7 hours 2 minutes
Hey everyone is chris again and I'm cyber is instructive for its US information privacy course
it's always a pleasure to be here with you to talk about important privacy topics and concepts.
We're going to close out module one looking at
William processors contributions to privacy law here in the United States, how he helped influence and shape the development of american law of toward privacy.
Before I can begin this discussion though, I have to give credit to the outstanding article written by Neil Richardson uh
daniel salada entitled processors privacy law, a mixed legacy, which is a fascinating article that looks at William Prosser, who was one of America's leading legal theories over his lifetime
up into his uh
Passing in 1972.
But it's a great article because it helps us as privacy professionals understand how privacy towards
evolved over time. We still see those here the challenges that are posed by the media, social media
um like we saw as we looked at um the
arctic or they'll say written by Warren and BRANDEIS,
you know, the truth of nature of the media, technological advances that created kind of privacy harms privacy invasions. And then the really high bar that's been set in courts in the United States, really for,
you know, plaintiffs to receive
um redress under the law.
Now we've seen that over time, the U. S. Government itself has passed rules,
regulations and laws in the case of the telemarketing sales rule,
um that's administered by the Federal Trade Commission
that lowers these bars that allows american citizens that have invasions and harms crossed by intrusion, constant luge in and
and by created by telemarketers, direct marketers themselves
into their lives. And so the ability to use that rule to address those privacy harms a little easier for american citizens than, you know, they find under other laws here in the United States.
we have several learning objectives. We're gonna look at process views on privacy tort law
and then we're gonna have a brief discussion on those four privacy towards that. I want you to be familiar with as information privacy practitioners.
so as I stated earlier, I encourage you to read Richard's and televisa essay or article published
um and available online. It was published in 2000 and 10, the California Law Review
that does an exceptional job of offering it balanced and objective analysis of William processors
contributions and impacts on
privacy tort law here in the United States.
It's critical at times, but again, I think that it offers a balanced view of that impact.
And while some of the challenges that we still face here
uh and american courts, when it comes to addressing privacy harms and privacy invasions under the law.
You know, William Prosser in 1960 published his landmark article entitled Privacy in the California Law Review.
And, you know, this is that article itself builds upon the
Warren and BRANDEIS article entire entitled The Right to privacy.
But he looks at privacy is it's devolved over those 50 or so years since the publication of that landmark essay,
and he looks at the impact of privacy
as it applies to
the protections under the law from privacy harms
Where Brandis, BRANDEIS and Warren looked at um shortfalls under common laws, they applied to privacy protections
and they really focuses on or proposed one privacy toward
who expanded the scope of these privacy towards that privacy toward
two for privacy towards that are
widely viewed today.
Now, those four privacy towards our intrusion upon the plain of seclusion or solitude
went to his private affairs,
the public disclosure of embarrassing
private facts about the plaintiffs
publicity, which places the plaintiff in a false light in the public eye.
We talked about their defamation law,
casting someone in a false like
slander and libel.
And then the appropriation for the defender's advantage of the plaintiff's name or likeness uses someone's
or their name
for really for financial gain without consent.
these four privacy towards are attributed to William Prosser, he had concerns
here concerns that, you know, this additional focus on these privacy towards
might distract for tradition from traditional um common law, especially as it applied to defamation law.
And the courts themselves have looked the process work
continuously since the publication of
you know, this essay when considering
crimes, you were related court cases.
Again, I encourage you to read privacy.
I also encourage you to read Salafi in Richard's article.
It will give you greater insights into,
you know, processors intent
and the way of course they view
We've seen that it's extremely difficult just like BRANDEIS and Warren stated in there? S a
for plaintiffs themselves to really fight to prove
tribes invasions unless we're talking about things like data breaches
that can provide some type of
tangible evidence that some love of harm has been caused.
and results in a privacy invasion of privacy harm of the individuals
is still in american court. Today is a very high bar to attain,
you know, when trying to um
receive or or achieve redress under the law,
especially when it comes to the truth of nature of the media paparazzi,
social media publications of personal information and of the like advances in technology.
I hope you enjoyed our discussion.
As always, we're going to have a series of questions associated with each lesson.
This question asked, which landmark essay didn't cross her.
Published in the California Law Review in 1960. But you don't have to know the date.
The appropriate answer would be a
question to ask which privacy toward addresses, defamation,
libel and slander
casting someone in a false light?
that would be seen.
Question three asked the question which privacy toward addresses using someone's likeness without consent?
The appropriate answer would be D
No William processors work in his article entitled privacy really builds upon the work accomplished
BRANDEIS unworn in their landmark essay entitled The Right to privacy.
Now, although, you know, he expanded upon the scope of that S. A and he identifies
for privacy towards
we have to remember that processor also was extremely concerned about the impact of these privacy towards on existing law, specifically defamation law.
Penetration Testing and Ethical Hacking
The Penetration Testing and Ethical Hacking course prepares students for certifications, like CEH. This course ...
7 CEU/CPE Hours Available
Certificate of Completion Offered
Privacy Program Management
In this Privacy Program Management training course, students will learn privacy program strategies, applicable laws ...
4 CEU/CPE Hours Available
Certificate of Completion Offered