Revenge Porn’ in England and Wales: Are Existing Legal Solutions Effective?

Total Page:16

File Type:pdf, Size:1020Kb

Revenge Porn’ in England and Wales: Are Existing Legal Solutions Effective? The Regulation Of ‘Revenge Porn’ in England And Wales: Are Existing Legal Solutions Effective? by Rosalind Setterfield Submitted for the Degree of Doctor of Philosophy School of Law Faculty of Arts and Social Sciences University of Surrey Supervisors: Dr Alex Sarch & Dr Marie Newhouse © Rosalind Setterfield 2019 Table of Contents Statement of Originality .......................................................................................................... v Abstract .................................................................................................................................... vi Acknowledgements ................................................................................................................ vii Table of Legislation ................................................................................................................ ix Table of Cases ........................................................................................................................ xiii Chapter 1: Introduction .......................................................................................................... 1 1.1 Research Definition of Revenge Porn .......................................................................................... 3 1.1.1 A Note on Terminology ........................................................................................................ 4 1.2 Background to the Revenge Porn Phenomenon ........................................................................... 5 1.3 The Modern Revenge Porn Problem ............................................................................................ 9 1.4 The Scope of the Abuse and the Extent of the Harm ................................................................. 14 1.5 Legislating for the Problem of Revenge Porn .......................................................................... 20 1.5.1 An International Overview .................................................................................................. 20 1.5.2 Legal Responses to Revenge Porn in England and Wales .................................................. 24 1.5.2.1 The Civil Law .............................................................................................................................. 24 1.5.2.2 The Criminal Law ........................................................................................................................ 27 1.6 Central Thesis and Original Contribution to Knowledge ........................................................... 28 1.7 Methodology ............................................................................................................................... 33 1.8 Research Questions and their Importance .................................................................................. 34 1.9 Research Questions and Chapter Structure ................................................................................. 35 Chapter 2: Theoretical Justifications for Addressing Revenge Porn in the Civil Law Regime ..................................................................................................................................... 38 2.1 Introduction ................................................................................................................................. 38 2.2 The Aims of Tort Law ................................................................................................................ 41 2.2.1 Theoretical Justifications for the Aims of Tort Law ........................................................... 43 2.3 Economic Analysis (Optimal Deterrence) Theory ..................................................................... 43 2.3.1 Specific Application to Revenge Porn ................................................................................ 49 2.4 Corrective Justice Theory ........................................................................................................... 55 2.4.1 Specific Application to Revenge Porn ................................................................................ 58 2.5 Tort Law, Revenge Porn and ‘Harm’ ......................................................................................... 65 2.6 Conclusion .................................................................................................................................. 67 Chapter 3: Civil Law Responses to Revenge Porn ............................................................. 70 3.1 Introduction ................................................................................................................................. 70 i 3.2 The Equitable Remedy of Breach of Confidence ....................................................................... 72 3.2.1 Doctrinal Background and Remedies .................................................................................. 72 3.2.2 Analysis of Three Paradigmatic Categories of Potential Revenge Porn Defendants .......... 75 3.2.3 Normative Analysis ............................................................................................................. 83 3.2.4 Conclusion ........................................................................................................................... 87 3.3 The Tort of Misuse of Private Information ................................................................................. 88 3.3.1 Doctrinal Background ......................................................................................................... 88 3.3.2 Analysis of Three Paradigmatic Categories of Potential Revenge Porn Defendants .......... 91 3.3.3 Normative Analysis ............................................................................................................. 98 3.3.4 Conclusion ......................................................................................................................... 107 Chapter 4: Proposals for Civil Law Reform ..................................................................... 109 4.1 Introduction ............................................................................................................................... 109 4.2 Proposals for Reform to The Equitable Remedy of Breach of Confidence ............................. 111 (i) Increase Quantum of Damages for Severe Mental Distress .................................................. 111 (ii) Make Punitive Damages Available for Breaches of Confidence ......................................... 115 4.3 Proposals for Reform to The Tort of Misuse of Private Information ....................................... 121 (i) Broaden the Categories Within Which Exemplary Damages Can be Awarded in Tort Law 121 (ii) Incorporate a Category of Privacy Interference for Unwanted Physical Privacy Invasions 128 4.4 Conclusion ................................................................................................................................ 136 Chapter 5: Theoretical Justifications for Addressing Revenge Porn in the Criminal Law Regime ................................................................................................................................... 138 5.1 Introduction ............................................................................................................................... 138 5.2 The Aims of the Criminal Law ................................................................................................. 139 5.2.1 Theoretical Justifications for the Aims of the Criminal Law ............................................ 141 5.3 Deterrence Theory .................................................................................................................... 143 5.3.1 Specific Application to Revenge Porn .............................................................................. 148 5.3.2 Revenge Porn and the ‘Harm Principle’ ............................................................................ 154 5.4 Retribution Theory .................................................................................................................... 158 5.4.1 Specific Application to Revenge Porn .............................................................................. 167 (i) Culpability.................................................................................................................................... 167 (ii) Social Harmfulness ................................................................................................................. 169 (iii) Moral Wrongfulness ............................................................................................................... 172 5.6 Conclusion ................................................................................................................................ 174 Chapter 6: Criminal Law Responses to Revenge Porn .................................................... 178 6.1 Introduction ............................................................................................................................... 178 6.2 The Protection from Harassment Act 1997 .............................................................................. 182 ii 6.2.1 Background and Scope ...................................................................................................... 182 6.2.2 Analysis of Three Paradigmatic Categories of Potential Revenge Porn Defendants ........ 185 6.2.3 Normative Analysis ..........................................................................................................
Recommended publications
  • Film, Television and Video Productions Featuring Brass Bands
    Film, Television and Video productions featuring brass bands Gavin Holman, October 2019 Over the years the brass bands in the UK, and elsewhere, have appeared numerous times on screen, whether in feature films or on television programmes. In most cases they are small appearances fulfilling the role of a “local” band in the background or supporting a musical event in the plot of the drama. At other times band have a more central role in the production, featuring in a documentary or being a major part of the activity (e.g. Brassed Off, or the few situation comedies with bands as their main topic). Bands have been used to provide music in various long-running television programmes, an example is the 40 or more appearances of Chalk Farm Salvation Army Band on the Christmas Blue Peter shows on BBC1. Bands have taken part in game shows, provided the backdrop for and focus of various commercial advertisements, played bands of the past in historical dramas, and more. This listing of 450 entries is a second attempt to document these appearances on the large and small screen – an original list had been part of the original Brass Band Bibliography in the IBEW, but was dropped in the early 2000s. Some overseas bands are included. Where the details of the broadcast can be determined (or remembered) these have been listed, but in some cases all that is known is that a particular band appeared on a certain show at some point in time - a little vague to say the least, but I hope that we can add detail in future as more information comes to light.
    [Show full text]
  • Page 1 of 125 © 2016 Factiva, Inc. All Rights Reserved. Colin's Monster
    Colin's monster munch ............................................................................................................................................. 4 What to watch tonight;Television.............................................................................................................................. 5 What to watch tonight;Television.............................................................................................................................. 6 Kerry's wedding tackle.............................................................................................................................................. 7 Happy Birthday......................................................................................................................................................... 8 Joke of the year;Sun says;Leading Article ............................................................................................................... 9 Atomic quittin' ......................................................................................................................................................... 10 Kerry shows how Katty she really is;Dear Sun;Letter ............................................................................................ 11 Host of stars turn down invites to tacky do............................................................................................................. 12 Satellite & digital;TV week;Television....................................................................................................................
    [Show full text]
  • Principles of Tort Law Rachael Mulheron Frontmatter More Information
    Cambridge University Press 978-1-108-72764-8 — Principles of Tort Law Rachael Mulheron Frontmatter More Information Principles of Tort Law Presenting the law of Tort as a body of principles, this authoritative textbook leads students to an incisive and clear understanding of the subject. Each tort is carefully structured and examined within a consistent analytical framework that guides students through its preconditions, elements, defences, and remedies. Clear summaries and comparisons accompany the detailed exposition, and further support is provided by numerous diagrams and tables, which clarify complex aspects of the law. Critical discussion of legal judgments encourages students to develop strong analytical and case-reading skills, while key reform pro posals and leading cases from other jurisdictions illustrate different potential solutions to conun- drums in Tort law. A rich companion website, featuring semesterly updates, and ten additional chapters and sections on more advanced areas of Tort law, completes the learning package. Written speciically for students, the text is also ideal for practitioners, litigants, policy-makers, and law reformers seeking a comprehensive and accurate understanding of the law. Rachael Mulheron is Professor of Tort Law and Civil Justice at the School of Law, Queen Mary University of London, where she has taught since 2004. Her principal ields of academic research concern Tort law and class actions jurisprudence. She publishes regularly in both areas, and has frequently assisted law reform commissions, government departments, and law irms on Tort-related and collective redress- related matters. Professor Mulheron also undertakes extensive law reform work, previously as a member of the Civil Justice Council of England and Wales, and now as Research Consultant for that body.
    [Show full text]
  • Image-Based Sexual Abuse
    Oxford Journal of Legal Studies, (2017), pp. 1–28 doi:10.1093/ojls/gqw033 Image-Based Sexual Abuse Clare McGlynn* and Erika Rackley** Abstract—Advances in technology have transformed and expanded the ways in which sexual violence can be perpetrated. One new manifestation of such violence is the non-consensual creation and/or distribution of private sexual images: what we conceptualise as ‘image-based sexual abuse’. This article delineates the scope of this new concept and identifies the individual and collective harms it engenders. We argue that the individual harms of physical and mental illness, together with the loss of dignity, privacy and sexual autonomy, combine to constitute a form of cultural harm that impacts directly on individuals, as well as on society as a whole. While recognising the limits of law, we conclude by considering the options for redress and the role of law, seeking to justify the deployment of the expressive and coercive powers of criminal and civil law as a means of encouraging cultural change. Keywords: image-based sexual abuse, revenge porn, non-consensual pornography, cultural harm, cyber harassment, online abuse 1. Introduction Advances in technology have transformed and expanded the ways in which sexual violence can be perpetrated. One of these new manifestations of violence and abuse is the non-consensual creation and/or distribution of private sexual images: a phenomenon we have conceptualised as image-based sexual abuse.1 While the misuse of such images is not itself a new * Professor of Law, Durham University. Email: [email protected] ** Professor of Law, University of Birmingham.
    [Show full text]
  • Criminalization Downloads Evil: Reexamining the Approach to Electronic Possession When Child Pornography Goes International
    \\jciprod01\productn\B\BIN\34-2\BIN203.txt unknown Seq: 1 2-JUN-16 14:19 CRIMINALIZATION DOWNLOADS EVIL: REEXAMINING THE APPROACH TO ELECTRONIC POSSESSION WHEN CHILD PORNOGRAPHY GOES INTERNATIONAL Asaf Harduf* INTRODUCTION ................................................... 280 R I. THE LADDER OF CRIMINALIZATION ....................... 281 R A. The Matter of Criminalization ......................... 282 R B. The Rungs of the Ladder of Criminalization ........... 284 R 1. First Rung: Identifying the Conduct, Causation, and Harm ......................................... 285 R 2. Second Rung: Examining the Ability to Achieve Goals ............................................. 286 R 3. Third Rung: Examining Alternatives to Criminalization .................................... 287 R 4. Fourth Rung: Assessing the Social Costs of Solutions and Striking a Balance .................. 288 R C. Towards an Analysis of Child Pornography Possession ............................................. 288 R II. APPLICATION TO THE ELECTRONIC POSSESSION OF CHILD PORNOGRAPHY ............................................ 289 R A. First Rung: The Offensive Conduct of Electronic Possession ............................................. 292 R 1. Conduct of Electronic Possession .................. 292 R 2. Harms to Children ................................ 294 R 3. Causation: Four Possible Links .................... 295 R 4. Offensiveness: Summation ......................... 302 R B. Second Rung: Criminal Law’s Ability to Reduce Harm to Children ...........................................
    [Show full text]
  • Pokemon Xxx 3 Ash X May Desto Video
    1 / 2 Pokemon Xxx 3 Ash X May Desto Video Babe Big Tits Blowjob Brunette Hentai Squirt Teen orgasm squirting anime teenager young big boobs Pokemon may ash xxx xxx porn parody desto parody .... pokemon ash and may xxx 4.jpg from xxx ash y may desto ... pokemon porn desto porn pokemon desto porn showing media posts for pokemon.jpg from xxx.. Pokemon XXX 3 May x Ash - Desto. Watch fullscreen · Pokemon Hentai Anime Pokemon hentai Pokemon rule 34 Rule 34 Desto Videos · sex. More Anime Sex .... Pokemon XXX 3 May X Ash - Desto (ParodieParadise). Add to favorites. Tags: anime, pokemon, hentai, rule. Category: Comics .... Watch Watch POKEMON XXX 3 MAY X ASH FULL VIDEO FREE on .com, the best hardcore porn site. is home to the widest selection of free Big Tits sex videos .... ... siren and nikki hunter. Most Relevant Video Results: "parodie paradise pokemon" ... Pokemon XXX 3 May x Ash - Desto (ParodieParadise). pornstar simony .... Jul 14, 2020 — Watch POKEMON XXX 3 MAY X ASH FULL VIDEO FREE on FAPSTER.XXX - free porn videos.. Free pokemon xxx 3 may x ash sex movie was added 1 hour ago together with more porno videos. Find more pokemon, teen, hardcore, creampie, amateur, ... Watch Free Ash Xxx May Parodie Paradise By Desto Hot Porn Ash Xxx May Parodie Paradise By Desto Videos and Download it. ... Nicole Aniston - X-Men a XXX Parody: Wolverine and Cyclops against Mystic ... Pleasureville: A DP XXX Parody Episode 3 ... Pokemon GO xxx parody foursome with three high level babes.. Jan 28, 2017 — Hentai Video: Ash Ketchum fucks Dawn video Those astounding Pokemon slags have such seductive bodies that it would be such a shame not ...
    [Show full text]
  • The Future of Reputation: Gossip, Rumor, and Privacy on the Internet
    GW Law Faculty Publications & Other Works Faculty Scholarship 2007 The Future of Reputation: Gossip, Rumor, and Privacy on the Internet Daniel J. Solove George Washington University Law School, [email protected] Follow this and additional works at: https://scholarship.law.gwu.edu/faculty_publications Part of the Law Commons Recommended Citation Solove, Daniel J., The Future of Reputation: Gossip, Rumor, and Privacy on the Internet (October 24, 2007). The Future of Reputation: Gossip, Rumor, and Privacy on the Internet, Yale University Press (2007); GWU Law School Public Law Research Paper 2017-4; GWU Legal Studies Research Paper 2017-4. Available at SSRN: https://ssrn.com/abstract=2899125 This Article is brought to you for free and open access by the Faculty Scholarship at Scholarly Commons. It has been accepted for inclusion in GW Law Faculty Publications & Other Works by an authorized administrator of Scholarly Commons. For more information, please contact [email protected]. Electronic copy available at: https://ssrn.com/ abstract=2899125 The Future of Reputation Electronic copy available at: https://ssrn.com/ abstract=2899125 This page intentionally left blank Electronic copy available at: https://ssrn.com/ abstract=2899125 The Future of Reputation Gossip, Rumor, and Privacy on the Internet Daniel J. Solove Yale University Press New Haven and London To Papa Nat A Caravan book. For more information, visit www.caravanbooks.org Copyright © 2007 by Daniel J. Solove. All rights reserved. This book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S.
    [Show full text]
  • Image-Based Sexual Abuse Rackley, Erika; Mcglynn, Clare
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Birmingham Research Portal Image-based sexual abuse Rackley, Erika; McGlynn, Clare DOI: 10.1093/ojls/gqw033 License: Other (please specify with Rights Statement) Document Version Peer reviewed version Citation for published version (Harvard): Rackley, E & McGlynn, C 2017, 'Image-based sexual abuse', Oxford Journal of Legal Studies. https://doi.org/10.1093/ojls/gqw033 Link to publication on Research at Birmingham portal Publisher Rights Statement: This is a pre-copyedited, author-produced version of an article accepted for publication in Oxford Journal of Legal Studies following peer review. The version of record McGlynn, Clare, and Erika Rackley. "Image-based sexual abuse." Oxford Journal of Legal Studies (2017). is available online at: https://doi.org/10.1093/ojls/gqw033 General rights Unless a licence is specified above, all rights (including copyright and moral rights) in this document are retained by the authors and/or the copyright holders. The express permission of the copyright holder must be obtained for any use of this material other than for purposes permitted by law. •Users may freely distribute the URL that is used to identify this publication. •Users may download and/or print one copy of the publication from the University of Birmingham research portal for the purpose of private study or non-commercial research. •User may use extracts from the document in line with the concept of ‘fair dealing’ under the Copyright, Designs and Patents Act 1988 (?) •Users may not further distribute the material nor use it for the purposes of commercial gain.
    [Show full text]
  • Possession, Custody, Or Control”
    IMPORTANT NOTICE: This Publication Has Been Superseded See the Most Current Publication at https://thesedonaconference.org/publication/Commentary_on_Rule_34_and_Rule_45 _Possession_Custody_or_Control The Sedona Conference Working Group Series The Sedona Conference Commentary on Rule 34 and Rule 45 “Possession, Custody, or Control” A Project of The Sedona Conference Working Group on Electronic Document Retention & Production (WG1) April 2015 Public Comment Version The Sedona Conference Working Group Series THE SEDONA CONFERENCE COMMENTARY ON RULE 34 AND RULE 45 POSSESSION, CUSTODY, OR CONTROL 2015 Public Comment Version Author: The Sedona Conference Drafting Team Victor L. Cardenas Jr. Ronni D. Solomon Alitia Faccone Martin T. Tully Susan Barrett Harty Cheryl Vollweiler Mark Kindy Kelly M. Warner Edwin Lee W. Lawrence Wescott II Lauren E. Schwartzreich James S. Zucker Team Leader and WG1 Judicial Participant Steering Committee Liaison The Honorable Kristen L. Mix Paul D. Weiner The opinions expressed in this publication, unless otherwise attributed, represent consensus views of the members of The Sedona Conference Working Group 1. They do not necessarily represent the views of any of the individual participants or their employers, clients, or any other organizations to which any of the participants belong nor do they necessarily represent official positions of The Sedona Conference. We thank all of our Working Group Series Sustaining and Annual Sponsors, whose support is essential to our ability to develop Working Group Series publications. For a listing of our sponsors, just click on the “Sponsors” navigation bar on the homepage of our website. Requests for reprints or reprint information should be directed to The Sedona Conference at [email protected] or 602-258-4910.
    [Show full text]
  • Protecting Unauthorized Trademark Use in Expressive Works Pratheepan Gulasekaram Santa Clara University School of Law, [email protected]
    Santa Clara Law Santa Clara Law Digital Commons Faculty Publications Faculty Scholarship 1-1-2005 Policing the Border Between Trademarks and Free Speech: Protecting Unauthorized Trademark Use in Expressive Works Pratheepan Gulasekaram Santa Clara University School of Law, [email protected] Follow this and additional works at: http://digitalcommons.law.scu.edu/facpubs Recommended Citation 80 Wash. L. Rev. 887 This Article is brought to you for free and open access by the Faculty Scholarship at Santa Clara Law Digital Commons. It has been accepted for inclusion in Faculty Publications by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. Copyright C 2005 by Washington Law Review Association POLICING THE BORDER BETWEEN TRADEMARKS AND FREE SPEECH: PROTECTING UNAUTHORIZED TRADEMARK USE IN EXPRESSIVE WORKS Pratheepan Gulasekaram* Abstract: Artists and other creators of expressive works often include trademarks and trademarked products as part of their works. They do so for a number of reasons, including lighthearted humor, critical cultural commentary, parody, or even simply to shock. In instances where such use is both unauthorized by and perceived as disparaging to the mark owner or the trademarked product, owners have attempted to sue under trademark law to enjoin the expressive use. This Article argues that, under a proper analysis of trademark law, precedent, and the free expression ideal enshrined in the First Amendment, mark owners should rarely, if ever, prevail in such actions. This Article evaluates the current state of the law, criticizing its inconsistencies and equivocations, and suggests that the correct analytical framework for these disputes must protect the public, creative nature of trademarks and their cultural meaning.
    [Show full text]
  • The Golden Age of Porn: Nostalgia and History in Cinema Susanna Paasonen and Laura Saarenmaa
    Pornification 19/7/07 10:56 am Page 23 –2– The Golden Age of Porn: Nostalgia and History in Cinema Susanna Paasonen and Laura Saarenmaa The mainstreaming of pornography is indebted to the success of feature-length hardcore films of the 1970s. Shot on 35 mm film, productions such as Deep Throat (1972), Behind the Green Door (1972), The Devil in Miss Jones (1973), The Opening of Misty Beethoven (1976) and Debbie Does Dallas (1978) were widely screened both in the USA and internationally. These films have since been estab- lished as classics (Buscombe 2004: 30) and milestones in both scholarly and popular porn historiographies. While some identify the so-called ‘golden age of porn’ through North American legislation and as ranging from 1957 from 1973 (Lane 2000: 22–3), it was in the 1970s and early 1980s that porn shifted towards the mainstream. In a trend titled by the New York Times as porno chic, pornography became fashionable, gained mainstream publicity and popularity (McNair 2002: 62–3; Schaefer 2004: 371; Wyatt 1999). During the past decade, this golden age has been reminisced in films such as People Vs. Larry Flynt (1996), Boogie Nights (1997) and Rated X (2000), numerous documentaries – including the critically acclaimed Inside Deep Throat (2005) – and books.1 This body of popular porn historiography depicts the decade as one of quality films with real stories, personal performers and talented directors, in contrast to the 1980s of video distribution, inflation of the porn industry, rise of AIDS and conservative backlash. With notable exceptions such as the French Le pornographe (2001) and the Spanish–Danish co-production Torremolinos 73 (2003), European histories have not been reminisced to the same degree.
    [Show full text]
  • Debbie Does Dallas" Unless Ture Hall 100 This Friday and It Conforms to University Policy
    I Vol. V, No. 17 * University Community'sWeekly Paper Thurs., Feb. 23, 1984I. Debbie Will Do S.B. Preston Agrees to let ................................................................................... COCA Show Movie rage 3 i Lobbying in Albany .-.-..°. °-.% °.%°.° .°.%°.° iII page 8 Jun Jo da ...%.°° °°°%- °.%-.°°. °°%°° °.°.% °.°°% ............... ....."Ju n e J ordan ,.° page 7 Rolling Stones page 16 i |1Woody" ....W o Allen Dorm...................... Cooking Debatepage 8 page 1 i The7Fourth Estate: Editorial Value of Education From our earliest days as a nation, the United while taking into account the fiscal conditions of the 83 grew 104% versus SUNY's total growth rate of States has considered education as an essential state. This policy was based on the belief that low 43%. The State University is now supported with far foundation of democracy. Education creates an tuition is the best guarantee of educational op- more tuition dollars than before. informed and politically responsible citizenry. portunity for all qualified individuals. If there is anything that Tuesday's SASU/Polity Education contributes to our nation's economic well- The 1983-84 New York State Executive Budget lobbying in Albany accomplished it was demon- being by enhancing the productivity of individuals imposed the largest tuition increase for a single year strating that there is little positive support for raising and by providing new goods and services through in the history of the State University. In adition, tuition or any other fees, including dorm rents, at research. dormitory room rates were raised for the fifth time in SUNY. Legislator after legislator, many of whom had For centuries, our nation has committed itself to four years which further significantly contributed to attended SUNY schools themselves, expressed their education as a public obligation--public in its pur- raising the cost of a SUNY education.
    [Show full text]