Privacy Flashcards
Right to privacy
“Right to be let alone”
Types of privacy
a. Informational privacy
i. Communications and information created by or about individuals
b. Decisional privacy
i. Decisions about family life, health care, and individual autonomy
Prosser’s privacy torts
i. Intrusion upon seclusion
ii. Public disclosure of private facts
iii. False light
iv. Appropriation
Intrusion upon seclusion
i. Intentional intrusion, physical or otherwise
ii. Upon solitude or seclusion of another is subject to liability if
iii. Intrusion would be highly offensive to reasonable person
Public disclosure of private facts
i. One who gives publicity to matter concerning the private life of another is subject to liability if matter publicized is:
1. Highly offensive to reasonable person and
2. Not of legitimate concern to the public
False light
i. One who gives publicity to matter concerning another that places the other before the public in a false light is subject to liability if:
1. Highly offensive to reasonable person
2. Actor had knowledge of or acted in reckless disregard as to falsity
Appropriation
i. One who appropriates
ii. To his or her own use or benefit
iii. Name or likeness of another
1. Exception
a. Newsworthiness
i. Real relationship between subject and topic of public interest
Right of publicity
i. One who appropriates the commercial value of a person’s identity
ii. By using without consent the person’s name or likeness
iii. For purposes of trade
Defamation
i. False or defamatory statement concerning another
ii. Unprivileged publication to a third party
iii. Fault amounting at least to negligence on part of publisher
iv. Either actionability of the statement irrespective of special harm or existence of special harm caused by publication
v. Exception
1. Public figure
a. If public figure
b. Actual malice
i. Knowledge of or reckless disregard for falsity
Intentional infliction of emotional distress
i. Extreme and outrageous conduct
ii. Intentionally or recklessly causes
iii. Severe emotional distress to another
Tiers of scrutiny (1A)
i. Strict scrutiny
1. If protected speech
2. Content-based
3. Then strict
ii. Intermediate scrutiny
1. Protected speech
a. If protected speech
b. Content-neutral
i. Regulates time, place, or manner of speaking
c. Then intermediate
2. Commercial speech
a. If commercial speech
b. Protected (not misleading or unlawful)
c. Then intermediate
iii. No 1A review
1. Unprotected speech
a. Fighting words
b. Incitement of violence
c. Defamation
d. Obscenity
b. Exception
i. Anonymous speech
1. Generally, forbidding anonymity chills free speech
Duty of confidentiality
a. Duty of confidentiality
i. Duty to patient
ii. Breach
b. Duty of disclosure if:
i. Special relationship
ii. Victim identifiable
iii. Harm is foreseeable and serious
HIPAA (structure)
a. Structure
i. Covered entity
ii. Protected health information
Privacy rule
i. Exceptions
1. Consent
2. Marketing (within organization)
Security rule
Only covers electronic data
Constitutional privacy rights
i. First Amendment
1. Free speech, association
ii. Third Amendment
1. Quartering soldiers
iii. Fourth Amendment
1. Searches and seizures
iv. Fifth Amendment
1. Self-incrimination
v. Fourteenth Amendment
1. Substantive due process
Zones of privacy
i. Liberty
ii. Due process
iii. Equal protection
Constitutional torts
- Any person
- Deprived of rights, privileges, or immunities secured by Constitution
- Liable to the injured party
Personal identifying information (PII)
i. URLs or IP addresses
ii. Account numbers
iii. Device IDs or serial numbers
iv. Geographic information
v. Phone and fax number
vi. Medical and health info
vii. Email addresses
viii. Address
ix. Biometric identifiers
x. Birthdate
xi. Social security
Standing
i. (1) Injury in fact
1. Concrete and particularized
2. Actual or imminent, not conjectural or hypothetical
ii. (2) Fairly traceable
iii. (3) Likely that injury will be redressed by court order
FTC (authority)
i. Statutory
1. COPPA
2. FCA (shared with FCC)
ii. Section 5
1. Unfair
2. Deceptive
FTC (enforcement; common scenarios)
i. Broken promises
ii. Lack of notice
iii. Retroactive privacy policy
Video Privacy Protection Act
- Scope
a. Requires user consent
b. Covers all video service providers
c. Including online streaming - Opt in disclosure
a. Consent obtained for two=year period
b. Consent can be withdrawn
c. Must provide “clear and conspicuous” opportunity to withdraw - Exceptions
a. Ordinary course of business (all data)
b. Internal marketing (all data)
c. Given opportunity to opt out (name and address only) - Destruction of records
a. As soon as practicable - Preemption
a. Floor, not ceiling - Enforcement
a. Private right of action when provider knowingly discloses consumer data
Cable Communications Policy Act
- Notice and access
a. Notify of nature and use of personal information collected - Limitations on data collection
a. Consent required - Exceptions
a. Ordinary course of business (all data)
b. Court order (all data)
c. Given opportunity to opt out (name and address only) - Data destruction
a. When no longer necessary - Government access to cable information
a. Court order if:
i. Clear and convincing evidence of criminal activity
ii. Used as material evidence in the case
iii. Subject afforded opportunity to contest claim - Enforcement
a. Private cause of action
b. Minimum $1000 fine
c. $100 for each day of violation - New cable services and product
a. Arguably covered