Fill in Order Details

  • Submit paper details for free using our simple order form

Make Payment Securely

  • Add funds to your account. There are no upfront payments. The writer will only be paid once you have approved your paper

Writing Process

  • The best qualified expert writer is assigned to work on your order
  • Your paper is written to standard and delivered as per your instructions

Download your paper

  • Download the completed paper from your online account or your email
  • You can request a plagiarism and quality report along with your paper

Invasion of Privacy Laws in Today’s Society

Invasion of Privacy Laws in Today’s Society

Name

Supervisor

Invasion of Privacy Laws in Today’s Society

The prohibition of the invasion of one’s privacy derives from the right to be left alone (Bedingfield, 1992). Arguably, the right to be protected from the invasion of one’s privacy is traced to an article by Samuel Warren and Louis Brandies, whom defined privacy as constituting ‘the right to be left alone’ (Bratman, 2001). In essence, invasion of privacy laws seeks to exclude one’s personal matters from the public platform. Protection of privacy rights in the form of tort has over the years developed from the common law which sought to enhance the realization of human dignity. Suffice to say, thought the US Constitution does not make express mention of the right to privacy, it however has guarantees that have been interpreted to protect one from unlawful and unjustified invasion into their private affairs of no public concern.

The legal basis of enjoyment of privacy rights in the United States is deduced from various constitutional amendments wherein the government’s intrusion into one’s private affairs is limited. Under the Fourth Amendment to the US Constitution, every person is entitled inter alia entitled to the right to security of their persons, houses, papers and effects, against unreasonable searches and seizures (Tomkovicz, 1984). The implication of this entitlement is that there has to be obtained search warrants prior to the invasion one’s privacy by the government in the form of searches or seizures.

The Fourteenth Amendment has also been interpreted as entitling individuals to due process right to privacy. Thus, in the case of Roe v Wade, the provision was invoked to conserve the right to privacy in respect of a woman’s right of abortion. Besides, the First Amendment has also been interpreted as encompassing broader privacy rights. Various statutes have also been enacted in the US which guarantees the right to privacy. For instance, the Federal Privacy Act of 1974 prohibits agencies of the federal government from otherwise disclosing one’s personal information through the use of their names.

Since the recognition of invasion of privacy rights, the right has been categorized into four classes of torts. Intrusion of solitude and seclusion as a category of invasion seeks to protect one from the intrusion into their private affairs (Palyan, 2008). In this regard, offenders are restrained from intentionally physically, electronically or through other forms from intruding into the private space of another in the disguise of examination, investigation or observation (Palyan, 2008). The second category is public disclosure of private facts which prohibits one from disclosing another’s private information of no public interest the converse of which would be offensive.

The third category of ‘invasion of privacy’ is the appropriation of names or likeness. This element seeks to protect one from having their names, images or associated features from being misrepresented by another (Buchanan, 1988). The rationale behind this protection is that a person enjoys the exclusive rights to use their names and images and prevent others from exploiting it. Noteworthy, protection from misappropriation of another’s name is one of the traditional forms of infringing one’s privacy rights.

The case of Carson v. Here’s Johnny Portable Toilets, Inc (6th Cir. 1983) is an illustration of invasion of privacy in the form of appropriation of names. In this case, the defendant had used the slogan ‘Here’s Johnny’ for purpose of branding portable toilets without seeking Johnny’s consent. The Court found the defendant’s conduct unlawful as it infringed Johnny’s privacy rights. Recently, in 2014, the Court in the case of Timed Out, LLC v. Youabian, Inc. upheld that misappropriation of names or likeness breached the plaintiff’s privacy rights.

The fourth category of invasion of privacy is false light. False light generally implies the tort of defamation which seeks to prohibit other persons from infringing into a non-public person’s entitlement to privacy from publicity. This aspect of protection of an individual’s privacy is aimed at conserving their reputation and emotional well being. In claims of infringement of privacy under this element, the inquiries to make are; whether the publication on the defendant are maliciously made; whether such publication places the claimant in a false light; and whether it is offensive or reasonably results in annoyance.

Many claims on the infringement of privacy rights on the basis of false right have been determined by US Courts. The case of Warren E Spahn v. Julian Messner, Inc is quite informative in this aspect. The defendant has published a biography of the plaintiff, which falsely made lies about him. Upon lodging a claim for injunction, it was held (following appeal) that indeed such publication constituted false light, hence impaired the plaintiff’s privacy right.

While various cases have been decided in the affirmative that uphold the privacy rights of individuals in the US, the right is yet to be enjoyed fully. In this regard, it is observable that the existing invasion of privacy laws and their subsequent interpretation does not offer adequate protection of privacy rights. As pointed out above, the US Constitution does not have express nor explicit mention of the right to privacy. The upshot of this is that limited interpretation has been accorded to the seemingly relevant provisions of the Constitution.

Moreover, the aspect of enjoyment of one’s privacy has been subject to various evolutions since its recognition within the US (Zarsky, 2003). This has been against the backdrop that with the seemingly unending technological advancements, issues of privacy have become much vexed (Zarsky, 2003). The media is rapidly growing and people’s privacy is easily infringed, both intentionally and unconsciously. In most cases, various communication and internet sites obtains individuals’ private information without their consent and proceeds on disclosing the information (Chai et al., 2009).

Besides, it should be appreciated that there has been much drift in information privacy since Warren and Brandies coined the right to be left alone (Mai, 2016). Thus, while previous privacy models limited it to physical privacy, technological advancements has significantly disrupted this model. Even without an individual disclosing their personal information, the computer technology has made it much easier to spy on individuals’ information and proceed upon analyzing it altogether (Mai, 2016).

Illustratively, viable consumer privacy protection laws should be devised to fill all the gaps in invasion of privacy (Brill & Jones, 2016). While the issue of informed consent while browsing seemed quite vital in previous decades, it has in the recent times proved to be quite elusive. It is logically unrealistic to expect consumers to read through the lines of privacy policies prior to using the browsing sites. In most cases, cookies retain users’ personal data without seeking their approval (Dabrowski et al, 2019).

The implication of the above is that privacy laws, such as the consumer privacy laws should measure up with the emerging technological issues that pose threat to the protection of users’ privacy (Cofone & Robertson, 2017). Important to reckon, on March 28, 2017, the Congress declined to approve the Obama administration privacy protection rules. The rules sought to protect consumer data privacy while using the internet which made it a prerequisite that explicit consent must be obtained to access or exploit users’ personal data (Cofone & Robertson, 2017).

References

Bedingfield, D. (1992). Privacy or Publicity? The enduring confusion surrounding the American tort of invasion of privacy. The Modern Law Review, 55(1), 111-118.

Bratman, B. (2001). Brandeis and Warren’s The Right to Privacy and the Birth of the Right to Privacy. Tenn. L. Rev., 69, 623.

Brill, H., & Jones, S. (2016). Little things and big challenges: information privacy and the internet of things. Am. UL Rev., 66, 1183.

Buchanan, C. L. (1988). A Comparative Analysis of Name and Likeness Rights in the United States and England. Golden Gate UL Rev., 18, 301.

Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H. R., & Upadhyaya, S. J. (2009). Internet and online information privacy: An exploratory study of preteens and early teens. IEEE Transactions on Professional Communication, 52(2), 167-182.

Cofone, I. N., & Robertson, A. Z. (2017). Consumer Privacy in a Behavioral World. Hastings LJ, 69, 1471.

Mai, J. E. (2016). Big data privacy: The datafication of personal information. The Information Society, 32(3), 192-199.

Palyan, T. (2008). Common Law Privacy in a Not So Common World: Prospects for the Tort of Intrusion Upon Seclusion in Virtual Worlds. Sw. L. Rev., 38, 167.

Tomkovicz, J. J. (1984). Beyond Secrecy for Secrecy’s Sake: Toward an Expanded Vision of the Fourth Amendment Privacy Province. Hastings LJ, 36, 645.

Zarsky, T. Z. (2003). Thinking outside the box: considering transparency, anonymity, and pseudonymity as overall solutions to the problems in information privacy in the internet society. U. Miami L. Rev., 58, 991.

WHAT OUR CURRENT CUSTOMERS SAY

  • Google
  • Sitejabber
  • Trustpilot
Zahraa S
Zahraa S
Absolutely spot on. I have had the best experience with Elite Academic Research and all my work have scored highly. Thank you for your professionalism and using expert writers with vast and outstanding knowledge in their fields. I highly recommend any day and time.
Stuart L
Stuart L
Thanks for keeping me sane for getting everything out of the way, I’ve been stuck working more than full time and balancing the rest but I’m glad you’ve been ensuring my school work is taken care of. I'll recommend Elite Academic Research to anyone who seeks quality academic help, thank you so much!
Mindi D
Mindi D
Brilliant writers and awesome support team. You can tell by the depth of research and the quality of work delivered that the writers care deeply about delivering that perfect grade.
Samuel Y
Samuel Y
I really appreciate the work all your amazing writers do to ensure that my papers are always delivered on time and always of the highest quality. I was at a crossroads last semester and I almost dropped out of school because of the many issues that were bombarding but I am glad a friend referred me to you guys. You came up big for me and continue to do so. I just wish I knew about your services earlier.
Cindy L
Cindy L
You can't fault the paper quality and speed of delivery. I have been using these guys for the past 3 years and I not even once have they ever failed me. They deliver properly researched papers way ahead of time. Each time I think I have had the best their professional writers surprise me with even better quality work. Elite Academic Research is a true Gem among essay writing companies.
Got an A and plagiarism percent was less than 10%! Thanks!

ORDER NOW

CategoriesUncategorized

Consider Your Assignments Done

“All my friends and I are getting help from eliteacademicresearch. It’s every college student’s best kept secret!”

Jermaine Byrant
BSN

“I was apprehensive at first. But I must say it was a great experience and well worth the price. I got an A!”

Nicole Johnson
Finance & Economics

Our Top Experts

See Why Our Clients Hire Us Again And Again!


OVER

10.3k
Reviews

RATING
4.89/5
Average

YEARS
13
Mastery

Success Guarantee

When you order form the best, some of your greatest problems as a student are solved!

Reliable

Professional

Affordable

Quick

Using this writing service is legal and is not prohibited by any law, university or college policies. Services of Elite Academic Research are provided for research and study purposes only with the intent to help students improve their writing and academic experience. We do not condone or encourage cheating, academic dishonesty, or any form of plagiarism. Our original, plagiarism-free, zero-AI expert samples should only be used as references. It is your responsibility to cite any outside sources appropriately. This service will be useful for students looking for quick, reliable, and efficient online class-help on a variety of topics.