The Legal Protection of Personal Images Shared on Social Networks in

Author Georgiades, Eugenia

Published 2017

Thesis Type Thesis (PhD Doctorate)

School Griffith Law School

DOI https://doi.org/10.25904/1912/3656

Copyright Statement The author owns the copyright in this thesis, unless stated otherwise.

Downloaded from http://hdl.handle.net/10072/367723

Griffith Research Online https://research-repository.griffith.edu.au

The Legal Protection of Personal Images Shared on Social Networks in Australia

Eugenia Georgiades

Bachelor of Arts (Hons), Bachelor of Laws, Graduate Diploma Legal Practice, Master of Laws

School of Law, Griffith University

This thesis is submitted in fulfilment of the requirements of the degree of Doctor of Philosophy

December 2016

ii

Abstract

Social networks have changed the nature of communication in the modern world: they have changed how people communicate, the frequency and mode of communication, and how people relate to those communications. Social networks have also changed the type of information that is communicated. One of the notable developments has been a proliferation of the sharing of images that people have taken themselves. From the ubiquitous selfie through to group shots, personal images are now a key part of modern social communication. A number of problems have arisen as a consequence of the rapid increase in the sharing of personal images online. This is because personal images uploaded online are, more now than ever, prone to misuse. Third parties are easily able to reuse, distort and alter images that are uploaded on social networks. As a result, people are at risk of losing control over the images that they upload online. The aim of this thesis is to critically examine the ways in which Australian law protects personal images that are shared on social networks. It also aims to suggest ways in which the law in this area might be improved. Focusing on intellectual property (and related laws), Part I looks at the way that images are currently protected under Australian law, showing that while there is some legal protection for images uploaded on social networking sites, the protection is inadequate. Part II explores some changes that could be implemented to improve the protection of personal images in Australia. In particular, Part II looks at the possibility of expanding the scope of privacy law and of incorporating image rights and a right to be forgotten into Australian law. This is followed by a brief conclusion that looks at other possible initiatives, such as criminalising the publication of sexual images online to prevent revenge porn.

iii

Statement of Originality

This work has not previously been submitted for a degree or diploma in any university. To the best of my knowledge and belief, the thesis contains no material previously published or written by another person, except where due reference is made in the thesis itself.

(Signed)______Eugenia Georgiades

Acknowledgements

I would like to thank my supervisors, Brad Sherman, Leanne Wiseman and Allan Ardill, for their support throughout the thesis. I would also like to thank Jay Sanderson. I thank Pernilla White for providing editorial assistance, in particular for formatting and proofing chapters of the thesis. I would like to thank Susan Jarvis for her assistance in the final edit of the thesis, specifically for formatting and proofreading.

iv

Contents Abstract ...... iii

Statement of Originality ...... iv

Acknowledgements ...... iv

Part I Existing Legal Protection for Personal Images on Social Networks in Australia ...... 1

Chapter 1 ...... 3

Introduction ...... 3 1.1 Introduction ...... 3 1.2 Changes Bought About By Social Network Sites ...... 7 1.3 Why should we protect personal images? ...... 13 1.4 Balancing competing interests ...... 21 1.5 Overview ...... 23 1.5 Existing Scholarship On Social Networks, Image Rights And The Law ...... 25 1.6 Overview of Social Networks ...... 27

Chapter 2 Terms of Use, Personal Images and Social Networks ...... 34 2.1 Introduction ...... 34 2.2 Licensing and Ownership of Personal Images ...... 36 2.2.1 Facebook ...... 37 2.2.2 Twitter ...... 39 2.2.3 Instagram ...... 40 2.3 Collection of Images ...... 41 2.3.1 Facebook ...... 41 2.3.2 Twitter ...... 44 2.3.3 Instagram ...... 45 2.4 Use of Images ...... 48 2.4.1 Facebook ...... 48 2.4.2 Twitter ...... 50 2.4.3 Instagram ...... 51 2.5 Sharing and Disclosing ...... 51 2.5.1 Facebook ...... 52 2.5.2 Twitter ...... 56 2.5.3 Instagram ...... 56

v

2.6 Termination ...... 58 2.7 Conclusion ...... 59

Chapter 3 ...... 60

Copyright, personal images on social networks ...... 60 3.1 Introduction ...... 60 3.2 Ownership ...... 64 3.2.1.1 Camera Ownership ...... 65 3.2.1.2 Directing, Arranging and Controlling a Scene ...... 66 3.2.1.3 Where There is No Human Involvement in the Creation of a Photograph ...... 67 3.3 Exceptions to the author as first owner ...... 70 3.3.1 Photographs Created by Journalists ...... 72 3.3.2 Commissioned Photographs ...... 72 3.3.4 Contract ...... 73 3.4 Is Use of the Photograph on a Social Networks an Infringement? ...... 73 3.5 Fair Dealing ...... 75 3.6 Can Moral Rights Can Prevent the Misuse of Personal Images?...... 82 3.6.1 The Right of Attribution ...... 84 3.6.2 The Right of Integrity ...... 86 3.7 Conclusion ...... 88

Chapter 4 Privacy, personal images and social networks ...... 91 4.1 Introduction ...... 91 4.2 Common Law ...... 92 4.3 Statutory Protection ...... 100 4.3.1 Commonwealth Privacy Legislation ...... 101 4.3.2 State and Territory Privacy Legislation ...... 111

Chapter 5 Breach of Confidence, Personal Images and Social Networks ...... 120 5.1 Introduction ...... 120 5.2 Is the Personal Image Capable of Being Protected? ...... 121 5.2.1 Are Personal Images Shared on Social Networks Trivial? ...... 122 5.2.2 Are the Personal Images Vague? ...... 124 5.2.3 Are the Personal Images Shared on Social Networks in the Public Domain? ...... 124 5.3 Is There an Obligation to Keep the Personal Image Confidential? ...... 127 5.3.1 Contractual Relationships ...... 128 5.3.2 Fiduciary Relationships ...... 128

vi

5.3.4 Where there is no relationship between the parties: Strangers ...... 130 5.4 Has there been a Breach of Duty? ...... 132 5.5 Possible Defences ...... 134 5.5.1 Consent ...... 134 5.5.2 Public Interest ...... 135 5.6 Conclusion ...... 136

Part II Possible Solutions ...... 137

Chapter 6 Expanding Privacy Law ...... 142 6.1 Introduction ...... 142 6.2 A New Statutory TTort of Invasion of Privacy for Serious Invasions of Privacy ...... 143 6.2.1 Intrusion Upon Seclusion ...... 144 6.2.2 Is a Social Network Page a ‘Secluded’ Space? ...... 145 6.2.3 Is Uploading an Image on a Social Network Page an Intrusion Upon Seclusion? ... 146 6.2.4 Scope of Protection ...... 147 6.3 Effectiveness of the Tort in Protecting Personal Images Shared Online ...... 148 6.4 A Misuse of Private Information ...... 149 6.4.1 What is ‘Private Information’?...... 150 6.4.2 Is There a Reasonable Expectation of Privacy? ...... 152 6.4.3 Is the Disclosure of Private Facts Highly Offensive to a Reasonable Person? ...... 154 6.4.4 Expanding the Law of Confidence to Include Private Information ...... 155 6.5 Conclusion ...... 157

Chapter 7 An Australian Right to Publicity? ...... 160 7.1 Introduction ...... 160 7.2 What are Publicity Rights? ...... 162 7.2.1 The Use of the Plaintiff’s Identity ...... 163 7.2.2 The Use Must Constitute an Advantage, Commercial or Otherwise ...... 163 7.2.3 The Use of the Image is Without a Person’s Consent ...... 164 7.2.4 The Use of the Image Results in Injury ...... 165 7.3 Exceptions to the Right of Publicity ...... 167 7.3.1 Public Interest and Newsworthiness...... 167 7.3.2 Freedom of Expression...... 169 7.4 Problems with a Right of Publicity? ...... 173 7.4.1 No Law Against Being Photographed ...... 174 7.4.3 A Right of Publicity May Not Extend to Dead People ...... 175 7.4.4 Publicity Rights May be Lost When Entering into a Social Network Contract ...... 176

vii

7.5 Conclusion ...... 177

Chapter 8 ...... 178

The right to be forgotten in Australia...... 178 8.1 Introduction ...... 178 8.2 Requirements for Protection ...... 183 8.2.1 Data ...... 183 8.2.2 Data Subject ...... 184 8.3 Use is Within the scope of the Right to be Forgotten ...... 185 8.4 Exceptions to the Right to be Forgotten ...... 188 8.5 Does Australia Need the Right to be Forgotten? ...... 195

Chapter 9 Conclusion ...... 200

Bibliography ...... 206 Cases … ...... 206 Legislation...... 210 Secondary sources ...... 212

viii

ix

Part I Existing Legal Protection for Personal Images on Social Networks in Australia

2

Chapter 1

Introduction

1.1 Introduction

This thesis examines the effectiveness of the existing legal regimes in protecting personal images that are shared online. In Australia, the stark reality is that while there is some legal protection for personal images shared online, this is limited. The thesis examines how the law in this area can be improved. In particular, it argues that people whose image is captured in photographs that are shared on social networks ought to have the ability to control the use of their images through a right of publicity and a right to be forgotten. In considering the developments and legal protection afforded to personal images in the United States and Europe, it will be argued that Australian law is lagging behind these jurisdictions. The last decade or so has seen an explosion on social networking. Web 2.0 sparked the growth of online participatory culture, where the user was a central actor in creating and sharing information.1 The introduction of new websites and services enabled users to create and share things about themselves with other users on the Internet in an unprecedented way. Previously, online communication technologies such as email, email lists, text messaging and instant messaging existed in isolation.2 Social networks changed the ways in which people share and

1 Daniel Gervais, ‘The Tangled Web of UGC: Making Copyright Sense of User Generated Content’ (2009) 11(4) Vanderbilt Journal of Entertainment and Technology Law 841. See also David Beer, ‘Social Network(ing) Sites … Revisiting the Story So Far: A Response to Danah Boyd and Nicole Ellison’ (2008) 13 Journal of Computer-Mediated Communication 516, 519; Alessandro Acquisti and Ralph Gross, ‘Imagined communities: Awareness, Information Sharing, and Privacy on the Facebook’ in P Golle and G Danezis (eds), Proceedings of 6th Workshop on Privacy Enhancing Technologies (Cambridge, 2006) 36–58; Alessandro Acquisti, and Ralph, Gross, ‘Information Revelation and Privacy in Online Social Networks‘ in Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (ACM, 2005) 71–80; Niva Elkin-Koren, ‘User-Generated Platforms’, in R Dreyfuss, DL Zimmerman, and H First, (eds) Working Within the Boundaries of Intellectual Property (Oxford University Press, 2010), 111, 112- 113; Susan Corbett, ‘The Retention of Personal Information Online: A Call for International Regulation of Privacy Law’ (2013) 29 Computer Law and Security Review: The International Journal of Technology Law and Practice 246, 254. 2 Danah M Boyd and Nicole Ellison, ‘Social Network Sites: Definition, History and Scholarship’ (2008) 13(1) Journal of Computer-Mediated Communication 210, 214.

3

disseminate personal images in an online environment, and this has created a number of problems, particularly when images are used without permission, or when they are altered, changed or used for different purposes. Problems also arise when circumstances change, such as when a creator or subject changes their mind about an uploaded image, or when a creator or subject dies. The origin of social network sites can be traced back to the formation of

SixDegrees.com in 1997.3 This site enabled users to create profiles and list friends on their profile page and also to view their friend’s lists. At the time, SixDegrees was a pioneering online social network site that fused the features of creating profiles, friends’ lists and email messaging.4 SixDegrees paved the way for other sites that supported combinations of various profile and ‘friend’ articulated networks such as AsianAvenue, BlackPlanet and MiGente.5 These sites not only enabled users to create their own profiles; they also allowed them to identify friends without the approval of those connections.6 While SixDegrees closed down in 2000 due to its inability to connect users with features other than accepting friend requests,7 various new sites were launched between 1997 and 2001 that shared some form of communication technology or a combination of communication technologies. LiveJournal, for example, allowed users to mark people as friends, to follow their journals and to manage privacy settings.8 In 2001, the next surge of sites centred on linking

3 Ibid 214. 4 Ibid. 5 Ibid. 6 Profiles existed as part of dating sites and email lists prior to SixDegrees starting up. These were visible on the user’s instant messaging service – for example, AIM (American Instant Messenger) – but not visible to other people, see Danah M Boyd and Nicole Ellison, above n 2, 214; Kevin Lewis, Jason Kaufman and Nicholas Christakis, ‘The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network‘ (2008) 14(1) Journal of Computer‐Mediated Communication 79, 80-1; Lin Kuan-Yu and Hsi-Peng Lu, ‘Why People Use Social Networking Sites: An Empirical Study Integrating Network Externalities and Motivation Theory’ (2011) 27(3) Computers in Human Behavior 1152, 1152-3. 7 See Danah M Boyd and Nicole Ellison, above n 2, 214; Bernhard Debatin, Jennette P Lovejoy, Ann‐ Kathrin Horn and Brittany N Hughes, ‘Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences ‘(2009) 15(1) Journal of Computer‐Mediated Communication 83, 84-6. 8 See Dinah M Boyd and Nicole Ellison, above n 2, 215; Kaveri Subrahmanyam, Stephanie M Reich, Natalia Waechter and Guadalupe Espinoza. ‘Online and Offline Social Networks: Use of Social

4

personal and professional networks such as Ryze.com.9 Notably, sites such as Tribe.net, LinkedIn, Friendster and Ryze were all intertwined on a personal and professional level because the people behind the sites were all connected and believed they could exist without competing against one another.10 In 2002, the popular social network site Friendster was developed to compete with

Match.com an online dating site.11 Building on the common features of dating sites, it focused on introducing people to strangers.12 The distinguishing feature of Friendster was that it was ‘designed to help friends of friends meet based on the assumption that friends of friends would make better romantic partners than strangers’.13 Friendster’s popularity quickly surged to 300,000 users via word of mouth among various groups, particularly bloggers, attendees at the

Burning Man arts festival and gay men.14 As Friendster’s popularity grew, the site began to

Networking Sites by Emerging Adults’ (2008) 29 (6) Journal of Applied Developmental Psychology 420; Alessandro Acquisti and Ralph Gross, above n 1, 36–58. 9 See Danah M Boyd and Nicole Ellison, above n 2, 215; S Zheng, P Shi, H Xu and C Zhang, ‘Launching the New Profile on Facebook: Understanding the Triggers and Outcomes of Users’ Privacy Concerns’, in Proceedings of the 5th International Conference on Trust and Trustworthy Computing, (2012) 325, 326; Elena Zheleva and Lise Getoor, ‘To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles’, In Proceedings of the 18th International Conference on World Wide Web 531, 532-3 (ACM, 2009); Alessandro Acquisti and Ralph Gross, above n 1, 36–58. 10 See Danah M Boyd and Nicole Ellison, above n 2, 215; Alessandro Acquisti and Ralph Gross, above n 1, 36–58; Paul Festa, ‘Investors Snub Friendster in Patent Grab’, CNet News (19 April 2004) https://www.cnet.com/uk/news/investors-snub-friendster-in-patent-grab. 11 Danah M Boyd and Nicole Ellison, above n 2, 215; Zeynep Tufecki, ‘Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Site’ (2008) 28 (20) Bulletin of Science Technology and Society 20, 21-23; Alessandro Acquisti and Ralph Gross, above n 1, 36. 12 Danah M Boyd and Nicole Ellison, above n 2, 215; Rebecca Wong, ‘Social Networking: A Conceptual Analysis of a Data Controller‘ [2009] 14(5) Communications Law 142, 143–4; Alyson L. Young and Anabel Quan-Haase, ‘Information Revelation and Internet Privacy Concerns on Social Network Sites: A Case Study of Facebook‘ in Proceedings of the Fourth International Conference on Communities and Technologies (ACM, 2009) 265, 266-7; Yasamine Hashemi, ‘Facebook’s Privacy Policy and Its Third Party Partnerships, Lucrativity and Liability,’ [2009] 15 Boston University Journal of Science & Technology Law 140,141-3; David Beer, above n 1, 519. 13 Danah M Boyd and Nicole Ellison, above n 2, 215. David Beer, above n 1, 517; Alessandro Acquisti and Ralph Gross, above n 1, 36. 14 Danah M Boyd and Nicole Ellison, above n 2, 215; Z Tufecki, ‘Grooming, Gossip, Facebook and MySpace: What Can We Learn About These Sites from Those Who Won’t Assimilate?’ (2008) 11(4) Information, Communication & Society 544, 545-7; Patrick Van Eeke and Maarten Truyens, ‘Privacy and

5

experience difficulties.15 Specifically, Friendster’s databases and servers were unable to keep up with the growing demands of users; effectively, users became frustrated with the faltering site and replaced Friendster with email.16 After the failure of Friendster, various new social networks were launched, which adopted the popular features of the early success of Friendster, such as the profile-centric feature.17 Following the failure of Friendster, social networks surged in the early 2000s, first with

MySpace and then with Facebook.18 Since 2003, a range of new social networks have proliferated.19 There are now social networks for everyone: from activists, religious groups and gamers through to travelers and photographers.20 Presently there are billions of users of social media with Facebook citing 1.11 billion users,21 500 million Twitter users,22 and 100 million Instagram users.23 Popular sites such as Facebook, Twitter, Instagram, Pinterest, Flickr, Google+, YouTube and Windows Live have transformed the way people communicate and interact with each other. Social networks have enabled people to translate their existing physical networks into visible digital connections within

Social Networks’ [2010] 26 Computer Law & Security Review 535, 535- 6; Alessandro Acquisti and Ralph Gross, above n 1, 36. 15 Danah M Boyd and Nicole Ellison, above n 2, 215; Alessandro Acquisti and Ralph Gross, above n 1, 36. 16 Danah M Boyd and Nicole Ellison, above n 2, 215; Patricia Sanchez Abril et al., ‘Famous for Fifteen Minutes: IP and Internet Social Networking’ [2008] 6(3) Northwestern Journal of Technology and Intellectual Property 355, 356-9. 17 Danah M Boyd and Nicole Ellison, above n 2, 214–15; Richard Sanvenero, ‘Social Media and Our Misconceptions of the Realities ‘[2013] 22(2) Information and Communications Technology Law 89, 90- 1; Alessandro Acquisti and Ralph Gross, above n 1, 36. 18 Scholarship places the first online social network as SixDegrees in 1997; after the failure of SixDegrees, other sites emerged during the period between 1998 and 2001. See generally, Danah M Boyd and Nicole Ellison, above n 3, 214–15; David Beer, above n 1, 519; Alessandro Acquisti and Ralph Gross, above n 1, 36. 19 See generally Danah M Boyd and Nicole Ellison, above n 2, 214–15; David Beer, above n 1, 519. 20 See generally Danah M Boyd and Nicole Ellison, above n 2, 214, 216; David Beer, above n 1, 517-519; Alessandro Acquisti and Ralph Gross, above n 1, 36. 21 See Craig Smith, By the Numbers: 32 Amazing Facebook Stats (1 May 2013), http://expandedramblings.com/index.php/by-the-numbers-17-amazing-facebook. Facebook is also ranked the number 1 social network site on Alexa: see http://www.alexa.com/topsites. 22 Ranked in 12 in the Alexa Internet Traffic: see Alexa, Twitter.com Traffic Statistics (17 October 2016); see also Twitter Counter, http://twittercounter.com. 23 See Instagram, Press News (2016), https://www.instagram.com/press; see further Josh Costine, Instagram Hits 100 Million Users 28 Months After Launch, TechCrunch (26 February 2013) http://techcrunch.com/2013/02/26/instagram-100-million.

6

social network structures.24 Before a person can gain access to a social network, they are first required to create and complete an online profile.25 From the profile, users are also able to share and control information distributed to their contacts.26 Some social networks have a varied user base and offer photo-sharing, video sharing instant messaging or blogging facilities that people can use to communicate with one another.27 These networks allow people to share their lives in an online environment.28

1.2 Changes Bought About By Social Network Sites

Social networks have brought about a convergence of public and private worlds. Before social networks, people shared photographs by sending the physical photographs by post or via email. As communication technologies evolved, so too have social networks. Most social networks allow people to upload and share their images with multiple people instantaneously. In some

24 See generally, Alessandro Acquisti and Ralph Gross, above n 1, 36; Danah M Boyd and Nicole Ellison, above n 2, 214; Won Kim, Ok-Ran Jeong and Sang-Won Lee, ‘On Social Web Sites’ (2010) 35 Information Systems 215, 215-7; Ralph Gross and Alessandro Acquisti, above n 1, 72-4. 25 See generally Alessandro Acquisti and Ralph Gross, above n 1, 36; David Fono and Kate Raynes-Goldie, ‘Hyperfriendship and Beyond: Friends and Social Norms on LiveJournal’ in M Consalvo and C Haythornthwaite (eds), Internet Research Annual Volume 4: Selected Papers from the AOIR Conference (New York, 2006) 91, 93; Peter Lang and Caroline Haythornthwaite, ‘Social Networks and Internet Connectivity Effects’ (2005) 8(2) Information, Communication, & Society 125, 126-7; Cliff Lampe, Nicole Ellison and Charles Seinfeld, ‘A Familiar Face (book): Profile Elements as Signals in an Online Social Network’ (2007) Proceedings of Conference on Human Factors in Computing Systems Proceedings of Conference on Human Factors in Computing Systems 435, 435-7–44; Mason A Porter, Jukka-Pekka Onnela and Peter J Mucha, ‘Communities in Networks’ (2009) 56 (9) Notices of the AMS, 1082,1082-4; Mike Thelwall, ‘Social Networks, Genders and Friending: An Analysis of MySpace Member Profiles,’ (2008) 59 (8) Journal of the American Society for Information Science and Technology 1321, 1324; Leucio Antonio Cutillo, Mark Manulis and Thorsten Strufe, ‘Security and Privacy in Online Social Networks’ in B Furht (ed.), Handbook of Social Network Technologies and Applications (Springer, 2010) 503. 26 This allows the users to be interconnected with one another through a visible social network structure. 27 Judith Donath and Danah Boyd, ‘Public Displays of Connection’ (2004) 22(4) BT Technology Journal 71, 71-3; D Fono and K Raynes-Goldie, above n 25, 93; C Lampe, N Ellison and C Seinfeld, above n 25, 435-6. Danah Boyd and Jeffrey Heer, ‘Profiles as Conversation: Networked Identity Performance on Friendster’ in Proceedings of the Hawai’I International Conference on System Sciences (HICSS-39) Persistent Conversation Track (IEEE Computer Society, 2006) < 10.1109/HICSS.2006.394>. 28 See generally, Alessandro Acquisti and Ralph Gross, above n 1, 36; Danah M Boyd and Nicole Ellison, above n 2, 214; Ralph Gross and Alessandro Acquisti, above n 1, 72-3.

7

situations, people who upload images on a social network page are able to identify or ‘tag’29 a third party captured in a photograph. Third parties are able to upload images of other people without their permission or knowledge. Another consequence is that personal images that are shared online may be reused and reshared with ease and with limited restrictions. While sharing information on social networks allows people to interact and communicate with greater ease, it also raises a number of problems. Problems may arise, for example, when a person uploads an image of themselves and that image is reshared and reused, or when people’s images are uploaded by third parties without permission. In thinking about the problems that potentially arise when personal images are captured and uploaded on social networks, it is important to note that two different groups are potentially affected: the people who create the images and the people whose images are captured in the photographs. When a person takes a photograph of themselves and uploads it on a social network page, a number of problems potentially arise. This is because personal images that are shared on social networks may be resused and reshared without the permission of the person who uploaded the image. A well-known example of this occurred in 2012, when Randi Zuckerburg posted an image of her family on her Facebook page and a third party reposted the image on

Twitter without her permission.30 While access to the uploaded image was restricted to ‘friends’, there was little she could do to stop her friends from reposting or re-sharing her image.31 Problems may also arise when a social network reuses or reshares images that have been uploaded on a person’s profile page. This occurs because when people upload and share images on their profile page, the network is able to collect the images and reuse them. Problems may also arise when a third party takes a photograph of someone and uploads their image onto their profile page. When the subject of the photograph does not wish to have their image captured

29 ‘Tagging’ is a Facebook feature that allows users to identify people in an uploaded image. 30 Sam Biddle, Watch Randi Zuckerberg Have a Facebook Freak Out over Her Photo Going Viral, Gizmodo (28 December 2012) . 31 A person may think that they are only sharing their image with their contacts, but may not realise that their contacts and their friends are able to access the image/s; see Alessandro Acquisti and Jens Grossklags, ‘Privacy Attitudes and Privacy Behavior’ (2004) Economics of Information Security 165; Alessandro Acquisti and Ralph Gross, above n 1, 36 ; Amanda Nosko, Eileen Wood and Seija Molema, ‘All About Me: Disclosure in Online Social Networking Profiles: The Case of FACEBOOK’ (2010) 26(3) Computers in Human Behavior 406, 406-7; Cliff Lampe, Nicole Ellison and Charles Seinfeld, above n 25, 436-7.

8

and uploaded online, the mere act of uploading the image may create problems. Problems may also arise when the uploaded image is reshared or reused by other parties or by a social network. When this happens, the person whose image is captured has a limited ability to control the use of their image and prevent any misuse. Problems may also arise when the image is distorted or altered. Another problem that may arise here is when there is a change in circumstance of the person uploading the image – for example, when a creator of an image has a change of mind or dies. As social media has become increasingly pervasive, people’s images have become more prone to misuse, abuse and exploitation. One way that personal images are exploited is when third parties use people’s images for advertising purposes without permission. Social networks receive revenue through targeted advertising; each advertisement that appears on a person’s profile is specific to the information contained in their posts and images. In sharing and exchanging personal images on social networks, there are competing interests that each person has when they share images on social network. The problem here is that people whose images are captured in photographs and shared online have a limited ability to prevent the misuse of their image. While Instagram, Twitter and Facebook all collect images that are uploaded and shared on their networks, the networks use the images differently. Social networks such as Twitter collect personal images and allow their affiliates and third party advertisers to access the images. For example, images may be indexed in search engines or used for advertising purposes.32 In contrast, Instagram uses personal images to personalise content and provide

32 See Twitter, Privacy Policy, Information Collection and Use, Tweets, Following, Lists and other Public Information (30 September 2016) which states: ‘Our Services are primarily designed to help you share information with the world. Most of the information you provide us through the Twitter Services is information you are asking us to make public. Your public information includes the messages you Tweet; the metadata provided with Tweets, such as when you Tweeted and the client application you used to Tweet; the language and time zone associated with your account; and the lists you create, people you follow, Tweets you mark as likes or Retweet, and many other bits of information that result from your use of the Twitter Services. We may use this information to make inferences, like what topics you may be interested in, and to customize the content we show you, including ads. Our default is almost always to make the information you provide through the Twitter Services public for as long as you do not delete it … For instance, your public user profile information and public Tweets are immediately delivered via SMS and our APIs to our partners and other third parties, including search engines, developers, and publishers that integrate Twitter content into their services, and institutions such as universities and public health agencies that analyze the information for trends and insights. When

9

information to users that may include advertising and marketing purposes.33 While Facebook uses personal images to ‘provide, improve and develop’ their service, it also provides ‘short cuts’ to people by making suggestions such as tagging friends in photographs or liking a product. This occurs when Facebook suggests that users tag their friends when they upload and share images on a profile page. As a result of people sharing and exchanging personal images online, networks are able to collect personal images and use these images for advertising or marketing purposes. As we will see, this is because social network contracts/policies allow the networks to use and access all images that are uploaded; even if they are subject to restricted privacy settings. The result of this is that even though social networks have privacy settings, these settings do not necessarily guarantee that personal images are not misused. Another problem that potentially arises when a person uploads their image onto a profile page is that a third party may distort or alter the image – for example, by turning the personal image into a meme. In these circumstances, copyright and moral rights may protect the creator of an image where the image is distorted or altered. Problems also potentially arise when a person uploads an image and there is a change of circumstance – for example, the person changes their mind about the sharing of an image online. In situations where a person poses for a photograph and later changes their mind about the image being shared, they have a limited ability to prevent the use of their image. At best, a subject in an image can request the copyright owner to remove their image from the social

you share information or content like photos, videos, and links via the Services, you should think carefully about what you are making public.’ 33 Instagram, Privacy Policy, Clause 2. How We Use Your Information (19 January 2013) https://help.instagram.com/155833707900388: ‘In addition to some of the specific uses of information we describe in this Privacy Policy, we may use information that we receive to: help you efficiently access your information after you sign in; remember information so you will not have to re-enter it during your visit or the next time you visit the Service; provide personalized content and information to you and others, which could include online ads or other forms of marketing; provide, improve, test, and monitor the effectiveness of our Service; develop and test new products and features; monitor metrics such as total number of visitors, traffic, and demographic patterns; diagnose or fix technology problems; automatically update the Instagram application on your device; Instagram or other Users may run contests, special offers or other events or activities (“Events”) on the Service. If you do not want to participate in an Event, do not use the particular Metadata (i.e. hashtag or geotag) associated with that Event.’ Facebook, Data Policy How Do We Use This Information (29 September 2016) https://www.facebook.com/full_data_use_policy

10

network. In the event that a copyright owner is willing to remove the photograph from their profile page the same problems that were discussed above arise. While a creator may have a limited ability to prevent the misuse of their images from being reshared online after they have changed their mind, a subject who changes their mind is unable to prevent the use of their image in most circumstances. Further problems potentially arise when someone dies. While social networks like Facebook have provisions for how a person’s profile page may be accessed after they die, such as providing a ‘legacy’ contact, the provisions are limited in scope and provide little protection against misuse. A well-known example of the problems that arise when a person dies is the case of Nikki Catsouras who, in October 2006, was decapitated when she lost control of her father’s

Porche.34 The Californian Highway Patrol (CHP) followed standard procedure and took photographs of the crime scene.35 The crime scene was so gruesome that the coroner refused to allow the parents to identify the body.36 Two CHP employees then emailed nine of the gruesome photographs to their friends and family members on Halloween as shock value.37 The photographs subsequently went viral.38 After a long legal battle spanning copyright and privacy issues, the defendants settled with the Catsouras family in 2012. It is uncertain whether the

European Court of Justice’s decision of Google Spain v Gonzalez,39 discussed in Chapter 8, influenced the defendants to settle, as a judge had ordered the two parties to talk ahead of a jury

34 Catsouras v Dep’t of Cal Highway Patrol, 181 Cal App 4th 856, 863, 865 (Cal Court of Appeal 2010); Jeffrey Toobin, ‘The Solace of Oblivion: In Europe the Right to Be Forgotten Trumps the Internet’, The New Yorker, http://www.newyorker.com/magazine/2014/09/29/solace-oblivion; see also Daniel Solove, Family Privacy Rights in Death Scene Images of the Deceased Concurring Opinions (27 April 2009) http://concurringopinions.com/archives/2009/04/family_privacy.html. 35 Jeffrey Toobin, ‘The Solace of Oblivion: In Europe the Right to Be Forgotten Trumps the Internet’, The New Yorker (29 September 2014) http://www.newyorker.com/magazine/2014/09/29/solace-oblivion. 36 Ibid. 37 Ibid. 38 Ibid. 39 Case C 131/12; see also generally Jeffrey Toobin, ‘The Solace of Oblivion: In Europe the Right to Be Forgotten Trumps the Internet’, The New Yorker, http://www.newyorker.com/magazine/2014/09/29/solace-oblivion

11

trial.40 The Catsouras case higlighted the limited protection in the United States for uploading and sharing deceased people’s images online.41 Another problem that potentially arises is when images of deceased Aboriginal and Torres Strait Islander people are shared online. This is because there are customary practices against publishing images of deceased people during mourning periods. Problems also arise when people share and exchange images of deceased Aboriginal and Torres Strait Islander people on social networks because the publication may cause distress to family members.42 Another cultural practice is the prohibition on publishing names of deceased Aboriginal and

40 Greg Hardesty, ‘Family Gets 2.4 Million Over Grisly Crash Images’, The Orange County Register (30 January 2012) http://www.ocregister.com/articles/family-337967-catsouras-nikki.html. 41 Some scholars argue that ‘families have a privacy interest in death scene images of deceased relatives’: Daniel Solove, Family Privacy Rights in Death Scene Images of the Deceased Concurring Opinions (27 April 2009) http://concurringopinions.com/archives/2009/04/family_privacy.html; see also, National Archives and Records Admin v Favish, 541 US 157 (2004) where the American Supreme Court stated: ‘We have little difficulty … in finding in our case law and traditions the right of family members to direct and control disposition of the body of the deceased and to limit attempts to exploit pictures of the deceased family member’s remains for public purposes … In addition this well-established cultural tradition acknowledging a family’s control over the body and death images of the deceased has long been recognized at common law. Indeed, this right to privacy has much deeper roots in the common law … An early decision by the New York Court of Appeals is typical: It is the right of privacy of the living which it is sought to enforce here. That right may in some cases be itself violated by improperly interfering with the character or memory of a deceased relative, but it is the right of the living, and not that of the dead, which is recognized. A privilege may be given the surviving relatives of a deceased person to protect his memory, but the privilege exists for the benefit of the living, to protect their feelings, and to prevent a violation of their own rights in the character and memory of the deceased. Schuyler v Curtis, 147 NY 434 (1895).’ See generally, Clay Calvert, ‘Privacy of Death: An Emergent Jurisprudence and Legal Rebuke to Media Exploitation and a Voyeuristic Culture’ (2005) 26 Loyola Los Angeles Entertainment Law Review 133, 133-42; Clay Calvert, ‘A Familial Privacy Right Over Death Images: Critiquing the Internet- Propelled Emergence of a Nascent Constitutional Right that Preserves Happy Memories and Emotions’ (2013) 40 (3) Hastings Constitutional Law Quarterly 475, 503; Catherine Leibowitz, ‘A Right to be Spared Unhappiness: Images of Death and the Expansion of the Relational Right of Privacy’ (2013) 32(1) Cardozo Arts & Entertainment Law Journal 347, 347-350. 42 ‘Get Aboriginal Culture Without Agenda’, Creative Spirits, https://www.creativespirits.info. See generally Alpana Roy, ‘Recent Developments in Law Reform and Indigenous Cultural and Intellectual Property in Australia’ [2009] 31(1) European Intellectual Property Law Review, 1,5.

12

Torres Strait Islander people.43 While the name of the deceased person may be withheld, the publication of the image may still cause distress and harm to the family and the community.44

1.3 Why should we protect personal images?

While there are many situations in the online world where images may be misused, the mere fact that something has been misused is not necessarily a reason why it should be protected. In this section I pause to consider what might be considered a fundamental question namely, why should we protect images online? Before considering the questions of why personal images should be protected, it is necessary to consider whether all images should be treated equally or whether the law should differentiate between different types of images. This is important because there are many different types of images online from the mundane and trivial through to the highly personal which may warrant different protection. In some situations Australia, like the United Kingdom, has treated personal images differently, depending on the nature of the image.45 For example the law of breach of confidence has treated images differently depending on the information that is depicted in the photograph. While images that are of a sexual or intimate nature may be protected, an image of a person walking outside may not warrant protection. Here the law has been willing to pass judgment over the nature and quality of the information and to change the way the law applies

43 Ibid. See Michael Blakeney, ‘Protecting the Spiritual Beliefs of Indigenous Peoples: Australian Case Studies’ [2013] 22(2) Pacific Rim Law and Policy Journal 391. See generally N. Stoianoff and A. Roy, ‘Indigenous Knowledge and Culture in Australia: The Case for Suis Generis Legislation’ [2015] 41(3) Monash University Law Review 745. 44 See further , Indigenous Portal (11 September 2009) https://apps.indigenous.gov.au/cultural_protocol.htm however, it is noted that the summary applies to journalists and Australian media to observe cultural protocols. See Michael Blakeney, ‘Protecting the Spiritual Beliefs of Indigenous Peoples: Australian Case Studies’ [2013] 22(2) Pacific Rim Law and Policy Journal 391, 397. 45 Personal images are a subset of ‘personal information’ that is currently protected under s 6 (1) of Privacy Act 1988 (Cth) and includes written information about a person. Because an image allows a person to be identified (even without written information identifying them), it is one of the most significant forms of identification because the image represents a person thus ‘identification of the person appears to be an obvious and sufficient condition for awarding protection.’ Tatiana Synodinou, ‘Image Right and Copyright Law in Europe: Divergences and Convergences’ [2014] 3 (2) Laws 181, 183; Susan Corbett, ‘The Retention of Personal Information Online: A Call for International Regulation of Privacy,’ (2013) 29 Computer Law and Security Review 246, 248.

13

accordingly. In other contexts, however, the law has been less willing to pass judgement over the quality of the image. This is the case, for example, with copyright law which has traditionally refused to pass judgement over the relative quality of artistic works; once a work is classified as an artistic work (such as a photograph), no consideration is given to the quality of the photograph.46 It is clear that there are many different types of images online. Some contain sensitive important information, while other images are trivial and of fleeting (if any) interest. While the former are deserving of protection, the latter are less so. Having said this, this does not mean that we should create a two-tier system which only protects certain types of images. As copyright law has long acknowledged it is often difficult (or dangerous) to pass judgement on artistic works such as photographs. This is particularly the case with personal images – some people may be highly sensitive to disclosure, while others thrive on it. A better option would be to accept all images from the sensitive to the trivial, but to take account of these difference in the application of the law (especially in relation to remedies and damages). With this in mind we now revisit the question: why should we bother protecting personal images online? Given the diversity of images online and the myriad of different interests potentially affected it is not surprising that there is no single reason why personal images should be protected. Instead there is a patchwork of different reasons why images might be protected that will differ depending on the type of image in question. There are a number of different reasons why a person’s image warrants protection that span economic and non-economic considerations that are associated with image rights.47 The following section examines the arguments for protecting a person’s image.48

46 See generally Lionel Bently and Brad Sherman, Intellectual Property Law, 4th ed (Oxford University Press, 2014). 47 See generally Tatiana Synodinou, above n 45; Huw Beverly-Smith, The Commercial Appropriation of Personality (Cambridge University Press, Cambridge, 2002) 8-9; Debbie V. S. Kasper. ‘The Evolution (Or Devolution) of Privacy’ (2005) 1, Sociological Forum 20, 69, 69-70; Richard S. Murphy, ‘Property Rights in Personal Information: An Economic Defence of Privacy’ (1996) 84 Georgetown Law Journal 2381, 2381-2382. 48 See Tatiana Synodinou, above n 45, 183, where the author suggests that ‘Protection of a person’s image often takes a dual form based on the privacy/property dichotomy that fails to express in legal terms the autonomy and the particular features of a person’s image. Based on the foregoing, a person’s image appears to be a legal asset with a multiple identity and an indiscernible nature.’ See generally, Huw Beverly-Smith, above n 47, 8-9.

14

One reason why we should protect a person’s image is because the image is ‘an intangible asset.’49 As Beverley-Smith suggests, ‘the increasing commodification of the human image demands that any modern classification of interests in personality should take account of the fact that a person’s name or features are also valuable economic assets’.50 This typically occurs where celebrities, athletes, musicians images are used in connection with advertising and marketing purposes 51 Another reason for protecting images builds on the protection of personality52 which, in turn, is founded on Lockean labour theory. 53 As Locke said: every Man has a property in his own Person. This no Body has any Right to but himself. The Labour of his Body, and the Work of his Hands, we may say, are properly his. Whatsoever then he removes out of the State of Nature hath provided, and left it in, he hath mixed his Labour with, and joined to it something that is his own, and thereby

makes it his Property. 54 Given, as Locke said, that everyone has ‘a property in his own person’ it can be argued that a person’s image is their property. Nimmer built upon Locke’s labour theory when he said ‘it would seem to be a first principle of Anglo-American jurisprudence, an axiom of the most fundamental nature, that every person is entitled to the fruit of his labors unless there are

49 See Tatiana Synodinou, above n 45. 50 See generally Huw Beverly-Smith, above n 47, 7-8; Justin Hughes, ‘The Philosophy of Intellectual Property’ [1989] 77 Georgetown Law Journal, 287. 51 See generally Huw Beverly-Smith, above n 47, 8-9; Alisa M. Weisman, ‘Publicity as an Aspect of Privacy and Personal Autonomy’ [1982] 55 Southern California Law Review, 727, 730 who states that ‘because most publicity cases have arisen in the commercial advertising context, many courts and commentators have thought and written about publicity primarily in economic terms’. 52 See Tatiana Synodinou, above n 45,183 where the author suggests that’ Protection of a person’s image often takes a dual form based on the privacy/property dichotomy that fails to express in legal terms the autonomy and the particular features of a person’s image. Based on the foregoing, a person’s image appears to be a legal asset with a multiple identity and an indiscernible nature.’ See generally, Gert Colombi Ciacchi, Brüggemeier, Patrick, Aurelia O'Callaghan, Personality Rights in European Tort Law (Cambridge University Press, 2010) 565-6. 53 John Locke, Two Treatises, Book II, Chapter V, para 27; see generally J. P Day, ‘Locke on Property’ (1966) 16 Philosophical Quarterly 207; J. Waldron, The Right to Private Property (Oxford, 1988) 177- 83. 54 John Locke, above n 53; W. J. Hamilton,’ Property According to Lock’ (1932) 41 Yale Law Journal, 864, 878.

15

important countervailing public policy considerations’.55 In Edison v Edison Polyform Mfg.,56 the court remarked that: ‘If a man’s name be his own property….. it is difficult to understand why the peculiar cast of one’s features is not also one’s property, and why it’s a pecuniary value, if it has one, does not belong to its owner, rather than to the person seeking to make an unauthorised use of it’. The Lockean labour theory is particularly important for celebrities who often invest a considerable amount of time and energy in their images. As Neville J says: [A] celebrity has a legitimate proprietary interest in his public personality. A celebrity must be considered to have invested his years of practice and competition in a public personality which eventually may reach marketable status. That identity, embodied in his name, likeness, statistics and other characteristics is the fruit of his labors and is a

type of property.57

One of the most powerful reasons why we should protect personal images is because abuse of a personal image potentially impinges on the fundamental human values of human dignity and autonomy. The need to protect dignity and autonomy is reflected in Article 1 of the International Convention on Human Rights which provides that ‘all human beings are born free and equal in dignity and rights’58 and in the preamble of The Universal Declaration of Human Rights, which provides that all human beings should have fundamental human rights of dignity and worth of human person.59 Allowing the misuse of personal images online has the potential to impinge on dignity and autonomy. This is because, as the Canadian Supreme Court said,

55 M. B. Nimmer, ‘The Right of Publicity’ (1954) 19 Law and Contemporary Problems 203, 216; Huw Beverly-Smith, above n 47, 294-296. 56 67 A. 392, 394 (N.J. Cha 1907); Michael Madow, ‘Private Ownership of the Public Image: Popular Culture and Publicity Rights’ (1993) 81(1) California Law Review 125, 156. 57 Uhlander v Henricksen 316 F SSupp.1277 (1970) 1282, cited in J. McCarthy ‘Rights of Publicity and Privacy’ (1954) 19 Law and Contemporary Problems, 203, 216. 58 International Convention on Human Rights, Article 1. See also, Huw Beverley- Smith, above note 47, 17. 59 Article 3 also provides that ‘everyone has the right to life, liberty and security of person’. Article 18,’ Everyone has the right to freedom of thought, conscience and religion; this right includes freedom to change his religion or belief, and freedom, either alone or in community with others and in public or private, to manifest his religion or belief in teaching, practice, worship and observance.

16

The camera lens captures a human moment at its most intense and the snapshot “defiles” that moment … A person surprised in his or her private life by a roving photographer is stripped of his or her transcendency and human dignity, since he or she is reduced to the status of a “spectacle” for others … The “indecency of the image” deprives those

photographed of their most secret substance.60 As Beverley- Smith argues many ‘violations of individual personality are of a non-pecuniary nature, not only because they cannot be assessed in money terms with any mathematical accuracy, but also because they are usually of inherently non-economic value’.61 In part this is because there is an ‘organic link between the intangible value of image and the core of personality, human dignity’.62 Because a person’s image is an element of personality that is ‘inextricably linked to the self’, the economic aspects cannot be divorced from the moral aspects of personality that include human dignity.63 While there may not be a ‘coherent notion of human dignity as a legal value,’ nonetheless dignitary interests in a personal image often reflect a broad spectrum of factors including reputation, privacy and liberty.64 As Rosen points out, misuse of a person’s image constitutes ‘an intrinsic offense against individual dignity’.65 As the Canadian Supreme Court

60 J Ravanas, La Protectiondes Personnescontrela Realisationet La Publicationde Leur Image (Paris, 1978), 388–9 (as translated in Canadian Supreme Court Reports). Marginally less orotund in the original French. Cited in Les Editions Vice-Versa Inc v Aubry [1998] 1 SCR 591, para 69. See further Jonathan Morgan, ‘Privacy Confidence, and Horizontal Effect: ‘” Hello” Trouble’, [2003] 62(2) The Cambridge Law Journal 444, 446-447, where the author stated that the court held that privacy ‘protects individual autonomy and the control of each person over his identity, which includes the use made of his image. The fact that the photograph was in a public place (and that it might be difficult to obtain the consent of everyone photographed there) was expressly stated to be irrelevant’: see Les Editions Vice-Versa Inc v Aubry [1998] 1 SCR 591, 59 (L’Heureux-Dube and Bastarache JJ); see also E. Picard, ‘The Right to Privacy in French Law’ in M Colvin (ed), Protecting Privacy (Oxford, 1999) 91. 61 See generally Huw Beverly-Smith, above n 47, 6; Gert Colombi Ciacchi, PatrickBrüggemeier, Aurelia O'Callaghan, Personality Rights in European Tort Law (Cambridge University Press, 2010) 565-9. 62 See Tatiana Synodinou, above n 45, 197; Gert Brüggemeier, et al above n 61, 567-9. 63 See Tatiana Synodinou, above n 45. 197. 64 See Huw Beverly-Smith, above n 47,10-1. 65 Jeffrey Rosen, The Unwanted Gaze: The Destruction of Privacy in America (Random House Inc, New York, 2000), 19; see Richard C. Post, ‘Three concepts of Privacy’ (2001) 89 Georgetown Law Journal, 2087, 2092. Post states that ‘to equate privacy with dignity is to ground privacy in social forms of respect that we owe each other as members of a common community’; see

17

said in Les Editions Vice-Versa Inc. v Aubry,66 it is important to protect personal images in order to safeguard a person’s ‘individual autonomy and the control of each person over their identity’.67 Protecting dignity is closely aligned with the protection of autonomy which ‘is a complex assumption about the capacities, developed or underdeveloped, of persons, which enable them to develop, want to act on and act on higher order plans of action which take as their self critical object one’s life and the way it is lived’.68 Autonomy is also an important value because it requires that a person should be able to take ‘self-critical responsibility for one’s ends and the way they cohere a life’.69 Autonomy is the freedom that an individual has to control what is revealed about them.70 Waldman suggests that ‘autonomy, and the separation of the personal and the public are rights based.’71 These rights, as Waldman suggests, reflect the ‘primacy of the individual over society.’72 This is particularly significant because ‘privacy theory is focused on individual freedom and not only sees the individual as the locus of privacy

Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd (2001) 208 CLR 199, where Gleeson CJ noted that the foundation of privacy is human dignity. 66 [1998] 1 SCR 591. 67 Ibid see e.g. Jonathan Morgan, above n 60, 446-7. 68 David A. Richards, A Theory of Reasons for Action (Oxford, Clarendon Press, 1971) 65-68. See generally; David A. Richards, ‘Rights and Autonomy’ [1981] 92(1) Ethics, 3, 3-20, where the author provides an in depth account of the concept of autonomy, with a particular focus on a Kantian interpretation of autonomy; Harry Frankfurt, ‘Freedom of the Will and The Concept of a Person’, (1971) 68 Journal of Philosophy, 5, 7, the author states, that persons ‘are capable of wanting to be different, in their preferences and purposes, from what they are. Many animals appear to have the capacity for…..’first order’ desires or ‘desires of the first order’, which are simple desires to do or not do one thing or another. No animal other than man, however appears to have the capacity for reflective self evaluation that is manifested in the formation of second-order desires’. 69 See David A. Richards, above n 68, 3, 9. 70 See generally, Ari Ezra Waldman, Privacy As Trust: Sharing Personal Information in a Networked World’ [2015] 69 (3) University of Miami Law Review 559, 585, the author explains that theories of privacy are concepts of autonomy and choice: the choice to disseminate information…. and the correlative right to control what other know about us’. He further argues that ‘autonomy and choice are central to both Locke and Kant as both agree that the freedom to choose defines man’. 71 See generally, Ari Ezra Waldman, above n 70, 566. 72 See generally, Ari Ezra Waldman, above n 70, 566. The author states that these rights reflect Lockean and Kantian ideals which are ‘united by the respect they offer the individual and individual rights’; see John Locke, Second Treatise of Government, (C.B. Macpherson ed., Hackett Publishing Go 1980) 123, 243.

18

rights but also sees the protection of individual freedom as the ultimate goal of privacy’.73 It allows an individual the power and freedom to choose for themselves what is private and what is not. 74 Another reason why images should be protected is because misuse of a personal image may unduly intrude upon the private life of an individual. As Godkin noted, ‘nothing is better worthy of legal protection than private life, or, in other words, the right of every man to keep his affairs to himself, and to decide for himself to what extent they shall be the subject of public observation and discussion.’75 The sanctity of the private sphere is reflected in many human rights treaties including the European Convention of Human Rights, which protects a person’s private or family life. 76 Importantly, respect for the private life of an individual extends beyond the invasion of private physical spaces (such as the home) to include the taking of a photograph of someone in a public place.77 While ‘we venture into the public, in order to further our private lives, we do not ipso facto relinquish all claims to a private sphere. Even tacit consent to being observed by others cannot automatically extend to their taking and, a fortiori, publishing photographs.’78 As Lord Hoffmann in Campbell v MGN Ltd said:

73 See generally, Ari Ezra Waldman, above n 70, 567. 74 See generally, Ari Ezra Waldman, above n70, 568. Waldman also claims that individual freedom is viewed from a privacy perspective that is a ‘necessary condition for generating the ideals of independence and autonomy’. The author also states that ‘previous theories of privacy reflected the individual’s right to seclude himself and exclude others from certain aspects of his life, whether intimate, deviant or not. They appreciate privacy as guaranteeing freedom from something: private places and private things were so called because they belonged to the individual, who had the power to control dissemination.’ (Ibid 581). 75 E.L. Godkin, ‘Libel and Its Legal Remedy’ (1880) 12 Journal of Social Science 69, 80. 76 European Convention on Human Rights, Art 8, provides that Right to respect for private and family life 1. Everyone has the right to respect for his private and family life, his home and his correspondence. 2. There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others. See Tatiana Synodinou, above n 45, 183-188. 77 See e.g. Jonathan Morgan, above n 60. See Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014) at para [5.16], 76. 78 See Jonathan Morgan, above n 60.

19

the publication of a photograph taken by intrusion into a private place (for example, by a long-distance lens) may in itself be such an infringement [of the privacy of the

personal information], even if there is nothing embarrassing about the picture itself.79

A person’s image is one of the core features that identifies them to others. 80 As Mensel suggests, the protection of a person’s image is important because the face is ‘the most transparent part of the body’; it captures a person’s facial expression which is ‘real feelings, character and personality’. 81 An image consists of a person’s identification and often is a representation of them which is an ‘obvious and sufficient condition for awarding protection’.82 A ‘person’s image constitutes one of the chief attributes of his or her personality, as it reveals the person’s unique characteristics and distinguishes the person from his or her peers.’ 83 This is because it ‘presupposes the individual’s right to control the use of that image, including the right to refuse publication thereof.’84 As the Grand Chamber of the European Court of Human Rights noted, ‘the right to the protection of one’s image is ….one of the essential components of personal developments.’85

79 Campbell v MGN Ltd [2004] 2 AC 457, 75. 80 Von Hannover v Germany (no 2) 2012, (Applications Nos. 40660/08 and 60641/08), Grand Chamber Judgment, [96]; see generally Tatiana Synodinou, above note 45; Jill Marshall, ‘Personal Freedom Through Human Rights Law? Autonomy, Identity and Integrity under the European Convention of Human Rights’ (Brill, 2008). 81 Robert E. Mensel, ‘Kodakers Lying in Wait: Amateur Photography and the Right of Privacy in New York, 1885-1915’ [1991] 43(1) American Quarterly, 24, 28 citing Halttunen, Confidence Men and Painted Women, 83. 82 See Tatiana Synodinou, above note 45; Jill Marshall above n 80. 83 von Hannover v. Germany (No. 2), Grand Chamber judgment of 7 February 2012, § 96). 84 von Hannover v. Germany (No. 2), Grand Chamber judgment of 7 February 2012, § 96). 85 Von Hannover v Germany (No 2) 2012, (Applications nos. 40660/08 and 60641/08), Grand Chamber Judgment, [96], Reklos v Davourlis, Application No 1234/2005. [2009] at 40 states ‘Whilst in most cases the right to control such use involves the possibility for an individual to refuse publication of his or her image, it also covers the individual’s right to object to the recording, conservation and reproduction of the image by another person. As a person’s image is one of the characteristics attached to his or her personality, its effective protection presupposes, in principle and in circumstances such as those of the present case…obtaining the consent of the person concerned at the time the picture is taken and not simply if and when it is published. Otherwise an essential attribute of personality would be retained in the hands of a third party and the person concerned would have no control over any subsequent use of the image.’

20

Another reason why we should protect images online is because of Australia’s obligations under international law. Specifically, we should provide effective protection to image because Australia is a signatory to the International Covenant on Civil and Political

Rights.86 Of key importance here is Article 17 which provides that member states should ensure that citizens are protected from the unlawful interference with family, privacy, home or correspondence and reputation. 87 Further, Article 1 provides that all people have the ‘right of self-determination and are free to determine and freely pursue their economic, social and cultural development’.88 These provisions demand that we ‘recognise the significance of individual privacy, particularly in view of the privacy threats posed by rapidly developing information, communication and surveillance technologies and an increasingly invasive media industry.’89 They also suggest that we should ‘ encourage the protection of other privacy interests founded on personal autonomy and dignity, such as the interest in protecting against intrusions upon seclusion.’90 While Australia has incorporated elements of the International Covenant on Civil Political Rights into domestic law (notably anti-discrimination and privacy law), the extent of protection is inadequate. This is because there is no recognised right to one’s image (or to personal privacy). In order to company with Australia’s international obligations more effective legal protection needs to be introduced.

1.4 Balancing competing interests

The law dealing with personal images builds upon and balances a range of competing interests. These include freedom of expression, the right for the public to know, the right to private life,

86 International Covenant on Civil and Political Rights Adopted and opened for signature, ratification and accession by General Assembly resolution 2200A (XXI) of 16 December 1966 entry into force 23 March 1976, in accordance with Article 49. 87 Ibid, Article 17. 88 Ibid, Article 1 provides ‘All peoples have the right of self-determination. By virtue of that right they freely determine their political status and freely pursue their economic, social and cultural development.’

89 Jillian Caldwell, ‘Protecting Privacy Post 'Lenah': Should the Courts Establish a New Tort or Develop Breach of Confidence? [2003] 26(1) University of Law Journal 90, 124. 90 Ibid.

21

and the interests of creators.91 In determining where and how these different interests are to be balanced the law builds a range cultural, technological and ethical considerations. Traditionally when drawing the balance the law has consistently prioritised freedom of expression over all other interests. This traditional view was captured in a comment by Lord Hoffman in R v Central Television Plc that:

It cannot be too strongly emphasized that outside the established exceptions or any new ones which Parliament may enact in accordance with its obligations under the Convention [for the Protection of Human Rights and Fundamental Freedoms] there is no question of balancing freedom of speech again other interests. It is a trump card

which always win.92

Over the last two decades there has been a lot of commentary on the way in which digital technologies have challenged and unsettled traditional arrangements. The position is equally true in relation to the protection of personal images. The advent of the internet in general and social networks in particular means that the traditional balancing of interests used in relation to images needs to be rethought and re-evaluated. Of particular importance is the need to rethink the balance between freedom of expression and the right to private life. The new digital world means that ordinary people are all creators with competing interests. One of the recurrent themes of the thesis is that changes in technology mean that we need to recalibrate the line between freedom of expression and other interests. In many ways this is the key challenge posed by the new technologies that is addressed in the subsequent chapters.

91 As Lord Denning MR said in Shering Chemicals Ltd v Falkman [1981] 2 WLR 848, 865: ‘Freedom of the press is of fundamental importance in our society. It covers not only the right of the press to impart information of general interest or concern, but also the right of the public to receive it. It is not to be restricted on the ground of breach of confidence unless there is a ‘pressing social need’ for such restraint. In order to warrant a restraint, there must be a social need for protecting the confidence sufficiently pressing to outweigh the public interest in freedom of press.’

92 Emphasis added. R v Central Television plc [1994] 2 WLR 20, 30. See also Raymond Wacks ‘Freedom to Express What?’ in R Wacks, Privacy and Media Freedom (Oxford Scholarship Online, 2013) 197; Imutran [2002] FSR 21, 28; Douglas v Hello! (No 3) [2003] 3 All ER 996 [185]; Lionel Bently and Brad Sherman, Intellectual Property Law (Oxford University Press, 3rd Edition, 2009), 1052.

22

1.5 Overview

The aim of this thesis is to investigate the role that Australian law might play in dealing with these problems. To this end, the thesis examines the effectiveness of the existing legal regimes in protecting personal images that are shared online. The thesis is limited to the protection of personal images in which copyright, breach of confidence, privacy and contract issues exist within social networks in Australia. It will not deal with patents and trademark issues on social networks. Patents and trademark infringement relate to commercial intellectual property rights; the thesis focuses on the amateur copyright interests. In the earlier stages of Facebook’s social network development, several trademark and patent infringement issues occurred.93 In 2008, Hasbro, which has the rights to sell Scrabble, launched a trademark infringement action against Facebook for its ‘Scrabulous’ app.94 While patent and trademark issues are significant to social networks; they fall outside the scope of protection of personal images. The tort of breach of confidence may provide protection in the absence of copyright protection, and confidential information captured under the Patent Act 1990 (Cth).95 Social networks have generated a range that span from pedophilia, through to identity theft, and fraud, as well as defamatory content, and passing off. 96 While these issues are important the focus of the thesis is on whether personal images on social networks are protected

93 An example is the Facebook’s Timeline and Timelines Inc, where the parties settled out of court: see further, Andrew Harris, ‘Facebook, Timelines Website End Trademark Infringement Suit’, Blomberg (8 May 2013), http://www.bloomberg.com/news/2013-05-07/facebook-timelines-website-end- trademark-infringement-suit-1-.html. Recently Facebook was sued for patent infringement over its ‘like’ button. See James Johnson, ’Facebook Sued Over “Like” Button, Other Patent Technologies’, Sky News (11 February 2013), http://news.sky.com/story/facebook-sued-over-like-button-patent-10454872.’ 94 DeclanMcCullagh, ‘Scrabble maker Hasbro’s Sues over Scrabulous’, CNet (24 July 2008), http://news.cnet.com/8301-1023_3-9998723-93.html; see also Alex Pham, ‘Scrabble vs. Scrabulous: A Lesson in Copyright Law’, Los Angeles Times (30 July 2008). http://latimesblogs.latimes.com/technology/2008/07/scrabulous-sc-1.html. 95 Any information that is confidential is potentially protected under the law of confidence. It also is not simply restricted to technical or formal requirements that could be protected under the Patents Act 1990 (Cth). 96 See e.g. Hogan v. Koala Dundee Pty Ltd., (1988) 20 FCR 314, 329-30 (Austl.); Henderson v. Radio Corp. Pty Ltd., [1960] 60 S.R. (N.S.W.) 576, 603. The common law tort of passing off applies in situations where the use of a celebrity’s image has been used commercially. In particular, passing off has traditionally applied to the commercial misappropriation of celebrity images and commercial organisations. As the focus of the thesis is on individual images that are shared online, it is outside the scope of the thesis.

23

adequately under the existing legislative framework and to the extent it is not suggesting reforms. The remainder of this thesis is divided into two parts. Part I: Existing Legal Protection for Personal Images examines the adequacy of existing legal protection for personal images uploaded on social networks in Australia. Chapter 2 examines the ways in which social network contracts regulate the use of personal images that are shared on social networks. After outlining the various terms of use that social networks adopt, the chapter examines the impact that these terms have on the ability for people sharing and exchanging personal images. The chapter shows how social networks contracts facilitate the misuse of personal images. The contractual terms provide little protection for people whose personal images are shared by the copyright owners (the people who captured the photograph). Chapter 3 focuses on how Australian copyright law protects personal images shared on social networks. The chapter shows that copyright provides little protection for personal images unless the copyright owner and the subject are one and the same. Chapter 4 examines the way that Australian privacy law protects personal images that are shared online. Specifically, it outlines how Australia’s fragmented approach for protecting privacy interests applies to the sharing and exchanging of photographs of people on social networks. The chapter argues that privacy law in Australia is inadequate to protect against the misuse of personal images online. Chapter 5 examines the way that the law of confidence protects personal images when those images are shared online. In so doing, it argues that while the tort of breach of confidence may protect certain types of personal images that are sensitive or of an intimate nature; personal images that are captured and depict various information about the person captured in the photograph, such as them eating and drinking, will not be protected under the law of confidence. Part II: Solutions sets out some possible solutions to the problems with the legal protection of personal images in Australia identified in Part 1. Chapter 6 examines whether the recommendations of the Australian Legal Reform Commission in the 2014 ALRC Report would fill some of the gaps in the legal protection highlighted in the thesis. Chapter 7 evaluates whether adopting image rights in Australian law would provide adequate protection when personal images are shared online. Chapter 8 examines whether Australian law ought to adopt a right to be forgotten.

24

1.5 Existing Scholarship On Social Networks, Image Rights And The Law

The thesis grew out of a realisation that there was very little literature about the role the law does and should play in protecting personal images on social networks in Australia. While there has been a lot written on the legal status of social networks,97 there is an important gap in the literature regarding the standing of personal images on social networks in Australia. There is limited scholarship that explores how personal images are protected within a social network that exists outside of third-party copyright. While there has been scholarship that has considered commercial copyright infringement by people within a social network, it has not examined a person-to-person infringement of amateur copyright.98 When reflecting upon the role played by the law of confidence in protecting personal images that are shared online, the existing scholarship tends to focus on images that reveal confidential or private information. As will be shown, the law of confidence has a limited application when images are shared on social networks. While the law of confidence may protect personal images in some situations, the protection is limited. There is also little literature that examines the way that Australian privacy law protects personal images that are shared on social networks. The sharing and exchanging of people’s images on social networks poses challenges for privacy law to prevent the misuse of personal images. Consequently, the sharing of personal images on social networks has also highlighted concerns over the use and control of the use of the personal image. There is also limited scholarship in relation to the impact that social network contracts have on the use of personal images. In particular, existing scholarship has focused on the way

97 See Daniel Gervais, above n 1, 842; Julie E Cohen, ‘A Right to Read Anonymously: A Closer Look at Copyright Management in Cyberspace’ (1996) 28 Connecticut Law Review 981; Mary Wai San Wong, ‘User- Generated Content & the Open Source/Creative Common Movements: Has the Time Come for Users’ Rights?’ (April 2007) Proceedings of the Fifth Workshop on Open Source Software Engineering, 1,5; Niva Elkin- Koren, above n 1; Carlisle George and Dr Jackie Scerri J, Web 2.0 and User Generated Content: Legal Challenges in the New Frontier, (2007) 2 Journal of Information Law and Technology 1. 98 For example, YouTube and Viacom third-party copyright infringement where people upload and reshare third-party copyright content; see generally Daniel Gervais, above n 1 ; 843 Gervais states that ‘the right to make private use of copyrighted material is considered fundamental in several EU copyright statutes and may have a constitutional basis in a number of other legal systems’; see further Julie E Cohen, ‘A Right to Read Anonymously: A Closer Look at Copyright Management in Cyberspace’ (1996) 28 Connecticut Law Review 981; Mary Wai San Wong, above n 97.

25

that social networks use people’s information. Because the focus is on personal information, this scholarship has overlooked the protection of the use of personal images on social networks. The scholarship looking at intellectual property and social networks has tended to focus on the use of third-party copyright on social networking sites.99 For example, Elkin-Koren argues that it is the fundamental ingredient of the means of producing and communicating content to the masses that enabled individual users to connect with each other.100 This primarily stemmed from the interactivity of digital networks as a result of the Internet, subsequently enabling a revamping of the production and distribution of creative works.101 Third party content was present before the internet or the phenomenon of digital networks as people were creating content in various forms of taking family pictures (or just pictures), telling stories, playing music and recording events (family) but disseminating the content was restricted.102 The scholarship in the United States is more extensive, as legal scholars became concerned that the development of photographic cameras were intruding into people’s privacy.103 Legal scholars Warren and Brandeis were concerned with the protection of people’s privacy as photography and photographic equipment evolved.104 Arguably, Warren and Brandeis attempted to protect image rights under the tort of privacy with the first landmark case to explore the right to privacy: Marion Manola v Stevens & Myers.105 Miss Manola was a theatre actor who objected to a photographer taking secret pictures of her in tights from his box for advertisements. The question, in this case, ignited scholars to consider ‘the rights of circulating portraits’.106 This played a pivotal role when questioning whether the law would recognise and protect the right to privacy.107 However, it was subsequent scholars who played a pivotal role

99 Niva Elkin-Koren, above n 1, 3-4,7. The author suggests that when people create content it is ‘often associated with the buzzword Web 2.0 which refers to social networks, media sites, collaborative initiatives and a variety of works created, remixed and exchanged by individual users’. 100 Ibid. 101 Ibid. 102 Ibid. 103 See Warren and Brandeis, ‘The Right to Privacy’ (1890) 4 Harvard Law Review 193, 195–6. 104 Ibid. 105 NY Supreme Court (15, 18, 21 June 1980), New York Times. 106 Warren and Brandeis, above n 102. 107 Ibid see also Dorothy J Glancy, ‘Privacy and the Other Miss M’ (1990) 10 Northern Illinois University Law Review 401; J Thomas McCarthy, ‘The Spring 1995 Horace S Manges, Lecture – The Human Persona as Commercial Property: The Right of Publicity’ (1995) 19 (129) Columbia-VLA Journal of Law and the Arts 129, 130-2.

26

in establishing four different torts for protecting privacy in the United States.108 The right of privacy provides the right to be let alone, to live a life of seclusion and to be free from unwanted publicity.109 It protects four aspects of personality, which relate to a person’s name, history and image (likeness), and a common law protection of personal diaries, letters and eavesdropping.110 Despite the extensive scholarship centering on image rights in the United States, there is little clarity when considering how image rights are protected when used, shared and exchanged on social networks in Australia. This is because there are no known image rights upon which people can rely to protect their image, or subsequent use or misuse, when those images are shared online. The lack of image rights in Australia reflects limitations of Australian law to provide adequate protection for the use of personal images when those images are misused.

1.6 Overview of Social Networks

Social networks allow users to network and communicate with other users. There are many different types of social networks, which have different facets and tools for a user to share and exchange personal images, including Google+, Windows Live, MySpace, Bebo IMBD, Flickr,

LinkedIn, Tumblr, YouTube, Photobucket, Twitter, Facebook, Pinterest and Instagram.111 While these social network platforms vary significantly in appearance, they all have a number of core features. These are profile, contacts, content/information and control (or access to control). For the purpose of the thesis, social network sites are taken to mean:

Web-based services that allow individuals to (1) construct a public or semi- public profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system. The nature and nomenclature of

these connections may vary from site to site.112

108 Warren and Brandeis, above n 102; WAC, ‘The Right of Privacy in News Photographs’ (1958) 44(8) Virginia Law Review 1303,1304-5. 109 WAC, ‘The Right of Privacy in News Photographs’ (1958) 44 (8) Virginalia Law Review 1313, 1304. 110 Ibid. 111 This is not an exhaustive list. See also: Wikipedia, ‘List of Social Networking Websites’, http://en.wikipedia.org/wiki/List_of_social_networking_websites. 112 See Danah M Boyd and Nicole Ellison above n 2, 211. While this definition has been widely accepted, it does not reflect the crucial role that personal information plays within a social network; nor does it

27

There are a number of key characteristics of a social network site. One key characteristic is the user’s profile. The profile influences how people communicate information, and how they interact and engage with other people within the social network. A profile contains information about users including their name, age, marital status, gender, likes and dislikes education and friends/contacts. It may also include the names of other people users are connected to or wish to be connected to.113 Each person who is on a social network completes a profile, thus revealing information about themselves. This is irrespective of whether a person is creating content about themselves or another person. The information can take various forms, including images, videos, audios, written comments, posts, written information (such as likes, dislikes, about me)114 and combinations thereof.115

A second feature of social networks is that they connect people.116 The networking function has a dual purpose of supporting the social network and allowing the user to establish connections with other users.117 This provides a link between one user and another user or multiple users.118 This is done byway of a ‘notification of request’, which may be accepted or ignored by the user.119 Accepted requests are added to a user’s contact lists, which may or may not be visible.120 The networking function also facilitates the sharing of information/content121 created by the users to their contacts on the social network. Profiles may contain links to a user’s friend’s profile. Through the profile function, users can view other users’ friends lists.

account for the importance of information sharing and exchanging by users. The definition provides limited consideration of social network analysis and social network theory. 113 See generally Alessandro Acquisti and Ralph Gross, above n 1, 36. 114 This is not an exhaustive list; a more exhaustive list is provided in Chapter 2. 115 See Privacy Act 1988 (Cth), s 6(1) which defines personal information as: ‘Information or an opinion (including information or an opinion forming part of a database), whether true or not, and whether recorded in a material form or not, about an individual whose identity is apparent, or can reasonably be ascertained, from the information or opinion.’ Contrast this definition with the ALRC’s view that the definition should be broader, or any combinations of written text, images, videos, posts, tags, links, etc. 116 See generally Leucio Antonio Cutillo, Mark Manulis and Thorsten Strufe, above n 25, 503. 117 Ibid. 118 Ibid. 119 Ibid. 120 Ibid. 121 See also Rebecca Wong, Social Networking: A Conceptual Analysis of a Data Controller [2009] 14(5) Communications Law 142, 143-4 < http://works.bepress.com/rebecca_wong/9>; ‘Data’ is the common term for how information is stored digitally: Privacy Act 1988 (Cth) NPP 9 (Schedule).

28

For example, Facebook’s ‘People You Know’ feature allows a user to view other users who are connected to their friends’ profiles. Twitter has follower lists and following lists showing who the person follows. Each social network has its own version of these features. All social networks provide a profile for people to create and allow the person to show their contacts, friends or followers. Another key feature of social networks is that they facilitate the exchange of information. This is done by way of blogs, posts, emails, chat, uploading of videos, and images, wall-to-wall (Facebook)122 private messaging and notes.123 The most common way of communicating information is by a photograph and post. A post is a block of information comprised of written text, images, videos and links.124 This forms part of the main thread of the profile. Here the person, along with their contacts, can comment and interact with one another by depicting their own self as well as other users through posts, comments, image and video sharing. They can also link their own content to other users via features such as ‘tag’ or ‘like’ or ‘dislike’. The tag feature means that the person identifies another person through their content (and vice versa).125 Personal images that are shared on a person’s profile are stored on a social network.126 When people share personal images on a profile page, other information about a user may also be revealed such as the user’s identity, name, age, and address.127 It may also contain information of all of the user’s connections on their network and the information exchanged within the social network by all users.128 Another key feature of social networks is the privacy settings that allow users to control who accesses their images. The privacy settings of a social network commonly determine how people’s profile information and personal images are shared with their friends and other users in the network. The privacy settings provide different levels of access to people’s images when uploaded on a profile page.129 From the privacy settings, people can also control whether their profile (along with its contents) is visible to and accessible by other users, and whether third

122 Facebook’s wall-to wall feature allows where a user to post a comment on another user’s wall. 123 This is not an exhaustive list. See Danah M Boyd and Nicole Ellison, above n 3, 213. 124 And any combination of written text, image, videos, or links. 125 Tagging is a feature better known in Facebook. 126 See generally Leucio Antonio Cutillo, Mark Manulis and Thorsten Strufe, above n 25, 503. 127 See further for an overview of general discussion about identity, James Grimmelman ‘Saving Facebook’ [2009] 94 Iowa Law Review,1137, 1152; Alessandro Acquisti and Ralph Gross, above n 1, 36–58. 128 See generally, Leucio Antonio Cutillo, Mark Manulis and Thorsten Strufe, above n 25, 503. 129 Ibid.

29

parties have access to their content and posts.130 This is turn allows users to have some control over their profile within the network.131 A social network’s contract terms also regulate the network’s privacy settings, which allow users to restrict access to their images. As will be shown, people’s ability to control their images depends on the network’s settings. When a user’s profile is restricted, control may be overridden by the social network’s default settings, which are public. This occurs, for example, in Facebook’s graph search because people’s information on their profile can be viewed publicly if their privacy settings are not changed. However, even if a user did restrict their individual privacy setting, they would still have very little control over the use of their images. This is because when a person uploads and shares an image on a profile page, that image is also subject to the privacy settings of third parties such as contacts/friends.132 One of the consequences of gaining access to a social network service is that people involuntarily relinquish control over their personal images because the contract terms are mandated by the social network. One of the problems that I faced in developing the research question was the vast number of social networks that exist today. To make the project manageable, three social networks were selected: Facebook, Twitter and Instagram. The social networks were chosen in order to illustrate the different problems that arise when personal images are exchanged, used and shared within each network. These social networks were chosen because they each illustrate different problems that occur when personal images are shared, exchanged and used online. The first social network that was selected was Facebook. It was selected because it demonstrates the problems that arise when users share, exchange and use images with their contacts. Facebook was launched in February 2004 and in January 2016 has more than

1.71 billion users.133 Facebook offers its users the ability to create a personal profile, add other

130 Ibid. 131 Ibid. 132 Adi Kamdar, ‘Facebook Privacy: Control You Still Don’t Have’, Electronic Frontier Foundation (29 January 2013), https://www.eff.org/deeplinks/2013/01/facebook-graph-search-privacy-control-you- still-dont-have; Adi Kamdar, ‘The Creepy Details of Facebook’s New Graph Search’, Electronic Frontier Foundation (18 January 2013), https://www.eff.org/deeplinks/2013/01/facebooks-graph-search; see Adi Kamdar, Experimenting With Your Privacy, ‘Facebook Begins Selling Access to Your Inbox’, Electronic Frontier Foundation (22 December 2012) https://www.eff.org/deeplinks/2012/12/experimenting- privacy-facebook-sells-access-your-inbox. 133 Statista, Number of Monthly Active Facebook Users Worldwide as of 2nd Quarter in 2016, https://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide; see Craig Smith, ‘By the Numbers: 32 Amazing Facebook Stats’, DMR (1 May 2013)

30

users as friends, receive automatic notifications when they update their profiles, exchange messages, have instant messaging, join common interest groups, and like fan pages that comprise workplace, organisations, schools or colleges.134 Users must register prior to using the site and use real names and information; they must also be at least 13 years old.135 Facebook has staked its claim to the number one position in the social network arena. This is due to its attractiveness for users to engage in a range of online communications such as chat, apps, games, uploading and sharing images, notes, videos and tagging.136 Facebook is the number one ranked social network with an estimated traffic of a billion people per month.137 Facebook was selected because it demonstrates the problems that occur when people upload images on their profile pages. In particular, it exemplifies the problems that arise when third parties reuse images that have been uploaded and shared by people on their profile pages. The second network that was chosen was Twitter. Twitter was chosen because it highlights the problems that arise when users share personal images and third parties reuse those images. Twitter was launched in 2006 and currently has 1.3 billion registered users.138 It is a social networking and micro blogging service that allows users to send and receive short text- based messages up to 140 characters.139 The messages that are sent and received are called

http://expandedramblings.com/index.php/by-the-numbers-17-amazing-facebook; Facebook is also ranked no. 1 social network site on Alexa, http://www.alexa.com/topsites; see Nicholas Carlson, ‘Facebook Has More Than 600 Million Users, Goldman Tells Clients’, Business Insider (5 January 2011) http://www.businessinsider.com/facebook-has-more-than-600-million-users-goldman-tells-clients-2011-1?IR=T. 134 Facebook: http://www.facebook.com. 135 Ibid. 136 Andres Sanchez, ‘The Facebook Feeding Frenzy: Resistance Through Distance and Resistance Through Persistence in the Societied Network’ (2009) 6(3) Surveillance and Society 275, 277. 137 See further eBiz/MBA, Top 15 Most Popular Social Networking Sites (October 2016) http://www.ebizmba.com/articles/social-networking-websites; see further Andy Kazeniac, ‘Social Networks: Facebook Takes Over Top Spot, Twitter Climbs,’ Compete Pulse Blog (9 February 2009), https://blog.compete.com/2009/02/09/facebook-myspace-twitter-social-network. See further Quantcast, Facebook.com (29 April 2011), https://www.quantcast.com/facebook.com; Wells Roy, ‘41.6% of the US Population Has a Facebook Account’, (8 August 2010), Social Media Today http://www.socialmediatoday.com/content/416-us-population-has-facebook-account. 138 Adrianus Wagemakers, ‘There is a Possibility That the Quality of Twitter’s Users is Deteriorating’, (3 August 2015), Business Insider Tech http://www.businessinsider.com/twitter-monthly-active-users- 2015-7?r=UK&IR=T. 139 Twitter, It’s What’s Happening, https://about.twitter.com/company; see further Wikipedia, Twitter, http://en.wikipedia.org/wiki/Twitter.

31

‘tweets’, and are publicly visible by default although the users can restrict the messaging delivery to their friends.140 Twitter’s functionality works based on ‘following’: a user may follow another user without any reciprocity.141 Twitter’s function of establishing connections is similar to Facebook’s friends and friending; Twitter users ‘follow’ or have ‘followers’. A user creates a public profile, which has the user’s full name, location, web page and a short biography, and the number of tweets of the user.142 Users must register before they can post a tweet, follow or be followed. The third social network that was chosen was the photo-sharing social network Instagram. Instagram is an image-sharing and hosting social network site that provides filters for ‘images’ and then allows people to share them on other social networks. Instagram was selected because it highlights the problems that arise when a third party uses personal images. Instagram enables users to capture an image on their mobile phone and then, using a filter, to enhance the image and share it via Instagram. Users can share their personal images via

Facebook.143 Users on Instagram can upload photograms, share photos and follow other users.144 Recent new Instagram features are that users have a web profile, which contains biographical information, personal details, and personal images.145 Instagram was chosen because of its popularity, and because it allows people to share images across different social media sites, such as Facebook and Twitter.

140 See Haewoon Kwak et al., What is Twitter? A Social Network or News Media? http://en.wikipedia.org/wiki/Twitter. 141 See Twitter, It’s What’s Happening, https://about.twitter.com/company; See Haewoon Kwak et al., What is Twitter? A Social Network or News Media? http://en.wikipedia.org/wiki/Twitter. 142 See Twitter, It’s What’s Happening, https://about.twitter.com/company. 143 Instagram’s popularity has increased with over 30 million users in April 2012 and has been acquired by Facebook in 2012; Instagram, FAQ, https://www.instagram.com/about/faq/; see also Instagram, Instagram for Android – Available Now (3 April 2012) http://blog.instagram.com/post/20411305253/instagram-for-android-available-now. 144 Instagram, FAQhttps://www.instagram.com/about/faq. 145 Jared Newman, ‘Instagram’s Webfeed Keeps it Clean, Keeps It Simple’, (3 February 2013), Time http://techland.time.com/2013/02/07/instagrams-web-feed-keeps-it-clean-keeps-it- simple/#ixzz2L7fai7np.

32

33

Chapter 2 Terms of Use, Personal Images and Social Networks

2.1 Introduction

Contracts of service play an important role in shaping how personal images are used on social networks. 1 Before a person is able to access a service, they must first accept the social network’s terms and conditions. When a person accepts a network’s terms of service, a contractual relationship is formed with the network provider. A social network’s contract is recorded in their terms of service,2 which are standard non-negotiable terms. Social network contracts usually contain a data/privacy policy along with provisions that stipulate how information (including images) is used by the network. This chapter examines the role that social network contracts play in regulating the use of personal images that are shared online. In order to review the role that contractual terms play in protecting personal images, a range of different types of social network contracts was reviewed. This review revealed a number of things. First, while most social networks deal with similar issues, the name given to the contractual terms sometimes varies between different social networks.3 The review also revealed that while the language may differ between different social network contracts, most deal with similar issues such as privacy, content, variation, termination, disputes, disclaimers,

1 Click wrap contracts are the preferred vehicle for website owners to regulate access and use of online content. See ProCD Inc v Zeidenberg 86 F 3d 1447 (7th Cir 1996), where the United States court held that click wrap (shrink wrap) agreements were valid and enforceable contracts. See generally, Dale M Clapperton and Stephen G Corones, ‘Unfair Terms in “Click Wrap” and Other Electronic Contracts (2007) 35 Australian Business Law Review 152. 2 The industry term for an online contract is ‘terms of service’ or ‘terms of use’ or ‘terms’. Despite the different terminology, they are used interchangeably and are binding on parties who sign up to online services. Twitter uses the term ‘terms of service’ – see Twitter, Twitter Terms of Service (30 September 2006), https://twitter.com/tos?lang=en; Instagram uses ‘terms of use’ – see Instagram, Terms of Use (19 January 2013) < https://help.instagram.com/478745558852511> ; Facebook’s terms are referred to in its Statement of Rights and Responsibilities – see Facebook, Statement of Rights and Responsibilities (30 January 2015) . 3 The following are some of the standard terms that are contained in a social network: Privacy; Content; Amendments/variations; Termination; Disputes; Entire agreement; Indemnification; Disclaimer of warranties; and Jurisdiction.

intellectual property and data collection. In order to critically examine the impact that the contracts of service have on the use that is made of personal images online, the thesis will focus on those clauses that impact on how images are used. These relate to licensing, collection, use, disclosure and termination.4 Social network contracts regulate how personal images are shared online in a number of different ways. The first is that the contract will allow a network to use and reuse personal images that have been shared online. This occurs when a network is given a very wide licence to use, reuse and sub-licence personal images. As personal images are protected under copyright, the network must have permission to use and disseminate the images on the network. The second is when a network collects personal images. This occurs, for example, when a network collects personal images for marketing and advertising purposes. The third is where a network uses personal images that have been shared online. This occurs when a network encourages people to share images of other people on their network. For example, Facebook’s contract encourages people to share images of other people on their profile pages.5 Networks also encourage people to reshare or exchange personal images they do not own on the network. The fourth is when a network shares or discloses personal images – for example, when a network shares personal images with third-party affiliates for commercial purposes such as advertising. When this occurs, people’s images are exploited without any compensation to the person whose image is misused. In looking at the role played by social networks in shaping how personal images are used online, the thesis focuses on three social network contracts: Facebook, Instagram and Twitter. These were selected for a number of reasons. The first is because they are the most popular networks that people use to share personal images.6 The second is because, while each of

4 While there are separate clauses that pertain to ‘content’ and ‘disputes’, I have addressed the ‘content’ clause under the licensing term. This is because the focus of the thesis is on the way that the use of personal images is regulated by social network contract. 5 This contractual term may contradict the network’s privacy settings. This may contradict people’s customised privacy settings for example a person has strict privacy settings, but people are still able to upload and share images of them. Instagram’s privacy terms are contradictory to the network’s features where personal images that are set to ‘private’, are still used and may be reused by third parties. This is similar to Twitter’s contractual terms and features where other users and third parties may misuse personal images that have been shared publicly. 6 See further Ebiz MBA, ‘15 of the Top Social Networking Sites’, eBiz (October 2106) . The site lists Facebook, Twitter and Instagram in the top 10 sites. Facebook ranked first, Twitter ranked second and Instagram ranked seventh.

35

these three networks has similar characteristics, they differ in terms of the ways in which personal images are shared and accessed online.7 The reason for this is that the networks have different settings that have ramifications for the way each network is able to use personal images shared online. A network has features that allow users to choose settings that enable the images that users share online to be viewed either publicly or privately (by restricting the images to a selected audience). The network’s settings may affect how the network and third parties use images that are shared online. Facebook was chosen because it is a semi-private network that allows people to choose various settings when sharing and exchanging personal images with their contacts; this means that a person can control access to their images. In contrast, Twitter was chosen because it is by default a public network; this means that anyone can view and access personal images that are shared on the network without restriction.8 Instagram was chosen because it is a semi-public network, which also allows people to choose limited settings when sharing personal images online. Where this occurs, they retain some ability to restrict access to personal images when shared online; however, this is very limited.

2.2 Licensing and Ownership of Personal Images

As most of the material that is uploaded, used and reused on social networks is protected by copyright, it is essential that the sites obtain permission to use images that are shared online.9 Typically, social network contracts include a licensing clause that facilitates the network’s use

7 Facebook has various privacy settings from which people can choose to share their images; when people share their images with their friends, and the images are reused, the image shared is subject to a third party’s privacy settings. Notably, Twitter and Instagram have limited privacy settings – public or private. 8 Twitter’s privacy settings are set to default or limited privacy settings. This is also the case with Instagram. 11 The content may be a combination of videos, images, audio or descriptive information, or just some of these types of content. It includes personal information that is provided by the user along with any combination in which it is expressed. The creation of images, videos or audio, along with the descriptive information that a user provides, falls under the definition of works in which copyright subsists in and is protected under the Copyright Act 1968 (Cth). The creation of a profile automatically demonstrates how personal information is authored and contributed by the person, which can take various forms of copyright due to the nature of copyright subsisting in works that may be created by amateurs. See Copyright Act 1968 (Cth), ss 10, 31(1), 32. Although there is argument about whether short text messaging is protected under copyright, I argue that it is not only the short text messaging but the combination in which it is expressed – for example, Twitter is a short text messaging which alone may not be protected by copyright however, the combination of the tweet with an image or audio would arguably be protected by copyright.

36

of personal images.10 The licensing clause plays a critical role in determining how the network is able to use the images that people share online. The permission is given at the time of joining a social network and is non-negotiable. This is important because, without a licence, the network is unable to use personal images and may be liable for infringement of copyright. Without a licensing clause, a social network would not be able to use personal images, including to publish or disseminate personal images on the network.11 There are significant ramifications in relation to the control networks can execute over personal images when people give a licence to a social network. The following section will look at the licensing clauses used by Facebook, Twitter and Instagram, and the impact they have on the way images may be used.12

2.2.1 Facebook

Facebook’s Statement of Rights and Responsibility (SRR), Clause 2 states how the network treats personal images and any other information that people share online. Interestingly, this

10 There are two types of licence: exclusive or non-exclusive licences, which are either express or implied. Express licences enable the copyright owner of the photograph to grant an exclusive or non-exclusive licence over their photograph. The effect of an exclusive licence is that it gives the licensee (the person who has permission to use the licence over the photograph) the exclusive right to use the copyright work; see also Copyright Act 1968 (Cth), s 10, which states that ‘exclusive licence means a licence in writing, signed by or on behalf of the owner or prospective owner of copyright, authorizing the licensee, to the exclusion of all other persons, to do an act that, by virtue of this Act, the owner of the copyright would, but for the licence, have the exclusive right to do’, and ‘exclusive licensee’ has a corresponding meaning; see also Copyright Act 1968 (Cth), s 196(4). 11 The social network needs people’s agreement in order to use their images because images are considered to be content protected under copyright law. Chapter 2 discusses in detail how photographs are subject matter protected under copyright, and the copyright issues that arise with respect to ownership of photographs. As mentioned previously, only a creator or copyright owner has the right to share, disseminate and publish their images on a social network. A copyright owner can assign or license their copyright to a social network. 12 See Facebook, Statement of Rights and Responsibilities – Clause 2, Sharing Your Content and Information (30 January 2015) < https://www.facebook.com/legal/terms > ; Twitter, Terms of Service, Clause 4 Content on the Service (30 September 2016) < https://twitter.com/tos > ; Instagram, Terms of Use, Rights (19 January 2013) < http://instagram.com/legal/terms> ; see also Van Alsenoy et al., ‘From Social Media Service to Advertising Network: A Critical Analysis of Facebook’s Revised Policies and Terms’, Ku Leuven (31 March 2015)

37

clause is contradictory. According to Facebook, all users retain ownership of their content.13 However, the contract contains qualifying sub-clauses that provide Facebook with a non- exclusive sublicence to their content and information. As sub-clause 2.1 provides:

For content that is covered by intellectual property rights, like photos and videos (IP content), you specifically give us the following permission, subject to your privacy and, application settings: you grant us a non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any IP content that you post on or in connection with Facebook (IP License). This IP License ends when you delete your IP content or your account unless your content has been shared

with others, and they have not deleted it.14

The effect of this sub-clause is to provide Facebook with a licence to use personal15 images royalty free. The licence term also provides Facebook with a ‘non-exclusive, transferable, sub- licensable, royalty-free, worldwide’ licence over all the content, such as photographs and videos, posted by users on Facebook. This means that the network can use a person’s images without their permission. Essentially, Clause 2 provides that when people post images on the network, the images will be accessed in accordance with their privacy settings and with any applications that the user has used and/or is using. Importantly, the licensing clause does not end if the user deactivates their account. If a person’s images are shared and then reshared with others, the licence is still in effect. This is because when a person terminates their social network account, the contract provides that the ‘IP licence ends when you delete your IP content unless your content has been reshared with others and they have not deleted it’.16 The reality is that if a person’s photograph is reshared or reused by another user, the licence still operates.

13 See Facebook, Statement of Rights and Responsibilities Clause 2 (30 January 2015) which states: ‘You own all of the content and information you post on Facebook, and you can control how it is shared through your privacy and application settings’; see Van Alsenoy et al., above n 12. 14 Emphasis added, see Facebook, Statement of Rights and Responsibilities Clause 2.1 (30 January 2015) . 15 For the purposes of the thesis, a user is a person who subscribes to a social network. Social network contracts refer to people who join the network as ‘users’. 16 Facebook, Statement of Rights and Responsibilities Clause 2.1 (30 January 2015) .

38

2.2.2 Twitter

Twitter’s licensing clause is incorporated in Clause 5, ‘Your Rights’. This clause refers to copyright ownership of the content provided by users. Specifically, Twitter’s content term states:

You retain your rights to any Content you submit, post or display on or through the Services. By submitting, posting or displaying Content on or through the Services, you grant us a worldwide, non-exclusive, royalty-free license (with the right to sublicense) to use, copy, reproduce, process, adapt, modify, publish, transmit, display and distribute such Content in any and all media or

distribution methods (now known or later developed).17

This clause varies slightly from the Facebook contract insofar as it explicitly states that the network is able to use any content that a person posts on the network. This includes any personal images that are shared on the social network. Clause 5 provides that the licence includes the right for Twitter to make:

Content submitted to or through the Services available to other companies, organizations or individuals who partner with Twitter for the syndication, broadcast, distribution or publication of such Content on other media and

services, subject to our terms and conditions for such Content use.18

Twitter states that ‘all content whether publicly posted or privately transmitted is the sole responsibility of the person who originated such content’.19 This means that users are responsible for any possible infringement of copyright. The effect of this content term is that it also allows third parties and affiliates to use people’s images that are shared on the network. Twitter’s licence clause states that Twitter (along with third party affiliates) can use people’s images without compensating the people whose images are used. This means that people’s images can be reused, distributed, published or broadcast by third parties; this includes the network’s partners and other people who subscribe to the network. Like Facebook, Twitter’s licence for the use of images does not end when the contract ends. This is highlighted in the termination clause which states that certain clauses operate after a contract ends. For example,

17 (Emphasis added). Twitter, Terms of Service, Clause 5 Your Rights (30 September 2016) . 18 Twitter, Terms of Service, Clause 5 Your Rights (30 September 2016) . 19 Ibid Clause 4 Content on the Services.

39

Twitter can still make use of the content, even when people retain ownership of the images that they post on the service.

2.2.3 Instagram

Instagram’s licensing clause states:

Instagram does not claim ownership of any Content that you post on or through the Service. Instead, you hereby grant to Instagram a non-exclusive, fully paid and royalty-free, transferable, sub-licensable, worldwide license to use the Content that you post on or through the Service, subject to the Service's Privacy Policy, available here http://instagram.com/legal/privacy, including but not limited to sections 3 (‘Sharing of Your Information’), 4 (‘How We Store Your Information’), and 5 (‘Your Choices About Your Information’). You can choose who can view your Content and activities, including your photos, as described

in the Privacy Policy.20

While Instagram’s licence clause is similar to Facebook’s, there is more detail about how the content clause affects other standard clauses. For example, Instagram’s licensing clause operates subject to Instagram’s privacy policy, and the way that the network shares and stores personal images. As Instagram’s licence terms state that a person will give the network a ‘non- exclusive licence fully paid and royalty-free, transferable, sub-licensable, worldwide license to use’ personal images, the extent of the use depends on other terms in the social network contract.21 The licensing clause enables Instagram to publish and disseminate personal images that are shared on the network. This means that the network can use and publish any images that people share and upload. However, Instagram’s licensing clause is subject to other contractual terms – for example, in relation to privacy. Unlike Facebook and Twitter, Instagram’s termination clause is silent regarding whether the network is able to continue to use personal images.

20 (Emphasis added). See Instagram, Terms of Use, Rights Clause 1 (19 January 2013) < http://instagram.com/legal/terms> . 21 Ibid including but not limited to sections 3 (‘Sharing of Your Information’); 4 (‘How We Store Your Information’); and 5 (‘Your Choices About Your Information’). You can choose who can view your content and activities, including your photos, as described in the privacy policy.

40

What is the Effect of the Licensing Clause on the Use of Personal Images?

The social network contracts examined above all use non-exclusive transferable, worldwide, royalty-free, sub-licensable licences to allow them to reproduce, communicate and publish the content that is shared by users on the network. This has important ramifications for how third parties are able to use personal images that are shared online. The consequences of a user granting a network a non-exclusive licence that is transferable and sub-licensable is that it allows the network to license the photograph to third parties for advertising and marketing purposes.22 There are a number of problems with the licencing clauses used by Facebook, Instagram and Twitter. From the perspective of the person sharing images, the licence term facilitates the potential misuse of those images. This use potentially results in users losing their ability to control the use of the content that they share online. This means that when a user shares images on Facebook and those images are reshared, they will not be able to prevent third parties or Facebook from reusing those images. This is the case even if a user terminates their Facebook account.

2.3 Collection of Images

The network’s contract terms examined also allow the network to collect images that people share. A network collects the images that are shared in two situations: the first is when a person uploads and shares their images on their profile page; the second is when third parties share and upload images of other people online. In each situation, the effect is the same: the contract allows the network to collect the images that are shared online. This is the case even when the access to the images is restricted.

2.3.1 Facebook

Facebook’s SRR briefly outlines the network’s terms of service for users. Facebook’s privacy clause states that their users’ privacy is important to them.23 It also provides a link to Facebook’s data policy, which authorises how the network collects, uses and shares personal images that

22 Mark J Davison, Ann L Monotti and Leanne Wiseman, Australian Intellectual Property Law, 2nd ed. (Cambridge University Press, 2012) 257. 23 See Facebook, Statement of Rights and Responsibilities (30 January 2015), which briefly outlines the network’s terms of service for users to accept; however, within these terms users are expected to have read Facebook’s DP, which is provided as a link to click on in clause 1 of the Statement of Rights and Responsibilities privacy policy.

41

are shared online. Facebook’s data policy explains how Facebook generally collects information (including personal images) when people share images and when third parties share images of other people. The contract allows Facebook to collect the ‘content and other information that users provide when they use their services’.24 The content collected by Facebook includes the information that a user has provided when signing up to the site, including their name, gender, email address, date of birth, photograph and/or phone number. This also includes subsequent information that the user has chosen to share, such as posting their status, status updates, the uploading of photos, sharing a story, likes, tag or comments on another user’s post or story.25 Essentially, Facebook will collect images that result from any interaction between the user and their networks and connections.26 Facebook also collects metadata when users post photographs or videos on their profiles, such as the date, time and place the photographs were taken. Facebook also collects information when users access the service on different devices such as computers, mobile

24 See Facebook, Data Policy 1. What Kinds of Information Do We Collect? (29 September 2016), . The new DUP states that ‘We collect the content and other information you provide when you use our Services, including when you sign up for an account, create or share, and message or communicate with others. This can include information in or about the content you provide, such as the location of a photo or the date a file was created. We also collect information about how you use our Services, such as the types of content you view or engage with or the frequency and duration of your activities.’; See Van Alsenoy et al., above n 12. 25 See Facebook, Information We Receive and How it is Used, Facebook Data Use Policy (29 September 2016), https://www.facebook.com/full_data_use_policy; see more recently the new Data Use Policy, Facebook, Data Policy 1. What Kinds of Information Do We Collect? (29 September 2016) ; see also Van Alsenoy et al., above n 12. 26 See Facebook, Data Policy 1. What Kinds of Information Do We Collect? Your Networks and Connections (29 September 2016) < https://www.facebook.com/full_data_use_policy> . Here, Facebook states: ‘We collect information about the people and groups you are connected to and how you interact with them, such as the people you communicate with the most or the groups you like to share with. We also collect contact information you provide if you upload, sync or import this information (such as an address book) from a device.’ See also Van Alsenoy et al., above n 166. Facebook also collects information that other people provide when they use the service. See Facebook, Data Policy 1. What Kinds of Information Do We Collect? Your Networks and Connections (29 September 2016) < https://www.facebook.com/full_data_use_policy> where the DP states: ‘Things others do and information they provide. We also collect content and information that other people provide when they use our Services, including information about you, such as when they share a photo of you, send a message to you, or upload, sync or import your contact information.’ In the previous DUP, Facebook provided more detail about the types of information it collected about users.

42

phones or tablets. When a user accesses their Facebook account, the network collects information that includes IP addresses, phone numbers, internet browser, pages that a user visits, operating systems, location and internet services. Facebook also collects information about its users from their affiliates and advertising partners, customers or third parties that help them to deliver advertisements and monitor their users’ online activities.27 In addition, Facebook collects information whenever users use the network or look at another person’s profile or timeline, use the graph search, like or search for a page, uses or clicks on pages within the network, clicks on people’s profiles or make purchases.28 The consequence is that Facebook collects a vast amount of information from and about users from various sources. This enables Facebook to target and suggest services and features. Facebook’s contract allows it to collect personal images and use those images for advertising and marketing purposes, which increases the network’s revenue. The collection term also allows the network to exploit people’s images because the images are kept indefinitely until the network has no further use for them. This means that Facebook can retain images that have been collected indefinitely, even if those images are deleted or when a contract ends. In addition, Facebook’s collection term allows the network to obtain more information than people voluntarily provide, including people’s usage patterns, such as when they visit pages or check- in’ to places.

27 See Facebook, Data Policy 1. What Kinds of Information Do We Collect? Your Networks and Connections (29 September 2016) < https://www.facebook.com/full_data_use_policy> . Generally, the whole section outlines the information that Facebook collects from the user, what other people say about the user, how the user interacts with their connections, and networks and in particular, information about the device the user is utilising to access the service. Further, Facebook also collects information from third party websites and apps that use their services (specifically when a user visits other websites). Compare with the old Data Use Policy, Information We Receive and How it is Used (29 September 2016) < https://www.facebook.com/full_data_use_policy> ; see Van Alsenoy et al., above n 12. 28 Facebook, Data Use Policy: Information We Receive and How it is Used (29 September 2016) < https://www.facebook.com/full_data_use_policy> .

43

2.3.2 Twitter

Twitter’s contract also allows the network to collect images when people use its service.29

Twitter’s contract governs the collection of personal images that are shared online.30 The contract provides that people consent to the collection of their images by their use of the Twitter service. This is different from Facebook because, from the outset, Twitter explains that users consent to the collection of their images by the service. Twitter’s contact outlines how the service will handle user’s personal images when they collect users’ information through various services such as various websites, SMS,31 APIs,32 email notifications, applications, buttons, widgets, ads and commerce services, and from partners and other third-party affiliates.33 Twitter’s contract states that the network is by default a public social network and designed to be shared with the world at large. As a result, the images that are collected by the network are publicly available. This means that photographs that users share, for example via tweets, following, lists and other public information, are essentially public. Twitter also collects any information that accompanies the images that are shared – for example, the metadata accompanying the Tweets, the time and location, along with users’ following lists and Twitter pages.34 While Twitter states that its service is by default a public network, users have the option

29 Clause 2 of Twitter’s terms of service agreement states that any information provided by users is subject to its privacy policy. Like Facebook, Twitter’s terms of use provide an external link to their ‘Privacy Policy’, which users are considered to have read and accepted at the time of subscribing. The clause effectively states that any information provided by users to Twitter is subject to their privacy policy; see Twitter’s Privacy clause 2, which states: ‘Any information that you or other users provide to Twitter is subject to our Privacy Policy, which governs our collection and use of your information. You understand that through your use of the Services you consent to the collection and use (as set forth in the Privacy Policy) of this information, including the transfer of this information to the United States, Ireland, and/or other countries for storage, processing and use by Twitter. As part of providing you the Services, we may need to provide you with certain communications, such as service announcements and administrative messages. These communications are considered part of the Services and your account, which you may not be able to opt-out from receiving.’ Twitter, Twitter Terms of Service (30 September 2016) < https://twitter.com/tos?lang=en#content> . 30 Ibid Clause 2, Privacy. 31 Short messaging service. 32 API means Application Programming Interface. 33 See Twitter, Twitter Privacy Policy (30 September 2016) . 34 Twitter, Twitter Privacy Policy, Information Collection and Use, Tweets, Following, Lists and Other Public Information (30 September 2016) < https://twitter.com/privacy> : ‘Most of the information you provide to us is information you are asking us to make public. This includes not only the messages you

44

to make their personal images private through the account settings. However, a person’s public information, such as public tweets, is searchable and transmitted through Twitter’s APIs to its third parties and services. As Twitter is a service that is public by default, people are aware that all information is public unless the user has selected otherwise in their privacy settings. The contract includes information that the user has shared, such as images, videos and links through

Twitter.35 The clause allows users the choice of revealing their location information in their account settings. These terms provide users with the choice of ‘opting in’, as opposed to Facebook’s ‘opting out’. A differentiating point with Twitter is that users have the options of retaining more control over their information. Twitter’s collection clause also allows the network to collect additional information that a user may provide on their Twitter page, such as their biographical details, location, website and photographs. Users can also provide mobile numbers for receiving SMS messages and to receive information from Twitter about services and marketing. A user’s privacy settings control how other users can contact them, whether it is by mobile phone number or email.36 Twitter states that any additional information provided in its ‘additional information’ clause is entirely optional.37 Twitter’s collection term also allows the network to collect images, which are shared for commercial purposes such as allowing third parties access to the images on the network.

2.3.3 Instagram

Instagram’s contract of service also allows the network to collect personal images.38 The network collects personal images that are shared online because the images that are shared are:

Subject to the Service’s Privacy Policy, available here http://instagram.com/ legal/privacy, including but not limited to sections 3 (‘Sharing of Your

Tweet and the metadata provided with Tweets, such as when you Tweeted, but also the lists you create, the people you follow, the Tweets you mark as favorites or Retweet and many other bits of information.’ 35 ‘For example, your public Tweets are searchable by many search engines and are immediately delivered via SMS and our APIs (http://dev.twitter.com/pages/api_faq) to a wide range of users and services. You should be careful about all information that will be made public by Twitter, not just your Tweets.’ See Twitter, Twitter Privacy Policy, Information Collection and Use, Tweets, Following, Lists and Other Public Information (30 September 2016) < https://twitter.com/privacy> 36 Ibid. 37 Ibid. 38 See Instagram, Privacy Policy (19 January 2013), .

45

Information’), 4 (‘How We Store Your Information’), and 5 (‘Your Choices About Your Information’). You can choose who can view your Content and

activities, including your photos, as described in the Privacy Policy.39

Like Facebook and Twitter, Instagram collects various types of information including information that people share, whether directly or by third parties. Instagram’s collection term also allows the network to collect images that have been shared, including additional information,40 whenever a person uses the service. For example, the network collects information about a person’s interactions on the service, such as when they use features to find friends, or by collecting log file41 information. In collecting people’s images, Instagram’s contract allows the network to use third-party analytics to gain further information about people’s use of the service. This means that the network collects more information about people than they provide. For example, Instagram collects information when people view images.42 Instagram also collects metadata about the user’s photograph, such as how, when and who collected the photo and how it was formatted.43 Interestingly, users can add metadata to their photographs by including a hashtag (marking key words when posting photographs) or geotags, which marks the location to the photograph posted. When Instagram collects metadata, the

39 Instagram, Terms of Use: Clause 1 Rights (19 January 2013), . 40 The types of information collected are the information that users provide to Instagram directly when subscribing to an Instagram account. This will include profile information such as profile pictures as well as user content such as photos, videos and comments that users post to the service. There are also communications between Instagram and the users in relation to service-related information, such as updates, verifications and/or technical or security notices. 41 Each time users log into their Instagram accounts, log file information is automatically reported by users’ browsers – including each time they visit a web page or app. Instagram also collects and records log file information, such as: ‘When you use our Service, our servers automatically record certain log file information, including your web request, Internet Protocol (“IP”) address, browser type, referring/exit pages and URLs, number of clicks and how you interact with links on the Service, domain names, landing pages, pages viewed, and other such information. We may also collect similar information from emails sent to our Users which then help us track which emails are opened and which links are clicked by recipients. The information allows for more accurate reporting and improvement of the Service.’ Instagram, Privacy Policy (19 January 2013)< http://instagram.com/legal/privacy>. 42 Instagram uses third-party analytic tools to collect information sent by users’ device to Instagram, such as web pages users visit, add-ons and other information that ‘assists’ in improving the service. 43 Ibid.

46

contract allows the network to use cookies and other technologies like pixels and web beacons to collect information about how users use Instagram. The contract allows the network to provide information to third parties such as advertisers and affiliates, to enable them to serve advertisements or services to users’ devices that also use cookies. These identifiers can transmit information to third parties about how users browse and use Instagram in order to send users advertisements or content. The effect of the collection clause in a network’s contract is that any time that people share or upload images online, the network will be able to collect those images. The network will be able to collect personal images that users share even if the images are subject to the network’s privacy settings. Social networks have different settings that relate to users’ privacy. The settings allow users to restrict access to their images; however, the user cannot restrict the network’s collection or access to those images. A network such as Facebook has various privacy settings that allow people to restrict access to their images, which has consequences for the network’s collection of images. Facebook provides four different settings for users to share their personal images. A Facebook user can choose from: ‘public’, ‘friends of friends’, ‘friends only,’ or ‘only me’. There are different consequences for each setting. For example, when a person selects a public setting, anyone who is on the network can access this information (along with third parties). This extends to third parties who are not on Facebook by doing an internet search for the person’s name. When a person chooses restricted settings such as ‘friends of friends’, the setting allows third parties to access the users’ images. This contrasts to situations where a person selects ‘friends only’ or ‘only me’. When a user has highly restricted settings such as only allowing their friends to access their personal images, it may still result in third parties collecting the image. This is because when a person chooses ‘friends only’ to share their images, the shared images will be subject to the respective friends’ privacy settings. This often results in restricted images being accessed and used by third parties. Twitter’s privacy settings are more limited than Facebook’s, as there are only two privacy settings: private or public. From the outset, Twitter states that some of the information the people provide, such as name and username, and profile page, is publicly available on the network.44 Twitter users have two options to select: public or protected. The protected option

44 See Twitter, Twitter Privacy Policy, Information Collection and Use, Tweets, Following, Lists and Other Public Information (30 September 2016)< https://twitter.com/privacy>. This clause states: ‘When you create or reconfigure a Twitter account, you provide some personal information, such as your name,

47

restricts access to the user’s followers. This means that the user’s tweets are ‘protected’ and cannot be searched, retweeted or quoted.45 Despite the settings, the privacy policy still enables Twitter’s third parties and affiliates to access people’s images. Instagram has similar privacy settings to Twitter: people can only choose public or private settings. However, all images will still be searchable or visible if other people have reshared them.46 Even though Facebook provides different levels of privacy settings, the network can collect the images despite the restrictions. Essentially, when people restrict access to their images, the collection term still allows Facebook and its affiliates and advertisers to use restricted images.47

2.4 Use of Images

The three network‘s contracts that were examined all contain terms that stipulate how the networks are able to use upload images. These include sharing the images with their affiliates for advertising and marketing purposes, and allowing third parties to use images that are shared online.

2.4.1 Facebook

Facebook’s Data Policy allows the network to use ‘all of the information’ it has to help it ‘provide and support’ its services. In particular, the policy allows Facebook to use personal images in the following ways:

 to provide, improve and develop services48

username, password, and email address. Some of this information, for example, your name and username, is listed publicly on our Services, including on your profile page and in search results. Some Services, such as search, public user profiles and viewing lists, do not require registration.’ 45 See Twitter, Help Center: About Public and Private Tweets (2016), . 46 See Twitter, Twitter Terms of Service (30 September 2016), https://twitter.com/tos?lang=en, where Clause 10: Ending These Terms states that ‘in all such cases, the Terms shall terminate, including, without limitation, your license to use the Services, except that the following sections shall continue to apply: 4, 5, 7, 8, 10, 11, and 12’. 47 This is discussed in detail in the Facebook’s Data Policy. 48 This part of the Data Policy states that Facebook is ‘able to deliver our Services, personalise content, and make suggestions for you by using this information to understand how you use and interact with our Services and the people or things you’re connected to and interested in on and off our Services. We also use information we have to provide shortcuts and suggestions to you. For example, we are able to suggest that your friend tag you in a picture by comparing your friend’s pictures to information we’ve put together from your profile pictures and the other photos in which you’ve been tagged. If this feature is enabled for

48

 to communicate with you49

 to show and measure ads and services.50 Facebook obtains a vast amount of information about users from various sources. This enables it to target and suggest services and features to users. In its Data Policy, Facebook states that that it uses the information it collects about users to ‘provide, improve and develop services’. In particular, the Data Policy states:

We are able to deliver our Services, personalize content, and make suggestions for you by using this information to understand how you use and interact with our Services and the people or things you’re connected to and interested in on and off our Services. We also use information we have to provide shortcuts and suggestions to you. For example, we are able to suggest that your friend tag you in a picture by comparing your friend's pictures to information we've put together from your profile pictures and the other photos in which you've been tagged. If this feature is enabled for you, you can control whether we suggest

that another user tag you in a photo using the ‘Timeline and Tagging’ settings.51

you, you can control whether we suggest that another user tag you in a photo using the “Timeline and Tagging” settings. When we have location information, we use it to tailor our Services for you and others, like helping you to check-in and find local events or offers in your area or tell your friends that you are nearby. We conduct surveys and research, test features in development, and analyse the information we have to evaluate and improve products and services, develop new products or features, and conduct audits and troubleshooting activities.’ See Facebook, Data Policy (29 September 2016) < https://www.facebook.com/about/privacy/> ; see Van Alsenoy et al, above n 12. 49 In this clause, Facebook can use people’s information to ‘send you marketing communications, communicate with you about our Services and let you know about our policies and terms. We also use your information to respond to you when you contact us.’ Available at Facebook, Data Policy (29 September 2016)< https://www.facebook.com/about/privacy> ; see Van Alsenoy et al, above n 166. 50 See Facebook, Data Policy (29 September 2016), https://www.facebook.com/about/privacy/II, ‘How we use the information we collect’: ‘We use the information we have to improve our advertising and measurement systems so we can show you relevant ads on and off our Services and measure the effectiveness and reach of ads and services. Learn more about advertising on our Services and how you can control how information about you is used to personalize the ads you see.’ See Van Alsenoy et al, above n 12. 51 Emphasis added: see Facebook, Data Policy (29 September 2016) . Compare this with Facebook’s old policy, which stated that: ‘We also put together data from the information we already have about you, your friends, and others,

49

Facebook’s Data Use Policy states that Facebook can use the information that it receives about users through the features and services that the user and their friends use. It also provides that Facebook can also use information received through its partners, advertisers and developers that build applications on Facebook and the websites that users use. People’s images are prone to misuse by the network’s contract because it actively encourages their users and their friends to ‘tag’ them in pictures that the user’s friend has shared with the user in it.52 Facebook’s data use policy explicitly states that it may use the information that it receives about its users by

‘suggesting that your friend tag you in a picture that have uploaded with you in it’.53 In effect, the user not only gives Facebook a licence to use their images and videos; they also give the network a licence to use their information. Facebook acknowledges this in its data use policy under ‘I Information we receive and how it is used’.

2.4.2 Twitter

Twitter’s ‘use’ term allows the network to use personal images in various ways – for example, to tailor content to people. This is usually done when people share images, by tailoring and customising content, including ads.54 Twitter also collects information when people share their location, and uses information including log data to ‘improve’ the service. Twitter’s contract also provides the various ways that the network will collect and use any images that are shared,

so we can offer and suggest a variety of services and features. For example, we may make friend suggestions, pick stories for your News Feed, or suggest people to tag in photos. We may put together your current city with GPS and other location information we have about you to, for example, tell you and your friends about people or events nearby, or offer deals to you in which you might be interested. We may also put together data about you to serve you ads or other content that might be more relevant to you. When we get your GPS location, we put it together with other location information we have about you (like your current city). But we only keep it until it is no longer useful to provide you services, like keeping your last GPS coordinates to send you relevant notifications. We only provide data to our advertising partners or customers after we have removed your name and any other personally identifying information from it, or have combined it with other people’s data in a way that it no longer personally identifies you.’ See Facebook, Data Use Policy: Information We Receive and How it is Used (29 September 2016)< https://www.facebook.com/full_data_use_policy>. See Van Alsenoy et al, above n 12. 52 Facebook has a ‘tagging’ feature that enables users to ‘tag’ other users in photographs that are uploaded and shared. Facebook, Data Policy (29 September 2016), https://www.facebook.com/full_data_use_policy#howweuse. 53 Ibid. 54 See Twitter, Twitter Privacy Policy, Information Collection and Use, Tweets, Following, Lists and Other Public Information (30 September 2016), https://twitter.com/privacy.

50

such as widget data, log data, location information, third-party affiliates, links and cookies.55 Twitter members are given more control over how the network monitors their usage. For example, people have the option of opting out by using a ‘do not track’ browser so that the network’s third parties do not have access to how users interact on the service.

2.4.3 Instagram

Instagram’s contract of service allows the network to use personal images in a similar way to Facebook and Twitter. For example, Instagram’s contract allows the network to use personal images to improve its service by using those images for marketing and advertising purposes.

What is the Effect of the Use Clause for the Use of Personal Images?

Social networks can use the images that are uploaded and shared on the network by sharing and disclosing the images to third parties. A network’s privacy/data policy enables a network to share and disclose personal images that are collected on the network. For example, when people share personal images on a profile page, the network is able to share and disclose those images to third parties. The use clause is essential to a contract because it allows the network to share users’ images with third parties. Third parties play a crucial role in Facebook, Twitter and Instagram’s contractual terms because the networks share users’ images with their third parties and affiliates for advertising and marketing purposes. For example, Twitter, Instagram and Facebook all use personal images for commercial purposes, such as when they allow a commercial entity to use personal images that have been shared online for advertising or marketing purposes.56 Essentially, the social network enables third-party advertisers to access its users’ pages to endorse their products through their ‘Sponsored Stories’ feature. This highlights the misuse of personal images that may occur when a network’s third party affiliates use personal images that have been shared.

2.5 Sharing and Disclosing

The social network contracts examined all contained clauses that enabled the social networks to share and disclose the images that users uploaded on their profile pages. When people join a

55 Ibid. 56 Angel Fraley et al v Facebook Inc CA No 511-01726. Facebook allowed developer applications access to people’s images in the sponsored stories feature. Facebook was sued for misusing its users’ profile pictures, information and likenesses because the network allowed users’ information to be exploited by advertisers to market their product.

51

social network, they agree that the social network can share and disclose a user’s personal images. The following section discusses the ways in which a network’s contract allows the network to use personal images when the images are shared online by sharing them with third parties and advertisers.

2.5.1 Facebook

In Facebook’s contract, the sharing/disclosure term allows the network to share the information (including personal images) the network collects with various third parties. The sharing and disclosure term provides that users can:

share and communicate with people they choose. For example, Facebook allows users to choose the audience who can access/see what users share. Users can select the audience when they share personal images, for example, they can select a custom group of individuals, all of their friends or a member of a group

(if the user belongs to any).57 In the event that a user has a public profile then any information that is shared with a public audience will be ‘Public

information’.58 This will include any information in a user’s public profile or

content that is shared on Facebook pages or other public forums.59 Generally

57 Facebook, Data Policy: 2. How is This Information Shared? People You Share and Communicate With (29 September 2016)< https://www.facebook.com/full_data_use_policy#howweuse>. This clause states that ‘when you share and communicate using our services, you choose the audience who can see what you share. For example, when you post on Facebook, you select the audience for the post, such as a customized group of individuals, all of your friends, or members of a group. Likewise, when you use messenger, you also choose the people you send photos to or message.’ See Van Alsenoy et al, above n 12. 58 Facebook, Data Policy: 2. How is This Information Shared? People You Share and Communicate With (29 September 2016) < https://www.facebook.com/full_data_use_policy#howweuse>. This clause states that ‘public information is any information you share with a public audience, as well as information in your public profile, or content you share on a Facebook page or another public forum. Public information is available to anyone on or off our services and can be seen or accessed through online search engines, APIs, and offline media, such as on TV.’ See Van Alsenoy et al, above n 12. 59 Facebook, Data Policy: 2. How is This Information Shared? People You Share and Communicate With (29 September 2016)< https://www.facebook.com/full_data_use_policy#howweuse>. This clause states that ‘Public information is any information you share with a public audience, as well as information in your public profile, or content you share on a Facebook page or another public forum. Public information

52

public information (which includes personal images) are available to any person on or off the Facebook service and can be accessed by any person is any information you share with a public audience, as well as information in your Public Profile, or content you share on a Facebook Page or another public

forum.60 Public information is available to anyone on or off our Services and can be seen or accessed through online search engines, APIs, and offline media, such

as on TV.61

When members share and communicate with other people in their network, other users can download and reshare the content, whether or not the users are logged on to Facebook.62 Facebook also allows other people who use their service to share images and information about users with their connections. This is the case, for example, when a person shares a photograph of another person, mentions or tags another person at a location in a post, or shares information about a person that has been shared with them.63Facebook encourages users and their friends to

is available to anyone on or off our services and can be seen or accessed through online search engines, APIs, and offline media, such as on TV.’ See Van Alsenoy et al, above n 12. 60 Facebook, Data Policy: 2. How is This Information Shared? People you Share and Communicate With (29 September 2016) < https://www.facebook.com/full_data_use_policy#howweuse>. This clause states that ‘Public information is any information you share with a public audience, as well as information in your public profile, or content you share on a Facebook page or another public forum. Public information is available to anyone on or off our services and can be seen or accessed through online search engines, APIs, and offline media, such as on TV.’ See Van Alsenoy et al, above n 12. 61 Facebook, Data Policy: 2. How is This Information Shared? People you Share and Communicate With (29 September 2016) < https://www.facebook.com/full_data_use_policy#howweuse > . This clause states that ‘Public information is any information you share with a public audience, as well as information in your public profile, or content you share on a Facebook page or another public forum. Public information is available to anyone on or off our services and can be seen or accessed through online search engines, apis, and offline media, such as on tv.’; see Van Alsenoy et al, above n 12. 62 Facebook, Data Policy: 2. How is This Information Shared? People you Share and Communicate With (29 September 2016) < https://www.facebook.com/full_data_use_policy#how >. We use this clause states that ‘Public information is any information you share with a public audience, as well as information in your public profile, or content you share on a Facebook page or another public forum. Public information is available to anyone on or off our services and can be seen or accessed through online search engines, apis, and offline media, such as on tv.’ See Van Alsenoy et al, above n 12. 63 Facebook, Data Policy: 2. How is This Information Shared? People You Share and Communicate With (29 September 2016)< https://www.facebook.com/full_data_use_policy#howweuse>. This states: ‘Other people may use our Services to share content about you with the audience they choose. For example,

53

share photographs and information about each other in various ways. One way that Facebook allows images to be shared and disclosed is via its ‘Tag’ feature. Tagging is a special type of link to a user’s timeline. Facebook’s ‘Tag’ feature is part of the Photos application, where users may ‘tag’ other users (friends) in a photograph.64 Facebook’s contract states that a tag ‘suggests that the tagged person add your story to their timeline. In cases where the tagged person isn’t included in the audience of the story, it will add them so they can see it. Anyone can tag another person in online images. Once a person is tagged in an image they are ‘visible’ (such as in News

Feed or in search).’65 For example, a user may upload photographs containing several friends and tag their friends within that photograph.66 Once a user is tagged, a notification goes to the user that they have been tagged, and provides a link to the photograph in which they are tagged.67 When users tag people in photographs, their images are disclosed to everyone who has access to those images. Facebook’s facial recognition technology uses facial recognition to identify people in photographs on its website.68 It also restricts the user’s control over how their image will be used and shared because the tagging itself does not restrict the image of the user from being re-shared or exchanged; it simply means that they can remove the ‘tag’. It does not provide any control over the image being shared, exchanged and tagged. Facebook’s contract also allows the network to share and disclose an image when the use of the image is for commercial purposes. The clause states:

We want our advertising to be as relevant and interesting as the other information you find on our Services. With this in mind, we use all of the

people may share a photo of you, mention or tag you at a location in a post, or share information about you that you shared with them.’; see Van Alsenoy et al, above n 12. 64 Wikipedia, List of Facebook Features (7 October 2016), 65 Facebook, Data Policy (29 September 2016) ; see Van Alsenoy et al, above n 12. 66 Wikipedia, List of Facebook Features (7 October 2016) 67 Ibid. 68 See further Geoffrey A Flower and Christopher Lawton, ‘Facebook in the Spotlight Again’, The Wall Street Journal (8 June 2011)

54

information we have about you to show you relevant ads. We do not share information that personally identifies you (personally identifiable information is information like name or email address that can by itself be used to contact you or identifies who you are) with advertising, measurement or analytics partners unless you give us permission. We may provide these partners with information about the reach and effectiveness of their advertising without providing information that personally identifies you, or if we have aggregated the information so that it does not personally identify you. For example, we may tell an advertiser how its ads performed, or how many people viewed their ads or installed an app after seeing an ad, or provide non-personally identifying demographic information (such as 25 year old female, in Madrid, who likes software engineering) to these partners to help them understand their audience or customers, but only after the advertiser has agreed to abide by our advertiser

guidelines.69

Facebook’s contract also allows advertisers and third parties to access and use images that are shared on social network. Clause 9 of Facebook’s contract provides that the network is able to use and disclose personal images to third parties for commercial purposes.70 Consequently, the sharing and disclosure term allows Facebook to exploit personal images that are shared online. In particular, Facebook’s contract allows the network to use images uploaded on the network by sharing users’ images with Facebook’s third party affiliates for advertising, other commercial content and sponsored content.71 As was noted above, clause 9 of the Facebook

69 (Emphasis added) See Facebook, Data Policy (29 September 2016) ; see Van Alsenoy et al, above n 12. 70 See Facebook, Facebook Clause 9.1 Facebook Statement of Rights and Responsibilities Advertising (30 January 2015) < https://www.facebook.com/legal/terms> which states: ‘You give us permission to use your name, profile picture, content, and information in connection with commercial, sponsored or related content (such as a brand you like) served or enhanced by us. This means, for example, that you permit a business entity to pay us to display your name and/or profile picture with your content or information, without any compensation to you. If you have selected a specific audience for your content or information, we will respect your choice when we use it.’; see Van Alsenoy et al, above n 166. 71 Facebook, Facebook Clause 9 Facebook Statement of Rights and Responsibilities Advertising (30 January 2015)< https://www.facebook.com/legal/terms> ; see Van Alsenoy et al, above n 12.

55

contract allows the network to share personal images with advertisers to sell and market their products for payment, without any compensation to the user whose image is being used.

2.5.2 Twitter

Twitter’s sharing and disclosure clauses state that the network may share or disclose personal images at their user’s ‘direction’,72 for example, when a person authorises third-party applications to access their account.73 As with Facebook, other people can disclose and share images of a user. This will occur when a third party mentions, ‘tags’ or shares images of a person.74 In terms of sharing users’ personal images, Twitter’s contract states that they may share a user’s personal image with third parties and affiliated service providers; this however, is subject to confidentiality obligations under Twitter’s privacy policy, and is conditional on the third parties using users’ personal data on Twitter’s behalf.75 A specific clause states that Twitter can share and disclose users’ non-private and non-personal data, such as public user profile information, tweets, following lists and followers.76

2.5.3 Instagram

Instagram’s contract of service explicitly states that it will not ‘rent or sell’ users’ images to third parties outside of Instagram or affiliates without users’ consent, except ‘as noted’ in their policy.77 This is very different to both Facebook and Twitter’s policy of using people’s information because unlike Instagram, Facebook and Twitter’s contracts do not have any provisions about selling or renting users’ images. In contrast, Instagram states that it will not ‘rent or sell’ users’ information, which contradicts its Terms of Use Policy Rights clause 1: ‘Instagram does not claim ownership or any content that users post through the service.’ This is also contradicted in Instagram’s privacy policy clause, which outlines what happens in the event of change of control of the Instagram company. Facebook’s contract of service enables

72 The use of the word ‘consent’ means that the user must agree to the terms. 73 Twitter, Privacy Policy, Information Sharing and Disclosure (30 September 2016), 74 Ibid, Twitter’s privacy settings will control whether a person can be tagged on the service or not. 75 Ibid, Twitter’s terms of service, privacy policy. 76 Ibid, Followers and following lists are the people to whom the user is connected and/or chooses to follow. 77 See Instagram, Clause 3. Sharing of Your Information (19 January 2013), http://instagram.com/legal/privacy, which states: ‘We will not rent or sell your information to third parties outside Instagram (or the group of companies of which Instagram is a part) without your consent, except as noted in this Policy.’

56

the network to assign its rights and obligations in connection with ‘a merger, acquisition, or sale of assets, or by operation of law or otherwise’,78 which is similar to Instagram’s terms of use. Clause 18 of the Instagram contract explicitly states that if Instagram sells or transfers part or whole of Instagram or its assets to another entity, ‘users’ information such as name, email address, users’ content and any other information collected through the service may be among the items sold or transferred’.79 However, users ‘will continue to own their user content’.80 This means that people will be able to use the content; however, their information may be sold or transferred if Instagram is sold. Instagram has a similar ‘use’ clause to Facebook and Twitter. Clause 2 of the Instagram contracts states that parts of the Instagram service are supported by

advertising revenue and may display advertisements or promotions and users hereby agree that Instagram may place such advertising and promotions on the Service or on, about or in conjunction with your content. The manner, mode and extent of such advertising and promotions are subject to change without specific notice to users.81

Effect of the sharing and disclosure on personal images

Consequently, the effect of the sharing and disclosure term is that it allows networks to facilitate the use and misuse of personal images. This occurs in a number of different ways. The first is that the network may use images of third parties who are not members of the network, for example when a member uploads and shares an image of a third party who is not a member of the social network. When this occurs, the image that is captured and shared by the user may be subsequently used by the network without the permission of the person’s photographed. The second is that third parties can use personal images that are uploaded for advertising and

78 Facebook, Clause 18.7 (30 January 2015)< https://www.facebook.com/legal/terms/update>; see Van Alsenoy et al, above n 12. 79 See further Instagram, Clause 3. Sharing of Your Information (19 January 2013), ; see also Instagram, Terms of Use (19 January 2013) ; see Van Alsenoy et al, above n 166. 80 See further Instagram, Clause 3. Sharing of Your Information (19 January 2013), http://instagram.com/legal/privacy; Facebook, Terms of Use (19 January 2013), https://www.facebook.com/help/instagram/478745558852511; the content term is discussed in the licensing clause; see Van Alsenoy et al, above n 12. 81 See Instagram, Terms of Use (19 January 2013)< http://instagram.com/legal/terms>

57

marketing purposes. This occurs when the network feature third-party applications that users may utilise to enhance the use of the service,82 For example, the contract terms of the networks allow third parties, websites and affiliates to receive personal images that people post or share on the network.83 This allows the network to share users’ images with third parties and customers. The third is that people’s images are commercially exploited because this allows the network to give advertisers the use of people’s photographs to sell and market their product for payment, without any compensation to the user whose image is being used. The effect of this is that a network can use personal images without having to compensate people for the use of those images.

2.6 Termination

All of the social network contracts reviewed had standard termination terms. Generally, the termination clauses specify what will happen to a user’s images in the event that the user terminates their account. These provide that when the contract ends, certain clauses such as the licence clause will still operate. For example, Facebook’s terms of use states that the content, special provisions, and a clause termed as ‘other’ (which provides for miscellaneous clauses relating to the enforceability of the contract), advertising and dispute clauses still operate even if a user deletes or deactivates their Facebook account.84 This is also the case for Twitter, where when a user terminates their account, the content and ‘Your Rights’ clauses will still operate.

82 For example, this occurs when third party applications require more permissions and access to user’s information. 83 See Facebook, Data Policy: 2. How is This Information Shared? People you Share and Communicate With (29 September 2016)< https://www.facebook.com/full_data_use_policy#howweuse> . This clause states: ‘When you use third-party apps, websites or other services that use, or are integrated with, our Services, they may receive information about what you post or share. For example, when you play a game with your Facebook friends or use the Facebook Comment or Share button on a website, the game developer or website may get information about your activities in the game or receive a comment or link that you share from their website on Facebook. In addition, when you download or use such third-party services, they can access your Public Profile, which includes your username or user ID, your age range and country/language, your list of friends, as well as any information that you share with them. Information collected by these apps, websites or integrated services is subject to their own terms and policies.’; see Van Alsenoy et al, above n 12. 84 Facebook, Statement of Rights and Responsibilities: Clause 14; Terms of Use Clauses 2.2, 2.4, 3–5, 9.3, 14–18 (30 January 2015) < https://www.facebook.com/legal/terms> ; see Van Alsenoy et al, above n 12.

58

The termination clause used by the social network reinforces the rights given to the network when users license their personal images to the network. Generally, the termination of a social network contract would result in the termination of the copyright licence; however, as highlighted above, this is not the case with Facebook, Instagram and Twitter contracts. From a user’s standpoint, this creates a problem in that it means a user is unable to prevent the misuse of their images once the images are shared online. It also means that even if a user terminates a social network contract, the licensing clause still operates so as to allow third party use of personal images – for example, to allow other people to reshare a person’s images online.

2.7 Conclusion

Contracts are critical to the scope and operation of social networking services. These allow the social networks to use the personal images that users upload to the sites. Social network contracts also allow networks to collect personal images and to share them with third parties. One of the most important clauses in a social network contract is the licensing clause, which allows social networks to use images. When users give a licence to a social network, they give the network control over the images that they share online. This also allows the network to reuse those images for purposes other than those provided for in the licensing clause. The control that social networks have over the images uploaded by members is reinforced by the contractual clauses that deal with the collection, use and sharing of images. These clauses allow the network to control the use of images that are shared on the network. The termination terms found in the social network contracts also strengthen the control that networks are able to exert over images that are shared online. This is because the termination clause allows the network to use personal images (along with their other content) after the contract ends. As we will see, the contractual provisions undermine the ability of legal scheme (or sphere?) such as copyright to assist in preventing against the misuse of images online.

59

Chapter 3

Copyright, personal images on social networks

3.1 Introduction

Over the last two decades or so, various web technologies and platforms– such as blogs, wikis, user-created sites, self-publishing sites, social bookmarking sites, content-sharing and social networking sites – have helped to create an environment in which personal images are routinely uploaded, shared and reused on the internet. The participative culture sparked by Web 2.0 in the late 1990s created a situation in which amateur creations began to populate the web on an unprecedented scale.1 The widespread online distribution, sharing, reuse and exchange of personal photographs created a number of problems for creators (and owners) of photographs, as well as for the people whose images are captured in those photographs. The aim of this chapter is to look at the potential role that copyright law might play in minimising or preventing this abuse. It also evaluates whether this protection is adequate. When thinking about the role that copyright might play in preventing the misuse of personal images on social networks, it is important to distinguish between different interests. The first relates to the interests of people whose images are captured in those photographs; namely, the subjects in the photographs. Unlike the situation in some other countries, the subject of a photograph has no rights under copyright law in Australia.2 The second relates to the interests of the person who creates a photograph (or the person who subsequently obtains rights in those creations). This form of creation is typically protected by copyright law and is discussed in detail in this chapter. There is little doubt that the type of photographs at issue here are protected by copyright law in Australia. It is clear, for example, that photographs are copyright subject matter:

1 See generally Daniel Gervais, ‘The Tangled Web of UGC: Making Copyright Sense of User Generated Content’ (2009) 11(4) Vanderbilt Journal of Entertainment and Technology Law 841, 843. 2 Subjects in other countries for example, in the United States, any image rights or rights to publicity tend to protect celebrities and other famous people from use of their image. See Pollard v Photographic Company [1888] Chancery Division (North J Vol KL) where a photographer was restrained from selling or exhibiting any copies of the plaintiff’s image; see also Mansell v Valley Printing Company [1908] 1 Ch 567; ‘Marion Manola v Stevens & Myers NY Supreme Court’, New York Times (15, 18, 21 June 1890).

60

photographs expressly fall under the definition of ‘artistic works’ as defined in section 10 of the Copyright Act 1968 (Cth).3 Photographs also satisfy the requirement that to be protected by copyright, they must be recorded in a material form,4 that is they must be reduced in ‘writing or some other material form’.5 The requirement that to be protected a photograph must have a sufficient connection to Australia will also be easily satisfied. This is because connection with Australia is satisfied either when the person who took the photograph is Australian or the photograph was taken in Australia.6 Thus, when an Australian citizen subscribes to a social network and shares their photographs on their personal profile page, they satisfy the requirement of connection to Australia. There is also little doubt that photographs will satisfy the requirement of originality in Australia.7 This is because the requirement for protection in Australia is very low, originality

3 Hereinafter referred to as the Copyright Act. See Copyright Act (Cth) 1968 ss 89, 90,91, and 92. Section 10 (1) (a) defines a photograph as including a digital photograph, xerography or processes similar to photography such as survey plans. Photographs were protected under the Fine Arts Copyright Act 1862; see Lionel Bently, ‘Art and the Making of Modern Copyright Law’ in Daniel McClean and Karsten Schubert (eds), Dear Images. Art, Copyright and Culture (Ridinghouse, 2002) 331; Mark J Davison, Ann L Monotti and Leanne Wiseman, Australian Intellectual Property Law (Cambridge University Press, 3rd ed, 2016) 223. 4 Copyright Act 1968 (Cth) s 22(1); see Davison, Monotti and Wiseman, above n 3, 228. 5 As photographs are reduced to a material form when they are in physical or digital form, digital photographs will satisfy the requirement of material form, as they are reduced in digital form: Copyright Act 1968 (Cth) s 22(1). 6 Copyright Act 1968 (Cth) ss 32(4); see also, s 10. 7 The final threshold criteria for copyright protection of photographs is that the photograph must be original: Copyright Act 1968 (Cth) s 32(1). Originality in copyright law is a key issue that has been subject to much discussion in recent times. See Sam Ricketson, Megan Richardson and Mark Davison, Intellectual Property, Cases, Materials and Commentary (LexisNexis, 4th ed, 2009) 166-7. The meaning of ‘original’ was clarified by the 2009 High Court decision of IceTV v Nine Network Australia (2009) 239 CLR 458 where the High Court stated that authorship plays a central role when considering the requirement of originality in copyright law. The view that ‘authorship’ and ‘original work’ are correlatives was illustrated in IceTV v Nine Network Australia (2009) 239 CLR 458, 473 [34] (French CJ, Crennan and Kiefel JJ). Subsequently the decision of Telstra Corporation limited v Phone Directories Company Pty Ltd (2010) 273 ALR 725 also considered the requirement of originality. See Alistair Abbott and Kevin Garnett, ‘Who is the Author of a Photograph?’ (1988) 20(6) European Intellectual Property Review 204; Simon Stokes, ‘Graves’ Case and Copyright in Photographs - Bridgeman v Corel’ in Daniel McClean and Karsten Schubert (eds), Dear Images: Art, Copyright and Culture (Ridinghouse, 2002) 109; Melville B Nimmer, Nimmer on Copyright (Matthew Bender, 1965), para 2.130 states that any or ‘almost any photograph may claim the necessary originality to support a copyright merely by virtue of the photographers personal choice of subject matter, angle of the photograph, lighting and determination of

61

will be satisfied by little more than the opportunistic pointing of a camera and the pressing of the shutter button.8 As a result, the most elementary forms of a photograph, such as snapshots, will meet the threshold of originality.9 Photographs that capture the same subject matter will qualify for copyright protection. Thus when two people capture the same image of a family on vacation, each photograph is considered to be original and protected under copyright.10 As each person has expended labour, skill and originality in determining when to press the button on their camera to capture that particular scene, the work will be protected.11 As long as the author

the precise time when the photograph is to be taken’. See Kathy Bowrey, Michael Handler and Dianne Nicol, Australian Intellectual Property: Commentary, Law and Practice (Oxford University Press, 2010) 59–60. 8 Nicholas Caddick, Gillian Davies and Gwilym Harbottle, Copinger and Skone James on Copyright (Sweet & Maxwell, 14th ed, 1999) para 3.104; Bowrey, Handler and Nicol, above n 7, 59. 9 See Feist Publications Inc v Rural Telephone Service Co (1991) 499 US 340 [10]. In Burrow-Giles Lithography Company v Sarony 111 US 53 (1884), the court emphasised the notion of author- photographer that was previously developed in Nottage v Jackson 11 QBD 627 (1883). The court, at 55 and 61, considered the question of human labour, specifically whether the efforts were deemed worthy of copyright protection and not merely ‘mechanical reproduction’. Having regard to the specific portrait of Oscar Wilde, the court focused on labour noting: ‘In regard to the photograph in question … it is a useful, new, harmonious, characteristic and graceful picture, and that plaintiff made the same … entirely from his own original mental conception, to which he gave visible form by posting the said Oscar Wilde in front of the camera, selecting and arranging the costume, draperies, and other various accessories in said photograph, arranging the subject so as to present graceful outlines, arranging and disposing the light and shade suggesting and evoking the desired expression and from such disposition arrangement or representation, made entirely by plaintiff he produced the picture in the suit.’ See Robert E Mensel, ‘Kodakers Lying in Wait: Amateur Photography and the Right to Privacy in New York 1885–1915’ (1991) 43 (1) American Quarterly 24. 10 See generally, Jane C Ginsburg, ‘No “Sweat”? Copyright and Other Protection of Works of Information After Feist v Rural Telephone’ (1002) 92(2) Columbia Law Review 338, 343-8. The originality requirement with respect to photographs is not stringent in Australia because originality according to the High Court is that the person who authors (captures) the photograph must have exercised some control over it and not have copied it from another work: Telstra Corporation Limited v Phone Directories Company (2010) 273 ALR 725. 11 Scholars have noted there is no distinction between photographs that are the result of pressing a button and other photographs that may be copies of other artworks or photographs. See Caddick, Davies and Harbottle, above n 8, para 3, ‘no reason of principle why there should be any distinction between the photograph which is the result of such a process and a photograph which is intended to reproduce a work of art such as another painting or another photograph’. Compare with Nimmer, who identifies two situations where questions of originality may arise. The first issue arises ‘where a photograph or other

62

can show that they have expended some degree of time, skill and labour in the capturing the photograph, the resulting photograph will be entitled to copyright protection.12 While there may be little doubt that photographs will be protected by copyright in Australia, there are still a number of hurdles that need to be addressed before copyright can be used to protect personal images. The first relates to the question of ownership: a matter which will play a role in determining how effective copyright law is in protecting a personal image that is uploaded online. The second relates to whether the unauthorised use constitutes an infringement of the owner’s rights in the photograph. These are examined below.

printed matter is made that amounts to nothing more than slavish copying. If no originality can be claimed in making the additional print from a photographic negative, there should be no finding of a greater originality where the same effect is achieved by photographing a print rather than printing a negative. In neither their case is a distinguishable variation reproduced … The other situation in which copyright may be denied to a photograph of lack of originality arises where the photographer in choosing a subject matter, camera angle, lighting, et cetera copies and attempts to duplicate all of such elements as contained in a prior photograph. Here the second photographer has been photographing a live subject rather than the first photograph; but in so far as the original elements contained in first photograph are concerned there is no meaningful distinction.’ See Melville B Nimmer, above n 7, para 2.130. See also Bowrey, Handler and Nicol, above n 7, 60. 12 See Caddick, Davies, Harbottle above n 8, para 3.104 who state that as long as the author has ‘expended some small degree of time, skill and labour in producing the photograph (which may be demonstrated in by the exercise of judgment as to such matters as the angle from which to take the photograph, the lighting, the correct film speed, what filter to use, et cetera) the photograph ought to be entitled to copyright protection, irrespective of its subject matter’. See generally Bowrey, Handler and Nicol, above n 7, 59; see also Laddie, Prescott and Vitoria, Modern Law of Copyright and Designs (Lexis Nexis, 2nd ed, 1995) who also stated at para 3.104 that originality ‘presupposes the exercise of substantial independence, skill, labour, judgment and so forth. For this reason, it is submitted that a person makes a photograph merely by placing a drawing or painting on the glass of a photocopying machine and pressing the button gets no copyright at all … It will be evident that in photography there is room for originality in three respects. First there may be originality which does not depend on creation of the scene or object to be photographed or anything remarkable about its capture, and which resides in such specialties as angle of shot, light and shade, exposure, effects achieved by means of filters, developing techniques … Secondly there may be creation of the scene or subject to be photographed … Thirdly a person may create a worthwhile photograph by being at the right place at the right time.’

63

3.2 Ownership

One factor that will influence a person’s ability to use copyright to protect against the misuse of their image captured in a photograph and uploaded online depends on who owns copyright in the photograph. While copyright will provide some protection where the owner and subject are the same person, the protection will be more tenuous in situations where the owner and subject are different people. Where the subject and owner are the same person the situation is straightforward. However, where copyright in a photograph is owned by someone other than the subject of the photograph, protection of the subject will depend on the goodwill of the copyright owner to bring an action on the subject’s behalf. Consequently, when personal images are misused on a social network, the effectiveness of copyright will depend on who owns copyright in the image.

3.2.1 Authorship In thinking about who owns copyright in a photograph, a key principle of copyright law is that, with the exception of employees and commissioned works, the author is the first owner of rights in the image. In most cases, determining authorship is relatively straightforward; the person who takes the photograph will be the author and thus the owner of the resulting work. While in most situations authorship will present few problems, there are some situations, however, where problems will arise in determining who is the author of a work.13 One situation where questions of authorship arise is where a person who owns a camera asks another person to take a photograph on their behalf: here the question arises as to whether ownership of the equipment gives them some rights over the resulting photograph. Another situation where problems arise is where a person directs, organises and orchestrates a scene but does not push the button; here the question arises as to whether the organiser can claim authorship of the resulting photograph. Questions also arise where an image is captured by automated or mechanical equipment. Another situation where questions of authorship arise is where it is difficult to locate or identify the owner of a photograph (‘orphan works’). Each of these situations will be addressed below.

13 When people take photographs of themselves, it is unlikely that questions of authorship will arise because it is clear who the author is as they are the person who captured their own image. People taking photographs of themselves are exercising skill, labour and effort in capturing the photograph.

64

3.2.1.1 Camera Ownership

One situation in which questions about authorship may arise is when a person gives a third party the equipment (e.g. camera or phone) to capture an image on their behalf. This would be the case, for example, when a tourist asks a stranger to use their camera to take pictures of them while on holidays. Under Australian law, as the third party is pressing the button (or shutter), they are prima facie considered to be the author of the photograph. This is regardless of the fact that the third party does not own the equipment used to take the photograph. As a result, the person who owns the equipment that is used to capture a photograph taken by a third party is unlikely to have a claim of the copyright in the resulting photograph. Having said this, it is possible that the owner of the camera may still be able to claim copyright in a photograph taken on their camera by a third party. It could be argued, for example, that someone who asks another person to take a picture of them is potentially commissioning the photograph and, as such, may have a claim to authorship in the photograph.14 This will depend on whether when asking a third party to take a photograph on their behalf the camera owner is in fact commissioning the photograph. While ‘commissioned’ is not defined in the Copyright Act 1968 (Cth), Copinger suggests that it means ‘order’.15 According to Copinger, the meaning of ‘order’ goes beyond merely requesting or encouraging; there must be a mutual obligation to ‘create work and an obligation to pay’.16 For a work to be commissioned, it is essential that there be valuable consideration. This would suggest that where a person merely asks a third party to take of photograph of them, it would not constitute a

14 Generally, where a photograph is commissioned first ownership is provided to the photographer taking the photograph. For works created prior to 1998, the general rule was that the author, not the commissioner, held first copyright; this could be varied by an assignment under contract. There are exceptions to first ownership of commissioned photograph when the photographs are commissioned for a private or domestic purpose such as portraits and engraving see Copyright Act 1968 (Cth) s 35(5); so even if a person was commissioned to take photographs of another person’s wedding or family portraits or pictures on the street, the people who ask for the photograph to be taken are the rightful owners – see Douglas & Ors v Hello Ltd & Ors [2005] EWCA Civ 595 (18 May 2005). 15 See Caddick, Davies and Harbottle, above n 8, 275; see also Plix Products Ltd v Frank M Winstone (Merchants) [1986] FSR 63, 86, where the court held that ‘in s 9(3) of the Copyright Act 1962 (NZ) “commissioning” means more than requesting or encouraging. It means ordering and connotes an obligation to pay not just for the finished products if and when they are produced but for the very article in which the copyright resides irrespective of whether any of the finished products are purchased’. 16 See Caddick, Davies and Harbottle, above n 8, 275; see further Ultraframe (UK) Ltd v Fielding [2003] EWCA Civ 1805, 30.

65

commissioning. This is because there is no obligation to pay the third party to take the photograph. 17 It could also be argued that when a camera owner asks a third party to take a photograph of them, the stranger gives the camera owner an implied licence to use the resulting photograph.18 The courts use an objective test to determine whether an implied licence has been given.19 An implied licence may be oral and arise because of the circumstances in which the camera is used. When a licence is gratuitous and informal, the photograph is supplied knowing that it will be used for a particular purpose – namely for the enjoyment and use of the person who requests it.20 Given that where a third party takes a photograph on another person’s behalf, the photograph is taken knowing that the photograph will be used by another person, there is little to no expectation of ownership of the photograph.21

3.2.1.2 Directing, Arranging and Controlling a Scene

Another situation in which problems of authorship potentially arise is when a person directs, arranges and controls a scene, but does not press the button that captures that scene. A recent example of this arose at the 2014 Oscars when Ellen Degeneres asked Bradley Cooper to use her phone to take a group photograph of her and other celebrities at the awards ceremony. Degeneres arranged the scene but directed Cooper to take the photograph (by pressing the button on her camera-phone).22 When Associated Press wanted to share the now famous selfie the question arose: who had the rights in the photograph?

17 Copinger, 275, states that ‘while well-known personalities will often agree to their photograph being taken, even in a studio, without any commission by them being made, this is less likely to happen in the case of people in the ordinary walk of life, since in the latter case the photographer is unlikely to take the risk of no prints being ordered.’ See Caddick, Davies and Harbottle, above n 8, 275. See Sasha Ltd v Stonesco (1929) 45 TLR 350. 18 See Caddick, Davies and Harbottle, above n 8, 309; see also Express Newspapers Plc v News (UK) Ltd [1990] FSR 359 where it was arguable that there was ‘a trade custom between newspaper publishers that one newspaper was free to reproduce news stories appearing in another’. 19 See Redwood Music Ltd v Chappell & Co [1982] RPC 109, 128. 20 See Caddick, Davies and Harbottle, above n 8, 309; Trumpet Software Pty Ltd v Ozemail (1996) 34 IPR 481, 500. 21 Trumpet Software Pty Ltd v Ozemail (1996) 34 IPR 481, 500; see Caddick, Davies and Harbottle, above n 8, 309. 22 See Elana Zak, ‘Ellen DeGeneres’s Epic Oscar Selfie Becomes Most Retweeted Tweet’, The Wall Street Journal (2 March 2014); Melville v Mirror of Life [1895] 2 Ch 531, where the court essentially examined the role of author who had not operated the photographic equipment. While the son had been operating

66

Copyright law in the United States suggests that there is scope for Degeneres to argue that Bradley Cooper was carrying out her direction and instruction in taking the photograph.23 In contrast, under Australian copyright law, where a person does not take the photograph but plays merely a role in staging and arranging the photograph, they will have no claim to authorship in the resulting photograph.24 Applying Australian copyright law to the Oscar selfie, even though Ellen Degeneres staged the photograph, the copyright owner would be the person who took the photo; namely Bradley Cooper.25

3.2.1.3 Where There is No Human Involvement in the Creation of a Photograph

Problems of authorship also potentially arise when personal images are captured without human intervention. For example, when a photograph is taken a using a self-timer or when a non- human (such as an animal or a machine) takes a photograph. Self-portraits began to be used in the 1880s with the introduction of shutters and self- timers.26 The advancement of cameras created the ability to self-time. The camera itself is taking the photograph without a person needing to press the button to take the photograph. With the evolution of technology, people have been able to take self-portraits as well as group shots without actually pressing a button, by directing timers to automatically capture a photograph. When photographs are taken by self-timers, issues of authorship may arise because the photograph is taken without human labour, skill and effort. However, there is a potential

the photographic equipment and arranged the placing of the subject and framed the scene of the shot, it was the party claiming the authorship that was recognised as the author. This was attributed to the fact that they were onsite and in control of the photographic shoot. The court suggested that this had made the photographer merely an agent and the controlling party the ‘principal photographer’; see Kathy Bowrey, ‘Copyright, Photography and Computer Works: The Fiction of an Original Expression’ (1995) 18 (2) University of New South Wales Law Journal 284, 284-5. 23 Eleonora Rosati, ‘The IPKat: Copyright-Related Question Right from the Oscars Night: Who Owns DeGeneres’s Selfie?’ The IPKat ; see also Melville v Mirror of Life [1895] 2 Ch 531; Bowrey, above n 22, 284-5; Christine Haigh Farley, ‘The Lingering Effects of Copyright’s Response to the Invention of Photograph’ (2004) 65 University of Pittsburgh Law Review 385, 389-40. 24 See Creation Records Ltd and Others v News Group Newspapers Ltd [1997] EMLR 444. 25 This view is also reaffirmed in the Oasis case; Creation Records Ltd and Others v News Group Newspapers Ltd [1997] EMLR 444. 26 See Nottage v Jackson (1883) 11 Q.B.D 627, 632; Burrow-Giles Lithography Company v Sarony 111 US 53 (1884) 59, 60.

67

argument that the person who sets the timer and positions the camera would be the author of the photograph.27 Another situation where questions about copyright ownership of a photograph arise is where a non-human takes a photograph. The so-called ‘monkey selfie’ highlights the problem that arises in this situation. In the summer 2011, the photographer David Slater had been travelling in Indonesia taking pictures of a crested black macaque monkey when one of the monkeys took his camera and started to take several ‘selfies’ by pressing the button.28 The question here was whether there was an author of the monkey selfie. Under Australian copyright law, only humans qualify as a person under section 32(4) of the Copyright Act 1968 (Cth), which states that a qualified person is an Australian citizen, or Australian protected person or an Australian resident. Given this, an animal would not be the author of the photograph. Another situation where authorship may be an issue is where a photograph is created automatically, for example by a traffic camera which records speeding infringements or by a

CCTV.29 Reflecting of the close connection that exists between authorship and originality, the fate of an automatically generated work will depend on whether the work in is original.30 As the Full court noted in the Telstra decision, an automatically generated work would not quality for protection because it was not original.31 This was on the basis that originality requires independent human intellectual effort to generate the material work in question, something that

27 See generally Nottage v Jackson (1883) 11 Q.B.D 627, 632; Burrow-Giles Lithography Company v Sarony 111 US 53 (1884) 59, 60. 28 Steve Schlackman, ‘The Telegraph is Wrong About the Monkey Selfie’ (7 August 2014) Artslaw Journal < http://artlawjournal.com/telegraph-wrong-monkey-selfie>. 29 A recent example illustrates how CCTV can capture personal images that can later be shared on the internet and social networks. The image of an airline flight attendant who was drunk and sleeping outside the airline employee accommodation was captured on CCTV and then shared by the vice president of the airline company to the employees. John Hutchinson, ‘Qatar Boss Shames ‘Drunk’ Air Stewardess by Emailing Photo of Her Slumped on Floor Outside Accommodation to Airline Staff’ Daily Mail (17 March 2015) . 30 IceTV v Nine Network Australia (2009) 239 CLR 458; Telstra Corporation limited v Phone Directories Company Pty Ltd (2010) 273 ALR 725; Jani McCutcheon, ‘The Vanishing Author in Computer- Generated Works: A Critical Analysis of Recent Australian Case Law’ (2013) 36 University Law Review, 915, 917, 921-4. 31 Telstra Corporation Pty Ltd v Phone Directories Company Pty Ltd [2010] FCAFC 149, [90], [101], [169]; Jani McCutheon, above n 30, 925.

68

would not be present where a work was automatically generally by for example, CCTV.32 While the operation of a computerised process involves skill, judgement and labour,33 it would not meet the threshold of originality and as such, not likely to be protected by copyright.34

3.2.1.4 Orphan Works

Another issue that is important here relates to situations where an author cannot be identified or located, that is so-called orphan works. A work is considered to be an ‘orphan work’ when a diligent search is conducted but the copyright could not be found.35 The inability to identify or locate the owner of a photograph poses problems because people who wish to use the image cannot attribute authorship or gain the copyright owner’s permission to use the image. In itself this is not really a matter of concern to the subject of a photograph. What is a potential problem, however, is when governments intervene to deal with the problems created by orphan works. This is the case, for example, in the United Kingdom where the British government introduced the 2013 Enterprise and Regulatory Reform Act.36 The Act aims to facilitate the use of orphan works for commercial purposes by allowing the images to be placed in collective licensing schemes.37 A person who carries out a diligent search may obtain a license to use an orphan

32 Telstra Corporation Pty Ltd v Phone Directories Company Pty Ltd [2010] FCAFC 149, [101]; Jani McCutheon, above n 30, 925. 33 See generally, Susi Frankel, ‘The Copyright and Privacy Nexus’ (2005) 36 University of Wellington Law Review 507, 517-8. Frankel 517 argues that a ‘plaintiff could argue that the placing of the video camera and possibly even its operation involved skill, judgment and labour. These are the hallmarks of the test of originality for the subsistence of copyright. The counterargument would be that these skills alone are not enough because if they were it would allow a very low threshold of originality.’ 34 If there was protection, it could be argued that as traffic light cameras and CCTV are government operated and owned, the Crown may have ownership of the photographs. See generally Stephen M McJohn, Intellectual Property: Examples and Explanations (Aspen Publishers, 2nd ed, 2006) 21. However, there is uncertainty as to whether this view would be successful as this issue has not been tested in Australia. 35 See generally, Eleonora Rosati, ‘The orphan works provisions of the ERR Act: are they compatible with UK and EU laws?’ (2013) 35 (12) European Intellectual Property Review 724, 724-740; For a definition of orphan works see generally Richard Arnold, ‘The need for a new Copyright Act: A Case Study in Law Reform,’ (2015) 5(2) Queen Mary Journal of Intellectual Property 110, 110-131. 36 Enterprise and Regulatory Act 2013 (UK). 37 Andrew Orlowski, 29April 2013, UK Gov Passes Instagram Act: All your pics belong to everyone now ; see also Ethan Stallman ‘Twitter users stripped off rights to own snaps’, 29 April 2013

69

photograph for non-commercial and commercial purposes.38 In this situation there is little that the subject of an image can do to prevent the (mis)use of the photograph. Online social commentators have suggested that such schemes strip social network users of their rights to their photographs.39 Consequently, where the scheme applies, people will have a limited ability to prevent the misuse of their image. While Australian copyright law has not been reformed to deal with orphan works, photographs that have been uploaded and reshared by third parties may fall within the British scheme.

3.3 Exceptions to the author as first owner

As was noted above, the ability to use copyright to protect against the misuse of personal images placed on social networking sites will depend, in part, on who owns copyright in the photograph. As a general principle, the photographer as author is considered to be the first owner of the copyright in the photograph.40 There are a number of exceptions to this general principle that may affect the owner’s ability to use copyright to prevent the misuse of a personal image online. The most important relates to photographs created in the course of employment41

(particularly by journalists), and where a photograph is commissioned.42 It is generally recognised that where a photograph is taken in the course of employment that the employer will be the owner of the copyright (however it should be noted that this may be modified contractually).43 To determine whether a photograph is owned by an employer it is important to consider two questions: the first is whether the creator of a photograph is an employee; the second is whether the photograph was created in the course of employment.44

< http://metro.co.uk/2013/04/29/twitter-users-stripped-of-rights-to-own-snaps-3698502/>; see also Alex Hern, ‘“Instagram Act” under fire for treatment of copyright works: Is the Government handing your photos to media giants?’, New Statesman, 29 April 2013 . 38 See generally, Eleonora Rosati, above n 38, 725-740. 39 Ethan Stallman, ‘Twitter users stripped off rights to own snaps’, 29 April 2013 < http://metro.co.uk/2013/04/29/twitter-users-stripped-of-rights-to-own-snaps-3698502/>. 40 Copyright Act 1968 (Cth) s 35(2); see also Davison, Monotti and Wiseman, above n 3, 239. 41 Copyright Act 1968 (Cth) s 35(6). 42 See Davison, Monotti and Wiseman, above n 3, 243. 43 Copyright Act 1968 (Cth) s 35(6). 44 See Davison, Monotti and Wiseman, above n 3, 244.

70

In thinking about whether an individual is an employee, a number of factors will be taken into consideration including the nature and scope of the creator’s duties,45 whether the creator was being paid, the hours of employment, and whether the creator is entitled to holidays.46 While in some cases, the fact that someone exercise control of another person is suggestive of an employer- employee relationship, this may not be the case when a person exercises a higher degree of skill and expertise in their duties.47 It is also necessary to consider whether the photograph was created in the course of employment. This is important because the employer will not always own copyright in a work that is created by an employee. For example, an employee who takes a photograph while on a lunch break potentially retains copyright in the image. This is because: the mere existence of the employer/employee relationship will not give the employer ownership of inventions made by the employee during the term of the relationship and that is so even if the invention is germane to and useful for the employer’s business. This is also the case even though the employee may have made use of the employer’s

time and resources in bringing the invention to completion. 48 In determining whether a photograph was created in the course of employment, it is important to look at the terms of the relevant employment agreement and on the nature of the employment activities that the employee is expected to perform. As Moore J. noted in EdSonic v Cassidy49 the question of whether a work is created according to the terms of employment ‘is not the bare question of whether the author is employed under a contract of service, at the time a work is made but whether the relevant work is made in furtherance of the contract of employment with the employer.’ The key question is ‘did the employee make the work because the contract of employment expressly, or impliedly required or at least authorised the work to be made?’50

45 See Insight SRC IP Holdings Pty Ltd v Australian Council for Educational Research Ltd (2012) 211 FCR 563; see Davison, Monotti and Wiseman, above n 3, 244. 46 See Davison, Monotti and Wiseman above n 3, 244. 47 See Redrock Holdings and Hotline Communications v Hinkley (2001) 50 IPR 565, 21 citing Denning LJ’s test in Stevenson Jordan & Harrinson Ltd v MacDonald & Evans (1952) 69 RPC 10; see Davison, Monotti and Wiseman, above n 3, 244. 48 Victoria University of Technology v Wilson (2004) 60 IPR 392, 422 (Nettle J). 49 (2010) 189 FCR 271. 50 (2010) 189 FCR 271, [41] referring to University of Western Australia v Gray (2009) 179 FCR 346.

71

3.3.1 Photographs Created by Journalists

Questions of ownership also arise in relation to photographs created by journalists. Section 35(4) provides special rules for literary, dramatic or artistic works that are created for journalistic purposes.51 Where the work is created on or after 30 July 1998 both the publisher and the journalist have copyright in the photograph.52 In all other cases, the photographer will be the owner of the copyright.53

3.3.2 Commissioned Photographs

Generally, where a photograph is commissioned, first ownership is given to the person who takes the photograph.54 Prior to 1998, the general rule for commissioned photographs was that copyright vested in the photographer. The person commissioning the photograph did not acquire copyright in the photograph unless the author agreed under contract. However, the law relating to commissioned works changed in 1998, specifically in relation to commissioned photographs, portraits and engravings.55 Under the current law, where photographs are commissioned for a private or domestic purpose, ownership rests with the commissioner.56 For example, with wedding photographs and family portraits, the copyright rests with the commissioner as opposed to the photographer.57 This means that if a photographer was commissioned to take photographs of a wedding or a family portrait, the person who commissioned the photograph would be the rightful owner.58 This means that when a photographer is commissioned to take pictures, they

51 Copyright Act 1968 (Cth) s 35 (4); Davison, Monotti and Wiseman, above n 3, 246. 52 There are special rules that apply to photographs created for publication in newspapers, periodicals or magazines: see Copyright Act 1968 (Cth) ss 35(4) and 35(7). Copyright rests with both journalist and media proprietor for works that are created after 30 July 1998 and for works created prior to 30 July 1998, the media proprietor of the employed journalist will own copyright; see Davison, Monotti and Wiseman, above n 3, 245–6. 53 In such circumstances, these journalists are unlikely to fall within the exception provided under the Copyright Act 1968 (Cth) s 35(4). 54 For works prior to 1998, the general rule was that the author held first copyright not the commissioner; this could be varied by an assignment under contract; see Davison, Monotti and Wiseman, above n 3, 245–6. 55 Copyright Act 1968 (Cth) s 35(5). 56 Ibid. 57 Ibid s 35(7). 58 See Douglas & Ors v Hello Ltd & Ors [2005] EWCA Civ 595 (18 May 2005).

72

are unable to use those photographs on their website or other social network sites without the permission of the people who commissioned the photograph. It is important to note that commercial photographers often contract out of the commissioning provisions. Where this occurs, the photographer can upload and share the photographs that have been commissioned by third parties on social network sites.

3.3.4 Contract

When thinking about the effectiveness of copyright in protecting against the misuse of a person’s image, it is important to note that the law allows copyright in a photograph to be contractually transferred to a third party.59 As discussed in Chapter Two, people enter into a contractual agreement with the social networks and website companies when they subscribe to their services. Before a person can access the social network service they must accept the social network’s terms of use. Once a person agrees to the social network’s terms of use, they are bound by those terms. As was shown in Chapter Two, social network contracts typically contain standard licencing clauses that give the networks a licence the images that people upload on their profile page. The licence clauses also often give the network an irrevocable and non- exclusive licence to sub-licence the user’s image to third parties. The agreements also allow networks to continue to use the images even if a person withdraws their consent or deletes their account. As a result, a copyright owner will have little recourse against the social network or the network’s affiliates that they sub-licence to. Despite this, a copyright owner would still have a right of action against an independent third party who appropriates an image from a social network site.

3.4 Is Use of the Photograph on a Social Networks an Infringement?

A key factor that determines the effectiveness of copyright in controlling online misuse is whether the unauthorised resharing and reuse of the photograph on a social network constitutes an infringement. A copyright owner is given a number of rights by section 31 of the Copyright

Act.60 The key rights are the right to reproduce, communicate, and publish the photograph.61 It

59 Copyright Act 1968 (Cth) s 35(3). 60 Copyright Act 1968 (Cth) s 31. 61 Ibid s 31(1)(b).

73

should be noted that these rights are subject to any contractual agreements which the copyright owner enters in. The owner of a photograph is given the right to reproduce the photograph in a material form.62 The right to communicate a photograph to the public essentially means that the owner can make the photograph available online.63 The owner of a photograph has the exclusive right to publish the photograph.64 A photograph is published if the reproductions of the photograph have been supplied to the public by sale or other means.65 Publication means that the public is able to visually read the work.66The right to publish a photograph means that the owner can post, upload or share the photograph on the internet or allow third parties to do so. Photographs are published on social networks when a person uploads and shares the photograph with their contacts in the network. A photograph is also published when it appears on the network or on a person’s profile page. In most cases the uploading, sharing or reuse of a photograph will constitute an infringement of copyright. A photograph that is reproduced, published or communicated to the public without the requisite permission will be a direct infringement of the copyright owner’s right. Copyright in a photograph will also be infringed when a third party (such as a friend of a friend) reshares or reuses the photographs shared on the person’s profile page, or when a third- party advertising site reuses the photographs.67 While in most situations the reuse of an image online will be a clear infringement, the situation is less clear where someone uses photograph enhancing tools such as Photoshop to

62 For example, a reproduction of photograph is deemed to have occurred where the work is converted from hard copy (physical form) to a digital form: s 21 (1A), Copyright Act 1968 (Cth) this also would include computer programs, or works derived from the source code; see Davison, Monotti and Wiseman, above n 3, 240. 63 Copyright Act 1968 (Cth) s 10(1), defines communicate as ‘make available online or electronically transmit (whether over a path, or a combination of paths, provided by a material substance or otherwise) a work or other subject-matter, including a performance or live performance within the meaning of this Act’. 64 Copyright Act 1968 (Cth) s 29. 65 Copyright Act 1968 (Cth) s 29(1)(a). 66 Ibid s 29(3). 67 An example of third-party infringement is when Facebook was sued for allowing advertisers to use their users’ profile pictures, information and likenesses in order to promote and market their products see Angel Fraley et al v Facebook Inc (C A No 511-01726). This occurred through the sponsored Stories feature in Facebook; at that time, Facebook’s terms of use did not allow them to do this. These terms of use have subsequently been amended and are examined in Chapter 2.

74

distort or modify an image. In this situation to infringe, there needs to be a similarity between the photograph and the infringing photograph. The similarity must not be relative to the idea expressed, but to the way in which the work is expressed; to the material form of the work.68 Where a work has been altered, it must be shown that the defendant’s unauthorised act was carried out in relation to a substantial part of the work.69 This will depend on the quantity and quality that has been taken which in turn depends on the facts of the case.70 As there is no set definition of ‘substantial part’ in the Copyright Act, it is done through the development of various tests over time, which has enabled the courts to consider the meaning of ‘substantial part.’ The various factors considered by the courts to determine the meaning of substantial part relate to quantity and quality. In IceTV v Nine Network Australia Pty Limited the High Court noted that the ‘quality of what is copied is critical.’71

3.5 Fair Dealing

While there are a number of defences to copyright infringement that are potentially relevant where images are shared online, the most relevant is the statutory defence of fair dealing. While fair dealing is important in so far as it allows third parties to utilise and build upon published works, it also puts the interests of the subject at risk. Here, we see again that the law is called on to balance the rights of the owner against the rights of the public to use the work. If the defendant can show that the dealing was carried out for one of the permitted purposes and the use is fair, it will not be copyright infringement. There is a two-step approach when considering whether the defence of fair dealing will apply to the use of a personal image captured in a photograph. The first is to consider whether the use falls within one of the permitted uses. The second is to consider whether the use is ‘fair’.72

68 Copyright Act 1968 (Cth) ss 36(1), 36(1A); see Ricketson, Richardson and Davison, above n 7, 222, 224– 5, 238–9; see Davison, Monotti and Wiseman, above n 3, 278–9. 69 Ibid. The reasoning for this lies at maintaining a balance between creative freedom of creators and the protection of original works as recognized in IceTV v Nine Networks Australia Pty Limited (2009) 239 CLR 458, 473, [30], 509, [155], 512, [170]; Hawkes & Son () Ltd v Paramount Film Service [1934] Ch 593. 70 Quantity and quality are not considered in isolation; see further IceTV v Nine Network Australia (2009) 239 CLR 458, [30], [155], [170]; Hawkes and Son (London) v Paramount Film Service [1934] Ch 593, 604; EMI Songs Australia Pty Ltd v Larrikin Music Publishing Pty Ltd [2011] FCAFC 47 [57]. 71 (2009) 239 CLR 458, 473, 509, 512, [30], [155], [170]. 72 Copyright Act 1968 (Cth) ss 40–43.

75

For the fair dealing defence to arise, the dealing must fall within one of the permitted purposes, namely for:73

 research or study74

 criticism or review75

 reporting news76

 professional advice given by a legal practitioner or patent attorney,77 and

 parody or satire.78 The most relevant of these is where the use is for the purpose of criticism or review, reporting of the news, or for the purpose of parody or satire.79 These are discussed in turn.

3.5.1 Criticism or Review

The Copyright Act provides that fair dealing of a photograph will not be an infringement where the work is used for the purpose of criticism or review and the use is fair.80 Copinger defines ‘criticism’ as ‘the act or art of analysing and judging the quality of the literary or artistic work,’ the act of passing judgment as to the merits of something, or a critical comment, article or essay’.81 In turn ‘review’ is defined as ‘a critical article or report as in a periodical, on some literary work, commonly some work of recent appearance; a critique’.82 In Australia, criticism and review have been given dictionary definitions, essentially the purpose of criticism may be considered as ‘the critical application of the mental faculties,’ while review is viewed as the

‘results of a process’.83

73 Davison, Monotti and Wiseman, above n 3, 318–20. 74 Copyright Act 1968 (Cth) ss 40, 103C. 75 Ibid ss 41, 103A. 76 Ibid ss 42, 103C. 77 Ibid s 43(2). 78 Ibid s 41A. 79 Fair dealing for the purpose of research or study falls outside the scope of this thesis. 80 Copyright Act 1968 (Cth) s 41; TCN Channel Nine Pty Ltd v Network Ten Ltd (2002) 118 FCR 417; Network Ten Ltd Pty v TCN Channel Nine Pty Ltd (2004) 218 CLR 273. 81 Kevin Garnet, Gilliam Davies and Gwiym Harbottle, Copinger and Skone James on Copyright (Sweet and Maxwell, 2011) 567; see also, De Garis v Neville Jeffress Pidler Pty Ltd (1990) 18 IPR 292, 299. 82 Ibid, see also, De Garis v Neville Jeffress Pidler Pty Ltd (1990) 18 IPR 292, 299. 83 Garnet, Davies and Harbottle, above n 81. See also, De Garis v Neville Jeffress Pidler Pty Ltd (1990) 18 IPR 292, 299.

76

Whether the use of an image is for the purpose of criticism or review will depend on whether the criticism is balanced or strongly expressed.84 For the defence of criticism and review to apply the criticism or review must be of a ‘work’ or ‘performance of a work,’ which is construed broadly.85 Criticism or review is not restricted to the style or merit of the work but can also extend to thoughts, ideas or the doctrine of philosophy behind the work.86 Importantly, for the infringement to fall within the fair dealing of criticism or review, the review or criticism must be of the photograph and not for another purpose, such as education.87 It does not matter that there are dual uses so long as one of these critiques the photograph.88

3.5.2 Reporting News

The Copyright Act also provides an exception to copyright infringement where the use of the photograph is for the purpose of reporting the news.89 One important preliminary question is whether using a photograph falls within the reporting of the news at all. This is because it may be argued that using a photograph of a person is not reporting the news per se, but rather using the photograph to illustrate the news.90 Copinger suggests that in the United Kingdom,

84 Ibid. 85 Ibid. 86 Garnet, Davies and Harbottle, above n 81, 567, citing Hubbard v Vosper [1972] 2 QB 84, and Fraser – Woodward Ltd v BBC [2005] EWHC 472, ‘where the criticism and/or review was of two things, of the photographs them and the philosophy behind them It was held that the ideas or philosophy underlying a certain style of journalism could be subject to criticism which fell within s 30 of the CPDA 1988 and the use of the photographs held to amount to fair dealing under s 30 CPDA’. 87 Garnet, Davies and Harbottle, above n 81. 88 Garnet, Davies and Harbottle, above n 81, 567-8. 89 Copyright Act 1968 (Cth) s 42; see further that reporting must occur in newspaper, magazine or similar periodical, as illustrated in De Garis v Neville Jeffress Pidler Pty Ltd (1990) 37 FCR 99; see R Daxton Stewart, “Can I Use This Photo I Found On Facebook?” Applying Copyright Law and Fair Use Analysis to Photographs on Social Networking Sites Republished for News Reporting Purposes’ (2012) 10(93) Journal on Telecommunication and High Tech Law 93, 94–6. 90 See, e.g., when The Duchess of Cambridge was photographed wearing a Collette Dinnigan dress, and Dinnigan republished the photograph from her press release. Dinnigan’s team stated that the use was within the fair dealing defence of reporting news. See Georgina Safe, ‘Royal Photographer to Sue Dinnigan over Dress Image’, Morning Herald, 12 November 2011

77

‘photographs are excluded from the ambit of’ the fair dealing defence of reporting news.91 This is because ‘the use of photographs in the context of news reporting could never be fair.’92 In Australia, the use of images may fall within reporting of the news. While in many cases it is relatively easy to determine when a use is made for the purpose of reporting the news, in some cases it may be difficult to determine whether the something is done for the purpose of reporting the news. This is particularly the case with ‘infotainment’ programs.93 This is made all the more difficult by the fact that the reporting of the news may be humorous.94 An example of the fragile line that exists between reporting the news and entertainment relates to the naked image of Prince Harry partying at a Las Vegas hotel on vacation that was published on an entertainment website and then reshared by online news sites.95 While it is unclear how the photograph was shared and by whom, it was clear that as the owner of the photograph, they had the right to publish, reproduce and communicate it. In this case, the subject of the photograph – a naked Prince Harry – had very little control over the use of his image.

3.5.3 Parody or Satire

If the dealing of a photograph is for the purpose of satire or parody and it is fair, it will not be an infringement.96 The defence of fair dealing for the purpose of parody or satire is one of the

91 Garnet, Davies and Harbottle, above n 81, 572. 92 Ibid. 93 See De Garis v Neville Jeffress Pidler Pty Ltd (1990) 37 FCR 99; see Davison, Monotti and Wiseman, above n 3, 314-5. 94 Network Ten Ltd Pty v TCN Channel Nine Pty Ltd (2004) 218 CLR 273. 95 ‘Prince Harry Naked Photos During Vegas Rager’, 22 August 2012, TMZ.com, < http://www.tmz.com/2012/08/21/prince-harry-naked-photos-nude-vegas-hotel-party/>; see also Alison Stephenson, ‘Celebrity Scandals: Photos that Have Brought Celebrities and Famous Faces Undone’, Daily Telegraph (30 June 2014), http://www.dailytelegraph.com.au/entertainment/celebrity/celebrity-scandals-photos-that-have-brought- celebrities-and-famous-faces-undone/story-fnk82a8z- 1226972313234?nk=df89cfa9225116e9f5ae88e0063b251a ; see also ‘Prince Harry Naked Photos During Vegas Rager, TMZ (22 August 2012)< http://www.tmz.com/2012/08/21/prince-harry-naked-photos- nude-vegas-hotel-party> . 96 See The Footy Show used an image of a baby found on Facebook and called it ‘ugly’: see Ian Walker and Nathan Klein, ‘Footy Show Poked Fun at Our Baby Girl- Couple Demands Apology’ (19 May 2013) .

78

most important for the purpose of this thesis.97 Parody or satire is not defined in the Act, but has been said to support free speech, criticism and public debate.98 The parody defence may apply when all or part of the original photograph is reproduced.99 The courts may use an objective test when determining whether the use of a personal image falls within the parody or satire exception.100 Even though parody and satire have been used interchangeably,101 there are important distinctions that must be considered. For the exception to apply to personal images, the use of the image must be ‘genuinely for the purpose of parody or satire and be fair in all the circumstances.’ To fall within the scope of the parody defence, it is not enough to merely use humour, there must be some form of commentary for the use of the defence to apply.102 There are a number of factors that may be taken into consideration in working out whether the

97 Copyright Act 1986 (Cth) s 41A. 98 Attorney-General and Department of Communications and the Arts, Proposed Moral Rights Legislation for Copyright Creators, Discussion Paper (1994) 3.66; see Davison, Monotti and Wiseman, above n 3, 315–16. 99 This is because ‘a parody is an imitation of a work that may include parts of the original. In some cases, a parody may not be effective unless parts of the original are included.’ See generally Parodies, Satire and Jokes, Information Sheet G083v05, Australian Copyright Council, (March 2017) ; See also Fair Dealing: Information Sheet G079v06, Australian Copyright Council, (March. 2017) . 100 Mariko A Foster, ‘Parody’s Precarious Place: The Need to Legally Recognize Parody as Japan’s Cultural Property’ (2013) 23(2) Seton Hall Journal of Sports and Entertainment Law 313, 328, where the author states that, ‘the court must conduct an objective assessment of how and why the material is used. In the case of parody or satire, the court will first determine whether the copyright user is genuinely using material for parody or satire. This is somewhat difficult because the legislation left parody and satire undefined, and Australian courts have not yet considered either term’. 101 Conal Condren, Jessica Milner Davis, Sally McCausland and Robert Phiddian, ‘Defining Parody and Satire: Australian Copyright Law and its New Exceptions: part 2-Advance Ordinary meanings’ (2008) 13(4) Media Arts Law Review 401, 406. There the authors state parody and satire ‘are so frequently work together that dictionary definitions and common usage often treat them as conjoined, even partly interchangeable.’ 102 Fair Dealing: Information Sheet G079v06, Australian Copyright Council, (March. 2017), available at ; see also, Mariko A Foster, above n 100, 327-28.

79

exception potentially applies, including whether the image is published, ‘the nature of the material, the nature of the use,’ whether permission has been granted by the copyright owner.103 While parody is not defined in the Copyright Act, Spence suggests a definition that ‘tracks the ordinary usage of the term in a sufficiently broad range of contexts to render it useful for the purposes of legal analysis’.104 It is noted that any definition of parody must go beyond

‘dictionary definitions which restrict parody,’105 In line with this, Condren et al suggest that an ordinary meaning of parody be formulated: which may then co-exist with, but remain distinct from, satire: parody is the borrowing from, imitation, or appropriation of a text, or other cultural product or practice, for the purpose of commenting, usually humorously, upon either it or

something else.106 As the Australian Copyright Council states, ‘the purpose of a true parody is to make some comment on the imitated work or on its creator.107 In order to rely on a defence of parody, there would need to be commentary on the work or on the author of the photograph. In situations where television presenters comment on personal images in an entertainment show, the use may fall within the scope of the defence because the critique is a form of commentary.108 While satire is also not defined in the Copyright Act it has been suggested that satire that ‘may be defined, by extension from the definition of the satiric, as: those artistic expressions created in the satiric mode or idiom; the artistic results (usually humorous) of

103 See Mariko A Foster, above n 100, 328. 104 Michael Spence, ‘Intellectual Property and the Problem of Parody’ (1998) 114 Law Quarterly Review 594, 595. See also Conal Condren, et al, above n 101, 411. 110 Ibid, there the authors state ‘any useful contemporary definition of parody must go beyond the dictionary definitions which restrict parody to a comic critique of its models and are shaped too much by narrowly literary concerns.’ 106 Ibid. 107 Parodies, Satire and Jokes, Information Sheet G083v05, Australian Copyright Council, (March 2017) ;see also Fair Dealing: Information Sheet G079v06, Australian Copyright Council, (March. 2017), . 108 Parodies, Satire and Jokes, Information Sheet G083v05, Australian Copyright Council, (March 2017)

80

expression of such a critical impulse.’109 The Australian Copyright Council argues that the purpose of satire is: to draw attention to characteristics or actions – such as vice or folly – by using certain forms of expression – such as irony, sarcasm and ridicule. It seems that both elements are required: the object to which attention is drawn (vice or folly etc.) and the manner

in which it is done (irony, ridicule etc.).110 Satire essentially requires two factors; the first is to draw attention to the form of the work, and the second is to use various forms of expression, such as sarcasm, ridicule or irony in order for the use to fall within the fair dealing. The use of personal images in social media and entertainment shows will usually fall within this fair dealing defence. This is because in most cases personal images are reused with satiric commentary or ridicule, for example in infotainment shows where intention of the commentary is to ridicule the subject in the photograph. As a result, in these cases the owner will not be able to prevent third parties from using the photograph.

3.5.4 Is the use fair? The second factor that is required to determine whether the use falls within the fair dealing defence is whether the use is fair.111 In thinking about whether the dealing is fair, Lord Denning said: [It is] impossible to define what is ‘fair dealing’. It must be a question of degree. You must first consider the number and the extent of the quotations and the extracts. Are they altogether too many and too long to be fair? Then you must consider the use made of them. If they are used as a basis for comment, criticism and review, that may be a fair

109 Conal Condren, et al, above n 101, 413; see also The Macquarie dictionary which defines “Satire” as: 1. the use of irony, sarcasm, ridicule, etc. in exposing, denouncing, or deriding vice, folly etc. 2. a literary composition, in verse or prose, in which vices, abuses, follies etc. are held up to scorn, derision, or ridicule. 3. the species of literature constituted by such composition. This definition is also used by the Australian Copyright Council, Parodies, Satire and Jokes, Information Sheet G083v05, (March 2017) ,http://www.copyright.org.au/acc_prod/ACC/Information_Sheets/Parodies__Satire_and_Jokes.aspx?We bsiteKey=8a471e74-3f78-4994-9023-316f0ecef4ef> 110 Parodies, Satire and Jokes, Information Sheet G083v05, Australian Copyright Council, (March 2017) 111 See Davison, Monotti and Wiseman, above n 3, 317. The authors suggest that while ‘it is difficult to determine how “fair” is to be judged’ what will be fair will depend on the circumstances of the case.

81

dealing. If they are used to convey the same information as the author, for a rival purpose, that may be unfair. Next you must consider the proportions…. But it must be

a matter of impression.112

Justice Conti adopted a similar view when he said that ‘fair dealing involves question of degree and impression: it is to be judged by the criterion of a fair minder and honest person, and is an abstract concept’.113 The courts will consider ‘fairness’ objectively with respect to the relevant purpose. This means that the ‘purpose of criticism and review must be fair and genuine for the relevant purpose’.114 While section 40 of Copyright Act provides a list of the qualitative factors that may be taken into consideration when determining whether the use is fair, the list is specific to fair dealing for the purpose of research and study. For the other types of fair dealing, a variety of factors must be taken into account including ‘whether the work is published,’ ‘the degree which the infringing work competes with the exploitation of the copyright work by the owner and the extent of the use and the importance of what has been taken,’115 and ‘the amount taken, the motives and consequences of the dealing.’116

3.6 Can Moral Rights Can Prevent the Misuse of Personal Images?

In addition to the copyright given to the author of a photograph, Australian law also provides authors with moral rights. Moral rights are personal rights of the authors or creators of works. This means that authors will have moral rights regardless of whether they own copyright in the work. There are three different types of moral rights in Australian copyright law. These are the right of attribution of authorship,117 the right of integrity of authorship118 and the right to prevent false attribution.119 Moral rights will generally not protect the subject in a photograph where the image is uploaded and reused online. However, where the author and subject are the same person, moral rights may be used to prevent the misuse of the image.

112 Hubbard v Vosper [1972] 2 QB 84, 92- 94, 95. See TCN Channel Nine Pty Ltd v Network Ten Pty Ltd (2001) 108 FCR 235, 285. 113 TCN Channel Nine Pty Ltd v Network Ten Pty Ltd (2001) 108 FCR 235, 285 114 Ibid 381, also affirmed on appeal TCN Channel Nine Pty Ltd v Network Ten Pty Ltd (2002) 118 FCR 417. 115 See Garnet, Davies and Harbottle, above n 81, 574-5. 116 See Davison, Monotti and Wiseman, above n 3, 321; see also, Lionel Bentley and Brad Sherman, Intellectual Property Law (Oxford University Press, 4th ed, 2014), 224-26. 117 Copyright Act 1968 (Cth) s 193. 118 Ibid s 194(1). 119 Ibid s 194(2).

82

Before looking at the rights in detail, it should be noted that there are two important limitations to the operation of moral rights. The first is that it is not an infringement of attribution or integrity if the treatment or act was ‘reasonable in all circumstances’.120 What may be ‘reasonable in all circumstances’ will depend on the conduct of the parties in the given circumstances. While the Copyright Act does not define ‘reasonable’, it does provide a number of factors that may be taken into consideration when determining whether the treatment is reasonable in all circumstances. One factor that may be relevant relates to the nature or type of work. Photographs created by professionals may be treated differently to works created by amateurs.121 Other factors that may be taken into account include the purpose (whether public or private or commercial or non-commercial),122 the manner123 and the context124 of the use.125 The Copyright Act does not provide ‘guidance as to how the reasonable factors are to be balanced against each other’.126 Thus it is left up to the courts to decide how to balance the factors which depend on the circumstances of each case. The second limitation on moral rights is that authors are able to consent to acts that would be otherwise be an infringement of their moral rights. In many jurisdictions, moral rights are considered to be inalienable rights. While in these jurisdictions an author can assign their

120 Ibid ss 195AR (2), 195AS (2). 121 Ibid see V Morrison, Moral Rights: A Practical Guide (Sydney: Australian Copyright Council; 2000), 11, 13. 122 Copyright Act 1968 (Cth) ss 195AR(2)(b), 195AS(2)(b). See Davison, Monotti and Wiseman, above n 3, 341. 123 Copyright Act 1968 (Cth) ss 195AR(2)(c), 195AS (2) (c). See Davison, Monotti and Wiseman, above n 3, 341. 124 Copyright Act 1968 (Cth) ss 195AR(2)(d), 195AS (2) (d). See Davison, Monotti and Wiseman, above n 3, 341. 125 As a result, if the work is used for commercial gain or for a commercial purpose, it may not be reasonable: S Ricketson and C Creswell, The Law of Intellectual Property: Copyright, Designs, and Confidential Information (LBC Information Services, 2nd ed, 1999) 10.15, 10.175; see Davison, Monotti and Wiseman, above n 3, 341. As was shown in chapter two, a social network’s contract terms allow third parties to reuse and repost uploaded photographs. Given that social network sites comprise of individuals and companies to have an online presence; it may be the case that the court would also consider the community standards of the social network in the absence of an ‘industry’ code. The court may also take into account whether the image was used by an individual for private purposes; such as resharing or reposting the image on their personal profile page. 126 Davison, Monotti and Wiseman, above n 3, 340.

83

copyright in a work to a third party, they cannot transfer their moral rights.127 However, in

Australia authors are able to consent to acts that would otherwise infringe their moral rights.128 When authors consent to acts that would be otherwise an infringement of their moral rights, they will be unable to rely on their moral right to prevent the misuse of the image.129 In order to consent to acts that would otherwise be infringing of an author’s moral rights, consent must be in writing. 130 The consent must be ‘genuinely given by the author.’131 It is important to note that social network terms of use do not usually contain provisions on moral rights. Despite this, one question that arises is whether an author consents to acts that would otherwise be an infringement of their moral rights when they sign up to a social network. This is because as the licence clause is very broad it may be deemed a waiver of their moral rights. 132 While this is possible, it is unlikely that a court would construe the clause as a waiver because the clauses do not refer to acts that would be otherwise be an infringement of moral rights. 133

3.6.1 The Right of Attribution

The right of attribution provides authors with the right to be attributed as the creator of the work.134 This means that an author of a photograph should be attributed whenever the image is reused by third parties. The right to attribution is important because resharing a photograph on a social network potentially obscures the identity of the author. The author of an artistic work has the right to be identified as the creator of a work where that work is reproduced, communicated or exhibited to the public.135 In the event that a third party allows another person

127 Ibid 342. 128 W Rothnie, ‘Moral Rights: Consents and Waivers’ (2002) 20 Copyright Reporter 145; for further discussion, see Davison, Monotti and Wiseman, above n 3, 333–35. 129 Ibid 342-3, where the authors suggest this is because in situations where the author gives consent, the consent must relate to specific acts or omissions ‘or classes or types of acts or omissions.’ 130 Davison, Monotti and Wiseman, above n 3, 342. 131 Ibid. 132 Ibid 343, the authors suggest that where ‘a broad consent is given, a waiver of moral right is effectively granted.’ 133 This was highlighted in Monte v Fairfax Media Publications Pty Ltd [2015] FCCA 1633 which considered an infringement of moral rights when the plaintiff uploaded an image of his wife that was reused by a third party. 134 Copyright Act 1968 (Cth) s 193. 135 Ibid s 194(2); Snow v Eaton Centre Ltd (1982) 70 CPR (2d) 105 (Ontario High Court).

84

to use the work without attributing the author of the work, the use will be an infringement of the right to attribution.136 This is exemplified in AFP v Morel,137 which arose after Morel, a freelance photojournalist, posted eight photographs he had taken of the 2010 Haiti earthquake to his twitter account. Lisandro Suero copied the images and posted them on his own twitter profile which Agence France-Presse (AFP) found and disseminated to Getty Images (Getty

US). Getty then used and shared the photographs widely without Morel’s permission.138 The court found that AFP and Getty failed to properly attribute Morel as the author of the images because the images were credited to AFP/Getty/ Suero.139 The situation would be the same in Australia. There is no prescribed method of identification: any method that is reasonable is sufficient.140 The core stipulation is that the author is clearly identified.141 Essentially, the author’s identity will be clear if it is included on the reproduction, copy or adaption of the work and that it is noticeable on the reproduction, adaption or copy of the work.142 In social media, photographs are not really credited to the author when those images are uploaded and reshared. This is because images that are posted online are often stripped of the author’s identity which make attributing the author of the image difficult.143 One question here is whether resharing images online without attribution would be reasonable in the circumstances. It is not usual practice to attribute the author when resharing an image on a social network like Facebook, as

136 Copyright Act 1968 (Cth) s 195AO. 137 10 Civ. 02739 (AJN) (S.D.N.Y Jan 14 2013). 138 Barry Webin and Larea Tam, Herrick, Feinsein LLP, ‘David v Goliath: Photographer Daniel Morel awarded 1.2 million for copyright infringement from photo agency giants AFP and Getty’, 139 AFP v. Morel, 10 Civ. 02730 (AJN) (S.D.N.Y. Jan. 14, 2013). The images had been licenced to third parties for commercial purposes for example, to CNN and Washington Post. Consequently, AFP and Getty were found to have infringed Morel’s copyright and he was awarded 1.2 million dollars. 140 Copyright Act 1968 (Cth) s 194(1). 141 Ibid s195AA; the case of AFP v Morel 10 Civ. 02730 (AJN) (S.D.N.Y. Jan. 14, 2013) in the United States provides an example of false attribution, which is an abuse of the photographer’s moral rights because in this case, from the onset of the infringement, AFP had originally attributed the photographs to Mr Suero. See David Becker, Could the Morel v AFP/Getty Case Rewrite the Rules of Licensing Negotiation? PetaPixel, (29 January 2014) 142 Copyright Act 1968 (Cth) s 195AB. 143 See Ethan Stallman ‘Twitter users stripped off rights to own snaps’ 29 April 2013, Metro News, 15 April 2017

85

there is a perception that images that are uploaded on a social network may be used without attribution.144 Consequently, it can be argued that because it is a common practice for ordinary people not to attribute who the author is when resharing an image, the use of the image may be reasonable.

3.6.2 The Right of Integrity

The second moral right is the right of integrity of authorship, which provides that authors have the right for their work not to be treated in a derogatory manner.145 When personal images are altered or distorted the author’s right of integrity may be infringed when an author is the subject of a photograph.146 In this situation, the right of integrity may prevent the misuse of the image.147 In contrast, when an author and subject of a photograph are different, the right to integrity will be of little assistance to a subject of an image. In this situation, the subject will depend on the goodwill of the author to bring an action on their behalf. A key issue is whether there is a ‘treatment’ of the work. ‘Treatment’ of a work has been interpreted as ‘any addition to, deletion form or alteration to or adaptation of the work.’148 A treatment of a work may arise where the image is used contrary to the way that the author intended the image to be viewed.149 Copinger suggests that ‘treatment’ that ‘covers a broad

144 See Lexy Savvides, ‘Photographers , Copyright and the Online Battle for Photo Rights’, Cnet (27 February 2013) < https://www.cnet.com/au/news/photographers-copyright-and-the-online-battle-for- photo-rights/> 145 Copyright Act 1968 (Cth) s 195AI (1), (2). 146 Copyright Act 1968 (Cth) s 195AK. 147 See Copyright Act 1968 (Cth) s 195AZB, where photographers are able to sue for infringement of their moral rights. In addition, they are also able to protect their reputation using alternative legal means such as defamation or passing off. This may pose difficulties regarding amateur photographers being awarded damages for infringement of their photographs on social networks. This is due to the commercial reality of not being able to demonstrate loss of income generated from the sharing of photographs on social networks. 148 See Garnett, Davies, and Harbottle, above n 81, 728. In particular, treatment does not apply to a ‘substantial part of a work but to any part of it’. 149 See for example, the image of a child posing with Hilary Clinton in the presidential campaign. The image was turned into various memes that contained vilification, and offensive captions. See Colby Itkowitz, ‘A Photo of a 4yr old with Hilary Clinton was used as a disgusting meme. Her mom fought back’, The Washington Post (1 December 2016) < https://www.washingtonpost.com/news/inspired-

86

spectrum of possible acts carried on a work, from the addition of a single word to a poem to the destruction of the entire work’.150 Thus any change made to an image potentially falls within the meaning of ‘treatment.’151 Another issue here is what is meant by ‘derogatory’. What is derogatory in this context depends upon whether the use is a ‘distortion or mutilation of the work or is otherwise prejudicial to the honour or reputation of the author.’152 When a photograph is altered and/or is taken out of context (such as adding captions to the original photograph), the use may be ‘derogatory’. To some extent the question of whether a treatment is derogatory will depend on the nature of the work and the experience and skill of the author. This can be seen, for example, in Monte v Fairfax Media Publications, where the plaintiff sued for infringement of moral rights after the defendant reused an image that had been taken from the plaintiff’s wife’s social media account. Consequently, the defendant’s reuse of the image drew attention to the plaintiff’s wife’s escort business which was not known to her children or family, thus causing the plaintiff’s wife embarrassment and pain.153 Despite this the court did not find there was a breach of the plaintiff’s moral right because the plaintiff was not a professional photographer, but someone who had simply ‘captured’ the image. The court held that if Monte had been a professional photographer there would have been a breach of his moral right (either to integrity or attribution).154

life/wp/2016/12/01/a-photo-of-a-4-year-old-with-hillary-clinton-was-used-as-a-disgusting-meme-her- mom-fought-back/?utm_term=.06c4d70dfad1>. 150 See Garnett, Davies, and Harbottle, above n 81, 728; Harrison v Harrison [2010] EWPCC 3, 60. 151 However, it is important that derogatory treatment relates to the treatment of the work; ‘the fact remains that whether or not a treatment is derogatory may often depend on how that treatment is used’: Garnett, Davies, and Harbottle, above n 81, 732. 152 Garnett, Davies, and Harbottle, above n 81, 729. Further, at 728, the authors state that for an infringement of a right to integrity, “the author must establish that the work has been subject to a ‘treatment’ and that such treatment is ‘derogatory’.” In thinking about what could be considered as a ‘treatment’ of a work, the authors state that ‘treatment’ means, in general, any addition to, deletion from or alteration to or adaptation of the work’. In particular, the authors note that the right of integrity does not apply to a ‘substantial part of a work but to any part of it’. 153 Monte v Fairfax Media Publications Pty Ltd [2015] FCCA 1633. 154 Ibid.

87

3.7 Conclusion

While Australian copyright law provides some protection against the misuse of personal images, the protection is limited. One of the key limitations is that the law only protects the form and not the subject matter of a photograph: that is, it does not protect the person whose image is captured in the photograph, only the person who takes the photograph. Consequently, subjects in photographs have no rights per se. Instead they must depend on the largess of the copyright owner to bring an action on their behalf. The only protection available is to the creator of a photograph. As was shown earlier, there is little doubt that copyright subsists in most personal photographs. Despite this there are a number of limitations in relation to the protection provided to the people who create a photograph. A key concern is that the contracts of service that must be signed before a creator can upload images allow the network and its affiliates to reuse the images that are uploaded by the copyright owner. The content terms in social network contracts give a network a non- exclusive irrevocable licence to use and reuse and sub-licence all the images that have been uploaded and shared on people’s profile pages. The reuse of the image by the network (or its affiliates) may not be an infringement. In this situation, the only cause of action that a copyright owner may have is against an independent third party that copies and reuses an image from an online profile page. Even here, however there are limitations to the effectiveness of copyright law. One of the limitations is that third parties may be able to rely upon the defence of fair dealing. Where the defence applies, there will be no infringement of copyright. The upshot is that copyright law provides at best limited protection. Moral rights provide authors with more effective protection for images that are uploaded and reused online. This is particularly the case in situations where the reused image has been distorted, or modified or altered. In such situations, the treatment of the author’s work may be derogatory and thus an infringement of a moral right. However, there are a number of limitations to the moral rights of the creators of photographs, which may limit their effectiveness in preventing the misuse of personal images reused online. One limitation is that moral rights will not apply to the subject of a photograph, and thus a subject has no right of action to prevent the misuse of their image. In most cases, the subject will depend upon the author of the photograph to bring an action on their behalf. Another limitation that may affect the ability of an author to enforce their moral rights is that the use of image may not be an infringement if the treatment is reasonable in the circumstances. As was noted earlier, copyright law provides some protection for the misuse of personal images that are shared online, however

88

this is limited. In particular, the chapter has highlighted that subjects in photographs are unable to personally prevent the misuse of their image and must rely on the creator of the image to bring an action on their behalf.

89

90

Chapter 4 Privacy, personal images and social networks

4.1 Introduction

The chapter evaluates the adequacy of Australian privacy law in protecting against the misuse of personal images shared on social networks. For the purpose of this thesis, Australian privacy law is construed broadly to include common law actions of trespass, nuisance, defamation, contract and equity, as well as the relevant state and Commonwealth legislation. It is also noted that privacy in personal images may be also be protected by the law of confidence. This is discussed further in Chapter 5.

As is noted below, the Privacy Act 1988 (Cth)1 (Privacy Act) provides limited protection for personal images shared on social networks in Australia. The problems with Australian privacy law were highlighted in a series of ALRC Reports written from the 1970’s through to

2014,2; the most important being that Australian law does not recognise a personal right to privacy, and that there is no nationally consistent approach for privacy protection of personal images.3 Instead, Australian privacy law is fragmented into statutory legal protection and common law.4 To remedy these problems, the ALRC made a number of recommendations, including the introduction of a new statutory tort of invasion of privacy, the expansion of the tort of breach of confidence to include private information and the addition of damages for

1 Herein referred to as the Privacy Act or simply the Act. 2 See Australian Law Reform Commission, Unfair Publication: Defamation and Privacy, Report No. 11 (1979); Australian Law Reform Commission, Privacy Proposals, Report No 22 (1983); Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008); Australian Law Reform Commission, Serious Invasions of Privacy in the Digital Era, Report 123 (2014); the most recent ALRC reports are the most important. 3 Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008), Chapter 3: Achieving National Consistency; Australian Law Reform Commission, Privacy Proposals, Report No. 22 (1983) [1092] where the ALRC proposed a national approach to the protection of privacy ‘at the very least in relation to information practices’. 4 Without doubt, Australian law has adopted England’s approach to protecting ‘privacy’ by using existing areas of law such as equity, the tort of breach of confidence, copyright and contracts, instead of developing a clear and definitive right to privacy: see for further discussion Australian Law Reform Commission, Serious Invasions of Privacy in the Digital Era, Report No. 123 (2014).

91

emotional distress.5 The ALRC also recommended that ‘Federal legislation should provide for a statutory cause of action for a serious invasion of privacy.’6 To date, the Australian government has not implemented any of the ALRC’s recommendations. As a result, the protection for personal images on social networks remains fragmented under the common law and statutory legislation.

4.2 Common Law

Australian common law has been slow to protect personal images.7 In Australia, ‘there is no common law right not to be photographed’.8 As Dowd J said, ‘[a] person, in our society, does not have a right not to be photographed’.9 Without a right not to be photographed, personal images that are captured and shared on social networks are vulnerable to misuse. While there is limited protection for personal images, a person cannot prevent a third party from photographing them in a public place. There is no law against taking photographs of people from public places,10 even if a person is in a private place, unless the conduct of taking photographs amounts to stalking or ‘the intent is to “peep or pry” on an individual’.11 The development of privacy law in Australia has been stagnant since the 1930s, when the landmark decision of Victoria Park Racing and Recreation Grounds Co Ltd v Taylor (1937)12 rejected the existence of a common law privacy right. As Latham CJ said in the

5 See Recommendations, ibid.; see Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008). 6 See Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008) Recommendation 74 – Protection of a Right to Personal Privacy, Part K. 7 See Grollo v Palmer (1995) 184 CLR 348, 367; see Greg Taylor, ‘Why is There no Common Law Right to Privacy?’ (2000) 26 Monash University Law Review 235, 237. 8 Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008). 9 R v Sotheren [2001] NSWSC 204 (16 March 2001) [25] (Dowd J). 10 Australian Law Reform Commission, Serious Invasions of Privacy in the Digital Era, Report 123 (2014), Chapter 3: Overview of Current Law. 11 See, for example, the Crimes Act 1900 (NSW) s 547C. 12 (1937) 58 CLR 479, 504–5. The Victoria Park Case signified the contention surrounding a right to privacy when the courts failed to establish a tort of privacy. This case proved to serve an unwavering perspective relating to privacy interests for decades later, as the case centred on privacy issues cloaked under the tort of nuisance and copyright over broadcastings. The plaintiff, the owner of the racetrack, tried to prevent the defendant from viewing and broadcasting the races and any information that was

92

decision, ‘however desirable some limitation upon invasions of privacy might be, no authority was cited which shows that any general right of privacy exists’.13 It should be noted that this was not a unanimous decision. The dissenting judges believed that the common law of Australia ought to provide a new remedy that would defend the privacy of the individual from ‘serious, unwanted intrusion’.14 Victoria Park had a stifling effect on the development of privacy jurisprudence in

Australia.15 Indeed, it was not until the High Court considered privacy interests in the decision of Australian Broadcasting Corporation v Lenah Game Meats16 (Lenah) in 2001 that the issue was considered again by the courts.17 While there had been some hope that Lenah would

displayed at the track from the defendant’s adjacent property, where an elevated platform was built that allowed them to view and broadcast the races. 13 Victoria Park Racing and Recreations Grounds Co Pty v Taylor (1937) 58 CLR 479, 504-5, 496 (Latham CJ). 14 Ibid 504-5 (Rich and Evatt JJ) in dissent. See generally, Des Butler, ‘A Tort of Invasion of Privacy in Australia?’ (2005) 29 Melbourne University Law Review 339. 15 See e.g. Victoria Park Racing and Recreation Grounds Pty Ltd v Taylor (1937) 58 CLR 479, 496 (Latham CJ); Kaye v Robertson [1991] FSR 62, 66 (Glidewell LJ), 70 (Bingham LJ); Cruise v Southdown Press Pty Ltd (1993) 26 IPR 125 (Gray J); Australian Consolidated Press Ltd v Ettinghausen (Unreported, Court of Appeal NSW, Gleeson CJ, Kirby P and Clarke JA, 13 October 1993) 15 (Kirby P); GS v News Ltd (1998) Aust Torts Reports 81-466, 64,913-64, 915 (Levine J); Mark Burdon and Paul Telford, ‘The Conceptual Basis of Personal Information in Australian Privacy Law’ (2010) 17(1) eLaw Journal, Murdoch University Electronic Journal of Law 1, 21. 16 See Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd (2001) 208 CLR 199, 224-25 (Gleeson CJ); Peter Bartlett, ‘Privacy Down Under’ (2010) 3(1) Journal International Media and Entertainment Law 145, 147. 17 Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd (2001) 208; Australian Broadcasting Corporation (ABC) v Lenah Game Meats Pty Ltd [2001] HCA 63 (Gleeson CJ) 33: ‘Slicer J recorded that no issue of breach of confidentiality was raised’. See also Megan Richardson, ‘Whither Breach of Confidence: A Right of Privacy for Australia?’ (2002) 26 Melbourne Law Review 381, 388: ‘a difficulty with Lenah Game Meats viewed from a privacy perspective, is that the plaintiff did not argue its case for breach of confidence. If it had been maintained that the information about what went on in its abattoir was confidential, notwithstanding that some public access to the abattoir was permitted – in the same way that information about the plaintiff’s wedding was still regarded as confidential in Douglas v Hello! Ltd.’ See also Australian Broadcasting Corporation (ABC) v Lenah Game Meats Pty Ltd [2001] HCA 63, 64 (Gleeson CJ), citing ‘if by information, is meant the facts as to the slaughtering methods used by the respondent, such information was not confidential in its nature. But equity may impose obligations of confidence even though there is no imparting of information in circumstances of trust and confidence.’

93

recognise a general right to privacy, the High Court basically reiterated the existing position and held that there was no actual right to privacy in Australia.18 They did, however, suggest that there was a possibility that a tort of privacy might develop in the future.19

18 Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd (2001) 208 CLR 199, 206–239 (Gummow and Hayne JJ) considered whether there was a right of privacy when they considered cases from the United States where right to privacy exists, but held that there was no such right in Australia, but could develop later on but in favour of natural persons not corporations. Further, Gummow and Hayne JJ stated that ‘privacy shouldn’t be used to protect information because it has value to the corporation if not disclosed to others’. In their judgment, Their Honours limited privacy to protection of information for natural persons as opposed to a corporation because there are ‘limits on the type of information that can be protected’. Lenah Games Meats Pty Ltd v Australian Broadcasting Corporation (2001) 185 ALR 1, 39, 55, 56, [189], [191]. Compare with the Victoria Park Racing and Recreations Grounds Co Pty v Taylor (1937) 58 CLR 479, 504–5; at 496, Latham CJ noted that ‘however desirable some limitation upon invasions of privacy might be, no authority was cited which shows that any general right of privacy exists’. 19 Lenah Games Meats Pty Ltd v Australian Broadcasting Corporation (2001) 185 ALR 1, 39, 95 [335]. The court did suggest that there was a need for such a right – for example, when Callinan J suggested ‘a need for a relatively untrammelled form of protection against intrusion upon both private, and legitimate commercial interests, for all of ordinary people, celebrity and corporations; whether conducting lawful business activities, or doing things of commercial value, or going about their day-to-day affairs’. In his judgment, Callinan J signalled that it was time for consideration of a tort of invasion of privacy in Australia. Drawing upon Rich J’s dissenting view in Victoria Park, Callinan J acknowledged that Rich J’s view at that time resonated with modern society; further, in Lenah the judges stated: ‘Whatever development may take place in that field will be to the benefit not artificial persons and hence was not available to the respondent as a corporation.’: Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd [2001] HCA 63 (15 November 2001); Hon. Justice IDF Callinan AC, ‘Privacy, Confidence, Celebrity and Spectacle’ (2007) 7(1) Oxford University Commonwealth Law Journal 1, 19. Until this happens, individuals whose privacy is at risk are forced to rely upon the piecemeal common law provisions along with state and federal privacy legislation, as highlighted in Victoria Park Racing and Recreations Grounds Co Pty v Taylor (1937) 58 CLR 479, 504–5. At 496, Latham CJ noted that ‘however desirable some limitation upon invasions of privacy might be, no authority was cited which shows that any general right of privacy exists’; Re X [1975] Fam 47, 58; Malone v Metropolitan Police Commissioner [1979] Ch 344, 357–8; 10th Cantanae v Shoshana (1987) 79 ALR 299, 300; Kaye v Robertson [1991] FSR 62, 66, 70–1; Khorasandijan v Bush [1993] QB 727, 744; R v Central Independent Television [1994] Fam 192, 204; R v Khan [1997] AC 558, 581; Greg Taylor, above n 7, 237. See, Giller v Procopets [2004] VSC 113; Kalaba v Commonwealth [2004] FCA 763; leave to appeal refused: Kalaba v Commonwealth [2004] FCAFC 326; Peter Bartlett, ‘Privacy Down Under’ (2010) 3(1) Journal International Media and Entertainment Law 145, 151, 172.

94

Until the courts develop a statutory or a common law tort of privacy, they will struggle to protect personal images under the common law. One possibility is the tort of trespass which will be actionable when a person interferes with another person’s body or property.20 Given that the tort of trespass requires a physical interference, it is unlikely that it will provide adequate protection for personal images that are shared on social networks. This is because when people take pictures of people and share them on social networks, there is no physical interference to the person’s image.21 Thus the tort of trespass to person or land will not provide adequate protection for personal images shared on social networks. Another possible common law cause of action that may be relevant is the tort of nuisance. This tort may prevent the use of personal images when the images have been captured by interfering with another person’s use or enjoyment with their land or leads to physical harm.22 This may be the case, for example, when a third party takes photographs of a person in their home.23 One of the limitations of the tort is that an action for nuisance can only be brought by people who own the premises or hold the title over the premises where the tort occurs. Thus, only a person who owns the land has a right to sue; other parties cannot bring an action.24 As a result, when people take pictures of other people on private premises, it is unlikely that the tort of nuisance will provide any protection.

20 Collins v Wilcock (1984) 1 WLR 1172, where going about daily life may risk forms of physical contact when consent may be inferred – for example, public transport or walking on a busy street. See also Australian Law Reform Commission, Serious Invasions of Privacy in the Digital Era, Report 123 (2014) Chapter 3: Overview of Current Law. 21 This also applies to an action for trespass to land, because only a person who has title over that land is entitled to sue, so in situations where a person takes a picture of a person at a wedding, or in hospital, there is no right under trespass to land to sue. See Kay v Robertson [1991] FSR 62; Douglas v Hello! Ltd [2005] EWCA Civ 595 (18 May 2005). 22 Rosalie Balkin and Jim Davis, Law of Torts, 5th ed. (LexisNexis Butterworths, 2013) Ch 14; see also Australian Law Reform Commission, Serious Invasions of Privacy in the Digital Era, Report 123 (2014), Chapter 3: Overview of Current Law. 23 See Raciti v Hughes (1995) 7 BPR 14 837 where the plaintiffs were granted an injunction to prevent motion-triggered lights and surveillance cameras from targeting their backyard; see Australian Law Reform Commission, Serious Invasions of Privacy in the Digital Era, Report 123 (2014), Chapter 3: Overview of Current Law. 24 Hunter and Others v Canary Wharf Ltd; Hunter and Others v London Docklands Corporation [1997] AC 655; Oldham v Lawson (No 1) [1976] VR 654.

95

Another way that the common law may prevent the publication of personal images shared on social networks is via the tort of defamation.25 The tort of defamation may be available as a cause of action when the publication of a personal image on a social network is damaging to a person’s reputation.26 In order to establish defamation, there are three key requirements that need to be established. The first requirement is that the plaintiff is identified as an individual.27 When a photograph of a person is published online, there is usually little problem in satisfying this requirement (although there may be problems in some cases, for example, where a person’s identity is obscured). The second requirement is that the image is published to a third party.28 Where a photograph is published online this requirement will be satisfied.29The third requirement that needs to be satisfied is that there is a defamatory matter.30 What constitutes a defamatory matter is construed broadly and includes ‘hatred, contempt and

25 Prior to the Uniform Defamation laws, some states and territories indirectly protected private information in photographs if a defendant could not justify that the publication was in the public interest, or it was true – see Defamation Act 2005 (NSW); Defamation Act 2006 (NT); Defamation Act 2005 (Qld); Defamation Act 2005 (SA); Defamation Act 2005 (Tas); Defamation Act 2005 (Vic); Defamation Act 2005 (WA); Civil Law (Wrongs) Act 2002 (ACT) Ch 9; Defamation Act 2006 (NT) 2006. 26 See David Rolph, ‘Dirty Pictures: Defamation, Reputation and Nudity’ [2005] 10(7) Law Text Culture 101, 101-2; see generally, Andrew T. Kenyon, ‘Imputation or Publication: The Cause of Action in Defamation’ [2004] 27(1) University of New South Wales Law Journal, 100 ; Mirror Newspapers v Harrison [1982] HCA 50; (1982) 149 CLR 293, 295 (Mason J); Trkulja v Google (No 5) [2012] VSC 533 where the plaintiff’s name was associated with images and names of high profile criminal figures in the defendant’s search engine; Andrew Clarke, John Devereux, Julia Werren and Jennifer O’Reilly, Torts, A Practical Learning Approach ( 3rd ed LexisNexis Australia) 809. 27 See generally Andrew Clarke, John Devereux, Julia Werren and Jennifer O’Reilly above n 26, 811 where the authors state that the plaintiff must be able to show that the defamatory statement could be taken by others to refer to them, for example when a plaintiff’s name or image is used, whether the action will be successful will depend on whether or not the person is identifiable as an individual: Knupffer v London Express Newspapers Ltd [1994] AC 116, 124 where Lord Potter stated that ‘The size of the class, the generality of the charge and the extravagance of the accusation may all be elements to be taken into consideration but that none of them is conclusive’. 28 See generally Andrew Clarke, John Devereux, Julia Werren and Jennifer O’Reilly above n 26. 29 A publication may relate to different forms of media such as newspaper, magazines, television programs, internet communications for example blogs, tweets, online publications, YouTube clips, postings on Facebook and other social networking sites: see Andrew Clarke, John Devereux, Julia Werren and Jennifer O’Reilly above n 26, 812. 30 See Andrew Clarke, John Devereux, Julia Werren and Jennifer O’Reilly above n 26.

96

ridicule’ or statements that cause the plaintiff to be shunned and avoided.31 One situation where a publication may be defamatory is where the photograph is of a person who is naked or where it exposes body parts.32 This is because the exposure of a person’s genitalia may damage their reputation and expose them to ridicule.33 As Gibson DCJ. recently noted in relation to an action for defamation involving the publication of a photograph of a person’s genitalia: the sting of the libel lay in being photographed in circumstances outside the normal, namely with disregard to the social taboos of nakedness and/or lack of dignity. In fact, even if the person photographed partially naked did not intentionally disrobe and/or permit the taking

of the photograph, being photographed partially nude may be sufficient to be defamatory.34

31 See Andrew Clarke, John Devereux, Julia Werren and Jennifer O’Reilly above n 26. See also, Ettinghausen v Australian Consolidated Press (1991) 23 NSWLR 443; Anderson v Gergory [2008] QCA 419, where the court held that the plaintiff was exposed to ridicule by a digitally altered photograph inferred meaning that the plaintiff had an eating disorder. 32 Australian Consolidated Press Ltd v Ettinghausen, unreported CA40079/93, CA (NSW) Gleeson CJ, Kirby P and Clarke JA, 13 October 1993, Ettinghausen v Australian Consolidated Press Ltd , unreported, SC (NSW_ No 12807/91 Hunt CJ at CL, 11 March 1993; Ettinghausen v Australian Consolidated Press Ltd, (1991) 23 NSWLR 443; Shepherd v Walsh [2000] QSC 177; Shepherd v Walsh [2001] QSC 358; Shepherd v Walsh, unreported SC (Qld), No S49/96, Jones J, 8 May 2001. 33 Australian Consolidated Press Ltd v Ettinghausen, unreported CA40079/93, CA (NSW) Gleeson CJ, Kirby P and Clarke JA, 13 October 1993, Ettinghausen v Australian Consolidated Press Ltd, unreported, SC (NSW_ No 12807/91 Hunt CJ at CL, 11 March 1993, Ettinghausen v Australian Consolidated Press Ltd, (1991) 23 NSWLR 443. Shepherd v Walsh [2000] QSC 177, Shepherd v Walsh [2001] QSC 358, Shepherd v Walsh, unreported SC (Qld), No S49/96, Jones J, 8 May 2001. See David Rolph, above n 26, 101-2, 110, where Rolph argues that situations where the publications of photographs are defamatory involve the ‘concept of reputation as dignity.’ Further 124 where Rolph argues that the decision in Ettinghausen was ‘influential in legal terms. They encouraged others to use and his imputations formed the precedent for prospective litigants’ pleadings. Indeed, the central imputation in Shepherd v Walsh was explicitly based on the imputation of exposure to ridicule originally approved by Hung J.’ Rolph states, ‘it is perhaps paradoxical that plaintiffs who complain that a publication of a naked photograph exposed them to more than a trivial degree of ridicule seek to assuage the insult to their dignity by agitating the issue.’ 34 Mossimani by his Tutor Karout v Australian Radio Network Pty Ltd [2016] NSWDC Gibson DCJ 23, stated this ‘was the case in McDonald v The North Queensland Newspaper Co Ltd [1997] Qd R 62, where a photograph of a footballer being tackled revealed his penis. There was no suggestion that he had permitted the photograph to be taken, as the sting of the libel was that his penis was showing.’ See generally for example, personal images depicting nudity, Australian Consolidated Press Ltd v Ettinghausen, unreported CA40079/93, CA (NSW) Gleeson CJ, Kirby P and Clarke JA, 13 October 1993; Ettinghausen v Australian

97

The online publication of a personal image may also be defamatory when the image is distorted or altered (photoshopped)35, where the image is uploaded along with accompanying text that is false or misleading,36 or where the context in which the image is displayed places the plaintiff in a bad light (by, for example, associating them with high profile criminal figures).37 In all cases, the plaintiff would need to show that the imputation or inference that is conveyed in the published photograph is capable of being defamatory, that is that the publication gives rise to an inference that is damaging to the plaintiff’s reputation. In thinking about the fate of personal images published online, it is important to note that as Kirby J said, the standard for what may be defamatory may vary in accordance to current social standards: In most circumstances, it ought not to be the case in Australia that to publish a statement that one adult was involved in consenting, private homosexual activity with another adult involves a defamatory imputation…. However, it would ignore the reality of contemporary Australian society to say that that day has arrived for all purposes and all people. At least for people who treat their sexuality as private or secret, or people who

Consolidated Press Ltd , unreported, SC (NSW_ No 12807/91 Hunt CJ at CL, 11 March 1993; Ettinghausen v Australian Consolidated Press Ltd, (1991) 23 NSWLR 443; Shepherd v Walsh [2000] QSC 177; Shepherd v Walsh [2001] QSC 358; Shepherd v Walsh, unreported SC (Qld), No S49/96 Jones J, 8 May 2001. 35 Hanson-Young v Bauer Media Ltd (No 2) [2013] NSWSC 2029 (9 December 2013) where Senator Hanson-Young’s image was photoshopped on a lingerie model’s body posing at the entrance of a bedroom. 36 See Trkulja v Google (No 5) [2012] VSC 533. See for example, when a woman took a photograph of a man posing with a cut out of Darth Vader was uploaded on Facebook, along with accompanying text “Ok people, take a look at this creep. Today at Knox he approached my children when they sitting at the frozen movie in the children’s clothing section, he said “hey kids” they looked up and he took a photo, then he said I’m sending this to a 16 yr. old. I immediately removed the kids from that area and took them to security at the front so I then followed them and took his picture and he took off. Centre management were straight onto and so are the police, hopefully he is caught. Police said if he is a registered sex offender he will be charged, this happened at Knox, be safe with your kids’. The man however was a father taking selfie of himself (not the kids) to send to his own children as a daggy dad joke. See further detail Lisa Vass , ‘‘Creep’ shamed on Facebook was actually man taking selfie with Darth Vader’, 11 May 2015, Naked Security, < https://nakedsecurity.sophos.com/2015/05/11/creep-shamed-on-facebook-was-actually-man-taking-selfie- with-darth-vader/ >

37 Trkulja v Google (No 5) [2012] VSC 533.

98

have presented themselves as having a different orientation, such an imputation could,

depending on the circumstances still sometimes be defamatory. 38

One of the key problems that a plaintiff faces in this context is that truth is a complete defence to defamation. This is important because when a person’s image is captured in a photograph and published on a social network, it is a true account and thus a potential defence to an action for defamation. Another problem that a plaintiff would face is that the courts seem to have set a high standard when it comes to proving defamation by way of a photoshopped photograph, this is particularly the case where the alteration is intended to be humorous.39 The restrictive attitude of the courts in this context can be seen in Mossimani by his Tutor Karout v Australian Radio Network Pty Ltd 40. This decision arose after a photograph taken of the plaintiff in a night club was uploaded on Facebook and subsequently reused and recirculated. The photograph showed the defendant embracing his girlfriend and people dancing in the background. The plaintiff had an unusual haircut, specifically a mullet. Following the publication of the image, a number of memes using the plaintiff’s image began to circulate on the internet. The plaintiff’s image was photoshopped and reused on a number of different photographs including Mount Rushmore, a pin the tail on the donkey, Pythagoras, a dollar bill, a horse, and a Joe Dirt movie poster.41 After the photographs went viral the images were republished in The Daily Mail and The Daily Telegraph. The plaintiff claimed that the publication of the photoshopped images were defamatory because they exposed him to ridicule and suggested that he was ugly and stupid. Gibson DCJ struck out the majority of the plaintiff’s claims because ‘even photoshopped images of the plaintiff would fall outside the imputations required for an image to be defamatory’.42 Gibson DCJ said that the images needed to be viewed in the context as a whole and that ‘the matter of complained of is commenting about his hairstyle

38 John Fairfax Publications Pty Ltd v Rivkin (2003) 201 ALR 77, 140, (Kirby J). 39 Hanson-Young v Bauer Media Ltd (No 2) [2013] NSWSC 2029 (9 December 2013) Compared to Australian Consolidated Press Ltd v Ettingshausen (Unreported, Court of Appeal NSW, Gleeson CJ, Kirby P and Clarke JA, 13 October 1993) 15 (Kirby P); David Rolph, above n 26, 104-7. 40 (ACN 065986 987) [2016] NSWDC. 41 Mossimani by his Tutor Karout v Australian Radio Network Pty Ltd (ACN 065986 987) [2016] NSWDC. 42 Mossimani by his Tutor Karout v Australian Radio Network Pty Ltd (ACN 065986 987) [2016] NSWDC Gibson DCJ, 109.

99

being ridiculous, and this is not the same as saying that the plaintiff is ugly’.43 Further Gibson DCJ said that none of the images ‘suggest physical ugliness on the part of the plaintiff let alone ‘hideous’ ugliness. The plaintiff has not been compared to Frankenstein or some other hideously ugly figure; his haircut has been criticised as ridiculous.’44 As Gibson DCJ stated, while ‘the matter complained of publishes memes which portray the plaintiff in a humorous light, any defamatory meaning drawn from the publication as a whole would be so slight as to be de minimis.’45 As a result, when personal images are reused or published in a humorous way, as in Mossimani, it is unlikely that they will be defamatory.46 This is an important limitation on the ability of the tort to be useful in protecting personal images online.

4.3 Statutory Protection

There are two sources of statutory law that protect personal images in Australia: Commonwealth and state legislation. In 1988, the Commonwealth government enacted the

Privacy Act 1988 (Cth).47 The Privacy Act also fulfilled Australia’s international obligations

43 Ibid 108. 44 Ibid. 45 Mossimani by his tutor Karout v DailyMail.com Australia Pty Ltd (2016/210991); Mossimani by his tutor Karout v Nationwide News Pty Ltd (2016/210996); Mossimani by his tutor Karout v Australian Radio Network Pty Ltd (ACN 065 986 987) 13 unreported decision (Gibson DCJ). 46 Mossimani by his tutor Karout v DailyMail.com Australia Pty Ltd (ACN 166 912 465); Mossimani by his tutor Karout v Nationwide News Pty Ltd (ACN 008 438 828); Mossimani by his tutor Karout v Australian Radio Network Pty Ltd (ACN 065 986 987) (No. 2) [2016] NSWDC 357 Gibson DCJ held at 10 that: ‘the whole tenor of the matter complained of is that, to use the actual words of the publication, the plaintiff had become an “internet sensation” because of his “hair-larious” mullet hairstyle, which had resulted in “hilarious memes” and that the plaintiff’s friends (and, by inference, the plaintiff, although he said he “couldn’t care less”) were “loving the attention”. The highest that the matter complained of could be put is that the plaintiff’s hairstyle had provoked a sensational internet response, including humorous memes, a meaning which Mr Rasmussen acknowledged could not amount to a defamatory act or condition because it was so trivial as to have no defamatory content.’ 47 The Privacy Act 1988 (Cth) was introduced as a result of the gaps in the law identified in a series of ALRC inquiries into the state of privacy protection: see Australian Law Reform Commission, Privacy Proposals, Report No 22 (1983); Australian Law Reform Commission, Unfair Publication: Defamation and Privacy, Report No 11 (1979); One of the consequences of the decision in Victoria Park Racing and Recreation Grounds Co Ltd v Taylor (1937) 58 CLR 479, 504–5 is that the courts held that there is no recognised right to privacy in Australia.

100

with respect to privacy.48 The Privacy Act contains privacy principles that relate to the way in which federal government departments or agencies and Australian corporations treat personal information.49 The Privacy Act did not affect any privacy laws of a state or territory.50 Each state and territory may have specific regulations managing personal information in relation to personal images.51 There is no prescribed manner of regulating personal information under state or territory law.52

4.3.1 Commonwealth Privacy Legislation

The primary source of federal protection of privacy law in Australia is the Privacy Act 1988 (Cth). The Privacy Act regulates personal information that is handled by the Australian federal government and the private sector. The Privacy Act includes 13 Australian Privacy Principles (APPs) that govern and regulate the handling of personal information by federal government departments or agencies or Australian corporations.53 In Australia, the Privacy Act provides protection for personal information in certain specific situations. The Privacy Act defines personal information as ‘information or an opinion about an identified individual, or an individual who is reasonably identifiable; whether the information or opinion is true or not; and whether the information or opinion is recorded in a

48 United Nations International Covenant on Civil and Political Rights (ICCPR) International Covenant on Civil and Political Rights, 16 December 1966, [1980] ATS 23, (entered into force generally on 23 March 1976), Art 1. 49 There are 13 Australian Privacy Principles (APPs) in Schedule 1 of the Privacy Act 1988 (Cth) that outline how government departments or agencies or Australian corporations manage personal information. 50 The Privacy Act 1988 (Cth) s 3 states: ‘It is the intention of the Parliament that this Act is not to affect the operation of a law of a State or of a Territory that makes provision with respect to the collection, holding, use, correction, disclosure or transfer of personal information (including such a law relating to credit reporting or the use of information held in connection with credit reporting) and is capable of operating concurrently with this Act.’ 51 See Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008). 52 Some states have legislation while others have administrative policies – for example, Western Australia and South Australia: see Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008). 53 Australian government agencies (and the Norfolk Island administration) and all businesses and not-for- profit organisations with an annual turnover of more than $3 million are covered by the 13 APPs from Schedule 1 of the Privacy Amendment (Enhancing Privacy Protection) Act 2012 (Cth) which amended the Privacy Act 1988 (Cth).

101

material form or not’.54 ‘Personal information’ potentially encompasses any information that identifies an individual, or their identity that is in recorded form.55 Personal information also includes ‘sensitive’ information – for example, information that is about an individual’s race, gender, political opinions or religious beliefs.56 There is little doubt that photographs of people would be classified as personal information and are thus potentially protected under the Privacy

54 Privacy Act 1988 (Cth), s 6(1); this definition was amended in 2013, with the Privacy Amendment (Enhancing Privacy Protection) Act 2012 (Cth) (Amending Act) which commenced in March 2014 and amended the definition of ‘personal information’ in the Privacy Act 1988 (Cth) as ‘personal information means information or an opinion about an identified individual, or an individual who is reasonably identifiable: (a) Whether the information or opinion is true or not; an (b) Whether the information or opinion is recorded in a material form or not.’ 55 Privacy Act 1988 (Cth) s 6(1) defines a ‘record’ to include (a) a document; or (b) an electronic or other device’. See further Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008) Chapter 69 Particular Issues Affecting Children and Young People, Taking Photographs and Other Images, where it states that ‘The Privacy Act protects personal information that is held, or collected for inclusion, in a “record”. A “record” is defined to include a photograph or other pictorial representation of a person. If an individual’s identity is apparent, or can reasonably be ascertained, from a photograph or other image, then the collection, use and disclosure of that image is covered by the Privacy Act. This extends to video images as well as still photographs.’ 56 Privacy Act 1988 (Cth) s 6(1) defines sensitive as: ‘(a) information or an opinion about an individual’s: (i) racial or ethnic origin; or (ii) political opinions; or (iii) membership of a political association; or (iv) religious beliefs or affiliations; or (v) philosophical beliefs; or (vi) membership of a professional or trade association; or (vii) membership of a trade union; or (viii) sexual orientation or practices; or (ix) criminal record; that is also personal information; or (b) health information about an individual; or (c) genetic information about an individual that is not otherwise health information; or (d) biometric information that is to be used for the purpose of automated biometric verification or biometric identification; or (e) biometric templates.’

102

Act. This is on the condition that the individual’s identity is apparent or can reasonably be ascertained from the photograph.57

The legislation only applies to government departments and agencies,58 and to

Australian corporations (including non-for–profit organisations) (‘APP entities’).59 APP entities include Australian government departments and agencies as well as Australian corporations with a turnover of $3 million per annum.60 At first glance, it may appear that social networks

57 See further Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008), Chapter 69: Particular Issues Affecting Children and Young People, Taking Photographs and Other Images, which states: ‘If an individual’s identity is apparent, or can reasonably be ascertained, from a photograph or other image, then the collection, use and disclosure of that image is covered by the Privacy Act. This extends to video images as well as still photographs.’ The quality of protection of the Privacy Act for personal images that are shared online is limited, as is highlighted. This is because the scope of the Privacy Act does not apply to individuals, and as such personal images that are shared by people online fall outside the scope of the Act. 58 Privacy Act 1988 (Cth) s 6 definition of APP entities means an agency or organisation, see also the Australian Privacy Principles (APPs), as provided in Schedule 1 of the Privacy Act 1988 (Cth). The APPs provide for how Australian and Norfolk Island government agencies and all private sectors with an annual turnover of more than $3 million, and private health service providers must handle use and manage personal information. See also ‘organisations’ and ‘small business operators’ in section 6C section 6D, which may also have to comply with the APPs under the Privacy Act 1988 (Cth). 59 Privacy Act 1988 (Cth). The APPs guide Australian corporations that handle, collect and store personal information. 60 An entity that is not an APP entity (within the meaning of the Privacy Act) will be considered as a ‘small business’ if it has an annual turnover of less than $3 million dollars per annum: section 6D. There are notable exceptions with respect to ‘small business operators’ under section 6D (4): ‘an individual, body corporate, partnership, unincorporated association or trust is not a small business operator if he, she or it: (a) carries on a business that has had an annual turnover of more than $3,000,000 for a financial year that has ended after the later of the following: (i) the time he, she or it started to carry on the business; (ii) the commencement of this section; or (b) provides a health service to another individual and holds any health information except in an employee record; or (c) discloses personal information about another individual to anyone else for a benefit, service or advantage; or (d) provides a benefit, service or advantage to collect personal information about another individual from anyone else; or

103

are outside the scope of the Privacy Act because they are based overseas and not in Australia. However, the Privacy Act has an extra-territorial provision, which provides that a foreign entity61 will be caught by the Act if there is an Australian link.62 The Privacy Act potentially applies to any organisation that carries on business in Australia and the personal information is collected or held in Australia.63 This will mean that social networks like Facebook, Instagram

(e) is a contracted service provider for a Commonwealth contract (whether or not a party to the contract); or (f) is a credit reporting body.’ 61 Privacy Act 1988 (Cth) s 5B Extra Territorial Operation of This Act. 62 An Australian link is given the meaning under sections 5B (2) and 5B (3). See below. The Privacy Act 1988 (Cth) s 5B(1A) states: ‘This Act, a registered APP code and the registered CR code extend to an act done, or practice engaged in, outside Australia and the external Territories by an organisation, or small business operator that has an Australian link. An Australian link is given the meaning under s 5B (2), which states: ‘An organisation or small business operator has an Australian link if the organisation or operator is: (a) an Australian citizen; or (b) a person whose continued presence in Australia is not subject to a limitation as to time imposed by law; or (c) a partnership formed in Australia or an external Territory; or (d) a trust created in Australia or an external Territory; or (e) a body corporate incorporated in Australia or an external Territory; or (f) an unincorporated association that has its central management and control in Australia or an external Territory.’ 63 Carries on business ‘generally involve conducting some form of commercial enterprise, systematically and regularly with a view to profit’: Gebo Investments (Labuan) Ltd v Signatory Investments Pty Ltd [2005] NSWSC 544 [38]. It may also apply to any small business operator that carries on business in Australia that is not described in s 5B (2). See s 5B (3), which states that ‘An organisation or small business operator also has an Australian link if all of the following apply: (a) the organisation or operator is not described in subsection (2); (b) the organisation or operator carries on business in Australia or an external Territory; (c) the personal information was collected or held by the organisation or operator in Australia or an external Territory, either before or at the time of the act or practice.’ Power to deal with complaints about overseas acts and practices There may be issues with s 5B(3)(c), which refers to personal information collected in Australia, however. The Office of the Australian Information Commissioner, APP Guidelines - Chapter B Key Concepts - B.22 Personal Information in Australia (March 2015) Australian Government, The Office of the Australian Information Commissionerhttps://www.oaic.gov.au/agencies-and-organisations/app- guidelines/chapter-b-key-concepts explains that: ‘Personal information is collected ‘in Australia’ under s

104

and Twitter will be covered by the Act because they have registered offices in Australia and offer their social network services to Australians.64

The Privacy Act applies when an APP entity65 ‘holds, collects, or uses’ personal images.66 Under the Privacy Act, an APP entity is deemed to ‘hold’ a personal image if ‘the entity has possession or control of a record that contains the personal information’.67 The uploading of a personal image on to a social network page by an APP entity will constitute a ‘holding’. There are two situations in which an APP entity will ‘hold’ personal images on a social network. The first is when an APP entity uploads or shares personal images on their social network page. When this occurs, the APP entity is in possession of a personal image and consequently in control of the image it has uploaded. An APP entity does not need to ‘hold’ the personal images on its own information system because the scope of ‘holding’ extends beyond

5B(3)(c), if it is collected from an individual who is physically present in Australia or an external Territory, regardless of where the collecting entity is located or incorporated. An example is the collection of personal information from an individual who is physically located in Australia or an external Territory, via a website that is hosted outside Australia. This applies even if the website is owned by a company that is located outside of Australia or that is not incorporated in Australia.’ This was also highlighted in Explanatory Memorandum, Privacy Amendment (Enhancing Privacy Protection) Bill 2012, 218. 64 The term ‘carries on business in Australia’ has generally viewed as two elements that are connected; however, they can be considered separately: see Luckins v Highway Motel (Carnavon) Pty Ltd (1975) 133 CLR 164, [186] (Stephen J); Bray v F Hoffman-La Roche Ltd (2002) 118 FCR 1; ASIC v Active Super (No 1) [2012] FCA 1519, [47]. See further, Andrew Carswell, ‘The Sunday Telegraph Gets a Private Tour Around the Australian Facebook Offices’, The Daily Telegraph (28 December 2013), . Twitter also has a head office in Australia: see AAP, Twitter to Open Australian HQ in Sydney, Financial Review (2 September 2013), . See also Asher Moses, Privacy Watchdog Puts Bite on Facebook, Sydney Morning Herald, Digital Life (23 July 2009) 65 The Privacy Act applies to Australian government departments, agencies as well as Australian corporations with a turnover of $3 million per annum; see Privacy Act 1988 (Cth), s 6 where an ‘APP entity’ means an agency or organisation; also noteworthy is that, as an APP entity, the Privacy Act primarily provides for how personal information ought to be managed and protected. 66 Privacy Act 1988 (Cth) s 6 (1). The APPs guide Australian corporations that handle, collect and store personal information. 67 Privacy Act 1988 (Cth) s 6 (1).

105

a ‘possession to include a record that an entity has the right or power to deal with’68 a personal image. The second situation where an APP entity will ‘hold’ personal images is when the APP entity asks individuals to share their personal images on the APP entity’s social network site.69 The question that arises here is whether the APP entity has the right or power to deal with the personal image.70 An APP entity has the power to deal with a personal image by doing a number of different acts with the image, such as restricting or allowing access to third parties, or even removing the image from the social network page. A second situation where the Privacy Act will protect personal images is when an APP entity ‘collects’ images that are uploaded on an APP’s social network page. The question here is whether the uploading of an image on a social network page is a ‘collection’ under the Privacy Act. Under the Privacy Act, an APP entity will only ‘collect’ personal images if it is ‘for inclusion in a record or a generally available publication’.71 An APP entity may collect personal images when it directly uploads a personal image on to its social network page. For example, when a corporation runs a photograph a competition and the winning entry is published on their social network page. Here the corporation is collecting personal images to be made available on a social network. An APP entity that has images directly uploaded onto its social network page will be deemed to have ‘collected’ personal images. When an APP entity asks people to

68 See Office of the Australian Information Commissioner, Chapter 11 APP Guideline 11 Security of Personal Information, Holds, 11.5 (March 2015) Australian Government, Office of the Australian Information Commissioner ; see further Office of Australian Information Commissioner, APP Guidelines Chapter B Key Concepts, B.79-B.81 (March 2015) Australian Government, Office of the Australian Information Commissioner, . 69 See, for example, Adrien Danjou, ‘The Australian Open is Getting Increasingly Creative on Social Media’, Digital Sport (18 January 2016) . For example, #AusOpen has been identified as the official tournament’s hashtag, while #AOSelfie is a hashtag that tournament organisers will use to collect all the fan selfies during the event – all which are displayed on a digital wall in the tournament’s village. 70 See Office of the Australian Information Commissioner, The Guide to Securing Personal Information (January 2015) , which states that ‘the term “holds” extends beyond physical possession to include a record that an entity has the right or power to deal with. For example, an entity that outsources the storage of personal information to a third party, but retains the right to deal with that information, including to access and amend it, ‘holds’ that personal information.’ 71 Privacy Act 1988 (Cth) s 6(1).

106

share their personal images on the APP entity’s social network page, the personal images are collected by the APP entity and are recorded on the network page.72 Consequently, personal images that are shared on an APP entity’s social network page will constitute a ‘collection’ under the Privacy Act. A third situation where personal images will be protected under the Privacy Act is when an APP entity ‘uses’ personal images that are uploaded or shared on its social network page. While the term ‘use’ is not defined in the Act, the APPs suggest that an APP entity will ‘use’ a personal image if it ‘undertakes an activity with the information within the effective control’.73 When an APP entity uploads or shares a personal image on a social network page, the uploading of the image will be a ‘use’ of the image. The sharing of an image is a ‘disclosure’, which is another form of ‘use’. There are two situations where an APP entity will ‘use’ a personal image. The first is where an APP entity accesses and views a personal image that is shared on a social network site. This would be the case when an APP entity views personal images that have already been uploaded by individuals or third parties onto a social network such as Facebook.74

72 See Adrien Danjou, ‘The Australian Open is Getting Increasingly Creative on Social Media’, Digital Sport (18 January 2016) . 73 See Office of the Australian Information Commissioner, The APP Guidelines Chapter 6 [6.8] (February 2014) states: ‘The term “use” is not defined in the Privacy Act. An APP entity “uses” information where it handles or undertakes an activity with the information, within the entity’s effective control.’ For further discussion of use, see Chapter B (Key concepts). Examples include:  the entity accessing and reading the personal information  the entity searching records for the personal information  the entity making a decision based on the personal information  the entity passing the personal information from one part of the entity to another unauthorised access by an employee of the entity. See further Office of the Australian Information Commissioner, The APP Guidelines – Chapter B: Key Concepts (March 2015) . 74 For example, when a person ‘likes’ a page on Facebook, their personal images (and information generally) may be accessed by an APP entity. This results in the entity having access to the images because when a person ‘likes’ a page on Facebook, they are connected to the entity’s social network page, which allows them to have access to and thus ‘use’ of the images: ‘Liking a Page means you’re connecting to that Page … When you connect to a Page, you’ll start to see stories from that Page in your News Feed. The Page

107

An APP entity will also ‘use’ a personal image where they upload an image on to a social network.75 When an APP entity uploads and shares a personal image, they disclose it on their social network page. The APP Guidelines suggest that while disclosure is separate from use, it is often considered alongside use.76 The Privacy Act does not define ‘disclosure’. A ‘disclosure’ of a personal image occurs when an APP entity makes an image ‘accessible to others outside the entity and releases the subsequent handling of the information from its effective control’.77 When an APP entity shares a personal image on their social network page, third parties may have access to the image.78 When personal images are placed and shared on an APP entity’s social network page, the images are ‘published’ because they are made available to the public. As a result, an APP entity gives third parties access to the personal images that have been shared on their social network page.79 Consequently, even accessing or sharing (disclosing) a personal image will constitute a ‘use’ of the image.

will also appear on your profile, and you’ll appear on the Page as a person who likes that Page.’ See Facebook, Questions You May Have (2016), . 75 See Office of Australian Information Commissioner, APP Guidelines, Chapter B B.143 (March 2015), , where it states: ‘Generally, an APP entity uses personal information when it handles and manages that information within the entity’s effective control. Examples include:  the entity accessing and reading the personal information  the entity searching records for the personal information  the entity making a decision based on the personal information  the entity passing the personal information from one part of the entity to another.’ 76 See Office of the Australian Information Commissioner, The APP Guidelines 6 – Use and Disclosure (February 2014), https://www.oaic.gov.au/agencies-and-organisations/app-guidelines/chapter-6-app-6- use-or-disclosure-of-personal-information. 77 See Privacy Act 1988 (Cth); Office of the Australian Information Commissioner, The APP Guidelines 6 – Use and Disclosure - 6.9 Schedule 1 (February 2014) . 78 Disclosure was also highlighted in Pratt Consolidated Holdings Pty Ltd v Commissioner of Taxation [2011] AATA 907 [112]–[119]; see also Office of the Australian Information Commissioner, APP Guidelines, Chapter B (1 April 2015) < https://www.oaic.gov.au/agencies-and-organisations/app-guidelines>. 79 See Privacy Act 1988 (Cth), Office of the Australian Information Commissioner, The APP Guidelines 6 – Use and Disclosure - 6.9 Schedule 1 (February 2014) . ‘An APP entity discloses personal information when it makes it accessible or visible to others outside the entity and releases the subsequent handling of the personal information from its effective control. This focuses on the act done by the disclosing party, and not on the actions or knowledge of the recipient.’ See OAIC,

108

There are a number of limitations on the scope of the Privacy Act. The first, and one of the most important for the purpose of this thesis, is that the Privacy Act does not apply to individuals who store, collect, use and disclose personal information for personal, family or household purposes for private purposes.80 As was noted above, the Privacy Act only applies to government departments and agencies and APPs. As a result, the Privacy Act would not cover personal images that are shared by people on social networks. This is because both parties are ‘individuals’; consequently, images that are uploaded, posted or reposted by individuals would fall outside the scope of the Act.

Another limitation arises because employee records81 and information captured and shared for journalistic purposes are excluded for the scope of the Privacy Act.82 As a result, personal images that have been uploaded by employees or used by journalists are not covered under the Privacy Act.83 Another important limitation of the Privacy Act is that it does not apply to images that are held in a public record, that is to images held in a ‘generally available

Own Motion Investigation Report – Medvet SciencePty Ltd (July 2012) OAIC, ; OAIC, Own Motion Investigation Report – Telstra Corporation Limited (June 2012) OAIC . 80 Privacy Act 1988 (Cth), ss 7B (1), 16E on information that is used, collected or disclosed for personal, family or household purposes. See also Office of Australian Information Commissioner, FAQ, Government Office of the Australian Information Commissioner, which provides that ‘the Privacy Act doesn’t cover individuals acting in a personal capacity. This means you generally can’t enforce a privacy right against an individual, though you may have actions against them under other laws. For example, while you may not be able to make a complaint under the Privacy Act about an individual who posts your personal information on a social networking site’. www.oaic.gov.au < https://www.oaic.gov.au/individuals/faqs-for-individuals/social-media-ict-identity-security/social- media> 81 Privacy Act 1988 (Cth), s 7B(3) personal images will be subject to contractual arrangements between employer and employee; it is also noteworthy is that there is uncertainty about whether there is adequate legal protection for personal information of employees because the issue is dealt with outside privacy law. The Attorney-General had noted that this issue was important and worthy of privacy protection; however, he deemed that personal information of employees was protected under workplace relations legislation: Commonwealth, Parliamentary Debates, House of Representatives, 12 April 2000, 15749 (D Williams, Attorney-General); see Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008). 82 Excludes media organisations acting in the course of ‘journalism’ see further Privacy Act 1988 (Cth) s 7b (4a). 83 There are other areas of law such as breach of confidence which may protect personal images, this is highlighted in Chapter 5.

109

publication’.84 The key issue here is whether a personal image on a social network is a public record. ‘Generally available publication’ is defined to mean ‘a magazine, book, article, newspaper or other publication that is, or will be, generally available to members of the public a) whether or not it is published in print, electronically or in any other form, and b) whether or not it is available on the payment of a fee’.85 This definition is broad enough to include anything that is shared or placed on the internet. Whether a personal image that is shared on a social network is ‘generally available’ will depend on the social network in question. It will depend on the ability of the social network’s privacy settings to control access to the social network page. As noted in Chapter 2 social networks such as Facebook, Twitter and Instagram have privacy settings that allow people to restrict access to their images. One situation where a personal image on a social network may not be ‘generally available’ is when a person uses the privacy settings to restrict third parties from obtaining access to their images. In this situation the image will only be visible to the people who they are connected to within the social network. Here, the public cannot access the personal image on a social network. Problems arise however, when a third party reshares a personal image that is restricted. When this occurs, access to the image will depend on the third party’s privacy settings. One problem that arises when personal images are shared or uploaded on a social network is that an image can go from being restricted and ‘private’, and not publicly available, to being reshared and accessed by the public simply by resharing the image. A second situation where a personal image that is shared or uploaded on a social network will not be ‘generally available’ is when a third party gives access to another person and they take a picture or a screen shot of the image. For example, when a third party has access to a personal image shared on a social network and they show the image to another person. When this occurs, the image may be on a social network but only be available to a select audience. As a result, a personal image that is shared on a social network but is restricted to a select audience will not be ‘generally available’.

84 The Privacy Act 1988 (Cth) s 6(1) defines ‘record ‘to include: ‘(a) a document; or (b) an electronic or other device’ but does not include: ‘(d) a generally available publication; or (e) anything kept in a library, art gallery or museum for the purposes of reference, study or exhibition.’ 85 Privacy Act 1988 (Cth) s 6(1): ‘generally available publication’.

110

Personal images that are shared on social networks will not be protected under the Commonwealth privacy legislation when the images are reshared by individuals (acting in a personal capacity as distinct from APP entitities and government agencies and departments) and are publicly available. This means that when people upload their images and third parties reshare these images, the images will fall within the public domain. This occurs, for example, when personal images are found on Google Images or when people can search for photographs on social networks such as Twitter or Instagram without having a social network account. Another limitation with the protection of the Privacy Act is that if a person consents to their image being held, collected or used by an APP, the Privacy Act will not apply. Consent has two purposes under the Privacy Act. The first is that it acts as an exception when an APP entity collects and uses personal images.86 The second is that consent authorises the use of personal images when an APP entity collects and uses personal images for marketing purposes.87 Consent may be given impliedly through the terms of use of a social network. This may occur when a person signs up to a social network and connects with an APP entity (for example, a bank or a store’s social network page). However, an APP entity would need to obtain the consent of an individual when using their image for a different purpose than those for which it is originally collected. This would occur, for example, when an APP entity has collected personal images for online competitions and subsequently uses the images in an advertising campaign.88

4.3.2 State and Territory Privacy Legislation

As discussed above, the Commonwealth Privacy Act only applies to federal government department and agencies, and to APP entities that handle personal information. This leaves many gaps in the regulation of personal information in Australia.89 In response, the states and

86 See Privacy Act 1988 (Cth), Sch 1, APPs 3.3 (a), 6.1 (a). 87 See Privacy Act 1988 (Cth) Sch 1, APPs 7.3, 7.4, 8.2 (b). It is not a requirement to get consent when using personal images of an individual unless the image records ‘sensitive information’; see further Office of Australian Information Commissioner, FAQ, Government Office of the Australian Information Commissioner . 88 For example, ANZ’s campaign to donate two dollars for every selfie shared on its #headbandforgood Twitter page. 89 Information Privacy Act 2014 (ACT); Privacy and Personal Information Protection Act 1998 (NSW); Health Records and Information Privacy Act 2002 (NSW); Information Act (NT); Information Privacy

111

territories have developed privacy legislation or administrative regimes to protect personal information. For example, Queensland, Victoria, New South Wales, the Australian Capital Territory, and the have privacy legislation to regulate personal information.90 South Australia regulates personal information through an administrative instruction that requires compliance by the South Australian government departments and agencies,91 while Western Australia regulates personal information under the Freedom of

Information Act.92

State privacy legislation93 applies to state government public sector bodies.94 In some cases, state privacy legislation will also apply to private sector organisations. For example,

Act 2009 (Qld); Personal Information and Protection Act 2004 (Tas); Privacy and Data Protection Act 2014 (Vic). 90 Privacy and Personal Information Protection Act 1998 (NSW); Information Privacy Act 2009 (Qld); Premier and Cabinet Circular No 12 (SA); Personal Information Protection Act 2004 (Tas); Privacy and Data Protection Act 2014 (VIC); Information Privacy Act 2014 (ACT); Information Act (NT). 91 Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008) . 92 See Freedom of Information Act 1992 (WA); see also further Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008) . 93 State and territory privacy legislation herein after referred to as ‘state’ privacy legislation. 94 That regulate the collection, use and disclosure of personal information. New South Wales, Australian Capital Territory and Victorian state privacy legislation applies to the public sector; see further Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008) . See for a general overview on state privacy legislation, Mick Batskos, ‘Balancing the Treatment of “Personal Information” Under FOI and Privacy Laws: A Comparative Australian Analysis’, paper presented at the National Administrative Law Conference Perth, 25 July 2014; see also Carolyn Doyle and Mirko Bagaric, Privacy in Australia (Federation Press, 2005) 98–114.

112

privacy legislation in New South Wales, Queensland, the Australian Capital Territory and

Victoria also applies95 to the private sector when the information relates to health information.96

95 See Health Quality and Complaints Commission Act 2006 (Qld). The Act applies to both private and public health service delivery. See Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008) , where the New South Wales Health Records and Information Privacy Act 2002 (NSW) regulates health information handled by the New South Wales public sector and the private sector; Victoria has a Health Records Act 2001 (Vic) ss 10–11, which relates to the handling of all health information held by public sector health service providers and the private sector. See generally Mick Batskos, above n 94; see Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008) ; see for a general overview on State privacy legislation, Mick Batskos, ‘Balancing the Treatment of ‘Personal Information’ Under FOI and Privacy Laws: A Comparative Australian Analysis’, [2015] AIAL Forum, No. 80, 28, 29-53. http://search.informit.com.au/documentSummary;dn=258903579858286;res=IELAPA; Carolyn Doyle and Mirko Bagaric, above n 94; Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008) http://www.alrc.gov.au/publications/2.%20Privacy%20Regulation%20in%20Australia/state-and- territory-regulation-privacy states that: ‘State and territory legislation creates information privacy requirements similar to those under the Privacy Act, with application to state and territory government agencies, as well as (variously) local councils, government-owned corporations and universities.’ 96 See Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008) http://www.alrc.gov.au/publications/2.%20Privacy%20Regulation%20in%20Australia/state-and- territory-regulation-privacy. See also Mick Batskos, above n 116. Notably, South Australia and Western Australia do not have a privacy regime: see Australian Law Reform Commission, Other Privacy Legislation, Australian Government Australian Law Reform Commission, https://www.oaic.gov.au/privacy-law/other-privacy-jurisdictions#state-and-territory-privacy.

113

While the definition of personal information varies between states and territories,97 the definition is similar to that used by the Commonwealth Privacy Act:98 personal information is information about an individual whose identity is apparent or ascertainable, whether or not recorded in a material form.99 State privacy legislation, like the Commonwealth legislation, does not apply to individuals who handle personal images on social networks. However, like the Commonwealth legislation, state privacy legislation may provide limited protection for personal images that are shared on social networks. State privacy legislation only applies to state public sector government agencies and departments that handle personal information.100 ‘Handling’ is a broad term, which is defined

97 For example, Tasmanian legislation defines ‘personal information’ as any information or opinion in any recorded format about an individual (a) whose identity is apparent or is reasonably ascertainable from the information or opinion; and (b) who is alive or has not been dead for more than 25 years: Personal Information Protection Act 2004 (Tas) s 3; Victoria’s Privacy and Personal Data 2014 defines personal information as ‘information or an opinion (including information or an opinion forming part of a database), that is recorded in any form and whether true or not, about an individual whose identity is apparent, or can reasonably be ascertained, from the information or opinion, but does not include health information’: Privacy and Data Protection Act 2014 (Vic) s 3; New South Wales also defines ‘personal information’ as ‘information or an opinion (including information or an opinion forming part of a database and whether or not recorded in a material form) about an individual whose identity is apparent or can reasonably be ascertained from the information or opinion’; see Privacy and Personal Information Protection Act 1998 (NSW) s 4; Queensland’s (Qld) s 12 defines personal information as ‘information or an opinion, including information or an opinion forming part of a database, whether true or not, and whether recorded in a material form or not, about an individual whose identity is apparent, or can reasonably be ascertained, from the information or opinion’. 98 See Privacy Act 1988 (Cth) s 6(1), which defines personal information as ‘information or an opinion about an identified individual, or an individual who is reasonably identifiable; whether the information or opinion is true or not; and whether the information or opinion is recorded in a material form or not’. 99 Some states and territories also include biometrics and fingerprinting identification when defining personal information. 100 Privacy and Personal Information Protection Act 1998 (NSW); Information Privacy Act 2009 (Qld); Premier and Cabinet Circular No 12 (SA); Personal Information Protection Act 2004 (Tas); Privacy and Data Protection Act 2014 (VIC); Information Privacy Act 2014 (ACT); Information Act (NT). See Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report 108 (2008), http://www.alrc.gov.au/publications/2.%20Privacy%20Regulation%20in%20Australia/state-and- territory-regulation-privacy; see also Australian Law Reform Commission, Serious Invasions of Privacy in the Digital Era, Chapter 3: Overview of Current Law, Report 123,

114

as ‘collecting, holding, managing, using, disclosing or transferring’ personal information.101 The terms ‘collection, use, disclosure and holding’ were examined above in the context of Commonwealth privacy legislation. Given that is likely that these terms will have the same meaning in State legislation as under Commonwealth legislation, they will not be discussed again. Instead I will focus on those terms that have not yet been examined: the meaning of

‘transfer’ and ‘manage’.102

While ‘transfer’ is not defined in state and territory legislation,103 if its ordinary meaning is applied, it will mean ‘to remove from place to another’.104 One situation where a ‘transfer’ may

http://www.alrc.gov.au/publications/3-overview-current-law/existing-legislative-privacy- protection#_ftn16. 101 Privacy and Data Protection Act 2014 (Vic) s 20 (1) states that an organisation ‘must not do an act, or engage in a practice, that contravenes an Information Privacy Principle in respect of personal information collected, held, managed, used, disclosed or transferred by it’. Section 20 (2) states that, ‘A public sector agency or a Council must, in administering a public register, so far as is reasonably practicable, not do an act or engage in a practice that would contravene an Information Privacy Principle in respect of information collected, held, managed, used, disclosed or transferred by it in connection with the administration of the public register if that information were personal information.’ State privacy legislation will apply where a state public organisation body collects, uses, holds and discloses personal images. One situation where a public sector organisation ‘collects, uses and holds’ personal images is when a state public school takes pictures of children and uploads or posts them up on its website or includes them in an electronic newsletter. However, it is noted that neither Victorian nor Queensland legislation defines ‘collects’ or ‘handles’. 102 Transferring and managing personal information are covered in Victorian and Queensland legislation. For example, the Privacy and Data Protection Act 2014 (Vic) s 20(2) provides for public sector organisations not to contravene information privacy principles with respect to collection, use, storage, transfer and managing of personal information; Queensland has a similar provision, Information Privacy Act 2009 (Qld) s 6, which states that ‘6 Scope of personal information under this Act applies to the collection of personal information, regardless of when it came into existence, and to the storage, handling, accessing, amendment, management, transfer, use and disclosure of personal information regardless of when it was collected’. While New South Wales only ‘manages’ personal information, see Information Privacy Commission, PPIP Act, http://www.ipc.nsw.gov.au/ppip-act#. 103 The following state legislation does not define ‘transfer’; see Privacy and Data Protection Act 2014 (Vic); Personal Information Protection Act 2004 (Tas); Information Act (NT). The exception is Queensland, which has provisions for the transfer but does not actually define the term: Information Privacy 2009 (Qld) s 33 provides for the transfer of personal information outside of Australia. 104 See Cambridge Dictionary, which defines ‘transfer’ to move someone or something from one place, vehicle, person, or group to another’, http://dictionary.cambridge.org/dictionary/english/transfer.

115

occur is when a public sector organisation moves or shifts personal images from its information system to its social network page. Another situation where a public sector organisation might transfer personal images is when it outsources the holding of personal images to a foreign entity.105 When this occurs, the public sector organisation will need to comply with the information privacy principles incorporated into the relevant legislation.106 A further situation where state privacy legislation will protect personal images is when a public sector organisation ‘manages’ personal images. ‘Managing’ is not defined in state privacy legislation.107 If an ordinary meaning is applied, a public sector organisation will ‘manage’ when they are ‘responsible for controlling or organising’ personal images.108 A public sector will ‘manage’ personal images when they upload them on to their social network page.109 There are a number of situations where state privacy legislation will not apply to protect personal images. This includes situations where personal images shared on social networks are publicly available – for example, when personal images are shared and are visible to third parties, such as personal images that are found on Google Images or Facebook. Personal images that are visible without the requirement of having a social network account, subscription or

105 For example, a public sector organisation may ‘transfer’ personal information to an entity outside of Australia in some cases where it is necessary for the function of the public sector organisation: see Information Privacy 2009 (Qld) s 33, which provides for the transfer of personal information outside Australia. 106 Each state and territory that has privacy legislation must comply with the Information Privacy Principles; these are similar to the Commonwealth’s APP. See further Privacy and Data Protection Act 2014 (Vic) s 17. The Information Privacy Act 2009 (Qld) s 33 provides for the transfer of personal information outside Australia. Personal Information Protection Act 2004 (Tas); Information Act (NT). 107 Privacy and Data Protection Act 2014 (Vic) s 17 states that a public sector must do anything that would contravene IPP that is ‘collected, held, managed, used, disclosed or transferred by it in connection with the administration of the public register if that information were personal information’. 108 See Cambridge Dictionary, which defines manages as ‘to be responsible for controlling or organizing someone or something, especially a business or employees,’ . 109 This will occur when a public sector organisation uploads personal images onto its social network page; the organisation is effectively controlling the images because the organisation chooses whether to allow or restrict access to the images on the social network page. Also noteworthy is that in Victorian privacy legislation, ‘managing’ refers to the administration of personal information see: Privacy and Data Protection Act 2014 (Vic) s 20.

116

profile fall within the meaning of being publicly available.110 When personal images are shared on social networks without restricted access, the images can be accessed by anyone. In this situation, the images are publicly available and will not be protected under state privacy legislation. State privacy legislation will also not apply when personal images are used for law enforcement purposes111 – for example, where state and territory law enforcement agencies search for personal images on social networks as a way of obtaining information in relation to criminal matters.112 State and territory privacy legislation will also not apply when the use of the image is in the public interest,113 or when the information is subject to freedom of information provisions.114

4.3 Conclusion

The chapter has shown that the common law potentially provides some protection for personal images via the torts of trespass, nuisance and defamation. However, the protection here is restricted. For example, the tort of trespass is restricted by the fact that there needs to be a direct and physical interference to a person. The tort of nuisance will also provide limited protection for personal images because taking photographs of people is not considered to be an interference with a person’s use or enjoyment of their land. As noted earlier, the tort of defamation may provide a remedy when personal images that are published online are defamatory. As the case law suggests, the courts are willing to prevent the publication of naked images or images of exposed body parts. Defamation may also relied upon when a person’s name is associated with someone else’s image in a manner that is false or misleading. Despite this, there are a number of potential limitations to the use of defamation in protecting against misuse online: the most important being that ‘truth’ is a defence to defamation and the fact that the courts have set high standards in proving online defamation, particularly where an image is

110 See Information Act 2002 (NT) s 68. Information privacy principles will not apply to publicly available information; Privacy and Data Protection Act 2014 (Vic) s 12; Personal Information Protection Act 2004 (Tas) s 8; Information Privacy Act 2009 (Qld) Sch 1. 111 Personal Information Protection Act 2004 (Tas) s 9; Information Privacy Act 2009 (Qld) s 29. 112 For example, when a person goes missing, see Privacy and Data Protection Act 2014 (Vic) s 15. 113 See Information Privacy Act 2009 (Qld) Sch 1, public interest disclosure; see also Privacy and Data Protection Act 2014 (Vic) s 29. 114 Privacy and Data Protection Act 2014 (Vic) s 14; see Information Privacy Act 2009 (Qld) s 5.

117

photoshopped for humorous purposes. In situations where a person’s image has not been altered or distorted but published online, it seems that defamation will be of limited use. Commonwealth privacy legislation also provides limited protection for personal images that are shared on social networks. However, upon closer examination there are significant problems with the Privacy Act. There are a number of factors that limit the operation of the Privacy Act in relation to personal images that are shared by people on social networks. One limitation is that journalists who use personal images for journalistic purposes are not covered by the Privacy Act.115 An important limitation is that the Privacy Act does not apply to individuals who share and exchange personal images on social networks, instead it only applies to government department and agencies and Australian APP’s. State privacy legislation also provides limited protection for personal images when state government departments and agencies handle personal information. In some states, privacy legislation also extends to private sector organisations that handle health information. The majority of private sector health service providers will be caught under both state and territory legislation. While many organisations, government departments and agencies will fall within the scope of state privacy legislation, private organisations that share personal images on social networks fall outside the scope of the legislation. Despite the protection provided by state legislation, there are a number of gaps in the existing law. One problem is that state privacy legislation is inconsistent and fragmented. The lack of uniformity means that the level of protection available for personal images that are shared on social networks is uncertain and unclear. State privacy legislation is also limited insofar as it excludes protection for personal images that are ‘publicly available’. As a result, when people share images on social networks, there is a risk that those images will fall in the public domain. While Australian privacy law provides some protection for personal images that are shared on social networks, the protection is limited and fragmented. It is clear that Australian

115 When people upload and share their personal images on social networks, journalists may use these images for journalistic purposes; this means that the use of the image would not be covered under the existing privacy legislation – see, for example, Jenni Ryan, ‘How a Darth Vader Selfie Showed the Worst Side of Social Media’, Mashable Australia (11 May 2015), ; see also Lisa Vaas, ‘“Creep” Shamed on Facebook was Actually Man Taking Selfie with Darth Vader’, Naked Security by Sophos (11 May 2015) .

118

privacy law provides, at best, limited protection to prevent the misuse of personal images on social networking sites. This leaves a significant gap in the law.

119

Chapter 5 Breach of Confidence, Personal Images and Social Networks

5.1 Introduction

The sharing of personal images on social networks has blurred the line between public and private life. It has also created a situation where people risk having the images they have taken of themselves and uploaded onto social networks being misused. People are in an even more precarious position when third parties place their image on a social network site. This chapter evaluates whether the Australian law of confidence is adequate to prevent the misuse of personal images in these two situations. One of the notable things about Anglo-Australian law is that there has been a reluctance to recognise a common law to a right to privacy.1 Rather, the law has developed specific legislation to deal with specific problems.2 The fate of personal images on social networks must be viewed in light of this. In Coco v AN Clark Engineers,3 Megarry J found that three elements must be satisfied for an action of a breach of confidence to succeed. These are as follows:

1. the information must have the necessary quality of confidence; 2. the information must have been imparted in circumstances importing an obligation of confidence; and 3. there must be an actual or threatened unauthorised use or disclosure of the

information to the detriment of the confider.4

When thinking about the role potentially played by breach of confidence in preventing the misuse of personal images on social networks, a number of questions arise. These are:5

1 Tanya Aplin et al, Gurry on Breach of Confidence: The Protection of Confidential Information, 2nd ed. (Oxford University Press, 2012) 13. 2 As evidenced by various intellectual property laws, such as copyright, trademarks, patents and breach of confidence. 3 [1969] RPC 41. This case related to protection of confidential information in relation to trade secrets. 4 Coco v AN Clark Engineers [1969] RPC 41, 47 (Megarry J). 5 Lionel Bently and Brad Sherman, Intellectual Property Law, 4th ed. (Oxford University Press, 2014) 1142. See generally, Tanya Aplin et al above n1, 13; Coco v AN Clark (Engineers) Ltd [1969] RPC 41; Saltman Engineering Co Ltd v Campbell Engineering Co Ltd (1948) 65 RPC 203 (Court of Appeal); See

120

1. Is the personal image is capable of being protected? 2. Is there an obligation to keep the personal image confidential? 3. Does the use of the personal image constitute a breach of confidence? 4. Does the defendant have a defence to an action for breach of confidence?

These are discussed below.

5.2 Is the Personal Image Capable of Being Protected?

One of the key questions that arises when reflecting on the role that the law of confidence potentially plays in preventing the misuse of personal images is whether an image is in fact information that is capable of being protected. The concept of ‘information’ here is very broad: it includes information in various forms, including video, text, drawings and photographs.6 It also includes various types of information, such as commercial information,7 medical lectures,8 marital secrets,9 cultural and religious secrets of Aboriginal and Torres Strait Islander

generally, Leo Tsaknis, ‘The Jurisdictional Basis, Elements and Remedies in the Action for Breach of Confidence: Uncertainty Abounds’ (1993) 5(1) Bond Law Review 18. 6 The term ‘information’ has been subject to much debate by scholars; see generally, Mark Burdon and Paul Telford, ‘The Conceptual Basis of Personal Information in Australian Privacy Law’, (2010) 17(1) eLaw Journal: Murdoch University Electronic Journal of Law 1, ; Jason Pizer, ‘The Public Interest: Exception to the Breach of Confidence Action: Are the Lights About to Change?’ (1994) 20 Monash University Law Review 67, 68; Greg Taylor, ‘Why is There No Common Law Right of Privacy?’ (2000) 26(2) Monash University Law Review 235, 240; Megan Richardson, ‘Breach of Confidence, Surreptitiously or Accidently Obtained Information and Privacy: Theory Versus Law’ (1994) 19 Melbourne University Law Review 673, 674; Louis v Smellie (1895) 73 LT 226; Nichrothern Electrical Co Ltd v Percy [1956] RPC 272; Nichrothern Electrical Co Ltd v Percy [1957] RPC 207 (Court of Appeal); Collins (Engineers) Ltd v Roberts & Co Ltd [1965] RPC 429; Saltman Engineering Co Ltd v Campbell Engineering Co Ltd (1948) 65 RPC 203 (Court of Appeal); Pollard v Photographic Co (1889) 40 Ch D 345; Creation Records Ltd v News Group Newspapers Ltd [1997] EMLR 444, 455; Douglas v Hello! Ltd [2003] EMLR 31 (Chancery Division); [2006] QB 125 (Court of Appeal); OBG Ltd v Allan [2008] 1 AC 1 (House of Lords). 7 Coco v AN Clark (Engineers) Ltd [1969] RPC 41, 48; Seager v Copydex [1967] 2 All ER 415. 8 Abernethy v Hutchinson (1824) 1 H & Tw 28; 47 ER 1313. 9 Argyll v Argyll [1967] Ch 302.

121

communities,10 and photographs.11 There is little doubt that personal images are capable of being protected under the law of confidence. While the scope and types of images capable of being protected is very broad, information that is trivial, immoral, vague or in the public domain will not be protected.

5.2.1 Are Personal Images Shared on Social Networks Trivial?

There is a general presumption that trivial information is not protected under the law of breach of confidence. The reason for this is that it is unlikely that equity would protect information unless the consequences of disclosure were serious.12 As Megarry J said, ‘I doubt whether equity would intervene unless the circumstances were of sufficient gravity; equity ought not to be invoked to protect trivial tittle-tattle, however confidential.’13 This has the potential to impact whether the information captured in an image and shared on a social network site is protected. Whether personal images shared on social networks are trivial will depend on the specific type of information revealed in the image.14 Without question, many of the images that are exchanged and revealed on social networks – such as pictures of people eating, cooking or dancing – are trivial.15 Consequently, there is a risk that many of the personal images that are

10 Foster v Mountford [1978] FSR 582. 11 Ibid. Holden v Express Newspapers Ltd [2001] QBD (7 June 2001) (Eady J); Jacquiline A v The London Bourough of Newham (2001) WL 1612596, this case concerned a photograph taken of a child without permission to be used in a brochure warning against the dangers of AIDS; see generally Gavin Philipson, ‘Transforming Breach of Confidence? Towards a Common Law Right of Privacy under the Human Rights Act’ [2003] The Modern Law Review 726. 12 See Coco v AN Clark (Engineers) Ltd [1969] RPC 41, 48. 13 Ibid. 14 Certain types of information, such as addresses, phone numbers or email addresses may be considered ‘trivial’. This type of information may be capable of being protected if the use of the information poses a significant risk to the plaintiff. Consequently, there may be a serious risk of exposure to stalkers and being stalked if such details are revealed: Mills v News Group Newspapers [2001] EMLR 957. 15 See Sarah Thomas, ‘Fat Shamed Dancing Man to Party with Moby, Pharell Williams Support’, Sydney Morning Herald, 9 March 2015 . Photographs of Sean ‘Dancing Man’ dancing were shared on social media site 4chan by the person who had taken them, mocking Sean dancing and making cruel comments about him. The photographs, which went viral, highlight that, despite the ‘trivial’ nature of a person being captured dancing, it may not be trivial to the person when their image captured is embarrassing or humiliating.

122

shared on social networks will fall within the category of trivial information, and thus not be protected. While information that is trivial will not normally be protected by the tort of breach of confidence, it seems that exceptions will be made in a number of situations.16 The courts will protect information that might otherwise have been trivial if the publication of the information revealed in the image is ‘offensive to a reasonable person of ordinary sensibilities’.17 It seems that the courts are willing to protect personal images where the image relates to someone’s personal life. This is particularly the case with images of celebrities. This is on the basis that the publication of those images is intrusive into private life ‘in a peculiarly humiliating and damaging way’18 – for example, a photograph of Naomi Campbell coming out of a Drugs 19 Anonymous meeting, images of the Douglas and Zeta Jones wedding20 and photographs of people engaged in sexual activities have been held to not be trivial and thus potentially

16 There is limited discussion of what is ‘trivial’ in relation to personal images in the leading cases: see Campbell v MGC [2004] 2 AC 457; Douglas v Hello! [2008] 1 AC 1. 17 Campbell v MGC [2004] 2 AC 457, 121–4 (Lord Hoffman); compare with comments made by Baroness Hale at 155–6. Campbell v MGC [2004] UKHL 22 [96]. 18 Theakston v MGN Ltd [2002] EWHC 137 (Queens Bench) [62]; see also Douglas v Hello! [2001] QB 967 (Douglas (No. 1)) [165]; Keene LJ said: ‘The photographs conveyed to the public information not otherwise truly obtainable, that is to say, what the event and its participants looked like’; Douglas v Hello! (No. 3) [2005] EWCA Civ 595, [2005] 3 WLR 881 [106] where personal images are more than just the information that is revealed; Lord Phillips M.R said: ‘Nor is it right to treat a photograph simply as a means of conveying factual information. A photograph can certainly capture every detail of a momentary even in a way which words cannot, but a photograph can do more than that. A personal photograph can portray not necessarily accurately, the personality and the mood of the subject.’ 19 Campbell v MGC [2004] 2 AC 457; Mills v News Group Newspapers [2001] EMLR 957; Douglas v Hello! [2008] 1 AC 1. 20 Douglas v Hello! [2008] 1 AC 1, 81–3 [287]–[91]; compare with 87 [307]; In Douglas v Hello! the majority held the view that images of the Douglas and Zeta Jones wedding were not trivial despite the dissenting view of Lord Walker; Lionel Bently and Brad Sherman, above n 5, 1142, 1144; Douglas v Hello! Ltd [2000] 1 QB 967, where Sedley LJ stated (at 110) that ‘we have reached a point at which it can be said with confidence that the law recognises and will appropriately protect a right to personal privacy’.

123

protectable.21 It seems that this will be the case even when the image is taken in the public domain.22

5.2.2 Are the Personal Images Vague?

Another limitation placed on information protected by breach of confidence is information that is vague. This limitation traditionally excludes general ideas and concepts from protection under breach of confidence.23 What is deemed to be vague information is difficult to determine. Anything that is a ‘bare goal, purpose or possibility, a mere speculative idea [is] not capable of being protected’.24 Vague information may constitute ideas that are too broad and lack an element of novelty.25 The restriction on vague information is unlikely to apply to personal images shared on social networks because the limitation typically applies to commercial knowledge rather than to images.

5.2.3 Are the Personal Images Shared on Social Networks in the Public Domain?

The law of confidence will not protect personal images that are in the public domain.26 This is because breach of confidence cannot protect personal images without an element or degree of

21 Theakston v MGN Ltd [2002] EWHC 137 (QB); [2002] EMLR 22, 68; Douglas v Hello! [2008] 1 AC 1, 81–3 [287]–[91] compared with 87 [307]; Lionel Bently and Brad Sherman, above n 5, 1142, 1144; in von Hannover v Germany App No. 59320/00, 24 June 2004, Princess Caroline of Monaco campaigned to prevent publications of photographs taken without her consent while going about her everyday life: going shopping, going horse riding, eating, holidaying, tripping on the beach; NA Moreham, ‘Privacy in Public Places’ (2006) 65(3) The Cambridge Law Journal 606, 607, 614. 22 Campbell v MGN Ltd [2004] 2 AC 457; and Douglas v Hello! [2008] 1 AC 1. 23 DeMaudsley v Palumbo [1996] FSR 447. 24 Ibid. 25 The issue of novelty and originality of information is used as a restrictive mechanism on information that may not be protected. This is reminiscent of the limitations of the novelty requirement imposed in patent legislation. Novelty is not an element that has been commonly referred to when applying the breach of confidence action to protect personal images. It has been used as an argument against the protection of vague information: see Lionel Bently and Brad Sherman, above n5, 1145; DeMaudsley v Palumbo [1996] FSR 447. 26 Attorney-General and Observer Ltd v Times Newspapers Ltd [1990] 1 AC 109, 282, where Lord Goff said: ‘The principle of confidentiality only applies to the extent that it is confidential. In particular, once it has entered what is usually called the public domain (which means no more than that the information in question is so generally accessible that, in all the circumstances, it cannot be regarded as confidential) then, as a general rule, the principle of confidentiality can no application to it.’

124

secrecy in the personal image. Regardless of how confidential the circumstances may be, there is no breach of confidence when something is already common knowledge.27 When personal images are shared on social networks, they potentially fall in the public domain28 (this of course would not apply where the source of the image is the defendant). This is because once an image is shared on a social network, it is published. As a result, it loses its secrecy and will be in the public domain.29 This potentially excludes most information revealed in images placed on social network sites from being protected by the tort of breach of confidence. Without doubt this is a serious limitation on the applicability of the use of breach of confidence in this area. Again, it is important to reiterate that this does not apply where the defendant places the image in the public domain. While, in most cases, public disclosure of information will ensure that the information loses its quality of confidentiality, there are some circumstances where information in a personal image is made available to several people but the image will still be deemed confidential. That is, there are some situations where an image can be disclosed to people and

27 Coco v AN Clark (Engineers) Ltd [1969] RPC 41, 47. 28 EPP (Australia) Pty Ltd v Levy [2001] NSWC 482 [20] per Barret J (‘everything which is accessible through the internet as being in the public domain’). 29 The courts have construed the notion of public domain broadly in some cases such as when the information is discussed in public then it would be considered to be in the public domain; see Lennon v News Group Ltd and Twist [1978] FSR 573, 574-5; Theakston v MGN Ltd [2002] EWHC 137 (Queens Bench); [2002] EMLR 22, 68; see generally N A Moreham, above n 21, 612–13; William van Caenegem, Intellectual and Industrial Property Law, 2nd ed (LexisNexis, Australia, 2015) 216-217; see also in relation to the anonymous sources of breaches of confidence by anonymous contributors: Australian Football League v The Age (2006) 15 VR 419, [55] where Kellam J said ‘if speculation, gossip or even assertion from an anonymous source, thus being incapable of being verified or in any way held accountable, is to be regarded as the putting of information in the public domain, then the opportunity for unethical and the malicious, to breach confidentiality and then claim that there is no confidentiality is unrestrained’.

125

without losing its quality of confidentiality.30 The difficulty here is determining when this will occur.31 One situation where an image may retain its confidentiality even if it is disclosed on a social network is when a person shares their personal image on a social network but states that the image is confidential and restricts access to a limited audience. When people share personal images on social networks, the network may offer custom privacy settings. As a person who shares their personal image can choose their own privacy settings; this can directly affect whether an image is made publicly available or whether it is only made available to a select audience and thus remains confidential. While social networks such as Facebook, Twitter and Instagram allow people to restrict access to their images, the level and degree of control that a person is able to exercise over the image depend on the network’s privacy settings and the selected privacy settings of each person and their connections who are part of the network.32 Even if a person chooses to restrict access to their personal images to a selected audience, the image can still fall within the public domain. This is because third parties who have access to the image can reshare the image on their social network pages. Consequently, when an image is shared on a public social network such as Twitter or Instagram, it is likely to become part of the public domain. As such, it is unlikely to be protected by law of confidence. While people cannot avoid being photographed in public places, it does not follow that anyone ‘who takes or obtains such photographs can publish them to the world at large’.33 As the court said in von Hannover,34 people are not ‘free to publish images of others simply because they were in a public place at the time the images were obtained’, if the information captured

30 Wilson v Ferguson [2015] WASC 15, [57] (Wilson J): ‘The circumstances in which the defendant obtained the images of the plaintiff were such as to impose on the defendant an obligation of conscience to maintain the confidentiality of the images. The fact that the defendant emailed copies of the sexually explicit videos to himself from the plaintiff’s phone without her knowledge or consent would of itself ordinarily be sufficient to import an obligation of confidence. This was confirmed by the plaintiff’s reaction to being informed of what the defendant had done, and the defendant’s agreement to make sure nobody else saw the photographs.’ 31 NA Moreham, above n 21, 612. The use of personal images on social networks diverts from the historic view of Prince Albert v Strange (1849) 2 DeG & Sm 652; 64 ER 293 (Knight Bruce LJ), where multiple people knew the drawings were confidential and there was a degree of control over the physical form of the drawings. 33 Campbell v MGN Ltd [2004] 2 AC 457 at 474 (Lord Hoffman). 34 von Hannover v Germany App No 59320/00, 24 June 2004.

126

in the image relates to their private life.35 While there are situations where British courts will protect information in personal images that are captured in the public domain, the law in Australia is less certain. In particular, there is uncertainty as to whether Australian courts would protect information in personal images that are captured in the public domain when the information is about a person’s private life.

5.3 Is There an Obligation to Keep the Personal Image Confidential?

The extent to which the law of confidence will protect personal images when they are misused on social networks will depend on whether there is an obligation to keep the personal image confidential. In examining whether a person sharing a personal image has an obligation to keep the personal image confidential it is necessary to consider how the obligation arises. When thinking about the role of breach of confidence in protecting the misuse of personal images on social networks, it is important to distinguish two situations. The first is where a confidential image is uploaded onto a social network. Here the question of confidentiality of the image will depend on the situation in which the image was created and the relationship between the parties. In this case, the confidentiality arises before the image is uploaded onto the social network. The second situation is where the confidentiality arises as part of the digital and legal relationships that exist on the social network. Here the confidential obligation might arise as a consequence of contractual relations between parties or because of the relationship between the person uploading the image and the people with whom the image is shared.

35 See von Hannover v Germany App No 59320/00, 24 June 2004, 77 (Judges Barreto and Zupancic), where Princess Caroline of Monaco tried to prevent images of her going about her daily life from being published. The court concluded that: ‘The public does not have a legitimate interest in knowing where the applicant is and how she behaves generally in her private life even if she appears in places that cannot always be described as secluded and despite the fact that she is well known to the public. Even if such a public interest exists… In the instant case those interest must, in the Courts view, yield to the applicant’s rights to the effective protection of her private life’; N A Moreham, above n 21, 609; Peck v United Kingdom (2003) 36 EHRR 41; JH v United Kingdom App No 44787/98, 25 September 2001; McKennitt v Ash [2005] EWHC 3003 (Queens Bench), 50 (Eady J) ‘in light of [von Hannover, Peck, and PG and JH] a trend has emerged towards acknowledging a “legitimate expectation” of protection and respect for private life, on some occasions, in a relatively public circumstances. It is no longer possible to draw a rigid distinction between that which takes place in private and that which is capable of being witnessed in a public place by other persons.’

127

An obligation of confidence may arise in four ways. In some situations, an obligation of confidence arises contractually.36 Another situation where an obligation of confidence arises is when the parties are in a special fiduciary relationship – for example, husband and wife.37 In some cases, the obligation may arise from the circumstances in which the image is obtained. In some (rare) situations, an obligation of confidence may arise even where there is no relationship between the parties; that is, where the parties are strangers.

5.3.1 Contractual Relationships

Personal images may be protected under the law of confidence where there is a contractual relationship between the parties. An obligation under contract may be express or implied.38 When someone commissions a photographer to take pictures of them, there is usually a contractual agreement that may give rise to an obligation of confidence.39 However, in situations where people take photographs of other people in public spaces, there is unlikely to be a contractual relationship. The question of social networks’ contract of services was discussed in Chapter 2.

5.3.2 Fiduciary Relationships

Another way in which an obligation of confidence may arise is by way of a fiduciary relationship. Fiduciary relationships are established categories where trust and confidence are imparted between the parties. Established categories of fiduciary relationships include doctor and patient, priest and parishioner, husband and wife, solicitor and client, and trustee and

36 Lionel Bently and Brad Sherman, above n 5, 1160; John Glover, ‘Is Breach of Confidence a Fiduciary Wrong? Preserving the Reach of Judge-Made Law’ (2006) 21 Legal Studies 594, 611; Maggbury Pty Ltd v Hafele Australia Pty Ltd [2001] HCA 70 (13 December 2001). 37 Argyll v Argyll [1967] Ch 302. 38 Lionel Bently and Brad Sherman, above n 5, 1160; John Glover, above n 36, 611. 39 Pollard v Photographic Co (1888) 40 Ch D 345, 352 where the Chancery held that a photographer had breached an implied term in the photographer’s contract as well as an obligation of confidence that was placed in him by the consumer. The photographer had sold Pollard’s image on a Christmas card, see further David J Seipp, ‘English Judicial Recognition of a Right to Privacy’ (1983) 3(3) Oxford Journal of Legal Studies 325, 338. In Steddal v Houghton (1901) 18 TLD 126, the court held similar views to those in Pollard, when a husband tried to restrain publication of his estranged wife and children. Also, maintaining confidentially is particularly significant where the employee is privy to trade secret or sensitive commercial information, as highlighted in Maggbury Pty Ltd v Hafele Australia Pty Ltd [2001] HCA 70 (13 December 2001). Another example is when people enter into a contract for services with social networks.

128

beneficiary.40 It is accepted that people who are in a relationship but not married to each other will also fall within the scope of a fiduciary relationship.41 As Mitchell J said:

The case establishes that … the intimate nature of a personal relationship between two people may give rise to a relationship of trust and confidence such that, without express statement to that effect, private and personal information passing between those people may in certain circumstances be imbued with an

equitable obligation of confidence.42

In these instances, if an image was captured as part of a fiduciary relationship, if one of the parties uploaded the photographs on a social network, they would be bound by the obligation of confidence. It is unlikely that parties who are digitally connected on a social network will be treated as if they are in a fiduciary relationship. Social networks such as Twitter and Instagram allow anyone to follow them and access their photographs. Facebook allows access to personal images if the person has public settings. Facebook also allows strangers and third parties access when a person ‘likes’ a particular product or a group. It is unlikely that ‘friending’ someone on a social network gives rise to a fiduciary relationship.43

5.3.3 From the circumstances

Another situation where an obligation of confidence may arise is from the circumstances in which image is taken. Speaking of sexually explicit images, Wilson J said:

The circumstances in which the defendant obtained the images of the plaintiff were such as to impose on the defendant an obligation of conscience to maintain the confidentiality of the images. The fact that the defendant emailed copies of the sexually explicit videos to himself from the plaintiff's phone without her

40 Boardman v Phipps [1967] 2 AC 46. 41 Wilson v Ferguson [2015] WASC 15 (Mitchell J). 42 Ibid 51. 43 Traditionally, a fiduciary duty arises in circumstances where there is trust and confidence; see further La Forest J in Lac Minerals Ltd v International Corona Resources Ltd (1989) 61 DLR 14, 28, where he said that ‘not every legal claim arising out of a relationship with fiduciary incidents will give rise to a claim for breach of fiduciary duty’. However, it would be difficult to argue that a person who is connected to a third party on a social network is in a fiduciary relationship.

129

knowledge or consent would of itself ordinarily be sufficient to import an obligation of confidence. This was confirmed by the plaintiff's reaction to being informed of what the defendant had done, and the defendant's agreement to make

sure nobody else saw the photographs.44

Consequently, a person that uploads and shares sexual or intimate photographs of a third party online will be under an obligation of confidentially.

5.3.4 Where there is no relationship between the parties: Strangers

The question of whether a stranger will owe an obligation of confidence when they obtain or access images depends on the conduct of the stranger and the capacity under which they were acting.45 There are three situations where a stranger receiving personal images may be under an obligation of confidence. An obligation of confidence may arise when personal images are obtained by unlawful conduct, for example telephoto lens photography.46 Given that when third parties and strangers obtain personal images on social networks, they are usually acquired lawfully, no obligation is owed by third parties or strangers to a person whose image has been shared.47 This would be

44 Wilson v Ferguson [2015] WASC 15 [57] (Wilson J) [33] he states ‘the defendant’s conduct indicates that he was well aware that the images were regarded by the plaintiff as private and that he did not have her consent or authority to show them to any other person’; see also Giller v Procopets [2008] VSCA 236 where the defendant had video recorded sexual and intimate activity of the plaintiff and threatened to show it to the plaintiff’s friends and employer. While Giller v Procopets was about a sexually explicit video of the plaintiff, it could apply by analogy to photographs. The courts are willing to protect personal images that are of a sexual or intimate nature even if they are lawfully obtained: see Wilson v Ferguson where the plaintiff had disclosed and sent some images to the defendant. 45 The distinction between lawful and unlawfully obtained personal images depends on whether the image is used for the purpose for which the information is acquired: see Malone v MPC [1979] Ch 344, 376 where, in this case, the police were authorised to phone tap the claimant’s phone line, subsequently prosecuting him for handling stolen goods. 46 Douglas v Hello! Ltd. (No3) [2006] QB 125. 47 Peck v United Kingdom (2003) 36 EHRR 41; PG and JH v United Kingdom Appl No 44787/98 (25 September 2001); McKennit v Ash [2005] EWHC 3003 (Queens Bench) 50 (Eady J), who stated that ‘in the light of [von Hannover, Peck and PG and JH], a trend has emerged toward acknowledging a “legitimate expectation” of protection and respect for private life, on some occasions, in relatively public circumstances. It is not possible to draw a rigid distinction between that which takes place in private and

130

different however, if the images were acquired by hacking into a social network (which would be treated in a similar way to illegal phone tapping)48 or by comparison, phone tapping unauthorised by police.49 A second situation where a stranger may owe an obligation of confidence is when the stranger is acting lawfully but nonetheless obtains the image surreptitiously.50 Historically, the UK Court of Chancery laboured under the principle that publication of confidential information

that which is capable of being witnessed inn a public place by other persons’; see NA Moreham, above n 21, 609. See also, Wilson v Ferguson [2015] WASC 15 (Mitchell J). The defendant had taken photographs and videos of the plaintiff by taking her phone and emailing them to himself without her knowledge, despite the plaintiff explicitly asking the defendant not to show the images and videos to anyone else; however, once the defendant had emailed the images, he subsequently shared them on his social network account. 48 For example, in August 2014, a collection of approximately 500 private celebrity photographs were posted online and subsequently reshared on social networks: Joanne Kavanagh and Dan Cain, ‘Not Too Snap Happy What is the Rhian Sugden Naked Photo Hack and What Other Celebrity Hacked Picture Leaks Have There Been?’ 16 May 2017 The Sun, < https://www.thesun.co.uk/tvandshowbiz/3102066/rhian-sugden-kelly-rohrbach-hacked-celebrity-naked- photo-leak/> 49 See Malone v Commissioner of Metropolitan Police [1979] Ch 344. An example of illegal conduct would be phone tapping by anyone other than the police, as stated in Francome v Mirror Group Newspapers [1984] 1 WLR 892, 900, Fox LJ stated that: ‘It must be questionable whether the user of a telephone can be regarded as accepting the risk of that in the same way as, for example, he accepts the risk that his conversation may be overheard in consequence of the accidents and imperfections of the telephone system itself.’ The issue of lawfully obtaining personal images has been contested in the United Kingdom: Peck v United Kingdom (2003) 36 EHRR 41; PG and JH v United Kingdom Appl No. 44787/98 (25 September 2001); McKennit v Ash [2005] EWHC 3003 (Queens Bench) 50 (Eady J), who stated that ‘in the light of [von Hannover, Peck and PG and JH], a trend has emerged toward acknowledging a “legitimate expectation” of protection and respect for private life, on some occasions, in relatively public circumstances. It is not possible to draw a rigid distinction between that which takes place in private and that which is capable of being witnessed inn a public place by other persons’; see also NA Moreham, above n 21, 609. 50 Traditionally, surreptitiously acquired information has related to the theft of trade secrets or commercial contracts. See for a general discussion on surreptitiously acquired information; see George Wei, ‘Surreptitious Takings of Confidential Information’ (1992) 12 (3) Legal Studies 302 at 314; see Franklin v Giddins [1978] Qd R 72; see Megan Richardson, above n 6, 674; see Paul Sumpter, ‘Breach of Confidence: The Indirect Recipient’ (2008) New Zealand Law Review 523; see Robert Pearce, ‘Privacy Superinjunctions and Anonymity: “Selling My Story Will Sort My Life Out”’ (2011) 23 The Denning Law Journal 93.

131

obtained surreptitiously ought to be restrained.51 The question that arises is whether a person ‘surreptitiously’ acquires an image that is not shared directly by the person disclosing the image to a third party.52 This may occur for example, when a stranger searches a social network and acquires a person’s image without permission. A third situation where a stranger may owe an obligation of confidence is when a stranger obtains a personal image and has knowledge that the image is confidential.53 When a stranger has knowledge that the personal image is confidential, there will be a duty imposed even when that image has been acquired lawfully. Whether a stranger has knowledge of the confidential personal image and thus owes an obligation of confidence is based on a question of reasonableness. This might occur for example, where a photographer takes photographs on a film set without an invitation and there are signs prohibiting the taking of photographs in the entrance to the studio.54 It is the lawful conduct that imparts an obligation of confidence based on whether the stranger has knowledge of the personal image.55

5.4 Has there been a Breach of Duty?

The third factor that needs to be proved in an action for a breach of confidence is that the personal images were used in a way that breaches the obligation of confidentiality.56 There are various factors that determine the scope of the obligation and thus whether it is breached. These relate to how the personal image is given, whether the information in the image was sensitive,

51 Lord Ashburton v Pape [1913] 2 Ch 469, 465 (Swinden Eady LJ) ‘The principle on which the Court of Chancery has acted for many years has been restrain the publication of confidential information improperly or surreptitiously obtained or of information imparted in confidence which out not to be divulged.’ 52 For example, on Facebook’s graph search function, third parties can search for images that have been uploaded and shared by people with their connections. 53 There is some debate whether the key issue is knowledge or the unlawful conduct as highlighted in Attorney – General v Guardian (No. 2) [1990] AC 109 at 281–2 (Lord Goff). 54 In Shelly Films v Rex Features [1994] EMLR 134, His Honour Mann QC noted that the lack of regard for the claimants’ signs stating ‘no photography’ and ‘access to authorised persons’ could only be considered as confidential. Compare with Francome v Mirror Group Newspapers [1984] 1 WLR 892 and Shelly Films v Rex Features [1994] EMLR 134; in Shelly Films it was distinguished from Francome with emphasis on the knowledge and not the illegality of trespassing and taking the photograph. This is also seen in situations where paparazzi photographers obtain images of celebrities and publish them in magazines: Douglas v Hello! [2001] 2 WLR 992. 55 Lionel Bently and Brad Sherman, above n 5, 1163; see Wilson v Ferguson [2015] WASC 15. 56 Ibid 1142.

132

and the extent of interest in the use of the personal image by the person providing the photograph. The defendant must use the personal image imparted by the confider for there to be a breach of confidence. The personal image cannot be derived from another place or source. There is no requirement to examine the defendant’s state of mind as in criminal law. It is not necessary for a plaintiff to demonstrate that the defendant’s breach was a conscious or deliberate action.57 Consequently, the defendant will not be able to rely on arguments that they acted in good faith, that they were ignorant of the nature of confidentiality of the personal image or that they accidentally used of the image as a way of side stepping their liability for a breach of confidence.58 This is in contrast to the requirement for establishing the defendant’s obligation.59 It is unclear whether the plaintiff must suffer damage or harm before an action of breach of confidence can be initiated.60 Whether damage is a crucial element remains dependent on two factors: the type of personal image and the definition of damage/harm.61 Where breach of confidence relates to personal or private information in photographs, it has been suggested that there is no requirement to prove damage.62 A claimant need only prove that there has been an invasion of their private life, not that there has been a detriment.63 Essentially, the issue of detriment may be fashioned as an invasion of private life because the invasion is the detriment suffered by the claimant.64 In many cases, the misuse of a personal image is easily determined. Anything that is in contrast to the confider’s instructions about the use of the personal image will be deemed to be a breach. There are other circumstances where the misuse of the information needs further examination. These circumstances surround the actual information – for example, where the personal image used is different from the original personal image disclosed.65 The information

57 Seager v Copydex [1967] 2 All ER 415; Talbolt v GTV [1981] RPC 1, 17; Lionel Bently and Brad Sherman, above n 5, 1175–7. 58 Weld-Blundell v Stephens [1919] 1 KB 520. 59 Lionel Bently and Brad Sherman, above n 5, 1072–5. 60 Ibid. 61 Attorney-General v Guardian Newspapers [1990] AC 109, 281–2 (Lord Goff). 62 McKennitt v Ash [2008] QB 73. 63 Buck v Information Commissioner (2007) WL 426611; [2008] WTLR 1, 15, 256. 64 This was highlighted in McKennitt v Ash [2008] QB 73. 65 Memes encompass various subject matter, however for the purposes of this thesis, the term meme is in reference to personal images that have been adapted and modified with various phrases and spread on the internet. Memes are defined as ‘a cultural item in the form of an image, video, phrase, etc., that is spread

133

does not have to be identical to be breached, it can still be a breach if it appears in a different form.66 This raises the question of how different the information can be for it to constitute a breach. This is problematic when considering information that is personal because in these situations the degree of similarity does not have to be significant.67 Any altered personal image raises the question of whether the extent of the image is different from the originally shared personal image. This essentially depends on whether the altered information is a continuation of the information from which the altered information is derived.68

5.5 Possible Defences

When personal images are misused on social networks, it is important to consider whether there are any potential defences to an action of breach of confidence. There are two main defences that are available to a defendant in an action for breach of confidence relevant here: consent and public interest.

5.5.1 Consent

The issue of consent is one that may absolve the defendant from any liability. Essentially, if the defendant can demonstrate that the plaintiff authorised or consented to the use of the personal image in such a way then they will not be liable. This arises through express licence agreements or contractual arrangements. This may not be an issue that arises when the nature of the information relates to personal images and there is no licence agreement or contractual arrangement in place. This may occur for example where two parties are in an intimate relationship with one another.69 The issue of consent in relation to the use of personal images arises when considering the terms of use agreements as noted in chapter 2.

via the Internet and often altered in a creative or humorous way’: Dictionary.com, 66 Lionel Bently and Brad Sherman, above n 5, 1072–5. 67 Ibid. 68 Ocular Sciences [1997] RPC 289 (Laddie J). 69 Giller v Procopets [2008] VSCA 236; Gordon Farrer, ‘Bingle Photo Privacy Poser’, The Age (3 March 2010), http://www.theage.com.au/victoria/bingle-photo-privacy-poser-20100302- pgfo.html.

134

5.5.2 Public Interest

In the United Kingdom, the public interest defence is commonly used to safeguard genuine public interests in revealing information that may pose serious danger to the public.70 The British courts have attempted to apply a liberal approach of a breach of confidence action to protect personal images and privacy interests. However, application of the public interest defence has largely been in relation to trade secrets. In some instances, the courts have applied the public interest defence to accidently obtained information or surreptitiously obtained information.71 The position in the United Kingdom has favoured a much broader approach to the public interest defence and balancing the interests of the public, freedom of speech and confidentiality.72. The status of the public interest deference in Australia is less certain. At best, Australian courts have taken a narrow approach to the public interest defence.73 At worst, they have denied its existence. According to

70 W v Edgell [1990] Ch 399; Megan Richardson, above n 6, 688, 689; see generally Sam Ricketson, ‘ Confidential Information: A New Proprietary Interest?’ (1977-8) 11 Melbourne Law Review 223, 244-5; Yvonne Cripps, ‘The Public Interest Defence to the Action for Breach of Confidence and the Law Commission’s Proposals on Disclosure in the Public Interest’ (1984) 4(3) Oxford Journal of Legal Studies 361; Daniel Bayliss, ‘Breach of Confidence as a Breach of Fiduciary Obligations: A Theory’ (2003) 9(3) Auckland Law Review 702; David J Seipp, above n 39; Ronan Deazley, ‘Introducing Publicity Rights? Breach of Confidence, the Photograph and Commodifying the Image’ (2003) 54(2) Northern Ireland Legal Quarterly 99, 101-103. 71 Lord Ashburton v Pape [1913] 2 Ch 469 475 (Swinden Eady LJ); Argyll v Argyll [1965] 1 All ER 611. In Lord Ashburton v Pape, His Lordship Swinfen Eady suggested that any information obtained improperly or surreptitiously by anyone would be liable for a breach of confidence; see Megan Richardson, above n 6, 690. 72 While the European Convention of Human Rights provides the right to freedom of expression, it is independent from the public interest defence: see Convention for the Protection of Human Rights and Fundamental Freedoms, opened for signature 4 November 1950, 213 UNTS 221 (entered into force 3 September 1953), Art 10; Lionel Bently and Brad Sherman, above n 5, 1187. 73 Re Corrs Pavey Whiting and Byrne v Collector of Customs of Victoria and Alphapharm Pty Ltd [1987] FCA 266 (13 August 1987) [57] where Gummow J states ‘That principle, in my view, is no wider than one that information will lack the necessary attribute of confidence if the subject matter is the existence or real likelihood of the existence of an iniquity in the sense of a crime, civil wrong or serious misdeed of public importance, and the confidence is relied upon to prevent disclosure to a third party with a real and direct interest in redressing such crime, wrong or misdeed’; see Smith Kline and French Laboratories (Aust) Ltd v Secretary, Dept of Community Services and Health [1990] FCR 73, 111 where Gummow J states that : (i) an examination of the recent English decisions shows that the so-called ‘public interest’ defence is not so much a rule of law as an invitation to judicial idiosyncrasy by deciding each

135

Kellam J, the ‘correct legal position is that there is no general public interest defence.’74 Further he acknowledged that this issue is not ‘determined authoratively’ and that the ‘public interest must amount to more than a public ‘curiosity’ or public ‘prurience’.’75

5.6 Conclusion

While the Australian law of confidence provides some protection for personal images placed on social network sites, this protection is very limited. One reason for this is that the law of confidence will not protect images that are in the public domain. Another reason to the limited protection is that the law of confidence has not expanded to protect information that is about a person’s private life. While Australian law has attempted to expand the tort of breach of confidence to include private information to protect specific types of personal images such as those of an intimate nature76 – it has not developed in to protect personal images that are not intimate or of a sexual nature. The Australian law of confidence varies from its UK counterpart because there it does not extend or protect a person’s

‘private life’.77 As a result, the protection of a person’s private life is not strongly entrenched in Australian jurisprudence. It is clear that the law of confidence in Australia does little to prevent the misuse of personal images when those images are shared on social networks.

case on an ad hoc basis as to whether, on the facts overall, it is better to respect or to override the obligation of confidence, and (ii) equitable principles are best developed by reference to what conscionable behaviour demands of the defendant not by balancing and then overriding those demands by reference to matters of social or political opinion. 74 Australian Football League v The Age Company Ltd (2006) 15 VR 419, [74] Further, Kellem J at [75] stated: ‘It is true that the existence of, and/or the extent of, any public interest defence to a breach of confidentiality is by no means clear and settled in Australia.’ 75 Ibid at 84. He cited Lord Wilberforce in British Fuel Corporation v Granada Television Limited [1981] AC 1096, 1168 ‘… There is a wide difference between what is interesting to the public and what it is in the public interest to make known.” at [94] This case also related to the disclosure of names of Australian football players who had tested positive to illicit drugs, the disclosure of the names would not have been in the public’s interest but merely to satisfy the public’s curiosity. 76 See Wilson v Ferguson [2015] WASC 15; Giller v Procopets [2008] VSCA 236. 77 The United Kingdom, law of confidence incorporates Article 8 of the European Convention of Human Rights and thus provides a broader scope of protection than Australian law.

136

Part II

Possible Solutions

137

Part I of the thesis examined the legal protection for personal images uploaded and shared on social networks in Australia. This revealed that while Australian law provides some protection, the protection is very limited. A number of issues potentially arise when images are uploaded on social networks. One occurs when a person takes and uploads their photograph and that image is reused and reshared online. Here, the law provides limited protection. For example, copyright protects against misuse of the image in some situations – such as when people take photographs of themselves and shares them on a profile page; however, in some situations when the use falls within the defence of fair dealing – notably where the image is used to report the news or the image is used for parody or satire purposes – the reuse of an image may not constitute a copyright infringement. Other areas of law, such as privacy, the law of confidence, and contract are also of little use. For example, privacy law will not prevent the misuse of a person’s image when that image has been reshared online. While there is some protection for personal images under the Privacy Act 1988 (Cth), the protection is inadequate. The reason for this is that the Privacy Act only applies to government agencies and departments, and to Australian corporations that collect, use and disclose images; the Privacy Act does not apply to individuals who collect, use and disclose personal images on social network sites. Another limitation of the Privacy Act is that personal images shared on social networks are not protected when journalists use them for journalistic purposes. While in some cases the law of confidence potentially provides protection when a person shares their image online, this protection is limited. There are many problems here, the key one being that the law of confidence does not protect personal images that fall within the public domain. The problem here is that when people share and exchange personal images on social networks, the images fall within in the public domain. This means that they lose the condition of confidentiality; this is the case even if the images that are disclosed are private and access is restricted. When images are reshared and reused are exacerbated by the fact that when a person enters into a social network contract, they often sign away many of their intellectual property rights. Social network contracts usually contain wide licence terms that enable a social network to use, reuse and sub-license their photographs. The consequence of this is that when a person becomes a member of a network, they give the network a very broad licence over the use of their images. This facilitates the misuse of personal images. These problems are made worse by the fact that social networks can alter the terms of service without allowing the users to negotiate the terms.

138

Another problem that potentially arises when personal images are shared online is when third parties distort or alter the images. This occurs, for example, when third parties turn photographs into memes. The legal protection here is limited. In rare cases, copyright may offer protection. When an image is reshared and reused without attributing the creator of the image, this may amount to a breach of the moral right to attribution.1 While this offers some protection, it is limited in that the only person who can bring an action for breach of attribution of authorship is the photographer.2 Potential problems also arise when the circumstances surrounding the uploading of an image change. This may occur, for example, when a person uploads and shares an image on a social network page, but later changes their mind about uploading the image, or when the creator of the uploaded image dies. While a person is able to remove or delete images that they have uploaded on their own profile page, when they change their mind about sharing the image, they are not able to delete images that have been reshared by third parties, because those images are now stored on third-party profile pages. Problems also arise when a person who uploads images on a social network page dies. When a creator of an image dies, the copyright in the image will pass to the deceased person’s estate. However, the problem here is that when a person signs up to a social network, they effectively assign their copyright to the network. Problems may also arise when third parties capture photographs of other people and upload those images onto social networks. In this situation, many of the problems outlined above apply. One additional problem that arises here relates to the very act of taking of the photograph and the uploading of that image. When this happens, there is no protection to speak of. When people take photographs of third parties and share those images online, the subject is not able to prevent the use of their image under copyright. Because copyright law protects the form of a copyright work and not the subject matter, copyright protection does not extend to the person whose image is captured in a photograph. This means that the subject of a photograph has no rights under copyright law. The lack of copyright protection for people whose images are captured in photographs and shared online means any protection for the subject of a photograph must be sought under other legal areas, such as the law of confidence, contract or privacy law.

1 See generally, Aaron Schwabach, ‘Reclaiming Copyright from the Outside in: What the Downfall Hitler Meme means for Transformative Works, Fair Use and Parody’ (2012) 8(1) Buffalo Intellectual Property Law Journal 1. 2 Monte v Fairfax Media Publications Pty Ltd [2015] FCCA 1633 [30].

139

One area that offers a potential remedy when a third party captures another person’s image in a photograph is breach of confidence. However, protection under the law of confidence is limited by the fact that any rights a subject has in an image will end when the image is placed in the public domain. This is the case even if the image is private or personal. Unlike in the United States, there are no image rights in Australia on which people may rely when they are photographed. One of the ramifications of this is that a person cannot prevent a third party from photographing them in a public or even a private place. Another ramification of not having any image rights is that a subject cannot control the use of their image or the information captured in the image after their photograph is taken. While there is some protection for personal images that are shared online in Australia, this protection is limited. Part II of the thesis explores three possible areas that could potentially close the gaps that exist in the law in Australia. The first is a statutory tort of serious invasions of privacy. The second is the introduction of ‘image rights’ or a ‘right to publicity’ in Australia. The third option that is examined is a ‘right to be forgotten’. In exploring these three areas, Part II will argue that if adopted collectively, there is potential for these three areas to alter the legal protection that exists for personal images that are uploaded and shared online in Australia.

140

141

Chapter 6 Expanding Privacy Law

6.1 Introduction

There are a number of significant gaps in the legal protection available for personal images that are shared on social networks in Australia.1 This chapter examines the potential role that a new statutory tort for serious invasions of privacy might play in protecting personal images shared online from misuse. Specifically, the chapter examines two proposals made by the ALRC in its

2014 report, Serious Invasions of Privacy in the Digital Era.2 The first is that a statutory tort for serious invasions of privacy should be introduced. If enacted, the tort for serious invasion of privacy would cover two types of serious invasions of privacy:3 ‘intrusion upon seclusion’ and ‘misuses of private information’. The ALRC also recommended that in the absence of a statutory tort, the tort of breach of confidence ought to be expanded to include private information. The chapter will look at each of these proposals in turn. It will then examine whether the ALRC’s recommendations, if adopted, would protect personal images that are shared online. In examining the proposed reforms, it will be argued that while the changes would provide some improvements the reforms do not adequately address the gaps in the existing legal protection.4

1 The Australian Law Reform Commission has made numerous recommendations for privacy reform over the years. For example, since Victoria Park Racing and Recreation Grounds Co Ltd v Taylor (1937) 58 CLR 479, the Commonwealth government has commissioned investigations that resulted in the enactment of the Privacy Act 1988 (Cth); see further Australian Law Reform Commission, Privacy, Report No 22 (1983), xxxvi, xxxvii and Chapters 9–11. 2 Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014). 3 Ibid. 4 The Australian government has yet to make any significant responses to the ALRC’s recommendations. This is in contrast to New South Wales established a parliamentary inquiry. The Legislative Council’s Standing Committee Law and Justice has been conducting an inquiry.

142

6.2 A New Statutory TTort of Invasion of Privacy for Serious Invasions of Privacy

The current legal protection of personal privacy in Australia is piecemeal and fragmented.5 As noted previously, the avenue for redress for intrusions upon seclusion is limited to tortious actions such as trespass to property and trespass to person.6 The existing privacy law is also inconsistent. Even though the ALRC highlighted the problems in the law, there have not been any significant reforms to bridge the gaps in Australian law.7 One of the ALRC’s key recommendations was that the Commonwealth government should enact a statutory tortious cause of action for serious invasions of privacy that would cover two new types of serious invasions of privacy:8 ‘intrusion upon seclusion’ and ‘misuse of private information’.9 These types of invasion of privacy are based on US privacy law.10 The

5 See Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice (2008) 74, para 3.1; Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014), para 3.50. 6 See Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014) 5.22; Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice (2008) 74, para 3.1. 7 See Australian Law Reform Commission, Unfair Publication: Defamation and Privacy, Report No. 11 (1979) 228; the report highlighted gaps in the law such as identification of sexual assault victims; identification and publication of addresses and name of a witness of murder; media photographs of two 15-year-olds who eloped; filming individuals in the street without their consent; and paparazzi taking photographs of a woman giving birth to quadruplets. 8 See further Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014) 4, 4-1 and 4-2, which states: ‘Recommendation 4-1 A new tort in a New Commonwealth Act. Two Types of Invasions, Recommendation 4–1 if a statutory cause of action for serious invasion of privacy is to be enacted, it should be enacted by the Commonwealth, in a Commonwealth Act (the Act)’; See Recommendation 4–2 the cause of action should be described in the Act as an action in tort; Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014), 5; 5.15, Recommendation 5-1. 9 See Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014), 5.15. 10 US privacy law includes four different types of tortious actions: for breaches of privacy intrusion upon the plaintiff’s seclusion or solitude, or into their private affairs; public disclosure of embarrassing private facts about the plaintiff; publicity which places the plaintiff in a false light in the public eye; and appropriation, for the defendant’s advantage, of the plaintiff’s name or likeness’. William L Prosser, ‘Privacy’ (1960) 48 California Law Review 383, 389.The ALRC confined an Australian statutory tort to the first two categories. In 1960, Prosser stated that the law of privacy comprised four ‘distinct kinds of invasion of four different interests of the plaintiff, which are tied together by the common name, but

143

following sections examine the two types of tortious action for serious invasions of privacy. This section also considers whether the two types of tortious actions would be likely to prevent the misuse of personal images that are shared, uploaded and exchanged on social networks.

6.2.1 Intrusion Upon Seclusion

The first type of serious invasion of privacy recommended by the ALRC is ‘intrusion upon seclusion’.11 While intrusion upon seclusion is not specifically defined in the ALRC report, intrusion upon seclusion is based on American jurisprudence.12 In the United States, intrusion upon seclusion is defined as situations where a person:

intentionally intrudes, physical or otherwise, upon the solitude or seclusion of another or his private affairs or concerns is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable

person.13

A number of questions arise when considering whether the proposed new tort would play a role in preventing the misuse of personal images on social networks. The first is whether the tort would apply to digital spaces; that is, whether the tort would apply to personal images that are shared on social networks. The second is whether uploading images on a social network page is an intrusion. The third is whether the tort would protect all types of information captured in personal images that are shared online.

otherwise have almost nothing in common except that each represents an interference with the right of the plaintiff, in the phrase coined by Judge Cooley, “to be let alone”. Without any attempt to exact definition, these four torts may be described as follows: 1. Intrusion upon the plaintiff’s seclusion or solitude, or into his private affairs. 2. Public disclosure of embarrassing private facts about the plaintiff. 3. Publicity which places the plaintiff in a false light in the public eye. 4. Appropriation, for the defendant’s advantage, of the plaintiff’s name or likeness.’ 11 See further Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014) 5, Recommendation 5-1, 5.1, . 12 See generally William L Prosser, above n 10. 13 See American Law Institute, Restatement of the Law Second, Torts (1977), § 652B.

144

6.2.2 Is a Social Network Page a ‘Secluded’ Space?

According to the ALRC, the tort of intrusion upon seclusion involves unwanted physical intrusion into someone’s private space.14 It is clear that the tort applies to intrusions into private physical spaces of individuals. Typically, it applies when someone’s physical space has been interfered with, such as when people watch, listen, or record a person in their home. One issue that is unclear is whether a secluded space needs to be a private space. That is, would a photograph taken in a public space be protected? Would, for example, a park be considered to be a secluded place? While in most cases this would not be the cases one situation where a park may be a secluded place is when photographs are taken of homeless people. Even though a park is a public place, as homeless people have no specific private place, it may be treated as a secluded space.15 Another question that arises is whether a social network page would be seen as a secluded space. While seclusion is not defined in the ALRC report, the meaning of the term is drawn from the United States Restatement of Law, Torts which states that:

by physical intrusion into a place in which the plaintiff has secluded himself, as when the defendant forces his way into the plaintiff’s room in a hotel or insists

over the plaintiff’s objection in entering his home …16 The intrusion itself makes

14 See Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014), 5 paras 5.2. ‘Two Types of Invasion’ ; see Nicole Moreham, ‘Beyond Information: The Protection of Physical Privacy in English Law’ (2014) 73(2) Cambridge Law Journal 350, 351. 15 See Cherine Fahd, The Sleepers, 2005, Centre for Contemporary Photography Part of The Melbourne International Arts Festival (16 September–23 October 2011) ; ‘Instagram Trend that takes Photos of Homeless People and Posts them Online for Cheap Laughs’, Daily Telegraph (4 March 2015) ; Wendy Syfret, ‘Stop Taking Pictures of Homeless People’, Vice Australia (13 November 2014) ; Chris Grampat, ‘On the Ethics of Taking Photos of Homeless People’, The Photoblogger (16 March 2015) . 16 Regulation (EU) 2016/679 of the European Parliament. See American Law Institute, Restatement of the Law Second, Torts (1977) § 652B.

145

the defendant subject to liability, even though there is no publication or other

use of any kind of the photograph or information outlined.17

It is arguable that in some limited cases a profile page may be ‘a place of seclusion’.18 Social networks such as Facebook, Twitter and Instagram are public and semi-private networks which provide users with the ability to restrict access for users to their images. Even though Twitter allows people to share images publicly, there is some ability to restrict access.19 For example, Facebook’s privacy settings allow people to have a closed group or limit access to ‘only me’, ‘friends’, or ‘friends of friends’. When a person chooses the ‘friends of friends’ access setting third parties can access and view the images a social network page would not be a secluded space. However when a person has a profile page with restricted privacy settings such as ‘only me’ or a ‘closed group’, it could be argued that their profile page is a secluded space.20 Given that social networks allow users to create groups that are closed or ‘secret,’ a social network space may in limited situations be a secluded space. 21 This will depend on the nature of the settings used.22

6.2.3 Is Uploading an Image on a Social Network Page an Intrusion Upon Seclusion?

The decision of what qualifies as an intrusion upon seclusion depends on a number of different factors. Intruding on a secluded space may occur (in this context) in three situations. The first is in the taking of a photograph of a person. The second is in uploading the image. The third is when a personal image is viewed or accessed. In addition to physical encroachment into someone’s private space, intrusion upon seclusion includes the act of watching, listening, or recording private activities or affairs.23 The

17 Ibid. 18 Ibid. 19 See generally, Adam Pabarcus, ‘Are Private Spaces on Social Networking Websites Truly Private? The Extension of Intrusion Upon Seclusion’ [2011] 38(1) William Mitchell Law Review 397, 398-400, 406 20 Adam Pabarcus above n 19, 406. 21 See Adam Pabarcus, above n 19, 401-403. 22 For example, Facebook users can access the profile page, even if the parties are not connected directly – for example, friends, or friends of friends. See generally, Adam Pabarcus above n 19. 23 See further Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014), 5, Recommendation 5-1, 5.1 .

146

taking of a photograph of a person engaged in a private activity, would be an intrusion, because the taking of a photograph of a person is a record. 24 The question of whether someone intrudes on another person’s secluded space when they upload a photograph of that person or when they view a photograph that is online may depend on the privacy settings that are selected. Arguably a person who uploads an image of a third party engaged in a private activity to an open site would be intruding on the third party’s private space because the photograph is a record of a private activity. A person who accesses an image that was uploaded on a public site by someone else would not be intruding on a secluded space, because there are no restrictions on the accessibility of the uploaded images. The position would be different however, when an image is uploaded to a closed site. A person who uploads an image of another person on a social network site that is closed would less likely to be an intrusion. The position would be different, however where a third-party hacks into a closed or restricted site and views images. 25 In this case, this would likely to be an intrusion.

6.2.4 Scope of Protection

Another issue that will impact upon the effectiveness of the tort of intrusion upon seclusion in protecting personal images that are shared online relates to its scope. It is clear that the tort will protect against the misuse of personal, private and intimate images. As the ALRC noted, recording private activities is ‘more likely to be a serious invasion of privacy’.26 While private and personal activities were not defined in the ARLC report, the terms ‘private’ and ‘personal’

24 N. A. Moreham, above n 14, 354-5. The author suggests that taking photographs of a person’s private activities or disseminating photographs of the private activities fall within the scope of intrusion upon seclusion, 25 See generally, Adam Pabarcus above n 19. 26 The recording may subsequently be distributed or kept to be watched later by the person who recorded it: see Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014), 5, ‘Two Types of Invasions’, .

147

have been defined to include images that are ‘sexual or intimate’ in nature.27 This would also include images that capture people changing or semi-clothed.28 While the tort will protect against the misuse of personal, private and intimate images, it is less clear whether the tort will cover images of ordinary, everyday situations such as photographs that capture people eating, sleeping, walking or laughing. Generally, the question of whether a non-sexual or non-intimate image will be protected will depend on whether there is a reasonable expectation of privacy when people are photographed.29 There are no specific rules that apply when considering whether ordinary images are protected under the tort; however, it appears as though the scope is narrower for personal images that are taken in public places.30

6.3 Effectiveness of the Tort in Protecting Personal Images Shared Online

While the proposed tort of intrusion upon seclusion would address some of the gaps in the law, there are a number of issues that are not addressed. One problem that arises is that the proposed tort does not deal with situations where ordinary personal images are uploaded and shared on social networks – for example, when people’s images are captured in everyday moments such when they are sleeping31 or in embarrassing or intimate moments in their homes, at family gatherings, or public places. 32

27 See Giller v Procopets (2008) 79 IPR 489, Wilson v Ferguson [2015] WACA 15; Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014), 5.2–5.3, 73; see also submission by Electronic Frontiers Australia, Submission 44 ‘posting of photographs, audio-recordings, and video-recordings of personal spaces, activities, and bodies for which consent to post has not been expressly provided by the participant.’ 28 See Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014), 5.2 –5.3, 73. 29 C v Holland [2012] 3 NZLR 672; Giller v Procopets [2004] VSC 113; Hosking v Runting (2005) 1 NZLR 1. 30 However, in the United Kingdom, some activities such as walking on a street or taking a child for a walk in the park may be protected as a private activity. See Campbell v MGN Ltd [2004] 2 AC 457; von Hannover v Germany App No 59320/00 (24 June 2004); Murray v Express Newspapers PLC [2007] EWHC 1908. 31 Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014), 5, 5.6 ‘Two Types of Invasion’, ; see also Nicole Moreham above n 14, 351. 32 Australian privacy law contrasts with that of the United Kingdom because British common law expanded to include ‘misuses of private information’. The expansion of British common law of confidence was the

148

Another problem with the tort is that it is uncertain whether photographing people in public places would be protected. Currently, Australian law does not prevent people from being photographed in public places.33 Whether the proposed tort would protect personal images captured in public places would depend on whether there is a reasonable expectation of privacy.34 Without a reasonable expectation of privacy, it is unlikely that a tort of intrusion upon seclusion would be actionable. The upshot is that even if Australia adopted a tort of intrusion, it would still be inadequate to protect personal images online.

6.4 A Misuse of Private Information

The second type of serious invasion of privacy recommended by the ALRC is when there is a misuse or disclosure of private information, irrespective of whether that information is true or not. This mirrors the United Kingdom’s expanding tort of breach of confidence, as well as developments in other jurisdictions such as United States, New Zealand and Canada, which have recognised a tort for misuse of private information.35 In considering whether a tort of misuse or disclosure of private information would protect personal images that are shared on social networks, it is important to determine whether the misuse or disclosure of a personal

result of the protection of private and family life under the European Convention of Human Rights: see Art 10 European Convention of Human Rights. 33 The ALRC acknowledged that Australian law was not in line with other jurisdictions such as the United Kingdom, Canada, the United States and New Zealand where images of people captured in public places have been protected. 34 Jonathan Morgan, ‘Privacy Confidence, and Horizontal Effect: ‘” Hello” Trouble’, The Cambridge Law Journal [2003] 62(2) 444, 446 Morgan argues that there may be an expectation of privacy when in public just because people: ‘venture into the public, in order to further our private lives; we do not ipso facto relinquish all claims to a private sphere. Even tacit consent to being observed by other cannot automatically extend to their taking and a fortiori publishing photographs’; David Rolph, ‘Looking Again at Photographs and Privacy: Theoretical Perspectives on Law’s Treatment of Photographs as Invasions of Privacy’ in Anne Wagner and Richard K Sherwin (eds), Law, Culture and Visual Studies (Springer, 2014), 205, 224; see generally, D Feldman, ‘Privacy as a Civil Liberty’ (1994) 47(2) CLP 41. 35 The House of Lords were given the opportunity to examine a privacy claim based on breach of confidence in Campbell v MGN Ltd [2004] 2 AC 457, 464 (Lord Nicholls). While there was no question of extending the action of breach of confidence for an invasion of privacy for disclosure of private information, it was considered that breach of confidence may be misleading. In that decision, Lord Nicholls said that breach of confidence ‘harks back to the time when the cause of action was based on improper use of information disclosed by one person to another in confidence’.

149

image would be an invasion of privacy.36 There are three key elements for an action of a tort of misuse of private information. The first is that there must be private information. The second is that there must be a reasonable expectation of privacy in relation to the information in question. Third, the disclosure of the private information must be highly offensive to a reasonable person.37

6.4.1 What is ‘Private Information’?

It is uncontested that photographs are not only information, but also a superior form of information.38 It was shown earlier that photographs fall within the definition of personal information. In particular, photographs capture all kinds of information that can be private and personal. The key question here is whether the information is ‘private’. According to the ALRC, ‘private’ information means ‘information as to which a person in the position of the plaintiff has a reasonable expectation of privacy in all of the circumstances’.39 Whether something is

36 The 2014 ALRC report, Recommendation 5–1 recommended that ‘private information include untrue information if the information would be private if it were true’. In particular, at 5.55 the ARLC states: ‘it should be stressed that for the plaintiff to have an action under the privacy tort in this Report, the other elements of the tort would of course have to be satisfied. The untrue information would have to be a matter about which the plaintiff had a reasonable expectation of privacy and the misuse would have to be serious.’ See also Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014), 5, ‘Two Types of Invasion’, 5.36–5.55, . 37 Hosking v Runting (2005) 1 NZLR 1, where the court accepted a new tort of invasion of privacy by making private facts public. Further, at [117] Gault P and Blanchard JJ considered two requirements for a successful claim, based on the ‘existence of facts in respect of which there is a reasonable expectation of privacy’ and ‘publicity given to those private facts that would be considered highly offensive to an objective reasonable person’. 38 See David Rolph, above n 34, 224. 39 Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014) 13.3, 264.

150

private will depend on the circumstances of the case.40 In ABC v Lenah Game Meats,41 Gleeson CJ said that the test for determining whether something is private depends on whether the disclosure of the information would be ‘highly offensive’. 42 In some situations, determining whether something is private will be relatively straightforward. For example, sexual or intimate images will fall within the scope of private information.43 It could also be argued that ‘private’ would include photographs that capture information that relates to a person’s health, finances, personal relationships or finances.44 While in these situations it is relatively easy to determine whether the image would be private, in other cases it may be difficult to determine. This is particularly the case in relation to

40 However, the proposed recommendations by the ALRC suggest that an invasion of privacy must be intentional or reckless, serious and not justifiable by public-interest factors – for example, freedom of speech. See Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014), 5, ‘Two Types of Invasion’, ; Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd (2001) 208 CLR 199, 224–5 (Gleeson CJ); Seven Network (Australia) Operations Ltd v Australian Broadcasting Corporation [2007] NSWSC 1289, [8]–[9] (Barrett J); Giller v Procopets (2008) 79 IPR 489, 524 (Ashley JA) 589 ,593–5 (Neave JA); compare with Campbell v MGN Ltd [2004] 2 AC 457, 465 (Lord Nicholls of Birkenhead), 473–4 (Lord Hoffmann); A v B plc [2003] QB 195, 202 (Lord Woolf CJ); Douglas v Hello! (No. 3) [2006] QB 125, 150 (Lord Phillips of Worth Matraver MR); OBG Ltd v Allan [2008] 1 AC 1, 47–8 (Lord Hoffmann); Douglas v Hello! Ltd (No. 3) [2006] QB 125, 160 (Lord Phillips of Worth Matraver MR). 41 (2001) 208 CLR 199. 42 Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd (2001) 208 CLR 199 [42] (Gleeson CJ), who stated that, ‘Certain kinds of information about a person, such as information relating to health, personal relationships, or finances, may be easy to identify as private; as may certain kinds of activity, which a reasonable person, applying contemporary standards of morals and behaviour, would understand to be meant to be unobserved. The requirement that disclosure or observation of information or conduct would be highly offensive to a reasonable person of ordinary sensibilities is in many circumstances a useful practical test of what is private.’ Emphasis added. 43 Wilson v Ferguson [2015] WACA; see Giller v Procopets (2008) 79 IPR 489; Jane Doe v ABC & Ors [2007] VCC 281; Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014), 5 ‘Two Types of Invasion’, 5.2–5.7, https://www.alrc.gov.au/publications/5-two- types-invasion/summary. Notably, the ALRC suggests that posting sexually explicit images on the internet without the person’s permission is considered as a misuse of private information. 44 Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd (2001) 208 CLR 199, [42] (Gibson C J).

151

embarrassing or humiliating images captured in public.45 This is because it is difficult to distinguish between what is and what is not private. As Gleeson CJ said in Lenah:

There is no bright line, which can be drawn between what is private and what is not. Use of the term ‘public’ is often a convenient method of contrast, but there is a large area in between what is necessarily public and what is necessarily private. An activity is not private simply because it is not done in public. It does not suffice to make an act private that, because it occurs on private property, it has such measure of protection from the public gaze as the characteristics of the property, the nature of the activity,

the locality, and the disposition of the property owner combine to afford.46

6.4.2 Is There a Reasonable Expectation of Privacy?

The second requirement that needs to present for the proposed tort to apply is that there must be a reasonable expectation of privacy. As noted in by Lord Nicholls in Campbell v MGN, ‘the touchstone of private life is whether in respect of the disclosed facts the person in question had a reasonable expectation of privacy’.47 Given that Australian law has not developed to the same extent as the United Kingdom, in framing the proposed tort, the ALRC looked to the United Kingdom for guidance in order to determine what would constitute a reasonable expectation of privacy.48 The ALRC recommended a number of factors that Australian courts could take into consideration when determining whether a person would have a reasonable expectation of privacy including the nature of the information (whether it relates to intimate or family matters, health, medical or financial matters),49 the ‘means that used to obtain the private information or

45 For example people may consider a photograph to be private if they are photographed when they are drunk, or in embarrassing or humiliating situations, such as when Todd Carney was photographed urinating and the image was uploaded online, or when Mitchell Pearce was filmed intoxicated: see Cameron Tomarchio, ‘World Reacts to Mitchell Pearce’s Dog Act‘, News.com.au (28 January 2016) . 46 Lenah Game Meats Pty Ltd (2001) 185 ALR 1, 13 [42] (Gleeson CJ). 47 Campbell v MGN Ltd [2004] 2 AC 457, [21]. 48 See Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014), 6, 6.5- 6.25. ‘Reasonable Expectation of Privacy’, . 49 Ibid.

152

to intrude upon seclusion,’50 whether the intrusion occurred at the person’s home, the purpose of the misuse, disclosure or intrusion, the way that the private information was held or communicated, whether the private information was already in the public domain, the attributes of the plaintiff (for example age, occupation and cultural background) and the conduct of the plaintiff. 51 The ALRC also suggested that the court should:

consider not whether the plaintiff subjectively expected privacy, but whether it would be reasonable for a person in the position of the plaintiff to expect privacy. The subjective expectation of the plaintiff may be a relevant consideration, particularly if that expectation was made manifest, but it is not the focus of the

test, nor an essential element that must be satisfied.52

As noted by Lord Hope in Campbell v MGN the test for whether there is a reasonable expectation of privacy is whether the person sharing the personal image ‘knows or ought to know that there is a reasonable expectation that the information in question will be kept confidential’.53 Given that being able to restrict access to a personal image may warrant a belief that there is a reasonable expectation of privacy, even if the photograph is published on a social network. There may be a reasonable expectation of privacy when an image is shared online and access to that image is restricted. It could be argued that when a social network enables a person to control access to their personal images, there ought to be an expectation of privacy. This would depend on the social network’s privacy features (and whether a person has customised their access settings). While there is a likely to be a reasonable expectation of privacy where the image relates to a person’s home life or family life,54 it is unclear whether there would be a reasonable expectation of privacy when people are photographed in semi-public places or where the images capture sensitive information such as religious information55 (such as when people are photographed attending mass or while praying in places of worship and the photographs are

50 Ibid. 51 Ibid. 52 Ibid 6.7. 53 Campbell v Mirror Group Newspapers Ltd [2004] 2 AC 457, 480. 54 For example, in the United Kingdom, privacy protection extends to private information about a person’s family or private life. 55 While the term ‘serious’ was discussed previously, it includes images that capture sensitive or sexual activity: see further Wilson v Ferguson [2015] WACA; Giller v Procopets (2008) 79 IPR 489.

153

uploaded online).56 To the extent that this is a concern, it would appear that the effectiveness of the proposed tort in protecting personal images that are captured in public places would be limited.

6.4.3 Is the Disclosure of Private Facts Highly Offensive to a Reasonable Person?

The third requirement that must be satisfied to show a misuse of private information is that the disclosure of private facts is ‘highly offensive to a reasonable person’. The ALRC noted that the question of whether a disclosure of private information is highly offensive should be left to the courts to determine.57 Using an objective test would be in line with other jurisdictions such as the United Kingdom, New Zealand and the United States.58 It should be noted that the ‘highly offensive’ test has been questioned in other jurisdictions; specifically in the United Kingdom, where the British courts suggested that the test could be confusing. Specifically, Lord Nicholls stressed that there were two reasons why the test should be used with caution:59

First, the ‘highly offensive’ phrase is suggestive of a stricter test of private information than a reasonable expectation of privacy. Second, the ‘highly offensive’ formulation can all too easily bring into account, when deciding whether the disclosed information was private, considerations which go more properly to issues of proportionality; for instance, the degree of intrusion into private life, and the extent to which publication was a matter of proper public concern. This could be a recipe for confusion.60

56 For example, information that relates to a person’s religion is deemed sensitive information under s 6(1) of the Privacy Act (Cth) 1988. 57 See also Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014) 6.22, which states: ‘The ALRC considers that the offensiveness of a disclosure or intrusion should be one matter able to be considered by a court in determining whether there is a reasonable expectation of privacy. It is more reasonable to expect privacy, where a breach of privacy would be considered highly offensive. As discussed in Chapter 8, offence may also be used to distinguish serious invasions of privacy from non-serious invasions of privacy.’ 58 Ibid 6.14. 59 Campbell v MGN Ltd [2004] 2 AC 457, [22]. 60 Ibid.

154

6.4.4 Expanding the Law of Confidence to Include Private Information

In the event that a statutory tort was not enacted, the ALRC proposed that the Australian law of confidence should be expanded to include ‘private information.’ This would bring Australian into line with other jurisdictions such as the United Kingdom where the law of confidence has been expanded to include ‘private information’. This was done to ensure that British courts complied with the European Convention of Human Rights which protects a person’s private or family life.61 As Lord Hoffman said, ‘the right to control the dissemination of information about one’s private life’ is central to a person’s privacy and autonomy.62 In order to comply with Article 8 of the European Convention of Human Rights, the British courts expanded the law of confidence to include the misuse of private information to avoid establishing a new statutory tort.63 In so doing, the courts substituted the requirement of keeping information confidential with the requirement that the information should be kept private.64 Private information protected by an expanded law of confidence would be breached in a number of ways. The first is where a person discovers information about a third party such as bank records, health information, reading a diary or hacking into a person’s email.65 Another way that information could be breached is where a person retains private information about a third party, such as retaining private records or information for their own future reference or ‘with a view to sharing the information with others (by building up a computer file or secret dossier).66 Private information would also be breached where a third party photographed the

61 European Convention of Human Rights, art 8. 62 See Campbell v MGN Ltd [2004] 2 AC 457 (Lord Hoffman) [51]. See also ALRC, Serious Invasion of Privacy in the Digital Era, 5 Two Types of Invasions, Misuse of Private Information, . 63 See Tatiana Synodinou, ‘Image Right and Copyright law in Europe: Divergences and Convergences’, (2014) 3, Laws, 181,186; Catherine Walsh, ‘Are personality rights finally on the UK Agenda?’ (2013) 35(5) European Intellectual Property Review, 253, 257; see generally Mark Warby, Nicole Moreham and Iain Christie, eds, Tugendhat and Christie: The law of Privacy and the Media, (2nd ed Oxford, Oxford University Press, 2011). 64 See Tatiana Synodinou above n 63. 65 See Nicole Moreham, above n 14, 354 where she suggests that keeping things private is when ‘someone is finding out something about you against your wishes. He or she is learning that you have a sexually- transmitted infection, that you enjoy cross-dressing in private, that you run your home in a particular way, that you are having relationship difficulties, or that you are the anonymous author of a popular blog’. 66 Nicole Moreham, above n 14, 351, 355. The author suggests that there are ‘three sub-categories of invasions, such as finding out things about people they wish to keep private, keeping things private and

155

private activities of another person or disseminated the photographs of the private activities to third parties. Information may also be breached in situations where a person discloses private information about another person such as ‘by passing on gossip, uploading facts, photographs or other material to the Internet, or disseminating it in the media.’67 As misuse of private information is very broad, it would cover many of the different ways that private information may be misused online. It is clear that personal images that are shared online would fall within the misuse of private information because an intrusion of privacy would potentially occur at three particular junctures; at the time of taking the photograph, uploading the image and each time the image is viewed or accessed.68 Expanding the tort of breach of confidence in Australia to include the misuse, disclosure or publication of private information would provide some protection where a personal image is private but not of a sexual or intimate nature.69 Even if the existing law of confidence was expanded it would not provide people with adequate protection to prevent the misuse of their

disclosing private information by either sharing it on the internet or media or passing it on through gossip’; the ALRC also recommended that the Act include collecting and disclosing private information: ALRC, Serious Invasion of Privacy in the Digital Era, 5 Two types of invasions, Misuse of Private Information . 67 Nicole Moreham above n 14, 351, 355. 68 As Lord Phillips of Worth Matraver MR said in Douglas v Hello! Ltd (No. 3) [2006] QB 125, 161–2: ‘Once intimate personal information about a celebrity’s private life has been widely published it may serve no useful purpose to prohibit further publication. The same will not be necessarily true of photographs. In so far as a photograph does more than convey information and intrudes on privacy by enabling the viewer to focus on intimate personal detail, there will be a fresh intrusion of privacy when each additional viewer sees the photograph and even when who has seen a previous publication of the photograph is confronted by a fresh publication of it.’ 69 Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd (2001) 208 CLR 199, [110], [132], [34], [39], [40], [55]. Citing the American Law Institute, Restatement of the Law of Torts (Second) (1977), 2d § 652A, Comment b. Gleeson CJ said that ‘equity may impose obligations of confidentiality even though there is no imparting of information in circumstances of trust and confidence. And the principle of good faith upon which equity acts to protect information imparted in confidence may also be invoked to “restrain the publication of confidential information improperly or surreptitiously obtained”. The nature of the information must be such that it is capable of being regarded as confidential. A photographic image, illegally or improperly or surreptitiously obtained, where what is depicted is private, may constitute confidential information’; see also Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014) Breach of Confidence Actions for Misuse of Private Information, Recommendation 13-1, 265; Giller v Procopets (2008) 79 IPR 489; Grosse v Purvis [2003] QDC 151; Wilson v Ferguson [2015] WACA 15.

156

image. One reason for this is that there are still conceptual difficulties with an action for breach of confidence in Australia. This is because an image may be private but not be confidential.70 The exclusion of information that is about a person’s family or private life would leave a gap in the legal protection for personal images that are taken, uploaded and shared online. This is because the information would need to be ‘serious’. Another limitation is that once the information is published in the public domain, the action for breach of confidence would potentially fail. Another important recommendation of the ALRC was that a remedy for emotional distress ought to be included as part of compensation for misuse of private information.71 This would overcome the fact that the law of confidence does not adequately provide damages for emotional distressed suffered by a person whose image has been misused – for example, when people are photographed in embarrassing settings and the images were uploaded and shared online. Although some state courts in Australia have awarded damages for emotional distress, the common law generally is uncertain about whether damages can be awarded for emotional distress when personal images are misused.72 If enacted such a provision would provide important redress for online misuse.

6.5 Conclusion

In examining whether the proposed reforms potentially fill in the gaps in the existing legal protection, it has been shown that a statutory tort for serious invasions of privacy would provide legal protection for two specific types of invasions of privacy: intrusions upon seclusion and misuse of private information. The proposed recommendations would have limited application to personal images shared on social networks. This is because the proposed reforms would not deal with the ubiquitous capturing and uploading personal image on social networks. As noted

70 See generally Raymond Wacks, ‘Breach of Confidence and the Protection of Privacy’ (1977) 127 New Law Journal 328; Des Butler, ‘A Tort of Invasion of Privacy in Australia’ [2005] 29 Melbourne University Law Review 339, 352; Professor Feldman, ‘Privacy as A Civil Liberty’ [1994] 47(2) CLP 41; see also Jonathan Morgan, above n 34. 71 Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014) Breach of Confidence Actions for Misuse of Private Information 268. 72 See Giller v Procopets (2008) 79 IPR 489. See further Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report 123 (2014) Breach of Confidence Actions for Misuse of Private Information 268.

157

earlier, the ALRC’s view on ‘serious’ invasions are likely to be limited to images that are of a sexual or intimate nature. Personal images captured in everyday situations would be vulnerable and unprotected. This is also the case if the image was captured in a private place, unless the image was of a sexual or intimate nature.73 Consequently, there is a gap in protection for personal images that are not considered to be ‘sensitive’.74 Even though many personal images that are captured and uploaded online are not sensitive, those images also need protection. This is because personal images that are embarrassing or humiliating may be captured in public or private spaces. The taking and uploading of an image on to a social network may be an intrusion upon a person’s seclusion for two reasons; the first is that the information in the photograph may be private, the second is that the taking of a photograph is an invasion of a person’s physical privacy.75 There are a number of problems with the proposed statutory tort for serious invasions of privacy. The first is that it is uncertain whether many of the personal images that are captured and shared on a social network would be protected. The second problem is that the law has not caught up with a situation where images that are uploaded and shared online may be ‘private’ but still fall in the public domain. This occurs when personal images that are shared on social networks are shared online and go viral in seconds. When this happens, there is little that the law can do to prevent the misuse of personal images other than establishing a personal right to privacy (or images rights). Even if Australian law established a tort of invasion of privacy, this would not cover all the different instances where personal images are captured and shared online. It has been shown that Australian law does not protect people who are photographed in public places and people in Australia do not have a right not to be photographed. As people are photographed in various situations and in public or in private spaces; a statutory tort would be limited to situations where the image is sensitive or of a sexual nature. If the existing tort of breach of confidence were broadened to include a ‘misuse of private information’, the law of confidence would not provide adequate protection for personal images shared on social

73 Wilson v Ferguson [2015] WACA; Giller v Procopets (2008) 79 IPR 489. 74 Maynes v Casey [2011] NSWCA 156 (14 June 2011) [35]; see Saad v Chubb Security Australia Pty Ltd [2012] NSWSC 1183 [183]; Gee v Burger [2009] NSWSC 149 (13 March 2009) [53]; Dye v Commonwealth [2010] FCA 720 [290], where Katzmann J refused leave to the plaintiff to amend her pleadings to include such a claim, on various grounds, and Doe v Yahoo! 7 Pty Ltd [2013] QDC 181 (9 August 2013) [310]– [311]. 75 See Nicole Moreham, above n 14, 354-6. See Adam Pabarcus, above n 19, in relation to a private social network page being a secluded place.

158

networks. This is because when applying the criteria for an action of breach of confidence to personal images that are shared on social networks, the images tend to fall within the public domain. This is very similar to the way the existing common law protects personal images. Given that an Australian statutory tort is modelled on US privacy law, a more appropriate recommendation would have been to incorporate two further types of invasions to cover the use and misuse of people’s images. For example, the ALRC should have included serious invasions of ‘publicity which places the plaintiff in a false light in the public eye’ and an ‘appropriation for the defendant’s advantage, of a plaintiff’s name or likeness’.76 It would seem that these two types of serious invasions of privacy would be more appropriate to the misuse of personal images on social networks, such as when people’s images are distorted. In thinking about possible solutions to close the gap in legal protection for the misuse of personal images on social networks, a statutory tort ought to be broadened to incorporate a right to publicity or image rights to capture the various situations where personal images are used and misused. These are examined in Chapter 7.

76 See further William L Prosser, above n 10, 389.

159

Chapter 7 An Australian Right to Publicity?

This right might be called a ‘right of publicity’. For it is common knowledge that many prominent persons (especially actors and ball-players), far from having their feeling bruised through public exposure of their likeness, would feel sorely deprived if they no longer received money for authorising advertisements, popularising their countenances, displayed in newspapers, magazines, busses [sic], trains and subways. This right of publicity would usually yield them no money unless it could be made the subject of an exclusive grant which barred any other advertiser from using their pictures.

Judge Frank in Haelan Labs1

7.1 Introduction

This chapter examines the potential role that a right to publicity might play in protecting personal images that are shared online in Australia. While a number of jurisdictions have a right to publicity that protects personal images,2 Australia does not currently have such a right. Taking the United States law as a potential role model, the chapter will consider whether an equivalent right of publicity, if adopted in Australia, would help to prevent the misuse of personal images that are shared online.

1 Haelan Labs Inc v Topss Chewing Inc 202 F 2d 866, 868 2d Circ, cert denied, 346 US 816(1953). 2 For example, Canada protects personality rights under statute and common law. Some jurisdictions, such as Quebec, have a Civil Code for personality rights, as highlighted in Aubry v Éditions Vice-Versa Inc [1998] 1 SCR 591 (9 April 1998) 1998 CanLII 817, paras 55–59. See generally, Amy M. Conroy, ‘Protecting Your Personality Rights in Canada: A Matter of Property or Privacy?‘ (2012) 1:1 Western Journal of Legal Studies ; Denmark’s Danish Penal Code, Chapters 26 and 27 on personality rights: ‘Introduction to the Danish Data Protection Agency’, Datatilsynet (14 April 2011) ; Guernsey enacted law under the Image Rights Bailiwick of Guernsey Ordinance 2012. The Act allows people to register a personality right along with images associated that personality. Section 3 of Image Rights Bailiwick of Guernsey Ordinance 2012 defines images widely and includes likeness, gestures and voice. In the United States, each state incorporates personality rights either under statute or common law.

160

Image rights have been protected under the law of torts in the United States since the 1890s.3 The tort of a right of privacy is currently broken down into four categories and includes a right to publicity. These categories are: 1. intrusion upon the plaintiff’s seclusion or solitude or into his private affairs 2. public disclosure of embarrassing private facts about the plaintiff 3. publicity which places the plaintiff in a false light in the public eye, and

4. appropriation for the defendant’s advantage, of the plaintiff’s name or likeness.4

This chapter focuses on the last of the four torts protected under the tort of privacy in the United States: the appropriation of a person’s likeness or name, which is often referred to as the right of publicity or publicity rights.5 The US right of publicity allows people to prevent the appropriation of the commercial use of their identity, likeness or name.6 In 1953, in Haelan

Labs, Inc v Topps Chewing Gum, Inc,7 Judge Frank said:

in addition to and independent of that Right of Privacy … a man has a right in the publicity value of his photograph, i.e., the right to grant exclusive privilege of publishing his picture … Whether it be labeled a property right is immaterial; for here, as often elsewhere, the tag ‘property’ simply symbolizes the fact that courts enforce a claim

which has pecuniary worth.8

3 See Samuel D Warren and Louis D Brandeis, ‘The Right to Privacy’ (1890) 4 Harvard Law Review 193, 197; Neil M Richards and Daniel J Solove, ‘Privacy’s Other Path: Recovering the Law of Confidentiality’ [2007] Georgetown Law Journal, 123, 149; WAC, ‘The Right of Privacy in News Photographs’ (1958) 44(8) Virginia Law Review 1303, who suggests that Prosser’s adaptation of Brandeis and Warren’s right to privacy protects four aspects of personality, which relate to a person’s name, a person’s history, a person’s image (likeness) and a common law protection of personal diaries, letters and eavesdropping. As a result, the law of torts in the United States protects image rights broadly because legal protection is afforded under the broad banner of tort of a right to privacy; see generally, Dorothy J Glancy, ‘Privacy and the other Miss M’ (1990) 10 Northern Illinois University Law Review 401. 4 See Samuel D Warren and Louis D Brandeis, above n 3. 5 Ibid see generally, F. Jay Dougherty, ‘The Right of Publicity-Towards a Comparative and International Perspective’ (1998) 18 Loyola Law and Entertainment Law Journal, 421. 6 A right of publicity is defined as ‘one who appropriates the commercial value of a person’s identity for the purpose of trade is subject to liability’: see Restatement (Third) of Unfair Competition (1995), s 46; see Daniel Nemet-Nejat, ‘Hey, That’s My Persona!: Exploring the Right of Publicity for Blogs and Online Social Networks’ (2010) 33 (1) Columbia Journal of Law and the Arts 113, 116. 7 202 F 2d 866, 868, 2d Circ, cert denied, 346 US 816 (1953). 8 Haelan Labs Inc v Topps Chewing Gum Inc 202 F 2d 866, 868, 2d Circ, cert denied, 346 US 816 (1953).

161

There are two notable things about the US right of publicity that should be noted at the outset. The first is that the right only applies to natural people; it does not apply to corporations and similar entities.9 The second is that while, in theory, the right applies to both celebrities and non- celebrities.

As a result of case law in the 1950’s10 the right is now effectively limited to celebrities. As Bass has said; ‘although technically the right of publicity protects everyone, courts have primarily focused on celebrities because celebrities have greater incentives to litigate claims for commercial exploitation of their identities than non-celebrities’.11 The following section examines the criteria required for a right of publicity. In examining the right of publicity, the chapter will argue that if Australia did adopt a right to publicity, it could potentially fill in some of the gaps that exist in Australian law, as highlighted earlier in the thesis.

7.2 What are Publicity Rights?

There are four elements that must be satisfied for a claim of a right of publicity. These are:

1. that the plaintiff’s identity has been used, 2. for the defendant’s advantage, commercial or otherwise, 3. without the plaintiff’s consent, and

4. there is a resulting injury.12

9 See J Thomas McCarthy, ‘The Spring 1995 Horace S Manges Lecture: The Human Persona as Commercial Property – the Right of Publicity’ (1995) 19(129) Columbia VLA Journal of Law and the Arts 129, 134; See K. J Greene,’ Intellectual Property Expansion: The Good, The Bad and the Right of Publicity’ [2008] 11 Chapman Law Review, 521, 536 where the author states that ‘although under a majority view the right of publicity protects celebrities and non-celebrities alike it is not often called ―the celebrity right of publicity‖ for nothing. While the right of publicity might be said to overprotect celebrities, it tends to under-protect non-celebrities: noncelebrities merely have a theoretical right of publicity that ―is often neglected in practice.’ Further Greene citing Jordan Tabach- Bank, ‘Missing the Right of Publicity Road: How Tyne v Time Warner Entertainment Co, Threatens to ‘Sink’ the First Amendment, [2004] 24 Loyola Los Angeles Entertainment Law Journal 247, 254, said that ‘a majority of jurisdictions extend protection to non-celebrities on the theory that fame or notoriety goes to the endgame of commercial damages, not to the existence of the right’. 10 Haelan Labs Inc v Topps Chewing Gum Inc 202 F 2d 866, 868, 2d Circ, cert denied, 346 US 816 (1953). 11 See Ellen S Bass, ‘A Right in Search of a Coherent Rationale: Conceptualizing Persona in a Comparative Context- the United States Rights of Publicity and German Personality Rights’ (2008) 42 University of San Franscico Law Review 799, 807. 12 Alain J Lapter, ‘How the Other Half Lives (Revised): Twenty Years Since Midler v Ford: A Global Perspective on the Right of Publicity’ (2007) 15 Texas Intellectual Property Law Journal 239, 272;

162

To fully understand the scope and operation of the right of publicity the four elements that need to be satisfied are examined below.

7.2.1 The Use of the Plaintiff’s Identity

The first element that must be satisfied for the right of publicity to apply is that the plaintiff’s identity must have been used. It can be argued that when someone photographs a third party, the person who captures that image is making use of the person’s image. As a photograph of a person falls within the definition of personal information, and as a photograph identifies a person, the taking of a person’s photograph would constitute ‘use’ of the person’s identity. Sharing personal images of people online is also using a person’s identity because the photograph identifies the person on the social network.

7.2.2 The Use Must Constitute an Advantage, Commercial or Otherwise

The second element that must be satisfied is that the use of a person’s image constitutes an

‘advantage, commercial or otherwise’.13 While this element is construed broadly, American jurisprudence since the mid-1950s has demanded that the use of a person’s image must be for a commercial purpose14 such as endorsing a product or brand.15 In this context, the appropriation of a person’s name or likeness is linked to the commercial value of a person’s identity. Tan argues that there is a presumption ‘that a plaintiff’s identity has an economic value – especially for celebrities – when it has been used by a defendant in a commercial context’; indeed, it would be futile for an advertiser or a trader to appropriate an identity that had no market value since

Daniel Nemet-Nejat above n 6, 116; Anna E Helling, ‘Protection of “Persona” in the EU and in the US: A Comparative Analysis’ (2005) LLM Theses and Essays, Paper 45. 13 See generally, Alain J Lapter, above n 12, 272; Daniel Nemet-Nejat, above n 6; Anna E Helling, above n 12, 14. 14 See Alisa M Weisman, ‘Publicity as an Aspect of Privacy and Personal Autonomy’ (1982) 55 Southern California Law Review 727, 730; Lugosi v Universal Pictures 25 Cal 3d 813, 603 P 2d 45, 437–38, 160 Cal Rptr 323, 335–36 (1979) (Bird CJ dissenting); HR Gordon, ‘Right of Property in Name, Likeness, Personality and History’ (1960) 55 Northwestern University Law Review 553; Melville Nimmer, ‘The Right of Publicity’ (1954) 19 Law and Contemporary Problems 203; J M Treece, ‘Commercial Exploitation of Names, Likeness, and Personal Histories’ [1973] 51 Texas Law Review 637, 737. 15 See Pavesich v New England Life Insurance Company 122 Ga 190, 50 SE 68 (1905); Roberson v Rochester Folding Box Co 171 New York 538 (1902).

163

such an appropriation would not be providing any discernible benefit’.16 The reason that a right of publicity has been construed in economic terms is that in the United States post-1900s, people initiated claims seeking ‘economic compensation for the use of an individual’s likeness’.17 The commercial focus of the right of publicity ignores the non-monetary considerations that arise when people’s images are used in a non-commercial context.18 This is particularly important when personal images are misused on a social network given that it is often difficult to attribute economic value to a person’s image when they are not a celebrity.19 While some states, such as California, recognise these limitations and allow non-celebrity plaintiffs to recover damages for mental anguish apart from economic harm, this is not widely used.20

7.2.3 The Use of the Image is Without a Person’s Consent

When people take photographs of third parties, there is no requirement that they must obtain the consent of the person being photographed. While there is no law in the United State against taking photographs of people, a person will need to obtain consent if the photograph is used or published for commercial purposes.

16 David Tan, ‘Affective Transfer and the Appropriation of Commercial Value: A Cultural Analysis of the Right of Publicity’ [2010] 9(2) Virginia Sports and Entertainment Law Journal, 272, 279. 17 Alison C Storella, ‘It’s Selfie Evident: Spectrums of Alienability and Copyrighted Content on Social Media’ (2014) 94 Boston University Law Review 2045, 2069; Samantha Barbas, ‘From Privacy to Publicity: The Tort of Appropriation in the Age of Mass Consumption’ (2013) 61 Buffalo Law Review 1119, 1119–21, where the author states that between the early 1900s and the 1950s ‘several states formally reworked the tort (of appropriation) so that it no longer principally compensated dignitary and emotional injuries but rather economic harms’. 18 Alisa M Weisman, above n 14, 731; David Tan, above n 16, 274; Robert C. ‘Prost Rereading Warren and Brandeis: Privacy, Property, and Appropriation’ [1991] 41 Case Western Reserve Law Review. 647, 674–79. 19 See Fraley v Facebook 830 F Supp 2d 785 (ND Cal 2011). Cohen v. Facebook, Inc. (Cohen I) 798 F. Supp. 2d 1090, 1097 (N.D. Cal. 2011). Even though the court dismissed the plaintiffs' complaint with leave to amend and despite the amendments made by the plaintiffs, the amended claim was dismissed without leave to amend: Cohen v. Facebook, Inc. (Cohen II), C 10-5282 RS, 2011 WL 5117164, at *3 (N.D. Cal. Oct. 27, 20; see Jesse Koehler, ‘Fraley v Facebook: The Right of Publicity in Online Social Networks’, [2013] 28 (4) Berkeley Technology Law. Journal 963, 984. 20 See CAL. CIV. CODE § 3344(a) (West 2012). California courts permit recovery for private persons under the California right of publicity statute.

164

Social networks encourage and facilitate the sharing of images of third parties in their terms of use. Often, because images are shared on personal social network pages, it is unlikely that the subject will be asked for their consent to the use of their image – especially if their image is captured in a public place. As was noted in Chapter 2, social network contracts commonly deal with the use of personal images. When a person joins a social network, it can be argued that they give their consent to the use of their images. Where this is the case, a person would not be able to rely on a right of publicity when a social network uses those images for commercial purposes. This issue was considered in Fraley v Facebook,21 where Facebook argued that people give consent to the network to use the profile images when they agree to the network’s terms of use.22 However, the court found that the terms of use at that time did not explicitly give the network consent to use its user’s names and likenesses to disclose the services or products that the users had liked or used.23 The court also found that some of the plaintiffs in Fraley had consented to the network’s terms of use before the network introduced the ‘Sponsored Stories’ feature.24 Judge Koh dismissed Facebook’s claim that the plaintiff’s consented to the use of their images because the plaintiffs were: likely to be deceived into believing [they] had full control to prevent [their] appearances in Sponsored Story advertisements while otherwise engaging with Facebook’s various

features, such as clicking on a ‘Like’ button, when in fact members lack such control.25 This situation may be different as a result of subsequent changes in Facebook’s terms of use.

7.2.4 The Use of the Image Results in Injury26

In order for a United States right of publicity claim to be successful, the use of the image must result in an injury to the person whose image has been used. While it is relatively easy for a celebrity to prove economic harm, it is often difficult for non-celebrities to prove economic harm in the use of a person’s image. Social networks have challenged the traditional stereotype

21 Fraley v Facebook 830 F Supp 2d 785 (ND Cal 2011). 22 Ibid. 23 Ibid 803, 804–6. 24 Ibid 804–6. 25 Ibid 814-15; Francesca Grea, ‘To Like or Not to Like: Fraley V. Facebook's Impact On California's Right of Publicity Statute in The Age of the Internet,’ [2014] 47 Loyola Los Angeles Law Review 865, 869. 26 See generally Anna E Helling, above n 12.

165

of celebrity because ‘anyone can be a star’.27 This is because in today’s digital world, anyone with a social network profile is a public figure.28 Social networks allow ordinary people to attain a quasi-celebrity status because many people have many followers or friends which affirms their online popularity.29 The problem that arises for non-celebrities in a right of publicity claim is that while a misuse of a person’s image will often result in emotional distress, harm or damage to their reputation, it may not result in economic harm. For example, when a photograph of an intoxicated person is published on a social network it may result in that person being embarrassed and cause damage to their reputation if the image but not lead to any economic damage. The problem is that US law has been reluctant to recognise emotional harm as a cause of action.30 One reason for this is that there is a concern that recognising emotional harm for an unauthorised use of a person’s image might lead to ‘bad faith claims’.31 As a result, US courts have held that there will be no legal redress unless the harm was objectively measurable (such as an injury to reputation).32 However, the US courts have rejected this concern because ‘the law does not take cognizance of and will not afford compensation for sentimental injury’.33 As Judge Henry Bischoff said:

perhaps the feelings find as full protection as it is possible to give in moral law and responsive public opinion. The civil law is a practical business system,

27 See Ellen S Bass, above n 11, 800; Greg Lastowka, ‘User Generated Content and Virtual World’ (2008) 10 Vanderbilt Journal of Entertainment and Technology Law Review 893, 899. 28 See generally Patricia Sanchez Abril et al, ‘Famous for Fifteen Minutes: IP and Internet Social Networking’ (2008) 6(3) Northwestern Journal Technology and Intellectual Property 355. 29 Social networks like Twitter, Facebook and Instagram allow people to have connections and followers, with some going over 1,000 connections. In some cases, people can reach up to 100,000 followers. 30 Even if a non-celebrity is successful in a right of publicity claim, ‘damages due to lack of a commercial value to his celebrity harms [would] be wholly non-economic in nature, given the lack of any marketable value for image’ see KJ Greene, above n 9, 538; Alison C Storella, above n 17, 2072; Brian D Wassom, ‘Uncertainty Squared: The Right of Publicity and Social Media’ (2013) 63 Syracuse Law Review 227, 242–4, who states that in the ‘Restatement (Third) the general common law measurement of damages for right of publicity is the ‘the pecuniary loss to the other caused by the appropriation or for the actor’s own pecuniary gam resulting from the appropriation, whichever is greater’. 31 See Robertson v Rochester Folding Box Co 171 NY 544–6, 64 NE 443–4; Alisa M Weisman, above n 14, 739. 32 Ibid. 33 Murray v The Gast Lithographic and Engraving Co, 8 Misc 36 (NY Common Please 1894), quoting with approval Chapman v Western Union Tel Co; see also Robert E Mensel, above n 65, 32.

166

dealing with what is tangible and does not undertake to redress psychological

injuries.34

This is in contrast to Warren and Brandeis’s view that ‘thoughts, emotions and sensations demanded legal recognition’.35 Where the misuse of a person’s image only results in embarrassment or humiliation, it is unlikely that a right of publicity will apply. As a result, even though the right of publicity applies to non-celebrities, it ‘acts as a “right without a remedy” for the non-famous’.36

7.3 Exceptions to the Right of Publicity

There are a number of exceptions to the US right of publicity. The following section examines the exceptions to the right of publicity in the context of personal images that are shared online.

7.3.1 Public Interest and Newsworthiness

One of the situations when the right of publicity may not protect personal images that are shared online is when the use of an image is in the public interest. The common law in the United States provides that ‘no cause of action will lie for the publication of matters in the public interest, which rests on the right of the public to know and the freedom of the press to tell it.’37 This might occur when the images are used for news reporting or journalistic purposes. Even though a person’s image is misused, if the use is for journalistic purposes, the misuse will not actionable under the right of publicity.38 This is because:

34 Murray v The Gast Lithographic and Engraving Co, 8 Misc 36 (NY Common Please 1894) quoting with approval Chapman v Western Union Tel Co; see also Robert E Mensel, above n 65, 32. 35 Samuel D Warren and Louis D Brandeis, above n 2. 36 KJ Greene, above n 9, 536–8, quoting Doe v County of Ctr Pa 242 F 3d 437, 456 (3rd Circ 2001); see also Alison C Storella, above n 31, 2072. 37 Montana v San Jose Mercury News, Inc 34 Cal App 4th 790, 793 (Ct App 1995); Amy Morganstern, ‘In the Spotlight: Social Network Advertising and the Right of Publicity’ (2008) 12 Intellectual Property Law Bulletin 181, 191. 38 WAC, ‘The Right of Privacy in News Photographs’ (1958) 44(8) Virginia Law Review 1315.

167

the safeguarding of a free press is of paramount public importance. All courts agree that the right of privacy does not prohibit the publication of news and

pictures in connection with items of legitimate public interest.39

Koehler argues that the ‘right of publicity and the concept of newsworthiness require a balancing test that weighs the newsworthiness of the speech in question against the right of publicity of the person implicated as the subject matter of the speech.’40 While it appears that newspapers have a complete defence against the right of publicity when using personal images,41 there are some limitations on using personal images for news-reporting purposes. The first limitation is that even if an image is used for journalistic purposes, it cannot be used for commercial or advertising purposes without the subject’s consent.42 The second is that people who are not celebrities are usually unable to satisfy the elements discussed above because non- celebrity images are usually not commercial. As a result, when images of ordinary people are shared on social networks, the right of publicity will not prevent any misuse of the image. However, it may possible for the right of publicity to protect a person’s image where that image is used in connection with advertising or marketing. It seems that when the press uses a personal image, the person whose image is used will be challenged to have a successful claim for infringement of a right of publicity.43 This is because newsworthiness ‘is interpreted sufficiently loosely and broadly so that almost any

39 Louis Nizer, ‘The Right of Privacy, A Half Century’s Developments’ (1941) 39 Michigan Law Review 526, 540. See also W Mack Webner and Leigh Ann Lindquist, ‘Transformation: The Bright Line Between Commercial Publicity Rights and the First Amendment’ (2004) 37 Akon Law Review 171, 188. 40 Jesse Koehler, above n 19, 975. The author further states at 974-5 that ‘because California’s right of publicity prevents a commercial speaker from inappropriately using an individual’ s name or likeness and thus places a strain on what a speaker can say, the right of publicity can conflict with the First Amendment’s free speech and freedom of the press clauses’. 41 W Mack Webner and Leigh Ann Lindquist, above 39, ,192; New Kids on the Block v News America Publishing 971 F 2d 302 (9th Circuit 1992) 309, where the court said that ‘the papers have a complete defence to both claims [common law misappropriation and commercial misappropriation] if they used the New Kids name “in connection with any news, public affairs or sports broadcast or account” which was true in all material respects’. 42 WAC, above n 38, 1315; see also Binns v Vitagraph Co Of America, 210 NY 51 103, NE 1108 (1913); Kunz v Allen 102 Kan 883, 172 Pac 352 (1918); W Mack Webner and Leigh Ann Lindquist, above n 39, 188. 43 W Mack Webner and Leigh Ann Lindquist, above n 39, 193.

168

activity associated with a press activity will be held to be under that umbrella’.44 Consequently, it is unlikely that a right of publicity will protect personal images when journalists and news reporters use personal images that are shared on social networks.45 As result, even if a person’s image is shared on a social network and the image is taken from the network to report news, there is no law to prevent the use of that image. This leaves a gap in the protection available under the right of publicity. One issue that is unclear - which arises because of the way the internet is changing what we consider to be ‘news’: is whether an online posting made by a non-journalist could be newsworthy. Users of social media may consider anything that a friend posts online to be ‘newsworthy’. Judge Koh noted that because users were local ‘celebrities’ in their personal social network, their posting were considered to be newsworthy.46 If this approach was followed it would mean that anything that a user posts on a social network may be considered to be newsworthy to the people they are connected to.

7.3.2 Freedom of Expression

Another important exception to the right of publicity is when personal images are artistic works which are protectable under freedom of expression. In the United States, freedom of expression is protected under the First Amendment. Without doubt, the balance between protecting a person’s image and freedom of expression is a fragile endeavour. As Bass states, ‘there is an inherent tension between the right of publicity and the right of freedom of expression’.47 However, it seems as though a right of privacy is cast aside whenever it is considered alongside

44 Ibid. 45 This occurs, for example, when people are accused and journalists show the person’s image while telling the news. For example, when a lewd image of Todd Carney was captured in a nightclub restroom by another patron and later uploaded on Twitter, journalistic used the image: Harry Tucker and Debra Killalea, ‘What on Earth was Todd Carney Thinking When Shocking Lewd Photo was Taken’, Daily Telegraph (29 June 2014) . See Jenni Ryal, ‘How a Darth Vader Selfie Showed the Ugly Side of Social Media’, Mashable (11 May 2015) . 46 Fraley v Facebook 830 F Supp 2d 785 (ND Cal 2011), 805, Judge Koh (citing Downing v. Abercrombie & Fitch, 265 F.3d 994, 1002 (9th Cir. 2001) said that users were identified as ‘subjects of public interest among the same audience’; see Jesse Koehler, above n 19, 964. 47 Ellen S Bass, above n 11, 812; ETW Corp v Jireh Publishing 332 F 3d 915, 931 (6th Cir 2003).

169

freedom of expression. When people’s images are captured in a photograph, there may be competing interests. For example, John takes a photograph of Jane sitting on a park bench. John, as the creator of the photograph, owns the copyright in the photograph; this means that John controls the photograph and the use of the photograph. Jane, however, is the subject of the image and has no control over the use of the image that has been captured by John. In this situation, if John uploads the image of Jane onto a social network page, Jane will not be able to prevent the misuse of her image. This is because John has the freedom of expression to take photographs, and even if those photographs capture third parties, a right of publicity does not prevent a person from being photographed. In America, freedom of expression has become paramount to any privacy right, especially when the photograph is artistic or newsworthy. 48 A useful example of the way which the right of freedom of expression has been given precedent over privacy concerns can be seen in the decision Foster v Svenson,49 when a photographer (Svenson) had taken photographs of his neighbours in their home while in his own home using a high-powered lens.50 Svenson captured several different photographs of his neighbours (the Fosters) and their children sleeping, playing and undressing. The neighbours were not aware that Svenson was taking photographs until the photographs were displayed in an art gallery. Nor had the plaintiffs consented to the photographs being taken. At the first instance, the Fosters were unsuccessful in their claim because the photographer’s right to

48 See Alison C Storella, above n 17, 2050–1; Burrow-Giles Lithographic Co v Sarony 111 US 53 (1884); Bleistein v Donaldson Lithographing Co 188 US 239 (1903). 49 Foster v Svenson 2013 NY Slip Op 31782 NY Supreme Court 2013; Foster v Svenson 7 NYS 3d 96 (NY App Div 2015). 50 Foster v Svenson 7 NYS 3d 96 (NY App Div 2015) 128 AD 3d, 152. Renwick J stated: ‘New technologies can track thought, movement, and intimacies, and expose them to the general public, often in an instant. This public apprehension over new technologies invading one’s privacy became a reality for the plaintiffs and their neighbors when a photographer, using a high powered camera lens inside his own apartment, took photographs through the window into the interior of apartments in a neighboring building. The people who were being photographed had no idea this was happening. This case highlights the limitations of New York’s statutory privacy tort as a means of redressing harm that may be caused by this type of technological home invasion and exposure of private life. We are constrained to find that the invasion of privacy of one’s home that took place here is not actionable as a statutory tort of invasion of privacy pursuant to sections 50 and 51 of the Civil Rights Law, because defendant’s use of the images in question constituted art work and, thus is not deemed ‘use for advertising or trade purposes, ‘within the meaning of the statute.’

170

freedom of expression was thought to be more important than the privacy interests of the

Fosters.51 As Rakower J said:52

While it makes Plaintiffs cringe to think their private lives and images of their small children can find their way into the public forum of an art exhibition, there is no redress under the current laws of the State of New York. Simply, an individual’s right to privacy under the New York Civil Rights Law sections 50 and 51 yield to an artist’s protections under the First Amendment under the

circumstances presented here.53

On appeal the plaintiffs argued that a right of publicity ought to protect the use of their images because the images were exhibited in an art exhibition and some of the artworks had been sold. However, on appeal the court held that the plaintiffs:

do not sufficiently allege that defendant used the photographs in question for the purpose of advertising or for the purpose of trade within the meaning of the privacy statute. Defendant’s use of the photos falls within the ambit of constitutionally protected conduct in the form of a work of art. While a plaintiff may be able to raise questions as to whether a particular item should be considered a work of art, no such question is presented here. Indeed, plaintiffs concede on appeal that defendant, a renowned fine arts photographer, assembled the photographs into an exhibit that was shown in a public forum, an art gallery. Since the images themselves constitute the work of art, and artwork is protected by the First Amendment, any advertising undertaken in connection with the promotion of the artwork was permitted. Thus, under any reasonable view of the allegations, it cannot be inferred that plaintiffs’ images were used ‘for the purpose of advertising’ or ‘for the purpose of trade’ within the meaning of the

privacy statute.54

The court noted that there were gaps in the way that the right of publicity protected personal images in the United States. In particular, Renwick J noted that in order for a right of publicity to apply

51 Ibid 52 Ibid 53 Ibid (Rakower). 54 Ibid 160 (Renwick J).

171

(with respect to a right of privacy), a claim would need to overcome the First Amendment. The demand to strike a balance between a person’s right to privacy and freedom of expression has eroded the privacy rights for which Warren and Brandeis originally argued. As Renwick J said:

acknowledging that Civil Rights Law §§ 50 and 51 reflect a careful balance of a person's right to privacy against the public's right to a free flow of ideas, plaintiffs argue that defendant’s work should not be entitled to First Amendment protection because of the manner or context in which it was formed or made. In essence, plaintiffs seem to be arguing that the manner in which the photographs were obtained constitutes the extreme and outrageous conduct contemplated by the tort of intentional infliction of emotional distress and serves to overcome the

First Amendment protection contemplated by Civil Rights Law §§50 and 51.55

The court also noted that freedom of expression:

will not lose entitlement to the newsworthy and public concerns exemption of Civil Rights Law §§50 and 51 unless the means by which a person’s privacy was invaded was truly outrageous. Indeed, while one can argue that defendant’s actions were more offensive than those of the defendant in Howell, because the intrusion here was into plaintiffs’ home, clearly an even more private space, they

certainly do not rise to the level of ‘atrocious, indecent and utterly despicable’.56

It is unclear what circumstances or situations would give rise to ‘atrocious, indecent and utterly despicable’ behaviour, because even when the conduct is offensive, the balance between expression and a right of publicity tips in favour of expression. This highlights the inadequate protection afforded by the right of publicity because taking photographs of people while in their homes will not constitute conduct that is so outrageous that it oversteps the protected boundaries of freedom of speech or expression.57 It seems that a right of publicity will have a limited

55 Emphasis added. Foster v Svenson 7 NYS 3d 96 (NY App Div 2015) 128 AD3d, 161 (Renwick J). 56 Foster v Svenson 7 NYS 3d 96 (NY App Div 2015) 128 AD3d, 163. Renwick J said: ‘Further, the depiction of children, by itself, does not create special circumstances which should make a privacy claim more readily available. We note that defendant’s conduct here, while clearly invasive, does not implicate the type of criminal conduct covered by Penal Law § 250.40 et seq., prohibiting unlawful surveillance.’ 57 In Foster v Svenson 7 NYS 3d 96 (NY App Div 2015) 128 AD3d (Renwick J) stated: ‘In short, by publishing plaintiffs’ photos as a work of art without further action toward plaintiffs, defendant’s conduct, however disturbing it may be, cannot properly, under the current state of the law, be deemed so

172

application to personal images, regardless of whether they are captured in public or private places when those images are taken and used as artistic works as in the case of Foster v

Svenson.58 This is because a photograph is protected as an artistic work and, despite the manner in which the photograph is taken, will supersede any claims of privacy under a right of publicity. The New York Court of Appeal recognised that US law did not address situations where people are photographed in the privacy of their own homes because:

Undoubtedly, like plaintiffs, many people would be rightfully offended by the intrusive manner in which the photographs were taken in this case. However, such complaints are best addressed to the legislature – the body empowered to remedy such inequities … Needless to say, as illustrated by the troubling facts here, in these times of heightened threats to privacy posed by new and ever more invasive technologies, we call upon the legislature to revisit this important issue,

as we are constrained to apply the law as it exists.59

It is clear that the demand to strike a balance between a person’s right to privacy and freedom of expression has resulted in an erosion of the privacy rights that Warren and Brandeis originally argued for. As a result, it has undermined the effectiveness of the action. One question here, however, is whether the absence of an equivalent to a First Amendment right in Australia would mean that a publicity right in Australia would be more effective in protecting against online misuse of images?

7.4 Problems with a Right of Publicity?

It is clear that a right of publicity morphed from originally protecting a right of privacy, as envisaged in Warren and Brandeis’s right to privacy to a right to protect commercial use of a person’s image. Warren and Brandeis, who were concerned with the impact that pervasive technologies such as instantaneous photography had on people, had the foresight to predict that such technology would be intrusive to a person’s privacy; hence they saw the need to exercise a right of privacy that was not founded in the law of confidence.

“outrageous” that it went beyond decency and the protections of Civil Rights Law §§ 50 and 51. To be sure, by our holding here – finding no viable cause of action for violation of the statutory right to privacy under these facts – we do not, in any way, mean to give short shrift to plaintiffs’ concerns.’ 58 7 NYS 3d 96 (NY App Div 2015). 59 Foster v Svenson 7 NYS 3d 96 (NY App Div 2015) 128 AD3d (Renwick J).

173

As highlighted previously, there are situations where a right of publicity will protect personal images against unauthorised use. However, this is limited – for example, a right of publicity will only apply in circumstances where the image is used for commercial or advertising purposes, or in the case of celebrities where it causes economic damage. While a right of publicity provides protection for a person to ‘control the commercial use of his or her identity’,60 there are a number of problems that arise when images of non-celebrities are uploaded and shared on social networks.61 The first problem with a right of publicity is that it does not prevent a person from being photographed. The second is that a right of publicity collides with copyright over photographs that are artistic works. The third is that a right of publicity may not extend to deceased people. The fourth is that when personal images are shared online, social networks will regulate the use of those images through the network’s contract agreement. The following sub-section examines these problems.

7.4.1 No Law Against Being Photographed

The first problem with a US style right to publicity is that it does not prevent a person from being photographed. This is particularly the case when people are photographed in public streets. As a New York court stated, even ‘private social affairs and prevailing fashions involving individuals who make no bid for publicity are custom, regarded as public property,

60 J Thomas McCarthy, ‘The Spring 1995 Horace S Manges Lecture: The Human Persona as Commercial Property – the Right of Publicity’ (1995) 19(129) Columbia VLA Journal of Law and the Arts 129,130. 61 When people share personal images online, third parties may misuse those images. A right to publicity would provide some protection against the misuse of the image. For example, in Angel Fraley et al v Facebook Inc CA No 511-01726, the court allowed a motion where users alleged that their names and likeness were misused by Facebook’s ‘Sponsored Stories’ feature. While the case settled, the action highlights that when ordinary people’s images are misused, a right to publicity/appropriation will not result in adequate compensation. In this case, the plaintiffs were awarded $10 for the misappropriation of their image. Even though Facebook receives advertising revenue from the sponsored stories, the use of ordinary people’s images makes it difficult to determine adequate compensation.

174

where the apparent use is to convey information of interests and not mere advertising’.62 As

Horridge J said in Sports and General Press Agency Ltd v ‘Our Dogs’ Publishing Company,63:

In my judgment no one possesses a right of preventing another person photographing him any more than he has a right of preventing another person giving a description of him, provided the description is not libellous or otherwise wrongful. Those rights do not exist.64

Where there is no commercial use of an image, a right of publicity will not protect a person who is photographed in public where the resulting photograph is published online.65

7.4.3 A Right of Publicity May Not Extend to Dead People

Another situation where the United States’ right of publicity may not protect personal images is when a deceased person’s image is shared online.66 This was highlighted in Catsouras v

62 Martin v New Metropolitan Fiction Inc 139 Msc 290 292 248 NYS 359, 362 Supreme Court, Renseselaer Country 1931. WJ Wagner, ‘Photography and the Right to Privacy: The French and American Approaches’ (1980) 25 Catholic Lawyer 195, 208. The author suggests that ‘protection against the taking of photographs seemed to be practically impossible, and that anyone may take another’s picture on any occasion that presents itself. Protection would be given solely against the use made of the photographs. The use of another’s photograph is permitted, according to the cases as long as it is not connected with commerce, trade or business.’

63 [1916] 2 KB 880. 64 Sports and General Press Agency Ltd v ‘Our Dogs’ Publishing Company [1916] 2 KB 880 at 884. 65 See WAC, above n 42,1309; Gill v Hearst Publishing Co, 40 Cal 2 D 224, 253 P2d 441 (1953). 66 Some states in America extend personality rights to deceased persons: Catsouras v Department of California Highway Patrol, 104 Cal, Rptr 3d 352 (Cal Ct App 2010) modified, 2010, Cal App Lexis 253 (Cal Ct App 1 March 2010) appeal and republication request(s) denied, 2010, Cal Lexis 3456 (Cal April 2010). See generally Clay Calvert, ‘A Familial Privacy Right over Death Images: Critiquing the Internet- Propelled Emergence of a Nascent Constitutional Right that Preserves Happy Memories and Emotions’ (2013) 40(3) Hastings Constitutional Law Quarterly 475; Clay Calvert, ‘Salvaging Privacy and Tranquility from the Wreckage: Images of Death, Emotions of Distress and Remedies of Tort in the Age of the Internet’ (2010) 2 Michigan State Law Review 311; Kirsten Rabe Smolensky, ‘Rights of the Dead’ (2009) 37 Hofstra Law Review 763; David Collins, ‘Age of the Living Dead: Personality Rights of Deceased Celebrities’ (2002) 39(4) Alberta Law Review 914.

175

Department of California Highway Patrol67 where the appellate court held that while ‘family members have a common law privacy right in the death images of a decedent subject’ that this was equal to certain limitations.68 Even though the case settled before going to trial, the California appellate court noted that the ‘parties cite no California or Ninth Circuit Court of Appeals case addressing whether a complaint alleging a violation of a family member’s privacy right to photographs of a decedent is sufficient to state a cause of action’.69 As a result it has been suggested that:

while most of the case law involves the government and its access to autopsy and crime scene photographs, neither statutes nor common law define the proper remedies for families who wish to bring a relational right of privacy claim against a private individual. As technology continues to expand, so too are the

legal issues.70

Even if the right of publicity extended to deceased people, it would still face the same challenges that are present when applying a right of publicity to living people – that is, those images would have to be balanced with the existing exceptions of freedom of speech and newsworthiness that are contained in the First Amendment.71

7.4.4 Publicity Rights May be Lost When Entering into a Social Network Contract

Another reason why the right of publicity may not protect personal images shared on social networks is because people may contractually license their rights away. As shown in Chapter 2, when people join a social network they give the social network site very wide licences to use their content. The wide licences allow the networks to use, reuse and sub-license people’s photographs. Once an author subscribes to a social network service, they license their images in all of their content over to the social network. In so doing they lose the ability to use the right of publicity to protect themselves against misuse online (at least by the social network site).

67 104 Cal, Rptr 3d 352 (Cal Ct App 2010); Marsh v County of San Diego, 680 F3d 1148, 1153 (9th Circ 2012), 1159. Kozinski J stated that ‘although in Catsouras the court found a state privacy right over death images, it found no clearly established federal right’. 68 Catsouras v Department of California Highway Patrol, 104 Cal, Rptr 3d 359. 69 Ibid 389. 70 Catherine Leibowitz, ‘A Right to be Sparred Unhappiness’ (2013) 32 Cardozo Arts and Entertainment Law Journal 347, 349; Clay Calvert, above n 66, 504–5. 71 Clay Calvert, above n 66 , 517.

176

7.5 Conclusion

There is no doubt that if introduced into Australia a US style right of publicity would provide some protection for personal images. There are a number of limitations with the action however that would limit its usefulness. These include the fact that the right of publicity has been construed narrowly. The second is that freedom of expression has become paramount to protecting privacy in the use of personal images. The third is that a right of publicity does not extend to deceased people. The fourth limitation is that a right of publicity may not protect personal images that are regulated by social network contracts. Despite these limitations, if Australia did adopt a right of publicity, it would close some of the gaps in the legal protection for personal images shared online. To provide effective protection, an Australian right of publicity would need to be broader in scope than the US law. For example, there should be no requirement that the use of the image should be for commercial purposes; nor should it be targeted only at celebrities. An Australian version of a right of publicity should apply where people are photographed in public and private spaces. According to the law in the United States, a person who takes a photograph of another person should obtain consent if they want to use the image commercially. The same should apply in Australia, with the added condition that the person has consented to their image being shared online.

177

Chapter 8 The right to be forgotten in Australia

8.1 Introduction

Social networks facilitate communication and interaction online. When people communicate and interact online, their private lives often become public. Social networks such as Facebook, Instagram and Twitter have sparked new trends in the way people exchange and communicate information, particularly personal images; they actively encourage people to share their lives with their friends, family and social connections within the digital environment.1 All too frequently, people’s images are captured in photographs and shared on social networks without the person knowing that their images have been taken and shared online. In the process of sharing images on social networks, people often relinquish control over the use of their images, which allows the images to be exploited by third parties and social networks.2 The use of digital and communication

1 Recent notable example include the infamous photograph of a naked Prince Harry partying in Las Vegas; see ‘Prince Harry Naked Photos During Vegas Rager’, TMZ (22 August 2012), http://www.tmz.com/2012/08/21/prince-harry-naked-photos-nude-vegas-hotel-party. The problems with this is captured in Katy Perry’s tweet against Australian Media where she said: ‘Australian PRESS: you should be ashamed of your paparazzi & tabloid culture. Your paparazzi have no respect, no integrity, no character. NO HUMANITY.’ Perry also wrote: ‘I was stalked by many grown men today as I tried to take a quiet walk to the beach. These men would not stop as I pleaded over & over to let me have my space. Many other people stopped to try to help but the paps continued to laugh at me & hold their barrels up and shoot.’ And further: ‘This is PERVERTED & disgusting behaviour that should NEVER be tolerated, especially by people who do NOT want this.’ See Katy Perry, Twitter (21 November 2014), https://twitter.com/katyperry/status/535985788983721984/photo/1. 2 See generally, F Werro, ‘The Right to Inform v the Right to be Forgotten: A Transatlantic Clash in a Colombi Ciacchi’ in C Godt, P Rott and LJ Smith (eds), Haftungsbereich im dritten Millennium/Liability in the Third Millennium (Nomos, 2009), 285; Marie-Andress Weiss, ‘First Amendment Trumps Couple’s Right of Publicity; Copyright Claim to Proceed’ (2014) Journal of Intellectual Property Law & Practice 798; Victor Mayer-Schonberger, Delete: The Virtue of Forgetting in the Digital Ages (Princeton University Press, 2011), 1–2; A Giurgiu, ‘Challenges of Regulating a Right to Be Forgotten’ (2013) 7(2) Masayryk University Journal of Law and Technology 361; Jef Ausloos, ‘The Right to Be Forgotten- Worth Remembering?’ (2012) 28, Computer and Security Review, 143; Muge, Fazlioglu, ‘Forget Me Not: The Clash of the Right to be Forgotten and Freedom of Expression on the Internet’ [2013] International Data Privacy Law 1, 3-6; Paul A Bernal, ‘A Right to Delete?’ (2011) 2(2) European Journal

178

technologies creates a need to protect personal images and the information captured in those images from misuse.3 This chapter examines whether the European Union (EU)’s ‘right to be forgotten’ provides a possible solution to the problem of personal images being misused on social networks in Australia. Specifically, it considers whether the EU’s right to be forgotten is a model that could be adopted in Australia as a mechanism to protect against the misuse of people’s images within social networks. The right to be forgotten has its origins in a growing concern about the impact of digital technologies in general on personal privacy. As Vivian Reding observed, ‘if an individual no longer wants his personal data to be processed or stored by a data controller, and if there is no legitimate reason for keeping it, the data should be removed from their system’.4 The early 1990s saw the increasing use of digital technologies which created a need to protect people from potential abuse.5 As communication technologies sparked new trends in the way people exchanged and communicated personal information, the EU recognised that new data- protection laws were necessary to protect individual privacy and private life.6 To this end,

European regulators developed the Data Directive7 in 1995 to protect an individual’s personal data and the processing of such data. European data-protection laws were enacted at a time when technology was less advanced and the exchange of personal information was significantly

of Law and Technology 1; Alessandro Manterlero, ‘The EU Proposal for a General Data Protection Regulation and the Roots of the Right to be Forgotten’ (2013) 29(3) Computer Law and Security Review 229, 230. 3 See Bert-Jaap Kloops, ‘Forgetting Footprints, Shunning Shadows. A Critical Analysis of the Right to Be Forgotten in Big Data Practice’ (2011) 8(3) SCRIPT-ed 229, 230; Vivian Reding, ‘The Upcoming Data Protection Reform for the European Union’ (2011) 1 International Data Privacy Law 3. 4 Vivian Reding, ‘The EU Data Protection Reform 2012: Making Europe the Standard Setter for Modern Data Protection Rules in the Digital Age’, Speech 12/96 . 5 See Bert-Jaap Kloops, above n 3, 230; Vivian Reding, above n 3. 6 See Council of Europe, European Convention for the Protection of Human Rights and Fundamental Freedoms, as amended by Protocols Nos. 11 and 14, 4 November 1950, ETS 5, Art 8. 7 Data Directive of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data (Data Protection Directive) OJL 281 (23 November 1995) 0031-0050. Hereinafter referred to as the ‘Data Directive’.

179

lower than it is at present.8 Notably, in 1995 the use of social networks was not as prevalent as it is today. One of the challenges that arises with most new forms of technology is that the technology often evolves faster than the law. The position with social networks is no different. As Giurgiu argues ‘the main problem relies in the fact that the rapidly, changing societal model has not allowed for legal norms to catch up’.9 Concerned about the threat to individual privacy created by the widespread use of data storage and data mining, European regulators recognised that the rights to privacy and data protection in the Data Directive have become outdated. The problems with the law under the 1995 Data Directive were highlighted in the landmark 2014 Court of Justice decision of Google Spain v Gonzalez.10 The case arose when Mr. Gonzalez lodged a complaint against La Vanguardia Ediciones SL (a daily Spanish newspaper with a wide circulation), Google Spain and Google Inc.11 The basis of the complaint was that whenever an internet user searched for Mr. Gonzalez’s name using the Google search engine, the results would link to two pages from the La Vanguardia newspaper, which mentioned Mr. Gonzalez’s name in connection with proceedings for social security debts.12 Mr. Gonzalez requested two things. The first was that the newspaper remove or alter the pages so that ‘the personal data relating to him no longer appeared or to use certain tools made available by search engines in order to protect the data’.13 The second request that Mr. Gonzalez made was that Google Spain and Google Inc. be required to remove or conceal the personal data relating to him so that they ceased to be included in the search results.14 This was because the proceedings that were mentioned in the newspaper links had been resolved for a number of years and any references to that information were no longer relevant.15

8 A Giurgiu, above n 2, 362-4. 9 A. Giurgiu above n 2, 362-5; Bert-Jaap Kloops, above n 3; Jef Ausloos, above n 2, 148. 10 [2014] EUECJ C-131/12. 11 [2014] EUECJ C-131/12.14. 12 Ibid. 13 Ibid 15. 14 Ibid. 15 Ibid.

180

The court ordered Google Spain to remove Gonzalez’s personal data16 from the internet.17 The court held that data controllers should remove data where the data was ‘inadequate, irrelevant or no longer relevant, or excessive in relation to [the] purposes [for which they were originally collected or processed] and in the light of the time that has elapsed’.18 The Court of Justice issued a ruling that enabled people to request the removal of their data published by operators of search engines. The Google Spain v Gonzalez19 decision not only highlighted some of the inadequacies with the 1995 Data Directive, it also provided a possible solution. After some debate, to strengthen individual rights, in 2015 the European

Parliament passed the General Data Protection Regulation,20 which amended the Data

Directive. One of the key aspects of the revised law is the right to be forgotten.21 The General

Data Protection, which was approved by the European Parliament on 17 December 2015,22 will repeal the Data Directive when it takes effect in 2018. In April 2016, both the European Council and the European Parliament adopted the General Data Protection Regulation.23 This means

16 European Union, Directive 95/46/EC of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, OJ [1995] L281/31, Art 2(a), which defines data broadly as ‘“personal data” shall mean any information relating to an identified or identifiable natural person (“data subject”); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity.’ 17 [2014] EUECJ C-131/12. 18 The ruling is based on the Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regards to the Processing of Personal Data and on the Free Movement of Such Data, OJ [1995] L281/31. 19 Google Spain v Gonzalez Case [2014] EUECJ C-131/12. 20 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of individuals with regards to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC, OJ [2016] L119/1, Art 4 (1). Hereinafter referred to as ‘General Data Protection Regulation’, 21 The proposed amendments to the Data Directive included the rights of users to request that their personal data ‘no longer processed and deleted when they are no longer needed for a legitimate purposes’. General Data Protection Regulation, Art 17. 22 The General Data Protection Regulation was approved by the European Parliament on 15 December 2015. It will take formal adoption in 2018. See European Commission, ‘Press Release, Agreement on Commission’s EU Data Protection Reform Will Boost Digital Single Market’ (15 December 2015) . 23 The General Data Protection Regulation was approved by the European Parliament on 15 December 2015, however it was approved on 8 April by the Council and European Parliament approved the

181

that until the General Data Protection Regulation takes effect in 2018, the Data Directive is still effective. When it takes effect, there will be significant changes for social network sites that collect, process and store personal data. The 2016 General Data Protection Regulation provides that where a data controller has made data public, they must take ‘all reasonable steps, including technical measures in relation to data for the publication of which the controller is responsible, to inform third parties which are processing the data, that a data subject requests them to erase any links to, or copy or replication of that personal data’.24 The General Data Protection Regulation provides that a data subject shall have ‘the right to obtain from the controller the erasure of personal data relating to them and the abstention from further dissemination of such data especially in relation to personal data which are made available by the subject data while he or she was a child’.25

Article 17 also gives data subjects the right to be forgotten and to erase data relating to them.26 Specifically, Article 17 provides that users have the right to have information deleted in four situations. This is where:

Regulation on 14 April 2016. On 4 May 2016, the official texts were published in the EU Official Journal and will take formal adoption from 28 May 2018; see European Commission, Justice, Data Protection, Reform, Reform of EU Data protection rules 24 General Data Protection Regulation, Art 17(2). 25 Ibid. 26 General Data Protection Regulation, Art 17; Bert-Jaap Koops, above n 3; See generally Karen Eltis, ‘Breaking Through the “Tower of Babel”: A “Right to be Forgotten” and How Trans-Systemic Thinking Can Help Re-conceptualize Privacy Harm in the Age of Analytics’ (2011) 22(69) Fordham Intellectual Property Media and Entertainment Law Journal 70; Stijn Smet, ‘Freedom of Expression and the Right to Reputation: Human Rights in Conflict’ (2010) 26(1) American University International Law Review 183; Rolph H Weber, ‘The Right to be Forgotten: More than Pandora’s Box?’ (2011) 2 Journal of Intellectual Property, Information Technology and E-Commerce Law 120; Dominic McGoldbrick, ‘Developments in the Right to be Forgotten’ (2013) 13(4) Human Rights Law Review 761; Jeffrey Rosen, ‘Free Speech, Privacy and the Web that Never Forgets’ (2011) 9 Journal on Telecommunications and High Technology Law 345;; Barbara McDonald, ‘Privacy, Princesses and Paparazzi’ (2006) 50 New York Law School Law Review 205; Jeffrey Rosen, ‘The Deciders: The Future of Privacy and Free Speech in the Age of Facebook and Google’ (2012) 80 Fordham Law Review 1525; Steven C Bennett, ‘The “Right to be Forgotten”: Reconciling EU and US Perspectives’ (2012) 30(1) Berkeley Journal of International Law 161; Jeffrey Rosen, ‘The Right to be Forgotten, (2012) 64 Stanford Law Review online, 88; Jef Ausloos, above n 2; V Reding, above n 3; European Commission, A Comprehensive Approach on Personal Data Protection in the European Union (2010); F Werro, above n 2, 285.

182

a) the personal data are no longer necessary in relation to the purposes for which it was collected or otherwise processed; b) the data subject withdraws consent on which the processing is based according to point (a) of Article 6(1), or point (a) of Article 9(2), and where there is no other legal ground for the processing; c) the data subject objects to the processing pursuant to Article 21(1) and there are no overriding legitimate grounds for the processing, or the data subject objects to the processing pursuant to Article 21(2); and d) the personal data have been unlawfully processed.27

When applying the right to be forgotten to personal images shared online, there are a number of criteria that must be satisfied. Broadly, these are that:

1. the requirements for protection are met; 2. the use of the images falls within the scope of the right; and 3. the use of the images falls outside of the exceptions to the right to be forgotten.

The following section examines these elements in more detail.

8.2 Requirements for Protection

There are a number of criteria that must be satisfied in order for the right to be forgotten to apply. The first is that the images must fall within the meaning of ‘data’ as provided in the General Data Protection Regulation. The second is that the person must be a ‘data subject’. The third factor that needs to be satisfied for the right to apply is that the images must be controlled by a third party who is a ‘data controller’. The following sub-sections examine each in turn.

8.2.1 Data

In Europe, the term ‘data’ is defined broadly to include any information that relates to a ‘data subject’.28 Any information that relates to a person or identifies a person in an online

27 General Data Protection Regulation Art 17; A Giurgiu, above n 2, 366; Dominic McGoldbrick, above n 26, 763; Alessandro Manterlero, above n 2, 233. 28 ‘Data’ is defined broadly in the Data Protection Directive 95/46/ EC The Data Protection Directive Art 2(a): ‘“personal data” shall mean any information relating to an identified or identifiable natural person (“data subject”); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity.’

183

environment will be considered ‘personal data’.29 Photographs depicting people’s images are a way of identifying individuals and thus satisfy the definition of data in the Data Directive.30 People who join social networks and engage in the digital world exchange and share various types of information. This information forms the data that is processed, collected and stored in websites’ information systems. As social networks allow people to share images with multiple users simultaneously, this creates a number of issues for the control of the images when third parties reshare personal images. Sharing another person’s image on a social network by posting photographs of them online may be considered processing and collecting data under European law. Given that people not only share and exchange their own images but also third- party images on social networks, the images that are shared form the ‘data’ of the subject whose image is being used/shared.

8.2.2 Data Subject

The second criterion that needs to be satisfied for the right to apply is that the person must be a ‘data subject’. European data protection laws apply to data subjects who live in Europe. People who live in countries that are part of the European Union are entitled to rely on a right to be forgotten when their data is processed, collected or transferred to countries outside of the

European Union.31 According to Article 4(1) of the General Data Regulation, a data subject is a ‘natural person’,32 construed broadly as a person who can be ‘identified directly or indirectly, in particular reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity’.33 People who are users of social networks and social media will fall within the definition of a ‘data subject’, and therefore any photographs that contain a person’s image would also fall within the definition of ‘personal data’, as discussed above.

29 See Data Protection Directive 95/46/EC The Data Protection Directive, Art 2. 30 Ibid. See also generally, Spiros Simitis, ‘From the Market to the Polis: The EU Directive on the Protection of Personal Data (1994) 80 Iowa Law Review 445. 31 In Schrems v Data Protection Commissioner Case C- 362/14, Schrems objected to the transfer of his personal data from Facebook Ireland to servers in the United States. 32 See General Data Protection Regulation, art 4(1). See also Data Protection Working Party Opinion, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regards to the Processing of Personal Data and on the Free Movement of Such Data, OJ [1995] L281/31, Art 29. 33 Ibid.

184

8.2.3 Data Controller

The third factor that needs to be satisfied for the right to apply is that the images must be controlled by a third party who is a ‘data controller’. A ‘data controller’ is defined as ‘a natural or legal person, public authority, agency or any other body which alone or jointly with others determines the purposes and means of the processing of personal data; where the purposes and means of processing are determined by national or Community laws or regulations, the controller or the specific criteria for his nomination may be designated by national or

Community law’.34

Google Spain v Gonzalez35 confirms that search engines are data controllers and as such are liable under the General Data Proposal Regulation. Given that social networks determine the purpose and means of processing personal data it is also clear social networks will fall within the definition of data controllers. For example, Facebook is a data controller because the network processes, stores, transfers and collects people’s personal data.36 Given the scope of Web 2.0 and the participative culture that it created, individuals who share other people’s images may also be treated as data controllers.37 This is because an individual may collect and process another person’s data when they take a photograph or upload an image of another person online. Consequently, it is arguable that people who take photographs of third parties and upload and exchange the images on social networks would facilitate the ‘processing’ of personal data and as such arguably fall within the definition of ‘data controller’.

8.3 Use is Within the scope of the Right to be Forgotten

The right to be forgotten provides that the ‘fundamental rights and freedoms of natural persons and in particular their right to privacy with respect to the processing of personal data’ should be

34 General Data Protection Regulation, Art 4(1). See also Data Protection Working Party Opinion, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, OJ [1995] L281/31, Art 29. See also generally Rebecca Wong, Social Networking: Anybody is a Data Controller (21 September 2008), SSRN, http://ssrn.com/abstract=1271668. 35 [2014] EUECJ C-131/12. 36 See http://www.facebook.com. 37 See generally, Rebecca Wong, ‘Social Networking: A Conceptual Analysis of a Data Controller’ (2009) 14(5) Communications Law 142; see also Data Protection Working Party Opinion on Social Networking, Art 29.

185

protected.38 The right to be forgotten strengthens the rights of data subjects when their data is used or misused. It does this by giving them the right to control the use of their image when the image is shared by third parties. The right to be forgotten allows people to request the removal of their image from data controllers that includes social networks sites and search engines. The right to be forgotten operates in a number of different situations. The first is where the data is no longer relevant or if it is outdated (as in Google Spain v Gonzalez).39 The second is when a person withdraws the consent on which the processing of the data is based.40 Under the General Data Protection Regulation, the withdrawal must be unambiguous. When people sign up to a social network, they agree to the social network’s terms of use. By agreeing to the terms, they are providing their consent to the network to use collect, process and store their images. By entering into a social network contract, people give their consent to the network to capture their photographs legitimately. However, people often do not understand what the consent entails. Once a person gives their consent, their photographs (and personal image) and the ways in which their images may be used are beyond their control. This is because the network contracts allow personal images to be passed to third-party affiliates to be used for advertising and marketing purposes.41 Under the General Data Protection Regulation, users may withdraw their consent allowing social networks to process, store and collect their data. This has ramifications for when a person terminates their social network account.42 As shown earlier, when a person terminates their social network contract, the network is still able to use a person’s images that have been shared on the network. In this case, when a social network continues to use people’s images after the contract ends, the network may be in breach of the General Data Protection

38 See Regulation 10 General Data Protection Regulation. See also Data Protection Working Party Opinion, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, OJ [1995] L281/31, Art 29. 39 [2014] EUECJ C-131/12. 40 General Data Protection Regulation Art 7, provides that a person can withdraw their consent. 41 Paul A Bernal, above n 2; see generally Jef Ausloos, above n 2, 146; Muge Fazlioglu, above n 2, 4-5, Alessandro Manterlero, above n 2, 230. 42 Particularly significant are Facebook’s Terms of Use. In relation to the right to be forgotten, any requests from its users to erase the data would have to be erased from all of their data-storage systems, not just the Facebook platform. This contravenes Facebook’s new terms of use, which also state that the network can access archived copies of users’ shared data despite the user deleting or deactivating their account.

186

Regulation. When this occurs, a person would be able to use the right to be forgotten to request that the network remove their images from the network. The third situation where the right to be forgotten might apply is when a person objects to the processing of their data.43 This might occur, for example, when a person takes a photograph of a third party who does not want their image to be shared online. The General Data Protection Regulation defines ‘processing’ broadly as:

any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise

making available, alignment or combination, restriction, erasure or destruction.44

When a person takes their own photograph or a photograph of a third party, they are potentially ‘processing’ data in so far as they are collecting and recording the image. Similarly, the uploading of an image on a social network page may fall within ‘use, disclosure, dissemination or otherwise making available’.45 A fourth situation where the right to be forgotten may apply is where a data subject’s information is transferred for processing to a country outside of Europe which does not protect data to the standard required by European law.46 Specifically, the right to be forgotten allows data subjects to object if their data has been transferred to third countries where those countries do not safeguard or protect the fundamental rights and freedoms that are guaranteed within the

European Union.47 This is a result of Schrems v Data Protection Commissioner, where the Court of Justice held that the existing safe harbour provisions which provided that a data

43 An objection to the processing of a data subject’s data may be aimed at a data controller such as a search engine, Google, or a social network site like Facebook. 44 Emphasis added. General Data Protection Regulation, Art 4(2). 45 General Data Protection Regulation, Art 4(2). 46 Schrems v Data Protection Commissioner Case C-362/14, EU:C:2015:650, 78. The Court of Justice stated that ‘as is apparent from the very wording of Article 25(6) of Directive 95/46, that provision requires that a third country “ensures” an adequate level of protection by reason of its domestic law or its international commitments’. Secondly, according to the same provision, the adequacy of the protection ensured by the third country is assessed ‘for the protection of the private lives and basic freedoms and rights of individuals’. 47 Ibid 90-91, citing judgment in Digital Rights Ireland and Others C 293/12 and C 594/12, paras 54–5.

187

subject’s data may be transferred to a third country were invalid.48 The Court of Justice held that a data subject may object to the transfer or processing of their data to a third country if it can be shown that the third country does not protect personal data in accordance with European law. 49 As the Court of Justice said:

the United States authorities were able to access the personal data transferred from the Member States to the United States and process it in a way incompatible, in particular, with the purposes for which it was transferred, beyond what was strictly necessary and proportionate to the protection of

national security.50

The Court of Justice also noted that when transferring a data subject’s data to a third country, the data subject would need to have ‘administrative or judicial means of redress enabling, in particular, the data relating to them to be accessed and, as the case may be, rectified or erased’.51 Consequently, the right to be forgotten allows data subjects to object if their data have been transferred to third countries where those countries do not safeguard or protect the fundamental rights and freedoms that are guaranteed within the European Union.52

8.4 Exceptions to the Right to be Forgotten

There are a number of exceptions to the right to be forgotten in the General Data Proposal Regulation. One of the most important exceptions is in Article 80 of the General Data Regulation which provides an exception for journalists and artists for the processing of personal

48 Schrems v Data Protection Commissioner Case C-362/14, EU:C:2015:650. In a press release outlining the decision, the Court of Justice noted that the Irish High Court had to examine Schrem’s claims with ‘all due complaint with all due diligence and, at the conclusion of its investigation, is to decide whether, pursuant to the directive, transfer of the data of Facebook’s European subscribers to the United States should be suspended on the ground that that country does not afford an adequate level of protection of personal data;’ see Court of Justice of the European Union, Press Release No 1117/15 (6 October 2015), http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-10/cp150117en.pdf. 49 Schrems v Data Protection Commissioner Case C-362/14, EU:C:2015:650. 50 Ibid 90. 51 Ibid, emphasis added. 52 Ibid 91, citing judgment in Digital Rights Ireland and Others C 293/12 and C 594/12, paras 54–5.

188

data and freedom of expression.53 This requires that a data subject’s request to remove data must be balanced against freedom of speech or expression as well as the public’s interest in having access to the information. The balancing of freedom of expression and the right to be forgotten is critical when people share and exchange personal images on social networks. The General Data Protection Regulation recognises that when people upload and share images within a social network, there are competing interests between users who upload and share images, the people who access the image, and the subjects of those images. When deciding how the balance between these interests is to be drawn, a variety of factors are taken into account. These include ‘the nature of the information in question and its sensitivity for the data subject’s private life and on the interest of the public in having that information, an interest which may vary, in particular, according to the role played by the data subject in public life.54 In the case of public figures, the courts seem willing to give more weight to the public’s right to know than their ability to keep matters private. This is because ‘the interference with [a famous person’s] fundamental rights is justified by the preponderant interest of the general public in having, on account of inclusion in the list of results, access to the information in question.’55 One of the important consequences of the right to be forgotten is that it enables people to regain control over their data. It appears that if people did regain control, this would be detrimental to a person’s freedom of expression or speech. While these are valid concerns, they often disregard the key issue redressed by the right to be forgotten, which is that there are vast numbers of personal images collected and stored on the internet by large internet firms such as

Google, Facebook and Microsoft that rely on people sharing their images online.56

53 General Data Protection Regulation, Art 80. Compare with the exception of freedom of expression was previously contained in Article 9 in Data Directive 95/46/EC. Article 9 is an exemption that relates to the ‘processing of personal data carried out solely for journalistic purposes or the purpose of artistic or literary expression only if they are necessary to reconcile the right to privacy with the rules governing freedom of expression’ Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regards to the Processing of Personal Data and on the Free Movement of Such Data, OJ [1995] L281/31, Art 9. See generally Anne Flanagan, ‘Defining “Journalism” in the Age of Evolving Social Media: A Questionable EU Legal Test’ (2012) 21(1) International Journal of Law and Information Technology 1. See e.g. Giovanni Sartor, ‘The Right to be Forgotten: Balancing Interests in the Flux of Time,’ (2016) 24 International Journal of Law and Information Technology 72, 74-78; Muge Fazlioglu, above n 2, 5-6; Alessandro Manterlero, above n 2, 230-232. 54 Google Spain v Gonzalez [2014] EUECJ C-131/12 at 81. 55 Ibid at 97. 56 Paul A Bernal, above n 2.

189

Another exception that potentially restricts the operation of the right to be forgotten is the ‘personal or household purposes’ exception. This is found in Article 2 of the General Data

Protection Regulation,57 which provides that where the processing of personal data is by a ‘natural person in the course of a purely personal or household activity’, it will fall outside the scope of the Regulation.58 The personal and household exception covers most of the activities that people engage in online, uploading and sharing a personal image on a personal profile page.59 The household exemption was incorporated in the 1995 European Data Directive 95/46/EC, at a time where the internet had not begun and the information that people had was limited to written records or held on a computer that did not have internet.60 Given that the exception effectively excludes individuals from the right to be forgotten, it has very important consequences for how useful the right to be forgotten may be in protecting against online misuse of images.

Misuse of personal data by companies Companies such as Google, Instagram, Facebook, Microsoft, Twitter collect, process and store vast amounts of personal data. These companies retain a significant amount of their users’ data which increasingly intrudes on people’s personal lives. As Manterelo argues, ‘in

57 General Data Protection Regulation, Art 2. 58 General Data Protection Regulation, Art 2 (2) (c). See also generally Rebecca Wong, Social Networking: Anybody is a Data Controller (21 September 2008) SSRN, http://ssrn.com/abstract=1271668. See also Rebecca Wong, ‘Social Networking: A Conceptual Analysis of a Data Controller’ (2009) 14(5) Communications Law 142,143. See e.g., Zusanna Warso, ‘There’s more to it than data protection- Fundamental Rights, Privacy and the Personal/Household exemption in the digital age’, (2013) 29 Computer and Security Review 491, 491-2, 495. 59 Article 29 Working Party, Annex 2 Proposals for Amendments regarding exemption for personal or household activities < http://ec.europa.eu/justice/data-protection/article-29/documentation/other- document/files/2013/20130227_statement_dp_annex2_en.pdf>

60 Google Spain v Gonzalez C -131/12 per Advocate General Jääskinen who stated at [27] ‘In 1995, generalised access to the internet was a new phenomenon. Today, after almost two decades, the amount of digitalised content available online has exploded. It can be easily accessed, consulted and disseminated through social media, as well as downloaded to various devices, such as tablet computers, smartphones and laptop computers. However, it is clear that the development of the internet into a comprehensive global stock of information which is universally accessible and searchable was not foreseen by the Community legislator’ ; see generally Claire Bessant, ‘The application of Directive 95/46/EC and the Data Protection Act 1998 when an individual posts photographs of other individuals online’, [2015] 6(2) European Journal of Law and Technology < http://ejlt.org/article/view/390/570> .

190

a world where it is assumed that no value is attributed to privacy and oblivion, the ones to gain from this abandonment of old rights are the owners of these platforms or services which have an exclusive and comprehensive view of the entire mass of data’.61 Social networks ‘represent an antimony because they do not share information taken from the data and even though they give little value to privacy and affirm the end of oblivion (describing life as a timeline); they extract a high value from this data.’62 As Manterelo suggests, the data collected and stored by social networks represents ‘not only money but also power’63 which facilitates the ongoing exploitation and the expropriation of users’ data. 64 The right to be forgotten is an ‘attempt to reduce the amount of data collected’, which undermines the social network’s power.65 One of the consequences of the right to be forgotten is that it enables people to regain control over their data. The EU’s right to be forgotten aims to re-shift the power imbalance that social networks have held over their users’ images. As Bernal argues, this ‘kind of transfer of power, that kind of re-balancing, could have possibilities to redress the current imbalance over personal data – and to help re-establish at least some control that people have lost and feel that they have lost’.66

While the right to be forgotten is not a mechanism that will actually prevent the misuse of personal images, it does provide a remedy for people who have had their personal images misused. This is because it enables people to request that when their images which have been misused that they are deleted from the network. In this sense the right to be forgotten would provide a practical solution for people who use social media, as well as non-members whose images are captured and uploaded online.

A number of arguments have been made against the right to be forgotten. In so far as the right allows an individual to have data about them deleted or removed, there is a concern that it will facilitate self-censorship. 67 The fear here is that the right to be forgotten will allow

61 Alessandro Manterlero, above n 2, 234-5. 62 Ibid, 234. 63 Ibid, Manterelo states that ‘for this reason owners of big data have tried to make it more difficult to change privacy settings, have used technical devices to track users in a persistent way and have thus evoked the end of the privacy era.’ 64 Ibid. 65 Ibid. 66 Paul A Bernal above n 2. 67 Bert-Jaap Koops, above n 3, 231; see generally PS Castellano, ‘The Right to be Forgotten Under European Law: A Constitutional Debate’ (2012) 16(1) Lex Electronica; Steven C Bennett, above n 26; Stijn Smet,

191

people to rewrite history; 68 that is, that it will allow people to manage public information in order to ensure that only certain perspectives of them are in the public domain. 69 While there is a chance that the right to be forgotten may be used in this way, this would require the courts to adopt a very broad reading of the type of situations where the right to be forgotten might be applied. On most readings, such cases of ‘censorship’ would only be allowed in limited and presumably justified situations such as when the data is outdated, irrelevant, or when a person withdraws their consent to have the data published. Another concern with the right to be forgotten is that it will restrict freedom of speech and/or expression.70 It is clear that the right to be forgotten will remove information from the public domain. In introducing the right to be forgotten the intention of the European legislators was not to restrict freedom of the press or free speech; rather it was to protect an equally important right: personal privacy. Given that the General Data Protection Regulation includes an exception for free speech, it seems that many of the complaints about free speech are about the balancing of the rights and where the line is to be drawn. Any risk to free speech or freedom of the press has been incorporated into the General Data Protection Regulation, and any requests must be balanced against freedom of expression and the public interests.71

above n 26; Rolph H Weber, above n 26; Omer Tene and Jules Polonetsky, ‘Privacy in the Age of Big Data: A Time for Big Decisions’ 64 Stanford Law Review Online 63. See A Giurgiu, above n 2, 367. 68 See generally, Steven C Bennett, above 26; Stijn Smet, above n 26; Rolph H Weber, above n 26; see generally Omer Tene and Jules Polonetsky, above n 67. 69 Some scholars argue that the right to be forgotten needs to be framed in a different language, such as ‘the right to delete’; see generally Paul A Bernal, above n 2; Steven C Bennett, above n 26; Stijn Smet, above n 26; Rolph H Weber, above n 26; Omer Tene and Jules Polonetsky, above n 67. 70 see Bert-Jaap Koops, above n 3, 238, 238-40. 71 This is because there are a number of exceptions to the right to be forgotten as stated in General Data Protection Regulation, Art 17 (3) that paragraphs 1 and 2 will not apply to the extent of the processing is necessary: (a) for exercising the right of freedom of expression and information; (b) for compliance with a legal obligation which requires processing by Union or Member State law to which the controller is subject or for the performance of a task carried out in the public interest or in the exercise of official authority vested in the controller; (c) for reasons of public interest in the area of public health in accordance with points (h) and (i) of Article 9(2) as well as Article 9(3); (d) for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes in accordance with Article 89(1) in so far as the right referred to in

192

There are a number of other problems with the right to be forgotten; one of which is that many aspects of the new regulation are uncertain. For example, when personal images are misused online, it is unclear whether the social network or the individual would be responsible to remove the image. This is important because the data subject may not be the owner of the image and would need the copyright owner or social network site to remove the photographs on their behalf. As a result, it may be unclear whether the data subject has a claim on the copyright owner to remove their image from their personal profile page. It is also uncertain whether the data subject has a claim on the social network provider to remove their image from the network.72 This is because the distribution of responsibilities is ‘unclear, since both the SNS provider and the user/uploader are being designated as data controllers in the standard interpretation of the Directive’.73 Another problem with the right to be forgotten relates to the scope of the personal or household purpose exception. The problem here is that it is unclear ‘whether an individual posting personal data openly for a worldwide, unrestricted audience can still be considered to be processing the data for personal or household purposes.’74 This is because, arguably, a person who disseminates an image on a social network may fall within a personal or household purpose.75 Another issue that is unclear is the way in which the right to be forgotten will apply in relation to photographs (as distinct to written information). While it is clear that photographs will fall within the definition of ‘data’, what is less clear is when an image will trigger the right to be removed. For example, it is not clear what will need to change for a photograph to be declared ‘irrelevant’, ‘inadequate’, or ‘excessive’? 76 Most of the examples given where the

paragraph 1 is likely to render impossible or seriously impair the achievement of the objectives of that processing; or (e) for the establishment, exercise or defence of legal claims. 72 see Bert-Jaap Koops, above n 3, 238, 238-40. 73 Ibid. 74 Article 29 Working Party, Annex 2 Proposals for Amendments regarding exemption for personal or household activities < http://ec.europa.eu/justice/data-protection/article-29/documentation/other- document/files/2013/20130227_statement_dp_annex2_en.pdf> 75 Norberto Nuno Gomes de Andrade, ‘Oblivion: The Right to be Different… From Oneself: Re- Proposing The Right to be Forgotten’ (2012) 13 Revista de los Estudios de Derecho y Ciencia Política de la UOC 122, 128. 76 Google Spain v Gonzalez C-132/12, per Advocate General: N. Jääskinen, 93 said ‘It follows from

193

right to be forgotten apply in relation to textual data – newspapers stories and the like- not photographs. While this is an issue that needs clarification, it would seem that while photographs will trigger the right to be forgotten in certain situations, this will be harder to establish than with textual data. Although the right to be forgotten may not be exercised in relation to trivial matters such as changes in fashion or a bad haircut, it may apply where a photograph presents factual information that later becomes irrelevant or where the image contains sensitive data. 77 For example, concerning about a person’s their political views or revealing something their health. 78 There a number of practical issues that arise with the implementation of the right to be forgotten. One issue is that the removal of images may be difficult to implement. 79 Even though

those requirements, laid down in Article 6(1)(c) to (e) of Directive 95/46, that even initially lawful processing of accurate data may, in the course of time, become incompatible with the directive where those data are no longer necessary in the light of the purposes for which they were collected or processed. That is so in particular where they appear to be inadequate, irrelevant or no longer relevant, or excessive in relation to those purposes and in the light of the time that has elapsed’. See also, Recital 65, General Data Protection Regulation, which states that ‘data subject should have the right to have personal data concerning him or her rectified and a ‘right to be forgotten’ where the retention of such data infringes this Regulation or Union or Member State law to which the controller is subject. In particular, a data subject should have the right to have his or her personal data erased and no longer processed where the personal data are no longer necessary in relation to the purposes for which they are collected or otherwise processed, where a data subject has withdrawn his or her consent or objects to the processing of personal data concerning him or her, or where the processing of his or her personal data does not otherwise comply with this Regulation.’ (Emphasis added.) 77 For example, four images had been removed from the Telegraph, for a full list of Telegraph content removed from the publication. The images in question relating to Max Mosley's 2008 sex scandal. See generally, Rhiannon Williams, Telegraph stories affected by the Eu ‘Right to be Forgotten’, The Telegraph 3 September 2015 < http://www.telegraph.co.uk/technology/google/11036257/Telegraph- stories-affected-by-EU-right-to-be-forgotten.html> 78 Recital 10, General Data Protection Regulation. See also, Data Directive 95/46/EC, [1995] art 2. For example, four images had been removed from the Telegraph, for a full list of Telegraph content removed from the publication. The images in question relating to Max Mosley's 2008 sex scandal. See generally, Rhiannon Williams, Telegraph stories affected by the Eu ‘Right to be Forgotten’, The Telegraph 3 September 2015 < http://www.telegraph.co.uk/technology/google/11036257/Telegraph- stories-affected-by-EU-right-to-be-forgotten.html> 79 Cecile de Terwangne, ‘Internet Privacy and the Right to be Forgotten/ Right to Oblivion’ (2012) 13 Revista de Internet, derecho y politica 31, 117; Kathryn Smith, ‘The Right to Be Forgotten: Legislating for Individuals to Regain Control of their Personal Information on Social Networks’ [2014] 7(1)

194

a network may remove an image, it may still be possible to view the image online. 80 This is because it may take some time to remove the image from the cache memory, or the images may be stored on a person’s hard drive or in the cloud. 81

8.5 Does Australia Need the Right to be Forgotten?

If adopted in Australia a right to be forgotten would help to restore the imbalance between people whose images are captured and those who control the data.82 An Australian right to be forgotten would also enable people to regain control over their images on social networks. If introduced it ‘could give individuals the possibility of more control over their data and hence more autonomy. It could directly reduce the amount of data that is held – hence that is vulnerable – as individuals exercise their right to delete.83 In Australia, a right to be forgotten would also address broader privacy concerns with respect to social networks. It would help to respond to the fact that social networks increasingly chip away at personal privacy. Particularly concerning is the way that people’s personal images are prone to misuse by those who collect information, as the data can be aggregated and combined with other forms of data, which can then be used for profiling.84

It is arguable the right to be forgotten might also force social networks to justify why they are holding information.85 As Bernal said:

It could force those holding data to justify why they’re holding it – in such a way that the data subjects understand, for if data subjects cannot understand why the data is wanted, they might simply delete it. If there is a benefit and that benefit

Reinvention: An International Journal of Undergraduate Research 80 Cecile de Terwangne, above n 79, 117. 81 Ibid 82 See generally Jasmine E McNealy, ‘The Emerging Conflict Between Newsworthiness and the Right to be Forgotten’ (2012) 39(2) Northern Kentucky Law Review 119; Paul De Hert and Vagelis Papakonstantinou, ‘The Proposed Data Protection Regulation Replacing 95/46/EC: A Sound System for the Protection of Individual’ (2012) 28 Computer Law and Security Review 130; Robert Kirk Walker, ‘The Right to be Forgotten’ (2012) 64(101) Hastings Law Journal 257. 83 See Paul A Bernal, above n 2. 84 Ibid. 85 Ibid

195

is made clear, why would an individual wish to delete that data? Most importantly of all, the fact that data could be deleted at any time could encourage the development of business models that do not rely on the holding of so much

personal data.86

In so far that the right to be forgotten ‘poses a paradigm shift in privacy’, where the ‘individuals have power that can and should restrict the actions of those who might oppress, abuse or take advantage of those individuals,’87 it will help individuals to regain control over how their personal images are used. For too long, privacy interests have been overshadowed by or come second to freedom of expression and speech. A right to be forgotten would be useful in Australia because it would potentially close some of the gaps in the existing legal protection for personal images in this country. A right to be forgotten would enable people to control use of their image, particularly when it is shared by other people on social networks.88 A right to be forgotten could be adopted in Australia by amending the Australian Privacy Act and the Australian Privacy Principles (APPs) to include ‘data subject’ protection rights similar to the EU’s General Data Protection Regulation. Incorporating data subject rights in the Australia’s Privacy Act would provide more relief for people when their image is misused. As noted earlier, the General Data Protection Regulation allows a person to object to the transfer of their data to another country when the standard of data protection is not to the European standard. The Australian Privacy Act has a similar provision under the Australian Privacy Principles (APPs), that relate to cross-border

86 Ibid. 87 Ibid. 88 Virginia Da Cunha is an Argentinian singer, dancer, model and actress who had posted various pictures of herself in short shorts, swimsuits, tank tops and at least one sexually provocative pose on Twitter and Facebook. She sued Yahoo Argentina for linking and showing results of her name and image to websites offering sexual content, pornography, escorts and other related activities. Da Cunha v Yahoo de Argentina SRL: Juzgado de Primera Instancia (1a Inst, Court of First Instance, 29 July 2009); ‘Da Cunha, Virginia c. Yahoo de Argentina s/ Daños y Perjuicos’ (Resulta, I) para 3 http://www.diariojudicial.com/documentos/adjuntos/DJArchadjunto17173.pdf (hereinafter Opinion of Judge Simari). Da Cunha was successful at first instance; however, she lost on appeal in 2014. See also Edward L Carter, ‘Argentina’s Right to be Forgotten (2013) 27(1) Emory International Law Review 23.

196

disclosure of personal information.89 However, it is uncertain whether the Australian Privacy Principle 8 would provide adequate protection to prevent an Australian national’s data from being disclosed to a third-party country. This is because Australian Privacy Principle 8 is silent on whether the disclosure of the information to a third party would constitute a ‘transfer’. Australian Privacy Principle 8 provides that, prior to any disclosure of personal information to an overseas recipient, there must be reasonable steps taken to ensure that the overseas recipient does not breach the Australian Privacy

Principles.90 However, what is reasonable is not defined in the legislation, which makes it difficult to determine whether a person in Australia would have the same rights as European citizens. Where data is processed and stored overseas, it may also be difficult to prove that the data is processed, collected or stored in Australia, or by an Australian corporation. Consequently, similar provisions should be adopted in Australia.

While the European right to be forgotten would provide Australian citizens with greater control over their images, to improve protection a number of changes should be considered to the European law. It would be important, for example, to clarify who has the responsibility to remove images (particularly where are multiple parties involved). It would also be important to clarify the situations where an image may be required to be removed or deleted. It would also be helpful to clarify when consent could be withdrawn. To minimise the adverse effects of the exception it might also be useful to consider limiting its use to reasonable withdrawal.91 Consideration should also be given to amending the personal and household

89 Privacy Act 1988 (Cth); see APP 8, Cross Border Disclosure of Personal Information. See further Office of Australian Information Commissioner, APP Guidelines, Chapter 8: APP 8, Cross Border Disclosure of Personal Information, Taking Reasonable Steps to Ensure an Overseas Recipient Does Not Breach the APPs, 8.16 . 90 Office of Australian Information Commissioner, APP Guidelines, Chapter 8: APP 8, Cross Border Disclosure of Personal Information, Taking Reasonable Steps to Ensure an Overseas Recipient Does Not Breach the APPs, 8.2, https://www.oaic.gov.au/agencies-and-organisations/app-guidelines/chapter-8- app-8-cross-border-disclosure-of-personal-information, which states that ‘before an APP entity discloses personal information about an individual to an overseas recipient, the entity must take reasonable steps to ensure that the recipient does not breach the APPs in relation to that information. Where an entity discloses personal information to an overseas recipient, it is accountable for an act or practice of the overseas recipient that would breach the APPs’ (s 16C). 91 Consent is provided in Article 7 (3) General Data Protection Regulation. See also, Recital 32 General

197

exemption.92 This is because if a personal and household purpose was included in Australian law it would leave many images unprotected and vulnerable to misuse. This would have to be done in a manner that carefully balanced the right of individuals to protect their personal images with the ability for individuals to express themselves by uploading images (which was the motivation behind the exceptions). In this sense this is not to suggest that exception should be abolished so much that it should be modified to take account of the realities of new technologies.93

Data Protection Regulation, provides ‘Consent should be given by a clear affirmative act establishing a freely given, specific, informed and unambiguous indication of the data subject's agreement to the processing of personal data relating to him or her, such as by a written statement, including by electronic means, or an oral statement. This could include ticking a box when visiting an internet website, choosing technical settings for information society services or another statement or conduct which clearly indicates in this context the data subject's acceptance of the proposed processing of his or her personal data. Silence, pre-ticked boxes or inactivity should not therefore constitute consent. Consent should cover all processing activities carried out for the same purpose or purposes. When the processing has multiple purposes, consent should be given for all of them. If the data subject's consent is to be given following a request by electronic means, the request must be clear, concise and not unnecessarily disruptive to the use of the service for which it is provided.’ 92 Oliver Butler, “The Expanding Scope of the Data Protection Directive: The Exception for a Purely Personal or Household Activity” ( September 15, 2015) University of Cambridge Faculty of Law Research Paper No. 54/2015 < SSRN: https://ssrn.com/abstract=2660916 > the author refers to the problem of using spatial logic in the interpretation of the exception of purely personal or household activity which applies to the Data Protection Directive 95/46/EC. In particular, at 4, the author refers to the Rynes v Urad pro Ochranu Osobnich Udaju C-212/13 [2014] ECR 0 where he quotes the Advocate General ‘In my view, ‘personal’ activities under the second indent of Article 3(2) of Directive 95/46 are activities which are closely and objectively linked to the private life of an individual and which do not significantly impinge upon the personal sphere of others. These activities may, however, take place outside the home. ‘Household’ activities are linked to family life and normally take place at a person’s home or in other places shared with family members, such as second homes, hotel rooms or private cars. All such activities have a link with the protection of private life as provided for under Article 7 of the Charter.’ 93 The Article 29 Data Protection Working Party urged ‘the legislature to use the process of introducing new data protection law as an opportunity to reduce as far as possible the legal uncertainty that currently surrounds various aspects of individuals’ personal or household use of the internet.’ See Article 29 Working Party, Annex 2 Proposals for Amendments regarding exemption for personal or household activities < http://ec.europa.eu/justice/data-protection/article-29/documentation/other- document/files/2013/20130227_statement_dp_annex2_en.pdf>

198

It is clear that the EU General Data Protection Regulation provides better protection for people whose images are shared and exchanged on social networks. This chapter argued that the European Union’s right to be forgotten is a useful mechanism that enables people to regain control over the use of their images within a social network context. Currently the law in Australia values freedom of expression over privacy. While this may have made sense in a pre- internet world, technological changes that have radically changed the way that images are used and controlled have challenged the now-outdated arrangements. The right to be forgotten would help to reset the scales between privacy and freedom of expression. It is time that Australian law provided people with the right to be forgotten as a way of preventing the misuse of their images. In so doing it would give them the right to control the use of their personal images online.

199

Chapter 9 Conclusion

‘It is apparent that the word ‘privacy’ has proven to be a powerful rhetorical battle cry in a plethora of unrelated contexts … Like the emotive word ‘freedom’, ‘privacy’ means so many different things to so many different people that it has lost any precise legal

connotation that it might once have had.1

This thesis has examined the way Australian law protects personal images that are uploaded and shared on social networks. Part I (Chapters 1–5) examined the different interests that arise in two situations: when a creator takes and uploads their image and when a third party takes and uploads an image of someone else on a social network. The thesis has shown that while Australian law provides some protection in these two situations, this protection is limited and fragmented. One of the consequences of the current law in Australia is that people whose images are uploaded and shared online are unable to control the use of their images. This has serious ramifications for many people. This thesis has argued that the limitations of the current legal protection in Australia allow the misuse of personal images on social networks to continue. In particular, it has highlighted that people in Australia do not have a right not to be photographed, and thus are unable to prevent the misuse of their image. Drawing upon the developments in Europe and the United States, Part II of the thesis (Chapters 6–9) identified three potential areas that could improve Australian law to protect against the misuse of personal images shared online. One potential reform would be for the federal government to enact and introduce a statutory tort for serious invasions of privacy. Despite the number of potential reforms put forward in the ALRC’s 2014 report to adopt a statutory cause of action for serious invasions of privacy, the federal government has yet to respond. Another way by which Australian law could be improved is through the introduction of image rights or a right of publicity. If a right of publicity was incorporated into tort law, people

1 J McCarthy, The Rights of Publicity and Privacy (2nd ed, 2005), [5.59]; See D Solove, ‘A Taxonomy of Privacy’ (2006) 154(3) University of Pennsylvania Law Review 477, 479.

200

would have a right to the use of their image, which may prevent third parties from using personal images of others. If Australia did introduce image rights into its common law, this would potentially solve some of the problems of sharing personal images of third parties online. However, establishing image rights in Australia would be the first step in providing a solution. A third means of helping to close the gaps in Australian law would be to adopt and incorporate a ‘right to be forgotten’. As Chapter 9 highlighted, Australia already has the initial framework for such a right in the Commonwealth Privacy Act. If the Privacy Act were amended to include a right to be forgotten, it would provide greater protection for personal images than currently exists. The right to be forgotten would allow a person a mechanism to remove images that are misused online. In particular, while the right to be forgotten does not prevent a person’s image from being captured or shared online, it would provide a person whose image is uploaded or shared, and subsequently misused, with the ability to control the use of that image by requesting that the image be removed from a social network. Perhaps the most viable solution to the current legal framework is to incorporate and adopt image rights and a right to be forgotten. The criminalisation of sharing and distributing sexual images online potentially addresses the misuse of certain types of personal images because it creates an image right for a specific type of image. One recent development in Australia that may provide some protection for the misuse of personal images is the proposed new ‘revenge porn’ laws2 which respond to the growing problem of so called revenge porn.3 Because of the proliferation of sharing sexual

2 The Australian Labor Party has introduced a proposed Bill against revenge porn; however, there has been no movement to pass the Bill. New South Wales is the third state in Australia to introduce revenge porn legislation. This is in line with the United Kingdom, which has made revenge porn illegal, see UK Parliament, House of Lords, Hansard, 21 July 2014, Column 968 Amendment 37 where Lord Marks of Henley-on-Thames stated that the term ‘revenge pornography’ refers to the publication, usually but not always, on the internet, of intimate images of former lovers without their consent …Obtaining such images has become more common and much easier with the prevalence, popularity and sophistication of smartphones; with their ability to take or record high quality images, still and video, instantly and simply with accompanying sound in the case of video … The widespread publication of such images causes, and is generally intended to cause distress, humiliation and embarrassment for the victim’; see also Criminal Justice and Courts Act 2015 (UK), s 33. 3 In June 2017 only Victoria and South Australia have revenge porn laws, with New South Wales thinking about introducing new laws for revenge porn. See ‘Moving Ahead on New Law to Stop Revenge Porn’, 5 September 2016

201

images online, some states in Australia have attempted to criminalise the misuse of sexual images.4 In effect these provide that a person would have a right for a specific type of use of their image – for example, when a person is photographed partially nude. It is uncertain whether attempts to criminalise the use of sexual images online will resolve the problems that once when people share images on social networks. Moving forward, the potential criminalisation of capturing images of people that are of a sexual nature without their consent is a step in the right direction. This is because the proposed reforms potentially create an image right for a particular use of a person’s image. While criminalising the uploading and sharing of sexual images is an important development it creates a disparity of protection for personal images that fall outside the scope of protection. Even though some Australian states have initiated reforms to criminalise the uploading and sharing of sexual images on social networks, the law remains uncertain. While it is beyond the scope of this thesis to go into the issue in much detail, it is important to note that there are many practical issues that will potentially impact upon the effectiveness of these potential reforms. As socio-legal studies teaches us, these factors are often integral to the effectiveness of legal policy. Of the many issues that arise two stand out. The first relates to problems of group photographs. The problem here is that as a photograph may contain images of a number there may be a series of different rights that need to be negotiated if one person wanted to protect the use of their image. As occurred with performer rights, a problem may arise where one member of the group does not agree with other group member’s wishes. In the absence of specific considerations, there are two options: one is that an individual is able to hold the group to ‘hostage’ or the wishes of the group override the interests of the individual. 5 While there may be some

4 See South Australia’s prohibition of ‘invasive images’; Summary Offences (Filming Offences) Amendment Act 2013 (SA), which introduced s 26C (1) into the Summary Offences Act 1953 (SA). See also Crimes Amendment (Sexual Offences and Other Matters) Act 2014 (Vic) which introduced ss 4DA and 41DB Summary Offences Act 1966 (Vic). Currently, New South Wales has some criminal provisions for the publication of sexual images – for example, s 578C (2) Crimes Act 1900: see Tom Gotsis, ‘Revenge Pornography, Privacy and the Law’, NSW Parliamentary Research Service August 2015, e- brief Issue 7/2015. 5 Group interests in a photograph would be similar to films with large casts. As James Grimmelman, notes in relation to ‘films with a large cast—the proverbial” cast of thousands.” The silent epic Ben-Hur advertised a cast of 125,000 people. In The Lord of the Rings trilogy, 20,000 extras tramped around Middle-Earth alongside Frodo Baggins (played by Elijah Wood). Treating every acting performance as an independent work would not only be a logistical and financial nightmare, it would turn cast of

202

solutions (such as redacting a person’s image), this is be an issue that needs to be taken into account when creating new legal arrangements. A second more practical problem relates to the removal of images from the internet. The problem here is that when people share and exchange personal images on social networks, the images are stored on the networks information systems. As Ausloos says, even if ‘notice and take down procedures might take content out of the (public) sight,’ it does not result in the removal of the images from the data user’s servers.6 Similarly, it may be difficult for a person to remove their image when it is captured and uploaded online by a third party.7 Even if a person chooses to remove their images from their own profile page, the image may still be available if the image has been shared and reshared. These problems are exacerbated by the global nature of the internet, which may place images in jurisdictions with little or no protection: there is little use in demanding an image be removed in Australia if users in Australia can simply obtain the image from another country. These practical problems highlight the difficulties of controlling the spread of images after they have been published on-line. Clearly it would be much better to prevent the uploading of images before it happens than attempt to remove images once they have been uploaded and shared. (Although this will necessarily occur where the removal of the image is demanded because of a change in circumstances, as with the right to be forgotten). Ideally, the solution would be to change the way people deal with and think about private images to prevent problems arising in the first place rather than dealing with the problems after the event. A range of measures have been suggested to prevent (potentially harmful) information being shared in the first place including ‘‘awareness raising, transparency, clearer privacy notices, data

thousands into a new mantra: copyright of thousands’. www.jamesgrimmelmannnet/publications. . 6 Jef Ausloos, ‘The Right to be Forgotten- Worth Remembering?’ (2012) 28 Computer Law and Security Review 143, 148. Ausloos states that while European citizens can request ‘Facebook to send them all personal data in Facebook’s possession, Facebook still keeps track of your removed data as well’. See Omer Tene, ‘Privacy: The New Generations’ (2010) 1 International Data Privacy Law 15, 25; Meg Leta Ambrose and Jef Ausloos, ‘The Right to be forgotten Across the Pond’ (2013) 3 Journal of Information Policy, 1. 7 Jef Ausloos, above n 6, 147 who states ‘but, in an ever-increasing social internet, where many features depend on disclosing data, ex post measures are needed as well. Enabling a more effective control by the individual, the introduction of a (well-defined) right to be forgotten’; see also Bert Jaap Koops, ‘Forgetting Footprints, Shunning Shadows. A Critical Analysis of the “Right to Be Forgotten” In Big Data Practice’ (2011) 8(3) ScriptEd 229, 237 -239.

203

miminisation, stricter control on the purpose limitation principle, anonymization, transparency, encryption’8. While we wait for these solutions, the potential harm to the fundamental human rights of dignity, autonomy and private life caused by the misuse of personal images on-line demands that Australian law be modified to provide more effective protection. This is also important to protect the economic and property rights that (some) people have in their image. While such legal changes will not provide a complete solution, they will help to counter some of the problems that have been created by that have arisen around social media in recent years.

8 Jef Ausloos, above n 6, 147.

204

205

Bibliography

Cases

10th Cantanae v Shoshana (1987) 79 ALR 299 A v B Plc [2003] QB 195 Abernethy v Hutchinson (1824) 1 H & Tw 28; 47 ER 1313 Angel Fraley et al. v Facebook, Inc., CA No. 511-01726 Argyll v Argyll [1965] 1 All ER 611 Argyll v Argyll [1967] Ch 302 Attorney General v Guardian Newspapers (No. 2) [1990] AC 109 Australian Broadcasting Corporation (ABC) v Lenah Game Meats Pty Ltd [2001] HCA 63; (2001) 208 CLR 199 Australian Consolidated Press Ltd v Ettingshausen (Unreported, New South Wales Court of Appeal) Australian Football League v The Age Company Ltd (2006) 15 VR 419 Bathurst City Council v Saban (1985) 2 NSWLR 704 Bernstein of Leigh (Baron) v Skyviews & General Ltd [1978] 1 QB 479 Bernstein v Murray [1981] RPC 303 Boardman v Phipps [1967] 2 AC 46 Bradley v Wingnut Films Ltd (1992) 1 ERNZ 202 British Leyland v Armstrong [1986] RPC 279 Buck v Information Commissioner (2007) WL 426611; [2008] WTLR 1

C v Holland (2012) 3 NZLR 672 Campbell v MGN Ltd [2003] QB 633 Campbell v MGN Ltd [2004] 2 AC 457 Chang v Virgin Mobile USA, LLC, 2009 WL 111570 (N.D.Tex. January 16, 2009) Church of Scientology v Kaufman [1973] RPC 627 CMI-Centers v Phytopharm [1999] FSR 235 Coco v AN Clark (Engineers) Ltd [1969] RPC 4

206

Collins (Engineers) Ltd v Roberts & Co Ltd [1965] RPC 429 Collins v Wilcock (1984) 1 WLR 1172 Creation Records Ltd v News Group Newspapers Ltd [1997] EMLR 444 Cruise v Southdown Press Pty Ltd (1993) 26 IPR 125 DeMaudsley v Palumbo [1996] FSR Doe v Yahoo!7 Pty Ltd [2013] QDC 181 Douglas v Hello! [2001] QB 967 (Douglas (No 1) Douglas v Hello! Ltd [2001] 2 WLR 992, 1025; [2001] 2 All ER 289, 320 Douglas v Hello! Ltd [2003] EMLR 31 (Ch); [2006] QB 125 (CA) Douglas v Hello! Ltd (No 3) [2006] QB 125 Douglas v Hello! (No 3) [2005] EWCA Civ 595; [2005] 3 WLR 881 Douglas v Hello! [2008] 1 AC 1

Duke of Queensbury v Shebbeare (1758) 2 Eden 329; 28 ER 924 Dye v Commonwealth [2010] FCA 720 Edwards Hot Water Systems v SW Hart Pty Ltd (1985) 5 IPR 1 Foster v Mountford [1978] FSR 582 Foster v Svenson (2013) NY Slip Op 31782 NY Supreme Court 2013 Francome v Mirror Group Newspapers [1984] 1 WLR 892 Franklin v Giddins [1978] Qd R 72 Gee v Burger [2009] NSWSC 149 Giller v Procopets [2004] VSC 113 Giller v Procopets (2008) 79 IPR 489 Google Spain v Gonzalez Case C-131/12. Green v Broadcasting Corporation of New Zealand [1989] RPC 469 Grollo v Palmer (1995) 184 CLR 348 Grosse v Purvis [2003] Aust Tort Reports 81–706 GS v News Ltd [1998] Aust Tort Reports 81–466 Hanson-Young v Bauer Media Limited [2013] NSWSC 1306 Hanson-Young v Bauer Media Ltd (No 2) [2013] NSWSC 2029 Henderson v Radio Corp Pty Ltd [1960] SR (NSW) 576 Hogan v Koala Dundee Pty Ltd (1988) 20 FCR 314

207

Holden v Express Newspapers Ltd (QBD), 7 June 2001 Honey v Australian Airlines Ltd and House of Tabor Inc (1990) 18 IPR 185 Hosking v Runting (2005) 1 NZLR 1 Hunter and Others v Canary Wharf Ltd; Hunter and Others v London Docklands Corporation [1997] AC 655 Oldham v Lawson (No 1) [1976] VR 654 Inline Logistics v UCL Logistics [2002] RPC 611 Jacquiline A v The London Bourough of Newham (2001) WL 1612596 Jane Doe v ABC & Ors [2007] VCC 281 John v Associated Newspapers Ltd [2006] EMLR 27 John Fairfax Publications Pty Ltd v Rivkin (2003) 201 ALR 77 John Zinc v Lloyds Bank [1975] RPC 385 Kalaba v Commonwealth [2004] FCA 763; FCAFC 326 Kaye v Robertson (1990) 19 IPR Kaye v Robertson [1991] FSR 62 Khorasandijan v Bush [1993] QB 727 Les Editions Vice-Versa Inc v Aubry [1998] 1 SCR 591 Lincoln Hunt (Australia) Pty Ltd v Willesee (1986) 4 NSWLR 457 Lord Ashburton v Pape [1913] 2 Ch 469 Louis v Smellie (1895) 73 LT 226 Macklin v Richardson (1770) Ambl 695; 27 ER 451, Maggbury Pty Ltd v Hafele Australia Pty Ltd (2001) 210 CLT 181 53 IPR Malone v Metropolitan Police Commissioner (1979) 2 WLR 700; [1979] Ch 344 Maynes v Casey [2011] NSWCA 156 (14 June 2011) McKennitt v Ash [2007] EMLR 113 McKennitt v Ash [2005] EWHC 3003 (QB) Millar v Taylor (1769) 4 Burr 2303l 98 ER 201 Mills v News Group Newspapers [2001] EMLR 957 Moreno v Hanford Sentinel Inc, 09 CDOS 4208 Morrison v Moat (1851) 68 ER 492 Mosley v News Group Newspapers Ltd [2008] EWHC 1777 (QB)

208

Mossimani by his Tutor Karout v Australian Radio Network Pty Ltd (ACN 065986 987) [2016] NSWDC Murray v Express Newspapers PLC [2007] EWHC 1908 Murray v Express Newspapers plc [2009] Ch 481 Newton-John v Scholl- Plough (Aust) (1986) 11 FCR 233 Nichrothern Electrical Co Ltd v Percy [1956] RPC 272 (on appeal) [1957] RPC 207 OBG Ltd v Allan [2008] 1 AC 1 (HL) Ocular Sciences [1997] RPC 289 PA Thomas v Mould [1968] QB 913 Pacific Dunlop Ltd v Hogan (1989) 23 FCR 553 Peck v United Kingdom (2003) 36 EHRR 41 PG and JH v United Kingdom (App No 44787/98) (25 September 2001) ; [2001] ECHR 44787/98

Phillip v Pennel [1907] 2 Ch 577 Pollard v Photographic Co (1889) 40 Ch D 345 Pratt Consolidated Holdings Pty Ltd v Commissioner of Taxation [2011] AATA 907 Prince Albert v Strange (1849) 47 ER 302 R v Central Independent Television [1994] Fam 192 R v Khan [1997]AC 558 R v Sotheren [2001] NSWSC 204 (16 March 2001) Raciti v Hughes (1995) 7 BPR 14 Re X [1975] Fam 47 Robin Jig v Tool Co Ltd v Taylor [1979] FSR 130 Saad v Chubb Security Australia Pty Ltd [2012] NSWSC 1183 [183], Saltman Engineering Co Ltd v Campbell Engineering Co Ltd (1948) 65 RPC 203 (CA) Pollard v Photographic Co (1889) 40 Ch D 345; Sands & McGougal Pty Ltd v Robinson (1917) 23 CLR 49 Schrems v Data Protection Commissioner Case C-362/14 Seager v Copydex ( No 1) [1967] 2 All ER 415

209

Sean Lane, et al. v. Facebook, Inc et al. No 10-16380 (9th Circuit 2012) Seven Network (Australia) Operations Ltd v Australian Broadcasting Corporation [2007] NSWSC Seven Network (Operations) Ltd v Media Entertainment and Arts Alliance (MEAA) [2004] FCA 637 Shelly Films v Rex Features [1994] EMLR 134 Shepherd v Walsh [2000] QSC 177 Shepherd v Walsh [2001] QSC 358 Shering Chemicals Ltd v Falkman [1981] 2 WLR 848 Shoshana Pty Ltd v 10th Cantanae Pty Ltd (1987) 11 IPR 249 Smith Kline & French v Department of Community Health [1990] FSR 617 Steddal v Houghton (1901) 18 TLD 126 Stephens v Avery [1988] 1 Ch 449 The Duke of Queensberry v Shebbeare 2 Eden, 329 The Gadget Shop v The Bug.Com [2001] FSR 383 Trkulja v Google (No 5) [2012] VSC 533 Theakston v MGN Ltd [2002] EMLR 22 Theakston v MGN Ltd [2002] EWHC 137 (QB) University of London Press v University Tutorial Press Limited [1916] 2 Ch 601 Valeo Vision Societ Anonyme v Flexible Lamps [1995] RPC 205 Victoria Park Racing and Recreations Grounds Co Pty v Taylor [1937] HCA 45 von Hannover v Germany App. No 59320/00 24 June 2004 Wainwright v Home Office [2003] UKHL 53; [2003] All ER 279 Wheatley v Bell [1984] FSR 16 Wickham v Association of Pool Builders 1988 12 IPR 567 Wilson v Ferguson [2015] WACA 15 WL v Randwick City Council [2007] NSW ADT 12 Yovatt v Winyard (1820) 1 Jac & W 394; 37 ER 425

Legislation

Civil Law (Wrongs) Act 2002 (ACT)

210

Convention for the Protection of Human Rights and Fundamental Freedoms (European Convention on Human Rights, as amended) (ECHR) Copyright Act 1968 (Cth) Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Defamation Act 2005 (NSW) 2005 Defamation Act 2005 (Qld) 2005 Defamation Act 2005 (SA) 2005 Defamation Act 2005 (Tas) Defamation Act 2005 (Vic) Defamation Act 2005 (WA) Defamation Act 2006 (NT) Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regards to the processing of personal data and on the free movement of such data, OJ [1995] L281/31 Health Quality and Complaints Commission Act 2006 (Qld) Health Records Act 2001 (Vic) Health Records and Information Privacy Act 2002 (NSW) Human Rights Act 1998 UK Information Act 2002 (NT) Information Privacy Act 2009 (Qld) Information Privacy Act 2014 (ACT) Personal Information and Protection Act 2004 (Tas) Premier and Cabinet Circular No 12 (SA) Privacy Act 1988 (Cth) Privacy and Data Protection Act 2014 (Vic).

Privacy and Personal Information Protection Act 1998 (NSW)

211

Proposal for a Regulation of the European Parliament and of the Council on the protection of individual with regard to the processing of personal data and on the free movement of such data ( General Data Protection Regulation) COM 2012) Regulation (EU) 2016/679 of the European Parliament and of the United Nations International Covenant on Civil and Political Rights (ICCPR)

Secondary sources

Abbott Alistair and Garnett, Kevin, ‘Who is the Author of a Photograph?’ (1988)

20(6) European Intellectual Property Review 204.

Abilmouna, R, ‘Social Networking Sites: What an Entangled Web We Weave’ in CSCW '13:

Proceedings of the 2013 Conference on Computer Supported Cooperative Work

(2013).

Acquisti, Alessandro and Gross, Ralph, ‘Imagined Communities: Awareness, Information

Sharing, and Privacy on the Facebook’, in P Golle and G Danezis (eds), Proceedings

of 6th Workshop on Privacy Enhancing Technologies (Robinson College,

Cambridge, 2006).

Acquisti, Alessandro and Gross, Ralph, ‘Information Revelation and Privacy in Online Social

Networks’, in Proceedings of the 2005 ACM Workshop on Privacy in the Electronic

Society (ACM, 2005).

Acquisti, Alessandro, and Jens Grossklags. ‘Privacy Attitudes and Privacy Behavior’ in

L Camp and S Lewis (eds), Economics of Information Security (Springer, 2004).

Adams Shoor, Emily, ‘Narrowing the Right to be Forgotten: Why the European Union Needs

to Amend the Proposed Data Protection Regulation’ (2014) 39(1) Brooklyn Journal of

Intellectual Property Law 487.

Ahern, S, Eckles, D, Good, N, King, S, Naaman M and Nair, R, ‘Over Exposed? Privacy

Patterns and Considerations in Online and Mobile Photo Sharing’, in CHI 2007

Proceeding: Photo Sharing, 28 April–3 May 2007, San Jose CA.

212

Ahn YY, Moon, S, Han, S, Jeong, H and Kwak, H, ‘Analysis of Topological Characteristics

of Huge Online Social Networking Services’, in Proceedings of the 16th International

conference on World Wide Web (2007).

Albergotti, Reed, ‘Facebook Messenger Privacy Fears? Here’s What to Know’, Wall Street

Journal, 8 August 2014, http://blogs.wsj.com/digits/2014/08/08/facebook-messenger-

privacy-fears-heres-what-you-need-to-know.

Albesher, A and Alhussain, T, ‘Privacy and Security on Social Networks: An Evaluation of

Facebook, in ISDOC’13, Proceedings of the 2013 International Conference on

Information Systems and Design of Communication (2013).

Aldrich, J, ‘Autonomy, Oxford Economic Papers, New Series’ (1989) 41(1) History and

Methodology of Econometrics 15.

Allen AL, ‘Taking Liberties: Privacy, Private Choice, and Social Contract Theory’ (1988)

56 Cincinnati Law Review 461.

Van Alsenoy, Brendan, Ballet, J, Kuczeraway A and Dumortier, J, ‘Social Networks and Web

2.0: Are Users Also Bound by Data Protection Regulations?’ (2009) 2 Identity in the

Information Society 65.

Ambrose, Meg Leta, ‘It’s About Time: Privacy, Information Life Cycles, and the Right to be

Forgotten’ (2013) 16(2) Stanford Technology Law Review 369.

Ambrose, Meg Leta and Ausloos, ‘The Right to be Forgotten Across the Pond’ (2013)

3 Journal of Information Policy 1.

Ambrose, Meg Leta, ‘You are What Google Says You are: The Right to be Forgotten and

Information Stewardship’ (2012) 17 International Review of Information Ethics 21.

Anyanwu, C, ‘Challenges to Privacy Law in the Age of Social Media’ (2013) 40(3)

Australian Journal of Communication 121.

213

Aplin, Tanya et al., Gurry on Breach of Confidence: The Protection of Confidential

Information, 2nd ed. (Oxford University Press, 2012)

Applegarth, PDT, ‘Is Nothing Private? Privacy and the Need for Legislative Intervention’,

QCCL Newsletter, December 2010, qccl.org.au/?wpfb_dl=351.

Armstrong JA, ‘The Digital Era of Photography Requires Streamlined Licensing and Rights

Management’ (2007) 47(4) Santa Clara Law Review 785.

Arnold, Richard, ‘The Need for a New Copyright Act: A Case Study in Law Reform’ (2015)

5(2) Queen Mary Journal of Intellectual Property 110.

Arnold, Richard, ‘The Protection of Confidential Information in the Human Rights Era: Two

Aspects’ (2009) 2(9) Journal of Intellectual Property Law & Practice 599.

Attorney-General and Department of Communications and the Arts, Proposed Moral Rights

Legislation for Copyright Creators, Discussion Paper (AGPS, 1994).

Au Yeung, Ching-man, Liccardi, Ilaria, Lu, Kanghao, Seneviratne, Oshani and Berners-Lee,

Tim, ‘Decentralization: The Future of online Social Networking’, in W3C Workshop

on the Future of Social Networking Position Papers (2009)

Aufderheide, P, ‘Journalists, Social Media and Copyright: Demystifying Fair Use in the

Emergent Digital Environment (2014) 9(4) Journal of Business and Technology Law

74.

Ausloos, Jef, ‘The Right to be Forgotten – Worth Remembering?’ (2012) 28 Computer Law

and Security Review 143.

Australian Law Reform Commission, For Your Information: Australian Privacy Law and

Practice, (ALRC, 2008).

Australian Law Reform Commission, Privacy, Report No 22 (ALRC, 1983).

Australian Law Reform Commission, Serious Invasion of Privacy in the Digital Era, Report

No. 123 (ALRC, 2014).

214

Australian Law Reform Commission, Unfair Publication: Defamation and Privacy, Report

No. 11 (ALRC, 1979).

Cardonsky, LB, ‘Towards a Meaningful Right to Privacy in the United Kingdom’ (2002) 20

Boston International Law Journal 393.

Babovic, Mihaijlo, ‘The Emperor’s New Digital Clothes: The Illusion of Copyright Rights in

Social Media’ (2015) 6(1) Cybaris 138.

Babwah, LA, ‘Climbing in Our Windows and Snatching Our Likenesses Up: Viral Videos

and the Scope of the Right of Publicity on the Internet’ (2010) 12 North Carolina

Journal of Law and Technology 57.

Badger, Gerry, ‘Art or Science’, in The Genius of Photography: How Photography has

Changed Our Lives (Quadrille, 2007).

Baker, Edwin C, ‘Autonomy and Informational Privacy, or Gossip: The Central Meaning of

the First Amendment’ (2004) 21(2) Social Philosophy & Policy Foundation 215.

Balkin, Rosalie and Davis, Jim, Law of Torts, 5th ed. (LexisNexis Butterworths, 2013).

Banks, LD and Wu, SF, ‘Toward a Behavioural Approach to Privacy for Online Social

Networks’, in E Bolc, M Makowski and A Wierzbicki (eds), Social Informatics

(Springer, 2010).

Banta Natalie M, ‘Death and Privacy in the Digital Age’ (2016) 94 North Carolina Law

Review 927.

Barbas, Samantha, ‘From Privacy to Publicity: The Tort of Appropriation in the Age of Mass

Consumption’ (2013) 61 Buffalo Law Review 1119.

Barnes, JA, ‘Graph Theory and Social Networks: A Technical Comment on Connectedness

and Connectivity’ (1969) 3(2) Sociology 215.

215

Barnett, Stephen R, ‘The Right to One’s Own Image: Publicity and Privacy Rights in the

United States and Spain’ (1999) 47(4) The American Journal of Comparative Law

555.

Barrett, JA, ‘Tale of Two Selfies: Photography and the Problem of Copyright Authorship’

[2014] Intellectual Property Law Bulletin 278.

Bartlett, Peter, ‘Privacy Down Under’ 2010 3(1) Journal International Media and Entertainment

Law 145.

Basho, Kalinda, ‘The Licensing of Our Personal Information: Is it a Solution to Internet

Privacy?’ (2000) 88(5) California Law Review 10.

Bass, Ellen S, ‘A Right in Search of a Coherent Rationale: Conceptualizing Persona in a

Comparative Context – the United State Rights of Publicity and German Personality

Rights’ (2008) 42 University of San Francisco Law Review 799.

Batskos, Mick, ‘Balancing the Treatment of “Personal Information” Under FOI and Privacy

Laws: A Comparative Australian Analysis’, AIAL Forum, 80 (2015) 28,

http://search.informit.com.au/documentSummary;dn=258903579858286;res=IELAPA.

Bayliss, Daniel, ‘Breach of Confidence as a Breach of Fiduciary Obligations: A Theory’

(2003) 9(3) Auckland Law Review 702.

Beer, David, ‘Social Network(ing) Sites … Revisiting the Story So Far: A Response to danah

boyd and Nicole Ellison’ (2008) 13 Journal of Computer-Mediated Communication

519.

Bellan, Alberto, Meal, Darren and Zegze, Nadia, ‘Enterprise and Regulatory Reform Bill

Receives Royal Assent’, IPK (25 April 2013),

http://ipkitten.blogspot.co.uk/2013/04/enterprise-and-regulatory-reform-bill.

Bennett, Steven C, ‘The “Right to be Forgotten”: Reconciling EU and US Perspectives’

(2012) 30(1) Berkeley Journal of International Law 161.

216

Bennett, TDC, ‘Privacy, Free Speech and Ruthlessness: The Australian Law Reform

Commission’s Report – Serious Invasion of Privacy in the Digital Era’ (2014) 6(2)

Journal of Media Law 193.

Benson, Christopher, Michael Gerlinger, Marc Schuler, Valérie Budd, ‘Hitting Back’ (2005)

153 Copyright World 13.

Bently, Lionel, ‘Art and the Making of Modern Copyright Law’, in Daniel McClean and

Karsten Schubert (eds), Dear Images: Art, Copyright and Culture (Ridinghouse,

2002).

Bently, Lionel and Sherman, Brad, Intellectual Property Law, 4th ed. (Oxford University

Press, 2014)

Berger, John and Dibb, M, Ways of Seeing (BBC, 1972).

Bernal, Paul A, ‘A Right to Delete?’ (2011) 2(2) European Journal of Law and Technology 1.

Beverly-Smith, Huw, The Commercial Appropriation of Personality (Cambridge University

Press, Cambridge, 2002).

Hogan, Bernie, ‘A Comparison of On and Offline Networks Through the Facebook API’,

http://ssrn.com/abstract=1331029.

Bernstein G, ‘When New Technologies are Still New: Windows of Opportunity for Privacy

Protection’ (2006) 51 Villanova Law Review 921.

Beshears, Cook, A, ‘Copyright and Freedom of Expression: Saving Free Speech from

advancing legislation’ (2013) 12 Chicago Kent Journal of Intellectual Property Law 1.

Besmer, A and Lipford, H.R, ‘Moving Beyond Untagging: Photo Privacy in a Tagged World’,

in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems,

CHI 2010, Atlanta, GA(2010).

Bezanson, Randall P, ‘The Right to Privacy Revisited: Privacy, News, and Social Change,

1890–1990’ (1992) 80 California Law Review 1133.

217

Bibas, Steven A, ‘A Contractual Approach to Data Privacy’ (1994) 17 Harvard Journal Law

and Public Policy 591.

Bielefeldt, H, ‘Autonomy and Republicanism: Immanuel Kant’s Philosophy of Freedom’

(1997) 25 Political Theory 524.

Birhnhack, Michael D., ‘Acknowledging the Conflict Between Copyright Law and The

Freedom of Expression Under the Human Rights Act’ (2003) 24 Entertainment Law

Review 24.

Birrell, A, Seven Lectures on the Law and History of Copyright in Books (Cassell, 1981).

Blackman, Josh, ‘Ominveillance, Google, Privacy in Public and the Right to Your Digital

Identity: A Tort for Recording and Disseminating an Individual’s Image over the

Internet’ (2009) 49(2) Santa Clara Law Review 313.

Bladgen, Cyprian, The Stationers’ Company: A History 1403–1959 ( Harvard University

Press, 1960).

Blakeney, Michael, ‘Protecting the Spiritual Beliefs of Indigenous Peoples: Australian Case

Studies’ (2013) 22(2) Pacific Rim Law and Policy Journal 391.

Bolton, Robert, ‘The Right to be Forgotten: Forced Amnesia in a Technological Age’ (2015)

31(2) John Marshall Journal of Information Technology and Privacy Law 133.

Bonneau, J, Anderson, J and Danezis, G, ‘Prying Data out of a Social Network’, Advances on

Social Network Analysis and Mining (2009).

Bonneau, J and Preibusch, S, ‘The Privacy Jungle: On the Market for Data Protection on

Social Networks’, in T Moore, D. Pym and C Ioannidis (eds), Economics of

Information Security and Privacy (Springer, 2010).

Borgatti, SP and Halgin, DS, ‘On Network Theory’ (2011) 22(5) Organisation Science 1.

Bostic, Kevin, ‘No, Facebook Messenger Will Not Eat Your Privacy … Any More Than

Facebook Already Has, at Least’, Inquisitr, 10 August 2014,

218

http://www.inquisitr.com/1403710/no-facebook-messenger-will-not-eat-your-privacy-

any-more-than-facebook-already-has-at-least.

Bowrey, Kathy, ‘Copyright, Photography and Computer Works: The Fiction of an Original

Expression’ (1995) 18(2) University of New South Wales Law Journal 284.

Bowrey, Kathy, ‘The Outer Limits of Copyright Law: Where Law Meets Philosophy and

Culture’ (2001) 12 Law and Critique 75.

Bowrey, Kathy ‘The World Daguerreotyped: What a Spectacle!’ Copyright Law,

Photography and the Economic Mission of Empire’, in Brad Sherman and Leanne

Wiseman (eds), Copyright and the Challenge of the New (Walters Kluwer, 2012).

Bowrey, Kathy, Handler, Michael and Nicol, Dianne, Australian Intellectual Property:

Commentary, Law and practice (Oxford University Press, 2010). boyd, danah, ‘Streams of Content, Limited Attention: The Flow of Information Through

Social Media’, UX Magazine (25 February 2010), http://uxmag.com/features/streams-

of-content-limited-attention. boyd, danah, ‘Friends, Friendsters, and MySpace Top 8: Writing Community into Being on

Social Network Sites’ (2006) 11(12) First Monday,

http://www.firstmonday.org/issues/issue11_12/boyd. boyd, danah, ‘Friendster and Publicly Articulated Social Networks’, in Proceedings of ACM

Conference on Human Factors in Computing Systems (ACM Press, 2004). boyd, danah M and Ellison, Nicole B, ‘Social Network Sites: Definition History and

Scholarship’, Journal of Computer-Mediated Communication 13(1), Article 1. boyd, danah and Heer, J, ‘Profiles as Conversations: Networked Identity Performance on

Friendster’, in Proceedings of the Hawaii International Conference on System

Sciences (HICS-39) (IEEE Computer Society, 2006).

219

Boyes, Simon, ‘Legal Protection of Athletes’ Image Rights in the United Kingdom’ (2015)

15(1) International Sport Law Journal 69.

Breiger, Ronald. L, ‘The Analysis of Social Networks’, in Melissa Hardy and Alan Bryman

(eds), Handbook of Data Analysis (Sage, 2004).

Brennan, Paul, ‘Privacy Law: Are Your Breasts Safe?’ (2012),

http://lawanddisorder.com.au/privacy_000.html.

Breslin, J and Decker, S, ‘The Future of Social Networks on the Internet: The Need for

Semantics’ (2007) 11(6) IEEE Computer Society 86.

Brimsted, Kate, ‘The JK Rowling Photo Case: Are Privacy Rights Evolving for the Online

Era?’ (2009) Computer Law & Security Report 24 465.

Brown, Evan, ‘No Personal Jurisdiction Over Australian Defendant in Flickr Right of

Publicity Case’, Internet Cases, 22 January 2009,

http://blog.internetcases.com/2009/01/22/no-personal-jurisdiction-over-australian-

defendant-in-flickr-right-of-publicity-case.

Brown, Russell, ‘Rethinking Privacy: Exclusivity, Private Relation and Tort Law’ (2006)

43(3) Alta Law Review 589.

Bulgurcu, B and Cavusoglu, H, ‘Understanding Emergence and Outcomes of information

Privacy Concerns: A Case of Facebook’, in ICIS 2010 Proceedings (2010), Paper 230.

Bump, Philip, ‘Paging Bradley Cooper’s Lawyers: He Might Own Ellen’s Famous Oscar

Selfie’, The Wire (3 March 2014), http://thewire.com/politics/2014/03/paging-bradley-

coopers-lawyers-you-might own-ellens-famous-oscar-selfie/358758.

Bunn, Anna, ‘The Curious Case of the Right to be Forgotten’ [2015] Computer Law and

Security Review 1.

220

Burdon, Mark and Telford, Paul, ‘The Conceptual Basis of Personal Information in Australian

Privacy Law’ (2010) 17(1) eLaw Journal, Murdoch University Electronic Journal of

Law 1.

Burke, M, Marlow, C and Lento, T, ‘Feed Me: Motivating Newcomer Contribution on Social

Network Sites’, in CHI 09 Proceedings of the SIGCHI Conference on Human Factors

in Computing Systems (2009).

Burrell, Robert and Coleman, Allison, Copyright Exceptions: The Digital Impact ( Cambridge

University Press, 2005).

Burris, Aubrey, ‘Hell Hath No Fury Like a Woman Porned: Revenge Porn and the Need for a

Federal Non Consensual Pornography Statute’ (2014) 66 Florida Law Review 2325.

Butler, D, ‘A Tort of Invasion of Privacy in Australia’ (2005) 29 Melbourne University Law

Review 339.

Bygrave LA, ‘The Place of Privacy in Date Protection Law’ (2001) 21 University of New

South Wales Law Journal 277.

Bygrave, LA ‘A Privacy Protection in a Global Context: A Comparative Overview,

Legislation for Copyright Creators’ (2004) 47 Scandinavian Studies in Law 319.

Bygrave, LA ‘A Right to be Forgotten?’ (2015) 58(1) Communications of the ACM 35.

Caddick, Nicholas and Harbottle, Gwilyn (eds), Copinger and Skone James on Copyright,

14th ed. (Sweet and Maxwell, 1999).

Callinan, Honorary Justice IDF AC, ‘Privacy, Confidence, Celebrity and Spectacle’ (2007)

7(1) Oxford University Commonwealth Law Journal 1.

Caldwell, Jillian, ‘Protecting Privacy Post 'Lenah': Should the Courts Establish a New Tort or Develop Breach of Confidence? [2003] 26(1) University of New South Wales Law Journal 90.

221

Calvert, Clay, ‘A Familial Privacy Right over Death Images: Critiquing the Internet –

Propelled Emergence of a Nascent Constitutional Right that Preserves Happy

Memories and Emotions’ (2011) 40(3) Hastings Constitutional Law Quarterly 475.

Calvert, Clay, ‘Salvaging Privacy and Tranquility from the Wreckage: Images of Death, Emotions

of Distress and Remedies of Tort in the Age of the Internet’ (2010) 2 Michigan State Law

Review 311.

Carbone, C.E, ‘To be or Not to be Forgotten: Balancing the Right to Know with the Right to

Privacy in the Digital Age’ (2015) 22(3) Virginia Journal of Social Policy and the

Law 525.

Carminati, Barbara, Ferrari, Elena and Perego, Andrea, ‘Private Relationships on Social Networks’,

in Data Engineering Workshop, 2007 IEEE 23rd International Conference Proceedings

(IEEE, 2007).

Carnachan, Bridget, ‘Celebrity Privacy after Hosking v Runting: Entertaining the Public with

Private Lives’ (2005) 11 Auckland University Law Review 86.

Carter, E.L., ‘Argentina’s Right to be Forgotten’ (2013) 27 Emory International Law

Review 23.

Chambers, JA, ‘Cybernetic Theory of Morality and Moral Autonomy’ (2001) 7(2) Science

and Engineering Ethics 177.

Chandler, Jennifer, ‘The Right to Attribution: Benefitting Authors and Sharing Accurate

Content in the Public Domain’ (2013) 22(2) Journal of Law, Information and Science

75.

Ching-man Au Yeung, Ilaria Liccardi, Kanghao Lu, Oshani Seneviratne, Tim Berners-Lee;

‘Decentralization: The Future of online Social Networking’, http://www.3.org.

Chon Margaret, ‘Sticky Knowledge and Copyright’ [2011] Wisconsin Law Review 177.

222

Conley, Chris, ‘The Right to Delete’, AAAI Spring Symposium Series, March 2010,

http://www.aaai.org/ocs/index.php/SSS/SSS10/paper/view/1158/1482.

Christman, J, ‘Constructing the Inner Citadel: Recent Work on the Concept of Autonomy’

(1988) 99(1) Ethics 109.

Christofides, E, Muise, A and Desmarais, S, ‘Information Disclosure and Control on

Facebook: Are They Two Sides of the Same Coin or Two Different Processes?’

(2009) 12(3) Cyber Psychology and Behaviour 341.

Citron, DK, ‘Mainstreaming Privacy Torts’ (2010) 98(6) California Law Review 1805.

Clark, Roger, ‘Privacy Eye: Media Paranoia Distorting Facts on Privacy Tort’, Crikey, 1

August 2014, http://crikey.com.au/2011/08/01/privacy-eye-media-paranoia-distorting-

facts-on-privacy-tort.

Clarke, Andrew Devereux, , John, Werren, Julia and Jennifer O’Reilly, Torts, A Practical

Learning Approach ( 3rd Edition Lexisnexis 2014).

Clarke, Peter A, ‘Privacy Issues Involving Pictures of Kate Middleton & Litigation that has

Followed’ (15 September 2012), http://peterclarke.com.au/2012/09/15/privacy-issues-

involving.

Clapperton, D and Corones S, ‘Unfair Terms in Clickwrap and Other Electronic Contracts’

(2007) 35 Australian Business Law Review 152.

Clemons, LS, ‘The Right of Privacy in Relation to the Publication of Photographs’ (1930)

14(4) Marquette Law Review 193.

Coe, P, ‘The Social Media Paradox: An Intersection with Freedom of Expression and the

Criminal Law’ (2015) 24(1) Information and Communications Technology Law 16.

Cohen JE, ‘What Privacy is For?’ (2013) 126 Harvard Law Review 1904.

223

Cohen, DL, ‘Autonomy, and Political Community in Plato’s Laws’ (1993) 88(4) Classical

Philology 301.

Cohen, Julie E, ‘A Right to Read Anonymously: A Closer Look at Copyright Management in

Cyberspace’ (1996) 28 Connecticut Law Review 981.

Cohen, Nicole S, ‘The Valorization of Surveillance: Towards a Political Economy of

Facebook’, (2008) 22(1) Democratic Communiqué 5.

Cohen, Noam, ‘Use My Photo? Not Without Permission’, New York Times (1 October 2007),

http://www.nytimes.com/2007/10/01/technology/01link.html.

Collingwood, Lisa, ‘Privacy, Anonymity and Liability: Will Anonymous Communicators

Have the Last Laugh?’ [2012] Computer Law & Security Review 328.

Collins, David, ‘Age of the Living Dead: Personality Rights of Deceased Celebrities’ (2002)

39(4) Alberta Law Review 914.

Collins, Steve, ‘Digital Fair: Prosumption and the Fair Use Defence’ (2010) 10(1) Journal of

Consumer Culture 37.

Colombi Ciacchi, Gert, Brüggemeier, Patrick, O'Callaghan, Aurelia, Personality Rights in European Tort Law (Cambridge University Press, 2010).

Cook, Amanda Beshears, ‘Copyright and Freedom of Expression: Saving Free Speech from

Advancing Legislation’ (2013) 12 Chicago-Kent Journal of Intellectual Property 1.

Cook, E, Erickson I and Thom-Santelli, J, ‘Stolen! Categories of In-context Response to

Unauthorised Reuse of User-generated Media’, in Proceedings of the Seventh ACM

Conference on Creativity and Cognition, Berkeley, California, October 26–30, 2009

(2009).

Coombe, Rosemary J, ‘Author/ising the Celebrity: Publicity Rights, Postmodern Politics and

Unauthorized Genders’ (1992) 10 Cardozo Arts and Entertainment Law Journal 365.

224

Cooray, Manique, ‘Information Gathered on Social Networking Sites and the Law of

Confidence’, in Proceedings of 5th International Conference on Social Science and

Humanity (IPEDR 5) (2011).

Corbett, S, ‘The Retention of Personal Information Online: A Call for International Regulation

of Privacy Law’ (2013) 29 Computer Law and Security Review: The International

Journal of Technology Law and Practice 246-254.

Cotter, TF, ‘Fair Use and Copyright Over Enforcement’ (2008) 93 Iowa Law Review 1271.

Cotter, TF, ‘Prolegomenon to a Memetic Theory of Copyright: Comments on Lawrence

Lessig’s The Creative Commons’ (2003) 55 Florida Law Review 779.

Cotter, TF and Dimitreva, IY, ‘Integrating the Right of Publicity with First Amendment and

Copyright Preemption Analysis’ (2010) 33(2) Columbia Journal of Law and the

Arts 165.

Cowling, Michael, ‘How Messenger Highlighted Facebook’s Privacy Problem’, Lifehacker

(23 August 2014), http://www.lifehacker.com.au/2014/08/how-messenger-

highlighted-facebooks-privacy-problem.

Coyne, Randall TE, ‘Toward a Modified Fair Use Defense in Right of Publicity Cases’ (1988)

29 William. & Mary Law Review 781.

Cripps, Yvonne, ‘The Public Interest Defence to the Action for Breach of Confidence and the

Law Commission’s Proposals on Disclosure in the Public Interest’ (1984) 4(3) Oxford

Journal of Legal Studies 361.

Curren, Kevin, Morrison, Scott and McCauley, Stephen, ‘Google + vs Facebook: The

Comparison’ (2012) 10(2) Telkomnika 379.

Cutillo LA, Manulis M and Strufe T, ‘Security and Privacy in Online Social Networks’, In

B Furht (ed.), Handbook of Social Network Technologies and Applications (Springer,

2010).

225

Cutillo, Leucio Antonio, Molva, Refik and Strufe, Thorsten, ‘Safebook: A Privacy-preserving

Online Social Network Leveraging on Real-life Trust’ (2009) 47(12) IEEE

Communications Magazine 94.

Dan-Cohen, M, ‘Conceptions of Choice and Conceptions of Autonomy’ (1992) 102(2)

Ethics 221.

Dana, JT, ‘Copyright and Privacy Protection of Unpublished Works: The Author’s Dilemma’

(1977) 13 Columbia Journal of Law and Social Problems 351.

Davison, Mark J, Monotti Ann L and Wiseman, Leanne, Australian Intellectual Property

Law, 3rd ed. (Cambridge University Press, 2016).

Day, J. P, ‘Locke on Property’ (1966) 16 Philosophical Quarterly 207.

De Azevedo Cunha, M and Itagiba, G, ‘Between Privacy, Freedom of Information and

Freedom of Expression: Is There a Right to be Forgotten in Brazil?’ (2016) 32(4)

Computer Law and Security Review 634.

Debatin, Bernhard, Lovejoy, Jennette P, Horn, Ann Kathrin and Hughes, Brittany N,

‘Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences’

(2009) 15(1) Journal of Computer Mediated Communication 83.

Dean R, ‘A Right to Privacy’ (2004) 78 Australian Law Reports 111.

Deazley, R, ‘Introducing Publicity Rights? Breach of Confidence, The Photograph and

Commodifying the Image’ (2003) 54(2) Northern Ireland Legal Quarterly 99.

Deazley, R, ‘The Myth of Copyright at Common Law’ (2003) 62(1) Cambridge Law

Journal 106.

Debatin, B, Lovejoy, J, Horn, A-K and Hughes, BN, ‘Facebook and Online Privacy:

Attitudes, Behaviors and Unintended Consequences’ (2009) 15(83) Journal of

Computer-Mediated Communication 108.

226

Deckle, McLean, ‘Plain View: A Concept Useful to the Public Disclosure and Intrusion

Privacy Invasion Torts’ (1999) 21 Communications and the Law 9.

Denzin, Norman K, ‘Postmodern Social Theory’ (1986) 4(2) Sociological Theory 194.

Determann, Lothar, ‘Social Media Privacy: A Dozen Myths and Facts’ (2012) 7 Stanford

Technology Law Review 1.

De Hert, Paul and Papakonstantinou, Vagelis, ‘The Proposed Data Protection Regulation

Replacing 95/46/EC: A Sound System for the Protection of Individual’ (2012) 28

Computer Law and Security Review 130. de Terwangne, Cecile, ‘Internet Privacy and the Right to be Forgotten/Right to Oblivion’

(2012) Revista de Internet, Derecho y Politica 112,

http://www.raco.cat/index.php/IDP/article/download/251842/337492.

De Zwat, M, ‘My Self, My Avatar, My Rights? Rights of Avatar Identity and Integrity in

Virtual Worlds’ (2012) 85 Frontiers of Cyberspace 81.

Diacovo, Nannette, ‘Going Once, Going Twice, Sold: The First Sale Doctrine Defense in

Right of Publicity Actions’ (1995) 12 University Miami Entertainment and Sports

Law Review 57.

Diaz, C, Troncoso, C and Serjantov, A, ‘On the Impact of Social Network Profiling on

Anonymity’, in N Borisov and I Goldberg (eds), Privacy Enhancing Technologies

(Springer, 2008).

Donath, Judith and boyd, danah, ‘Public Displays of Connection’ (2004) 22(4) BT Technology

Journal 71.

Douglas, M, ‘Questioning the Right to be Forgotten’ (2015) 40(2) Alternative Law

Journal 109.

Doyle, Carolyn and Bagaric, Mirko, Privacy in Australia (Federation Press, 2005).

227

Ducheneaut, N, Yee, N, Nickell, E and Moore R, ‘The Life and Death of Online Gaming

Communities: A Look at Guilds in World of Warcraft’, in Proceedings CHI ’07

Proceedings of the SIGCHI Conference on Human Factors in Computing Systems

(2007).

Duff, Anderson, Wolf, Greenfield and Sacks, PC, ‘“Let’s Take a Selfie,” Said the Monkey: A

Case of Questionable Copyrights’, Wired (18 September 2014),

http://www.wired.com/2014/09/questionable-copyrights.

Dwyer, C, Passerini, K and Hiltz, SR, ‘Trust and Privacy Concern Within Social Networking

Sites: A Comparison of Facebook and MySpace’, in Americas Conference on

Information Systems, AMCIS 2007 Proceedings (2007),

http://csis.pace.edu/~dwyer/research/DwyerAMCIS2007.pdf

Edwards, Lillian and Brown, Ian, ‘Data Control and Social Networking: Irreconcilable

Ideas?’, in A Matwyshyn (ed.) Harboring Data: Information Security, Law and the

Corporation (Stanford University Press, 2009).

Edwin Baker, C, ‘Autonomy and Informational Privacy or Gossip: The Central Meaning of

the First Amendment’ (2004) 21(2) Social Philosophy and Policy 215.

Egelman, Serge, ‘My Profile is My Password, Verify Me! The Privacy/Convenience Tradeoff

of Facebook Connect’, in Proceedings of the SIGCHI Conference on Human Factors

in Computing Systems, 27 April–2 May 2013 (2013).

Elkin-Koren, N, ‘User-Generated Platforms’, in RC Dreyfuss, DL Zimmerman and Harry

First (eds), Working Within the Boundaries of Intellectual Property (Oxford

University Press, 2010).

Ellingwood, B, Porter, I, Scehve, I, Yeager, J, Janisch, M, Rufo, K and Thornton D, ‘Curating

the Social Graph, or What Your Friends Say About You’ (2012) 2(1) The Four Peaks

Review 68.

228

Eltis, Karen, ‘Breaking Through the “Tower of Babel”: A “Right to be Forgotten” and How

Trans-Systemic Thinking Can Help Re-conceptualize Privacy Harm in the Age of

Analytics’ (2011) 22(69) Fordham Intellectual Property Media and Entertainment

Law Journal 70.

Eltis, Karen, ‘Can the Reasonable Person Still be “Highly Offended”? An Invitation to

Consider the Civil Law Tradition’s Personality Rights-based Approach to Tort

Privacy’ (2008) 5(1&2) University of Ottawa Law & Technology Journal 201.

Epstein RA, ‘A Taste for Privacy? Evolution and the Emergence of a Naturalistic Ethic’

(1980) 9(4) The Journal of Legal Studies 665.

European Commission, A Comprehensive Approach on Personal Data Protection in the

European Union (EC, 2010).

Fakler, Paul, ‘The Oscar Selfie: Why Copyright Analysis Should Be Left to Copyright

Lawyers’, Title17: The S(c)ite for Copyright Law (6 March 2014),

http://title17.net/archives/368.

Fallon Jr, RH, ‘Two Senses of Autonomy’ (1994) 46(4) Stanford Law Review 875.

Fang, Lijun and LeFevre, Kristen, ‘Privacy Wizards for Social Networking Sites’, in

Proceedings of the 19th International Conference on World Wide Web (2010).

Fayle, K (2007) ‘Understanding The Legal Issues for Social Networking Sites and Their

Users’, Findlaw, http://technology.findlaw.com/modern-law-practice/understanding-

the-legal-issues-for-social-networking-sites-and.html.

Fazlioglu, Muge, ‘Forget Me Not: The Clash of the Right to be Forgotten and Freedom of

Expression on the Internet’ [2013] International Data Privacy Law 1.

Felcher, Peter L and Rubin, Edward L, ‘Privacy, Publicity and the Portrayal of Real People by

the Media’ (1979) 88(8) Yale Law Journal 1577.

Feldman, D, ‘Privacy as a Civil Liberty’ (1994) 47(2) Current Legal Problems 41.

229

Felt, Adrienne and Evans, David, ‘Privacy Protection for Social Networking APIs’,

http://www.cs.virginia.edu/felt/privacybyproxy.pdf.

Fenwick, Helen and Phillipson, Gavin, ‘Confidence and Privacy: A Re-examination’ (1996)

55(3) Cambridge Law Journal 447.

Fiedler, L, ‘Public Shaming in the Digital Age: Are Criminal Laws the Most Effective Means

to Regulate Revenge Porn?’ (2014) 34(2) Loyola Los Angeles Entertainment Law

Review 155.

Finnis, JM, ‘Legal Enforcement of “Duties to Oneself”: Kant v Neo-Kantians’ (1987) 87(3)

Columbia Law Review 433.

Fiorella, Sam, ‘The Insidiousness of Facebook Messenger’s Android Mobile App Permissions

(Updated)’, The Huffington Post (8 November 2014),

http://www.huffingtonpost.com/technology.

Fitzpatrick, John R, ‘The Unauthorized Publications of Photographs’ (1932) 20 Georgetown

Law Journal 134.

Flanagan, A, ‘Defining Journalism in the Age of Evolving Social Media: A Questionable EU

Legal Test’ (2012) 21(1) International Journal of Law and Information Technology 1.

Folderauer, Kaitlan M, ‘Comments: Not All is Fair (Use) in Love and War: Copyright Law

and Revenge Porn’ (2015) 44(2) University of Baltimore Law Review 321.

Fono, David and Raynes-Goldie, Kate, ‘Hyperfriendship and Beyond: Friends and Social

Norms on LiveJournal’, in M Consalvo and C Haythornthwaite (eds), Internet

Research Annual Volume 4: Selected Papers from the AOIR Conference 2006 (New

York: Peter Lang, 2007).

Forde, A, ‘Implications of the Right to be Forgotten’ (2015) 18 Tulane Journal of Technology

and Intellectual Property Law 83.

230

Frankel, Susy, ‘The Copyright and Privacy Nexus’ (2005) 36 Victoria University of

Wellington Law Review 507.

Frankfurt, Harry ‘Freedom of the Will and The Concept of A Person’, (1971) 68 Journal of

Philosophy 5.

Frantziou, Eleni, ‘Further Developments in the Right to be Forgotten: The European Court of

Justice’s Judgment in Case C-131/12, Google Spain SL, Google Inc. v Agencia

Espanola de Proteccion de Datos’ [2014] Human Rights Law Review 1.

Fraser, Julia and De Ruyck, Josephine, ‘The Right to be Forgotten: Balancing Conflicting

Rights. Intellectual Property Watch (26 June 2014), http://www.ip-

watch.org/2014/06/26/the-right-to-be-forgotten-balancing-conflicting-rights/print.

Freeman, Linton, ‘The Development of Social Network Analysis’ (2004),

https://www.researchgate.net/profile/Linton_Freeman/publication/239228599_The_D

evelopment_of_Social_Network_Analysis/links/54415c650cf2e6f0c0f616a8.pdf.

Fuchs, Christian ‘An Alternative View of Privacy on Facebook’ (2011) 2(1) Information 140.

Fuchs, Christian, ‘Social Networking Sites and the Surveillance Society: A Critical Case

Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in

the Context of Electronic Surveillance’, Forshungsgruppe Unified Theory of

Information (2009),

content/uploads/SNS_Surveillance_Fuchs.pdf

Fuhse, JA, ‘The Meaning Structure of Social Networks’ (2009) 27(1) Sociological Theory 51.

Galeotti, A, Goyal, S, Jackson, M, Vega-Redondo, F and Yariv, L, ‘Network Games’ (2010)

77 Review of Economic Studies 218.

Galston, W, ‘Defending Liberalism’ (1982) 76(3) American Political Science Review 621.

Ganguly, Maya, ‘Private Pictures, Public Exposure: Papparazzi, Compromising Images, and

Privacy Law on the Internet’ (2009) 26(4) Wisconsin International Law Journal 1140.

231

Gardbaum, S, ‘Liberalism, Autonomy, and Moral Conflict’ (1996) 48(2) Stanford Law

Review 385.

Garfield AE, ‘The Case For First Amendment Limits On Copyright Law’ (2007) 35(3)

Hofstra Law Review 1169.

Garnett, KQC, ‘Copyright in Photographs’ [2000] European Intellectual Property

Review 229.

Garrie, Daniel B, Duffy-Lewis, Maureen, Wong, Rebecca and Gillespie, Richard L, ‘Data

Protection: The Challenges Facing Social Networking’ (2010) 6 Bringham

International Law and Management Review 127.

Gauberti, Annabelle, ‘Rhianna, Topshop and Passing Off: A Love/Hate Relationship’, Lexis

Nexis (8 December 2013), http://www.lexisnexis.com/legalnewsroom/intellectual-

property/copyright-trademark-law-blog/archive/2013/08/12/rhianna-topshop-and-

passing-off-a-love-hate-relationship.

Gellman, Robert, ‘Does Privacy Law Work?’ in Philip E Agre and Marc Rotenberg (eds),

Technology and Privacy: The New Landscape (MIT Press, 1997).

Gelman, Lauren, ‘Privacy, Free Speech and “Blurry Edged” Social Networks’ (2009) 50(5)

Boston College Law Review 1315.

Genn, BA ‘What Comes Off, Comes Back to Burn: Revenge Pornography as the Hot New

Flame and How It Applies to the First Amendment and Privacy Law’ (2014) 23(5)

American Journal of Gender Social Policy and Law 163.

George, C and Scerri, J, ‘Web 2.0 and User Generated Content: Legal Challenges in the New

Frontier’ (2007) 2 Journal of Information Law and Technology 1.

Gervais, D, ‘The Derivative Right, or Why Copyright Law Protects Foxes Better than

Hedgehogs’, (2012) 15(4) Vanderbilt Journal of Entertainment and Technology Law

785.

232

Gervais, D, ‘The Tangled Web of UGC: Making Copyright Sense of User Generated Content’

(2009) 11(4) Vanderbilt Journal of Entertainment and Technology Law 841.

Gervais, D, ‘Towards a New Core International Copyright Norm: The Reverse Three Step

Test’ (2005) 9(1) Marquette Intellectual Property Law Review 1.

Gervais DJ and Hyndman, DJ, ‘Cloud Control: Copyright, Global Memes and Privacy’

(2012) 10 Journal on Telecommunications and High Technology Law 53.

Ghoshray, S, ‘The Emerging Reality of Social Media: Erosion of Individual Privacy Through

Cyber-Vetting and Law’s Inability to Catch Up’ (2013) 12 John Marshall Review of

Intellectual Property Law 551.

Gibson, Floyd A and Healy, Rachel M, ‘The Right of Publicity Comes of Age’ (1995) 23(3)

American Intellectual Property Law Association Quarterly Journal 361.

Gill, Paramjit S and Swartz, Tim B, ‘Bayesian Analysis of Directed Graphs Data with

Applications to Social Networks’ (2004) 53(2) Journal of the Royal Statistical Society,

Series C (applied Statistics) 249.

Gillespie, Richard L, ‘Data Protection: The Challenges Facing Social Networking’ (2010)

6 International Law and Management Review 127.

Gilmer-Speed, John, ‘The Right of Privacy’ (1896) 163(476) The North American Review 64.

Ginsburg, Jane C, ‘No “Sweat”? Copyright and Other Protection of Works of Information

After Feist v Rural Telephone’ (2002) 92(2) Columbia Law Review 338.

Giurgiu, Andra, ‘Challenges of Regulating a Right to be Forgotten with Particular Reference

to Facebook’ (2013) 7(2) Masaryk University Journal of Law and Technology 361.

Glancy, Dorothy J, ‘At the Intersection of Visible and Invisible Worlds: United States Privacy

Law and the Internet’ (2000) 16 Santa Clara Computer & High Tech. Law

Journal 357.

233

Glancy, Dorothy J, ‘Privacy and the Other Miss M’ (1990) 10 Northern Illinois University

Law Review 401.

Global Voices Advocacy Defending Free Speech Online, ‘Spain on a Downward Spiral? New

Law May Destroy the Digital Commons’ (July 2014),

http://advocacy.globalvoicesonline.org/2014/07/30/spain-on-a-downward-spiral-new-

law-may-destroy-the-digital-commons.

Goldenberg, J, Oestreicher-Singer, G and Reichman, S, ‘The Quest for Content: How User

Generated Links Can Facilitate Online Exploration’ (2011) 49(4) Journal of

Marketing Research 452.

Godkin, E.L. ‘Libel and Its Legal Remedy’ (1880) 12 Journal of Social Science 69.

Goldenberg, Anna and Moore, Andrew W, ‘Bayes Net Graphs to Understand Co-authorship

Networks’, in LinkKDD '05: Proceedings of the 3rd International Workshop on Link

Discovery (2005), doi: 10.1145/1134271.1134272.

Goldman, E, ‘The Law of Social Networking Sites: A Primer’, Technology & Marketing Law

Blog, May 2007,

http://www.ericgoldman.org/Resources/socialnetworkingsitesandthelaw.pdf.

Goldman, E, ‘Wikipedia’s Labor Squeeze and Its Consequences’ (2010) 8 Journal on

Telecommunication and High Technology Law 157.

Gopnik, A and Schulz, L, Casual Learning: Psychology, Philosophy, and Computation

(Oxford University Press, 2007).

Gordley, J, ‘When is the Use of Foreign Law Possible? A Hard Case: The Protection of

Privacy in Europe and the United States’ (2007) 67(4) Louisiana Law Review 1073.

Gornery, Geoffrey, ‘Whose Autonomy Matters? Reconciling the Competing Claims of

Privacy and Freedom of Expression’ (2007) 27(3) Legal Studies 404.

234

Graham, Jonathan P, ‘Privacy, Computers, and the Commercial Dissemination of Personal

Information’ (1986) 65 Texas Law Review 1395.

Graham, N and Anderson, H, ‘Are Individuals Waking Up to the Privacy Implications of

Social Networking Sites?’ (2010) 32(3) European Intellectual Property Review 99.

Granovetter, Mark S, ‘The Strength of Weak Ties’ (1973) 78(6) The American Journal of Sociology

1360.

Graves, Zachary, ‘The Dangerous Proliferation of the “Right to be Forgotten”, Huffington

Post Technology (18 June 2014).

Greenberg, Joshua M, ‘The Privacy-Proof Plaintiff: But First, Let Me Share Your #Selfie’

(2015) 23(2) Journal of Law and Policy 689.

Greene KJ, ‘Right of Publicity, Identity and Performance’ (2012) 28(4) Santa Clara

Computer and High Technology Law Journal 865.

Greene, KJ, ‘Intellectual Property Expansion: The Good, the Bad and the Right of Privacy’

(2008) 11 Chapman Law Review 521.

Greene, K, Kniss, J, Luger, G and Stern, C, ‘Satisfying the Masses: Applying Game Theory to

Large-Scale, Democratic Decision Problems’ in International Conference on

Computational Science and Engineering (CSE): Proceedings (2009).

Greenleaf, G, ‘Privacy in Australia’, in J Rule and G Greenleaf (eds), Global Privacy

Protection: The First Generation (Edward Elgar, 2010).

Greenleaf, G, ‘Tabula Rasa’: Ten Reasons Why Australian Privacy Law Does Not Exist

(2001) 24(1) University of New South Wales Law Journal 262.

Griffiths, Jonathan, ‘Pre-empting Conflict: A Re-examination of the Public Interest Defence

in UK Copyright Law’ [2013] Legal Studies 1.

235

Griffiths, M and Light, B, ‘Social Networking and Digital Gaming Media Convergence:

Classification and Its Consequences for Appropriation’ (2008) 10(4) Information

Systems Frontiers 447.

Grimmelman, James, ‘Facebook, and The Social Dynamics of Privacy’ Draft (August 2008),

http://works.bepress.com/james_grimmelmann/20.

Grimmelmann, James, ‘The Internet is a Semicommons’ (2009–10) 78 Fordham Law

Review 2799.

Grimmelman James, ‘Privacy as Product Safety’ (2010) 19 Widener Law Journal 793.

Grimmelmann, James ‘Saving Facebook’ (2009) 94 Iowa Law Review 1137.

Gross, Ralph and Acquisti, Alessandro, ‘Information Revelation and Privacy in Online Social

Networks’, in Proceedings of the 2005 ACM Workshop on Privacy in the Electronic

Society (2005).

Grothouse, MR, ‘Collateral Damage: Why the Transformative Use Test Confounds Publicity

Rights Law’ (2014) 18(3) Virginia Journal of Law and Technology 475.

Gruhl, D, Liben-Nowell, D, Guha R, and Tomkins, A, ‘Information Diffusion Through

Blogspace’, in Proceedings of the 13th International Conference on World Wide

Web (2004).

Gunasekara, G, ‘The Final Privacy Frontier? Regulating Trans-Border Data Flows’ (2007)

17(2) International Journal of Law and Information Technology 147.

Gutierrez Alm, Jessica, ‘“Sharing” Copyrights: The Copyright Implications of User Content

in Social Media’ (2014) 35 Hamline University Journal of Public Law and Policy 104.

Haas, Rebecca, ‘Twitter: New Challenges to Copyright Law in the Internet Age’ (2010) 10

John Marshall Review of Intellectual Property Law 231.

Habermas, Jürgen, ‘Morality and Ethical Life: Does Hegel’s Critique of Kant Apply to

Discourse Ethics?’ (1989) 83(38) Northwestern University Law Review 38.

236

Habermas, Jürgen, ‘Reconciliation Through the Public use of Reason: Remarks on John

Rawls’s Political Liberalism’ (1995) 92(3) Journal of Philosophy 109.

Haigh Farley, Christine, ‘The Lingering Effects of Copyright’s Response to the Invention of

Photograph’ (2004) 65 University of Pittsburgh Law Review 385.

Hamilton MA, ‘A Response to Professor Benkler’ (2000) 15 Berkeley Technology Law

Journal 605.

Hamilton, W. J, ’ Property According to Lock’ (1932) 41 Yale Law Journal 864. Hammond, RG, ‘The Origins of the Equitable Duty of Confidence’ (1979) Anglo-American

Law Review 71.

Hann, Il-Horn, Hui, Kai-Lung, Lee, Tom S and Png, Ivan PL, ‘Online Information Privacy:

Measuring the Cost–Benefit Trade-off’, in 23rd International Conference on

Information Systems (2002).

Harder, Sirko, ‘Gain-Based Relief for Invasion of Privacy’ (2011) 1 DICTUM Victoria Law

School Journal 63.

Hargittai, Eszter, ‘Whose Space? Differences Among Users and Non-Users of Social

Network Sites’ (2008) 13 Journal of Computer- Mediated Communication 276.

Hartzog, W, ‘Promises and Privacy: Promissory Estoppel and Confidential Disclosure in

Online Communities’(2009) 82(4) Temple Law Review 891.

Hashemi, Yasamine, ‘Facebook’s Privacy Policy and Its Third Party Partnerships, Lucrativity

and Liability’ (2009)15 Boston University Journal of Science & Technology Law 140.

Haubart, RC, ‘Copyright Personal Letters, Diaries and Memorabilia: A Review and a

Suggestion’ (1984) 13 Baltimore Law Review 244.

Haverley, Robert A, ‘One Piece of the Puzzle: A Private Right to your Image in the Digital

Age’ Journal of Law and Policy for the Information Society (2 May 2011), Albany

Law School.

237

Haynes, Allyson W, ‘Online Privacy Policies: Contracting Away Control Over Personal

Information?’ (2007) 111(3) Pennsylvania State Law Review 588.

Haythornwaite, Caroline, ‘Social Network Analysis: An Approach and Technique for the

Study of Information Exchange’ (1996) 18(4) Library & Information Science

Research 323.

Haythornthwaite, Caroline, ‘Social Networks and Internet Connectivity Effects’ (2005) 8(2)

Information, Communication, & Society 125.

He, J, Chu, W and Liu, Z, ‘Inferring Privacy Information from Social Networks’, in S

Mehrotra, DD Zeng, H Chen, B Thuraisingham and FY Wang, Intelligence and

Security Informatics (Springer, 2006).

He Jianming and Chu, Wesley W, ‘Protecting Private Information on Online Social

Networks’, in H Chen and C Yang (eds), Intelligence and Security Informatics

(Springer, 2008).

Heath, William M, ‘Possum Processing, Picture Pilfering, Publication and Privacy: Australian

Broadcasting Corporation v Lenah Game Meats Pty Ltd’ (2002) 28(1) Monash Law

Review 162.

Heidemann, Julia, ‘Online Social Networks: A Survey of a Global Phenomenon’ (2012) 56

Computer Networks 386.

Helling, Anna E (2005) ‘Protection of “Persona” in the EU and in the US: A Comparative

Analysis’ (2005) LLM Theses and Essays, Paper 45,

http://digitalcommons.law.uga.edu/stu_llm/45.

Henkin, L, ‘Privacy and Autonomy’ (1974) 74 Columbia Law Review 1410.

Hetcher, Steven A, ‘Hume’s Penguin, or, Yochai Benkler & the Nature of Peer Production’

(2009) 11(4) Vanderbilt Journal of Entertainment and Technology Law 963.

238

Hicks, Aubrie, ‘The Right to Publicity After Death: Post Mortem Personality Rights in

Washington in the Wake of Experience Hendrix v. HendrixLicensing.com’ (2012) 36

Seattle University of Law Review 275.

Hilden, J, ‘The New Guidelines for User-Generated Content Services Such as MySpace: Why Some Will Predictably Inhibit “Fair Use”’, FindLaw (12 November 2007), http://writ.news.findlaw.com/hilden/20071112.html. Hill, Kashmir, ‘Either Mark Zuckerberg Got a Whole Lot Less Private or Facebook’s CEO

Doesn’t Understand The Company’s New Privacy Settings’, Forbes (12 October

2009), http//:forbes.com/sites/kashmirhill/2009/12/10/either-mark-zuckerberg-got-a-

whole-lot-less-private-or-facebooks-ceo-doesn’t-understand-the-companys-new-

private-settings.

Hinkler, Amy A, ‘Privacy in the Age of Social Media Mergers and Acquisitions’ (2013),

https://works.bepress.com/amy_hinkler/1/download.

Hoadley, Christopher M, Xu, Heng, Lee, Joey J and Rosson, Mary Beth, ‘Privacy as

Information Access and Illusory Control: The Case of the Facebook News Feed

Privacy Outcry’ (2010) 9(1) Electronic Commerce Research and Applications,

https://steinhardt.nyu.edu/scmsAdmin/uploads/004/303/sdarticle.pdf.

Hodge MJ, ‘The Fourth Amendment and Privacy Issues on the “New” Internet: Facebook.com

and MySpace.com’ (2007) 31 Southern Illinois University Law Journal 95.

Hogan, Bernie ‘A Comparison of On and Offline Networks Through the Facebook API’

(2009), http://ssrn.com/abstract=1331029.

Hornung, G, ‘A General Data Protection Regulation for Europe? Light and Shade in the

Commission’s Draft of 25 January 2012?’ (2012) 9(1) SCRIPT-ed 65.

Horowitz SJ, ‘Competing Lockean Claims to Virtual Property’ (2007) 20(2) Harvard Journal

of Law & Technology 443.

239

House of Lords, European Union Committee, EU Data Protection Law: A Right to Be

Forgotten? 2nd Report Session 2014-15.

Hoven, Michael, ‘Balancing Privacy and Speech in the Right to be Forgotten’,

http://jolt.law.harvard.edu/digest/privacy/balancing-privacy-and-speech-in-the-right-

to-be-forgotten.

Hughes DJ, Rowe, M, Batey, M and Lee A, ‘A Tale of Two Sites: Twitter vs Facebook and

the Personality Predictors of Social Media Usage’ (2012) 28 Computers in Human

Behaviour 561.

Hughes, J, ‘The Photographer’s Copyright: Photograph as Art, Photograph as Database’

(2012) 25(2) Harvard Journal of Law and Technology 328.

Hull, Gordon, Richter Lipford, Heather and Latulipe, Celine, ‘Contexual Gaps: Privacy Issues

on Facebook’ (2011) 13(4) Ethics and Information Technology 289.

Hum, NJ, Chamberlin, PE, Hambright, BL, Portwood, AC, Schat, AC and Bevan, JL,

‘A Picture is Worth a Thousand Words: A Content Analysis of Facebook Profile

Photographs’ (2011) 27 Computers in Human Behaviours 1828.

Humphries, L, Gill, P and Krishnamurthy, B, ‘How Much is Too Much? Privacy Issues on

Twitter’, Proceedings of Conference of International Communication Association (2010).

Hunter, Dan, ‘Amateur-to-Amateur’ (2004) 46(3) William and Mary Law Review 951.

Hutchings, A, ‘Authors, Art and the Debasing Instinct: Law and Morality in the Carmina

Burana Case’ (1997) 19(3) Sydney Law Review 385.

Huyett, Scott L, ‘An Unwarranted Extension of the Right to Privacy’ (1960–61) 65 Dickinson

Law Review 253.

Iacovino, Livia, ‘The Long-term Preservation of Identifiable Personal Data: A Comparative

Archival Perspective on Privacy Regulatory Models in the European Union, Australia,

Canada and the United States’ (2007) 7 Archival Science 107.

240

Iglezakis, Ioannis, ‘The Right to be Forgotten in the Google Spain Case ( case C-131/12):

A Clear Victory for Data Protection or an Obstacle for the Internet?’,

https://ssrn.com/abstract=2472323.

Ilia, P, Polakis, I, Athanasopolous, E, Maggi, F and Ioannidis, S, ‘Face/Off: Preventing

Privacy Leakage from Photos on Social Networks’, in Proceedings of the 22nd ACM

SIGSAC Conference on Computer and Communications Security CCS’15, 2015,

Denver Colorado, USA (2015).

Izyumenko, E, ‘The Freedom of Expression Contours of Copyright in the Digital Era:

A European Perspective’ (2016) 19 (3–4) Journal of World Intellectual Property 115.

Jeffries, Stuart, ‘The Death of Photography: Are Camera Phones Destroying an Artform?’,

The Guardian (14 December 2013),

http://www.theguardian.com/artanddesign/2013/dec/13/death-of-photography-camera-

phones

Jensen, Christopher, ‘The More Things Change, the More They Stay the Same: Copyright,

Digital Technology and Social Norms’ (2003) 56(2) Stanford Law Review 531.

Jenker, Dan and Svantesson, B, ‘The (Uncertain) Future of Online Data Privacy’ (2015)

9(1) Masaryk University Journal of Law and Technology 129.

Johnson M, Tamminen, S and Lehmuskallio, A, ‘Managing Privacy on Social Network Sites’,

Medienamateure: Wie verändern Laien unsere visuelle Kultur? Internationale und

interdisziplinäre Tagung der Universität Siegen (2008),

http://www.medienameteure.de.

Joison, Adam N, ‘“Looking At”, “Looking Up” or “Keeping Up with” People? Motives and

Uses of Facebook’, in Proceedings of the SIGCHI Conference on Human Factors in

Computing Systems (2008).

241

Jones, H and Soltren, JH, ‘Facebook: Threats to Privacy’, unpublished paper (2005),

http://groups.csail.mit.edu/mac/classes/6.805/student-papers/fall05-

papers/facebook.pdf.

Jori, A, ‘Data Protection Law – An Introduction: Privacy and Privacy Protection’ (2007),

http://www.dataprotection.eu/pmwiki/pmwiki.php?n=Main.Privacy.

Judge, Elizabeth F and Gervais, Daniel, ‘Of Silos and Constellations: Comparing Notions of

Originality in Copyright Law’ (2009) 27 Cardozo Arts and Entertainment 375.

Jung, Andrew M, ‘Twittering Away the Right of Publicity: Personality Rights and Celebrity

Impersonation on Social Networking Sites’ (2011) 86 Chicago-Kent Law Review 381.

Kalinda, Basho, ‘Licensing of Our Personal Information: Is It a Solution to Internet Privacy?’

(2000) 88 California Law Review 1507.

Kalven, H Jr, ‘Privacy in Tort Law: Were Warren and Brandeis Wrong?’ (1966) 31 Law and

Contemporary Problems 326.

Kane, B, ‘Balancing Anonymity, Popularity, and Micro-Celebrity: The Crossroads of Social

Networking and Privacy’ (2010) 20(2) Albany Law Journal of Science and

Technology 327.

Kang, Jerry, ‘Information Privacy in Cyberspace Transactions’ (1998) 50(4) Stanford Law

Review 1193-1294

Kang, Jerry, ‘Information Privacy in Cyberspace Transactions’ (1998) 50(4) Stanford Law

Review 1193.

Kaplan, A and Haenlein, M, ‘Users of The World, Unite! The Challenges and Opportunities

of Social Media’ (2010) 53(1) Business Horizons 59.

Kasper, Debbie V. S. ‘The Evolution (Or Devolution) of Privacy’ (2005) 1, Sociological

Forum 20, 69.

242

Keats Citron, Danielle, ‘Mainstreaming Privacy Torts’ (2010) 98(6) California Law

Review 1805.

Kenyon, Andrew T, ‘Imputation or Publication:The Cause of Action in Defamation’ [2004]

27(1) University of New South Wales Law Journal, 100

Kenyon, Andrew T and Milne, Esther, ‘Images of Celebrity: Publicity, Privacy Law’ (2005)

10(4) Media and Arts Law Review 311.

Kim, W, Jeong, O-R and Sang-Won, L, ‘On Social Web Sites’ (2010) 35 Information Systems 315.

Kirby, M, ‘Privacy in the Courts (2001) 24(1) University of New South Wales Law Journal 247.

Kirkpatrick, Marshall, ‘Facebook’s Zuckerberg Says the Age of Privacy is Over’,

http://www.readwriteweb.com/archives/facebooks_zuckerberg_says_the_age_of_priv

acy_is_ov.php.

Klein, Nathan, ‘Footy Show Releases Statement Following Baby Joke on National TV’, Daily

Telegraph (21 May 2013), http://www.news.com.au/sport/nrl/parents-to-seek-legal-

action-after-apology-refusal-from-channel-9-over-footy-show-ugly-baby-joke/story.

Knight, Jennifer R, ‘Copyright Misuse v Freedom of Contract: And the Winner Is …’ (2006)

73 Tennessee Law Review 237.

Koehler, Jesse, ‘Fraley v Facebook: The Right to Publicity in Online Social Networks’ (2013)

28 Berkeley Technology Law Journal 963.

Koelle, David, Pfautz, Jonathan, Farry, Michael, Cox, Zach, Cato, Geoffrey and Campolongo,

Joseph, ‘Applications of Bayesian Belief Networks on Social Network Analysis’, in

Proceedings of the 4th Bayesian Modelling Applications Workshop (2006),

http://www.cs.uu.nl/groups/DSS/UAI-workshop/Koelle.pdf.

Komaitis, Konstantinos, ‘Internet Governance: Why Plato is Still Relevant’ (2009)

13 International Journal of Communications Law & Policy 134.

243

Koomen, Kaaren, ‘Breach of Confidence and the Public Interest Defence: Is It in the Public

Interest? A Review of the English Public Interest Defence and the Options for

Australia’ (1994) Queensland University of Technology Law Journal 56.

Koops, Bert-Jaap, ‘Forgetting Footprints, Shunning Shadows: A Critical Analysis of the Right

to be Forgotten in Big Data Practice’ (2011) 8(3) Scripted 229.

Koops, Bert-Jaap, ‘The Trouble with European Data Protection Law’, International Data

Privacy Law, doi: 10.1093/idpl/pu023.

Korenhof, P, Ausloos, J, Szekely, I, Ambrose, M, Sartor, G and Leenes, R, ‘Timing the Right

to be Forgotten: A Study into Time as a Factor in Deciding About the Retention or

Erasure of Data’, in S Gutwirth, R Leenes and P de Hert (eds), Reforming European

Data Protection Law (Springer, 2015).

Krasnova, Hanna, Günther, Oliver, Spiekermann, Sarah and Koroleva, Ksenia, ‘Privacy

Concerns and Identity in Online Social Networks’ (2009) 2(1) Identity in the

Information Society 39.

Krasnova, Hanna, Spiekermann, Sarah, Koroleva, Ksenia and Hildebrand, Thomas, ‘Online Social

Networks: Why We Disclose’ (2010) 25(2) Journal of Information Technology 109.

Krishnamurthy, Balachander and Wills, Craig E, ‘Characterizing Privacy in Online Social

Networks’, In Proceedings of the First Workshop on Online Social Networks

(ACM, 2008).

Krishnamurthy, Balachander and Wills, Craig E, ‘On the Leakage of Personally Identifiable

information via online social networks’, in Proceedings of the 2nd ACM workshop on

Online Social Networks (ACM, 2009).

Krishnamurthy, Balachander and Wills, Craig, ‘Privacy Diffusion on the Web:

A Longitudinal Perspective’, in Proceedings of the 18th International Conference on

World Wide Web (ACM, 2009).

244

Krotoszynski, RJ Jr, ‘Reconciling Privacy and Speech in the Era of Big Data: A Comparative

Legal Analysis’ (2015) 56(8) William and Mary Law Review 1279.

Kuczerawy, Aleksandra, ‘Facebook and Its EU Users: Applicability of the EU Data

Protection Law to US Based SNS’, in M Bezzi et al. (eds), Privacy and Identity

(International Federation for Information Processing, 2010).

Kuflik, Arthur, ‘The Inalienability of Autonomy’ (1984) 13(4) Philosophy and Public Affairs 271.

Kulk, S and Zuiderveen Borgesius, F, ‘Google Spain v Gonzalez: Did the Court Forget About

Freedom of Expression?’ (2014) European Journal of Risk Regulation 1.

Kumar, Ravi, Novak, Jasmine and Tomkins, Andrew, ‘Structure and Evolution of Online

Social Networks’ (2006) KKD 20.

Kuner, Christopher, ‘Data Protection Law and International Jurisdiction on the Internet’

(Part 1) (2010) 18(2) International Journal of Law and Information Technology 176.

Laddie, Prescott, Peter and Vitoria, Mary, Modern Law of Copyright and Designs, 2nd ed.

(LexisNexis, 1995).

LaFrance, MH and Cline, Gail H, ‘Identical Cousins: On the Road with Dilution and the

Right of Publicity’ (2008) 24(9) Santa Clara Computer and High Technology Law

Journal 641.

Lagone, Laura, ‘The Right to be Forgotten: A Comparative Analysis’ (2012),

https://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2229361.

Lampe C, Ellison, N and Steinfeld, C, ‘A Face(book) in the Crowd: Social Searching vs

Social Browsing’, in Proceedings of the ACM Conference on Computer Supported

Cooperative Work (CSCW, 2006).

Lampe, Cliff, Ellison, Nicole and Steinfeld, Charles, ‘Changes in Use and Perceptions of

Facebook’ in Proceedings of the 2008 ACM Conference on Computer Supported

Cooperative Work (CSCW, 2008).

245

Lampe, Cliff, Ellison, Nicole and Steinfeld, Charles, ‘A Familiar Face(book): Profile

Elements as Signals in an Online Social Network’, in CHI Proceedings: Online

Representation of Self (ACM, 2007).

Landeson, RF, ‘A Theory of Personal Autonomy’ (1975) 86(1) Ethics 30.

Lange, Patricia G, ‘Publicly Private and Privately Public: Social Networking on YouTube’

(2007) 13(1) Journal of Computer Mediated Communication 361.

Lapter, Alain J, ‘How the Other Half Lives (Revised): Twenty Years Since Midler v Ford:

A Global Perspective on the Right of Publicity’ (2007) 15 Texas Intellectual Property

Law Journal 239.

Larremore, Wilbur, ‘The Law of Privacy’ (1912) 12 Columbia Law Review 694.

Lastowka, Greg, ‘User Generated Content and Virtual Worlds’ (2008) 10 Vanderbilt Journal

of Entertainment and Technology Law Review 893.

Latham, RP, Brown, JT and Butzer, CC, ‘Legal Implications of User Generated Content: You

Tube, MySpace, Facebook’ (2008) 20(5) Intellectual Property and Technology Law

Journal 1.

Law Commission Report No 110 (Law Com WP) Breach of confidence (1981)

Law Commission Working Paper No 58, Breach of Confidence (1974) Cmnd 8388

Leaffer, Marshall, ‘The Right of Publicity: A Comparative Perspective’ (2006–07) 70 Albany

Law Review 1357.

Leatherbury, TS, Gividen, BU and Miller GF, ‘How Pervasive Video Affects Law

Enforcement and Citizen Rights’, paper presented to Houston Bar Association 30th

Annual Law and the Media Seminar, 30 January 2016, http://www.hba.org/wp-

content/uploads/2016/01/How-Pervasive-Video-Affects-Law-Enforcement-and-

Citizen-Rights.pdf.

246

Lederer, S, Mankoff, J and Dey, A, ‘Towards a Deconstruction of The Privacy Space’ (2003),

citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.10.5504&rep=rep1...pdf.

Lee, E, ‘Warming Up to User-Generated Content’ (2005) 2(1) University of Illinois Law

Review 102/

Lee, N, Facebook Nation: Total Information Awareness (Springer, 2013).

Leibowitz, Catherine, ‘A Right to Be Sparred Unhappiness’ (2013) 32 Cardozo Arts and

Entertainment Law Journal 347.

Leland, Collette, ‘All’s Fair in Love and News: How the Current Application of the Fair Use

Doctrine Favors the Traditional Media Over the Amateur Providers of News Content’

(2008) 8(2) Wake Forest Intellectual Property Law Journal 226.

Lemley, MA and Reese, RA, ‘Reducing Digital Copyright Infringement Without Restricting

Innovation’ (2004) 56 Stanford Law Review 1345.

Lessig, L, ‘Law Regulating Code Regulating Law’ (2004) 35 Loyola University Chicago Law

Journal,

https://dash.harvard.edu/bitstream/handle/1/12912675/Law%20Regulating%20Code%

20Regulating%20Law.pdf?sequence=1.

Lessig, L, ‘The Law of the Horse: What Cyberlaw Might Teach’ 113 (1999) 1 Harvard Law

Review 501.

Levin, Avner and Abril, Patricia Sánchez, ‘Two Notions of Privacy Online’ (2008)

11 Vanderbilt Journal of Entertainment & Technology Law 1001.

Levine, David S, ‘The Social Layer of Freedom of Information Law’ (2012) North Carolina

Law Review 1687.

Lewis, K, Kaufman, J and Christakis, N, ‘The Taste for Privacy: An Analysis of College

Student Privacy Settings in an Online Social Network’ (2008) 14 Journal of

Computer-Mediated Communication 79.

247

Lewis, Kevin, Kaufman, Jason, Gonzalez, Marco, Wimmer, Andreas and Christakis, Nicolas,

‘Tastes Ties, and Time: A New Social Network Dataset Using Facebook.com’ (2008)

30 Social Networks 330.

Lindsay, D, ‘Protection of Compilations and Databases After ICETV: Authorship, Originality

and the Transformation of Australian Copyright Law’ (2012) 38(1) Monash Law

Review 17.

Lindsay JK, ‘Council and Court: The Handbill Ordinances 1889–1939’ (1941) 39 Michigan

Law Review 561.

Lindsay, D, ‘An Exploration of the Conceptual Basis of Privacy and the Implications for the

Future of Australian Privacy Law’ ( 2005) 29 Melbourne University Law Review 131.

Litman, Jessica, ‘Information Privacy/Information Property’ (2000) 52 Stanford Law Review

1283.

Litman, Jessica, ‘Reforming Information Law in Copyright’s Image’ (1997) 22(3) University

Dayton Law Review 588.

Liu, Y, Gummadi, KP and Khrishamurthy, B, ‘Analyzing Facebook Privacy Settings: User

Expectations vs Reality’, in Proceedings of the 2011 ACM SIGCOMM Internet

Measurement Conference (ACM, 2011).

Livingston, Jared S, ‘Invasion Contracts: The Privacy Implications of Terms of Use

Agreements in the Online Social Media Setting’ (2011) 21(3) Albany Law Journal of

Science and Technology 591.

Locke, John, Second Treatise of Government, (C.B.Macpherson ed., Hackett Publishing Go

1980).

Locke, John, John Locke, Two Treatises, Book II.

Lopez-Portas, B, ‘The Right to be Forgotten in the EU: The Importance of its Juridicial

Regulation to Guarantee Personal Rights in Public Places’, in WCCL – Workshop 8:

248

The Citizen and the State in the Digital Age,

https://www.jus.uio.no/english/research/news-and-

events/events/conferences/2014/wccl-cmdc/wccl/papers/ws8/w8-lopez-portas.pdf.

Ludgwig, FJ, ‘Peace of Mind in 48 Pieces v Uniform Right of Privacy’ (1948) 32 Minnesota

Law Review 734.

Ludlow, Christa, ‘“The Gentlest of Predations”: Photography and Privacy Law’ (2006)

10 Law Text Culture 135.

Lum, Aimee Jodoi, ‘Don’t Smile, Your Image Has Just Been Recorded on a Camera-Phone:

The Need for Privacy in the Public Sphere’ (2005) 27 University of Hawai’i Law

Review 377.

Luo, W, Xie, Q and Hengartner, U, ‘Face Cloak: An Architecture for User Privacy on Social

Networking Sites’, in Proceedings IEEE CSE'09, 12th IEEE International Conference

on Computational Science and Engineering (2009).

Lussier, Jake T, Raeder, Troy and Chawla, Nitesh V, ‘Digging Up the Dirt on User Generated

Content Consumption’, in International Conference on Management of Data COMAD

2010 (2010).

MacEwan N, ‘The Computer Misuse Act 1990: Lessons From Its Past And Predictions for Its

Future’ (2008) 12 Criminal Law Review 955.

Madow, Michael , ‘Private Ownership of the Public Image: Popular Culture and Publicity Rights’ (1993) 81(1) California Law Review 125. Magtelli, Cara, ‘Facebook is Not Your Friend: Protecting a Private Employee’s Expectation

of Privacy on Social Networking Content in the Twenty-First Century Workplace’

(2012) 6 The Journal of Business, Entrepreneurship & the Law 103.

Manterelo, Alessandro, ‘The EU Proposal for A General Data Protection Regulation and the

Roots of the “Right to Be Forgotten” (2013) 29 Computer Law and Security Review 229.

249

Markou, Christiana, ‘The Right to Be Forgotten: Ten Reasons Why it Should be Forgotten’,

in S Gutwirth, R Leenes and P de Hert (eds), Reforming European Data Protection

Law (Springer, 2014).

Marks, Benjamin Ely, ‘Copyright Protection, Privacy Rights and the Fair Use Doctrine the Post-

Salinger Decade Reconsidered’ (1997) 72 New York University Law Review 1376.

Marks, Kevin S, ‘An Assessment of the Copyright Model in Right of Publicity Cases’ (1982)

70(3) California Law Review 786.

Marshall, Jill ‘Personal Freedom Through Human Rights Law? Autonomy, Identity and

Integrity under the European Convention of Human Rights’ (Brill, 2008).

Marsoof, Althaf, ‘Online Social Networking and the Right to Privacy and Expression’ (2011)

19(2) International Journal of Law and Information Technology 110.

Marwick, Alice and boyd, danah, ‘To See and Be Seen: Celebrity Practice on Twitter’ (2011)

17(2) Convergence: The International Journal of Research into New Media

Technologies 139.

Masnick, Mike, ‘Could Taking a Selfie in a Museum Violate Copyright Law?’, Techdirt

(22 September 2014),

http://www.techdirt.com/articles/20140825/07343128313/could-taking-selfie-

museum-violate-copyright-law.

Mason AD, ‘Autonomy, Liberalism and State Neutrality’ (1990) 40(161) The Philosophical

Quarterly 433.

Matwayshyn, AM, ‘Of Nodes and Power Laws: A Network Theory Approach to Internet

Jurisdiction Through Data Privacy’ (2004) 98 North Western University Law Review 493.

Mayer-Schonberger, Victor, Delete: The Virtue of Forgetting in the Digital Ages (Princeton

University Press, 2009).

250

Mayer-Schonberger, V, ‘Beyond Privacy, Beyond Rights: Towards a “Systems” Theory of

Information Governance’ (2010) 98(6) California Law Review 1853.

McCarthy, Caroline, ‘Class Action Suit Means Facebook’s Beacon Just Won’t Go Away’,

CNET News (14 August 2008).

McCarthy, J Thomas, The Rights of Publicity and Privacy (Clark Boardman Callahan, 1995).

McCarthy, J Thomas, ‘The Spring 1995 Horace S Manges Lecture: The Human Persona as

Commercial Property: The Right of Publicity’ (1995) 19(129) Columbia-VLA Journal

of Law and the Arts 129.

McClurg, Andrew J, ‘Bringing Privacy Law Out of the Closet: A Tort Theory of Liability for

Intrusions in Public Places’ (1994–95) 73 North Carolina Law Review 990.

McClurg, Andrew J, ‘Kiss and Tell: Protecting Intimate Relationship Privacy Through Implied

Contracts of Confidentiality’ (2006) 74 University of Cincinnati Law Review 887.

McColl, Hon. Justice Ruth, ‘An Australian Perspective on Privacy Law Developments’, paper

presented to Media Law Resource Centre Conference (2009).

McCorkindale, Tina, ‘Can you See the Writing on My Wall? A Content Analysis of the

Fortune 50’s Facebook Social Networking Sites’ (2010) 4(3) Public Relations

Journal, http://www/prsa.org/Intelligence/PRJournal/Documents/content_analysis.

McCown, F and Nelson ML, ‘What Happens When Facebook is Gone?’ in Proceedings of the

9th ACM/IEEE-CS Joint Conference on Digital Libraries (2009).

McCullagh, D, ‘Police Want Backdoor to Web Users’ Private Data’, CNET News: Politics

and Law (3 February 2010), https://www.cnet.com/au/news/police-want-backdoor-to-

web-users-private-data.

McCullagh, Karen, ‘Protecting “Privacy” Through Control of “Personal” Data Collection:

A Flawed Approach’ (2009) 23(1–2) International Review of Law, Computers and

Technology 13.

251

McDonald, Barbara, ‘Privacy, Princesses and Paparazzi’ (2006) 50 New York Law School

Law Review 205.

McGoldbrick, Dominic, ‘Developments in the Right to be Forgotten’ (2013) 13(4) Human

Rights Law Review 761.

McKenna, Mark P, ‘The Right of Publicity and Autonomous Self-definition’ (2005)

67 University of Pittsburgh Law Review 225.

McKeough, Jill, ‘Horses and the Law: The Enduring Legacy of Victoria Park Racing’, in

Andrew T Kenyon, Megan Richardson and Sam Ricketson (eds), Landmarks in

Australian Intellectual Property Law (Cambridge University Press, 2009), 53–72.

McLean, Anne E, ‘ME.COM: The Growing Need for the Illinois Right of Publicity Act to

Respond to Online Social Networks’ (2012) Stanford Technology Law Review 1.

Mclean, Daniel, Schubert, Karsten and Stokes, Simon, ‘Graves’ Case and Copyright in

Photographs: Bridgeman v Corel (US)’, in Daniel McClean and Karsten Schubert

(eds), Dear Images: Art, Copyright and Culture (Ridinghouse, 2002).

McLean, Deckle, ‘Plain View: A Concept Useful to the Public Disclosure and Intrusion

Privacy Invasion Torts (1999) 21 Communications and the Law 9.

McNamara, Kim, ‘The Paparazzi Industry and New Media: The Evolving Production and

Consumption of Celebrity News and Gossip Websites’ (2011) 14(5) International

Journal of Cultural Studies 515.

McNealy, Jasmine E. ‘The Emerging Conflict between Newsworthiness and the Right to be

Forgotten’ (2012) 39(2) Northern Kentucky Law Review 119.

McRobert, A, ‘Breath of Confidence: Revisiting the Protection of Surreptitiously Obtained

Information’ (2002) 13 Australian Intellectual Property Journal 69.

Ambrose, Meg Letta, ‘It’s About Time: Privacy, Information, Life Cycles and the Right to be

Forgotten’ (2013) 16(2) Stanford Technology Law Review 369.

252

Mensel, Robert E, ‘Kodakers Lying in Wait: Amateur Photography and the Right to Privacy

in New York 1885–1915’ (1991) 43(1) American Quarterly 24.

Messinger, Paul R, Stroulia, Eleni and Lyons, Kelly, ‘Virtual Worlds Research: Past, Present

and Future’ (2009) 47(1) Journal of Virtual Worlds Research 204.

Milberg, Sandra J, Burke, Sandra J, Smith, Jeff and Kallman, Ernest A, ‘Values, Personal

Information, Privacy, and Regulatory Approaches’ (1995) 38(12) Communications of

the ACM 65.

Miller, Arthur R, ‘Personal Privacy in the Computer Age: The Challenge of a New Technology in

an Information-Oriented Society’ (1969) 67(6) Michigan Law Review 1089.

Miller, Miranda, ‘Facebook Settles Privacy Lawsuit, Buys Facial Recognition Company’, Face.com (21 February 2013), http://searchenginewatch.com/article/2185236/Facebook-Settles-Privacy-Lawsuit-Buys- Facial-Recognition-Company-Face.com.

Millier, SL, ‘The Facebook Frontier: Responding to the Changing Face of Privacy on the

Internet’ (2009) 97 Kentucky Law Journal 541.

Mitchell, JC, ‘Social Networks’ (1974) 3 Annual Review of Anthropology 279.

Mitrou, Lilian and Karyda, Maria, ‘EU’s Data Protection Reform and the Right to be

Forgotten: A Legal Response to a Technological Challenge?’, paper presented to

5th International Conference of Information Law and Ethics, Corfu, 29–30 June 2012,

http://ssrn.com/abstract=2165245.

Mnookin, JL, ‘The Image of Truth: Photography Evidence and the Power of Analogy’ (1998)

10(1) Yale of Journal of Law and the Humanities 1.

Moffatt, Alex, ‘The Copyright Bill’ (1898) 10 The Judicial Review 161.

Moreham, NA, ‘Beyond Information: Physical Privacy in English Law’ (2014)

73(2) Cambridge Law Journal 350.

253

Moreham, NA, ‘Privacy in Public Places’ (2006) 65(3) The Cambridge Law Journal 606.

Morgan, O, ‘Copyright, the Public Interest and Content Restrictions’ (2003) 8 Media and Arts

Law Review 213.

Morgan, Jonathan, ‘Privacy Confidence, and Horizontal Effect: “Hello” Trouble’ (2003)

62(2) Cambridge Law Journal 444.

Morganstern, Amy, ‘In the Spotlight: Social Network Advertising and the Right of Publicity’

(2008) 12 Intellectual Property Law Bulletin 181.

Moskalenko, K, ‘The Right of publicity in the USA, the EU and Ukraine (2015)

1(2) International Comparative Jurisprudence 113.

Mundie, C, ‘Focus on Data Use, Not Data Collection’ (2014) 93 Foreign Affairs 28.

Murata, K and Orito, Y, ‘The Right to Forget/ Be Forgotten’, in Proceedings of CEPE 2011

(2011).

Murphy, Richard S, ‘Property Rights in Personal Information: An Economic Defence of

Privacy’(1996) 84 Georgetown Law Journal, 2381.

Murray MD, ‘DIOS MIO: The Kiss Principle of the Ethical Approach to Copyright and Right

of Publicity Law’ (2013) 14(1) Minnesota Journal of Science and Technology 89.

Nakashima, Ellen, ‘Feeling Betrayed: Facebook Users Force Site to Honor Their Privacy’,

Washington Post (30 November 2007).

Nazir, A, Raza, S and Chuah, CN, ‘Unveiling Facebook: A Measurement Study of Social

Network Based Applications’, in Proceedings of the 8th ACM SIGCOMM Conference

on Internet Measurement (2008).

Nedelsky, J, ‘Reconceiving Autonomy: Sources, Thoughts and Possibilities’ (1999) 1 Yale

Journal Law & Feminism 7.

254

Neichbaum, JA, ‘Towards an Autonomy-Based Theory of Constitutional Privacy: Beyond the

Ideology of Familial Privacy’ (1979) 14 Harvard Civil Rights Civil Liberties Law

Review 361.

Nelson, Sharon, Simek, John and Foltin, Jason, ‘The Legal Implications of Social

Networking’ (2009) 22 (1) Regent University Law Review 1.

Nemet-Nejat, Daniel, ‘Hey, That’s My Persona! Exploring the Right of Publicity for Blogs

and Online Social Networks’ (2010) 33(1) Columbia Journal of Law and the Arts 113.

Newell, BC, ‘Rethinking Reasonable Expectations of Privacy in Online Social Networks’

(2011) 17(4) Richmond Journal Law and Technology Law 1.

Newkirk, CD and Forker, TA, ‘Well, That Didn’t Take Long! Viacom Battles Google and

YouTube’ (2007) Privacy & Data Security Law Journal 523.

Newman, MEJ, ‘The Structure and Function of Networks’ (2002) 147(1–2) Computer Physics

Communications 40.

Newman, Judge Jon O, ‘Copyright Law and the Protection of Privacy’ (1987–88)

12 Columbia–VLA Journal of Law & the Arts 459.

Newman, Mark EJ and Park, Juyong, ‘Why Social Networks are Different from Other Types

of Networks’ (2003) 68 Physical Review 0636122.

Nichols Matthews, J, Nettleford, LA, Priluck NM, Simmons JL and Sites, B, ‘Social Media in

the Digital Millennium’ (2013) 5(5) Landslide 26.

Nimmer, Melville B, ‘The Right of Publicity, Law and Contemporary Problems’ (1954)

19(2) Literary and Artistic Products and Copyright Problems 203.

Nissenbaum, Helen, ‘Protecting Privacy in an Information Age: The Problem of Privacy in

Public’ (1998) 17 Law and Philosophy 559.

Nissenbaum, Helen, ‘Toward an Approach to Privacy in Public: Challenges of Information

Technology’ (1997) 7(3) Ethics & Behavior 207.

255

Nizer, Louis, ‘The Right of Privacy: A Half Century’s Developments’ (1940–41)

39 Michigan Law Review 526.

Nordhaus, Jamie E, ‘Celebrities’ Rights to Privacy: How Far should the Paparazzi be Allowed

to Go?’ (1999) 18(2) The Review of Litigation 286.

Witzleb, Norman, ‘Justifying Gain Based Remedies for Invasions of Privacy’ (2009)

(29)2 Oxford Journal of Legal Studies 325.

Nosko, A, Wood, E, Zivcakova, L, Molema, S, De Pasquale, D and Archer K, ‘Disclosure

and Use of Privacy Settings in Facebook Profiles: Evaluating the Impact of Media

Context and Gender’ (2013) 2 Social Networking 1.

Nosko, Amanda, Wood, Eileen and Molema, Seija, ‘All About Me: Disclosure in Online

Social Networking Profiles: The Case of Facebook’ (2010) 26(3) Computers in

Human Behavior 406.

Nys, H, ‘Towards a Human Right to be Forgotten Online?’ (2011) 18 European Journal of

Health Law 469.

O’Hara, K, Shadbolt, N and Hall, W, A Pragmatic Approach to the Right to be Forgotten,

(Global Commission on Internet Governance, 2016),

https://www.cigionline.org/publications/pragmatic-approach-right-be-forgotten.

O’Malley, James and Marsden, Peter V, ‘The Analysis of Social Networks’ (2008) 8 Health

Services Outcomes Research Methods 222.

Ohm, Paul, ‘Broken Promises of Privacy: Responding to the Surprising Failure of

Anonymization’ (2010) 57 UCLA Law Review 17101.

Ok-Ran, Jeong, Kim, Won and Lee, Sang-Won, ‘On Social Websites’ (2010) 35 Information

Systems 215.

Opderbeck, David W, ‘Beyond Bits, Memes and Utility Machines: A Theology of Intellectual

Property as Social Relations’ (2013) 10 University of Saint Thomas Law Journal 738.

256

Opsahl, Kurt, ‘Facebook’s Eroding Privacy Policy: A Timeline’ (2010),

http://www.eff.org/deeplinks/2010/04/facebook-timeline.

Orlowski, Andrew, ‘UK Gov Passes Instagram Act: All Your Pics Belong to Everyone Now’,

The Register (29 April 2013),

http://www.theregister.co.uk/2013/04/29/err_act_landgrab.

Ovadia, S, ‘An Early Introduction to the Google+ Social Networking Project’ (2011)

30 Behavioural and Social Sciences Librarian 259.

Own, Bowcott, ‘Britain Seeks Opt Out of new European Social Media Privacy Law’, The

Guardian (4 April 2013),

http://www.theguardian.com/technology/2013/april/04/britain-opt-out-right-to-be-

forgotten-law/print.

Papacharissi, Z, ‘The Virtual Geographies of Social Networks: A Comparative Analysis of

Facebook, LinkedIn and AsmallWorld’ (2009) 11(1&2) New Media Society 199.

Paramjit, S Gill and Swartz, Tim B, ‘Bayesian Analysis of Directed Graphs Data with

Applications to Social Networks’ (2004) 53(2) Journal of the Royal Statistical Society

Series C (Applied Statistics) 249.

Parent, WA, ‘Privacy, Morality and the Law’ (1983) 12(4) Philosophy and Public Affairs 269.

Parent, WA, ‘A New Definition of Privacy for the Law’ (1983) 2 Law and Philosophy 305.

Paterson, Moira, ‘Privacy Protection in Australian: The Need for an Effective Private Sector

Regime’ (1998) 26 Federal Law Review 371.

Pearce, Robert, ‘Privacy Superinjunctions and Anonymity: “Selling My Story will Sort My

Life Out”’ (2011) 23 The Denning Law Journal 93.

Pember, DR and Teeter, DL Jr, ‘Privacy and the Press Since Time Inc v Hill’ (1974)

50 Washington Law Review 57.

257

Perez, Juan Carlos, ‘Facebook’s Beacon More Intrusive Than Previously Thought’, IDG

News (30 November 2007).

Pesce, Joao Paulo, Rauber, Gustano, Las Casas, Diego and Almeida, Virgilio, ‘Privacy

Attacks in Social Media Using Photo Tagging Networks: A Case Study with

Facebook’, in Proceedings of the 1st Workshop on Privacy and Security in Online

Media (2012), Article No. 4.

Peschke, Lutz, ‘The Web Never Forgets! Aspects of the Right to be Forgotten’ (2014)

19(1) Gazi University Law Review 117.

Petrashek, Nathan, ‘The Fourth Amendment and the Brave New World of Online Social

Networking’ (2010) 93 Marquette Law Review 1495.

Philipson, Gavin, ‘Transforming Breach of Confidence? Towards a Common Law Right of

Privacy Under the Human Rights Act’ (2003) The Modern Law Review 726.

Phillipson, Gavin and Fenwick, Helen, ‘Breach of Confidence as a Privacy Remedy in the

Human Rights Act Era’ (2000) 63 Modern Law Review 660.

Picard, E. ‘The Right to Privacy in French Law’, in M Colvin (ed.), Protecting Privacy

(Oxford University Press, 1999).

Pilgrim, T, ‘Navigating Privacy in the Information Age’, in N Witzleb, D Lindsay,

M Paterson and S Rodrick (eds), Emerging Challenge in Privacy Law (Cambridge

University Press, 2014).

Pinto, Timothy, ‘Who Controls the Naomi Campbell Information Flow? A Practical Analysis

of the Law of Privacy’ (2014) Journal of Intellectual Property Law & Practice 354.

Pizer, Jason, ‘The Public Interest: Exception to the Breach of Confidence Action: Are the

Lights About to Change?’ (1994) 20(68) Monash University Law Review 67.

258

Pletcher, Christa, ‘Are Publicity Rights Gone in a Flash? Flickr, Creative Commons, and the

Commercial Use of Personal Photographs’ (2009) 8(1) Florida State University

Business Review 129.

Ploderer, B, Howard, S and Thomas, P, ‘Being Online, Living Offline: The Influence of

Social Ties over the Appropriation of Social Network Sites’, in Proceedings of the

2008 ACM Conference on Computer Supported Cooperative Work (2008).

Pontes, T, Magno, G, Vasconcelos, M and Gupta, A, ‘Beware of What You Share: Inferring

Home Location on Social Networks’, in Proceedings of the 2012 IEEE 12th

International Conference on Data Mining Workshops (2012).

Porter, Mason A, Onnela, Jukka-Pekka and Mucha, Peter J, ‘Communities in Networks’,

(2009) 56(9) Notices of the AMS 1082.

Posner, Eric, ‘We All Have the Right to be Forgotten’, Slate (May 2014),

http://www.slate.com/articles/news_and_politics/view_from_chicago/2014/05/the_eur

opean_right_to_be_forgotten_is_just_what_the_internet_needs.html.

Posner, RA, ‘The Uncertain Protection of Privacy by the Supreme Court’ [1979] The Supreme

Court Review 173.

Posner, RA, ‘The Problematics of Moral and Legal Theory’ (1998) 7 Harvard Law Review

1637, http://www.jstor.org/stable/1342477.

Post, RC, ‘The Social Foundations of Privacy: Community and Self in the Common Law

Tort’ (1989) 77 California Law Review 958.

Powell, Davis C, ‘You Already Have Zero Privacy – Get Over It! Would Warren and

Brandeis Argue for Privacy for Social Networking?’ (2011) 31 Pace Law Review 146.

Powles, J, ‘The Case that Won’t be Forgotten’ (2015) 47 Loyola University Chicago Law

Journal 583.

259

Price, David, Bodkin, Colin, Arnold, Bruce and Adjei, Patricia, Intellectual Property

Commentary and Materials, 5th ed. (Law Book Co, 2012).

Prosser, William, American Law Institute, Restatement of the Law Second, Torts (1977),

§ 652A.

Prosser, William L, ‘Privacy’ (1960) 48 California Law Review 383.

Pujol, Josep M, ‘Divide and Conquer: Partitioning Online Social Networks’ (29 May 2009),

https://pdfs.semanticscholar.org/6439/0af7c7c8ba14aab97e957946a41b25053015.pdf.

Purcell, Rachel A, ‘Is That Really Me? Social Networking and the Right of Publicity’ (2010)

12(3) Vanderbilt of Journal of Entertainment and Technology Law 611.

Raab, Charles D, ‘The Distribution of Privacy Risks: Who Needs Protection?’ (1998)

14(4) The Information Society 263.

Raacke, J and Bonds-Raacke, J, ‘MySpace and Facebook: Applying the Uses and

Gratifications Theory to Exploring Friend-Networking Sites’ (2008) 11 Cyber

Psychology & Behavior 169.

Ramasastry, A, ‘A Fourteen-Year-Old Girl’s Suit Against MySpace’ (2006) FindLaw (26

June 2006), http://writ.news.findlaw.com/ramasastry/20060626.html.

Raphael, JR, ‘Facebook Facial Recognition: New Technology, Familiar Problem’, PCWorld

(9 June 2011),

http://www.pcworld.com/article/229967/facebook_facial_recognition_new_technolog

y_familiar_problem.html.

Ravanas, J, La protectiondes personnescontrela realisationet la publicationde leur image

(Paris, 1978), (as translated in Canadian Supreme Court Reports).

Rawls, J, ‘Kantian Constructivism in Moral Theory’ (1980) 77(9) Journal of Philosophy 515.

Ray SJ, ‘Copyright Law: The Protection of Photograph Copyright Owners Under the

Copyright Act’ (1995) 68 Temple Law Review 491.

260

Wacks, Raymond, ‘Confronting Dogma: Privacy Free Speech and the Internet’ (2000)

27 Media Asia 199, http://www.cfp2000.org/papers/wacks.pdf.

Raynes-Goldie, Kate, ‘Aliases, Creeping, and Wall Cleaning: Understanding Privacy in the

Age of Facebook’ (2010) 15(1) First Monday 4.

Reding, V, ‘Privacy Matters: Why the EU Needs New Personal Data Protection Rules’,

European Data Protection and Privacy Conference (2010), Speech 10/700.

Reding, V, ‘The Upcoming Data Protection Reform for the European Union’ (2011)

1 International Data Privacy Law 3.

Redmond, Sean and Holmes, Su, Stardom and Celebrity: A Reader (Sage, 2007).

Reidenberg, Joel R and Gamet-Pol, Francoise, ‘The Fundamental Role of Privacy and

Confidence in the Network’ (1995) 30(105) Wake Forest Law Review 105.

Reiman, Jeffrey, ‘Privacy, Intimacy, and Personhood’ (1976) 6(1) Philosophy and Public

Affairs 26.

[No author] ‘Republication of Photograph from Newsworthy Magazine Article to Advertise

Content and Quality of Magazine Held No Invasion of Privacy’ (1962) 62(7)

Columbia Law Review 1355.

Richards, D, ‘Posting Personal Information on the Internet: A Case for Changing the Legal

Regime Created by s 230 of the Communications Decency Act’ (2007) 85 Texas Law

Review 1321.

Richards, David A, A Theory of Reasons for Action (Oxford, Clarendon Press, 1971) .

Richards, DAT, ‘Rights and Autonomy’ (1981) 92(1) Ethics 3,

http://www.jstor.org/stable/2380700.

Richards Neil M, ‘The Information Privacy Law Project’ (2006) 94 Georgetown Law Journal

1087.

261

Richards, Neil M and Solove, Daniel J, ‘Privacy’s Other Path: Recovering the Law of

Confidentiality’ (2007) 96 Georgetown Law Journal 123.

Richards, Neil M and Solove, Daniel J, ‘Prosser’s Privacy Law: A Mixed Legacy’ (2010)

98(6) California Law Review 1887.

Richardson, Megan, ‘Breach of Confidence, Surreptitiously or Accidently Obtained

Information and Privacy: Theory Versus Law’ (1993) 19 Melbourne Law Review 673.

Richardson, Megan, ‘Whither Breach of Confidence: A Right of Privacy for Australia?’

(2002) 26 Melbourne Law Review 381.

Ricketson, Sam, ‘The Concept of Originality in Anglo-Australian Copyright Law’ (1992)

39 Journal Copyright Society of the USA 265.

Ricketson, Sam, ‘Confidential Information: A New Proprietary Interest?’ (1977–78)

11 Melbourne Law Review 223.

Ricketson, Sam, Richardson, Megan and Davison, Mark, Intellectual Property: Cases,

Materials and Commentary, 4th ed. (LexisNexis, 2009).

Riederer, Christopher, Erramilli, Vijay, Chaintreau, Augustin, Krishnamurthy, Balachander

and Rodriguez, Pablo, ‘For Sale: Your Data: by: you’, in Proceedings of the 10th

ACM Workshop on Hot Topics in Networks (ACM, 2011).

‘The Right to Privacy and the Protection of Public Decency’ (18 July 2012),

http://historyofprivacy.net/home6.htm.

Rimmer, M, ‘A Fair Use Project for Australia: Copyright Law and Creative Freedom’,

Copyright Reporter, https://works.bepress.com/matthew_rimmer/91.

Rolph, D, ‘Dirty Pictures: Defamation, Reputation and Nudity’ (2005) 10(1) Law Text

Culture 101.

262

Rolph, D, ‘Looking Again at Photographs and Privacy: Theoretical Perspectives on Law’s

Treatment of Photographs as Invasions of Privacy’, in Anne Wagner and Richard K

Sherwin (eds), Law, Culture and Visual Studies (Springer, 2014).

Rosati, Eleonora, ‘Copyright-Related Question Right from the Oscars Night: Who Owns Degeneres’s Selfie?’ The IPKat (March 2014), http://ipkitten.blogspot.com.au/2014/03/copyright-related-question-right-from.html. Rosati, Eleonora, ‘The Orphan Works Provisions of the ERR Act: Are They Compatible with

UK and EU Laws?’ (2013) 35(12) European Intellectual Property Review 724.

Rosen, C, ‘Virtual Friendship and the New Narcissism’ (2007) The New Atlantis: A Journal

of Technology and Society, http://www.thenewatlantis.com/publications/virtual-

friendship-and-the-new-narcissism.

Rosen, Jeffrey The Unwanted Gaze: The Destruction of Privacy in America (Random House Inc, New York, 2000).

Rosen, Jeffrey, ‘The Deciders: The Future of Privacy and Free Speech in the Age of

Facebook and Google’ (2012) 80 Fordham Law Review 1525.

Rosen, Jeffrey, ‘Free Speech, Privacy and the Web That Never Forgets’ (2011) 9 Journal on

Telecommunication and High Technology Law 345.

Rosen, Jeffrey, ‘The Right to be Forgotten’ (2012) 64 Stanford Law Review 88.

Rosenblum, David, ‘What Anyone Can Know: The Privacy Risks of Social Networking Sites’

(2007) 5(3) IEEE Security & Privacy 40.

Rothnie, W, ‘Moral Rights: Consents and Waivers’ (2002) 20 Copyright Reporter 145.

Roy, A, ‘Recent Developments in Law Reform and Indigenous Cultural and Intellectual

Property in Australia’ [2009] 31(1) European Intellectual Property Review 1

Rui Huaxia, ‘Social Media as an Innovation- The Case of Twitter’ (2010),

http://ssrn.com/abstract=1564205.

263

Rustad, ML and Kulevska S, ‘Reconceptualising the Right to be Forgotten to Enable

Transatlantic Data Flow’ (2015) 28(2) Harvard Journal of Law and Technology 349.

Ricketson, Sam, Richardson, Megan and Davison, Mark, Intellectual Property: Cases,

Materials and Commentary, 4th ed. (LexisNexis, 2009).

Samuelson, Pamela, ‘A New Kind of Privacy? Regulating Uses of Personal Data in the

Global Information Economy’ (1999) 87(3) California Law Review 751.

Samuelson, Pamela, ‘Privacy as Intellectual Property’ (2000) 52 Stanford Law Review 1125.

Sanchez, Andres, ‘The Facebook Feeding Frenzy: Resistance-Through-Distance and Resistance-

Through-Persistence in the Societied Network’ (2009) 6(3) Surveillance & Society 275.

Sanchez Abril, Patricia, ‘A (My)Space of One’s Own: On Privacy and Online Social

Networks’ (2007) 6 Northwestern Journal of Technology and Intellectual Property 73.

Sanchez Abril, Patricia et al, ‘Famous for Fifteen Minutes: IP and Internet Social Networking’

(2008) 6(3) Northwestern Journal Technology and Intellectual Property 355.

Sanvenero, Richard, ‘Social Media and Our Misconceptions of the Realities’ (2013)

22(2) Information and Communications Technology Law 89-108

Sartor, G, ‘The Right to be forgotten: Balancing Interests in the flux of time’ (2016) 24

International Journal of Law and Information Technology 72-98

Sarvas, Risto and Frohlich, David M, ‘The Future of Domestic Photograph in From Snapshots

to Social Media - The Changing Picture of Domestic Photography

Savanero, Richard, ‘Social Media and Our Misconceptions of the Realities’ (2013)

22(2) Information & Communications Technology Law 89.

Savirimuthu, Joseph, ‘Open Source, Code and Architecture: It is the Memes Stupid’ (2005)

19(3) International Review of Law Computers 341.

264

Scally, Derek, ‘More than 20,000 Join Privacy Action Against Facebook’, Irish Times (6

August 2014), http://irishtimes.com/business/sectors/technology/more-than-20-

000join-privacy-action-against-facebook-1.1889192.

Scher, D, ‘The Viability of the Copyright Misuse Defense’ (1992) 20(1) Fordham Urban Law

Journal 88.

Scherker, Amanda, ‘Didn’t Read Facebook’s Fine Print? Here’s Exactly What It Says’, The

Huffington Post (21 January 2014),

http://www.huffingtonpost.com.au/entry/facebook-terms-

condition_n_5551965.html?section=australia.

Schrader, GA, ‘Autonomy, Heteronomy and Moral Imperatives’ (1963) 60(3) Journal of

Philosophy 65.

Schreyer, A, ‘An Overview of Legal Protection for fictional characters: Balancing Public and

Private Interests’ (2015) 6(1) Cybaris 2.

Schwabach, A, ‘Reclaiming Copyright from the Outside In: What the Downfall Hitler Meme

Means for Transformative Works, Fair Use and Parody’ (2012) 8(1) Buffalo

Intellectual Property Law Journal 1.

Schwartz, Paul M, ‘The Computer in German and American Constitutional Law: Towards an

American Right of Informational Self-Determination’ (1989) 37(4) American Journal

of Comparative Law 675.

Schwartz, Paul M, ‘Property, Privacy, and Personal Data’ (2003–04) Harvard Law Review 2056.

Schwartz, Paul M and Treanor, William M, ‘The New Privacy’ (2003) 101(6) Michigan Law

Review 2163.

Scott, John, ‘Trend Report Social Network Analysis’ (1998) 22 (1) Sociology 109.

Seipp, David J, ‘English Judicial Recognition of a Right to Privacy’ (1983) 3(3) Oxford

Journal of Legal Studies 325.

265

Semitsu, JP, ‘From Facebook to Mugshot: How the Dearth of Social Networking Privacy

Rights Revolutionised Online Government Surveillance’ (2011) 31(7) Pace Law

Review 291.

Sesek, Kristina M, ‘Twitter or Tweeter? Who Should Be Liable for a Right of Publicity Violation

Under the CDA?’ (2011) 15(1) Marquette Intellectual Property Law Review 236.

Shapiro, Brian and Baker, C, Richard, ‘Information Technology and the Social Construction

of Information Privacy’ (2002) 20(4) Journal of Accounting and Public Policy 295.

Shipley DE, ‘A Dangerous Undertaking Indeed: Juvenile Humour, Raunchy Jokes, Obscene

Materials and Bad Taste in Copyright’ (2010) 98 Kentucky Law Journal 517.

Simon, DA, ‘Culture, Creativity and Copyright’ (2011) 29 Cardozo Arts and Entertainment

law Journal 279.

Sims, Andrew B, ‘Right of Publicity: Survivability Reconsidered’ (1981) 49(4) Fordham Law

Review 453.

Singh, Rabinder, ‘Privacy and the Media after the Human Rights Act’ [1998] European

Human Rights Law Review 712.

Sinrod, E, ‘MySpace Defeats Spammer’, FindLaw (2007),

http://technology.findlaw.com/networking-and-storage/myspace-defeats-

spammer.html.

Siprut, Joseph, ‘The Naked Newscaster, Girls Gone Wild and Paris Hilton: Tue Tales of the

Right of Privacy and the First Amendment’ (2005) 16(1) Fordham Intellectual

Property, Media and Entertainment Law Journal 35.

Siry, l, ‘Forget Me, Forget Me Not: Reconciling Two Different Paradigms of the Right to be

Forgotten’ (2015) 103(3) Kentucky Law Journal 311.

266

Slaninova, K, Martinovic, J, Drazdilova, P, Obadi, G and Snasel, V, ‘Analysis of Social

Networks Extracted from Log Files’, in B Furht (ed.), Handbook of Social Network

Technologies and Applications (Springer, 2010).

Slattery, R and Krawitz, M, ‘Mark Zuckerburg, The Cookie Monster: Australian Privacy Law

and Internet Cookies’ (2014) 16 Flinders Law Journal 1.

Smet, Stijn, ‘Freedom of Expression and the Right to Reputation: Human Rights in Conflict’

(2010) 26(1) American University International Law Review 183.

Smith Ekstrand, V and Silver, D, ‘Remixing, Reposting and Reblogging: Digital Media,

Theories of the Image and Copyright Law’ ( 2014) 21(2) Visual Communication

Quarterly 96.

Smith, KM, ‘Copyright in the Mobile Media Era’ (2013) 13 Journal of Technology Law and

Policy 1.

Smith TA, ‘The Web of Law’ (2007) 44 University of San Diego Law Review 309.

Smolensky, Kirsten Rabe, ‘Rights of the Dead’ (2009) 37 Hofstra Law Review 763.

Solove, Daniel J, ‘A Brief History of Information Privacy Law’, in Daniel J Solove, Marc

Rotenberg and Paul M. Schwartz (eds), Information Privacy Law (Aspen, 2006).

Solove, Daniel J, ‘Conceptualizing Privacy’ (2002) 90 California Law Review 1087.

Solove, Daniel J, The Digital Person: Technology and Privacy in the Information Age (New

York University Press, 2004).

Solove, Daniel J, ‘A Taxonomy of Privacy’ (2006) 154(3) University of Pennsylvania Law

Review 477.

Solove, Daniel J. ‘The Virtues of Knowing Less: Justifying Privacy Protections against

Disclosure’ (2003) 53(3) Duke Law Journal 967.

Sontag, Susan, On Photography (Penguin, 1977).

267

Spahn, Kenneth E, ‘The Right of Publicity: A Matter of Privacy, Property or Public Domain?’

(1995) 19 Nova Law Review 1013.

Squiccianrini, Anna C, Shehab, Mohamed and Wede, Joshua, ‘Privacy Policies for Shared

Content on Social Network Sites’ (2010) (19)(6) The International Journal on Very

Large Data Bases 777.

Staddon, J, Huffaker, D and Brown, L, ‘Are Privacy Concerns a Turn-off? Engagement and

Privacy on Social Networks’, in Proceedings of the Eighth Symposium on Usable

Privacy and Security (SOUPS) (2012), Article 10.

Stallard, H, ‘The Right of Publicity in the United Kingdom’ (1998) 18 Loyola of Los Angeles

Entertainment Law Review 565.

Stephen R Barnett, ‘The Right to One’s Own Image: Publicity and Privacy Rights in the United

States and Spain’ (1999) 47(4) The American Journal of Comparative Law 555.

Stern, Lesa A and Taylor, Kim, ‘Social networking on Facebook’ (2007) 20 Journal of the

Communication, Speech & Theatre Association of North Dakota 9.

Stewart, David, ‘Protecting Privacy, Property, and Possums: Australian Broadcasting

Corporation v Lenah Game Meats Pty Ltd’ (2002) 30 Federal Law Review 177.

Stewart, Daxton R, ‘Can I Use This Photo I Found on Facebook? Applying Copyright Law

and Fair Use Analysis to Photographs on Social Networking Sites Republished for

News Reporting Purposes’ (2012) 10 Journal on Telecommunications and High

Technology Law 93.

Stijn Smet, ‘Freedom of Expression and the Right to Reputation: Human Rights in Conflict’

(2010) 26(1) American University International Law Review 183.

Stoianoff, N, and Roy, A, 'Indigenous Knowledge and Culture in Australia: The Case for Suis

Generis Legislation’ [2015] 41(3) Monash University Law Review, 745.

268

Stoothoff, RH, ‘The Autonomy of Philosophy’ (1966) 16(62) The Philosophical Quarterly 1,

http://www.jstor.org/stable/2217877.

Storella, Alison C, ‘It’s Selfie-Evident: Spectrums of Alienability and Copyright Content on

Social Media’ (2014) 94 Boston University Law Review 2045.

Strachan, Lindsey A, ‘Re-Mapping Privacy Law: How the Google Maps Scandal Requires

Tort Law Reform’ (2011) 17(4) Richmond Journal of Law and Technology 1.

Strahilevitz, Lior J, A Social Networks Theory of Privacy (2004) University of Chicago,

Public Law Working Paper No. 79, http://ssrn.com/abstract=629283.

Strauss, DA, ‘Persuasion, Autonomy and Freedom of Expression’ (1991) 91 Columbia Law

Review 335.

Straub, Detmar W Jr and Webb Collins, Rosann, ‘Key Information Liability Issues Facing

Managers: Software Piracy, Proprietary Databases, and Individual Rights to Privacy’

(1990) MIS Quarterly 143.

Stuckey, Jennifer, ‘The Liability of Innocent Third Parties Implicated in Another’s Breach of

Confidence’ (1981) 4 University of New South Wales Law Journal 73.

Stutzman, F, Gross, R and Acquisti, A, ‘Silent Listeners: The Evolution of Privacy and

Disclosure on Facebook’ (2012) 4(2) Journal of Privacy and Confidentiality 7.

Sumpter, Paul, ‘Breach of Confidence: The Indirect Recipient’ (2008) New Zealand Law

Review 523.

Sunstein, Cass Robert, ‘Legal Interference with Private Preferences’ (1986) 53(4) University

of Chicago Law Review 1129.

Synder, J, Carpenter, D and Slauson, GJ, ‘MySpace.com: A Social Networking Site and

Social Contract Theory’ (2007) 5(2) Information Systems Education Journal 3.

Synodinou, Tatiana ‘Image Right and Copyright Law in Europe: Divergences and Convergences,’ [2014] 3 (2) Laws, 181.

269

Szabo, CM, ‘Thwack!! Take That, User-Generated Content! Marvel Enterprises Inc. v NCSoft

Corp (2010) 62(3) Federal Communication Law Journal 541.

Tan, David, ‘Affective Transfer and the Appropriation of Commercial Value: A Cultural

Analysis of the Right of Publicity’ (2010) 9(2) Virginia Sports and Entertainment Law

Journal 272.

Tan, Domingo R, ‘Personal Privacy in the Information Age: Comparison of Internet Data

Protection Regulations in the United Stats and European Union’ (1999) 21 Loyola of

Los Angeles International and Comparative Law Review 661.

Taylor, Greg, ‘Why is There No Common Law Right to Privacy?’ (2000) 26 Monash

University Law Review 237.

Taylor, Greg and Wright, David, ‘Australian Broadcasting Corporation v Lenah Game

Meats: Privacy, Injunctions and Possums – an Analysis of the High Court’s Decision’

(2002) 26 Melbourne University Law Review 707.

Tene, Omer and Polonetsky, Jules, ‘Privacy in the Age of Big Data: A Time for Big

Decisions’ 64 Stanford Law Review Online 63.

Terenzi Jr, Robert, ‘Friending Privacy: Toward Self-Regulation of Second Generation Social

Networks’ (2010) 20 Fordham Intellectual Property Media and Entertainment Law

Journal 1049.

Thompson, Robert T III, ‘Image as Personal Property: How Privacy Law Has Influenced The

Right of Publicity’ (2009) 16(1) University California Los Angeles Entertainment Law

Review 155.

Thornton, Leslie-Jean, ‘The Photo is Live at Applifam: An Instagram Community Grapples

with How Images Should Be Used’ (2014) 21(2) Visual Communication Quarterly 72.

270

Toobin, J, ‘The Solace of Oblivion’ (2014) The New Yorker (29 September 2014),

http://www.newyorker.com/magazine/2014/09/29/solace-oblivion.

Townsend Gard, Elizabeth and Whetstone, Bri, ‘Copyright and Social Media: A Preliminary

Case Study of Pinterest’ (2013) 31 Mississippi College Law Review 249.

Trebbe, SE, ‘Enhancing Copyright Protection for Amateur Photographers: A Proposed

Business Model’ (2010) 52 Arizona Law Review 96.

Tsaknis, Leo, ‘The Jurisdictional Basis, Elements and Remedies in the Action for Breach of

Confidence: Uncertainty Abounds’ (1993) 5(1) Article 2 Bond Law Review 18.

Tucker, Greg, ‘Frontiers of Information Privacy in Australia’ (1992) Journal of Law and

Information Science 63.

Tufecki, Zeynep, ‘Can You See Me Now? Audience and Disclosure Regulation in Online

Social Network Site’ (2008) 28(20) Bulletin of Science Technology and Society 20.

Tufekci, Zeynep, ‘Grooming, Gossip, Facebook and MySpace’ (2008) 11(4) Information,

Communication & Society 544.

Tufekci, Zeynep ‘Who Acquires Friends Through Social Media and Why? “Rich Get Richer”

versus “Seek and Ye Shall Find”’, in Proceedings of the 4th International AAAI

Conference on Weblogs and Social Media (AAAI Press, 2010).

Turnbridge, J, ‘Twitter: Who’s Really There?’ (2010) 5(2) Journal of Intellectual Property

Law and Practice 116.

Tushnet, Rebecca, ‘All of This Happened Before and All of This Will Happen Again: Innovation

in Copyright Licensing’ (2014) 29 Berkeley Technology Law Journal 1447.

Tushnet, Rebecca, ‘How Many Wrongs Make a Copyright?’ (2014) 98 Minnesota Law

Review 2346.

Urban JM, ‘How Fair Use Can Help Solve the Orphan Works Problem’ (2012) 27(6) Berkeley

Technology Law Journal 1379.

271

Utz, Clayton, ‘Australia: Sex, Lies and Videotape: Breach of Confidence Claims and Awards

of Damages’, Mondaq (4 January 2009),

http://mondaq.com/australia/x/72136/disclosure+electronic.

Van Alsenoy, Brendan, Verdoodt, Valerie, Heyman, Rob, Ausloos, Jef, Wauters, Ellen and

Acar, Güne, ‘SPION, from Social Media Service to Advertising Network: A Critical

Analysis of Facebook’s Revised Policies and Terms’, Ku Leuven (March 2015),

https://www.law.kuleuven.be/icri/en/news/item/facebooks-revised-policies-and-terms-

v1-2.pdf. van Caenegem, William, ‘Different Approaches to the Protection of Celebrities Against

Unauthorised Use of Their Image in Advertising in Australia, the United States and

the Federal Republic of Germany’, ePublications@bond,

http://epublications.bond.edu.au/law _pubs/213. van Caenegem, William, Intellectual Property, 2nd ed. (LexisNexis Butterworths, 2010).

Van Dijick, J, ‘Users Like You? Theorizing Agency in User-Generated Content’ (2009) 31(1)

Media Culture Society 41.

Van Eecke, P and Truyen, M, ‘Privacy and Social Networks’ (2010) 26 Computer Law and

Security Review 535.

Van Houwelling, MS, ‘Atomism and Automation’ (2012) 27 Berkeley Technology Law

Journal 1472.

Volokh, Eugene, ‘Freedom of Speech and Information Privacy: The Troubling Implications

of a Right to Stop People from Speaking about You’ (2000) 52(5) Stanford Law

Review 1049.

Von Dietze, A and Allgrove, AM, ‘Australian Privacy Reforms: An Overhauled Data

Protection Regime for Australia’ (2014) 4(4) International Data Privacy Law 326.

WAC, ‘The Right of Privacy in News Photographs’ (1958) 44(8) Virginia Law Review 1303.

272

Wacks, Raymond, ‘Breach of Confidence and the Protection of Privacy’ (1977) 127 New Law

Journal 328.

Wacks, Raymond, ‘Freedom to Express What?’ , in R Wacks, Privacy and Media Freedom

(Oxford Scholarship Online, 2013).

Wacks, Raymond, ‘Privacy and Anonymity’ (2000) 3(2) Hong Kong Law Journal 177.

Wacks, Raymond, Privacy and Media Freedom (Oxford Scholarship Online, 2013),

http://oxfordscholarshiponline.com.libraryproxy.griffith.edu.au/view/10.1093/acprof:o

so/9780199668656.001.0001/acprof-9780199668656-chapter-1.

Wacks, Raymond, ‘Privacy Reconceived: Personal Information and Free Speech’, in Eli

Lederman and Ron Shapira (eds), Law, Information and Information Technology

(Kluwer Law International, 2001).

Wacks, Raymond, ‘Private Facts: Is Naomi Campbell a Good Model?’ (2004) 1(3) SCRIPT-

ed 421.

Wacks, Raymond ‘Pursuing Paparazzi: Privacy and Intrusive Photography’ (1998)

28(1) Hong Kong Law Journal 1.

Wagner, Mike and Yun, Li-Reilly, ‘The Right to be Forgotten’ (2014) 72(6) The Advocate 823.

Wagner, WJ, ‘Photography and the Right to Privacy: The French and American Approaches’

(1980) 25 Catholic Lawyer 195.

Wai, K and Bartholomew, W, ‘Paying It Forward: The Case for a Specific Statutory

Limitation on Exclusive Rights for User-generated Content Under Copyright Law’

(2011) 11(2) The John Marshall Review of Intellectual Property 239.

Waldron, J, The Right to Private Property (Oxford, 1988).

Waldman, AE, ‘Privacy as Trust: Sharing Personal Information in a Networked World’

(2015) 69(3) University of Miami Law Review 569.

273

Walker, Robert Kirk, ‘The Right to be Forgotten’ (2012) 64(101) Hastings Law Journal 257.

Wallbridge, R, ‘How Safe is Your Facebook Profile? Privacy Issues of Online Social’,

http://press-files.anu.edu.au/downloads/press/n1677/pdf/11.pdf 85.

Wang, N, Xu, H and Grossklags, J, ‘Third Party Apps on Facebook: Privacy and the Illusion

of Control’, in CHIMIT’11 Proceedings of the 5th ACM Symposium on Computer

Human Interaction for Management of Information Technology (2011), Article 4.

Warren, Samuel and Brandeis, Louis, ‘The Right to Privacy’ (1890) 4 Harvard Law Review 196.

Wassom, Brian D, ‘Uncertainty Squared: The Right of Publicity and Social Media’ (2013)

63 Syracuse Law Review 227.

Weber, Rolph H, ‘The Right to be Forgotten: More than Pandora’s Box?’ (2011) 2 Journal of

Intellectual Property, Information Technology and E-Commerce Law 120.

Webner, W Mack and Lindquist, Leigh Ann, ‘Transformation: The Bright Line Between

Commercial Publicity Rights and the First Amendment’ (2004) 37 Akron Law Review 171.

Wechsler, S, ‘The Right to Remember: The European Convention of Human Rights and the Right

to be Forgotten’ (2016) 49(1) Columbia Journal of Law and Social Problems 135.

Wei, George, ‘Surreptitious Takings of Confidential Information’ (1992) 12(3) Legal Studies 302.

Weisman, AM, ‘Publicity as an Aspect of Privacy and Personal Autonomy’ (1982)

55 Southern California Law Review 727.

Weiss, Marie-Andres, ‘First Amendment Trumps Couple’s Right of Publicity: Copyright

Claim to Proceed’ (2014) Journal of Intellectual Property Law & Practice, doi:

10.1093/jiplp/jpu127.

Wendell Holmes, Oliver, ‘Doings of the Sunbeam’, (1863) 12(69) The Atlantic Monthly

12(69), http://ufdc.ufl.edu/UF00050226/00002.

274

Werro, F ‘The Right to Inform v the Right to be Forgotten: A Transatlantic Clash’ in

A Colombi Ciacchi, C Godt, P Rott and LJ Smith (eds), Haftungsbereich im dritten

Millennium/Liability in the Third Millennium (Nomos, 2009).

West, R, ‘Authority, Autonomy and Choice: The Role of Consent in the Moral and Political

Visions of Franz Kafka, and Richard Posner’ (1985) 99(2) Harvard Law Review 384.

Westerman, Ryan, ‘As Seen on TV: Your Compromising Cameo on National Reality

Programming’ (2013) 12(2) The John Marshall Review of Intellectual Property Law 403.

Williams, Karen D, ‘Disparity in Copyright Protection: Focus on the Finished Image Ignores

the Art in the Details’ (2008) 58(1) American University Law Review 169.

Williams, Lauren C, ‘Android Users Flip Out Over New Facebook Messenger Privacy Rules’,

Think Progress (10 August 2014),

http://thinkprogress.org/culture/2014/08/10/3469599/facebook-messenger-app-privacy.

Wilson, S, ‘The Collision Between Big Data and Privacy Law’ (2014) 2(3) Australian

Journal of Telecommunications and the Digital Economy, http://telsoc.org/ajtde/2014-

10-v2-n3/a54.

Winch, SP, ‘Moral Justifications for Privacy and Intimacy’ (1996) 11(4) Journal of Mass

Media Ethics 197.

Winfield, PH, ‘Privacy’ (1931) 47 Law Quarterly Review 23.

Witzleb, Norman, ‘Monetary Remedies for Breach of Confidence in Privacy Cases’ (2007)

27(3) Legal Studies 430.

Wong, Rebecca, ‘Social Networking: A Conceptual Analysis of a Data Controller’ (2009)

14(5) Communications Law 142.

Wong, Rebecca, ‘Social Networking: Anybody is a Data Controller’ (2008),

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1271668.

275

Wood, R Derek, ‘The Daguerreotype Patent, The British Government and the Royal Society’

(1980) 4(1) History of Photography 53.

Wragg, P, ‘Enhancing Press Freedom Through Greater Privacy Law: A UK Perspective on an

Australian Privacy Tort’ (2014) 36 Sydney Law Review 619.

Wyatt, Anna May and Hahn, Susan E, ‘Copyright Concerns Triggered by Web 2.0 Uses’

(2011) 39(2) Reference Services Review 303.

Xu, H, Smith, HJ, Dinev, T and Hart, P, ‘Examining the Formation of Individuals’ Privacy

Concerns: Toward an Integrative View’, in Proceedings International Conference on

Information Systems (2008).

Young, Alyson L and Quan-Haase, Anabel, ‘Information Revelation and Internet Privacy

Concerns on Social Network Sites: A Case Study of Facebook’, in Proceedings of the

Fourth International Conference on Communities and Technologies (ACM, 2009).

Yurkowski, RA, ‘Is Hyde Park Hiding the Truth? An Analysis of the Public Interest Defence to

Copyright Infringement’ (2001) 32 Victoria University of Wellington Law Review 1053.

Zanfir, G, ‘Tracing the Right to be Forgotten in the Short History of Data Protection Law:

The New Clothes of an Old Right’, in S Gutwirth et al. (eds), Reforming European

Data Protection Law (Springer, 2015).

Zegas, Alan Lee, ‘Personal Letters: A Dilemma for Copyright and Privacy Law’ [1980–81]

Rutgers Law Review 134.

Zheleva, Elena and Getoor, Lise, ‘To Join or Not to Join: The Illusion of Privacy on Social

Networks with Mixed Public and Private User Profiles’, in Proceedings of the 18th

International Conference on World Wide Web (ACM, 2009).

Zheng, S, Shi, P, Xu, H and Zhang, C, ‘Launching the New Profile on Facebook: Understanding the

Triggers and Outcomes of Users’ Privacy Concerns’, in Proceedings of the 5th International

Conference on Trust and Trustworthy Computing, Trust (2012).

276

Zimmer, Michael, ‘“But the Data is Already Public”: On the Ethics of Research in Facebook’ (2010)

12 Ethics Information Technology 313.

277

278