The New Canadian Tort of Invasion of Privacy DAVID DEBENHAM

Similar documents
Court of Appeals of Texas, Dallas. Bill McLaren Jr., Appellant, v. Microsoft Corporation, Appellee. No CV. May 28, 1999.

Indiana Association of Professional Investigators November 16, 2017 Stephanie C. Courter

HYDERALLY & ASSOCIATES, P.C.

How to Use Torts Tactically in Employment Litigation

LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN TASMANIA

CCTV, videos and photos in health, aged care and retirement living and disability facilities your rights and obligations

LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN WESTERN AUSTRALIA

Adapting Search and Seizure Jurisprudence to the Digital Age: Section 8 of the Canadian Charter of Rights and Freedoms

STATE OF MICHIGAN COURT OF APPEALS

Hernandez V. Hillsides: Evolving Calif. Privacy Law

A Commentary on the Privacy Act. Department of Justice. December 2000

Washoe Tribe of Nevada and California. Law & Order Code TITLE 3 TORTS. [Last Amended 10/1/04. Current Through 2/3/09.]

Intentional Torts. What Is a Tort? Tort Recovery

Robert I, Duke of Normandy. 22 June July 1035

TELUS Transparency Report

Intentional Torts. What Is a Tort? Tort Recovery

Conducting Internal Investigations: Gathering Evidence and Protecting Your Company

How Does the Protection Order Process Work? A Guide for Working With Your Local Court

ANALYSING RIGHT TO PRIVACY WITH RESPECT TO MEDIA BY- SANJANA GUPTA

GATHERING EVIDENCE AND

2:16-cv GCS-MKM Doc # 1 Filed 04/26/16 Pg 1 of 13 Pg ID 1 UNITED STATES DISTRICT COURT IN THE EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION

Particular Crimes can be grouped under 3 headings: Crimes against people Crimes against property Crimes against business interests

UNITED STATES DISTRICT COURT DISTRICT OF NEW JERSEY BRIAN PIETRYLO AND DOREEN MARINO. Plaintiffs 06 Civ. 06-CV5754 (FSH) -v-

There is no single way to create a discovery plan.

Invasion of Privacy CONFLICT

1. ISSUING AGENCY: The City of Albuquerque Human Resources Department.

Conducting surveillance in a public place

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF PENNSYLVANIA

Statutory Frameworks. Safeguarding and Prevent. 1. Safeguarding

Emerging Technology and the Fourth Amendment

H 5304 S T A T E O F R H O D E I S L A N D

TEXAS COURT OF APPEALS, THIRD DISTRICT, AT AUSTIN

Know Your. Help End Discriminatory, Abusive & Illegal Policing!

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA

Canadian Bar Association. Ottawa June 1,1977. Minister of Justice of Canada. Arthur Whealy. Q.C. Pres I dent, Criminal Lawyers Association

Chapter 6 Torts Byron Lilly De Anza College Byron Lilly De Anza College

Decision 063/2012 Mr Drew Cochrane of the Largs and Millport News and the Chief Constable of Strathclyde Police

LICENSE TO USE THIS SITE

COPY 1AR ) Dept.: P52 ) 2. INTENTIONAL INFLICTION COUNTY OF RIVERSIDE 17 ) 4. PRELIMINARY INJUNCTION 19 )

GENERAL INFORMATION FOR THOSE SEEKING A PROTECTION FROM ABUSE ORDER

IN THE CIRCUIT COURT OF MONTGOMERY COUNTY, ALABAMA

I. REGULATION OF INVESTIGATORY POWERS BILL

The Hackers Guide to Search and Arrest. by Steve Dunker J.D. It is legal for an Officer at any time to Ask a person to stop and talk.

Electronic Privacy Information Center September 24, 2001

Policy 3.0: Ethics and Conduct

The GPS Tracking Case Fourth Amendment United States Constitution

Use of Security Cameras and Surveillance in Schools

Case 4:11-cv GAF Document 1 Filed 06/02/11 Page 1 of 13

CRS Report for Congress

Privacy Law Update. Ontario Connections: Access, Privacy, Security & Records Management Conference, June 7, 2016

Investigatory Powers Bill

Elli Lake v. Wal-Mart Stores, Inc. C Minnesota Supreme Court July 30, 1998

Regulation of Investigatory Powers Bill

720 ILCS 5/ Criminal Code of

SECTION 8: REPORTING CRIME AND ANTI-SOCIAL BEHAVIOUR

TORT LAW NOTES. The case below demonstrates that fault is an essential element of liability in trespass to person.

NO , Chapter 5 TALLAHASSEE, March 13, Human Resources UNLAWFUL HARASSMENT AND UNLAWFUL SEXUAL HARASSMENT

CONDUCTING LAWFUL AND EFFECTIVE INVESTIGATIONS REGARDING ALLEGATIONS OF DISCRIMINATION AND HARASSMENT

Legal Guide to Relevant Criminal Offences in Victoria

Definitions under Colorado Revised Statutes 1

This opinion will be unpublished and may not be cited except as provided by Minn. Stat. 480A.08, subd. 3 (2016).

Adapted Bylaws pursuant to the Prevention of Sexual Harassment Law,

Q. What do the Law Commission and the Ministry of Justice recommend?

STATE OF MICHIGAN COURT OF APPEALS

DISCLAIMER. Policy on bullying or harassment. Adopted by PGTC January 2017

The New Tort Relating to Invasion of Privacy: Insurance Implications

Police Detective (2223) Task List. 1. Reviews investigative reports received from supervising detective in order to determine assigned duties.

WHEN IMMIGRATION OFFICIALS ARRIVE AT YOUR WORKPLACE: A Know Your Rights Toolkit for Public Sector Workers

REVENGE PORN AND OTHER NEW CAUSES OF ACTION FOR FAMILY LAW

Regulation of Investigatory Powers Act 2000

Location Privacy: The Legal Landscape. David L. Sobel Senior Counsel, EFF Stanford PNT Symposium October 29, 2014

INVESTIGATORY POWERS BILL EXPLANATORY NOTES

UNITED STATES DISTRICT COURT DISTRICT OF NEW JERSEY BRIAN PIETRYLO AND DOREEN MARINO. Plaintiffs 06 Civ. -v- HILLSTONE RESTAURANT GROUP, Defendant.

Assault and Battery Common Law

ONLINE IMPERSONATION, REVENGE PORN, AND OTHER NEW CAUSES OF ACTION

STATE OF RHODE ISLAND AND PROVIDENCE PLANTATIONS Filed March 19, 2009

September 1, 2015 Le 1 er septembre 2015 DISCLOSURE

PETITION FOR PROTECTIVE ORDER

PETITION FOR PROTECTIVE ORDER

TORT LAW. By Helen Jordan, Elaine Martinez, and Jim Ponce

College/University Attended Degree Awarded (if any) Years Grade Pt. Average

TORTS 1 MID-TERM MODEL ANSWER (FALL 2007) MITCHELL. I. Battery

FILED: NEW YORK COUNTY CLERK 03/20/2013 INDEX NO /2013 NYSCEF DOC. NO. 1 RECEIVED NYSCEF: 03/20/2013

LAW Rule of conduct enforced by controlling authority; provides order, stability, and justice.

STALKING. Expanded access to civil orders of protection for victims of stalking. Meg Savage Kentucky Coalition Against Domestic Violence

Online Resources. Stalking Awareness Month Website Stalking Resource Center

2018 MARE/MO K-8 Fall Conference

TORTS 1 MID-TERM EXAM MODEL ANSWER (FALL 2006) I. General Comments:

Guide for Municipalities

3. Defendant JOHN DOES 1-3 ( Defendants Doe ) are fictitious names for presently

UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA THIRD DIVISION

Case 3:18-cv MEJ Document 1 Filed 01/31/18 Page 1 of 14

EDITORIAL POLICY GUIDANCE NOTE PRIVACY AND FACTUAL ENTERTAINMENT

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

Results report Missing Persons Act What was this engagement about? The Yukon Government was looking to develop legislation as a mechanism to assist

Australian and New Zealand College of Anaesthetists

Coordinated text from 10 August 2011 Version applicable from 1 September 2011

Attachment 1A to A.P DISRUPTIVE ACTS THAT REQUIRE SECURITY MEASURES

EMPA Residency Program. Harassment Policy

First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO. Act No. 11 of 2010

Transcription:

The New Canadian Tort of Invasion of Privacy DAVID DEBENHAM BA, LL.B, LL.M (Ottawa), LLM (York), MBA, D.I.F.A, CMA, C.F.I, C.F.E,C.F.S.

Adds to the list of investigator torts Trespass to the person/false imprisonment Trespass to chattels Trespass to land Conversion The tort of unlawful interference with economic relations Defamation 2

4 types of wrongdoing Intrusion upon the plaintiff's seclusion or solitude, or into his private affairs Public disclosure of embarrassing private facts about the plaintiff Publicity which places the plaintiff in a false light in the public eye Appropriation, for the defendant's advantage, of the plaintiff's name or likeness 3

Hypothetical Example: an investigator hired by an employer finds the employee s password, and goes onto his facebook page and appropriates a photo of the employee cavorting at a stripper bar at Aspen. The photo is then used to show that the employee is not really disabled. On cross-examination the employee explains that the photo was taken before his accident at work 4

Analysis Intrusion upon seclusion - The taking of the photo using the password The publication of the photo at a stripper bar embarrasses the plaintiff by the disclosure of private acts The use of the photo to suggest that the employee was not really injured is publicity that puts the plaintiff in a false light Appropriation for personal advantage - the use of the photo in your report, and getting paid for it 5

Intrusion on seclusion One who intentionally intrudes, physically or otherwise, upon the seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the invasion would be highly offensive to a reasonable person. 6

The modesty tort Personal privacy reflects the right an individual has to control their physical person, and as such, is given a high level of protection by the courts. Personal in this context is not a synonym for private, but refers to one s physical person. Personal privacy protects bodily integrity, and in particular the right not to have our bodies touched or explored to disclose objects or matters we wish to conceal. The right to personal privacy protects against unreasonable searches of one s body, the taking of blood or tissue samples, and other physically invasive searches. 7

The Don t invade my space tort 8

The Don t invade my space tort Territorial or spatial privacy recognizes an individual s privacy interests in a particular geographical space. For example, a person has a strong privacy interest in their home, as it is the place where our most intimate and private activities are most likely to take place. While apartment-dwellers will have a privacy interest in their apartments, a home owner s privacy interest extends to the surrounding land. Spaces other than the home that have privacy significance may also be given some protection. Such spaces might include one s car, a hotel room, a rented locker, or even spaces occupied by one s belongings such as a purse or backpack. Territorial privacy only protects a particular space as it relates to an individual. 9

The No Snooping Tort 10

The No Snooping Tort Privacy of communications traditionally addressed the right to send and receive mail, or make phone calls on land lines, without interceptions by their parties. Where cell phones do not require bugging, and emails are transmitted through the internet, the concept of privacy of communications has had to adopt. Most people trust that their emails are not being read, but when people feel that their right to keep their emails private is being violated, email privacy takes effect. Privacy laws concerning workplace email are different. A corporate employer might have company-wide rules permitting the company to read email sent or received through the company's email service. If an employer has policies that lead employees to think that email communication through the company's email service is allowable for private purposes and not for business purposes only, then the rights of the employer might be limited when it comes to monitoring emails. 11

The My Secrets are My Own tort 12

The My Secrets are My Own tort Informational privacy reflects one s privacy interests beyond our bodies and the places where we live and work. Although physically unbounded, information about oneself and the ability to control it is central to dignity and integrity. Territorial privacy protection does not necessarily extend to spaces occupied by virtue of relationships, however intimate, such as the car of a close friend or a girlfriend s apartment. Informational privacy raises the question of how much information about ourselves and our activities we are entitled to shield from the curious eyes. The nature and level of the informational privacy interest is very data and context specific. For some time, Canadian courts have focused on giving the highest level of protection to a biographical core of personal information, according little weight to other forms of personal information. This biographical core of information being information that individuals in a free and democratic society would wish to maintain and control from dissemination, being information which tends to reveal intimate details of the lifestyle and personal choices of the individual. 13

4 in 1 Modesty I own my space No snooping My information belongs to me Are these different ways of seeing the same sphere of privacy? 14

Therefore. An investigating party should understand that the tort includes not only physical intrusions but also listening or looking, into a person's private affairs, opening private or personal correspondence, intercepting communications, or examining a private bank account. The new tort specifically recognizes a person's right to informational privacy (as distinct from personal and territorial privacy) including sensitive health information, sexual orientation, employment information, diary or private correspondence, information indicating where a person lives, or any communications by cell phone, email, or text message. 15

Things to Remember Privacy involves reasonable expectations, not personal definitions (i.e., a declaration that something is confidential or private does not end the issue) Charter Values balance the public interest and the private right, and examine the method of obtaining the information (least obtrusive?) 16

Deep water for Investigators auditory or visual surveillance of a person by any means including eavesdropping, watching, spying, besetting or following and whether or not accomplished by trespass; listening to or recording of a conversation in which a person participates, or listening to or recording of messages to or from that person passing by means of telecommunications, otherwise than as a lawful party thereto; use of letters, diaries, emails, or other personal documents of a person; 17

Reasonable Expectation of Privacy the individual s presence at the time of the search; possession or control of the property or place searched; ownership of the property or place; historical use of the property or item; the ability to regulate access, including the right to admit or exclude others from the place; the existence of a subjective expectation of privacy; and the objective reasonableness of the expectation. 18

Things to Remember Pre-texting to get access to information invites a claim for invasion of privacy Privacy is about personal space not personal property Privacy is about controlling personal information Lawful conduct requires a balancing act Third-party consent Charter Values and the convergence of the law of tort and criminal law when to get a court order 19

Your outs Informed consent of someone inside the zone of privacy Information in plain view 20

Therefore There is no reasonable expectation of privacy for actions taking place in public. Even if actions take place on private property, the circumstances may suggest that there is not a reasonable expectation of privacy. It is generally permitted to videotape a plaintiff in a public place or a place visible to the public such as a parking lot or the front yard of one s house 21

R. Cole Reasonable expectation of privacy to school computer given school policy acceded to its use for private purposes Search by school technician to find unstable files was to be expected by employee - technician within zone of privacy - employee consent After accidentally finding photos of child as part of search for unstable files - photos in plain view Continued search thereafter for offensive photos required a search warrant 22

Quantum of Damages The nature, incidence, and occasion of the defendant s wrongful act; The effect of the wrong on the plaintiff s health, welfare, social, business, or financial position; Any relationship, whether domestic or otherwise, between the parties; Any distress, annoyance, or embarrassment suffered by the plaintiff arising from the wrong; and The conduct of the parties, both before and after the wrong, including any apology or offer of amends made by the defendant. 23

DAVID DEBENHAM david.debenham@mcmillan.ca 24