JESSIE PORTEUS Submission to the Department of Prime Minister and Cabinet 2 November 2011 The time is ripe for a statutory cause of action for invasions of privacy in Australia The recent News of the World phone-hacking scandal has brought into sharp focus a number of questions surrounding the scope and parameters of privacy rights for individuals in Australia and around the world. With the Gillard government announcing its intention to create a federal statutory action for serious invasions of privacy, this area of law now necessitates comprehensive analysis and review. This dissertation argues that the fragmented state of Australian law does not currently provide sufficient or direct protection of privacy. It surveys the gaps in privacy law previously canvassed in the 2008 Australian Law Reform Commission Report ‘For Your Information’ and the 2009 New South Wales Law Reform Commission Report ‘Invasion of Privacy’, and evaluates the proposed reforms in light of recent developments. This dissertation examines the reluctance of the common law and the inadequacy of equity to stitch up the unravelling fabric of the current privacy framework, and draws upon both domestic Commission Reports and best-practice approaches in overseas jurisdictions to propose a statutory cause of action which aims to strike a balance between the right to privacy in a technology and media-driven world, and the fundamental right to freedom of speech. Page |2 TABLE OF CONTENTS TABLE OF CONTENTS......................................................................................................................2 INTRODUCTION..................................................................................................................................4 1. THE NEED FOR PRIVACY..........................................................................................................7 1.1. Definitional Difficulties............................................................................................................7 1.2. The Ripening of the Fruit......................................................................................................13 1.3. The [Anti] Social Network.....................................................................................................15 1.4. News of the World and the Phone-Hacking Scandal...........................................................21 1.5. The Need for Privacy.............................................................................................................23 2. THE CURRENT PRIVACY LAW FRAMEWORK: AUSTRALIAN AND OVERSEAS APPROACHES..............................................................................................................................25 2.1. The Missing Cause of Action.................................................................................................25 2.2. Tort: A Negligent Approach?...............................................................................................27 2.2.1. The Case of New Zealand…………………………………………………………...………27 2.2.2. The Case of The United States………………………………………………………………28 2.2.3. A Privacy Tort in Australia?……………………………………………………………….29 2.3. Equity: The New Fusion Fallacy?.........................................................................................30 2.3.1. The Case of the United Kingdom…………………………………………………………...30 2.3.2. Extending breach of confidence in Australia?……………………………………………31 2.4. A Statutory Solution..............................................................................................................34 2.4.1. The Case of North America……………………………………………………………....…34 2.4.2. A Statutory Approach in Australia…………………………………………………………36 3. PREVIOUS ATTEMPTS AT REFORM…................................................................................37 3.1. The Australian Law Reform Commission Report..............................................................38 Page |3 3.2. The New South Wales Law Reform Commission Report..................................................42 3.3. The Australian Government’s Response.............................................................................46 4. REFORM PROPOSALS: THE INVASION OF PRIVACY ACT 2011 (CTH)........................48 4.1. New Federal Statute...............................................................................................................49 4.2. Objects Clause........................................................................................................................49 4.3. Definition.................................................................................................................................52 4.4. Entitlement.............................................................................................................................54 4.5. General Cause of Action........................................................................................................55 4.5.1. Threshold……………………………………………………………………………………...55 4.5.2. Test……………………………………………………………………………………………..56 4.5.3. Mental Element……………………………………………………………………………….59 4.5.4. Factors to be Taken into Account………………………………………………………..…60 4.5.5. Consent………………………………………………………………………………………...61 4.5.6. Limitation Period……………………………………………………………………………..63 4.6. Defences...................................................................................................................................64 4.7. Remedies.................................................................................................................................66 4.8. Education Campaign............................................................................................................67 4.9. A Familiar Inertia.................................................................................................................70 4.10. Future Application of the New Framework......................................................................71 CONCLUSION....................................................................................................................................73 APPENDIX...........................................................................................................................................75 Table 1: Current Legal Protection of Privacy...................................................................................75 Table 2: Elements, Defences and Remedies in Overseas Privacy Statutes.....................................81 Table 3: Comparison of Recommendations for a Statutory Cause of Action in Australia...........86 BIBLIOGRAPHY................................................................................................................................93 Page |4 INTRODUCTION I do not pretend that it is easy to safeguard privacy in the current age. But surrendering the endeavour as just too difficult to achieve is not an option.1 Most Australians are under the mistaken belief that they have a right to privacy. 2 At the same time, Australians are increasingly willing to disclose private feelings, information and photographs everyday on social networking websites and through other technological media such as smart phones. Public knowledge about the realm of privacy protection is lessening, yet, and somewhat paradoxically, Australians are lamenting the erosion of their privacy rights as the ‘inevitable result of technological advance’,3 and are outraged by the recent scandal surrounding widespread media phone-hacking. The fabric of the privacy law framework is unravelling. The recent unveiling of surreptitious behaviour by News of the World and other media organisations overseas has pulled the last remaining thread, and has called into question the currently fragmented and ad-hoc approach to protecting the various notions of personal privacy in Australia. Darwin’s theory of evolution states that life’s forms evolve as Mother Nature’s forces respond to new pressures exerted by changes in the environment. ‘The more dramatic the change, the greater the pressure, the faster the evolution.’4 The law develops in much the The Honourable Michael Kirby AC CMG, ‘Privacy, MySpace, YouTube and Facebook: Can the Law Cope?’ (Speech delivered at the Victorian Privacy Commission Privacy Oration, Melbourne, 1 September 2009) 11. 2 New South Wales Law Reform Commission, Invasion of Privacy, Report No. 120 (2009) 7 [3.1]. 3 Ibid. 4 Dr Robert Dean, ‘A right to privacy?’ (2004) 78 Australian Law Journal 114. 1 Page |5 same way, as an organic and ever-changing life-form, responding to social, political and economic changes around it. A new wave of privacy regulation is now in an embryonic5 stage as a result of recent developments. In 2011, there is an overwhelming need to change the currently defective privacy framework, and to strike a flexible and common-sense balance6 between the privacy interests of individuals and public concerns such as freedom of speech, national security and freedom of information. The purpose of this paper is to fill a gap in the academic literature by responding directly to the recent phone-hacking scandal and other contemporary challenges to privacy by offering a new legislative proposal. In formulating the proposal, this paper addresses the need for general privacy protection in Australian law, given the current socio-economic climate, advancements in technology, the domination of social networking in the everyday lives of Australians, and the clandestine behaviour by major media organisations, brought to the widespread attention of the public particularly over the last twelve months. This paper draws upon the 2008 Australian Law Reform Commission Report For Your Information and the 2009 New South Wales Law Reform Commission Report Invasion of Privacy, and statutory causes of action operating in Canada and other jurisdictions, which provide sound statutory models upon which the proposed legislation is based. This paper firstly considers why the issue of privacy should pervade current legal and academic thinking. Chapter One evaluates the contemporary arguments as to why Australia requires privacy protection and how modern threats to private life provide the impetus for 5 Carolyn Doyle and Mirko Bagaric, Privacy Law in Australia (Federation Press, 2005) 178. Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report No 108 (2008) vol 1, 105-110 [1.82-1.93]. 6 Page |6 legal reform in 2011. The Chapter pays particular attention to the explosion of social networking, the free flow of information, and the News of the World phone-hacking scandal. Secondly, the paper surveys the currently fragmented state of privacy law in Australia. Chapter Two examines the fact that privacy is only incidentally protected under Australian law. There is no general law protecting privacy. The chapter then evaluates the different legal methods of privacy protection utilised in overseas jurisdictions such as New Zealand, United Kingdom, Canada and the United States, and applies each approach to the Australian legal landscape. By demonstrating the reluctance of the common law and the inadequacies of equity to protect privacy, the chapter concludes that privacy is best protected through statute. Thirdly, this paper reviews existing academic and legal literature on privacy law reform. Chapter Three assesses and compares the previous models of reform put forward by the Australian and New South Wales Law Reform Commissions in 2008 and 2009. The chapter considers those recommendations in light of recent developments in order to plug the gap in privacy laws and literature in 2011. Finally, this paper will explain how to address the problems and gaps in privacy protection canvassed in the previous chapters by proposing a new model for reform. Chapter Four recommends new federal legislation that creates a statutory cause of action for invasions of privacy. The proposed legislation draws upon the value of individual autonomy, the need for national consistency and the delicate balancing process between individual privacy interests and the public interest in freedom of expression. The chapter also recommends a comprehensive education campaign aimed at improving social norms and expectations relating to privacy. This paper will illustrate that there is urgent need for Australia to build a new privacy framework that adapts to contemporary concerns and values. The time is ripe for statutory Page |7 protection of privacy. Page |8 1. THE NEED FOR PRIVACY In our overexposed world, is anything private anymore? Currently, the law recognises as private only information that is completely secret. Information exposed to others is public. Privacy, however, is far more complicated, as it involves a cluster of nuanced expectations of accessibility, confidentiality and control. If we are to protect privacy today, we need to rethink our understandings of privacy.7 1.1. Definitional Difficulties In order to understand why protection of privacy is needed in Australia and how it should be protected, the intricacies and complexities within the meaning of privacy should first be acknowledged. ‘Privacy seems to encompass everything, and therefore it appears to be nothing in itself.’8 While privacy law authors may disagree on the scope and parameters of privacy protection and how it should be reformed, the one thing they can agree on is that there is no satisfactory definition of privacy. Rhetoric such as: ‘[n]obody knows what that thing means. But you have to define it; you have to define it. And the Court has not given it definition’,9 has played a somewhat critical part in the Australian Government’s failure to develop a coherent and uniform system of privacy laws.10 This essential first step has also been avoided by the 7 Daniel J Solove, The Future of Reputation: Gossip, Rumour, and Privacy on the Internet (Yale University Press, 2007) 161. 8 Daniel J Solove, Understanding Privacy, (Harvard University Press, 2008) 7. 9 Nomination of Robert H. Bork to be an Associate Justice of the United States Supreme Court, Report of the Committee on the Judiciary, US Senate, Washington: 13 Oct 1987, 32; cited in Raymond Wacks, Personal Information: Privacy and the Law (Clarendon Press, 1993) 1. 10 Doyle and Bagaric, above n 5, 6. Page |9 Law Reform Commissions in the past, defining privacy as something that should ‘speak for itself’.11 Some authors have attempted to define privacy’s parameters, despite the commonly-held belief that privacy is ‘beyond the scope of the law’. 12 In 1979, the Australian Law Reform Commission described privacy as ‘material which so closely pertains to a person’s innermost thoughts, actions and relationships that he [or she] may legitimately claim the prerogative of deciding whether, with whom and under what circumstances he [or she] will share it’.13 Westin defined privacy as ‘the claim of individuals, groups, or institutions to determine for themselves when, how and to what extent information about them is communicated to others.’14 Cooley simply described it as the ‘right to be let alone’.15 The judicial definition proposed by Gleeson CJ in Lenah also appears to be widely accepted, even finding endorsement by the Irish Working Group on Privacy:16 Certain kinds of information about a person, such as information relating to health, personal relationships or finances, may be easy to identify as private; as may certain kinds of activity, which a reasonable person applying contemporary standards of morals and behaviour, would understand to be meant to be unobserved. The requirement that disclosure or observation of information or conduct would be highly offensive to a reasonable person of ordinary sensibilities is in many circumstances a useful practical test of what is private.17 11 New South Wales Law Reform Commission, Report No. 120, above n 2, 21 [4.16]. R F Hixson, Privacy in a Public Society: Human Rights in Conflict (Oxford University Press, 1987) 98. 13 Australian Law Reform Commission, Unfair Publication: Defamation and Privacy, Report No 11 (1979) 109 [206]. 14 Alan Westin, Privacy and Freedom (Atheneum, 1970) 7. 15 Thomas M. Cooley, Cooley on Torts 29 (2nd ed, 1888). 16 Irish Working Group on Privacy, Report of Working Group on Privacy (2006) 12. 17 Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd (2001) 208 CLR 199, 226 [42] (Gleeson CJ). 12 P a g e | 10 The legal definition of privacy however remains elusive,18 particularly as social norms change. The concept is ambiguous on at least three levels – status, features and coherence.19 Firstly, the status and value of privacy is uncertain. Privacy is not a recognised right in Australia. Indeed, Australia has international obligations to protect people’s privacy. Article 12 of the Universal Declaration of Human Rights 1948 and Article 17 of the International Covenant on Civil and Political Rights [‘ICCPR’] both provide that ‘no one shall be subjected to arbitrary or unlawful interference with his privacy, family, home or correspondence, nor to unlawful attacks on his honour and reputation.’20 Despite ratifying the ICCPR on 13 August 1980, Australia’s domestic approach follows a traditional trend of reticence towards rights.21 In 1988, the Office of the United Nations High Commissioner for Human Rights announced that Article 17 was to apply to states, natural persons and legal persons, and that ‘all member states are required to adopt legislative and other measures to give effect to the prohibition against such interferences and attacks as well as to the protection of this right’.22 The Australian government passed the Privacy Act 1988 (Cth) as a way to implement the ICCPR obligations. However, the Act only relates to information privacy and therefore only partially implements Article 17. Furthermore, Australia does not have a Bill of Rights (although ACT23 and Victoria24 have rights legislation), which is another possible method of implementing Article 17 and other rights. As a result, privacy is not a wholly-recognised right in Australia. 18 Raymond Wacks, Personal Information: Privacy and the Law (Clarendon Press, 1993) 13. Ibid, 13-14. 20 International Covenant on Civil and Political Rights, opened for signature 16 December 1966, (entered into force 13 March 1976) [1980] ATS 23, Article 17; and Universal Declaration on Human Rights, GA Res 217A [III], UN GAOR, 3rd sess, 183rd plen mtg, UN Doc A/810 (10 December 1948) Article 12. 21 David Lindsay, ‘An Exploration of the Conceptual Basis of Privacy and the Implications for the Future of Australian Privacy Law’ (2005) Melbourne University Law Review 4, 5. 22 Office of the United Nations High Commissioner for Human Rights (1988) General Comment Number 16. 23 Human Rights Act 2004 (ACT) s12. 24 Charter of Human Rights and Responsibilities Act 2006 (Vic) s13. 19 P a g e | 11 Secondly, the features of privacy are unformulated. In 1890, American writers Warren and Brandeis argued that there should be a general right to privacy in the United States.25 This spawned the development of four types of privacy invasion, which were authoritatively stated by Prosser in 1960 as intrusion upon seclusion, public disclosure of embarrassing private facts, appropriation of the plaintiff’s name and likeness, and publicity which puts the plaintiff in false light.26 However, Prosser’s features of privacy do not wholly represent all of the types of privacy interests valued by individuals, nor do they reveal the only ways in which privacy can be invaded. Wacks argues that by addressing the issue of privacy in terms of personal information only, the definitional strait-jacket is removed, resulting in a ‘less artificial and more effective legal resolution’.27 However, restricting the concept to information privacy limits the boundaries of the concept. What about some less traditional features of privacy such as sexual orientation, gender identity or a woman’s decision to use contraceptives or abort a foetus?28 On the one hand it would be impractical to list every conceivable invasion of privacy. On the other hand, there is merit in arguing that privacy must have value to be effective. The worth and features of privacy must therefore derive from social values and norms. The definition is heavily reliant on context. Demarcating between what is private and what is public is also an indeterminate exercise. ‘A strict public/private divide is unsustainable - or at least is a very blurred ideal. Not only is the boundary between public and private constantly shifting but it is inherently political.’29 A broad interpretation of the meaning of private life is expounded in Von Hannover v Germany [2004] ECHR 294, which held that any publication of an unauthorised photograph taken of a particular person engaged in everyday activities outside their public duty will constitute a Samuel D. Warren and Louis D. Brandeis, ‘The Right to Privacy’ (1890) 4 Harvard Law Review 193, 196. William L. Prosser, ‘Privacy’ (1960) 48 California Law Review 383, 389. 27 Wacks, above n 18, 10. 28 Brett Mason, Privacy without Principle: The Use and Abuse of Privacy in Australian Law and Public Policy (Australian Scholarly Publishing, 2006) 16. 29 Ibid, 3. 25 26 P a g e | 12 violation of the right to privacy under Article 8 of the European Convention on Human Rights [‘ECHR’].30 In Murray v Big Pictures (UK) Ltd [2008] EWCA Civ 446, the Court held that the 19-month old son of the writer of the Harry Potter books, JK Rowling, had an action for invasion of privacy as a result of a photograph being taken of the family walking down a public street. The Court reasoned that Big Pictures UK Ltd would not have taken the photograph if he was the child of ordinary parents.31 Drawing a line between public and private spheres is therefore a highly context-dependent exercise. An activity is not private simply because it is not done in public, and at the same time, an activity does not lose its private nature simply because it occurs in a public place.32 Furthermore, in the modern world of technology and social networking, it may not be possible to enforce a binary view of public versus private spheres. Rather, a more nuanced view may need to be adopted, given the ease in which something that takes place in public can be made permanent and widespread simply by uploading a photo to the internet or sending photos via mobile phone technology, by members of the public or the members of what has become known as the ‘citizen media’.33 Other modern developments also highlight the blurring of the private and public spheres and the increased intrusion upon individual privacy, such as full body scanners at airports, identification-card scanners and facial recognition at nightclubs, smart cards, telemarketing, debt recovery, anti-terrorism checks, Google Earth and WikiLeaks. How can we deal with an increasingly invasive and globalised world where nothing is sacred anymore? A flexible definition of privacy will allow the law to adapt to these invasions. 30 Convention for the Protection of Human Rights and Fundamental Freedoms, opened for signature 4 November 1950, 213 UNTS 221 (entered into force 3 September 1953). 31 Murray v Big Pictures (UK) Ltd [2008] EWCA Civ 446. 32 New South Wales Law Reform Commission, Report No 120, above n 2, 20 [5.27]. 33 Solove, above n 7, 7-8. P a g e | 13 Thirdly, protection of privacy is incoherent. The Australian legal system only protects privacy indirectly through protecting some of the values underpinning it, such as property rights, human dignity and reputation. This parasitic34 approach means that the current framework fails to achieve direct and effective legal privacy protection. These difficulties are further ‘exacerbated when a precise definition of the term is sought for legal purposes’.35 Ultimately, the concept currently does not have a consistent core36 capable of providing hard and fast answers to what is private and what is not. This is further illustrated in Chapter Two of this paper. What makes the meaning of privacy even more difficult to characterise is the fluidity of the concept. The concept changes according to generational norms, particularly in relation to the dissemination of personal information: It does appear that young people are more comfortable than their parents, and certainly their grandparents, in sharing personal information, photos and other material on social networking websites. The question is whether this represents the beginnings of an enduring cultural shift, or simply the eternal recklessness of youth, played out in a new medium and utilising new technology. Put another way, will today’s teenagers be horrified in a decade’s time when prospective employers—and prospective partners and in-laws—can easily ‘google up’ intimate and potentially embarrassing images and information?37 There exist immense difficulties for lawmakers and academic writers in arriving at a definition of privacy. However, the common element that unites the literature is that privacy’s meaning is contextually-relative. The following discussion identifies the current legal and social context that should inform the meaning of privacy, which demonstrates why it is necessary to give legal recognition to privacy interests in Australia. 34 Mason, above n 28, 18. See also Chapter 2 and Appendix: Table 1. New South Wales Law Reform Commission, Report No 120, above n 2, 11 [4.2]. 36 Mason, above n 28, 6. 37 Australian Law Reform Commission, Report No 108, above n 6, vol 1, 108. 35 P a g e | 14 1.2. The Ripening of the Fruit Privacy is a key policy issue facing our legal system.38 There is an overwhelming need for protection of personal privacy. The exigencies of modern day living, our media-driven society, the connectedness resulting from the forces of globalisation and the advent of social networking have coalesced to create a world where there appears to be only one domain – the public domain. The News of the World phone-hacking scandal should represent the last remaining sensationalist disclosure39 to spark the privacy debate in Australia. It is time to reform the law. A decade has elapsed since Justice Callinan advocated for change to the privacy law framework in the landmark case of Australian Broadcasting Commission v Lenah Game Meats (2001) 208 CLR 199 [‘Lenah’]: Having regard to current conditions in this country, and developments of law in other common law jurisdictions, the time is ripe for consideration whether... the legislatures should be left to determine whether provisions for a remedy for [a tort of invasion of privacy] should be made...40 Is the time still ripe in 2011? Or has the proverbial privacy fruit gone bad with age? The Prime Minister, Julia Gillard, believes it is picking season. On 21 July 2011, the Prime Minister announced ‘[w]hen people have seen telephones hacked into, when people have seen individuals grieving have to deal with all of this, then I do think that causes them to ask Simon Chester, Jason Murphy and Eric Robb, ‘Zapping the paparazzi: is the tort of privacy alive and well?’ (2003) 27 Advocates’ Quarterly 357, 358. 39 Raymond Wacks, Privacy and Press Freedom (Blackstone Press Limited, 1995) 1. 40 Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd (2001) 208 CLR 199, 328 at [335] (Callinan J). 38 P a g e | 15 some questions here in our country.’41 A consultation period for privacy reform was launched following this announcement, with Federal Privacy and Freedom of Information Minister Brendan O’Connor explaining that the Government is ‘very serious about having this discussion’ following the News of the World scandal, and that ‘there are two ideals we uphold as a government - freedom of speech, and people’s right to have a private life’.42 In September 2011, the Government released an Issues Paper, confirming this rationale and expressing support for a statutory cause of action for serious invasions of privacy.43 While Lenah left the door open for the common law to develop a cause of action for breach of privacy, a judicial majority is yet to take the bold step44 in developing the action. Moreover, despite the best efforts and recommendations of the Australian and New South Wales Law Reform Commissions, Australia has succumbed to both political inertia and conservatism by refusing to recognise a right to privacy and by failing to provide a statutory cause of action for privacy invasion. The time is ripe45 for a cause of action for invasions of privacy, and Australian lawmakers must take this step using a legislative framework. This is a logical and desirable step,46 given the current social, political and technological environment. Privacy laws have not kept pace with changes in society. The following discussion analyses two broad concerns underpinning the current debate on privacy reform; the boundless flow of information on the internet, and the underhanded behaviour by media organisations, both of which seriously threaten personal privacy. Julia Gillard, quoted in Katharine Murphy, ‘Canberra to move on Privacy Law’, The Age (online) July 21 2011 <http://www.theage.com.au/national/canberra-to-move-on-privacy-law-201107201hp19.html#ixzz1T58aRPfx>. 42 Ibid. 43 Commonwealth, A Commonwealth Statutory Cause of Action for Invasions of Privacy, Issues Paper (2011). 44 Grosse v Purvis [2003] QDC 151 (16 June 2003) (Skoien J). 45 Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd (2001) 208 CLR 199, 328 at [335] (Callinan J). 46 Grosse v Purvis [2003] QDC 151 (16 June 2003) (Skoien J). 41 P a g e | 16 1.3. The [Anti] Social Network Each era in human history faces new threats in the battle for privacy. The cause stays the same. It is only the weapons that change. From freedom from government intrusion in the 18th century to phone-hacking and Facebook stalking in the 21st Century, the pendulum constantly swings between the right to privacy and the right to freedom of expression and never quite seems to reach equilibrium. The inability to achieve a comfortable balance between privacy and free speech continues unabatedly. The explosion of new technology represents an advanced set of weaponry, threatening personal privacy in a way never anticipated. However, it is not just the technology to blame. We are, somewhat, authors of our own demise; our own worst enemy. We’re invading each other’s privacy and our own47 almost every day, particularly by what we expose on the internet. Network sharing sites such as YouTube, Twitter, Flickr and LinkedIn, and social media sites such as MySpace and Facebook, invite us to share our most private and intimate thoughts and feelings, our name, our hometown, our workplace, our marital status and our image. Online services such as Cheaterville allow individuals to post the name, picture and details of others who have been unfaithful in romantic relationships, in order to warn others against engaging in relationships with those individuals.48 The website does not check the accuracy of the allegations, and only provides a comment section so that the identified individuals can respond. Facebook’s Check-In service allows users to post on their page where they are and who they’re with. Google’s new Hangouts and Circle services provide similar features. However, Google claims to allow users to share information with the people that are authorised to access such information: 47 48 Solove, above n 7, vii. Cheaterville, Cheaterville Home (5 October 2011) Cheaterville < http://cheaterville.com/>. P a g e | 17 You share different things with different people. But sharing the right stuff with the right people shouldn’t be a hassle. Circles make it easy to put your friends from Saturday night in one circle, your parents in another, and your boss in a circle by himself, just like real life.49 Almost every era has seen technology increase the flow of information; with the penny press in the 1830s, the telephone in 1876, the snap camera in 1884, radio in 1900s, modern television in the 1950s, the internet in the mid 1990s and smart phones within the last ten years. The Gillard Government’s current commitment to build the National Broadband Network [‘NBN’] means that 93% of Australians will have access to the internet via a high speed fibre network once roll-out of the network is completed,50 and Australia will be among the world’s leading digital economies by 2020.51 Yet the internet poses different challenges than its technological predecessors. It is a developing technology, potentially without limits. In the offline world, people had their fifteen minutes of fame and were forgotten the next day. The internet’s boundless and omnipresent nature means that people’s stories are always accessible. In a matter of milliseconds, that embarrassing thing you did last night is just a Google search away,52 accessible to the entire world, saved as personal chronicles for infinity, and remaining permanent ‘digital baggage’.53 With the click of a button, information can be instantaneously uploaded online and shared with others, whether from a mobile phone, computer, webcam, Ipad or other electronic device. With an increasingly-evolving ecosystem of interconnected networks developing online, the free flow of information has reached enormous levels never before seen by humankind. To illustrate, there are 750 million active users on Facebook, who collectively 49 Google, A Quick Look at Google+ (28 September 2011) Google <https://www.google.com/intl/en/+/ learnmore/index.html#circles>. 50 Commonwealth, Issues Paper, above n 43, 10. 51 Department of Broadband, Communications and the Digital Economy, The Vision (23 October 2011) National Broadband Network < http://www.nbn.gov.au/the-vision/>. 52 Ruben Rodrigues, ‘Privacy on Social Networks: Norms, Markets and Natural Monopoly’ in Saul Levmore and Martha C Nussbaum (eds), The Offensive Internet (Harvard University Press, 2010) 237. 53 Solove above n 7, 10. P a g e | 18 spend over 700 billion minutes on the site a month.54 Facebook is the second most-visited site in Australia.55 Twitter boasts over 100 million active users.56 Around 3 billion YouTube videos are viewed everyday.57 This represents a phenomenal flow of information globally. Online information can be a cash-cow for advertisers and online businesses, and also for the social networking sites that provide the information. For instance, when a user ‘likes’ a page on Facebook, such as a certain clothing brand or a confectionary product, Facebook can sell ads to those businesses targeted at the users who like the page. Facebook receives data from advertisers when users visit their sites, even if the user’s profile is set to private. Facebook then sells the user’s endorsement, ‘with no payment other than the continued use of its website’.58 Facebook made $2 billion last year, which was a 157% increase from 2009.59 With one click on an online advertisement, Facebook assumes it to be an endorsement worth sharing. ‘Listen to a music app, and every song will appear in ‘tickers’ of your friends… Go for a run using Nike Plus, an electronic distance calculator, your effort is logged for all to critique. Watch a movie, its title is broadcast to all you know.’60 Guvera, a music-sharing service, provides free music downloads to individuals in exchange for personal information such as their likes and dislikes, which are used by the company’s advertising partners.61 Individuals may therefore be more inclined to provide personal information if they perceive that some tangible benefit will arise from the disclosure. 54 Facebook, Statistics (14 September 2011) Facebook <http://www.facebook.com/press/info.php?statistics>. Tim Dick, ‘From private life to public knowledge’, News Review, Sydney Morning Herald (Sydney) 1 October 2011, 7. 56 Twitter, ‘One hundred million voices’ on Twitter, Twitter Blog (8 September 2011) <http://blog.twitter.com>. 57 YouTube, Statistics (14 September 2011) YouTube <http://www.youtube.com/t/press_statistics>. 58 Dick, above n 55. 59 eMarketer.com, cited in Dick, above n 55. 60 Dick, above n 55. 61 Michelle Star, ‘Guvera music site uses guerrilla advertising tactics’, C Net (15 March 2010) <http://www. cnet.com.au/ guvera-music-site-uses-guerrilla-advertising-tactics-339301774.htm>. 55 P a g e | 19 Critics also argue that Facebook cookies, which are packets of data used to track user behaviour, keep sending information to Facebook even after the user logs out, resulting in ‘silent total surveillance’.62 Facebook bluntly responded to these criticisms: ‘we don’t share information we receive about you with others’.63 However, Facebook’s privacy policy, under the heading ‘how we share information’, provides large exceptions to this rule. Facebook shares users’ information in a range of situations. For example, when it has the user’s permission, a user invites a friend to join, or for advertising and offering services. Significantly, a search engine can gain access to the name and profile picture of a user, and anything else which is set to the ‘Everyone’ setting.64 Such frictionless sharing of information is beyond individual control, unless the user leaves the site. YouTube and social networking sites have meant that the media also has access to this public and voluntarily-provided information, which has led to the creation of internet sensations, celebrities and scandals. In 2008, Olympic swimmer Stephanie Rice caused controversy over raunchy photographs of her in a police costume on her Facebook page. The photos were removed from Facebook but were then reproduced on the Daily Telegraph’s website, receiving 1.7 million hits in one week.65 In 2009, 19 year old Sydney woman Claire Werbeloff became known as the Chk-Chk-Boom-girl when her eye-witness account of a Kings Cross shooting went viral on YouTube and was later exposed as an elaborate lie. The story was covered by the Australian media, including A Current Affair. She was hounded by the press and turned to a Public Relations agency to handle the attention it caused.66 In March this year, fifteen year old Casey Haynes fought back against a schoolyard bully, with 62 Dick, above n 55. Dick, above n 55. 64 Facebook, Data Use Policy (September 2011) Facebook <http://www.facebook.com/full_data_use_policy>. 65 Angela Saurine, ‘Stephanie Rice Facebook pictures censored’, Daily Telegraph (online), April 2 2008 <http://www.dailytelegraph.com.au/news/rice-facebook-pics-censored/story-0-1111115947818>. 66 Daily Telegraph, ‘Chk Chk Boom girl Clare Werbeloff flees as Facebook fury erupts’, Daily Telegraph (online), 25 May 2009 < http://www.dailytelegraph.com.au/news/chk-chk-boom-girl-claire-werbeloff-flees-asfacebook-fury-erupts/story-e6freuy9-1225715728133>. 63 P a g e | 20 the fight being caught on camera and posted on YouTube,67 which also created a media frenzy. Currently, these individuals have no redress for invasion of their privacy. On the other hand, online anonymity has proved fatal in a number of cases. In the United States, a thirteen year old girl committed suicide after the mother of one of her school friends purported to be her boyfriend, and then told her that the world would be better off without her.68 This and other situations of cyber-bullying indicate that the law currently offers no effective solution to privacy issues online. The explosion of online information and interconnectedness therefore necessitates a comprehensive and effective education campaign so that individuals may be informed and warned about the long-term consequences of their behaviour online. A US study has revealed that 20 million Facebook users are under eighteen years of age. Over 7.5 million users are under thirteen,69 which is the stipulated minimum age of users under Facebook’s Statement of Rights and Responsibilities.70 Five million are under 10 years.71 These worrying statistics indicate that young people are placing themselves at risk of dangerous online behaviour such as cyber-bullying, and could be targeted by sexual predators. Furthermore, young people fail to appreciate the implications that online information can have for the future. 67 YouTube, Victim fights back in NSW Sydney school (16 March 2011) YouTube, <http://www.youtube.com /watch? v=isfn4OxCPQs>. 68 Mail Online, ‘Girl, 13, commits suicide after being cyber-bullied by neighbour posing as teenage boy’, Daily Mail (online) 19 November 2007 <http://www.dailymail.co.uk/news/article-494809/Girl-13-commits-suicidecyber-bullied-neighbour-posing-teenage-boy.html>. 69 Dawn.com, ‘7.5 million Facebook users are under 13’, Dawn.com (online), 12 May 2011 <http://www.dawn. com/2011/05/12/7-5-million-facebook-users-are-under-13-study.html>. 70 See Rule 4.5 in Facebook, ‘Statement of Rights and Responsibilities’ Facebook.com (online), 26 April 2011 <http://www.facebook.com/terms.php>. 71 Dawn.com, above n 69. P a g e | 21 These scenarios and studies pose the question, has the free flow of information made us less free?72 The long-term consequences may be dire for people whose personal image or information is found online and spread further by the media. Employment opportunities and personal and family relationships may be adversely affected. An interesting exercise illustrating the extent of availability of this type of information occurred at Fordham University in the United States, where a Law Professor, angered by Justice Scalia’s reluctance to support protection of personal information, set his students the task of collecting as much information about the judge as they could. The students turned in fifteen pages of information, which included his Honour’s home address, telephone number, value of his home, his wife’s personal email address, photos of his grandchildren and even his personal movie and food preferences.73 His Honour’s response was that the project was ‘perfectly legal’ but it showed ‘abominably poor judgment’.74 This type of project illustrates that once information is in the public space, it becomes public property and is therefore beyond individual control.75 The value of individual autonomy is diminished. However, this paper is not arguing that such technological advances are all negative within contemporary society. The internet provides extraordinary possibilities and limitless advantages for human welfare and collective knowledge. Some technological advancements that might impinge on privacy may in fact facilitate the common good and the public interest, for example the iPhone Application which captures a photo of anyone who tries to unlock a stolen phone and sends it to the nominated email address of the phone’s owner.76 However, there is potential for technology to be abused. For example, in August this year a male 72 Solove, above n 7, 2. Marta Neal, ‘Fordham Law Class Collects Personal Info about Scalia’ American Bar Association Journal (online) 29 April 2009 <http://www.abajournal.com/news/article/fordham_law_class_collects_scalia_ info_justice_is_steamed>. 74 Ibid. 75 Kirby, above n 1, 7. 76 CBS News, ‘Say Cheese! iPhone App catches thief’, CBS News (online), 8 October 2011 <http://www. cbsnews.com/stories/2011/10/08/scitech/main20117622.shtml>. 73 P a g e | 22 Australian Defence Force Academy cadet was charged with indecency and suspended from training after he used his mobile phone to film a female cadet in the shower.77 This paper brings into sharp focus the main challenges and policy issues raised by such technological advancements, which should be addressed by law and education. Even before the birth of the internet, American writers Warren and Brandeis acknowledged the increasing importance of privacy to the individual in modern day life: The intensity and complexity of life, attendant upon advancing civilisation, have rendered necessary some retreat from the world, and man [or woman], the refining influence of culture, has become more sensitive to publicity, so that solitude and privacy have become more essential to the individual; but modern enterprise and invention have, through invasions upon his [or her] privacy, subjected him [or her] to mental pain and distress, far greater than could be inflicted by mere bodily injury.78 In 1976, after the adoption of the ICCPR, the United Nations [‘UN’] recommended that ‘States… adopt legislation, or bring up to date existing legislation, so as to provide protection for the privacy of the individual against invasions by modern technological devices’.79 As the Honourable Justice Michael Kirby noted, the amount of publicly-available personal information is likely to increase rather than decrease: ‘Access to this information is what occasions the contemporary fragility of privacy – a human attribute that has been steadily eroded over the last century’.80 The development of modern technology and communication therefore provide very strong reasons to protect privacy and provide redress for those whose privacy is invaded. ABC News, ‘ADFA cadet suspended over shower scandal’, ABC News (online), 27 August 2011 <http://www.abc.net.au/news/2011-08-27/adfa-cadet-suspended-after-shower-scandal/2858408>. 78 Warren and Brandeis, above n 25, 196. 79 United Nations Secretary General, Respect for the privacy and integrity and sovereignty of nations in the light of advances in recording and other techniques, UN Doc E/CN.4/1116 (1976). 80 The Honourable Justice Michael Kirby, ‘Privacy in Cyberspace’ (1998) 21 University of New South Wales Law Journal 323, 325. 77 P a g e | 23 1.4. News of the World and the Phone-Hacking Scandal While we voluntarily reveal personal information everyday in the online realm, there are many situations in modern life where invasions of our privacy are out of our control. The recent behaviour by the now-defunct News of the World sent shockwaves throughout the globe when serious allegations of phone-hacking were made against the newspaper. Involved in illegal voicemail interception, News of the World engaged in ‘lawbreaking on an industrial scale.’81 Individuals’ private and innermost feelings were essentially ‘bought and sold for commercial gain.’82 Subsequent investigation of the newspaper’s actions revealed that the practice of phone-hacking was widespread within the organisation, and was openly discussed in editorial conferences, until the Editor, Andy Coulson, banned explicit reference to the term.83 News of the World hired private investigators to hack into the phones of not only the Royal family and celebrities, such as Hugh Grant and Scarlett Johansson, but also the phones of private citizens. The voicemails of victims and families of the victims of the 9/11 terrorist attacks in New York were allegedly targeted, which would have likely included ‘harrowing messages from desperate loved ones trying to make contact with their relatives’.84 News of the World was also found to have hacked into the voicemail of murdered school girl from the United Kingdom, Milly Dowler, and allegedly deleted some of Milly’s voicemails, which Australian Broadcasting Corporation, ‘Bad News’, Four Corners, 29 August 2011 (Gordon Brown). Ibid. 83 Julia May, ‘Letter reopens hacking scandal’, Sydney Morning Herald (online) 17 August 2011 <http://www. smh.com.au/world/letter-reopens-hacking-scandal-20110816-1iwka.html >. 84 Sydney Morning Herald, ‘9/11 victims ‘targeted’ by tabloid phone hackers’, Sydney Morning Herald (online), 11 July 2011 < http://www.smh.com.au/world/911-victims-targeted-by-tabloid-phone-hackers-201107111ha90.html>. 81 82 P a g e | 24 gave her family hope that she was alive.85 Furthermore, the Murdoch press was recently investigated for hacking into the computers of competitors and for engaging in industrial espionage.86 The case settled out of court for an estimated $500 million.87 Although there has been no evidence to suggest that this sort of behaviour is occurring in Australia, such events ‘put the spotlight on whether there should be a [right to privacy]’,88 and have led to widespread concern in the community.89 The phone-hacking scandal has brought into sharp focus the need for adequate privacy protection in Australia so that this kind of behaviour is discouraged and prevented. Indeed, if an Australian media organisation acted in the same fashion, they would be guilty of an offence under section 7 of the Telecommunications (Interception and Access) Act 1979 (Cth).90 However, looking more broadly and outside the phone-hacking scandal, there are major deficiencies in privacy laws in Australia, particularly where the privacy of individuals are being invaded by the media. The News of the World situation simply sheds light on the need for a closer examination of the gaps and unravelling threads in Australia’s privacy framework. 1.5. The Need for Privacy Protection Nick Davies and Amelia Hill, ‘Missing Milly Dowler’s voicemail was hacked by News of the World’, The Guardian (online) 4 July 2011 <http://www.guardian.co.uk/uk/2011/jul/04/milly-dowler-voicemail-hackednews-of-world>. 86 Scott Zamost, Todd Schwarzschild and Drew Griffin, ‘Exclusive: Videos detail News America tactics against competitors’ CNN US (online) 14 October 2011 <http://articles.cnn.com/2011-10-14/us/us_news-corpamerica_1_world-phone-hacking-scandal-news-corp-british-newspaper?_s=PM:US>. 87 CNN, ‘Tapes show News Corp. subsidiary tactics’ CNN (online) 14 October 2011 <http://edition.cnn.com/ video/#/video/crime/2011/10/13/pkg-griffin-newscorp-hacking.cnn?hpt=hp_t2>. 88 Brendan O’Connor, A Right to Privacy in Australia (21 July 2011) Attorney General <http://www.ag.gov.au/ www/ministers/oconnor.nsf/Page/MediaReleases_2011_ThirdQuarter_21July2011-ArighttoprivacyinAustralia>. 89 For example, 51% in an online poll said they had become more concerned about phone-hacking following the scandal: ‘Aussies concerned about phone-hacking’ The Age (online) 25 July 2011 <http://news.theage.com.au/ breaking-news-national/aussies-concerned-about-phone-hacking-20110725-1hwuc.html>. 90 See also Chapter Two and Appendix Table One. 85 P a g e | 25 Privacy provides individual autonomy, emotional security, the sharing of confidences and intimacies, and enhances the ability to reflect on personal values.91 Privacy is integral to an individual’s social and intimate relationships, mental health, employment, freedom and creativity.92 Invasions of privacy can occur in a myriad of ways in contemporary society. The methods by which others can invade privacy will only increase as technology advances. The law must therefore adapt continually to changes and developments in the surrounding environment. Social networking, globalisation and the free flow of information have operated to increase the amount of personal information available in the public domain, and events such as phonehacking this year have drawn attention to the failure of the law to protect personal privacy and the ease in which privacy can be invaded. Telemarketing, reality TV shows like Big Brother, the Bill Henson photography scandal93 and the prospect of introducing an Australia Card94 also indicate that privacy is a large and topical issue.95 While these situations ‘pose new and difficult issues, they are variations on the same immemorial tensions in the law in Australia: the tension between privacy and free speech, the nature of privacy, [and] the virtues and vices of gossip and shaming.’96 The means used to intrude upon individual privacy will continue to change. The reasons for privacy protection will remain the same. The law, as it stands currently, does not address these concerns. 91 Westin, above n 14, 33. Wacks, above n 18, 11. 93 Wendy Frew, ‘Artists may face classification to counter nudity’, The Age (online), 18 April 2011 <http://www.theage.com.au/entertainment/art-and-design/artists-may-face-classification-to-counter-nudity20110417-1djrv.html>. 94 Australia Card Bill 1986 (Cth). 95 The invasion of the author’s privacy has further informed the views expressed in this paper. The author’s wallet was stolen in 2010 by a drug-addicted thief at a supermarket, and later the author’s identity was stolen through posing as the author to a bank teller to take money from the author’s accounts and to take a car for a test-drive. 96 Solove, above n 7, 205. 92 P a g e | 26 2. THE CURRENT PRIVACY LAW FRAMEWORK: AUSTRALIAN AND OVERSEAS APPROACHES Do humans actually have a right to privacy? If so, where does it come from? What is its scope? How does it rank in comparison to other rights? Legal discourse has not sufficiently addressed these issues. Most privacy advocates simply assume that the right to privacy has a sound foundation.97 2.1. The Missing Cause of Action98 Privacy is a multifaceted concept which is currently protected in a piecemeal and patchy fashion, developing at different rates and in different jurisdictions, devoid of an overarching rationale.99 This is visibly evident in Appendix Table 1: Current Legal Protection of Privacy,100 which shows how different components of privacy are currently protected under Australian law. The table illustrates that privacy in general is, at best, protected incidentally. For example, criminal law and tort protect some aspects of territorial privacy101 and bodily privacy.102 Defamation law protects reputation, but only to the extent that the information published is untrue.103 Equity protects information imparted under the obligation of confidence.104 Certain statutes prevent phone-tapping and surveillance without authority.105 97 Doyle and Bagaric, above n 5, 13. New South Wales Law Reform Commission, Invasion of Privacy, Consultation Paper 1 (2007) 56 [2.85]. 99 Doyle and Bagaric, above n 5, 98. 100 See page 75. 101 Inclosed Lands Protection Act 1901 (NSW) s4; Lincoln Hunt Australia Pty Ltd v Willesee (1986) 4 NSWLR 457, 465. 102 Summary Offences Act 1988 (NSW), Crimes Act 1900 (NSW); Wilkinson v Downton [1897] 2 QB 57. 103 Defamation Act 1974 (NSW). 104 Coco v AN Clark (Engineers) Ltd. [1969] RPC 41. 105 Telecommunications (Interception and Access) Act 1979 (Cth). 98 P a g e | 27 While the most highly regulated protection of privacy occurs in the information privacy realm,106 even this statutory scheme is ‘complex, uneven, often overlapping and far from uniform throughout the country’.107 Significantly, there is no general action for breach of privacy in Australia. This creates uncertainty and inconsistency, particularly because the common law is developing at different rates and in different ways across the states and territories. This poses large difficulties for individuals and corporations who need to ‘assess the effect of the law on their operations and to implement appropriate policies to minimise their potential liability’ under the law.108 Furthermore, as exemplified by Table 1 of the Appendix, invasions of privacy by the media or other individuals would only be covered peripherally and partially by the current framework. There is essentially no one-stop-shop for privacy protection. The fabric of the Australian privacy law system is therefore inadequate. For the reasons examined below, and through evaluation of the approaches used in overseas jurisdictions, this paper argues that a statutory cause of action is the preferred method of protection for privacy. This is also generally supported by the ALRC109 and NSWLRC.110 Extending existing common law or equitable actions is not appropriate for the kind of privacy protection envisaged by this paper. This Chapter examines the inadequacies of those methods. 106 Privacy Act 1988 (Cth). Doyle and Bagaric, above n 5, 98. 108 Australian Law Reform Commission, Report 108, above n 6, vol 3, 2536, [74.2]. 109 Ibid, vol 3, 2564 [74.116]. 110 New South Wales Law Reform Commission, Report No 120, above n 2, 21-22 [4.16]-[4.17]. 107 P a g e | 28 2.2. Tort: a ‘Negligent’ Approach 2.2.1. The Case of New Zealand New Zealand takes a common law approach to protection of privacy. The privacy tort established by Hosking v Runting [2005] 1 NZLR 1 [‘Hosking’] requires two fundamental requirements to be proved – firstly, the existence of facts in which there is a reasonable expectation of privacy and secondly, the publicity of those facts are considered highly offensive to an objective reasonable person.111 The Court has regard to the particular facts of the case and the use of the offending material in the circumstances.112 However, the approach in New Zealand is narrow. In fact, the Court of Appeal in Hosking held that any all-encompassing action for breach of privacy should be ‘at the instigation of the legislature, not the courts’.113 The common law action is restricted only to invasions of privacy where the defendant gives publicity to private and personal information of the plaintiff.114 The tort does not cover intrusions upon a plaintiff’s seclusion. The tort does not protect situations where the private act or information is not publicised, for example in a peeping-Tom scenario where privacy is invaded by a neighbour looking into the home of another and viewing intimate acts or conversations. The tort also does not provide a simple test for determining what a private fact is.115 Only fifteen people have taken action under this tort, many of them without a public profile.116 111 Hosking v Runting [2005] 1 NZLR 1, [117] (Gault P and Blanchard JJ). Rogers v TVNZ [2007] NZSC 91, [59] (Tipping J). 113 Hosking v Runting [2005] 1 NZLR 1, [110] (Gault P and Blanchard JJ). 114 Hosking v Runting [2005] 1 NZLR 1, [148] (Gault P and Blanchard JJ), and [244] (Tipping J). 115 Hosking v Runting [2005] 1 NZLR 1, [110], [119] (Gault and Blanchard JJ); see also Amanda Stickley, ‘Common Law Tort of Privacy – Faltering Steps?’ (2004) 25 Queensland Lawyer 81, 82. 116 This includes lower court decisions before Hosking: Professor John Burrows, ‘Privacy and the Courts’ (Speech delivered to the Privacy Forum, Wellington New Zealand, 27 August 2008). 112 P a g e | 29 2.2.2. The Case of the United States A majority of American states provide common-law privacy protection.117 However, the original complex-of-four torts put forward by Prosser in 1960 (seclusion, appropriation, publicity and false light)118 have proved of limited effect in the United States. 119 The torts ‘failed to provide effective protection of privacy,’ 120 because of the priority afforded to free speech under the First Amendment of the United States Constitution. Whilst the privacy torts were not originally anchored in any constitutional guarantees, the Courts have since developed zones of privacy121 within a penumbra of guarantees under the Bill of Rights, in order to provide constitutional protection of privacy. 122 Despite this, constitutional privacy laws only cover narrow issues such as marriage, the family, procreation and abortion, and do not extend to information and seclusion privacy.123 This is largely due to the strength of the constitutionally-entrenched right to freedom of the press,124 and the low threshold requirement for disclosure of information: If information is newsworthy, it is generally held to be of legitimate public concern and may be published.125 117 Only Virginia, Minnesota, Rhode Island and Wisconsin do not protect privacy: see New South Wales Law Reform Commission, Consultation Paper 1, above n 98, 94 [4.7]. 118 Prosser, above n 26, 389. 119 Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2540 [74.19]. 120 David A Anderson, ‘The Failure of American Privacy Law’ in Basil S Markensis (ed) Protecting Privacy: The Clifford Chance Lectures Volume 4 (Oxford University Press, 1999) 151. 121 New South Wales Law Reform Commission, Consultation Paper 1, above n 98, 97-98 [4.15]. 122 Griswold v Connecticut 381 US 479 (1965). 123 Mason, above n 28, 47. 124 United States Constitution First Amendment. 125 Restatement (Second) of Torts § 652D. P a g e | 30 2.2.3. A Privacy Tort in Australia? A common law tort for invasion of privacy is not an adequate avenue for protecting privacy in Australia. Statute is preferred over common law development. Minister for Privacy and Freedom of Information, Brendan O’Connor, announced in July 2011 that the government supports a statutory right to sue for serious privacy invasions, ‘rather than letting the system of privacy regulation evolve in an ad-hoc way through court decisions.’126 Simply plugging the gaps in Australian privacy law by extending existing common law causes of action is not preferred.127 Furthermore, the Courts are unwilling to allow such a development. For sixty years, Australian Courts rejected the proposition that there was a tortious action for invasion of privacy.128 In 2001, the High Court in Lenah held that the authority in Victoria Park Racing129 did not stand in the way of developing a tort for invasion of privacy, therefore extending an invitation130 to the common law to create the action. However, no Court has yet taken this bold step.131 The District Court of Queensland and Victorian County Court represent some of the only Courts to hold that such a step is a logical and desirable one to take.132 Yet, in the latter Court, the decision was appealed and eventually settled, therefore providing no definitive precedent.133 Other Courts continue to reject tortious claims for invasion of privacy.134 Murphy, Katharine, ‘Canberra to move on Privacy Law’, The Age (online) July 21 2011 <http://www.theage. com.au/national/canberra-to-move-on-privacy-law-20110720-1hp19.html#ixzz1T58aRPfx>. 127 New South Wales Law Reform Commission, Report No 120, above n 2, 19 [4.11]. 128 Victoria Park Racing and Recreation Grounds Company Limited v Taylor (1937) 58 CLR 479. 129 Victoria Park Racing and Recreation Grounds Company Limited v Taylor (1937) 58 CLR 479, 496. 130 Amanda Stickley, ‘Personal Privacy: Boldly Going Where No Australian Court Has Gone Before: Part I’ (2003) 24 Queensland Lawyer 72. 131 Grosse v Purvis [2003] QDC 151 (16 June 2003) (Skoien J). 132 Grosse v Purvis [2003] QDC 151 (16 June 2003) (Skoien J) [442]. 133 Australian Broadcasting Commission v Jane Doe [2007] VCC 281. 134 See, eg, Giller v Procopets [2004] VSC 113; Kalaba v Commonwealth of Australia [2004] FCA 763; Milne v Haynes [2005] NSWSC 1107; Moore-Mcquillan v Work Cover Corporation SA [2007] SASC 55; 126 P a g e | 31 The Lenah High Court had the opportunity to create a tort for invasion of privacy. However, given this chance, it refused recognition, therefore failing ‘on all counts’135 to protect privacy generally. The reluctance of the common law to find a cause of action for invasion of privacy therefore exemplifies why the common law is inadequate to protect privacy in any concrete and measurable way. 2.3. Equity: the new fusion fallacy 2.3.1. The Case of the United Kingdom Like Australia, the United Kingdom ‘knows no common law tort of invasion of privacy’.136 Furthermore, previous attempts at legislative reform in the UK failed at the first hurdle.137 However, without a general or ‘freestanding’ right to privacy, the UK’s equitable action for breach of confidence138 evolved instead, representing a rights-based approach to privacy protection.139 This was driven partly by the heavy hand of international privacy obligations contained in Article 8 of the ECHR,140 which was ratified to some extent in the Human Rights Act 1998 (UK).141 Significantly, however, the Act also upholds the right to freedom of expression,142 which is manifested within Article 10 of the ECHR.143 Both rights are 135 New South Wales Law Reform Commission, Invasion of Privacy, Consultation Paper 1, above n 98, 55 [2.80]. 136 OBG v Allan; Douglas v Hello! Ltd [2007] 2 WLR 920, [272]; see, eg, in Australia, Victoria Park Racing and Recreation Grounds Co Ltd v Taylor (1937) 58 CLR 479 and the decline of the High Court in Lenah to create a tort for invasion of privacy. 137 See, eg, Right of Privacy Bill 1961 (UK), Right of Privacy Bill 1967 (UK), Right of Privacy Bill 1969 (UK), Right of Privacy Bill 1987 (UK), Right of Privacy Bill 1989 (UK). 138 Which traditionally is comprised of the elements from Coco v AN Clark (Engineers) Ltd [1969] RPC 41, which require the information to be confidential, imparted in circumstances where there is an obligation of confidence, and the unauthorised use of that information is detrimental. 139 Lindsay, above n 21, 4. 140 Convention for the Protection of Human Rights and Fundamental Freedoms, opened for signature 4 November 1950, 213 UNTS 221 (entered into force 3 September 1953) Article 8. 141 Human Rights Act 1998 (UK) ss2, 6. 142 Human Rights Act 1998 (UK) s12. 143 Convention for the Protection of Human Rights and Fundamental Freedoms, opened for signature 4 November 1950, 213 UNTS 221 (entered into force 3 September 1953) Article 10. P a g e | 32 considered to be prima facie equal and are weighed against each other by the courts using a proportionality test.144 However, such an extension within the traditional interpretation of the equitable cause of action represented an attempt to fit a square peg in a round hole. The second element for breach of confidence – that the information was imparted in circumstances giving rise to an obligation of confidence145 – finds no solace in privacy protection. This is because many instances of privacy violation occur where there is no pre-existing relationship of confidence. Media organisations, for example, do not have fiduciary duties to ordinary members of the public. The obligation of confidence would have to arise once the defendant has unlawfully or surreptitiously acquired the information that he or she should have known was ‘not free to use’,146 which is counter-intuitive and would represent a significant leap for Courts of Equity to make. 2.3.2. Extending breach of confidence in Australia? The idea that the equitable action for breach of confidence can protect privacy interests in Australia is not new.147 Rivette argues that the case of Giller v Procopets (2008) 40 FamLR 378 gives breach of confidence the ‘teeth to respond to invasions of privacy arising from the non-consensual disclosure of personal information’.148 Read with Lenah, Rivette argues that there may be an actionable breach of confidence in the case of a secretly-obtained photograph or piece of information by the media, where that material is considered private if its 144 Ash v McKennitt [2007] 3 WLR 194, [46]. Coco v AN Clark (Engineers) Ltd [1969] RPC 41. 146 Ash v McKennitt [2007] 3 WLR 194, [8]. 147 There are a large number of academic articles on the overlap between breach of confidence and privacy, which are beyond the scope of this paper. 148 Michael Rivette, ‘Litigating privacy cases in the wake of Giller v Procopets’ (2010) 15 Media and Arts Law Review 283. 145 P a g e | 33 disclosure would be highly offensive to a reasonable person of ordinary sensibilities.149 While at first blush, this approach may seem to adequately address the concern, such an approach in reality is a toothless tiger for several reasons. To begin with, confidentiality and privacy are ‘simply different concepts. While most confidential acts and information could arguably be described as private, not all private activity is necessarily confidential.’150 To reconcile the two would entail trying to fit a square peg in a round hole.151 Plaintiffs would be left without redress.152 Breach of confidence is traditionally used to protect information imparted under the fiduciary obligation of confidence. Breach of confidence is not, under its current construction, suited to all situations where one person invades the privacy of another, particularly when the parties involved are strangers and do not hold obligations of confidence to one another. Only intrusions of privacy which result in actual publication are actionable under the current test for breach of confidence, no matter how ‘strong and understandable may be the feeling of harassment of a person who is hounded by photographers’153 or the media. This would mean that the plaintiff in Australian Broadcasting Commission v Jane Doe [2007] VCC 281 would have an equitable action in breach of confidence, because she was identified on television as a victim of rape.154 Conversely, the plaintiff in Grosse v Purvis [2003] QDC 151 would not, because the privacy action related to stalking and other acts that were not publicised by the 149 Ibid, 289. New South Wales Law Reform Commission, Invasion of Privacy, Consultation Paper 1, above n 98, 54 [2.80]. 151 Johnston, Mark, ‘Should Australia force the square peg of privacy into the round hole of confidence or look to a new tort?’ (2007) 12 Media and Arts Law Review 441. 152 New South Wales Law Reform Commission, Invasion of Privacy, Consultation Paper 1, above n 98, 56 [2.84]. 153 R Toulson, ‘Freedom of Expression and Privacy’ (Paper presented at Association of Law Teachers Lord Upjohn Lecture, London, 9 February 2007), 7; quoted in Australian Law Reform Commission, Report No 108, above n 6, 2564. 154 In this case, the ABC had reported on a court case concerning the plaintiff’s husband. The television broadcasts identified his name, the offence of rape within marriage which he was convicted with, the suburb in which they lived, and the victim’s name (which included her maiden name, which she reverted to after the rape). The plaintiff took action against the Australian Broadcasting Corporation (ABC) for, amongst other claims, breach of privacy and breach of confidence, and was successful in obtaining compensation. 150 P a g e | 34 media.155 This approach would thereby create inconsistency if it were applied in Australia, particularly given the reticence of the courts toward providing equitable privacy protection at the present time. Additionally, confidentiality actions are creatures of equity. Equitable protection of privacy would therefore only attach to information that ought not to be disclosed, without any real regard for the intrinsic value of the information itself.156 Furthermore, not all privacy actions are information-related. Interference with personal bodily privacy157 would not be covered under an extension of the breach of confidence doctrine. Finally, mere emotional distress will often be the only damage for which a plaintiff claims as a result of an invasion of privacy. However, there appears to be no Australian authority to support equitable damages or equitable compensation to be awarded for mental distress alone. While Neave and Ashley JJA relied upon English authority to support a finding of equitable compensation in Giller v Procopets,158 this is an approach that is simply not applicable in Australia.159 Moreover, Australia does not have a Bill of Rights statute upon which to base that action. Extending the breach of confidence action to cover privacy cases is inappropriate, and stretches the limits such that the core of both actions is compromised. The two actions should be separate. 155 In this case, the plaintiff claimed breach of privacy, amongst other claims, for acts of stalking, intimidation, abusive phone calls and other acts by the defendant. 156 New South Wales Law Reform Commission, Report No 120, above n 2, 55 [2.82]. 157 See, eg, Wainwright v Home Office [2004] 2 AC 406. 158 Giller v Procopets (2008) 40 Fam LR 378. 159 Michael Tilbury, ‘Remedies for breach of confidence in privacy contexts’ (2010) 15 Media and Arts Law Review 290, 291. P a g e | 35 2.4. A Statutory Solution A small number of jurisdictions have created statutory protection for privacy. Australia is therefore in a unique position to draw upon the benefits of the jurisdictions with successful legislation, and also to learn from and avoid failures of other jurisdictions. For example, some provinces of Canada and some American states provide general statutory protection for privacy; however the laws are not uniform across the countries. Ireland160 and Hong Kong161 have considered passing legislation which create causes of action for invasions of privacy, however both countries’ respective parliaments have not yet passed any laws. Appendix Table Two: ‘Elements, Defences and Remedies in Privacy Statutes from Overseas Jurisdictions’ compares these jurisdictions.162 Consideration of these approaches is essential to creating the most successful proposal in the Australian context. 2.4.1. The Case of North America The Canadian Provinces of Saskatchewan,163 Manitoba,164 Newfoundland165 and British Columbia166 each passed privacy legislation creating statutory torts for violation of privacy. All four jurisdictions create a tort, actionable without proof of damage, for a person who wilfully and without claim of right, violates the plaintiff’s privacy without their consent or lawful authority.167 160 161 Ireland Working Group on Privacy, Report of Working Group on Privacy (2006). Hong Kong Law Reform Commission, Civil Liability for Invasion of Privacy (2004) 139 [Recommendation 2]. 162 See page 81. Privacy Act 1978 RSS (Saskatchewan) c P-24. 164 Privacy Act 1987 CCSM (Manitoba). 165 Privacy Act 1990 RSNL (Newfoundland and Labrador). 166 Privacy Act 1996 RSBC (British Columbia). 167 British Columbia also creates a tort for unauthorised use of name or portrait. 163 P a g e | 36 Manitoba utilises a higher threshold for the elements of the action by requiring the violation to be substantial, unreasonable and without a claim of right.168 However, even in the other three Canadian jurisdictions maintaining lower thresholds, there have been few actions for violation of privacy, and plaintiffs have successfully instituted such actions in only 25% of the cases.169 Furthermore, nominal damages and exorbitant litigation costs have meant that ‘the tort of privacy has achieved little’170 in terms of social utility. Each province, except for British Columbia, provides a non-exhaustive list of examples of the types of violations of privacy which would come under the tort, including auditory surveillance, listening to conversations, using a person’s name or likeness in advertising, and use of personal documents. Each province lists defences171 for the tort, which include consent, lawful right, public interest, exercising duties of peace officers, reasonable news gathering172 and defamation privileges. Each province, except for British Columbia, also provides a range of remedies, including damages, injunctions, account of profits and destruction of the offending material. There is limited statutory protection of privacy in the United States, however this is also piecemeal. Some states simply recognise or alter the common law torts through statute. 173 The California Civil Code creates a range of statutory torts. For example, the tort of entering land with the intent to capture images, sound recordings or physical impressions of the plaintiff engaging in a personal or familial activity, which is proved in situations where physical invasion occurs in a manner that is offensive to a reasonable person.174 The 168 Privacy Act 1987 CCSM (Manitoba) s 2(1). New South Wales Law Reform Commission, Consultation Paper 1, above n 98, 84 [3.49]. 170 Chester, Murphy and Robb, above n 38, 359. 171 British Columbia uses the term ‘exception’ instead of ‘defence’. 172 Only in Saskatchewan. 173 See, eg, Code of Virginia §§ 8-650, c671; 765 Illinois Consolidated Statutes 1075/10 9; New York State Consolidated Laws, Civil Rights §50. 174 California Civil Code 1998 §1708.8(a). 169 P a g e | 37 Massachusetts General Law also provides that a person has ‘a right against unreasonable, substantial or serious interference with his privacy. The superior court shall have jurisdiction in equity to enforce such right and in connection therewith to award damages.’175 However, like Australia, the United States has a piecemeal and patchy framework for protection of privacy. Such an approach lacks consistency and uniformity – two factors that are highly valued in any legal system. Australia can and should learn from the successes and failures in overseas jurisdictions in order to formulate the best possible approach to privacy protection. 2.4.2. A Statutory Approach in Australia This paper strongly endorses a statutory approach to the protection of privacy. The reluctance of the common law to develop, and the inadequacy of equity to formulate the action for invasion of privacy, provides the impetus for statutory reform within the privacy law area. A statutory cause of action ‘avoids the problems inherent in attempting to fit all the circumstances that may give rise to an invasion of privacy into a pre-existing cause of action.’176 Moreover, a statutory scheme provides a more ‘flexible approach to defences and remedies’,177 is not constrained by rules or assumptions of torts or equity, and allows for explicit consideration of competing public interests.178 While the Canadian and United States statutes provide some guidance as to the wording of legislation relating to invasions of privacy, the fact that they are inconsistent nationwide means that the Australian approach should be uniform and dependent on the unique Australian legal, social and political context. The following two chapters will explore the Australian statutory reform options in detail. 175 Massachusetts General Laws, Part III Courts, Judicial Officers and Proceedings in Civil Cases, Title I Courts and Judicial Officers, Chapter 214 Equity Jurisdiction, Section 1B. 176 Australian Law Reform Commission, Report No 108, above n 6, 2564 [74.116]. 177 Ibid. 178 Ibid, vol 3, 2565 [74.117]-[74.118]. P a g e | 38 3. PREVIOUS ATTEMPTS AT REFORM The pattern is familiar. Private lives are made public spectacle by the tabloids. A general sense of unease ensues. Politicians appear to fret. Judges lament the incapacity of the common law to help. Committees are established. ‘Privacy’ legislation is proposed. Alarms are sounded by the quality press about the onslaught against freedom of speech. Inertia settles on politicians, reluctant to offend newspaper editors. The debate subsides until the next series of sensationalist disclosures.179 The call for privacy reform in Australia is well established. Both the ALRC and NSWLRC recently recommended the overhaul of the privacy law framework and the creation of a statutory cause of action for invasions of privacy. The Victorian Law Reform Commission also recommended privacy reform; however it proposed two narrow causes of action;180 one related to misuse of private information181 and the other related to intrusion upon seclusion.182 This paper focuses on the federal and NSW proposals. In 2008 and 2009, the ALRC and NSWLRC worked together with the common aim of creating a statutory cause of action for invasions of privacy, to be introduced under a uniform legislative framework. The NSWLRC took primary responsibility of formulating the proposals.183 Nonetheless, there are some differences in approach between the federal and State Commissions, and these are illustrated in Appendix Table 3: ‘Comparison of 179 Wacks, above n 39, 1. Victorian Law Reform Commission, Surveillance in Public Places, Report No 18 (2010) 149 [Recommendation 22]. 181 Ibid, 150 [Recommendation 23]. 182 Ibid, 151 [Recommendation 24]. 183 Australian Law Reform Commission, Review of Australian Privacy Law, Discussion Paper 72 (2007) 26-28, [Proposals 5-1 – 5-7]. 180 P a g e | 39 Recommendations for a Statutory Cause of Action in Australia’.184 Ultimately, both recommended change to Australian privacy law in the form of a statutory cause of action for invasion of privacy. This chapter examines, compares and evaluates these recommendations185 in light of recent developments. 3.1. The Australian Law Reform Commission Report The ALRC’s 2008 Report, For Your Information: Australian Privacy Law and Practice, was, amongst numerous other aims,186 designed to create a statutory cause of action for serious invasions of privacy. Chapter 74 of the Report contains 7 recommendations related to the statutory cause of action.187 The ALRC recommended that the cause of action be contained in a separate federal statute.188 This aimed to reduce inconsistencies and confusion, particularly surrounding the Privacy Act 1988 (Cth) which already deals with information privacy. The ALRC recommended that all other common law actions for invasion of privacy (if any) be abolished, in order to ensure the consistency and primacy of the legislation.189 A new statute would also result in national uniformity, as the statute would cover federal, state and territory jurisdictions. However, the ALRC noted that it would be a matter for government to decide how best to achieve consistency if the states and territories enacted mirror legislation.190 184 See page 86. The proposals of the VLRC are not dealt with in detail in this paper. 186 There were 295 recommendations in the Report. For example, the ALRC sought to redraft the Privacy Act in order to create Unified Privacy Principles that apply to public and private sector agencies. 187 Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2535-2586. 188 Ibid, vol 3, 2583 [74.195]. 189 Ibid, vol 3, 2586 [Recommendation 74-6]. 190 Ibid, vol 3, 2582 [74.191]. 185 P a g e | 40 The ALRC took a conservative approach to the cause of action. The cause of action relates to serious invasions of privacy,191 thereby importing a higher threshold for actionability than the NSWLRC, which recommended a cause of action for invasions of privacy without the need for the invasion to be serious.192 This was consciously intended by the ALRC to ensure that privacy’s concomitant, the public interest in freedom of expression, was not unjustifiably curtailed.193 The ALRC also recommended that the requisite mental element be limited to intentional or reckless acts by the respondent.194 This means that accidental invasions are not actionable under the statute, for example through photography or street art.195 The test to establish a serious invasion of privacy requires both a reasonable expectation of privacy in all the circumstances, and the act must be ‘highly offensive to a reasonable person of ordinary sensibilities’.196 Consent is also an essential element of the cause of action at this stage of the inquiry.197 Notably, privacy is not defined by the ALRC. The ALRC specified that the court take into account ‘whether the public interest in maintaining the claimant’s privacy outweighs other matters of public interest’,198 including matters of public concern and freedom of expression, when determining whether there has been an invasion of privacy. This reflects the need to balance the public interest in maintaining the claimant’s privacy with the public interest in freedom of expression, which is a delicate process. By placing consideration of public interest at the forefront as an element of the cause of action, and not as a defence to the action, the ALRC places the competing 191 Cf New South Wales Law Reform Commission, which recommended an action for invasion of privacy without the need for a degree of seriousness: New South Wales Law Reform Commission, Report No 120, above n 2, 8 [3.2]. 192 See page 42 under the heading: 3.2 ‘New South Wales Law Reform Commission Report’. 193 Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2568 [74.135]. 194 Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2585 [Recommendation 74-3(c)]. 195 Ibid, vol 3, 2569 [74.136]. See also SBS, ‘Privacy’, Insight Program, 25 October 2011 (Cherine Fahd). 196 Ibid, vol 3, 2568 [74.133]-[74.135]; Australian Broadcasting Corporation v Lenah Game Meats (2001) 208 CLR 199 at [42] (Gleeson CJ). 197 Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2575 [74.159]. 198 Ibid, vol 3, 2584 [Recommendation 74-2]. P a g e | 41 rights on equal footing.199 This contrasts with the Canadian approach, which identifies reasonable news gathering200 and the public interest and fair comment201 as defences to the cause of action. The ALRC recommended including a non-exhaustive list of the types of invasion that might fall within the cause of action. These comprise of factual scenarios in which there has been a) interference with home or family life; b) unauthorised surveillance; c) interference, misuse or disclosure of an individual’s correspondence; and d) disclosure of sensitive facts about an individual’s private life.202 This is a useful method to indicate legislative intention, and assists courts with developing the scope of the action.203 This mirrors the Canadian statutory approach, which also provides a non-exhaustive list of examples.204 The ALRC recommended that the cause of action be brought only by natural persons, 205 on the basis that the ‘desire to protect privacy is founded on notions of individual autonomy, freedom and dignity’,206 which are values that do not extend after death. The ALRC recommended providing an exhaustive list of the possible defences to the action. The list contains three main defences: acts or conduct incidental to the exercise of a lawful right of defence or person or property, conduct required or authorised by law, and the 199 Ibid, vol 3, 2572 [74.147]. Privacy Act 1978 RSS (Saskatchewan) c P-24 s4(1)(e). 201 Privacy Act 1978 RSS (Saskatchewan) c P-24 s4(2); Privacy Act 1987 CCSM (Manitoba) s5(f)(i), (iii); Privacy Act 1990 RSNL (Newfoundland and Labrador) s5(2)(a); Privacy Act 1996 RSBC (British Columbia) s2(3)(a). 202 Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2584 [Recommendation 74-1]. 203 Ibid, vol 3, 2565 [74.119]. 204 Privacy Act 1978 RSS (Saskatchewan) c P-24 s3; Privacy Act 1987 CCSM (Manitoba) s3; Privacy Act 1990 RSNL (Newfoundland and Labrador) s4. 205 Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2585 [Recommendation 74-3(a)]. 206 Ibid, vol 3, 2576 [74.160]. 200 P a g e | 42 publicised information was privileged under the law of defamation.207 The ALRC took a restrictive approach to defences, choosing not to include defences such as consent, rebutting an untruth or information already being in the public domain. The defences are unnecessary because the public interest and consent are both addressed in the elements of the cause of action.208 The ALRC recommended that a Court be empowered to choose the most appropriate remedy to the factual circumstances before it, free from jurisdictional constraints.209 The proposed legislation provides a non-exhaustive list of remedies. These include, but are not limited to, damages (including aggravated but not exemplary damages), account of profits, injunctions, apology orders, correction orders, destruction orders, and declarations (for example a declaration stating that an invasion of privacy has occurred).210 The ALRC further recommended that the cause of action be actionable without proof of damage.211 This enables individuals to claim damages for humiliation, insult212 and emotional distress they have suffered as a result of invasion of their privacy.213 Finally, the ALRC recommended that the Office of the Privacy Commissioner provide information to the public concerning the cause of action,214 so that the public may be informed of their rights and responsibilities under the statute. 207 Ibid, vol 3, 2585 [Recommendation 74-4]. Ibid, vol 3, 2578 [74.174]. 209 Ibid, vol 3, 2579 [74.176]. 210 Ibid, vol 3, 2585 [Recommendation 74-5]. 211 Ibid, vol 3, 2585 [Recommendation 74-3(b)]. 212 Ibid, vol 3, 2577 [74.167]. 213 See also Privacy Act 1978 RSS (Saskatchewan) c P-24 s2; Privacy Act 1987 CCSM (Manitoba) s2(2); Privacy Act 1990 RSNL (Newfoundland and Labrador) s3(1); Privacy Act 1996 RSBC (British Columbia) s1(1), which provide the statutory tort is actionable without proof of damage. 214 Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2586 [Recommendation 74-7]. 208 P a g e | 43 3.2. The New South Wales Law Reform Commission Report In 2009, the NSWLRC released its Report, Invasion of Privacy. The Report was solely dedicated to formulating a cause of action for invasions of privacy, unlike the ALRC Report which made 288 recommendations that were unrelated to the cause of action. The appendix to the NSWLRC Report contained a draft of the wording of the proposed legislation, called the Civil Liability Amendment (Privacy) Bill 2009,215 expressed as a Schedule to the Civil Liability Act 2002 (NSW). This differs to the ALRC’s proposal, which recommended a separate statute. Significantly, the NSWLRC recommended an objects clause. The ALRC did not. The clause recognises the importance of protecting privacy and the need to balance the right against other interests. The clause also identifies the aims of the legislation, which are to create a statutory cause of action and to provide remedies to individuals for invasions of privacy.216 The objects clause therefore provides clear legislative intent. This is essential given that the cause of action is a new concept, and Courts may require assistance with interpreting and applying the statute. The NSWLRC expressed support for a lower threshold than the ALRC to establish a prima facie case for a statutory cause of action. The action simply requires an invasion of privacy, 215 Civil Liability Amendment (Privacy) Bill 2009, cited in New South Wales Law Reform Commission, Report No 120, above n 2, 84-92. 216 Civil Liability Amendment (Privacy) Bill 2009 s72, cited in New South Wales Law Reform Commission, Report No 120, above n 2, 84. P a g e | 44 therefore not restricting liability to serious invasions.217 This is a favourable approach given the: [A]bsence of any broad protection of privacy in civil law; the detrimental effects on privacy of an increasingly invasive social environment; the desirability of giving effect to Australia’s obligations under international law; the need for more general protection of privacy suggested by consideration of the law of other jurisdictions… and the recent weakening of privacy protection in defamation law.218 The test states that an individual’s privacy is invaded ‘if the conduct of another person invaded the privacy that the individual was entitled to expect in all the circumstances having regard to any relevant public interest,’219 which includes the interest of the public in being informed of matters of public concern. This is a wider formulation than the ALRC’s qualified test. However, its objective nature still restricts trivial and unduly sensitive220 claims from being brought before the courts.221 Like the ALRC, the NSWLRC recommends that only natural persons can bring actions under the statute,222 and that consent will vitiate actionability.223 The issue of balancing the right to privacy with the public interest is dealt with as an element of the action, similar to the ALRC’s approach. Fundamental social values and norms, such as free speech, safety, security, health and justice, are weighed up against the asserted interest in 217 New South Wales Law Reform Commission, Report No 120, above n 2, 8 [3.2]. Ibid, 11 [4.1]. 219 Civil Liability Amendment (Privacy) Bill 2009 s74(2), cited in New South Wales Law Reform Commission, Report No 120, above n 2, 85. 220 Campbell v MGN Ltd [2004] 2 AC 457 at [94] (Lord Hope). 221 New South Wales Law Reform Commission, Report No 120, above n 2, 27 [5.9]. 222 Ibid, 71 [10.1]. 223 Ibid, 46 [5.46]; and see Civil Liability Amendment (Privacy) Bill 2009 s74(4) at page 86 of the Report. 218 P a g e | 45 privacy in order to determine which is to be preferred in the circumstances.224 At the same time, the NSWLRC acknowledges that those interests are not always at loggerheads. Indeed, the values that underpin freedom of expression such as autonomy and liberty may also underpin some privacy interests. Courts must therefore perform incisive and targeted analysis with regard to the facts of the case.225 Importantly, competing interests are of equal weight, with no interest necessarily trumping another one. The Courts must therefore engage in exercises of proportionality.226 Like the ALRC, the NSWLRC did not attempt to define privacy, instead opting for a statutory cause of action which identifies the ‘general conditions in which an invasion of privacy is actionable’.227 However, the NSWLRC does not list the types of invasion of privacy which might come under the statute,228 instead leaving this entirely up to the courts. Despite this, the court is guided through eight matters which must be taken into account in determining actionability: the nature of the subject matter; nature of the invasion; the relationship between the parties; whether the claimant has a public profile and whether it affects actionability; vulnerability; conduct before and after the invasion; the effect of the invasion on health, welfare and emotional wellbeing; whether the conduct contravenes an Australian law; and any other matter that the court considers relevant in the circumstances.229 This facilitates flexibility in the common law interpretation of the statute, and ensures that each case turns upon its own merits. The NSWLRC’s proposal neither specified the requisite mental element for the action, nor specified the proof of damage required. The ALRC’s proposal was clear on these points. 224 New South Wales Law Reform Commission, Report No 120, above n 2, 31 [5.15]. Ibid, 21 [4.15]. 226 Ibid, 33 [5.17]. 227 Ibid, 6 [1.8]. 228 However the initial Consultation Paper did recommend providing a non-exhaustive list of the types of invasions of privacy, similar to the ALRC. 229 New South Wales Law Reform Commission, Report No 120, above n 2, 34-46; and see Civil Liability Amendment (Privacy) Bill 2009 s74(3) at pages 85-86 of the Report. 225 P a g e | 46 The NSWLRC argued that specification was not required because the cause of action is statutory and not tortious.230 The same reasoning applies to the NSWLRC’s remedies recommendation, proposing the term ‘compensation’ instead of damages because it reflects a more statutory approach.231 The NSWLRC recommended very similar defences to the ALRC, but added two more. Clause 75(1)(d) of the proposed legislation provides a defence where the defendant publishes the matter as an agent or employee of a subordinate distributor, and the defendant ought not to have known (but not through any negligence) that publication of that matter constituted an invasion of privacy.232 Secondly, it is a defence under clause 75(1)(e) of the legislation that the defendant had a corresponding duty to give and have the published information.233 This defence mirrors the qualified privilege defence in defamation law and would cover the situation where, for example, a defendant publishes, to a prospective employer, personal information about the plaintiff, in a reference, that is relevant to the job.234 The NSWLRC therefore takes a less restrictive approach to excusing actionability under the statute and places more focus on defamation defences than the ALRC. Clause 76 of the NSWLRC draft legislation lists a range of remedies available to a Court to grant in the event of an invasion of privacy under the statute. The Court is also given discretion to consider any other relief that would be necessary in the circumstances,235 which the NSWLRC identifies as possibly including asset preservation orders, search orders and 230 New South Wales Law Reform Commission, Report No 120, above n 2, 50-51 [5.56]-[5.57]. Ibid, 49 [5.54]. 232 Civil Liability Amendment (Privacy) Bill 2009 s75(1)(d); in New South Wales Law Reform Commission, Report No 120, above n 2, 86-87. 233 Civil Liability Amendment (Privacy) Bill 2009 s75(1)(e); in New South Wales Law Reform Commission, Report No 120, above n 2, 87. 234 New South Wales Law Reform Commission, Report No 120, above n 2, 55-56 [6.12]. 235 Civil Liability Amendment (Privacy) Bill 2009 s76(1)(e); in New South Wales Law Reform Commission, Report No 120, above n 2, 88. 231 P a g e | 47 variation of contract.236 The remedies are largely parallel to the ALRC recommendations,237 although the NSWLRC prefers prohibitory orders over injunctions, because of the statutory nature of the cause of action.238 There is also a significant monetary restriction under the NSWLRC Report which is absent in the ALRC’s proposal. The NSWLRC recommends a $150,000 cap on compensation for non-economic loss.239 While the ALRC is silent on the limitation period for the action, the NSWLRC’s proposal specifies a one year limitation period, accruing from the date of the defendant’s conduct. 240 The period may be extended for up to three years if reasonable in the circumstances. 241 Unlike the ALRC, the NSWLRC does not recommend an education campaign. 3.3. The Australian Government’s Response The Australian Government has only embarked upon Stage One of its response to the changes proposed by the ALRC, addressing 197 of the 295 recommendations made in the ALRC’s Report.242 However, Stage One did not include the recommendations surrounding the statutory cause of action that are under consideration in this paper. The Government decided to postpone addressing those particular recommendations until the Second Stage 236 New South Wales Law Reform Commission, Report No 120, above n 2, 58 [7.7]. Civil Liability Amendment (Privacy) Bill 2009 s76; in New South Wales Law Reform Commission, Report No 120, above n 2, 87-88. 238 New South Wales Law Reform Commission, Report No 120, above n 2, 63 [7.17]. 239 Civil Liability Amendment (Privacy) Bill 2009 s77; in New South Wales Law Reform Commission, Report No 120, above n 2, 88; and see New South Wales Law Reform Commission, Report No 120, above n 2, 61-62 [7.13]. 240 Amendment of Limitation Act 1969 (Cth) s14C; in New South Wales Law Reform Commission, Report No 120, above n 2, 91. 241 Amendment of Limitation Act 1969 (Cth) s56E; in New South Wales Law Reform Commission, Report No 120, above n 2, 91. 242 Commonwealth, Australian Government First Stage Response to the Australian Law Reform Commission Report 108 For Your Information: Australian Privacy Law and Practice, Cabinet, October 2009, 5 (Joe Ludwig). 237 P a g e | 48 Response due to the ‘complexity and sensitivity’243 of the proposals to particular interest groups in Australian society. This is also so that the foundations of privacy reform could be laid down first. Despite this delay, an Issues Paper released in September 2011 has called for submissions and comments from the Australian public244 on the elements, defences and remedies of the proposed cause of action.245 This provides renewed support for the statutory cause of action to be enacted in Stage Two of the Government Response. 243 Ibid, 14. The author has submitted this dissertation for consideration by the Department of Prime Minister and Cabinet, following the release of the Issues Paper. 245 Commonwealth, above n 43, 51. 244 P a g e | 49 4. REFORM PROPOSALS: THE INVASION OF PRIVACY ACT 2011 (CTH) It is most surprising that the Australian courts have yet to develop common law or equitable principles for breach of privacy in Australia. Australia is becoming increasingly out of step with other common law jurisdictions in this regard. It may well be that the courts would be amenable to such a development, should the right case come before them. In the absence of common law or equitable protection, there is good justification for the development of legislation to fill the void.246 Disappointingly, progress in the privacy law area tends to fall idle to media pressure and political inertia. This is due in part to the eagerness of politicians247 to continue good relations with the papers that portray them so as to avoid the enmity of the two main players in the Australian press – Fairfax and Murdoch. This is particularly pertinent because the Murdoch press controls 68% of capital city and national newsprint in Australia.248 In 2011, Australia faces new challenges. Potential phone-hacking and the explosion of social network use in Australia now threaten the value of privacy further. This has led to a gap in the 246 Centre for Law and Genetics, PR 127 to Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, 16 January 2001. 247 There are many sex scandals involving politicians that are featured heavily in the media, for example NSW Transport Minister David Campbell using his ministerial car to visit gay sex clubs while he was married with children [see McDonald, Timothy, ‘Campbell sex scandal sparks privacy debate’, ABC News (online), 22 May 2010 <http://www.abc.net.au/news/2010-05-21/campbell-sex-scandal-sparks-privacy-debate/836580>]. Another example which occurred this year is Federal Member for Labor, Craig Thompson, who has been accused of using a union credit card to pay for prostitutes [see Steve Lewis et al, ‘Craig Thompson scandal deepens with allegations of a $70,000 spending spree on a union credit card’, Daily Telegraph (online), 22 August 2011 <http://www.dailytelegraph.com.au/news/craig-thomson-scandal-deepends-with-allegations-of-a-70000spending-spree-on-a-union-credit-card/story-e6freuy9-1226119221232>]. 248 Kim Jackson, Media Ownership Regulation in Australia, (19 October 2011) Parliamentary Library <http://www.aph.gov.au/library/intguide/sp/media_regulations.htm>. P a g e | 50 literature. While the previous Law Reform Commission Reports form the academic literature upon which this paper is based and canvass the steps to be taken to formulate the cause of action, the emerging threats and developments in contemporary Australian society require further analysis and review in order to adapt the cause of action to the climate in 2011 and beyond. Reform to the privacy area requires a back to basics approach.249 This involves creating a new cause of action from the ground up, without recourse to the existing plethora of laws that might incidentally protect privacy or those which could be extended to cover privacy in a limited way. 4.1. New Federal Statute As discussed in Chapter Two, common law and equitable solutions are not appropriate ways to tackle the issue of privacy in Australia. This paper strongly recommends creating new federal legislation. A new statute would reduce public confusion and would avoid the incidental and patchy protection currently provided by a range of laws and forms of law, as exemplified in Appendix Table 1. A name such as the Invasion of Privacy Act 2011 (Cth)250 would communicate the legislation’s purpose effectively, and would also differentiate it from the Privacy Act 1988 (Cth). 4.2. 249 Objects Clause Doyle and Bagaric, above n 5, 178. The author acknowledges that an Invasion of Privacy Act 1971 (Qld) is still in force in the State of Queensland. 250 P a g e | 51 Australian privacy laws currently lack coherence, consistency and an overarching rationale. A core rationale that sets out the reasons why the legislation is in force and how it will achieve those goals should therefore be included in the objects clause of the proposed legislation. ‘This involves a consideration of the justification for the right to privacy and what we as a community seek to achieve by giving legal recognition and protection to such a right’.251 The core rationale of the legislation proposed in this paper is to protect the privacy of individuals, and recognise that privacy protection is important in modern society. Doyle and Bagaric suggest that privacy protection creates a supportive context for the development of individual autonomy, which plays an essential role in the pursuit of happiness.252 The authors argue that individuals ought to be protected where decisions are made on the basis of information about them without any opportunity to comment or respond to the information.253 They also argue that individuals should be able to enjoy situations of solitude and control the circumstances in which they are observed. For example, these instances would include privacy inside the home, and particularly when showering, going to the toilet, and engaging in sex.254 This paper supports the value of individual autonomy as a core rationale for the protection of privacy. The need for privacy to be weighed against the public interest should also be identified in the objects clause. 255 The objects clause should also explain how it will achieve individual autonomy and a balance between the right to privacy and the public interest. The clause should clearly state that the legislation intends to create a statutory cause of action for invasion of privacy and provide 251 Doyle and Bagaric, above n 5, 178. Ibid, 179. 253 Ibid. 254 Ibid, 180. 255 Civil Liability Amendment (Privacy) Bill 2009 s72; cited in New South Wales Law Reform Commission, Report No 120, above n 2, 84. 252 P a g e | 52 remedies to individuals whose privacy has been invaded.256 The clause should also explain that the legislation intends to educate the public on their rights, responsibilities and liabilities that are created under the statute, and inform the public of how to protect their own private information and conduct. The education campaign is an important feature of the proposed legislation. Furthermore, the objects clause should make it clear that the Act is to be enacted uniformly throughout the states and territories. By clearly stating the objectives and aims of the new legislation, the Courts and the Australian public should be adequately informed about their rights and liabilities, which will facilitate and enhance the effectiveness of the new framework. RECOMMENDATION 1: OBJECTS CLAUSE 1 Object of Act The objects of this Act are: (a) To create national uniform legislation; (b) To recognise that it is important to protect privacy in order to protect individual autonomy and the right to the pursuit of happiness; (c) To recognise that it is important to balance privacy against other interests, including public interest, in appropriate circumstances; (d) To create a statutory cause of action for the invasion of an individual’s privacy; (e) To provide a number of different remedies to enable a court to redress any such invasion of privacy; and (f) To educate the public on their rights, responsibilities and liabilities under this legislation and to inform the public on how they can protect their privacy and prevent invasions of privacy. 4.3. 256 Definition This is in line with the NSWLRC recommendations. See Civil Liability Amendment (Privacy) Bill 2009 s72(b), (c); cited in New South Wales Law Reform Commission, Report No 120, above n 2, 84. P a g e | 53 This paper acknowledges the difficulties involved in arriving at a satisfactory definition of privacy.257 Fluidity and adaptability should be essential features of the proposed legislation, rather than searching for a fixed definition. It is a ‘perennial fallacy that because something cannot be cut and dried or lightly weighed or measured therefore it does not exist.’258 The concept of privacy is value-laden and complex.259 The definition is culturally and historically relative,260 and must be adaptable to modern developments and the value which privacy is given at the time. . Wacks argues that ‘[i]nstead of pursuing the false god of “privacy”, attention should be paid to identifying what specific interests of the individual we think the law ought to protect’.261 Similarly, Doyle and Bagaric believe that ‘[t]o define a term or concept is to set out the necessary and sufficient conditions which demarcate the correct usage of the term or concept’.262 ‘Bearing in mind the impossibility of arriving at a satisfactory definition’,263 and the ‘danger of gaps in privacy protection’264 resulting from a fixed definition, the meaning of privacy under the proposed legislation should be canvassed in a way which lists the types of invasions of privacy and the conditions which require protection in the circumstances. This allows the judiciary to develop the concept over time and take into account ‘the need of individuals for privacy in an evolving technological environment’.265 See page 7 of this paper under the heading: 1.1. ‘Definitional Difficulties’. Ridge v Baldwin [1964] AC 40. 259 Lindsay, above n 21, 8. 260 Ibid. 261 Wacks, above n 18, 10. 262 Carolyn Doyle and Mirko Bagaric, ‘The Right to Privacy and Corporations’ (2003) 31 Australian Business Law Review 237, 238. 263 New South Wales Law Reform Commission, Report No. 120, above n 2, 3 [1.1]. 264 New South Wales Law Reform Commission, Invasion of Privacy, Consultation Paper 1, above n 98, 57 [2.87]. 265 Australian Law Reform Commission, Report No 108, above n 6, 19 [1(f)]. 257 258 P a g e | 54 In line with the ALRC and NSWLRC recommendations, this paper proposes that there be no definition per sé.266 Rather, there should be a workable classification of the types of invasions of privacy that would be protected by the statute. This is similar to the ALRC’s proposal.267 In addition, and as will be discussed in further detail later in this chapter,268 there should be explicit reference to the ability for family members to take action for invasion of privacy of their deceased relatives. This refers directly to the News of the World scandal where murder victims’ voicemails were allegedly intercepted, which caused significant distress to family members. Reference should also be made to invasions of privacy occurring online such as on social networking sites, or through websites and email, in order to tackle the various online privacy issues discussed in Chapter One. The other examples proposed in Recommendation 2 follow those of the ALRC. In addition, a catch-all provision ensures that other situations of privacy invasion are not limited to the factual matrix contained in the section. RECOMMENDATION 2: NON EXHAUSTIVE LIST OF TYPES OF PRIVACY INVASION 2 Types of Privacy Invasion under this Act An invasion of privacy may occur in (but is not limited to) the following circumstances: (a) Where there has been an interference with an individual’s home or family life, which includes the situation where a deceased family member’s privacy has been invaded and this causes distress or harm to the living relatives which the court deems to be an invasion of privacy under the Act; or (b) An individual has been subjected to unauthorised surveillance; or (c) An individual’s correspondence or private written, oral or electronic communication has been interfered with, misused or disclosed without the permission of such individual; or (d) Sensitive facts relating to an individual’s private life have been disclosed; or 266 See Australian Law Reform Commission, Report No 108 above n 6, vol 3, Chapter 74; and New South AnReform individual’s activity online, which but is not limited to social networking Wales(e) Law Commission, Report No 120, aboveincludes n 2, 21 [4.16]. 267 sites, is Law interfered misused or disclosed without the3,individual’s consent; 74-1]. Australian Reform with, Commission, Report No 108, above n 6, vol 2584 [Recommendation 268 See page 54 under the heading: 4.3. ‘Entitlement’. (f) Under any other circumstances which the court determines is an invasion of privacy. P a g e | 55 4.4. Entitlement Who is entitled to bring an action under the statute is important, particularly in light of the News of the World phone-hacking scandal. The proposed legislation therefore takes a slightly different approach to the recommendations of the ALRC269 and NSWLRC in this regard. This paper acknowledges that generally, deceased individuals have no privacy interests. 270 This paper agrees with the recommendation that natural persons are entitled to bring the action, however extends this concept to where natural persons are directly affected by invasion of a deceased individual’s privacy, and that the action also invades the privacy of the natural person bringing the action, particularly in instances where there is a prior relationship, whether familial or fiduciary, between the deceased and the individual seeking relief for invasion of privacy. Recommendation 2(a) therefore specifically states that relational actions are within the ambit of privacy invasions envisaged by the statute. By extending the concept of home or familylife privacy invasions to include invasions relating to deceased individuals,271 the statute responds directly to the fear created by News of the World’s alleged phone-hacking of 9/11 269 However the ALRC recommended that personal information relating to deceased individuals should be protected for up to thirty years following death, in order to prevent mishandling of information after death, to allow living relatives to access appropriate information and to prevent distress to the families: Australian Law Reform Commission, above n 6, vol 1, 367 [8.44]. 270 Paul Roth, ‘Privacy Proceedings and the Dead’ (2004) 11 Privacy Law and Policy Reporter 50. 271 In any respect, such an invasion would likely be captured under the provision in s2(a) contained in Recommendation 2 above in regards to interference with home or family life, and would still need to meet the threshold requirements of the cause of action. P a g e | 56 victims and murder victims. Family members in similar situations should be able to seek remedies and redress for the distress they suffered from media phone-hacking or any other kind of invasion, as long as the invasion of privacy satisfies the elements of the cause of action and is not subject to any defences or other limitations. 4.5. General Cause of Action 4.5.1. Threshold The cause of action under the new legislation should be general and statutory. It should not be a tort, because tortious actions ‘do not generally require the courts to engage in an overt balancing of relevant interests’,272 which would be required in the case of privacy invasions. The cause of action should relate to invasions of privacy, which is in line with the NSWLRC recommendation. The higher threshold test suggested by the ALRC, which requires the conduct to be of sufficient seriousness and ‘highly offensive to a reasonable person of ordinary sensibilities’273 is too high a bar for claimants to meet. This would undermine the effect of the legislation in protecting privacy. Many claimants would be precluded from taking action for invasions of their privacy, if they had a reasonable expectation of privacy but it was not considered by the court as objectively serious or highly offensive enough to warrant liability.274 For example, where an intimate conversation between husband and wife following their involvement in a car accident involving drink-driving is filmed and broadcast on television, they would have a reasonable expectation of privacy in those traumatic circumstances. However, the conversation is not likely to be objectively serious or highly 272 New South Wales Law Reform Commission, Report No 120, above n 2, 50 [5.55]. Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2584 [Recommendation 74-2]. 274 See, eg, Andrews v TVNZ (Unreported, High Court of New Zealand, Allan J, 15 December 2006), where a husband and wife took action against Television New Zealand for broadcasting an intimate conversation between them following a motor accident. The claimants met the reasonable expectation of privacy requirement, but failed to prove that the publication of the conversation was highly offensive to the reasonable person of ordinary sensibilities. 273 P a g e | 57 offensive to the reasonable person.275 A high threshold of seriousness therefore does not give adequate protection to individuals’ right to privacy. Instead, as is made clear below, the test should balance the privacy interest against the other interests in question on the particular facts of the case, and take into account a range of factors to assist the court in making a determination. 4.5.2. Test The test for the statutory cause of action should be flexible, adaptable, reasonably accessible to individuals, and fair to other competing interests, which is likely to include the interest of Australian media organisations in delivering news. Most importantly, the test should be applied by the courts through an intense focus on the facts,276 and should assist in developing social norms and expectations of privacy in modern society.277 The public interest and freedom of speech issue is a difficult one to reconcile statutorily. A traditional view is that there will ‘always be a clash of rights, which must be resolved either in favour of the privacy right or of the right to freedom of speech’.278 Privacy is deemed to be the arch-nemesis to public interest, the right to know and freedom of expression. Law reform submissions, primarily from media organisations, urged the freedom of speech right to 275 This example is based on the facts of Andrews v TVNZ (Unreported, High Court of New Zealand, Allan J, 15 December 2006). 276 Re S (a child) [2005] 1 AC 593 at [17] (Lord Steyn). 277 New South Wales Law Reform Commission, Report No 120, above n 2, 25 [5.5]. 278 Eric Barendt, ‘Privacy and freedom of speech’ in Andrew T Kenyon and Megan Richardson (eds), New Dimensions in Privacy Law: International and Comparative Perspectives (Cambridge University Press, 2006) 11. P a g e | 58 be a concomitant279 to the right to privacy, given that Australia does not have a constitutional or statutory right to freedom of speech or freedom of the press, even though Australian Constitutional law already implies a right to freedom of political communication.280 There is currently limited protection for privacy under Australian law. The way that privacy and freedom of expression should interact is therefore left uncertain under the current legal framework. The notion of privacy, and its conceptual rivalry with freedom of expression, does not occur in a vacuum. Society’s attitudes towards the correct balance will change according to expectations281 relating to technology, artistic tastes, the commercial environment and demographic changes. The key to a contextual and workable test is therefore adaptability and proportionality. Courts should be able to apply a sophisticated balancing test to the specific facts of the case. The proposed legislation should therefore be specific about how to balance these competing rights. Interestingly, Barendt argues that in limited cases, the two rights will not be in conflict. He cites a pertinent example. The right to privacy and the right to free speech would both be violated if there was interception of electronic or social communications between individuals or a small group on the internet.282 However, this creates complexity for reform. For example, if a claimant’s Facebook profile is set to private, but a Facebook friend of the claimant publishes the information contained in the claimant’s status, should that information be protected as private information? The explosion of social media has posed difficult questions relating to defining the realm of what is private and what is public. 279 Australian Press Council, Submission PR 411 to Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, 7 December 2007. 280 Lange v Australian Broadcasting Corporation (1997) 189 CLR 520. 281 Australian Law Reform Commission, For Your Information, Report No 108 (2008) vol 3, 2572 [74.146]. 282 Barendt, above n 278, 12-16. P a g e | 59 Furthermore, the blurring and shifting of the line between public and private life necessitates a flexible approach. There is no expectation of privacy in public places generally, such as public transport, shopping centres, bars and restaurants. However, cultural norms exist which require privacy in public toilets, change rooms and hotel rooms, despite the ‘absence of a right to exclusive possession or control of [the] immediate surroundings’.283 On the one hand, if a line is not drawn between the public and private spheres of life, then ‘there will be virtually no aspect of [a person’s] life which cannot be characterised as private’.284 On the other hand, regard should be given to the degree of privacy reasonably expected in the circumstances of the particular case.285 A cause of action should not draw such a line in advance. The legislation should assist Courts in reshaping those norms in order to reflect the current challenges to individual privacy, particularly in the face of sly media behaviour and the exponential increase of information flow on the internet. As a result, the test recommended in this paper combines some elements of the ALRC and NSWLRC recommendations. As drafted in Recommendation 3 below, the test combines a subjective and objective element. The test requires the individual to have a reasonable expectation of privacy in the circumstances, but that privacy interest is considered in light of, and on balance with the relevant public interests, which are presumed to start from an equal footing. This paper initially considered placing the public interest consideration as a defence instead of an element of the test, which is the approach used in Canada.286 However, the former option fails to recognise the value of open justice, accountability and free speech. However, there should be a clear demarcation between public interest and public curiosity. A 283 Doyle and Bagaric, above n 5, 180. Murray v Big Pictures (UK) Ltd [2008] EWCA Civ 446, [14]. 285 Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2566 [74.124]. 286 Privacy Act 1978 RSS (Saskatchewan) c P-24; Privacy Act 1987 CCSM (Manitoba); Privacy Act 1990 RSNL (Newfoundland and Labrador); Privacy Act 1996 RSBC (British Columbia). 284 P a g e | 60 fair balancing process would ensure that interest groups on either side of the fence could have their say. The test also explicitly provides that the cause of action is actionable without proof of damage, which is important in the privacy context given that most actions will involve emotional and/or mental distress, as opposed to economic loss or physical damage. 4.5.3. Mental Element This paper recommends not specifying the mental element. While the ALRC recommended that the cause of action only apply to intentional and reckless acts, the NSWLRC did not find it necessary to lay down an absolute rule,287 as the cause of action is not a tort and does not import a requirement for a particular mental element. By leaving mental element out of the equation, courts should still be able to effectively determine liability by applying the threshold test to the particular facts at hand. This way, accidental invasions of privacy may still be actionable under the statute, if they occur in the appropriate circumstances. RECOMMENDATION 3: TEST FOR STATUTORY CAUSE OF ACTION 3 Invasion of Privacy Actionable (1) An individual (the claimant) has a cause of action against a person under this Act if that person’s conduct invades the individual’s privacy. (2) An individual’s privacy is invaded for the purpose of this Act if: (a) the conduct of another person invaded the privacy that the individual was reasonably entitled to expect in all of the circumstances, and (b) the individual’s privacy interest, when considered on balance, outweighs any relevant public interest in the circumstances of the case. (3) To avoid doubt, privacy interests and public interests are to be considered from an equal standing point. 287 (4)South Invasion privacy this Act is actionable without New Walesof Law Reformunder Commission, Report No 120, above n 2, 50proof [5.56].of damage. P a g e | 61 4.5.4. Factors to be Taken into Account This paper recommends providing statutory guidance to courts, in order to assist them in determining actionability and balancing the privacy interest with other competing interests. In this way, this paper largely supports the approach of the NSWLRC. By directing the attention of the court to matters such as the nature of the private act or information, nature of the invasion, relationship between the parties and other relevant matters, the court is encouraged to decide each case on the specific facts presented to them. Importantly, courts are given wide discretion under the catch-all provision to consider any other relevant matter, which further facilitates fact-specific decisions and development of comprehensive common law interpretations. RECOMMENDATION 4: FACTORS TO BE TAKEN INTO ACCOUNT 4 Factors to be Taken into Account Without limiting the factors that a Court may take into account in determining whether an invasion of privacy has occurred under section 3, the Court may take into account the following factors: (1) (2) (3) (4) (5) (6) The nature of the alleged private matter; The nature of the conduct concerned; The relationship between the claimant and the alleged wrongdoer; The extent to which the claimant has a public profile; The extent to which the claimant was in a position of vulnerability; The conduct of the claimant and the alleged wrongdoer both before and after the conduct concerned; (7) Whether an apology has been made by the alleged wrongdoer or any other attempt to make amends is made; (8) The effect of the conduct on the health, welfare and emotional wellbeing of the claimant and any other reasonably-affected individual; (9) Whether the conduct concerned contravened a provision of an Australian statute; (10) Whether the conduct concerned was consented to, expressly or impliedly, by the claimant but only to the extent of the consent given; and P a g e | 62 4.5.5. Consent Consent becomes complicated when applied to social networking and online privacy invasions. For example, person X posts a status update on their Facebook profile, which is set to private, complaining about their employer. Person Y, who is a Facebook friend of X, prints the status and gives it to X’s employer, E, who terminates X’s employment and tells other employers of the Facebook status via the company Twitter account, warning others not to hire X. When does liability end? If an individual such as X consents to some information sharing within a certain circle of friends, which include Y, and the information goes beyond what was consented to, and others such as E continue to spread that information, are both Y and E liable? Social networks theory suggests that even if a large group of people (e.g. X’s Facebook friends) know the P a g e | 63 private information and one person causes that information to leap the boundary, this is still a privacy violation.288 Y would be liable in this case. However, once information is on the internet, it would be very impractical to hold others liable who simply spread the information. A line must be drawn, and this may mean that E would not be liable in the above example. Notably, X is not precluded under the statute from taking action against E, and X’s success would depend on the circumstances, particularly the nature of the comment.289 X however would not be likely to satisfy the public interest balancing test if he or she admitted to stealing money or equipment from the workplace, where it would likely be in the public interest that the public, in particular other employers, be informed of criminal behaviour. Nevertheless, this is where the education campaign will assist. As discussed below, informing the public on the dangers of online information sharing is an effective method in preventing these events from occurring. Another problem with consent occurs in other situations such as newsgathering, where an individual might consent to an interview with a particular media organisation. If the media organisation goes beyond interviewing and begins trespassing, photographing and surveillance operations on that individual, beyond the consent that was originally given, this should be actionable under the statute, despite the original consent being given. This paper recommends that consent be included as a factor to be taken into account in determining actionability under the statute, under Recommendation 4(10) above, but only to the extent that the consent, express or implied, was given to that particular conduct. Conduct 288 Solove, above n 7, 181. Employment law may also assist in this example. See, eg, Fitzgerald v Smith t/a Escape Hair Design [2010] FWA 735, where the employee was terminated due to a Facebook status she posted which related to her Christmas bonus and holiday pay. 289 P a g e | 64 beyond this is potentially liable. Onus should be placed upon the claimant to disprove consent. 4.5.6. Limitation Period The limitation period should be fairly short so that individuals are encouraged to take prompt action, but also subject to discretional extensions of time, so that leniency can be afforded in appropriate circumstances. The limitation period put forward by the NSWLRC provides guidance on this matter. This comprises a one year period from the date on which the invasion of privacy occurred, plus a discretionary element which the court can use to extend the period by up to three years.290 This is not satisfactory to claimants, as many invasions of privacy may go unnoticed for a long period of time, and well after the damage is done. For example, becoming aware of the sharing of personal information on the internet once it has been spread,291 or phone-hacking by the media. This proposal recommends that the date of accrual be the date that the claimant becomes aware of the circumstances giving rise to the cause of action. This reflects the nature and type of privacy invasions that may be actionable under the statute, many of which have longterm consequences. The proposed wording would most likely be inserted into the Limitation Act 1969 (Cth). This paper acknowledges that the limitation period for protection of personal information of deceased individuals under the current legislative framework varies across states, from five 290 Amendment of Limitation Act 1969 (Cth) ss14C, 56E; in New South Wales Law Reform Commission, Report No 120, above n 2, 91. 291 For example spreading intimate sexual details on an internet blog: see Solove, above n 7, 52. P a g e | 65 years in the Northern Territory, thirty years in NSW and Victoria, and unlimited in the ACT.292 However, these limitation periods and associated laws that relate to personal information and confidentiality of deceased individuals held by organisations should not be affected293 by the limitation period for invasions of privacy under the proposed legislation in this paper. RECOMMENDATION 5: LIMITATION PERIOD Limitation Period: Invasion of Privacy (1) An action on a cause of action under section 3 of the Invasion of Privacy Act 2011 (Cth) is not maintainable if brought after the period of one year from the date on which the cause of action accrues. (2) A cause of action accrues when the claimant becomes aware of the circumstances giving rise to the cause of action. (3) A claimant may apply to the Court for an order extending the limitation period for the cause of action. (4) The Court must, if satisfied that it was not reasonable for the claimant to have commenced an action in relation to the matter complained of within one year from the date that the cause of action first accrued, extend the limitation period mentioned in sub-section (1) but only by a period of up to three years running from that date. 4.6. Defences This paper supports the recommendations of the ALRC and NSWLRC in relation to two defences: the defence of lawful requirement and authorisation, and the defence of lawful defence of person or property. Importantly, these defences allow governments to perform statutory functions, and would not inhibit national security or law enforcement.294 This paper however inserts the words ‘reasonably in the circumstances’ under both sub-sections so that 292 Australian Law Reform Commission, Report No 108, above n 6, vol 1, 359 [8.15]. Ibid, vol 1, 360 [8.18]. 294 New South Wales Law Reform Commission, Report No 120, above n 2, 52 [6.3]. 293 P a g e | 66 Courts may determine whether the defence is proved, having regard to the particular facts of the case. This paper disagrees with the ALRC and NSWLRC recommendations in relation to the defamation defences and recommends a more restrictive approach to excusing liability. The proposal put forward in this paper removes the need for the defamation defences to be spelt out in the statute, given that such defences would already be covered under the lawful requirement and authorisation provision. However, Courts will need to take particular care where parliamentary privilege applies. This year Senator Nick Xenophon utilised his parliamentary privilege to accuse a Catholic chaplain of allegedly raping a young man 45 years ago.295 Despite the legality of the accusation under s49 of the Australian Constitution and the Parliamentary Privileges Act 1987 (Cth), parliamentary privilege has the potential to invade individuals’ privacy, particularly where the accusation is spread by the media and the matter has not been dealt with in the criminal justice system. Publicity also creates difficulties for empanelling jurors who might have pre-conceived ideas about the accused person.296 However, unless parliamentary privilege is abolished, the actions of parliamentarians are not likely to be actionable under the statute. RECOMMENDATION 6: DEFENCES 5 Defences It is a defence to an action under this Act for the invasion of an individual’s privacy if the defendant proves any of the following: (1) That the conduct of the defendant was required, authorised or otherwise enabled reasonably in the circumstances: By or under a overstepped State, Territory oron Commonwealth law; orSydney Morning Herald 295 Phillip (a) Coorey, ‘Xenophon the mark parliamentary privilege’, (b)September By an Australian court or tribunal or a process of such a court or tribunal. (online), 15 2011 <http://www.smh.com.au/opinion/politics/xenophon-overstepped-the-mark-onparliamentary-privilege-20110915-1kao0.html>. 296 ABC, speech puts privilege in spotlight’, Report, September 2011 (2) ‘Xenophon That the conduct of parliamentary the defendant was done for the7.30 purpose of29lawfully defending or (Professor Greg Craven) < http://www.abc.net.au/news/2011-09-14/the-row-over-the-naming-of-an-allegedprotecting a person or property reasonably in the circumstances, which includes the rapist/2899618>. prosecution or defending of civil or criminal proceedings. P a g e | 67 4.7. Remedies ‘Remedies do not exist in isolation from the substantive rights and obligations to which they give effect’.297 Regard must therefore be given to the nature of privacy cases and the impact that invasions of privacy have on potential claimants. For example, interlocutory injunctive relief will be an essential remedy for those whose privacy interests have been invaded, because once privacy is lost, it is irretrievable. An injunction would restrain unlawful conduct as well as provide relief which cannot be adequately addressed in final relief after the conduct has occurred.298 An apology should also be an option in the legislation, as it can be a powerful and effective remedy in certain circumstances. In addition to those proposed by the ALRC and NSWLRC, this paper recommends that correction orders should be explicitly listed as a remedy and should be proportionate to the original publication. ‘[The correction] should be placed in the same place, in the same type face and on the same page as the original story… If it was significant enough to command splashing across the front page… then any apology should receive the same importance’.299 This remedy may assist claimants to restore their sense of individual autonomy and may go some way to repair emotional distress and other damages caused by the publication. 297 Tilbury, above n 159, 294. Tilbury, above n 159, 294. 299 P Youngman, Submission PR 394 to Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, 7 December 2007. 298 P a g e | 68 This paper disagrees with the compensation cap recommended by the NSWLRC on actions for emotional and mental distress alone. This paper proposes a compensation remedy without monetary restriction, particularly because privacy invasions, by their nature, will often result in emotional and mental distress. The appropriate level of compensation should be reached by a Court on its own discretion and analysis according to the facts at hand and with regard to social and legal norms operating at the time. RECOMMENDATION 7: REMEDIES 6 Remedies In an action under this Act for the invasion of an individual’s privacy, the court may (subject to any jurisdictional limits of the court) grant any one or more of the following remedies, whether on an interim or final basis, as the court considers appropriate: (1) An order for the payment of compensation; (2) An order prohibiting the defendant from engaging in conduct (whether actual, apprehended or threatened) that the court considers would invade the privacy of the claimant; (3) An order declaring that the defendant’s conduct has invaded the privacy of the claimant; (4) An order that the defendant deliver to the claimant any articles, documents or other material, and all copies of them, concerning the claimant or belonging to the claimant that: (a) Are in the possession of the defendant or the defendant is able to retrieve; and (b) Were obtained or made as a result of the invasion of the claimant’s privacy or were published during the course of conduct giving rise to the invasion of privacy; (5) An order that the defendant apologise to the claimant for the conduct; (6) A correction order, which is proportionate to the original publication; (7) Such other relief as the court thinks appropriate in the circumstances. 4.8. Education Campaign Education should play an essential role in this reform. The ALRC recommended that the Office of the Federal Privacy Commissioner should have a role in educating the public about P a g e | 69 the recommended statutory cause of action.300 However, privacy education should pervade the school system as well as in the wider community. Personal information and photographs now find themselves uploaded within seconds and immediately form part of the public domain via Facebook, MySpace and Twitter. Young people in particular are unaware of the consequences of these actions and may find that their ‘private’ information is no longer private, which could have serious consequences in the future.301 Widespread education campaigns should operate within the ideal that prevention is better than a cure, particularly in relation to private information that is voluntarily, but unknowingly, entered into the public arena via the online medium. Rodrigues argues that social norms can often be more effective than legal rules at regulating online behaviour.302 The power of individual reputation operates as a disincentive for people to, for example, post derogatory comments on someone’s Facebook for fear of backlash from the individual and/or his or her friends. An education programme, aimed at young people in different stages of their development, should be integrated into school and university curriculum in order to improve knowledge and wariness about the consequences of online behaviour. However, it is not just online privacy norms that need to be changed. Society’s acceptance of reality television shows such as Big Brother and Biggest Loser also indicate that we are voyeurs of privacy intrusions as an acceptable norm, particularly for entertainment. The legislation proposed in this paper should assist in shaping the ‘norms that govern the circulation of information’,303 and the education campaign should facilitate the creation of those norms from society’s expectations of privacy.304 If individuals are taught from a young age about the importance of controlling self-exposure, particularly on the 300 Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2586 [Recommendation 74-7]. See Chapter One generally for discussion of the privacy issues that arise online. 302 Rodrigues, above n 52, 238. 303 Solove, above n 7, 113. 304 Solove, above n 7, 167. 301 P a g e | 70 internet, then the desired outcome is a society which values and respects privacy, which should manifest itself in fewer actions under the Invasion of Privacy Act. However, it is not only members of the public who need to change the way they behave. Companies like Facebook should be at the forefront of privacy innovation, despite their seminal role in information sharing. When a new user joins Facebook, the default settings should be private.305 Currently they are not. This means that complacent users may not think to change their settings to ‘private’ and might inadvertently be subjecting themselves to invasions of privacy. Changes to Facebook services have created public concern about privacy in the past.306 For example, in 2006 Facebook created News Feeds, which alert users of recent activity by other Friends on their Home Page. In September 2011, Facebook announced the roll-out of the Timeline function, which provides users with a chronological timeline of their status updates, employment, relationship status and photos.307 Creators of technology and the media, should be at the forefront of responsible sharing of information. Not only should the education campaign inform the public about the changes to the law, the campaign should filter into the primary, secondary and tertiary education sectors as part of online privacy and security awareness. Such an approach would enhance predictability in the law – a fundamental tenet valued in most legal systems. The campaign should inform the public, in particular young people, about the dangers of online behaviour and information sharing via technology such as Facebook and mobile cameras. The campaign will also inform the public of their right to privacy, and what they should do if their privacy is invaded. RECOMMENDATION 8: EDUCATION CAMPAIGN 7 Education The relevant government department shall create an education campaign relating to the Solove, above n 7, 200-201. following: 306 Solove, above n 7, 169. 305 307 Jill Duffy, 10 things you should know about Facebook Timeline (23 September 2011) PC Mag <http://www. (1) Informing the public of their rights, responsibilities and liabilities under this pcmag.com/article2/0,2817,2393464,00.asp#fbid=ZuMPxUB4XV5>. Act; (2) Educating young people in the primary, secondary and tertiary education systems on a range of issues relating to protecting private information and other private conduct, particularly online and through other technologies; and P a g e | 71 4.9. A Familiar Inertia Radical reform such as the proposed legislation in this paper will undoubtedly be opposed. The legislation effectively creates a human right – the right to privacy – because individuals can now take action where that right is interfered with. Groups in society whose interest is in opposition to privacy interests, such as the Australian media, will be strongly advocating against the legislation. In the past, the media have already argued that a statutory cause of action would threaten freedom of expression and freedom of the press.308 This is the point where inertia often settles upon Australian politicians, and the privacy debate subsides again. 309 However, the pendulum must swing from ‘supreme, total power’310 currently held by the media, back to equilibrium where the law respects both the right to privacy and the right to freedom of expression. The legislation will therefore need to strike the right balance in order to pass through the House of Representatives and Senate successfully. However, there is a risk that the legislation is challenged in the High Court by an interested party such as the media. This paper would argue that the Government has the Constitutional 308 New South Wales Law Reform Commission, Report No 120, above n 2, 9 [3.3]. Wacks, above n 39, 1. 310 The Honourable Michael Kirby, in Milanda Rout, ‘Kirby says both rights can co-exist’, The Australian (online), 23 July 2011 <http://www. theaustralian.com.au/national-affairs/kirby-says-both-rights-can-coexist/story-fn59niix-1226100083272>. 309 P a g e | 72 power to enact the legislation under the external affairs power,311 because the legislation intends to implement some of Australia’s obligations under international treaties such as the ICCPR, which states that individuals have the right to privacy312 and the right to freedom of expression.313 Alternatively, the Government could rely on other constitutional heads of power as the basis for legislating on privacy.314 However, the real challenge lies at the negotiation stage, where passionate advocates on both sides of the debate will argue the value and utility of such reform. In the past, privacy reform has fallen at this hurdle. However, the current framework is ineffective and inefficient. A comprehensive and wellthought out proposal, an effective education campaign and a strong government should ensure that the privacy framework is not simply patched up, but is created from scratch according to the fundamental value of individual autonomy. These features should ensure the success and longevity of the legislation in Australia. 4.10. Future Application of the New Framework ‘Complete privacy does not exist in this world except in a desert.’315 The Act is not built on such unrealistic goals or vacuum-like contexts. The success of the legislation for aggrieved individuals will depend highly on the privacy invasion cases that come before the courts, the long-term social impact of the education campaign and the willingness of organisations such as the media to comply with their obligations under the Act. 311 Australian Law Reform Commission, Report No 108, above n 6, vol 1, 196 [3.20]. International Covenant on Civil and Political Rights, opened for signature 16 December 1966, (entered into force 13 March 1976) [1980] ATS 23, Article 17. 313 International Covenant on Civil and Political Rights, opened for signature 16 December 1966, (entered into force 13 March 1976) [1980] ATS 23, Article 19. 314 See, eg, Australian Constitution ss51(i), 51(xiii), 51(xiv), 51(xx). 315 Restatement (Second) of Torts §652D comment c; cited in NSWLRC Consultation Paper 1, above n 98, 102 [4.28]. 312 P a g e | 73 The cost of litigating the action will also be indicative of the legislation’s accessibility and success. The particular forum chosen by the parties will largely determine the costs of litigating invasions of privacy. While the appropriate court will depend on the particular circumstances of the case and the remedies sought, the ALRC acknowledges that district and county courts will be the most commonly used due to the extent of their jurisdiction and expertise on such matters, and importantly because of lower costs.316 The legislation should be accessible to everyone, not just celebrities, politicians or people with public profiles. The education campaign aimed at the wider community should not only inform the public of the contents of the Act, but should also recommend which court(s) to use to mount an action. The campaign should also recommend that claimants seek legal advice. Ultimately, the future of privacy law and policy will depend on how the legislation is interpreted and applied by the courts. By drafting a clear statute like the one proposed in this paper, the common law interpretation of the new legislation should result in socially and legally desirable outcomes that value and protect the privacy of individuals in Australia. 316 Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2583 [74.197]. P a g e | 74 CONCLUSION The recent News of the World phone-hacking scandal represents one of many challenges facing the notion of privacy as both a social and legal construct. Such a scandal should be the last straw for the Australian legal system, providing strong impetus for change and reform to the currently unravelling patchwork of laws which, at best, provide incidental protection of privacy in Australia. A statutory cause of action would ‘create a climate of restraint which might stem some of the activities that led to the closure of News of the World.’317 If a statutory cause of action like the one proposed in this paper is implemented in Australia, members of the public would have adequate redress for invasions of privacy where there was a reasonable expectation of privacy, and there is no public interest outweighing the privacy interest in the circumstances of the case. By ensuring that both interests begin from an equal standing point, interest groups in society are assured that no interest is preferred over another, and that each case will turn on its own merits. Careful compromise and proportionality is essential to effective law-making. The proposed legislation takes into account present-day challenges to privacy protection, for example by listing examples of privacy invasions such as phone-hacking and sharing of private information obtained surreptitiously from social networking sites, which this paper argues are some of the most threatening weapons against privacy protection. Moreover, the legislation is adaptable and flexible. The statute encourages judicial discretion and also provides a list of factors that may be applied to the particular facts of the case in order to determine actionability. The common law can therefore interpret the legislation according to Victorian Law Reform Commission, ‘Victorian Law Reform: Keeping Private Lives Private’ (2011) 85(10) Law Institute Journal 87. 317 P a g e | 75 the social norms and contextual features and developments of the time, therefore reviewing and redefining the fluid concept of privacy as advancements in society and technology occur. Importantly, this paper illustrates that there should be active dialogue between politicians, Law Reform Commissions and interest groups in order to create the most desirable and effective solution to what has now become one of contemporary society’s key reform issues. The time is certainly ripe for statutory protection of privacy in Australia. P a g e | 76 APPENDIX Table One: Current Legal Protection of Privacy LEGAL METHOD ASPECT OF PRIVACY Tort Territorial privacy or right to seclusion Reputation 318 CAUSE OF ACTION INCIDENTAL PROTECTION OF PRIVACY IN A MEDIA SETTING Tort of Preventing those who trespass to land enter private property for the purpose of photographing, filming, interviewing or recording the occupant or their activities, without lawful authority318 Private Preventing harassment nuisance by constant surveillance319 Defamation EVALUATION Limited to the vicinity of private premises Does not give protection against casual observation, filming or recording outside the property or from the airspace above it320 Prevents the publication The law of of a statement defamation (including a photo)321 protects that has the tendency to reputation, not injure the person’s privacy, and it reputation does not protect information privacy in fact, because if the information is true it is not defamatory.322 Lincoln Hunt Australia Pty Ltd v Willesee (1986) 4 NSWLR 457, 465, cited in New South Wales Law Reform Commission, above n 2, 42 [2.40]; and see Doyle and Bagaric, above n 5, 63. 319 Bernstein v Sky News Ltd [1978] QB 479; Raciti v Hughes (1995) 7 BPR 14,837. 320 Lord Bernstein v Skyviews and General Limited [1977] 2 All ER 902, 909, cited in cited in New South Wales Law Reform Commission, above n 2, 42 [2.45]. 321 Ettinghausen v Australian Consolidated Press Limited (1991) FLR 307. 322 Doyle and Bagaric, above n 5, 65. P a g e | 77 Passing Off Equity 323 Private facts Intentional infliction of emotional distress326 Information privacy Breach of Confidence Prevents appropriation of the name, image or likeness of a person, e.g. in advertising324 Prevents conduct calculated to cause physical or emotional damage to a person, e.g. newspaper digging up criminal record of a person campaigning to raise money for a heart transplant327 Limited application and ‘virtually useless’ in modern law.328 The ingredients of the action would be too difficult to pin down and the policy justifications insecure329 Protects information Where there is no (whether it be prior relationship commercial information of confidence, the or otherwise) which is information must confidential or be stolen in order relatively secret, that is to prove breach of imparted in confidence.332 The circumstances action would not importing an obligation protect of confidence (or information that is wrongfully obtained private but has not assuming the media had been obtained in not entered into a prior circumstances relationship of which import an confidence with the obligation of plaintiff) and that confidence.333 In information is used Lenah Game detrimentally against Meats, Gleeson 330 the plaintiff, e.g. CJ, Kirby and photos taken of an Callinan JJ (with Defamation Act 1974 (NSW) s 15. Pacific Dunlop v Hogan (1989) 23 FCR 553. 325 Doyle and Bagaric, above n 5, 68. 326 Wilkinson v Downton [1897] 2 QB 57. 327 Tucker v News Media Ownership Ltd [1986] 2 NZLR 716. 328 Doyle and Bagaric, above n 5, 69. 329 New South Wales Law Reform Commission, Report No 120, above n 2, 19 [4.12]. 330 Coco v AN Clark (Engineers) Ltd. [1969] RPC 41. 324 However there is a defence in NSW if the imputation is substantially true and it related to a matter of public interest323 Only available to individuals with a public profile325 P a g e | 78 activity where it is made clear that no unauthorised photography is to be made331 Statute Territorial privacy or right to seclusion Entering into inclosed lands without lawful excuse or consent of the owner and remain on lands after requested to leave: Inclosed Lands Protection Act 1901 (NSW) s4 Provides a criminal offence where a member of the media enters onto private property without lawful excuse or consent, e.g. to take photos. Offences under the Crimes Act 1900 (NSW) Part 4 for robbery, theft, extortion, larceny, sabotage and malicious damage to property. Provides a criminal offence where a member of the media steals personal documents or belongings, unless those items had been abandoned (e.g. left in a rubbish bin)334 Gaudron, Gummow and Hayne JJ finding it not necessary to decide) suggested that a breach of confidence action will protect private domestic activity from publication, however this could be characterised as attempting to fit a square peg in a round hole, and is subject to the reluctance of the judiciary to develop it further. Provides no protection of the information obtained whilst on the land. Unless personal documents are stolen, these property offences do not adequately or directly protect privacy. Franklin v Giddins [1978] QdR 72. New South Wales Law Reform Commission, Invasion of Privacy, Report No 120, above n 6, 19 [4.12]. 331 Creation Records Ltd v News Group Newspapers (1997) 39 IPR 1. 334 Donoghue v Coombe (1987) 45 SASR 330. 332 333 P a g e | 79 335 Bodily or personal privacy Assault,335 stalking and intimidation,336 and peeping or prying337 under the Crimes Act 1900 (NSW). Reputation Criminal defamation338 Personal privacy Filming for indecent purposes without consent, or installing a device to film for indecent purposes,339 or engaging in offensive behaviour under Summary Offences Act 1988 Offence under the Telecommunic ations (Interception and Access) Act 1979 (Cth) s7(1) or under the Surveillance Devices Act 2007 (NSW) Provides a criminal offence where a member of the media makes threats of violence, or stalks the person, or is prying upon that person from or near the building. Publishing material, e.g. in a newspaper, which is defamatory to the person, knowing it to be false and with intent to cause serious harm. The media setting up a filming device to capture indecent images of a person engaged in a private sexual act. These offences are fairly serious criminal offences and would require police investigation. If the information is true it may still be published, which does not offer protection for private information. The offence of offensive behaviour has been used to prosecute individuals who filmed topless sunbathers on a Sydney beach for sexual gratification,340 however may not have much applicability to a media setting. Prevents phone-hacking The by the media. Commonwealth legislation is limited only to the interception of telecommunication s. Crimes Act 1900 (NSW) Part 2, divs 8-10. Ibid, s562AB. 337 Ibid, s547C. 338 Ibid, s529. 339 Summary Offences Act 1988 (NSW) ss21G, 21H. 340 Ibid, s4; see also New South Wales Law Reform Commission, Consultation Paper 1, above n 98, 61 [2.102]. 336 P a g e | 80 Workplace privacy Information privacy 341 s7(1) Prohibitions on surveillance of employees in change rooms, toilet facilities and bathrooms;341 use or disclosure of workplace surveillance records;342 and covert surveillance.343 Criminal offences for unauthorised access, modification or impairment of computer data344 Interfering with personal information and using it for a purpose for which information is not intended under the Privacy Act 1988 (Cth)345 or the Privacy and Personal Information Protection Act 1998 (NSW) Publishing restricted information identifying people, facts Prevents the media gaining access to workplace surveillance records for purpose of publishing or gaining information about the person’s employment details. Limited application only to the workplace. Prevents the media from accessing private computer data Limited to computer data only A member of the media is able to access personal information from an agency (whether public or private) and discloses it in a publication, without the consent of the owner. Limited only to information privacy held by public sector, and certain sections of the private sector. A broadcaster publishes information about the victim in a sexual assault case on the radio or TV348 Only applicable to information regarding certain victims and where the information is Workplace Surveillance Act 2005 (NSW) s15. Ibid, ss18, 36, 37. 343 Ibid, s19. 344 Crimes Act 1900 (NSW) Part 6, Criminal Code Act 1995 (Cth) Part 10.7. 345 Privacy Act 1988 (Cth) s13 [National Privacy Principles 9, 11]. 342 P a g e | 81 etc in a closed court case,346 where the court has not ordered the media to do so347 Prohibited disclosure of health information349 Private facts 348 Accessing personal and financial information,351 or not complying with Privacy Principles when dealing with financial information Intentional infliction of emotional distress353 related to a judicial proceeding, and may be covered by equitable breach of confidence. A member of the media induces a public sector official to disclose health information about a particular individual for a newspaper story350 A member of the media obtains access to verification information held by a credit reporting agency by false pretences.352 Prevents conduct calculated to cause physical or emotional damage to a person, e.g. newspaper digging up criminal record of a person campaigning to raise money for a heart transplant354 Relates only to financial information and also to the verification of personal details of people held by reporting entities. Limited application and ‘virtually useless’ in modern law.355 The ingredients of the action would be too difficult to pin down and the policy justifications insecure356 Doe v Australian Broadcasting Commission [2007] VCC 281. Court Information Act 2010 (NSW) s6. 347 Ibid, s10. 349 Health Records and Information Privacy Act 2002 (NSW). 350 Ibid, s68(2). 351 Anti-Money Laundering and Counter-Terrorism Financing Act 2006 (Cth) Part 2 Div 5. 352 Ibid, s35J. 353 Wilkinson v Downton [1897] 2 QB 57. 354 Tucker v News Media Ownership Ltd [1986] 2 NZLR 716. 355 Doyle and Bagaric, above n 5, 69. 356 New South Wales Law Reform Commission, Report No 120, above n 2, 19 [4.12]. 346 P a g e | 82 Table Two: Elements, Defences and Remedies in Privacy Statutes from Overseas Jurisdictions JURISDICTION Privacy Act 1978 RSS (Saskatchewan) c P-24 (Canada) ELEMENTS It is a tort Actionable without proof of damage for a person wilfully and without claim of right, to violate the privacy of another person Without consent or lawful authority The statute provides a non-exhaustive list of the types of situations where violation of privacy might be found: Auditory surveillance Listening or recording conversations Using person’s image or likeness for advertising Use of letters, diaries or personal documents Taking into account: Nature of the act Effect Relationship Conduct before and after e.g. apology DEFENCES Consent Lawful right or defence of person or property Authorised by law Duty of peace officer and not disproportionate to gravity of the matter News gathering (that is reasonable in the circumstances) Public interest or fair comment (but still not obtained by violating privacy) Privileged under defamation law REMEDIES Damages Injunction Account of profits Delivery up Any other relief that appears necessary under the circumstances. P a g e | 83 Privacy Act 1987 CCSM (Manitoba) (Canada) A person who substantially, unreasonably, and without claim of right violates the privacy of another person commits a tort against that other person No need to prove damage Examples of violations include: Auditory surveillance Listening or recording conversations Using person’s image or likeness for advertising Use of letters, diaries or personal documents It is a tort Privacy Act 1990 Actionable RSNL without proof of (Newfoundland and damage Labrador) for a person (Canada) wilfully and without claim of right, to violate the privacy of another person Without consent or lawful authority In determining the nature and degree of privacy and whether it is reasonable in the Consent Defendant neither knew or should reasonably have known that the act, conduct or publication constituting the violation would have violated the privacy of any person Lawful right or defence of property or person Under lawful authority Peace officer under duty and acted proportionately Where published, that the matter was in public interest or for fair comment, or privileged Consent Lawful right or defence of person or property Authorised by law Duty of peace officer and not disproportionate to gravity of the matter Public interest or fair comment (but still not obtained by violating privacy) Privileged under Damages (taking into account the nature of the offence, effect, relationships, distress, annoyance or embarrassment and conduct before and after) Injunction Account of profits Delivery up of offending material Damages Injunction Account of profits Delivery up of offending material Any other relief that appears necessary These remedies can be additional to other remedies available under other Acts. P a g e | 84 circumstances, the lawful interests of others, and the nature, incidence, and occasion of the act or conduct and to the relationship between the parties, is relevant defamation law Examples of invasions of privacy: Auditory surveillance Listening or recording conversations Using person’s image or likeness for advertising Use of letters, diaries or personal documents Privacy Act 1996 RSBC (British Columbia) (Canada) Two separate torts: 1. Violation of privacy: It is a tort Actionable without proof of damage for a person wilfully and without claim of right, to violate the privacy of another person Without consent or lawful authority In determining the nature and degree of These are referred to as ‘exceptions’, not as ‘defences’, but it will not be a violation of privacy where there is: Consent Lawful right or defence of person or property Authorised by law Duty of peace officer and not disproportionate to gravity of the matter Public interest or There does not appear to be a remedies section. P a g e | 85 privacy and whether it is reasonable in the circumstances, the lawful interests of others, and the nature, incidence, and occasion of the act or conduct and to the relationship between the parties, is relevant Includes eavesdropping and surveillance whether or not accomplished by trespass fair comment (but still not obtained by violating privacy) Privileged under defamation law 2. Unauthorised use of the name or portrait of another It is a tort actionable without proof of damage for a person to use the name or portrait of another for the purpose of advertising or promoting unless the person consents California Civil Code 1998 §1708.8 (United States) The defendant knowingly enters onto the land of another person without permission or otherwise If a defendant transmits, publishes, sells, broadcasts etc the offending material but did not have actual knowledge that Damages up to three times the amount of any general and special damages that are proximately caused by the violation of this section. P a g e | 86 Note: the US has a constitutionallyentrenched right to freedom of the press. Privacy Bill 2006* (Ireland) *Bill not passed: 2007 committed a trespass in order to physically invade the privacy of the plaintiff with the intent to capture any type of visual image, sound recording, or other physical impression of the plaintiff engaging in a personal or familial activity and the physical invasion occurs in a manner that is offensive to a reasonable person There is also an action for constructive breach of privacy, assault or false imprisonment with intent to capture image (etc) and an action for directing, soliciting or inducing another to commit the offence. It is a tort for a person who wilfully and without lawful authority violates the privacy of an individual and the tort is actionable without proof of special damage the offending material was in violation of the Code Lawful activities by law enforcement or government or private sector agencies with authority It is NOT a defence that the image, recording etc was not actually captured Lawful defence of person or property Installation of CCTV in good faith Act of news gathering, in good faith, for public importance, for public interest, and fair and Punitive damages Disgorgement of proceeds (if invasion of privacy was committed for a commercial purpose) Civil fine (between $5,000 and $50,000) Equitable relief, including injunctions and restraining orders Prohibitory order Appropriate damages in the circumstances Account of profits Aggravated, exemplary or punitive damages P a g e | 87 reasonable in the circumstances Absolute or qualified privilege P a g e | 88 Table Three: Comparison of Recommendations for a Statutory Cause of Action in Australia Element of the Cause of Action ALRC NSWLRC My Proposal New federal Act to be passed, e.g. Invasion of Privacy Act. The Act should be a Commonwealth Act but all states and territories should enact uniform legislation to ensure consistency. General, statutory cause of action for invasion of privacy Act to which the cause of action will be included New federal Act to be passed. Civil Liability Act 2002 (NSW) to be amended (but part of a uniform law exercise to achieve national consistency). Type of Action General, statutory cause of action for invasion of privacy Definition General, statutory cause of action for serious invasions of privacy No attempt to define Objects Clause No objects clause. No attempt to define Recognise that it is important to protect privacy of individuals but this must be balanced against other interests, including public interest Create a statutory cause of action Provide remedies No need to define, but should provide a non-exhaustive list of examples of privacy invasions so that the common law may assist in developing a flexible and adaptable set of social and legal norms surrounding the concept of privacy. Create uniform legislation Recognise that is important to protect individual autonomy Recognise that it is important to protect privacy of individuals and balance privacy against other interests, P a g e | 89 Who can bring the action? Natural persons whose privacy has been invaded Children and young people need a litigation guardian to bring a privacy claim. There is a: Reasonable expectation of privacy Highly offensive to a reasonable person of ordinary sensibilities Actionable without proof of damage Test Natural persons whose privacy has been invaded. This does not continue after the death of the plaintiff. The privacy that the individual was ‘reasonably entitled to expect in all the circumstances, having regard to any relevant public interest’ was invaded Silent on requirement of proof of damage including public interest Create a statutory cause of action Provide remedies Educate public on the new legislation and on how they can protect their privacy and avoid invasions of privacy Person whose privacy has been invaded may bring the action. This should extend after death so that family members or others who are affected (e.g. with emotional or mental distress) can bring an action (this is in direct response to serious behaviour by media organisations in hacking the phones of murder victims). The conduct of another person invaded the privacy that the individual was reasonably entitled to expect in all of the circumstances and The privacy interest, when considered on balance against an equally P a g e | 90 Mental Element Intentional or reckless acts Factors to be taken into account Consent Consent is an essential element of the cause of action and should be considered when Whether the public interest in maintaining the claimant’s privacy outweighs other matters of public interest (including the interest of the public to be informed about matters of public concern and the public interest in allowing freedom of expression) weighted public interest, outweighs that public interest in the circumstances Actionable without proof of damage Unnecessary to Unnecessary to specify, as this is not specify, as this is not a tortious action. a tortious action and courts should be able to use their discretion for accidental acts and other mental elements Nature of the Nature of the subject matter subject matter Nature of conduct Nature of conduct Relationship Relationship between parties between parties Public profile Public profile Vulnerability Vulnerability Conduct before Conduct before and after and after Effect on health, Whether an welfare and apology or emotional amends is made wellbeing Effect on health, Contravening welfare and other Australian emotional laws wellbeing Contravening other Australian laws Whether there was consent (and the extent to which the activity was consented to) Any other matter which the Court thinks appropriate Consent (not defined in the legislation but includes express and implied consent) will vitiate an action Express or implied consent, only to the extent of the consent (i.e. if invasion went beyond what was P a g e | 91 Onus Types of privacy that are protected by the statute determining whether a claimant had a reasonable expectation of privacy in the circumstances or when determining whether the act complained of was sufficiently serious to cause substantial offence to a person of ordinary sensibilities Recommendations Onus is on plaintiff are silent on this. to prove absence of consent consented to then an action may still be mounted: e.g. circulation of Facebook photo beyond the realm of ‘friends’). This is listed as a factor to be taken into account. No need to specify as the court will take this into account as a factor, however applying normal rules the onus should be on the plaintiff to negative consent. Provides a nonGeneral action, types Provides a nonexhaustive list of the of privacy protection exhaustive list of the types of invasions of are not spelt out types of invasions of privacy that may fall specifically, it will be privacy that may fall under the statute: up to the Courts to under the statute: Interference with determine in the Interference with home or family circumstances home or family life; life (which Unauthorised includes where a surveillance; deceased Interference, individual’s misuse or privacy is disclosure of invaded which correspondence, impacts on living or private written, relatives); oral or electronic Unauthorised communication; surveillance; Sensitive facts Interference, relating to an misuse or individual’s disclosure of private life correspondence, or private written, oral or electronic communication; Sensitive facts, photographs and other material relating to an individual’s P a g e | 92 Defences Onus Exhaustive list: private life is disclosed Online activity is interfered with, misused or disclosed Any other circumstances which the Court determines Conduct was required, authorised or enabled by law or Court order Lawful defence of person or property or in Court proceedings Required or authorised under Lawful right of law defence of person Lawful defence or property of person or Authorised by property law (where law Publication of a includes matter would Commonwealth give rise to and state and defamation territory Acts and defences of delegated absolute privilege legislation as well or fair report of as duties of proceedings confidentiality Where the under common defendant law or equity) publishing the Privileged under matter is an agent law of or employee, did defamation not know or ought not reasonably have known that the matter was an invasion of privacy (innocent dissemination defence) Where matter is published but there is a common interest or duty in giving or receiving information (and there is no malice) Recommendation is Onus is on defendant Onus is on defendant silent on this issue, to prove defence to prove defence we assume onus is on P a g e | 93 Remedies defendant. The Court should ‘be empowered to choose the remedy that is most appropriate in the circumstances’, and the statute provides a list of examples of possible remedies: Damages (including aggravated damages but not exemplary damages) Account of profits Injunction Apology order Correction order Delivery up and destruction of material Declaration The Court has wide discretion to choose the remedy that is most appropriate in the circumstances, and the statute provides a nonexhaustive list: Compensation (not ‘damages’, as compensation should be able to be sought for mental or emotional distress alone, although there is a cap on noneconomic loss compensation of $150,000, adjustable yearly) Prohibitory order (not an injunction necessarily, depends on public interest and free speech considerations but also the importance of upholding privacy in the first place than leave it to compensation) Declaratory orders Delivery up of offending material Any other relief as the court considers necessary (relief could include asset preservation orders, search orders, account of Compensation (no cap). Prohibition order Declaration Delivery up Apology Correction order, proportional to original publication Other relief that the Court thinks appropriate P a g e | 94 profits, apology, correction orders and other appropriate remedies, orders, ancillary orders or procedural advices derived from other statutory or general law, or under the regulations) No exemplary or punitive damages allowed 1 year from date of defendant’s conduct (but court has discretion to extend by 3 years) Limitation Period No proposal put forward, we assume ALRC follows the NSWLRC proposal. Education Campaign Office of the Privacy No education Commissioner campaign was should provide proposed information to the public concerning the recommended statutory cause of action for a serious invasion of privacy Relationship with other laws relating to privacy Abolishes any action for invasion of privacy at common law. Other laws can still exist, e.g. Privacy Act and torts and breach of confidence, but there cannot be a common law tort action for invasion of privacy because it may undermine the statutory cause of 1 year from date of the claimant becoming aware of the circumstances surrounding the invasion of privacy, with a 3 year discretional extension period) A comprehensive education campaign should be created which both informs the general public about their rights under the Act, and informs primary, secondary and tertiary students in particular about the range of issues relating to protecting their own privacy, particularly online. Other laws can still exist, e.g. Privacy Act and torts and breach of confidence, but there cannot be a common law tort action for invasion of privacy because it may undermine the statutory cause of P a g e | 95 action action (same as NSWLRC approach) BIBLIOGRAPHY A Articles / Books / Reports ABC News, ‘ADFA cadet suspended over shower scandal’, ABC News (online), 27 August 2011 <http://www.abc.net.au/news/2011-08-27/adfa-cadet-suspended-after-showerscandal/2858408> The Age, ‘Aussies concerned about phone-hacking’ The Age (online) 25 July 2011 <http://news.theage.com.au/breaking-news-national/aussies-concerned-about-phone-hacking20110725-1hwuc.html> Anderson, David A., ‘The Failure of American Privacy Law’ in Basil S Markensis (ed) Protecting Privacy: The Clifford Chance Lectures Volume 4 (Oxford University Press, 1999) Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report No 108 (2008) Australian Law Reform Commission, Review of Australian Privacy Law, Discussion Paper 72 (2007) Australian Law Reform Commission, Unfair Publication: Defamation and Privacy, Report No 11 (1979) Barendt, Eric, ‘Privacy and freedom of speech’ in Andrew T Kenyon and Megan Richardson (eds), New Dimensions in Privacy Law: International and Comparative Perspectives (Cambridge University Press, 2006) 11 P a g e | 96 CBS News, ‘Say Cheese! iPhone App catches thief’, CBS News (online), 8 October 2011 <http://www. cbsnews.com/stories/2011/10/08/scitech/main20117622.shtml> Cheer, Ursula, ‘The Future of Privacy: Recent Legal Developments in New Zealand’ (2007) 13 Canterbury Law Review 169 Chester, Simon, Murphy, Jason and Robb, Eric, ‘Zapping the paparazzi: is the tort of privacy alive and well?’ (2003) 27 Advocates’ Quarterly 357 CNN, ‘Tapes show News Corp. subsidiary tactics’ CNN (online) 14 October 2011 <http://edition.cnn.com/ video/#/video/crime/2011/10/13/pkg-griffin-newscorphacking.cnn?hpt=hp_t2> Commonwealth, A Commonwealth Statutory Cause of Action for Invasions of Privacy, Issues Paper (2011) Commonwealth, Australian Government First Stage Response to the Australian Law Reform Commission Report 108 For Your Information: Australian Privacy Law and Practice, Cabinet, October 2009, 5 (Joe Ludwig) Cooley, Thomas M., Cooley on Torts 29 (2nd ed, 1888) Coorey, Phillip, ‘Xenophon overstepped the mark on parliamentary privilege’, Sydney Morning Herald (online), 15 September 2011 <http://www.smh.com.au/opinion/politics/ xenophon-overstepped-the-mark-on-parliamentary-privilege-20110915-1kao0.html> Daily Telegraph, ‘Chk Chk Boom girl Claire Werbeloff flees as Facebook fury erupts’, Daily Telegraph (online), 25 May 2009 < http://www.dailytelegraph.com.au/news/chk-chk-boomgirl-claire-werbeloff-flees-as-facebook-fury-erupts/story-e6freuy9-1225715728133>. P a g e | 97 Daily Telegraph, ‘Sydney airport trials full body scanners’, Daily Telegraph (online), 1 August 2011 <http://www.dailytelegraph.com.au/news/breaking-news/sydney-airport-trialsfull-body-scanners/story-e6freuyi-1226105853100> Davies, Nick, and Hill, Amelia, ‘Missing Milly Dowler’s voicemail was hacked by News of the World’, The Guardian (online), 4 July 2011 <http://www.guardian.co.uk /uk/2011/jul/04/milly-dowler-voicemail-hacked-news-of-world> Dawn.com, ‘7.5 million Facebook users are under 13’ Dawn.com (online), 12 May 2011 <http://www.dawn.com/2011/05/12/7-5-million-facebook-users-are-under-13-study.html> Dean, Dr Robert, ‘A right to privacy?’ (2004) 78 Australian Law Journal 114 Dick, Tim, ‘From private life to public knowledge’, News Review, Sydney Morning Herald (Sydney) 1 October 2011, 7 Doyle, Carolyn and Bagaric, Mirko, Privacy Law in Australia (Federation Press, 2005) Doyle, Carolyn and Bagaric, Mirko, ‘The Right to Privacy and Corporations’ (2003) 31 Australian Business Law Review 237 Duffy, Jill, 10 things you should know about Facebook Timeline (23 September 2011) PC Mag <http://www.pcmag.com/article2/0,2817,2393464,00.asp#fbid=ZuMPxUB4XV5> Frew, Wendy, ‘Artists may face classification to counter nudity’, The Age (online), 18 April 2011 <http://www.theage.com.au/entertainment/art-and-design/artists-may-faceclassification-to-counter-nudity-20110417-1djrv.html> Kirby, The Honourable Justice Michael, ‘Privacy in Cyberspace’ (1998) 21 University of New South Wales Law Journal 323 P a g e | 98 Hixson, R F, Privacy in a Public Society: Human Rights in Conflict (Oxford University Press, 1987) Hong Kong Law Reform Commission, Civil Liability for Invasion of Privacy (2004) Ireland Working Group on Privacy, Report of Working Group on Privacy (2006) Johnston, Mark, ‘Should Australia force the square peg of privacy into the round hole of confidence or look to a new tort?’ (2007) 12 Media and Arts Law Review 441 Kirby AC CMG, The Honourable Michael, ‘Privacy, MySpace, YouTube and Facebook: Can the Law Cope?’ (Speech delivered at the Victorian Privacy Commission Privacy Oration, Melbourne, 1 September 2009) Lewis, Steve, Andrew Clennell, Simon Benson, Gemma Jones and Alison Rehn, ‘Craig Thompson scandal deepens with allegations of a $70,000 spending spree on a union credit card’, Daily Telegraph (online), 22 August 2011 <http://www.dailytelegraph.com.au/news /craig-thomson-scandal-deepends-with-allegations-of-a-70000-spending-spree-on-a-unioncredit-card/story-e6freuy9-1226119221232> Lindsay, David, ‘An Exploration of the Conceptual Basis of Privacy and the Implications for the Future of Australian Privacy Law’ (2005) Melbourne University Law Review 4 Mail Online, ‘Girl, 13, commits suicide after being cyber-bullied by neighbour posing as teenage boy’, Daily Mail (online) 19 November 2007 <http://www.dailymail.co.uk/news/ article-494809/Girl-13-commits-suicide-cyber-bullied-neighbour-posing-teenage-boy.html> Mason, Brett, Privacy without Principle: The Use and Abuse of Privacy in Australian Law and Public Policy (Australian Scholarly Publishing, 2006) P a g e | 99 May, Julia, ‘Letter reopens hacking scandal’, Sydney Morning Herald (online) 17 August 2011 <http://www.smh.com.au/world/letter-reopens-hacking-scandal-20110816-1iwka.html> McDonald, Timothy, ‘Campbell sex scandal sparks privacy debate’, ABC News (online), 22 May 2010 <http://www.abc.net.au/news/2010-05-21/campbell-sex-scandal-sparks-privacydebate/836580>. Murphy, Katharine, ‘Canberra to move on Privacy Law’, The Age (online), July 21 2011 <http://www.theage.com.au/national/canberra-to-move-on-privacy-law-201107201hp19.html#ixzz1T58aRPfx> Neal, Marta, ‘Fordham Law Class Collects Personal Info about Scalia’ American Bar Association Journal (online) 29 April 2009 <http://www.abajournal.com /news/article/fordham_law_class_collects_scalia_ info_justice_is_steamed> New South Wales Law Reform Commission, Invasion of Privacy, Consultation Paper 1 (2007) New South Wales Law Reform Commission, Invasion of Privacy, Report No. 120 (2009) O’Connor, Brendan, A Right to Privacy in Australia (21 July 2011) Attorney General <http://www.ag.gov.au/www/ministers/oconnor.nsf/Page/MediaReleases_2011_ThirdQuarter _21July2011-ArighttoprivacyinAustralia> Prosser, William L., ‘Privacy’ (1960) 48 California Law Review 383 Restatement (Second) of Torts Rivette, Michael, ‘Litigating privacy cases in the wake of Giller v Procopets’ (2010) 15 Media and Arts Law Review 283 P a g e | 100 Rodrigues, Ruben, ‘Privacy on Social Networks: Norms, Markets and Natural Monopoly’ in Saul Levmore and Martha C Nussbaum (eds), The Offensive Internet (Harvard University Press, 2010) Roth, Paul, ‘Privacy Proceedings and the Dead’ (2004) 11 Privacy Law and Policy Reporter 50 Rout, Milanda, ‘Kirby says both rights can co-exist’, The Australian (online), 23 July 2011 <http://www. theaustralian.com.au/national-affairs/kirby-says-both-rights-can-co-exist/storyfn59niix-1226100083272> Saurine, Angela, ‘Stephanie Rice Facebook pictures censored’, Daily Telegraph (online), April 2 2008 < http://www.dailytelegraph.com.au/news/rice-facebook-pics-censored/story-01111115947818> Solove, Daniel, The Future of Reputation: Gossip, Rumour, and Privacy on the Internet (Yale University Press, 2007) Solove, Daniel J, Understanding Privacy, (Harvard University Press, 2008) Stickley, Amanda, ‘Common Law Tort of Privacy – Faltering Steps?’ (2004) 25 Queensland Lawyer 81 Stickley, Amanda, ‘Personal Privacy: Boldly Going Where No Australian Court Has Gone Before: Part I’ (2003) 24 Queensland Lawyer 72 Sydney Morning Herald, ‘9/11 victims ‘targeted’ by tabloid phone hackers’, Sydney Morning Herald (online), 11 July 2011 < http://www.smh.com.au/world/911-victims-targeted-bytabloid-phone-hackers-20110711-1ha90.html> P a g e | 101 Tilbury, Michael, ‘Remedies for breach of confidence in privacy contexts’ (2010) 15 Media and Arts Law Review 290 Toulson, R, ‘Freedom of Expression and Privacy’ (Paper presented at Association of Law Teachers Lord Upjohn Lecture, London, 9 February 2007) Victorian Law Reform Commission, Surveillance in Public Places, Report No 18 (2010) Victorian Law Reform Commission, ‘Victorian Law Reform: Keeping Private Lives Private’ (2011) 85(10) Law Institute Journal 87 Wacks, Raymond, Personal Information: Privacy and the Law (Clarendon Press, 1993) Wacks, Raymond, Privacy and Press Freedom (Blackstone Press Limited, 1995) Walker, Sally, ‘The Courts, Parliamentary Privilege and the Media’, (1999) UTS Law Review 20 Warren, Samuel D. and Brandeis, Louis D., ‘The Right to Privacy’ (1890) 4 Harvard Law Review 193 Westin, Alan, Privacy and Freedom (Atheneum, 1970) Zamost, Scott, Schwarzschild, Todd and Griffin, Drew, ‘Exclusive: Videos detail News America tactics against competitors’ CNN US (online) 14 October 2011 <http://articles. cnn.com/2011-10-14/us/us_news-corp-america_1_world-phone-hacking-scandal-news-corpbritish-newspaper?_s=PM:US> B Cases Andrews v TVNZ (Unreported, High Court of New Zealand, Allan J, 15 December 2006) P a g e | 102 Ash v McKennitt [2007] 3 WLR 194 Australian Broadcasting Commission v Jane Doe [2007] VCC 281 Australian Broadcasting Corporation v Lenah Game Meats (2001) 208 CLR 199 Bernstein v Skyviews and General Limited [1977] 2 All ER 902 Bernstein v Sky News Ltd [1978] QB 479 Campbell v MGN Ltd [2004] 2 AC 457 Coco v AN Clark (Engineers) Ltd. [1969] RPC 41 Creation Records Ltd v News Group Newspapers (1997) 39 IPR 1 Donoghue v Coombe (1987) 45 SASR 330 Ettinghausen v Australian Consolidated Press Limited (1991) FLR 307. Fitzgerald v Smith t/a Escape Hair Design [2010] FWA 735 Franklin v Giddins [1978] QdR 72 Giller v Procopets [2004] VSC 113 Griswold v Connecticut 381 US 479 (1965) Grosse v Purvis [2003] QDC 151 (16 June 2003) (Skoien J) Hosking v Runting [2005] 1 NZLR 1 Kalaba v Commonwealth of Australia [2004] FCA 763 Lange v Australian Broadcasting Corporation (1997) 189 CLR 520 Lincoln Hunt Australia Pty Ltd v Willesee (1986) 4 NSWLR 457 P a g e | 103 Milne v Haynes [2005] NSWSC 1107 Moore-Mcquillan v Work Cover Corporation SA [2007] SASC 55 Murray v Big Pictures (UK) Ltd [2008] EWCA Civ 446 OBG v Allan; Douglas v Hello! Ltd [2007] 2 WLR 920 Pacific Dunlop v Hogan (1989) 23 FCR 553 Raciti v Hughes (1995) 7 BPR 14 Re S (a child) [2005] 1 AC 593 Ridge v Baldwin [1964] AC 40 Rogers v TVNZ [2007] NZSC 91 Tucker v News Media Ownership Ltd [1986] 2 NZLR 716 Victoria Park Racing and Recreation Grounds Company Limited v Taylor (1937) 58 CLR 479 Von Hannover v Germany [2004] ECHR 294 Wainwright v Home Office [2004] 2 AC 406 Wilkinson v Downton [1897] 2 QB 57 C Legislation Anti-Money Laundering and Counter-Terrorism Financing Act 2006 (Cth) Australia Card Bill 1986 (Cth) P a g e | 104 California Civil Code 1998 §1708.8(a) Charter of Human Rights and Responsibilities Act 2006 (Vic) Code of Virginia §§ 8-650, c671 Constitution of the Commonwealth of Australia Court Information Act 2010 (NSW) Crimes Act 1900 (NSW) Criminal Code Act 1995 (Cth) Defamation Act 1974 (NSW) Freedom of Information Act 1982 (Cth) Government Information (Public Access) Act 2009 (NSW) Health Records and Information Privacy Act 2002 (NSW) Human Rights Act 1998 (UK) Human Rights Act 2004 (ACT) 765 Illinois Consolidated Statutes 1075/10 9 Inclosed Lands Protection Act 1901 (NSW) Invasion of Privacy Act 1971 (Qld) Massachusetts General Laws, Part III Courts, Judicial Officers and Proceedings in Civil Cases, Title I Courts and Judicial Officers, Chapter 214 Equity Jurisdiction, Section 1B New York State Consolidated Laws, Civil Rights §50 P a g e | 105 Parliamentary Privileges Act 1987 (Cth) Privacy Act 1988 (Cth) Privacy Act 1978 RSS (Saskatchewan) c P-24 Privacy Act 1987 CCSM (Manitoba) Privacy Act 1990 RSNL (Newfoundland and Labrador) Privacy Act 1996 RSBC (British Columbia) Privacy Act 1987 CCSM (Manitoba) Privacy Bill 2006 (Ireland) Privacy and Personal Information Protection Act 1998 (NSW) Right of Privacy Bill 1961 (UK) Right of Privacy Bill 1967 (UK) Right of Privacy Bill 1969 (UK) Right of Privacy Bill 1987 (UK) Right of Privacy Bill 1989 (UK) Summary Offences Act 1988 (NSW) Surveillance Devices Act 2007 (NSW) Telecommunications (Interception and Access) Act 1979 (Cth) United States Constitution Workplace Surveillance Act 2005 (NSW) P a g e | 106 D Treaties Convention for the Protection of Human Rights and Fundamental Freedoms, opened for signature 4 November 1950, 213 UNTS 221 (entered into force 3 September 1953) International Covenant on Civil and Political Rights, opened for signature 16 December 1966, (entered into force 13 March 1976) [1980] ATS 23 Universal Declaration on Human Rights, GA Res 217A [III], UN GAOR, 3rd sess, 183rd plen mtg, UN Doc A/810 (10 December 1948) E Other Sources Australian Broadcasting Corporation, ‘Bad News’, Four Corners, 29 August 2011 (Gordon Brown) Australian Press Council, Submission PR 411 to Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, 7 December 2007 Burrows, Professor John, ‘Privacy and the Courts’ (Speech delivered to the Privacy Forum, Wellington New Zealand, 27 August 2008) Centre for Law and Genetics, Submission PR 127 to Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, 16 January 2001 Cheaterville, Cheaterville Home (5 October 2011) Cheaterville < http://cheaterville.com/> Department of Broadband, Communications and the Digital Economy, The Vision (23 October 2011) National Broadband Network < http://www.nbn.gov.au/the-vision/> P a g e | 107 Facebook, Data Use Policy (September 2011) Facebook <http://www.facebook.com /full_data_use_policy> Facebook, ‘Statement of Rights and Responsibilities’ Facebook.com (online), 26 April 2011 < http://www.facebook.com/terms.php> Facebook, Statistics (14 September 2011) Facebook <http://www.facebook.com/press/ info.php?statistics> Google, A Quick Look at Google+ (28 September 2011) Google <https://www.google.com /intl/en/+/learnmore/index.html#circles> Google, Home (27 October 2011) Google Earth <http://www.google.com/earth/index.html> Jackson, Kim, Media Ownership Regulation in Australia, (19 October 2011) Parliamentary Library < http://www.aph.gov.au/library/intguide/sp/media_regulations.htm > Office of the United Nations High Commissioner for Human Rights (1988) General Comment Number 16 SBS, ‘Privacy’, Insight Program, 25 October 2011 Star, Michelle, ‘Guvera music site uses guerrilla advertising tactics’, C Net (15 March 2010) <http://www.cnet.com.au/ guvera-music-site-uses-guerrilla-advertising-tactics339301774.htm> Twitter, ‘One hundred million voices’ on Twitter, Twitter Blog (8 September 2011) <http://blog.twitter.com/> United Nations Secretary General, Respect for the privacy and integrity and sovereignty of nations in the light of advances in recording and other techniques, UN Doc E/CN.4/1116 (1976) P a g e | 108 Wikileaks, Home (27 October 2011) Wikileaks <http://wikileaks.org/> Youngman, P., Submission PR 394 to Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, 7 December 2007 YouTube, Statistics (14 September 2011) YouTube <http://www.youtube.com/t/press_ statistics> YouTube, Victim fights back in NSW Sydney school (16 March 2011) YouTube <http:// www.youtube.com /watch? v=isfn4OxCPQs>