Copyright © 2009 – Jeffrey Pittman A Right to Privacy Writing in the Harvard Law Review in 1890, Louis Brandeis and Samuel Warren proposed that the courts recognize a new legal right, the right to privacy The right to privacy, as proposed, was a basic right to be left alone Privacy Law - Jeffrey Pittman 2 Privacy Concerns Today Monitoring by Employers Around four out of five major U.S. firms record or review employee workplace activities and communications The activities monitored include telephone calls, e-mail messages, Internet activities, and computer files Employer surveillance techniques include videotaping employees, recording telephone conversations, logging Internet sites visited, and analyzing computer use regarding time logged on and keystroke counts Privacy Law - Jeffrey Pittman 3 Privacy Concerns Today Monitoring by the Government Government monitoring of individuals has increased post-9/11 We will not focus on government monitoring as this is primarily a political versus a business issue Privacy Law - Jeffrey Pittman 4 Privacy Concerns Today Monitoring by Private Companies Individual private information is available from companies such as www.secret-info.com The information available includes an individual’s social security number, unlisted telephone number, license plate number, information on neighbors and relatives, and property ownership Privacy Law - Jeffrey Pittman 5 Privacy Rights under the Law US Constitution Federal Statutory Law –various miscellaneous statutes State Constitutions & Statutes State Common Law Privacy Law - Jeffrey Pittman 6 Privacy & the United States Constitution The Unites States Constitution, specifically the Bill of Rights, is designed to protect individuals from government intrusion into their lives The protections for individuals found in the Constitution only provide protection from the government - private (nongovernmental) action is not regulated by the Constitution Privacy Law - Jeffrey Pittman 7 Privacy & the United States Constitution Privacy is not directly mentioned in the Constitution The courts have inferred privacy protection from other Constitutional provisions in the First, Fourth, Fifth, and Ninth Amendments Rosario v. United Staes of America (privacy handout) provides an example of privacy under the Fourth Amendment Privacy Law - Jeffrey Pittman 8 The Constitution & the Bill of Rights Amendment IV The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized Privacy Law - Jeffrey Pittman 9 The Fourth Amendment and Searches If the searching party is a government employee: US Constitution – The Fourth Amendment applies, protecting against unreasonable searches and seizures in areas where a reasonable expectation of privacy exists If the searching party is not a government employee: No federal law is applicable; look to state law Privacy Law - Jeffrey Pittman 10 The Fourth Amendment and Searches Regarding searches by government employees under the Fourth Amendment: If the employee is a police officer, a search warrant is usually required If the employee is not a police officer, the intrusiveness of the search is balanced against the need for the search The searched party’s expectation of privacy is a key component of this analysis Privacy Law - Jeffrey Pittman 11 Privacy & Various Federal Statutes The Computer Fraud and Abuse Act The Fair Credit Reporting Act The Right to Financial Privacy Act The Cable Communications Policy Act The Video Privacy Protection Act The Financial Services Modernization Act The Privacy Act Privacy Law - Jeffrey Pittman 12 A Key Federal Statute - The Electronic Communication Privacy Act (ECPA) Title I of the ECPA (the Wiretap Act), provides a civil cause of action against “any person who … intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication.” Privacy Law - Jeffrey Pittman 13 The ECPA Title II of the ECPA (the Stored Communications Act) establishes civil liability for one who: “(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or (2) intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system. Privacy Law - Jeffrey Pittman 14 ECPA Defenses Under the ECPA, employers are free to monitor or intercept electronic messages where employees have consented to such monitoring, made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public, or whenever such monitoring is in the ordinary course of business Privacy Law - Jeffrey Pittman 15 ECPA Case Example – Bailey v. Bailey How was the ECPA applied in Bailey? Privacy Law - Jeffrey Pittman 16 ECPA Case Example - Fisher v. Mt. Olive Lutheran Church Mt. Olive Lutheran Church employed Randall Fischer as a youth minister. While at the church, an employee intercepted an explicit homosexual telephone conversation between Fischer and another man Later, the church used a computer expert to gain access to Fischer’s private Hotmail account to view his email messages Privacy Law - Jeffrey Pittman 17 The Fischer case – Key Actors Ray O’Connor Senior Pastor Randall Fischer Youth Minister Rose Salzmann Secretary Sandra Janiszewski Business Manager Privacy Law - Jeffrey Pittman 18 The Fischer case The church argues that, according to plaintiff, he was counseling a homosexual man, a task that falls within his job description In contrast, plaintiff argues that his call was personal and that the church employees had an obligation to stop listening as soon as they determined that the call was personal in nature Privacy Law - Jeffrey Pittman 19 State Constitutional and Statutory Privacy Protections Most states, including Arkansas, have privacy protections that are similar in scope to federal laws Some states provide additional protections for medical records, insurance, school records, credit and banking information, for example Privacy Law - Jeffrey Pittman 20 State Common Law Privacy Rights Through the common law process, state courts have developed the following torts, providing additional privacy protections Intrusion Upon Seclusion Public Disclosure of Private Facts Causing Injury to Reputation Publicity Placing Another in a False Light in the Public eye Misappropriation of a Person’s Name or Likeness Privacy Law - Jeffrey Pittman 21 Intrusion This tort is an intrusion upon a person’s right to seclusion or solitude There is liability only if the interference with the plaintiff's seclusion is a substantial one, highly offensive to the ordinary reasonable person The “offensiveness” of the intrusion is by guided by whether a reasonable expectation of privacy was violated Privacy Law - Jeffrey Pittman 22 False Light in the Public Eye This tort involves the defendant revealing information about a person that places that person in a false light. A plaintiff here must demonstrate: The false light in which he was placed by the publicity would be highly offensive to a reasonable person, and The defendant had knowledge of or acted in reckless disregard as to the falsity of the publicized matter and the false light in which the plaintiff would be placed Privacy Law - Jeffrey Pittman 23 Public Disclosure of Private Facts This tort requires public disclosure of private information about a person that, even though true, generates publicity of a highly objectionable kind An example might be the disclosure of names and details about employees fired for viewing pornography at work Privacy Law - Jeffrey Pittman 24 Appropriation Here a defendant is charged with use of a person’s name or likeness without permission This invasion of privacy would include activities such as the unauthorized use of a person’s name in an advertising campaign Privacy Law - Jeffrey Pittman 25 Case Example - Appropriation The following “Sex and the City” advertisement was placed on New York buses and subways by TBS, the cable television network “What is the definition of “yogasm” a. A type of yo-yo trick b. Sex with Yogi Berra c. What Samantha has with a guy from yoga class” Privacy Law - Jeffrey Pittman 26 Case Example - Appropriation Yogi Berra sued for appropriation and damage to his reputation Yogi Berra was a catcher for the New York Yankees from 1946-63, and he successfully managed the New York Yankees and the New York Mets professional baseball teams Yogi Berra agreed to drop his lawsuit against TBS in exchange for an undisclosed settlement (Sept. 2005) Privacy Law - Jeffrey Pittman 27 Case Example – Appropriation Dobby or V. Putin Privacy Law - Jeffrey Pittman 28 Case Example - Appropriation Doe v. TCI Cablevision 110 S.W.3d 363 (Mo. 2003) A former professional hockey player, Anthony Twist, brought an action against the creators and publishers of a comic book titled Spawn Privacy Law - Jeffrey Pittman 29 Case Example - Appropriation Spawn contained a villainous character "Tony Twist" that is a Mafia don whose list of evil deeds includes multiple murders, abduction of children and sex with prostitutes The Missouri Supreme Court held that Twist presented sufficient evidence that defendants used his name as a symbol of his identity, as required to make submissible case for right-of-publicity tort, defendants used Twist’s name to attract consumer attention to their products, and the use of Twist’s name was not protected speech Privacy Law - Jeffrey Pittman 30 Case Examples - Appropriation Vanna White as a robot (Ms. White prevailed in her suit against Samsung and its advertisement) George Wendt as a robot (Mr. Wendt won initial battles against Host International’s “Cheers” bars) Privacy Law - Jeffrey Pittman 31 Case Example - Appropriation The Vanna White and George Wendt victories in California were probably negated by a recent decision, Winter v. D.C. Comics, 69 P.3d 473 (2003) There the California Supreme Court held that the First Amendment overrides state tort law where an individual’s name or likeness is involved in a “transformative” use Privacy Law - Jeffrey Pittman 32 Winter v. D.C. Comics “Celebrities have a statutory right of publicity by which they can prohibit others from using their likeness. . . . An obvious tension exists between this right of publicity and the First Amendment to the United States Constitution.” Privacy Law - Jeffrey Pittman 33 Winter v. D.C. Comics “In [Comedy III Productions, Inc. v. Saderup], we considered when constitutional free speech rights may trump the statutory right of publicity.” Privacy Law - Jeffrey Pittman 34 Winter v. D.C. Comics “We formulated "what is essentially a balancing test between the First Amendment and the right of publicity based on whether the work in question adds significant creative elements so as to be transformed into something more than a mere celebrity likeness or imitation. In [Comedy III Productions, Inc. v. Saderup], we concluded that lithographs and T-shirts bearing the likeness of The Three Stooges were not sufficiently transformative to receive First Amendment protection.” Privacy Law - Jeffrey Pittman 35 Winter v. D.C. Comics “In this case, we apply the same balancing test to comic books containing characters that evoke musician brothers Johnny and Edgar Winter.” Johnny Winters Jonah Hex Privacy Law - Jeffrey Pittman 36 Winter v. D.C. Comics “We conclude that, in contrast to a drawing of The Three Stooges, the comic books do contain significant creative elements that transform them into something more than mere celebrity likenesses. Accordingly, the comic books are entitled to First Amendment protection.” Privacy Law - Jeffrey Pittman 37 Winter v. D.C. Comics In considering whether a work is “transformative,” The California Supreme Court stated a relevant inquiry is whether the transformed work has value independent of the celebrity's fame, that is, value in its own right Andy Warhol pictures were used by the court as an example of protected, transformative art Privacy Law - Jeffrey Pittman 38