Personality Rights in Australia1
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
E Dawn of Robot Surveillance AI, Video Analytics, and Privacy
e Dawn of Robot Surveillance AI, Video Analytics, and Privacy June 2019 e Dawn of Robot Surveillance AI, Video Analytics, and Privacy By Jay Stanley © 2019 AMERICAN CIVIL LIBERTIES UNION Cover: Sources images, shutterstock.com “The robots are here. The robots control your warnings. They analyze and notify, following instructions you have set.” — Promotional web site for “Video Surveillance as a Service”1 “The overwhelming majority of images are now made by machines for other machines” 2 — Trevor Paglen 1 http://www.vsaas.com/. 2 https://thenewinquiry.com/invisible-images-your-pictures-are-looking-at-you/. 1 Table of Contents I. INTRODUCTION ...................................................................................................... 3 II. WHAT IS AI VIDEO ANALYTICS .......................................................................... 5 The rise of deep learning ........................................................................................... 6 Overcoming challenges with new sources of data .................................................. 8 III. CURRENT DEPLOYMENTS ................................................................................ 9 Government deployments ......................................................................................... 9 Commercial deployments ........................................................................................ 10 Analytics in the cloud .............................................................................................. 11 IV. HOW COMPUTERS WILL -
Privacy and Publicity: the Two Facets of Personality Rights
Privacy and publicity Privacy and publicity: the two facets of personality rights hyperbole. In this context, personality In this age of endorsements and rights encompass the “right of privacy”, tabloid gossip, famous people which prohibits undue interference in need to protect their rights and a person’s private life. In addition to coverage in the media, reputations. With a growing number images of celebrities adorn anything from of reported personality rights cases, t-shirts, watches and bags to coffee mugs. India must move to develop its This is because once a person becomes legal framework governing the famous, the goods and services that he or commercial exploitation of celebrity she chooses to endorse are perceived to reflect his or her own personal values. By Bisman Kaur and Gunjan Chauhan, A loyal fan base is a captive market for Remfry & Sagar such goods, thereby allowing celebrities to cash in on their efforts in building up Introduction a popular persona. Intellectual property in India is no longer Unfortunately, a large fan base is a niche field of law. Stories detailing also seen by unscrupulous people as an trademark infringement and discussing opportunity to bring out products or the grant of geographical indications services that imply endorsement by an routinely make their way into the daily individual, when in fact there is no such news headlines. From conventional association. In such cases the individual’s categories of protection such as patents, “right of publicity” is called into play. trademarks, designs and copyright, IP laws The right of publicity extends to every have been developed, often by judicial individual, not just those who are famous, innovation, to encompass new roles and but as a practical matter its application areas of protection. -
The New Frontiers of Personality Rights and the Problem of Commodification: European and Comparative Perspectives
The New Frontiers of Personality Rights and the Problem of Commodification: European and Comparative Perspectives Giorgio Resta* I. TORT LAW AND THE TRADITIONAL APPROACH TO PERSONALITY RIGHTS ........................................................................ 33 II. NEW DIMENSIONS OF PERSONALITY PROTECTION IN PRIVATE LAW .................................................................................................... 37 A. From ‘Reactive’ to ‘Preventive’ Strategies ........................ 38 B. The Emergence of the Human Body as a Legal Object ................................................................................. 40 C. The Commercialization of Personality ............................... 41 III. WHO OWNS IDENTITY? ...................................................................... 43 IV. THE QUESTIONS AT STAKE ................................................................. 46 V. THE PROTECTION OF PERSONAL AUTONOMY: A MATTER OF PRIVACY OR PROPERTY? .................................................................... 48 A. Incorporeal Attributes and the Dominance of Property Rules .................................................................... 48 B. Body Parts and Liability Rules ........................................... 51 VI. LICENSING IDENTITY? ........................................................................ 54 A. The Human Body and the Gift Paradigm ........................... 54 B. Commercial Exploitation of Personality and the Limits of Freedom of Contract .......................................... -
Image Is Everything Lowenstein Sandler’S Matthew Savare Gives a Comparative Examination of Publicity Rights in the US and Western Europe
Publicity rights Image is everything Lowenstein Sandler’s Matthew Savare gives a comparative examination of publicity rights in the US and western Europe Comedian Steven Wright once joked, “It’s a small world, but I the person’s identity has “commercial value” versus only 10 years for wouldn’t want to paint it”. Over the last decade, the proliferation those whose identity does not. of digital technologies has not made the world smaller or easier to • Remedies – the remedies available to plaintiffs also vary from state paint, but it has significantly hastened the globalisation of content. This to state. For example, New York’s statute provides for injunctions, transformation, coupled with the developed world’s insatiable fascination compensatory damages, and discretionary punitive damages. Ohio’s with fame, has spurred the hyper commoditisation of celebrity. statute, which offers the most remedies of any state statute, permits Despite the universality of celebrity, the laws governing the injunctions; a choice of either actual damages, “including any commercial exploitation of one’s name, image, and likeness differ profits derived from and attributable to the unauthorised use of an widely between the US and the nations of western Europe. In light individual’s persona for a commercial purpose” or statutory damages of the increased trafficking in celebrity personas between the two between $2,500 and $10,000; punitive damages; treble damages continents, a brief comparative analysis is warranted. if the defendant has “knowledge of the unauthorised use of the persona”; and attorney’s fees. A primer on US right of publicity law Courts have used primarily three methodologies or some The right of publicity is the “inherent right of every human being to combination thereof to value compensatory damages. -
Privacy Online: a Report to Congress
PRIVACY ONLINE: A REPORT TO CONGRESS FEDERAL TRADE COMMISSION JUNE 1998 FEDERAL TRADE COMMISSION Robert Pitofsky Chairman Mary L. Azcuenaga Commissioner Sheila F. Anthony Commissioner Mozelle W. Thompson Commissioner Orson Swindle Commissioner BUREAU OF CONSUMER PROTECTION Authors Martha K. Landesberg Division of Credit Practices Toby Milgrom Levin Division of Advertising Practices Caroline G. Curtin Division of Advertising Practices Ori Lev Division of Credit Practices Survey Advisors Manoj Hastak Division of Advertising Practices Louis Silversin Bureau of Economics Don M. Blumenthal Litigation and Customer Support Center Information and Technology Management Office George A. Pascoe Litigation and Customer Support Center Information and Technology Management Office TABLE OF CONTENTS Executive Summary .......................................................... i I. Introduction ........................................................... 1 II. History and Overview .................................................... 2 A. The Federal Trade Commission’s Approach to Online Privacy ................. 2 B. Consumer Privacy Online ............................................. 2 1. Growth of the Online Market ...................................... 2 2. Privacy Concerns ............................................... 3 C. Children’s Privacy Online ............................................. 4 1. Growth in the Number of Children Online ............................ 4 2. Safety and Privacy Concerns ...................................... 4 III. Fair -
The Right to Privacy and the Future of Mass Surveillance’
‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B. -
FTCA Handbook Is a Revision of the Material Originally Published in July 1979 and Updated Periodically Since
JACS-Z 1 November 1999 MEMORANDUM FOR CLAIMS JUDGE ADVOCATES/CLAIMS ATTORNEYS SUBJECT: Federal Tort Claims Act (FTCA) Handbook 1. This edition of the FTCA Handbook is a revision of the material originally published in July 1979 and updated periodically since. The previous edition was last updated in September 1998. This edition contains significant cases through September 1999 pertaining to the filing and processing of administrative claims under the FTCA (Title 28, United States Code, Sections 2671-2680) and related claims statutes. 2. This Handbook provides case citations covering a myriad of issues. The citations are organized in a topical manner, paralleling the steps an attorney should take in analyzing a claim. Older citations have not been removed. Shepardizing is essential. 3. If any errors are noted, including the omission of relevant cases, please use the error sheet at the end of the Handbook to bring this to our attention. Users needing further information or clarification of this material should contact their Area Action Officer or Mr. Joseph H. Rouse, Deputy Chief, Tort Claims Division, DSN: 923-7009, extension 212; or commercial: (301) 677-7009, extension 212. JOHN H. NOLAN III Colonel, JA Commanding TABLE OF CONTENTS I. REQUIREMENTS FOR ADMINISTRATIVE FILING A. Why is There a Requirement? 1. Effective Date of Requirement............................ 1 2. Administrative Filing Requirement Jurisdictional......... 1 3. Waiver of Administrative Filing Requirement.............. 1 4. Purposes of Requirement.................................. 2 5. Administrative Filing Location........................... 2 6. Not Necessary for Compulsory Counterclaim................ 2 7. Not Necessary for Third Party Practice................... 2 B. What Must be Filed? 1. Written Demand for Sum Certain.......................... -
Rail Trespasser Fatalities Federal Railroad Administration Demographic and Behavioral Profiles
U.S. Department of Transportation Rail Trespasser Fatalities Federal Railroad Administration Demographic and Behavioral Profiles June 2013 NOTICE This document is disseminated under the sponsorship of the U.S. Department of Transportation in the interest of information exchange. The U.S. Government assumes no liability for its contents or use thereof. Any opinions, findings and conclusions, or recommendations expressed in this material do not necessarily reflect the views or policies of the U.S. Government, nor does mention of trade names, commercial products or organizations imply endorsement by the U.S. Government. The U.S. Government assumes no liability for the content or use of the material contained in this document. NOTICE The U.S. Government does not endorse products or manufacturers. Trade or manufacturers’ names appear herein solely because they are considered essential to the objective of this report. NOTE: This report was prepared by North American Management (NAM) at the direction of the Federal Railroad Administration (FRA) for the purpose of more accurately identifying the types of persons who trespass on railroad rights-of-way, and ultimately reducing the number of trespassing casualties, which contribute significantly to the total annual railroad-related deaths and injuries in the United States. This report is an extension of a March 2008 report produced by Cadle Creek Consulting titled, “Rail Trespasser Fatalities, Developing Demographic Profiles” (2008 Report). The entire 2008 Report can be found at http://www.fra.dot.gov/eLib/Details/L02669. The current report was generated as part of FRA’s continuing efforts to reduce trespassing on railroad rights-of-way and associated fatalities and injuries. -
Principles of Internet Privacy
Maurer School of Law: Indiana University Digital Repository @ Maurer Law Articles by Maurer Faculty Faculty Scholarship 2000 Principles of Internet Privacy Fred H. Cate Indiana University Maurer School of Law, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facpub Part of the Computer Law Commons, and the Law and Society Commons Recommended Citation Cate, Fred H., "Principles of Internet Privacy" (2000). Articles by Maurer Faculty. 243. https://www.repository.law.indiana.edu/facpub/243 This Article is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Articles by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. Principles of Internet Privacy FRED H. CATE* I. INTRODUCTION Paul Schwartz's InternetPrivacy and the State makes an important and original contribution to the privacy debate that is currently raging by be- ginning the process of framing a new and more useful understanding of what "privacy" is and why and how it should be protected.' The definition developed by Brandeis, Warren,2 and Prosser,3 and effectively codified by Alan Westin in 1967---"the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others"---worked well in a world in which most privacy concerns involved physical intrusions (usually by the government) or public disclosures (usually by the media), which, by their very nature, were comparatively rare and usually discovered. -
Chapter 7 Tort Law and Product Liability Chapter Outline 1
Chapter 7 Tort Law and Product Liability Chapter Outline 1. Introduction 2. The Basis of Tort Law 3. Intentional Torts 4. Negligence 5. Cyber Torts: Defamation Online 6. Strict Liability 7. Product Liability 8. Defenses to Product Liability 9. Tort Law and the Paralegal Chapter Objectives After completing this chapter, you will know: • What a tort is, the purpose of tort law, and the three basic categories of torts. • The four elements of negligence. • What is meant by strict liability and under what circumstances strict liability is applied. • The meaning of strict product liability and the underlying policy for imposing strict product liability. • What defenses can be raised in product liability actions. Chapter 7 Tort Law and Product Liability Chapter Outline I. INTRODUCTION A. Torts are wrongful actions. B. The word tort is French for “wrong.” II. THE BASIS OF TORT LAW A. Two notions serve as the basis of all torts. i. Wrongs ii. Compensation B. In a tort action, one person or group brings a personal-injury suit against another person or group to obtain compensation or other relief for the harm suffered. C. Tort suits involve “private” wrongs, distinguishable from criminal actions that involve “public” wrongs. D. The purpose of tort law is to provide remedies for the invasion of various interests. E. There are three broad classifications of torts. i. Intentional Torts ii. Negligence iii. Strict Liability F. The classification of a particular tort depends largely on how the tort occurs (intentionally or unintentionally) and the surrounding circumstances. Intentional Intentions An intentional tort requires only that the tortfeasor, the actor/wrongdoer, intended, or knew with substantial certainty, that certain consequences would result from the action. -
Torts Mnemonics
TORTS MNEMONICS 1) Torts are done IN SIN: I – INTENTIONAL harm to a person (e.g., assault, battery, false imprisonment, or the intentional infliction of emotional harm) N – NEGLIGENT conduct causing personal injury, wrongful death, or prop damage S – STRICT tort liability I – INTENTIONAL harm to property (e.g., trespass, conversion, or tortious interference with a contract) N – NUISANCE 2) Tortious conduct makes you want to SING: S – STRICT tort liability I – INTENTIONAL conduct N – NEGLIGENT conduct G – GROSS negligence a/k/a reckless conduct 3) A D’s FIT conduct is unreasonable/negligent when P was within the foreseeable zone of danger: F – FAILURE to take reasonable precautions in light of foreseeable risks I – INADVERTENCE T – THOUGHTLESSNESS 4) To establish a negligence claim, P must mix the right DIP: D – DUTY to exercise reasonable care was owed by the D to the injured P and the D breached this duty (for a negligence claim the duty is always to conform to the legal standard of reasonable conduct in light of the apparent risks) I – Physical INJURY to the P or his property (damages) P – P’s injuries were PROXIMATELY caused by the D’s breach of duty 5) A parent is liable only for the torts of a SICK child: S – in an employment relationship where a child commits a tort, while acting as a SERVANT or agent of the parent I – where the parent entrusts or knowingly leaves in the child’s possession an INSTRUMENTALITY that, in light of the child’s age, intelligence, disposition and prior experience, creates an unreasonable risk of harm to -
The Right to Privacy in the Digital Age
The Right to Privacy in the Digital Age April 9, 2018 Dr. Keith Goldstein, Dr. Ohad Shem Tov, and Mr. Dan Prazeres Presented on behalf of Pirate Parties International Headquarters, a UN ECOSOC Consultative Member, for the Report of the High Commissioner for Human Rights Our Dystopian Present Living in modern society, we are profiled. We accept the necessity to hand over intimate details about ourselves to proper authorities and presume they will keep this information secure- only to be used under the most egregious cases with legal justifications. Parents provide governments with information about their children to obtain necessary services, such as health care. We reciprocate the forfeiture of our intimate details by accepting the fine print on every form we sign- or button we press. In doing so, we enable second-hand trading of our personal information, exponentially increasing the likelihood that our data will be utilized for illegitimate purposes. Often without our awareness or consent, detection devices track our movements, our preferences, and any information they are capable of mining from our digital existence. This data is used to manipulate us, rob from us, and engage in prejudice against us- at times legally. We are stalked by algorithms that profile all of us. This is not a dystopian outlook on the future or paranoia. This is present day reality, whereby we live in a data-driven society with ubiquitous corruption that enables a small number of individuals to transgress a destitute mass of phone and internet media users. In this paper we present a few examples from around the world of both violations of privacy and accomplishments to protect privacy in online environments.