake v. Wal-Mart Stores (582 N.W.2d 231, Minn., 1998); Renwick v. News & Observer Publ’g Co. (312 S.E.2d 405, 411, N.C. 1984); Brown v. Pearson (483 S.E.2d 477, 484, S.C. Ct. App. 1997).

  19. 19.

    See, e.g., Time, Inc. v. Hill (385 U.S. 374, 1967), (claim for “false light” brought pursuant to New York statute designed to protect use of “the name, portrait, or picture of any living person” without consent); (ALI 1977, § 652E illus. 3, 4, 5).

  20. 20.

    For examples of others stressing the importance of Mill’s concern for social restrictions on liberty, see Schoeman (1992), pp. 24–36 and McAdams (1997), pp. 417–432.

  21. 21.

    Legitimacy of public concern is addressed in Sect. 5.3 above.

  22. 22.

    See Katz v. United States (389 U.S. 347, 360, 1967, Harlan, J., concurring), (referring to whether “a person has a constitutionally protected reasonable expectation of privacy”). In California v. Ciraolo (476 U.S. 207, 210, 1986), Justice Harlan notes: “Katz posits a two-part inquiry: First, has the individual manifested a subjective expectation of privacy in the object of the challenged search? Second, is society willing to recognize that expectation as reasonable?”

  23. 23.

    For an example of a court using search and seizure cases to determine that a plaintiff did not have an intrusion claim, see Danai v. Canal Square Assocs. (862 A.2d 395, D.C. Ct. App. 2004).

  24. 24.

    See, e.g., Hernandez v. Hillsides, Inc. (211 P.3d 1063, 1074-1082, Cal. 2009); Polay v. McMahon (10 N.E.3d 1122, 1126-1128, Mass. 2014).

  25. 25.

    Compare, e.g., Pinkerton Nat’l Detective Agency v. Stevens (132 S.E.2d 119, Ga. App. Ct. 1963), (Claim stated a cause of action for intrusion.), with, e.g., I.C.U. Investigations v. Jones (780 So. 2d 685, Ala. 2000), (Plaintiff did not have a claim because he must have expected reasonable inquiry and investigation.); Saldana v. Kelsey-Hayes Co. (443 N.W.2d 382, Mich. Ct. App. 1989), (same). For a more general discussion of the role of investigation, see Elder (2002, § 2.22).

  26. 26.

    See Iorio v. Check City P’ship, LLC (2015 WL 3489309, Nev. May 29, 2015), (unpublished); (ALI 1979, § 892A). For discussion of limits on consent where criminal law prohibits voluntary exposure of private matters, see (Whitman 2004) and footnote 2.

  27. 27.

    See, e.g., Dietemann v. Time, Inc. (449 F.2d 245, 9th Cir. 1971); ALI (1979, § 892B), (addressing “substantial mistakes” concerning consent).

  28. 28.

    “Consent to enter may be limited by time or space and may be terminated by the land possessor.”

  29. 29.

    See, e.g., Desnick v. Am. Broad. Cos., Inc. (44 F.3d 1345, 7th Cir. 1995); ALI (1979, § 892B).

  30. 30.

    Compare, e.g., United States v. Houston (813 F.3d 282, 6th Cir. 2016), (warrantless continuous video from telephone pole near defendant’s home not a search), with Egan v. Schmock (93 F. Supp. 2d 1090, N.D. Cal. 2000), (claim for stalking and filming plaintiffs in their home), and Polay v. McMahon (10 N.E.3d 1122, Mass. 2014), (claim for continuous video surveillance of plaintiff’s home).

  31. 31.

    This case involved delivery of private mail in an office setting.

  32. 32.

    See Polay where the plaintiff had stated a claim for privacy but not intentional emotional distress because of lack of showing of severe emotional distress.

  33. 33.

    See Sanders v. Am. Broad. Co. (978 P.2d 67, Cal. 1999), (allowing claim for video and audio recording of conversation that could have been overheard). Similar distinctions are made in assessing scope of consent. See supra note 27 and accompanying text.

  34. 34.

    The survey indicated general acceptance of video recording in public places because of utility in law enforcement but “discomfort/unease with audio recording.”

  35. 35.

    See, e.g., Pennington v. Justiss-Mears Oil Co. (123 So. 2d 625, 632, La. Ct. App. 1960, amended on other issue, 134 So. 2d 53, La. 1961), (defining custom as “fairly well defined and regular usage”).

  36. 36.

    “In determining whether conduct is negligent, the customs of the community, or of others under like circumstances, are factors to be taken into account, but are not controlling where a reasonable man would not follow them” (ALI 1965, § 295A).

  37. 37.

    See, e.g., Matherson v. Marchello (473 N.Y.S.2d 998, App. Div. 1984), (radio); Wilhoit v. WCSC Inc. (358 S.E.2d 397, S.C. Ct. App. 1987), (television).

  38. 38.

    See supra notes 10–11 and accompanying text.

  39. 39.

    See Tunkl v. Regents of the Univ. of Cal. (383 P.2d 441, 445, Cal. 1963), (allegedly negligent hospital care); Hanks v. Powder Ridge Rest. Corp. (885 A.2d 734, Conn. 2005), (negligence in design and operation of snow tube at ski resort). One state has held all such agreements to be unenforceable: Hiett v. Lake Barcroft Cmty. Ass’n, Inc. (418 S.E.2d 894, Va. 1992). There is considerable debate about the role of contractual doctrine to address the use of websites (Symposium 2016).

  40. 40.

    See Watchtower Bible & Tract Soc’y of N.Y., Inc. v. Vill. of Stratton (536 U.S. 150, 2002), (First Amendment right to engage in advocacy anonymously).

  41. 41.

    See, e.g., Kemp v. Block (607 F. Supp. 1262, D. Nev. 1985); McLain v. Boise Cascade Corp. (533 P.2d 343, Or. 1975).

  42. 42.

    See supra notes 34–35 and accompanying text.

  43. 43.

    See, e.g., United States v. Jones (565 U.S. 400, 2012), (use of global-positioning-system tracking device to monitor vehicle’s movements as a search).

  44. 44.

    See supra notes 34–35 and accompanying text. United States v. Giraudo (2016 WL 4073243, N.D. Cal. Aug. 1, 2016) held that a search was involved where the government used a hidden system with a video camera and microphones in a surveillance program that collected more than 200 h of audio recording over 9 months, capturing the conversations of anyone who entered or exited the entrance of the courthouse, regardless of whether that person was a defendant, a county employee, an attorney, a judge, or a member of the public. Another federal district judge held that a search was not involved where a similar program was used (United States v. Marr, 2016 WL 3951657, N.D. Cal. July 22, 2016; United States v. Florida, 2016 WL 3999593, N.D. Cal. July 26, 2016).

  45. 45.

    The other claims were intrusion, appropriation (right of publicity), intentional infliction of emotional distress, and negligent infliction of emotional distress.

  46. 46.

    See, e.g., Bollea (913 F. Supp. 2d at 1325), (denial of motion for preliminary injunction requiring removal of video that had been posted on internet, partly because of likelihood of lack of success on merits); Kornhaber (2016); Savan (2016).

  47. 47.

    See, e.g., Haynes v. Alfred A. Knopf, Inc. (8 F.3d 1222, 7th Cir. 1993), (holding that there was a legitimate public interest where private matters of a private person were used as an individual case history to illustrate an important historical event).

  48. 48.

    See, e.g., N.C. Gen. Stat. § 14-190.5A (prohibiting unconsented publication of photographs or videos of persons in a state of nudity or engaging in sex if, among other things, the intent is to harass intimidate or demean).

References

  • Adler M (2000) Expressive theories of law: a skeptical overview. Univ Pa Law Rev 148(5):1363–1501

    Article  Google Scholar 

  • Allen A (2011) Unpopular privacy: what must we hide? Oxford University Press, New York

    Book  Google Scholar 

  • American Law Institute (ALI) (1939) Restatement (first) of torts. American Law Institute Publishers, St. Paul

    Google Scholar 

  • American Law Institute (ALI) (1965) Restatement (second) of torts. American Law Institute Publishers, St. Paul

    Google Scholar 

  • American Law Institute (ALI) (1977) Restatement (second) of torts. American Law Institute Publishers, St. Paul

    Google Scholar 

  • American Law Institute (ALI) (1979) Restatement (second) of torts. American Law Institute Publishers, St. Paul

    Google Scholar 

  • American Law Institute (ALI) (2012) Restatement (third) of torts, vol 2. American Law Institute Publishers, St. Paul

    Google Scholar 

  • American Library Association. An interpretation of the library bill of rights. http://www.ala.org/advocacy/intfreedom/librarybill/interpretations. Accessed 8 Sept 2017

  • Antani R (2015) The resistance of memory: could the European Union’s right to be forgotten exist in the United States? Berkeley Technol Law J 30(4):1173–1210

    Google Scholar 

  • Benn SI (1984) Privacy, freedom, and respect for persons. In: Schoeman FD (ed) Philosophical dimensions of privacy: an anthology. Cambridge University Press, Cambridge, pp 223–244

    Chapter  Google Scholar 

  • Bloustein EJ (1964) Privacy as an aspect of human dignity: an answer to Dean Prosser. N Y Univ Law Rev 39:962–1007

    Google Scholar 

  • Burtt EA (ed) (1939) The English philosophers from Bacon to Mill. The Modern Library, New York

    Google Scholar 

  • Cash JM (2016) Droning on and on: a tort approach to regulating hobbyist drones. Univ Memphis Law Rev 46:695–732

    Google Scholar 

  • Cooter R (1997) Normative failure theory of law. Cornell Law Rev 82(5):947–979

    Google Scholar 

  • Crocker TP (2014) Ubiquitous privacy. Oklahoma Law Rev 66:791–829

    Google Scholar 

  • Dworkin R (1996) Politics, death, and nature. Health Matrix 6(2):201–218

    Google Scholar 

  • Elder DA (2002) Privacy torts. Thomas West, Eagan

    Google Scholar 

  • Eltis K (2008) Can the reasonable person still be “highly offended”? an invitation to consider the civil law tradition’s personality rights-based approach to tort privacy. Univ Ottawa Law Technol J 5:199–220

    Google Scholar 

  • Ember S (2016) Gawker and Hulk Hogan reach $31 million settlement. New York Times. The New York Times Company, New York

    Google Scholar 

  • Floridi L (2014) The fourth revolution: how the infosphere is reshaping human reality. Oxford University Press, Oxford

    Google Scholar 

  • Fox M (2013) Alan F. Westin, who transformed privacy debate before the web era, dies at 83. New York Times. The New York Times Company, New York

    Google Scholar 

  • Fried C (1970) An anatomy of values. Harvard University Press, Cambridge

    Book  Google Scholar 

  • Gajda A (2016) The trouble with dignity. In: Kenyon AT (ed) Comparative defamation and privacy law. Cambridge University Press, Cambridge, pp 246–264

    Chapter  Google Scholar 

  • Goffman E (1961) Asylums: essays on the social situations of mental patients and other inmates. Anchor Books, New York

    Google Scholar 

  • Havel V (1991) Disturbing the peace: a conversation with Karel Hvízdala (trans: Wilson P). Vintage Books, New York

    Google Scholar 

  • Heumann M, Cassak L, Kang E, Twitchell T (2016) Privacy and surveillance: public attitudes on cameras on the street, in the home, and in the workplace. Rutgers Law J Public Policy 14(1):37–83

    Google Scholar 

  • Hubbard FP (2014) “Sophisticated robots”: balancing liability, regulation, and innovation. Fla Law Rev 66(5):1803–1872

    Google Scholar 

  • Hubbard FP, Kahn DM (2002) Criminal trespass. In: Dressler J (ed) Encyclopedia of crime and justice, 2nd edn. Macmillan Publishers, New York

    Google Scholar 

  • Hughes K, Richards NM (2016) The Atlantic divide on privacy and free Speech. In: Kenyon AT (ed) Comparative defamation and privacy law. Cambridge University Press, Cambridge, pp 164–198

    Chapter  Google Scholar 

  • Kornhaber S (2016) Hulk Hogan vs. Gawker: the public arena. The Atlantic. The Atlantic, Washington

    Google Scholar 

  • Krotoszynski RJ Jr (2015) Reconciling privacy and speech in the era of big data: a comparative analysis. William Mary Law Rev 56(4):1279–1338

    Google Scholar 

  • Lessig L (1995) The regulation of social meaning. Univ Chic Law Rev 62:943–1045

    Article  Google Scholar 

  • Lindsay D (2016) The “right to be forgotten” by search engines under data privacy law: a legal and policy analysis of the Costeja decision. In: Kenyon AT (ed) Comparative defamation and privacy law. Cambridge University Press, Cambridge, pp 199–223

    Chapter  Google Scholar 

  • Madigan N (2016) Jury tacks on $25 million to Gawkers bill in Hulk Hogan case. New York Times. The New York Times Company, New York

    Google Scholar 

  • McAdams RH (1997) The origin, development, and regulation of norms. Mich Law Rev 96:338–433

    Article  Google Scholar 

  • Mirandola GPD (1486) Oration on the dignity of man. English edition: Mirandola GPD (1956) Oration on the dignity of man (trans: Caponigri R). Henry Regnery Company, Chicago

    Google Scholar 

  • Nissenbaum H (2010) Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, Stanford

    Google Scholar 

  • O’Neill N (2008) Topless protestors on south beach. Miami New Times.

    Google Scholar 

  • Orwell G (1949) Nineteen eighty-four. Harcourt Inc., San Diego. Reprinted edition: Orwell G (1961) 1984. New American Library, New York

    Google Scholar 

  • Parker RB (1974) A definition of privacy. Rutgers Law Rev 27(2):275–296

    Google Scholar 

  • Posner RA (1984) An economic theory of privacy. In: Schoeman FD (ed) Philosophical dimensions of privacy: an anthology. Cambridge University Press, Cambridge, pp 333–345

    Chapter  Google Scholar 

  • Posner E (2000) Law and social norms. Harvard University Press, Cambridge

    Google Scholar 

  • Rawls J (1999) A theory of justice, revised edn. Harvard University Press, Cambridge

    Google Scholar 

  • Reiman JH (1984) Privacy, intimacy, and personhood. In: Schoeman FD (ed) Philosophical dimensions of privacy: an anthology. Cambridge University Press, Cambridge, pp 300–316

    Chapter  Google Scholar 

  • Richards N (2015) Intellectual privacy: rethinking civil liberties in the digital age. Oxford University Press, New York

    Google Scholar 

  • Richards NM, Solove DJ (2007) Privacy’s other path: recovering the law of confidentiality. George Wash Law J 96:123–182

    Google Scholar 

  • Sandel MJ (1982) Liberalism and the limits of justice. Cambridge University Press, New York

    Google Scholar 

  • Savan L (2016) Does Hulk Hogan’s lawsuit against Gawker really threaten freedom of the press? The Nation

    Google Scholar 

  • Schoeman FD (ed) (1984) Philosophical dimensions of privacy: an anthology. Cambridge University Press, Cambridge

    Google Scholar 

  • Schoeman FD (1992) Privacy and social freedom. Cambridge University Press, New York

    Book  Google Scholar 

  • Solove DJ (2004) The digital person: technology and privacy in the information age. NYU Press, New York

    Google Scholar 

  • Sunstein CR (1996a) The expressive function of law. Univ Pa Law Rev 144(5):2021–2054

    Article  Google Scholar 

  • Sunstein CR (1996b) Social norms and social roles. Columbia Law Rev 96(4):903–968

    Article  Google Scholar 

  • Symposium (2016) Contracting over privacy. J Leg Stud 45:51

    Google Scholar 

  • Taylor C (1995) Philosophical arguments. Harvard University Press, Cambridge

    Google Scholar 

  • Thomson JJ (1984) The right to privacy. In: Schoeman FD (ed) Philosophical dimensions of privacy: an anthology. Cambridge University Press, Cambridge, pp 272–289

    Chapter  Google Scholar 

  • Wacks R (2015) Privacy: a very short introduction. Oxford University Press, Oxford

    Google Scholar 

  • Walzer M (1983) Spheres of justice: a defense of pluralism and equality. Basic Books, New York

    Google Scholar 

  • Westin AF (1967) Privacy and freedom. Ig Publishing, New York

    Google Scholar 

  • Westin AF (1972) Databanks in a free society: computers, record keeping and privacy. Times Books, New York

    Google Scholar 

  • Whitman JQ (2004) The two western cultures of privacy: dignity versus liberty. Yale Law J 113(6):1151–1221

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patrick Hubbard .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Hubbard, P. (2018). The Need for Privacy Torts in an Era of Ubiquitous Disclosure and Surveillance. In: Cudd, A., Navin, M. (eds) Core Concepts and Contemporary Issues in Privacy. AMINTAPHIL: The Philosophical Foundations of Law and Justice, vol 8. Springer, Cham. https://doi.org/10.1007/978-3-319-74639-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-74639-5_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-74638-8

  • Online ISBN: 978-3-319-74639-5

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics