This document summarizes recent developments in privacy tort law as it relates to private investigators. It discusses two key cases: Jones v. Tsige established the tort of intrusion upon seclusion, while Jane Doe v. ND established the separate tort of public disclosure. The document outlines the elements and rationale of these torts, and examines how they may affect private investigators both positively in cases of legitimate investigations but also negatively in cases of illegitimate invasions of privacy. A framework is presented for determining liability by balancing public and private interests. Examples of both legitimate and illegitimate private investigations are also summarized.
This presentation was given to a class on the problems with the current Katz analysis. I also proposed certain revisions to the analysis using the Fifth Amendment's takings clause jurisprudence.
This presentation was given to a class on the problems with the current Katz analysis. I also proposed certain revisions to the analysis using the Fifth Amendment's takings clause jurisprudence.
2013 05-29 Advertising and Marketing Law PresentationPaul Jacobson
I presented at this terrific conference about social media and the law. I touched on a couple themes including copyright, online reputation and privacy. I took a new approach (for me, at least) and used my diabetes as an analogy for how non-lawyers tend to approach Legal.
Legally Correct But Technologically Off the Mark - The Case of Arie GengerMark Hyde
Trump v Arie Genger involved the battle for control of an investment company known as TRI,. The dispute was between the Trump Group, the new owners, and Arie Genger, the original owner. As is standard in such cases, the court entered a “status quo order”, enjoining both parties from “tampering with, destroying, or in any way disposing of any Company-related documents, books, or records.”
These are the slides for my lecture, "Interview Skills and Contract Negotiation Advice for the Fellowship or Junior Faculty Applicant", presented at the 2015 Academic Assembly of the Council of Residency Directors in Emergency Medicine (CORD-EM), Phoenix, AZ, April 2015.
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...Zapproved
The spotlight has turned to the issue of proportionality as it may be applied to the preservation of potentially relevant information. The postPension Committee world has moved beyond asking “if” litigants need to preserve information to a focus on “how.”
One need look no further than the testimony before the Dallas mini-conference in September and followed shortly thereafter by the debate stirred by the Pippins v. KPMG opinion.
Litigants are struggling to balance the increasing demands of preservation being driven by the exponential increase in electronically stored information (ESI) and the perceived rise in sanctions for spoliation. In order to control the increasing cost and “monumental inefficiency” that can result from traditional approaches to data preservation, the stakeholders in the U.S. legal system are searching for a solution founded on the principles of both reasonableness and proportionality as embodied in the Federal Rules of Civil Procedure.
The goal of this paper is to explore options for providing more objective “guideposts” for litigants facing the uncertainty of future discovery demands.
Commercial disputes are certain issues that need to be addressed as soon as possible. Consult primedm.com.au for a commercial mediation, to sort out your problems.
2013 05-29 Advertising and Marketing Law PresentationPaul Jacobson
I presented at this terrific conference about social media and the law. I touched on a couple themes including copyright, online reputation and privacy. I took a new approach (for me, at least) and used my diabetes as an analogy for how non-lawyers tend to approach Legal.
Legally Correct But Technologically Off the Mark - The Case of Arie GengerMark Hyde
Trump v Arie Genger involved the battle for control of an investment company known as TRI,. The dispute was between the Trump Group, the new owners, and Arie Genger, the original owner. As is standard in such cases, the court entered a “status quo order”, enjoining both parties from “tampering with, destroying, or in any way disposing of any Company-related documents, books, or records.”
These are the slides for my lecture, "Interview Skills and Contract Negotiation Advice for the Fellowship or Junior Faculty Applicant", presented at the 2015 Academic Assembly of the Council of Residency Directors in Emergency Medicine (CORD-EM), Phoenix, AZ, April 2015.
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...Zapproved
The spotlight has turned to the issue of proportionality as it may be applied to the preservation of potentially relevant information. The postPension Committee world has moved beyond asking “if” litigants need to preserve information to a focus on “how.”
One need look no further than the testimony before the Dallas mini-conference in September and followed shortly thereafter by the debate stirred by the Pippins v. KPMG opinion.
Litigants are struggling to balance the increasing demands of preservation being driven by the exponential increase in electronically stored information (ESI) and the perceived rise in sanctions for spoliation. In order to control the increasing cost and “monumental inefficiency” that can result from traditional approaches to data preservation, the stakeholders in the U.S. legal system are searching for a solution founded on the principles of both reasonableness and proportionality as embodied in the Federal Rules of Civil Procedure.
The goal of this paper is to explore options for providing more objective “guideposts” for litigants facing the uncertainty of future discovery demands.
Commercial disputes are certain issues that need to be addressed as soon as possible. Consult primedm.com.au for a commercial mediation, to sort out your problems.
Social Lawyers (slide deck to accompany hypotheticals)Nicole Hyland
This is an alternative version of my Social Lawyers slide deck. It is formatted to accompany a series of social media and legal ethics hypotheticals, which can be found here: http://www.jdsupra.com/legalnews/hypotheticals-legal-ethics-and-social-57583/
Social Media Content and Discovery Practice Kevin O'Shea
Social Media Content and Discovery Practice: Entitlement, Scope, Technical Issues in Production, Ethics, and Authentication. (Edited Materials. Not offered for CLE credit).
This is a lecture on William Scheuerman's article, "Whistleblowing as Civil Disobedience: The Case of Edward Snowden," Philosophy and Social Criticism (2014). It is for an introduction to philosophy course at the University of British Columbia in Vancouver, BC, Canada
Its all about forensic psychiatry aspects of India not very frequently discussed and so a little attempt from me. Its not exhaustive and many more aspects regularly updated should be tallied.
Unit V Significant U.S. Supreme Court Rulings and the Imp.docxmarilucorr
Unit V: Significant U.S. Supreme
Court Rulings and the Impact on
the Juvenile Justice System in
America
Introduction
• We are now starting Unit V: Significant U.S. Supreme Court
Rulings and the Impact on the Juvenile Justice System in
America.
• So far, we have covered and discussed the historical
background of juvenile delinquency and the juvenile justice
system in the United States, criminological theories that help
to expand our understanding of juvenile delinquency, the
complex relationship between police officers and juveniles,
juvenile gangs, and key actors that help play crucial roles as
they relate to the structure of the juvenile court system.
Unit V: U.S. Supreme Court Rulings
• If you will recall, you learned about juvenile defense attorneys,
juvenile prosecuting attorneys, and the juvenile court judge in
the previous unit.
• In this unit, you will take what you have learned and expand
your knowledge, exploring U.S. Supreme Court cases that
helped define and direct juvenile corrections, juvenile defense
attorneys, juvenile prosecuting attorneys, and juvenile court
judges.
Unit V: U.S. Supreme Court Rulings
• Before we begin, watch the video linked
below that continues the story of Little
John, a juvenile.
https://online.columbiasouthern.edu/csu_c
ontent/courses/emergency_services/bcj/bcj
2201/15K/video/unitv_video.mp4
• Click here to access the transcript for this
video.
https://online.columbiasouthern.edu/csu_content/courses/emergency_services/bcj/bcj2201/15K/video/unitv_video.mp4
https://online.columbiasouthern.edu/CSU_Content/courses/Emergency_Services/BCJ/BCJ2201/15K/transcripts/BCJ2201_UnitV_Transcript.pdf
https://online.columbiasouthern.edu/csu_content/courses/emergency_services/bcj/bcj2201/15K/video/unitv_video.mp4
https://online.columbiasouthern.edu/csu_content/courses/emergency_services/bcj/bcj2201/15K/video/unitv_video.mp4
Consider the Following
You will want to start thinking about this question as you read
through the following U.S. Supreme Court decisions and cases:
• How does this case directly relate to juvenile defense attorneys
and juvenile court judges who preside over juvenile court
cases?
Court Cases
The information below provides a brief description of some of
the cases we will explore.
Figure 1: U.S. Supreme Court decisions impacting juvenile court system.
(“U.S. Supreme Court Cases,” 1999)
https://www.ncjrs.gov/html/ojjdp/9912_2/juv2.html
https://www.ncjrs.gov/html/ojjdp/9912_2/juv2.html
Kent v. United States
So, let’s begin by examining the first landmark case you will learn
about: Kent v. United States. Before we can examine the case,
we need to know the background and historical makeup of the
case.
• In 1961, Morris Kent was a 16-year-old juvenile who was
charged with rape and robbery.
• While in custody, Kent confessed to the criminal charges and
crimes against him.
Kent v. United States
• Kent’s defense lawyer filed a request ...
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How libraries can support authors with open access requirements for UKRI fund...
New and Newer Privacy Torts: Public Disclosure and the Next Frontier.
1. Omar Ha-Redeye May 3, 2016
AAS, BHA (Hons.), PGCert, JD, LLM
CNMT, RT(N)(ARRT)
New and Newer Privacy Torts:
Public Disclosure and the Next Frontier
2. • Privacy law and Private Investigators
• Jones v. Tsige
• The formal establishment of privacy torts and intrusion upon seclusion:
• Jane Doe 464533 v. ND
• Public disclosure
• Applications of these new torts regarding Private Investigators
• Potential liability under these new torts
• Examples of Legitimate investigations
• Exmaples of Illegitimate investigations
• Elements the Court considers for liability
• The next frontier – privacy in the technological era
• Conclusion
Overview
3. • In recent years, Privacy Legislations have been used as a shield against obtaining
private information. However, Statutes such as PIPEDA has limited jurisdiction,
especially in civil tort litigations.
• The Courts confirmed, in the past, investigatory tools such as surveillance are
legitimate tools in some circumstances.
• Druken v R.G. Fewer and Associates Inc. [1998] N.J. No. 312
• Amalgamated Transit Union Local No. 569 v Edmonton (City), 2004 ABQB 280
• Lawful activities of private investigators are generally not caught by application of
privacy legislation.
Privacy and Private Investigators
4. • On the other hand, the trend to the protection of personal information in terms of
civil liability has been moving towards certainty
• Historically, legal actions around privacy:
• stemmed from concepts of trespass in the common law, and
• Were recognized only actionable where stipulated by statute law
• Aspects of Privacy have long been protected against actions such as breach of
confidence, defamation, breach of copyright, nuisance and various property rights,
• But the right of action for breach of privacy continued to remain uncertain for the
past 120 years of debate
Privacy and Private Investigators
5. • Jones v. Tsige, 2012 ONCA 32 (CanLII)
• Two things were established in this case:
1. the right to action for invasion of privacy
2. The tort of intrusion upon seclusion
• Jane Doe 464533 v. ND
1. Public Disclosure, a second type of tort for privacy intrusion was established
• If, and how will these new torts affect Private Investigators?
Tort of invasion of privacy were established
6. • The action arose between two employees in a bank who did not know or work with
each other.
• The plaintiff, Sandra Jones, discovered the Winnie Tsige, the defendant, looked into
Jones' banking records at least 174 times over a period of four years. The defendant
had formed a common law relationship with the former husband of the plaintiff.
• The defendant acknowledged looking at the plaintiff’s bank information without just
cause or reason, contrary to the bank’s policy and her professional duty.
Jones v. Tsige
7. • Jones initiated legal actions against Tsige.
• Jones asserts that her privacy interest in her confidential banking information has
been "irreversibly destroyed" and claims damages of $70,000 for invasion of privacy
and breach of fiduciary duty, and punitive and exemplary damages of $20,000.
• The plaintiff moved for summary judgment, but the action was dismissed when the
defendant was successful on the motion in claiming that there was no tort for breach
of privacy in Ontario.
• The motion judge found that Tsige did not owe Jones a fiduciary obligation, and
added that given the existence of privacy legislation protecting certain rights, any
expansion of those rights should be dealt with by statute rather than common law.
Jones v. Tsige
8. • Jones successfully appealed this decision to the Court of Appeal, and was awarded
$10,000.
• The central question to this case is:
• Does Ontario law recognize a cause of action for invasion of privacy?
Jones v. Tsige
9. • The Judge considered several aspects:
1. Influenitial relevant texts
2. Case law
3. Charter
4. Statute law regarding private information
• And then defined the tort of intrusion upon seclusion
Analysis
10. • Sharpe J.A. reviewed the seminal articles of S.D. Warren and L.D. Brandeis, "The
Right to Privacy" (1890), and William L. Prosser, "Privacy" (1960)
• Sharpe J.A. accepted the proposition by William L. Prosser in his 1960 article,
“Privacy,” on the four different types of related torts for breach of privacy:
• 1. Intrusion upon the plaintiff’s seclusion or solitude, or into his private affairs.
• 2. Public disclosure of embarrassing private facts about the plaintiff.
• 3. Publicity which places the plaintiff in a false light in the public eye.
• 4. Appropriation, for the defendant’s advantage, of the plaintiff’s name or likeness
• This case is within the first category, intrusion upon seclusion
Previous Commentary
11. • The Judge looked for case law for two aspects:
• Recognition of a cause of action for privacy, or the trend to that recognition
• The Court’s willingness to dismiss claims based on no cause of action
• Sharpe J.A. listed several case laws dating back to 1981 on the Court awarding
damaging for the invasion of privacy, and decisions where the Judge refused to
dismiss a claim due to the lack of certainty on the existence of a proper cause of
action
Case law
12. • Charter jurisprudence identifies privacy as being worthy of constitutional protection
and integral to an individual's relationship with the rest of society and the state.
• Charter jurisprudence has recognized three distinct privacy interests:
1. personal privacy
2. territorial privacy
3. informational privacy
• Although the Charter would not necessarily apply to actions between private parties,
however it was consistent to develop the common law to reflect Charter values.
Charter
13. • The court confirmed the existence of a right of action for intrusion upon seclusion
• The court adopted the wording of the American Restatement§652B to define
intrusion of seclusion, which was itself imported from Prosser:
• One who intentionally intrudes, physically or otherwise, upon the seclusion of another or
his private affairs or concerns, is subject to liability to the other for invasion of his privacy,
if the invasion would be highly offensive to a reasonable person.
• Non-physical forms of investigation were also included
• The intrusion itself makes the defendant subject to liability
Defining the Tort of invasion of privacy
14. • The court lay out the elements of this cause of action:
1. the defendant’s conduct must be intentional, including recklessness;
2. the defendant must have invaded, without lawful justification, the plaintiff’s private
affairs or concerns;
3. a reasonable person would regard the invasion as highly offensive causing distress,
humiliation or anguish.
Defining the Tort of invasion of privacy
15. • The trend of Court decisions regarding this matter has always been moving towards
this recognition
• Technology changes rapidly, affecting ways of communication and the storage of
personal, private information.
• Sharpe J.A. recognized the threat to the right of privacy from the changing
technology, and it is within the capacity of the common law to evolve in response to
this problem
Rationale for this definition
16. • The most important reason:
• The facts in this case “cry out for a remedy”
• This reason is recently echoed in another privacy invasion tort case, Jane Doe
464533 v. ND
Rationale for this definition
17. • The Court of Appeal in Jones drew upon the American Restatement (Second) of
Torts(2010), which identified the following privacy torts at para 18:
1. Intrusion upon the plaintiff’s seclusion or solitude, or into his private affairs.
2. Public disclosure of embarrassing private facts about the plaintiff.
3. Publicity which places the plaintiff in a false light in the public eye.
4. Appropriation, for the defendant’s advantage, of the plaintiff’s name or likeness.
• Jane Doe 464533 v. ND, a recent case, formall established the second type of privacy
torts: public disclosure
Public disclosure
18. • The parties in this case were high school sweethearts. Things turned slightly less
sweet once the plaintiff moved away for university, but they remained in touch.
• The parties communicated via text message and the Internet. The defendant sent
the plaintiff explicit photos of himself, and eventually, convinced her to do the same
for him, even though they were no longer in a relationship. He provided assurances
that nobody else would see the explicit video.
• Within one month he had posted this video to an Internet forum with the title,
“college girl pleasures herself for ex boyfriends (sic) delight”. He showed the video to
several of his friends from their hometown.
Jane Doe 464533 v. ND
19. • The plaintiff was “devastated, humiliated and distraught.”
• The consequences and impact of the defendant’s actions on the plaintiff was
significant and long-lasting. The defendant could not sleep and barely ate, she
deferred her Christmas exams because she was physically and mentally distraught.
• Her took her to a crisis intervention centre at a hospital. She cried for most days and
"had no emotion or life." In her words, she "felt like a very cold person and felt like
everything in my life and all of my beliefs and morals had been stolen from me.“
• This incident has haunted the plaintiff for more than four years, and will likely to
continue to in the future.
Jane Doe 464533 v. ND
20. • In Court, Justice Stinson reviewed existing areas of tort liability, including breach of
confidence, intentional infliction of mental distress, and invasion of privacy.
• For invasion of privacy, Justice Stinson consulted the decision of Jones in great detail,
and found that the Charter protected value of privacy, as well as the effect of rapidly
evolving technology, to be highly applicable in this case.
Jane Doe 464533 v. ND
21. • Justice Stinson found the facts of this case are more closely aligned with Public
disclosure than intrusion upon seclusion.
• "Public disclosure of embarrassing private facts about the plaintiff" is described by
the Restatement (Second) of Torts (2010) at 652D as follows :
• one who gives publicity to a matter concerning the private life of another is subject
to liability to the other for invasion of his privacy, if the matter publicized is of a kind
that
• (a) would be highly offensive to a reasonable person, and
• (b) is not of legitimate concern to the public.
Public disclosure
22. • Prosser, in “Privacy”, listed the feature of this tort as follows :
1. the disclosure of the private facts must be a public disclosure, and not a private
one;
2. the facts disclosed to the public must be private facts, and not public ones; and
3. the matter made public must be one which would be offensive and objectionable
to a reasonable man of ordinary sensibilities.
Public disclosure
23. • The Court issued:
• a total monetary award in favour of the plaintiff of $141,708.03, including damages,
aggravated damages, and punitive damages, and
• an injunction ordering the defendant to destroy all copies of this video in his possession,
preventing him from posting this video online or sharing it with others, and from having
any contact with the plaintiff or her family.
Outcome
24. • The significance of this new tort affects the protection of privacy on several aspects:
1. Legislatures have struggled to find Charter-compliant means to curb inappropriate
conduct online. The Criminal Code has proven too heavy-handed to address the
same. And existing civil remedies have not proven effective enough.
2. The large damages award granted here, and the powerful and sweeping nature of
the injunction, ensures that this new tort will certainly pop its head up in the
future. More importantly, it sends an extremely powerful message to those who
would engage in similar behaviour that there are now significant consequences in
law.
Significance
25. • Privacy torts are relatively new in Canada.
• The recent, formal recognition of Privacy torts reveals a limited amount of relevant
case law on this topic, especially in relation to Private Investigations
• Aside from what we already have, we could look to US jurisdictions for references
Limited Case law
26. • Caltagirone v. Scozzari-Cloutier
• The Court attempted to establish a framework for torts of privacy breach
• The Court recognized not all personal information is private. The tort of invasion of
privacy involves a balancing between competing public and private interests
Manner of Conduct
27. • Deputy Justice Criger set out the following questions as a framework to guide the
balancing:
• 1. Is the information acquired, collected, disclosed or published of a kind that a
reasonable person would consider private?
• 2. Has the Plaintiff consented to acquisition or collection of the information?
• 3. If not, has the information been acquired or collected for a legal process or public interest
reason? If so, what is that reason?
• 4. Has the Plaintiff consented to disclosure or publication of the information?
• 5. If not, has the information been disclosed or published for a legal process or public interest
reason? If so, what is that reason?
• 6. Is the legal process or public interest reason put forward for acquisition, collection,
disclosure or publication one that a reasonable person would consider outweighing the
interest of the individual in keeping the information private?
Manner of Conduct
28. • Actions of investigations on personal information is potentially liable for privacy torts.
• The determination of liability can be examined through relevant case law.
Determination of Liability
29. • In this case, the Superior Court of Pennsylvania found that there is a social utility to
be gained form fraud investigations being conducted. It is in the best interest of
society that valid claims be ascertained and fabricated claims be exposed.
• The Court mainly considered if Tagouma, the Appellant, had a reasonable
expectation of privacy, and thus a right to be free from intrusion upon seclusion.
• The Court further discussed whether surveillance should be limited to sight and
hearing, and not to include the use of technologically advanced tools (video camera)
that may be used to intrude privacy.
Legitimate Investigations
30. • Facts of the case:
• In 2004 the Appellant suffered a fall at work and acute fracture on his right hand. He
sought worker’s compensation benefits. His employer contested his claim and while
his claim was pending, the employee retained a private investigator to preform
surveillance on the appellant.
• The investigator video taped the appellant in his prayer through a window, which
consisted of standing up, kneeling and placing his head upon the floor.
Tagouma v. Investigative Consultant Services
Inc. 2010
31. • The Court ultimately found in favor of the investigator:
• Appellant had failed to establish an expectation of privacy while praying in public.
• There is a social utility to be gained form these investigations. It is in the best interest of
society that valid claims be ascertained and fabricated claim be exposed.
Tagouma v. Investigative Consultant Services
Inc. 2010
32. • Essential elements to intrusion upon seclusion
1. the defendant’s conduct must be intentional, including recklessness;
2. the defendant must have invaded, without lawful justification, the plaintiff’s private
affairs or concerns;
3. a reasonable person would regard the invasion as highly offensive causing distress,
humiliation or anguish.
Reasons behind this decision
33. • The Supreme Court of the United States has noted, that a plaintiff who claims
worker’s compensation, has demised expectation of privacy. Citing that it is not
uncommon for defendants in accidents cases to employ investigators to check the
validity of claims against them. The plaintiff must expect reasonable inquiry and
investigation to be made into her their claim and to this extent their interest in
privacy is circumscribed.
• The question of whether the investigator’s conduct is reasonable, the court found
that there is a social utility to be gained form these investigations. It is in the best
interest of society that valid claims be ascertained and fabricated claim be exposed
Reasons behind this decision
34. • Schmidt v. Ameritech Illinois
• The plaintiff claimed to have a knee injury and went on disability leave.
• The plaintiff's supervisor became suspicious and placed him under investigation as
the plaintiff attempted to take vacation against disability policy
• In addition to staking out the plaintiff's home, Ameritech, the employers also
checked certain of the plaintiff's phone records in an attempt to prove his
whereabouts during the week in question.
• The plaintiff brought an intrusion-upon-seclusion claim against Ameritech, alleging
that the company had improperly reviewed his phone records.
Justification: “protection of its property
interest and rights”
35. • Although the jury found in the plaintiff's favor, the verdict was overturned on appeal.
On appeal the court found that “Ameritech's conduct was a necessary incident to the
protection of its rights or property,” and that “ ‘rights or property’ includes
Ameritech's monetary resources.”
Justification: “protection of its property
interest and rights”
36. • Shred-Tech Corp v. Viveen.
• The Investigators obtained telephone records, and made video and audio recordings
while posing as a prospective customer at one of the defendants’ business premises.
• The Judge recognized this to be a breach of the defendant’s right to privacy, and this
issue is of important public interest.
Illegitimate Private Investigation
37. • In the case of R. v. Cole, the accused was a high school teacher who was charged
with possession of child pornography and unauthorized use of a computer.
• He was permitted to use his work-issued laptop computer for incidental personal
purposes which he did. While performing maintenance activities, a technician found
on the accused’s laptop a hidden folder containing nude and partially nude
photographs of an underage female student.
• The technician notified the principal, and copied the photographs to a compact
disc. The principal seized the laptop, and school board technicians copied the
temporary Internet files onto a second disc.
Applications – assessment of liability
38. • In light of Jones, Cole, and Tagouma, it is evident that when it comes to the use of
investigations, courts could assess liability based on:
• Location of surveillance
• Reasonable expectation of an individual
• Legitimacy of the cause of investigation
• Conduct of the investigator
The Next Frontier for Investigators
39. • If employers hire investigators to investigate an employee, they may be of vicarious
liability for the intrusion upon seclusion.
• In Cole, we see the significance of examining the existing policies that may affect the
reasonable expectation of privacy: if the employer allows the employee to take
laptops home and use them personally, there is a reasonable expectation of privacy.
Applications – assessment of liability
40. • In another US jurisdiction case law, where an employer was successfully sued for the
actions of the Private Investigators hired by the employer.
• North American Corporation of Illinois retained a firm to investigate whether its
former salesperson, Kathleen Lawlor, had violated a noncompetition agreement.
• The Private Investigators used information provided by the employer, such as birth
date, address, home and mobile phone numbers, and social security number, to
obtain the personal phone records from the employee’s telephone carrier.
• The jury returned a verdict in favor of the employee, and awarded her $65,000 in
compensatory damages and $1.75 million in punitive damages.
• The Court however, capped punitive damages at $65,000 because there was no
evidence that North American orchestrated an “intentional, premeditated scheme to
harm Lawlor.”
Applications
41. • In a very recent case, a tenant refused to allow the landlord access to the property
for the purpose of photographing it, under concerns of privacy.
• The lease allowed the landlord entry “in any circumstances”, but the Ontario
Divisional Court Judges found entry for the purpose of photography without consent
was not a legitimate reason.
Applications
42. • The Court has stresses the evolving and adaptive nature of common law in response
to the constantly evolving technology.
• As far as privacy torts go, should we expect the other two American torts to
influence or modify Canadian common law?
1. Intrusion upon the plaintiff’s seclusion or solitude, or into his private affairs.
2. Public disclosure of embarrassing private facts about the plaintiff.
3. Publicity which places the plaintiff in a false light in the public eye.
4. Appropriation, for the defendant’s advantage, of the plaintiff’s name or likeness.
Future Frontiers?
43. • The trend of the Court’s decision regarding privacy in this technological era concerns
with two main aspects:
1. Conduct on acquiring information
2. Conduct on what to do with the information
• Intrusion upon seclusion protects privacy from unwanted attention and investigation
• Public disclosure protects privacy from illegitimate and mal-intentioned publication
of personal information
Protection of information
44. 3. Publicity which places the plaintiff in a false light in the public eye.
4. Appropriation, for the defendant’s advantage, of the plaintiff’s name or likeness.
• We could imagine these two types of tort being used to regulate conduct regarding
acquired personal information.
• The aim is to prevent illegitimate, unwanted and unwelcomed gather and use of
personal information.
Protection of information
Druken:
Investigators were retained to investigate the validity of the plaintiff’s claims through surveillance.
The Court confirmed that the courts recognize surveillance as a legitimate tool in defense of personal injury claims, and the actions of the companies involved were reasonable.
The surveillance was not without purpose, and the insurance company had a lawful right to pursue such surveillance.
The Court further confirmed that video surveillance did not require the plaintiff’s consent.
http://www.canlii.org/en/nl/nlsctd/doc/1998/1998canlii18731/1998canlii18731.html?resultIndex=1
Amalgamated:
An employee went on disability leave. His employer ordered video surveillance to demonstrate that the employee was performing strenuous physical tasks. The employee argued the surveillance breached s.8 Charter rights.
The Court of Queen’s Bench of Alberta, on review, held that the Charter had not been breached as the employee had no reasonable expectation of privacy, given that the surveillance occurred in a public place and was a public activity engaged in by the employee.
http://www.canlii.org/en/ab/abqb/doc/2004/2004abqb280/2004abqb280.html?autocompleteStr=Amalgamated%20Transit%20Union%20Local%20No.%20569%20v%20Edmonton%20&autocompletePos=1
In July 2009, Sandra Jones, the plaintiff, discovered the Winnie Tsige, the defendant, had been surreptitiously looking at Jones' banking records.
Jones and Tsige worked at different branches of the Bank of Montreal(“BMO”), but did not know each other.
Tsige formed a common-law relationship with Jones’ former husband.
As a bank employee, Tsige had full access to Jones' banking information and, contrary to the bank's policy, looked into Jones' banking records at least 174 times over a period of four years.
The information displayed included transactions details as well as personal information, such as date of birth, marital status and address. Tsige did not publish, distribute or record the information in any way.
When Jones became suspicious and confronted the Tsige, Tsige admitted to her actions. She admitted that she had looked at Jones’ banking information without legitimate reasons, and that she understood it was against the business code of BMO.
Tsige explained that she was involved in a financial dispute with Jones’ former husband and wanted to find out whether he was paying child support.
Jones did not accept this explanation.
Tsige apologized for her actions, and BMO disciplined Tsige by suspending her for one week without pay and denying her a bonus.
In Saccone v. Orr (1981), 1981 CanLII 1708 (ON SC), the judge dimissed the defendant’s argument against the existence of a tort of invasion of privacy
In Roth v. Roth (1991), 1981 CanLII 1708 (ON SC), the judge found the cumulative effect of the defendant’s actions could best be described as an invasion of privacy, and rejected the contention that there is no such tort in common law
Statute law:
The Court reviewed privacy legislation such as the
Personal Information Protection and Electronic Documents Act (PIPEDA),
Personal Health Information Protection Act (PHIPA),
Freedom of Information and Protection of Privacy Act (FIPPA),
Municipal Freedom of Information and Protection of Privacy Act (MFIPPA), and
Consumer Reporting Act,
privacy law and legislation in other jurisdictions.
The Ontario legislation essentially deals with freedom of information and the protection of certain private information with respect to government and other public institutions. Like PIPEDA, it has nothing to do with private rights of action between individuals.
Including the use of the defendant’s senses, with or without mechanical aids, to oversee or overhear the plaintiff’s private affairs, as by looking into his upstairs windows with binoculars or tapping his telephone wires.
It may be by some other form of investigation or examination into his private concerns, as by opening his private and personal mail, searching his safe or his wallet, examining his private bank account, or compelling him by a forged court order to permit an inspection of his personal documents.
The intrusion itself makes the defendant subject to liability, even though there is no publication or other use of any kind of the photograph or information outlined.
To ensure that intrusion of seclusion was not applied to broadly, the court defined the type of privacy interests that would be affected:
financial or health records
sexual practices and orientation
employment
diary or private correspondence that could be reasonably considered highly offensive
Intrusion upon seclusion and public disclosure
Charter value: the right to privacy is a constitutional value to be protected by the law
Digital media and its effect on the storage and distribution of private data
Legitimate concern to the public is an exemption to public disclosure.
Therefore the investigation and prevention of Fraud is potentially exempt from this tort.
Comment section of the Restatement:
Every individual has some phases of his life and his activities and some facts about himself that he does not expose to the public eye, but keeps entirely to himself or at most reveals only to his family or to close friends. Sexual relations, for example, are normally entirely private matters, as are family quarrels, many unpleasant or disgraceful or humiliating illnesses, most intimate personal letters, most details of a man's life in his home, and some of his past history that he would rather forget. When these intimate details of his life are spread before the public gaze in a manner highly offensive to the ordinary reasonable man, there is an actionable invasion of his privacy, unless the matter is one of legitimate public interest.
[2007] O.J. No. 4003,
The plaintiff in this case was HIV positive, and then disclosed this information to his aunt, the defendent. The defendant disclosed this information to others without the plaintiff’s consent, and the plaintiff commenced actions for intentional infliction of mental pain and invasion of privacy.
http://www.lexisnexis.com.eztest.ocls.ca/lnacui2api/api/version1/getDocCui?lni=4R05-FFD0-TWVB-30PT&csi=285689,285686&hl=t&hv=t&hnsd=f&hns=t&hgn=t&oc=00240&perma=true
We could see the echo of this case in Jane Doe v ND:
private information about the plaintiff had been disclosed without his consent or a legal process/public interest reason and therefore, an actionable breach of privacy had occurred.
Tagouma v. Investigative Consultant Services Inc. 2010 (Superior Court of Pennsylvania) August 10, 2010, 4 A.3d 170.
US Jurisdiction
The investigation company videotaped the employee worshiping at an Islamic Center, alleging invasion of privacy—“intrusion on seclusion”. The Appellant, Tagouma, filed a complaint against Investigative Consultant Services Inc. (ICS). ICS was hired by the Appellant’s Employer—worker’s compensation carrier to preform surveillance on the employee
Case on Appeal after a judgment was in favour of ICS and the investigator. The justice noted the employee failed to show he has reasonable expectation of privacy while praying in public and furthermore the employee did not establish invasion of privacy cause of action for intrusion upon seclusion. Tagouma is appealing the decision to the Superior Court of Pennsylvania
The location of the Islamic Centre is relevant in the case (weather it was considered “secluded” from public (i.e. parking lot, local businesses in the vicinity, public sidewalks, etc). The record indicates that there are no public sidewalks or public parking.
The investigator parked across the center, 70-80 yards and video taped the employee walking into the Islamic Centre and recorded him with a camera with a zoom feature. The investigator testified that as soon as the subject is in “plain view” or in “public” or inside a public building they are permitted to video tape and its is not considered private.
To establish all the elements, the Court found that the intrusion must be into privacy matters, and that the reasonable person standard applies.
The defendant is only subject to liability under this section when he has intruded into a private place, or otherwise has invaded a private seclusion that the plaintiff has placed himself into.
The appellants contends that an act of worship is entitled to reasonable expectation of privacy. The Court concluded the appellant cannot ask the court to create a privacy expectation based on religion. Merely assigning a purpose to the activity cannot save the appellant’s claim for intrusion upon seclusion for the purposes of a tort action. Kneeling in the Islamic Centre is no different than kneeling in another public forum. His thoughts prayers during his activity remained private. Bases on the evidence the judge dismissed the appellants claim of intrusion upon seclusion.
Schmidt v. Ameritech Illinois, 329 Ill.App.3d 1020, 263 Ill.Dec. 543, 768 N.E.2d 303 (Ill.App.Ct.2002)
US Jurisdiction
Because Ameritech's investigation into an unnecessary depletion of its monetary resources necessarily involves a protection of its rights and property, especially in light of [the plaintiff's] admittedly deceitful actions, we find that Ameritech's conduct was authorized and protected specifically by this statute. Accordingly, because plaintiffs cannot demonstrate that Ameritech's conduct was unauthorized, i.e., the first element of the tort, we find that the jury's verdict in favor of the plaintiffs was against the manifest weight of the evidence
[2007] O.J. No. 1658
http://www.lexisnexis.com.eztest.ocls.ca/lnacui2api/api/version1/getDocCui?lni=4NP4-7HJ0-TWVB-301B&csi=285689,285686&hl=t&hv=t&hnsd=f&hns=t&hgn=t&oc=00240&perma=true
The plaintiff in Shred-Tech retained a private investigator to look into a competing business started by one of its former employees.
After receiving disclosure, the defendants learned that the investigator had obtained their telephone records without their consent or a court order. And that secretly and without permission, the investigator had made a video and audio recording while posing as a prospective customer at one of the defendants’ business premises.
The defendants sought an order to relieve them of the deemed undertaking rule so that they could use the information obtained in discovery to file a complaint with the authorities.
The Judge granted the relief.
R. v. Cole, [2012] 3 SCR 34
http://www.canlii.org/en/ca/scc/doc/2012/2012scc53/2012scc53.html?autocompleteStr=R.%20v.%20Cole&autocompletePos=1
This case is a s.8 Charter issue, but the factors the Court considered are of referential values for the reasonable expectations of privacy:
he had exclusive possession of the laptop;
the laptop was password protected by a password he created;
the school board policy permitted personal use of the computer;
he had permission to take the laptop home on evenings, weekends and summer vacations;
there was no evidence the board actively monitored teachers’ use of laptops; and
the board had no clear and unambiguous policy allowing the board to monitor, search or police the teacher’s use of the laptop.
We still lack directions on what is considered a lawful justification in torts regarding privacy, but we can speculate from the relevant case law that it may be legitimate concerns for business, or if there is a public interest in seeing the investigation done. Investigating fraud perhaps is a good example.
Does this case have an implication on the use of photography on private properties based on vaguely written policies and agreements?
PIs would perhaps be liable if they take photos in similar circumstances, thinking that they(or whoever hired them) have justification under an agreement.
Defamation, identity theft, all made easier with technology, not to mention the easily accessible personal data stored online.
How will the court assess the other two categories when there are already recognized torts such as defamation and fraud?
The difference may lie in the sensitive nature of the information used in these claims: personal and private.
Technology may allow a person to reveal personal information regarding another individual that would mislead the public by the incompleteness of the information
This is different from defamation, and the major concern remains to be privacy.
Appropriation may deal with personable identity, and it is not limited to commercial use.
The commentary on Restatement (Second) of Torts (2010) at 652C, Appropriation of Name or Likeness notes: It applies also when the defendant makes use of the plaintiff's name or likeness for his own purposes and benefit, commercial or not.