Mass Media Law 18 th Edition Don Pember Clay Calvert Chapter 7 Invasion of Privacy: Appropriation and Intrusion McGraw-Hill/Irwin © 2013 McGraw-Hill Companies.

Slides:



Advertisements
Similar presentations
Hart District Acceptable Use Policy Acceptable Use Policy.
Advertisements

News Gathering & the Law The Role of the First Amendment The text of the First Amendment, by its terms, says nothing about a right to gather news or a.
Chapter 3 Tort Law.
Chapter 08 Tort Law McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
PRIVACY LAW AND JOURNALISTIC PRACTICES Jeremy Taylor September 17, 2012.
2 Crimes & Torts Crimes Intentional Torts
Torts and Cyber Torts Chapter 4.
Your Rights Under the Internet Law By: Sannita S. Lam.
Chapter 14 Legal Aspects of Sport Marketing
Invasion of Privacy – What you are (and are not) entitled to in the eyes of the law Image courtesy of privacy-please/
Invasion of Privacy Law for High School Student Journalists An introduction to invasion of privacy law for high school student journalists and their advisers.
Com360: Invasion of Privacy
Yes No Yes No Yes No Yes No Yes No Yes No Yes No.
Copyright © 2004 by Prentice-Hall. All rights reserved. © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 5 Intentional Torts.
Standards and Guidelines for Web Page Publishing December 9, 2009.
By : Lillie Gray 1 st period Business Law Exam.  Crime- an offense against the public at large, which is therefore punishable by the government.  Tort-
Legal & Ethical Issues in News. Anyone can sue...  Tort -- a wrong other than breach of contract for which an injured party is able to bring a lawsuit.
1 Privacy & Related Issues. 2 The 4 Privacy Torts 1.Appropriation 2.Intrusion 3.Disclosure of private facts 4.False light.
The Privacy Torts Public Disclosure of a Private Fact Intrusion False Light Appropriation.
Chapter 4- The Law of Torts
Business Law and the Regulation of Business Chapter 7: Intentional Torts By Richard A. Mann & Barry S. Roberts.
Intentional Torts Negligence Strict Liability
Digital Citizenship Texting vs. Sexting Cyberbullying.
Employee Guidelines for Acceptable Use of Technology Resources.
Current Best Practices and Precedents Existing UAV Guidelines/Best Practices.
Torts. How Torts Differ from Crimes A tort, in contrast, is a private or civil wrong— an offense against an individual If tort occurs, the person injured.
Chapter 5 Torts and Civil Law.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Ethics and the Law in Journalism. Key Concepts Understand the ethical principles of journalism Understand libel laws and what defenses journalists have.
© 2004 West Legal Studies in Business, a Division of Thomson Learning 10.1 Chapter 10 Torts: Negligence, Strict Liability, and Intentional Torts.
2 TORT Means“Wrong” 3 TORT A violation of a duty imposed by civil law.
Chapter 61 Personal Injury Laws Offenses Against Individuals Intentional Torts, Negligence, and Strict Liability Civil Procedure CHAPTER.
THE TRIAL IN CANADIAN COURTS – Part 3 RULES AND TYPES OF EVIDENCE LAW 12 MUNDY
1 BSAD B18 Business Law Bakersfield College. 2 Torts n Purpose of Tort Law is to provide remedies for the invasion of various protected interests. n Personal.
Invasion of Privacy in Digital Media Basic Concepts.
Copyright © 2008 Pearson Education Canada4-1 Chapter 4: Intentional Torts.
Freedom of Speech Computers in the World.
Mass Media Law 18 th Edition Don Pember Clay Calvert Chapter 15 Regulation of Advertising McGraw-Hill/Irwin © 2013 McGraw-Hill Companies. All Rights Reserved.
The Privacy Torts Public Disclosure of a Private Fact Intrusion False Light Appropriation.
COMMUNICATION LAW Chapter 20. Communication Law Preview Libel— –Libel is defamation (injury to someone’s reputation) by written words or by communication.
Mass Media Law 18 th Edition Don Pember Clay Calvert Chapter 11 Free Press–Fair Trial: Trial-Level Remedies and Restrictive Orders McGraw-Hill/Irwin ©
Chapter 4.  Crime- harm not only specific individuals but also the general welfare  Tort- private wrong committed by one person against another  Intentional.
Lady and the Tramp Student Coaching Slides. Contracts are Legally Enforceable Agreements  Contracts are agreements enforced by courts consistent with.
ETHICS AND LEGALITIES JOURNALISM. JOBS OF JOURNALISTS POLITICAL FUNCTION – WATCHDOG OF THE GOVERNMENT ECONOMIC FUNCTION – BUSINESS, FARMING, INDUSTRIAL.
Mass Media Law 18 th Edition Don Pember Clay Calvert Chapter 12 Free Press–Fair Trial: Closed Judicial Proceedings McGraw-Hill/Irwin © 2013 McGraw-Hill.
A Crash Course in Press Law For the High School Press.
Mass Media Law 18 th Edition Don Pember Clay Calvert Chapter 8 Invasion of Privacy: Publication of Private Information and False Light McGraw-Hill/Irwin.
The legal right of privacy has been defined as the right to be let alone, the right of a person "to withhold himself and his property from public scrutiny.
Civil Law An overview of Tort Law – the largest branch of civil law Highlight the differences between tort law and criminal law How torts developed historically.
SLO: I can understand the three types of torts, including negligence, intentional torts, and strict liability. I can appreciate that personal freedom in.
Copyright © 2010 South-Western Legal Studies in Business, a part of South-Western Cengage Learning. and the Legal Environment, 10 th edition by Richard.
District Updates  1. Crisis Go App  2. Bullying Refresher  3. Social Media Policy  4. Teacher Web Pages.
Chapter 2 Tort Law and Product Liability. Chapter Objectives After reading this chapter, you will know the following: The elements of negligence liability.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
 Laws and Ethics. Copyright Law  Prevents others from plagiarizing your work and publishing it elsewhere  Makes it dangerous to copy things from the.
The Real Time Student Coaching Slides
Civil Law An overview of Tort Law – the largest branch of civil law
Image courtesy of Invasion of Privacy – What you are (and are not) entitled to in the eyes of the law.
The Law of Journalism & Mass Communication
Privacy What does it mean to you?.
By Richard A. Mann & Barry S. Roberts
Publication of Private Facts
Legal & Ethical Issues in News
Essentials of the legal environment today, 5e
The Real Time Student Coaching Slides
Law For Personal And Business Use
AV Production Ethics & Copyright Trade & Industrial Education
Laws Governing Police Surveillance
Georgia Law and Consequences Regarding Computer / Internet Usage for Students E. Logan Butler Attorney at Law Patterson Moore Butler, LLC
Finding Her Voice Student Coaching Slides
Presentation transcript:

Mass Media Law 18 th Edition Don Pember Clay Calvert Chapter 7 Invasion of Privacy: Appropriation and Intrusion McGraw-Hill/Irwin © 2013 McGraw-Hill Companies. All Rights Reserved.

7-2 Invasion of Privacy The right to privacy for people is in jeopardy partly because: –Concerns raised after the 9-11 terrorist attacks –A new generation of Americans that are more than willing to give away their privacy in exchange for the opportunity to participate in electronic social networking

7-3 The Growth of Privacy Laws Privacy laws arise at the end of the 19 th century because of: –Movement from a rural to urban society –Sensational journalism

7-4 Appropriation It is illegal to appropriate an individual’s name or likeness for commercial or trade purposes without consent

7-5 Appropriation Two rights involved: 1.Right to Privacy – protects an individual from the embarrassment and humiliation that can occur when a name or picture is used without consent for advertising purposes It is a personal right Protects individuals from emotional harm

7-6 Appropriation 2. Right of Publicity – protects individuals from the exploitation of their name or likeness for commercial purposes It is a property right – protects the economic value of the name or likeness

7-7 Appropriation Use of Name or Likeness –What are names? Not limited to full names Can be nicknames, stage names, pen names

7-8 Appropriation Use of Name or Likeness –What is a likeness? Photographs, paintings, sketches, cartoons Fictional characters Look alikes Sound alikes

7-9 Appropriation Advertising and Trade Purposes –Examples of commercial use: Use of someone’s name or likeness in an advertisement in any media outlet including websites A testimonial falsely suggesting an individual uses a product Use of someone’s name or likeness in a commercial entertainment vehicle (television show, movie)

7-10 Appropriation News and Information Exception –Individuals cannot sue for appropriation in a news story –“News” has been widely interpreted by the courts to include anything that is not an explicit advertisement

7-11 Appropriation Other Exceptions –Booth Rule The use of a person’s name or likeness in an advertisement for a media product is usually not regarded as an appropriation if the name or likeness has been or will be part of the content

7-12 Appropriation Consent as a Defense –Written consent is generally uncontestable –Oral consent does not offer the same protection; it can be easily contested

7-13 Appropriation When Consent Might Not Work –Consent today may not be valid in the distant future –Some people (minors, wards of the state) cannot give consent –Consent to use a photograph does not apply if the image is materially altered or changed

7-14 Appropriation Life After Death –The right to privacy is a personal right that dies with the individual –Several states have passed laws stating the right to publicity may live on after death (with heirs controlling these rights)

7-15 Intrusion It is illegal to intrude, physically or otherwise, upon the seclusion or solitude of an individual –Trespass – the intentional and unauthorized entry onto land or property occupied or possessed by another –Intrusion may occur without trespass

7-16 Intrusion Intrusion and the Press –Intrusion may occur in many ways, for example: Eavesdropping to overhear a conversation Gathering personal information from an individual’s private records Using a telephoto lens

7-17 Intrusion Intrusion and the Press –All courts will ask whether the plaintiff “enjoyed a reasonable expectation of privacy” when the information was collected

7-18 Intrusion No Privacy in Public –There is no expectation of privacy in public –Anything that is visible or audible by any person in the vicinity is public, not private –There is no expectation of privacy in places where people gather (restaurants, airplanes)

7-19 Intrusion No Privacy in Public –While photographers can take photos in public places, they may be limited in how close they can come to individuals without engaging in harassment –California has passed an anti-paparazzi law that creates tort liabilities for physical and “constructive” invasions through photographing, videotaping or recording a person engaged in “personal or familial activity.”

7-20 Intrusion The Use of Hidden Recording Devices –There are expectations of privacy in homes, but not in public places of businesses where people are invited in

7-21 Intrusion Hidden Recording Devices –Ethical guidelines for when to use hidden recording devices: When the information is of profound importance When all other alternatives for obtaining the same information have been exhausted When the individuals involved and their news organizations apply the excellence needed to pursue the story fully

7-22 Intrusion Hidden Recording Devices –Ethical guidelines for when to use hidden recording devices: When the harm prevented by the information revealed outweighs any harm caused by the deception When the journalists involved have conducted a meaningful, collaborative and deliberative decision to justify deception

7-23 Intrusion Intrusion and the Publication of Information Obtained Illegally –Journalists are not held accountable for information obtained illegally by another party and passed on to them –Journalists are held accountable for information they have obtained illegally

7-24 Intrusion and the Internet –Assumption of Risk Analysis - There is no expectation of privacy when information is voluntarily made accessible to another person or placed in the flow of commerce

7-25 Intrusion and the Internet Legislative Action –Electronic Communications Privacy Act –Makes it illegal to: Intentionally intercept a cellular telephone conversation Forbids the manufacturers and importers of radio scanners from making or selling scanners that can intercept communication used for cell phones Outlaws intentional interception of online communications

7-26 Intrusion on the Internet Legislative Action –Drivers License Protection Act Barred state departments of motor vehicles from disclosing personal information about individuals that is contained in driver’s license records