Knowledge (XXG)

Privacy law

Source 📝

2040:, the right of private life as an objective right was considered as a sub-branch of constitutional law, under the Subject of the sub-branch of private life law, the author proposes to understand an array of social relations that arise in the process of formation and development of peculiar, inherent exclusively given to the individual physical, mental and social characteristics that are objectively amenable to legal regulation and receive such regulation. As part of the sub-sector, the following stand out: the institution of privacy, including the sub-institution of the inviolability of the home; institution of religious identity; the institute of family relations, including the sub-institution of the right to become a parent and the sub-institution of gender identity; a communication institution that includes the sub-institution of privacy in cyberspace. Thus, taking into account modern trends in the development of society, a qualitatively different understanding of the right of private life is proposed, as a subjective right of private life, A.V. ) choosing the type and measure of acceptable behavior in the sphere of his personalization, depending on his will and consciousness and serving to satisfy his legitimate interests, coupled with the ability of an authorized subject to demand certain behavior from an obligated person and guaranteed by the state. The subjective right to privacy has the following features: it can be both individual and collective; arises in a person (individual subject) and belongs to him from the moment of birth, to the family (collective subject) from the moment of creation; not alienable; combines the norms of law, morality, in some legal systems of religion; is complex, includes negative and positive elements; its nature, as a rule, requires specification of the content in sectoral legislation; is a natural right, derived from the very rational nature of a person, mediates the characteristics of a person as a biosocial being with pronounced innate attitudes to personalize his properties, is connected and aimed at the implementation of the goals inherent in him by nature, and others. Exploring the post-Soviet model of the right to private life, A. V. Krotov notes its features associated with the special culture of Soviet society: the subordination of the individual's personal existence to public principles of morality and ethics, party duty, condemnation of individualism, and the specifics of Eastern Christian theology. In Orthodoxy, a person is not an autonomous being, a person is conceived in relation and communication with other personalities, the world and God, morality is in the center, and non-personality. A. V. Krotov comes to the conclusion that the post-Soviet model of the right to private life in the Orthodox countries of Eastern Europe, as a rule, is an adapted version of the Western doctrine, the result of the catch-up growth paradigm, a necessary and forced reaction to the evolution of technological , cultural, religious, political and legal systems of Western civilization. Approval at the end of the 20th century. of the pro-Western model of the right to private life in the former Soviet states (countries of the Eastern Christendom) occurred en masse not because of the public need for it, but for populist purposes, as a kind of emotional element that convinces people of a change in the state course, to demonstrate the pro-Western orientation of politicians who led the post-Soviet countries at the end of the twentieth century. However, the Western model of the right to private life does not coincide with the mass legal consciousness and the established system of values in Russia (as a collectivist society), with the philosophical and religious principles of Orthodoxy (the principle of conciliarity). Constitutional norms on the right to private life in Russia are developed to a lesser extent in sectoral legislation (compared to Western law). 2054:
The Act's general purpose "is to govern the collection, use and disclosure of personal data by organisations" while acknowledging the individual's right to control their personal data and the organizations' legal needs to collect this data. It imposes eight obligations on those organizations that use personal data: consent, purpose limitation, notification, access, correction, accuracy, protection/security, and retention. The Act prohibits transfer of personal data to countries with privacy protection standards that are lower than those outlined in the general data protection rules. The Personal Data Protection Commission is responsible for enforcing the Act, which is based primarily on a complaints-based system. The punishments for violating the Act can include being ordered by the commission to stop collecting and using personal data, to destroy the data, or to pay a penalty of up to $ 1 million.
1039:(officially Directive 95/46/EC) acknowledged the authority of National data protection authorities and mandated that all Member States adhere to standardized privacy protection guidelines. These guidelines stipulated that Member States must enact stringent privacy laws consistent with the framework provided by the Directive. Moreover, the Directive specified that non-EU countries must implement privacy legislation of equivalent rigor to exchange personal data with EU countries. Additionally, companies in non-EU countries wishing to conduct business with EU-based companies must adhere to privacy standards at least as strict as those outlined in the Directive. Consequently, the Directive has influenced the development of privacy legislation beyond European borders. The proposed 1835:
sensitive personal data includes any "personal data consisting of information as to the physical or mental health or condition of a data subject, his political opinions, his religious beliefs or other beliefs of a similar nature." Although the Act does not apply to information processed outside the country, it does restrict cross-border transfers of data from Malaysia outwards. Additionally, the Act offers individuals the "right to access and correct the personal data held by data users", "the right to withdraw consent to the processing of personal data", and "the right to prevent data users from processing personal data for the purpose of direct marketing." Punishment for violating the Personal Data Protection Act can include fines or even imprisonment.
1519:(Privacy) (Amendment) Ordinance 2012. Examples of personal data protected include names, phone numbers, addresses, identity card numbers, photos, medical records and employment records. As Hong Kong remains a common law jurisdiction, judicial cases are also a source of privacy law. The power of enforcement is vested with the Privacy Commissioner (the "Commissioner") for Personal Data. Non-compliance with data protection principles set out in the ordinances does not constitute a criminal offense directly. The Commissioner may serve an enforcement notice to direct the data user to remedy the contravention and/or instigate the prosecution action. Contravention of an enforcement notice may result in a fine and imprisonment. 2854:
profession, phone number, and email address, and declares that organizations may only use this information for a "proper purpose". The legislation, however, does not define what qualifies as proper. The 2005 Law on Electronic Transactions protects personal information during electronic transactions by prohibiting organizations and individuals from disclosing "part or all of information related to private and personal affairs ... without prior agreement." The 2010 Law on Protection of Consumers' Rights provides further protection for consumer information, but it does not define the scope of that information or create a data protection authority; additionally, it is only applicable in the private sector.
2626: 2247:. For example, article 12 of the Constitution states "the people shall have freedom of confidentiality of correspondence" while article 10 states "the people shall have freedom of residence and of change of residence." Along with several other articles that assert the Constitution's protection of freedoms and rights of the people, the Grand Justices are able to decide how privacy protection fits into the legal system. The Justices first made reference to privacy being a protected right in the 1992 "Interpretation of Council of Grand Justices No. 293 on Disputes Concerning Debtors' Rights," but it was not directly or explicitly declared to be a right. 2050:
confidence. In February 2002, however, the Singaporean government decided that the common law approach was inadequate for their emerging globalized technological economy. Thus, the National Internet Advisory Committee published the Model Data Protection Code for the Private Sector, which set standards for personal data protection and was influenced by the EU Data Protection Directive and the OECD Guidelines on the Protection of Privacy. In the private sector, businesses can still choose to adopt the Model Code, but in 2005 Parliament decided that Singapore needed a more comprehensive legislative privacy framework.
1778:
intercept information that is able to get access through the customer's use of the service. This law also grants privacy protection in the course of making use of the service provided by said company. And if the information of the customer is going to be provided to any third party it is mandatory that the customer is made aware of such an exchange and that some form of agreement is reached, even if the person is a family member. This act also goes as far as protecting data for Kenyans especially for the use of fraud and other ill manners. Additionally, as a member of the United Nations, Kenya is bound by
1502:
who have not consented to the use of the images in which they appear if the depicted people have either been paid for the photo session as models (so there is no separation between editorial and commercial models in Greek law) or they have paid the photographer for obtaining the photo (this, for example, gives the right to wedding photographers to advertise their work using their photos of newly-wed couples they photographed in a professional capacity). In Greece the right to take photographs and publish them or sell licensing rights over them as fine art or editorial content is protected by the
1002:(APEC) introduced a voluntary Privacy Framework in 2004, which all 21 member economies adopted. This framework aims to enhance general information privacy and facilitate the secure transfer of data across borders. It comprises nine Privacy Principles, serving as minimum standards for privacy protection, including measures to prevent harm, provide notice, limit data collection, ensure personal information is used appropriately, offer choice to individuals, maintain data integrity, implement security safeguards, allow access and correction of personal information, and enforce accountability. 1983:" and prevent them from being misused. Not only does the Philippines have these laws, but it has also set aside agents that are tasked with regulating these privacy rules and due ensure the punishment of the violators. Additionally, with the constitution, previous laws that have been passed but that are in violation of the laws above have been said to be void and nullified. Another way this country has shown their dedication in executing this law is extending it to the government sphere as well. Additionally, as a member of the United Nations, the Philippines is bound by the 1140:
protection is being held. Even though there is legislation enforced in the Bahamas through the Data Protection Act 2003, the act lacks many enforcements since a data protection officer doesn't need to be in office nor does any group or organization need to notify the Office of Data Protection when a hacker has breached privacy law. Also, there are no requirements for registering databases or restricting data flow across national borders. Therefore, the legislation does not meet European Union standards, which was the goal of creating the law in the first place.
986: 1421:
the right to privacy law. Another privacy related law can be seen in section 54 of the Telecommunications Promulgation passed in 2008, which states that "any service provider supplying telecommunications to consumers must keep information about consumers confidential". Billing information and call information are no exceptions. The only exception to this rule is for the purpose of bringing to light "fraud or bad debt". Under this law, even with the consent of the customer, the disclosure of information is not permitted.
1947:
is bound by the universal declaration of Human Rights which states in article twelve "No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks". Nigeria is one of the few African countries that is building on the privacy laws. This is evident in the fact that Nine years later in the year 2008, the
2251:
industries. In 2010, Taiwan enacted the Personal Data Protection Act that laid out more comprehensive guidelines for the public and private sectors and was still enforced by individual Ministries. In the 2010 Act, personal data is protected and defined as any "data which is sufficient to, directly or indirectly, identify that person", and includes data such as name, date of birth, fingerprints, occupation, medical records, and financial status, among many others.
1653: 1466:
to German data policy rules, any transfer of personal data outside the EEA symbolizes a connection to a third party which requires a reason. That reason may be for emergency reasons, and a provision must be met with consent by the receiver and the subject of the data. Keep in mind that in Germany, data transfers within a group of companies is subject to the same treatment as transfer to third-parties if the location is outside the EEA.
1064: 1462:(1977) from corporations, which has been amended the most recently in 2009. This act specifically targets all businesses that collect information for its use. The major regulation protects the data within the private and personal sector, and as a member of the European Union (EU), Germany has additionally ratified its act, convention, and additional protocol with the EU according to the EU Data Protection Directive 95/46 EC. 6886: 2567:, in which young woman Abigail Roberson had her image placed on a flour advertisement causing embarrassment and emotional distress. Her case against the company was rejected, leading to widespread public disapproval and the creation of New York Civil Rights Law § 50 that forbid the appropriation of individuals' images in advertisements without their consent, with an emphasis on the emotional impacts of such exploitation. 804: 6860: 1382:
natural person, if a close relative of a natural person suffers mental pain due to the following infringements, and the people’s court sues for compensation for mental damage, the people’s court shall accept the case: (2) Illegal disclosure or use of the privacy of the deceased, or infringement of the privacy of the deceased in other ways that violate social public interests or social ethics.
1433:. Additionally, as a member of the United Nations, the Fiji is bound by the Universal Declaration of Human Rights which states in article twelve, "No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks". 4548: 1774:
communications infringed". Although Kenya grants its people the right to privacy, there seems to be no existing document that protects these specific privacy laws. Regarding privacy laws relating to data privacy, like many African countries as expressed by Alex Boniface Makulilo, Kenya's privacy laws are far from the European 'adequacy' standard.
3313: 1245:, which provides that personal information can be collected without consent if "it is reasonable to expect that the collection with the knowledge or consent of the individual would compromise the availability or the accuracy of the information and the collection is reasonable for purposes related to investigating a breach of an agreement". 2414:
circumstances, also known as the "right to be forgotten.” The Act also sets out obligations for organizations that handle personal data, including requirements for transparency in data processing, the implementation of appropriate security measures to protect data, and the need for consent from individuals before processing their data.
2556:
like advertising and other media. As noted by the California Jury, successful cases built on the appropriation of a person's likeness must typically involve them being harmed in some way by this usage, which was non-consensual and contributed to some benefit, often financial, to the person or company using their image.
1831:
Retention Principle, the Data Integrity Principle, and the Access Principle. The Act defines personal data as "'information in respect of commercial transactions that relates directly or indirectly to the data subject, who is identified or identifiable from that information or from that and other information."
1719:
adopted in Jamaica, the closest one is the Private Security Regulation Authority Act. This act passed in the year 1992, establishing the Private Security Regulation Authority. This organization is tasked with the responsibility of regulating the private security business and ensuring that everyone working as a
2555:
Appropriating the plaintiff's identity for the defendant's benefit: Appropriation of one's likeness is considered the oldest of the main American privacy torts. It involves the right to control where one's appearance and other aspects of their "likeness," such as their voice and name, appear in areas
1946:
as well as privacy protection. The following can be found in the constitution pertaining to this: "The privacy of citizens, their homes, correspondence, telephone conversations and telegraphic communications is hereby guaranteed and protected". Additionally, as a member of the United Nations, Nigeria
1543:
that included various new rules that apply to companies and consumers. A key aspect of the new rules required that any organization that processes personal information must obtain written consent from the data subjects before undertaking certain activities. However, application and enforcement of the
1501:
which has been uphold as legal by the courts whether done by professional or amateur photographers). However, photographing people or collecting their personal data for commercial (advertising) purposes requires their consent. The law gives photographers the right to commercially use photos of people
1332:
promulgated in 2015 give public security and security departments great powers to collect all kinds of information, forcing individuals to use network services to submit private information for monitoring, and forcing network operators to store user data Within China, unrestricted "technical support"
1119:
unclear: some courts have indicated that a tort of invasion of privacy may exist in Australia. However this has not been upheld by the higher courts, which have been content to develop the equitable doctrine of Breach of Confidence to protect privacy, following the example set by the UK. In 2008, the
1091:
of the United Nations in 1966 also protects privacy: "No one shall be subjected to arbitrary or unlawful interference with his privacy, family, home or correspondence, nor to unlawful attacks on his honor and reputation. Everyone has the right to the protection of the law against such interference or
1026:
Furthermore, the Council of Europe took steps to protect individuals' privacy rights with specific measures. In 1981, it adopted the Convention for the protection of individuals with regard to automatic processing of personal data. Additionally, in 1998, the Council addressed privacy concerns related
1022:
in 1950 and applicable across the European continent except for Belarus and Kosovo, safeguards the right to privacy. It asserts that "Everyone has the right to respect for his private and family life, his home and his correspondence." Through extensive case law from the European Court of Human Rights
922:
Laws focus on breaches of privacy rights related to physical intrusion onto an individual's property or personal domain without consent. This involves illegal activities such as: entering an individual’s residence without consent, conducting surveillance using physical methods (e.g., deploying hidden
2824:
The First Amendment "does not immunize the press from torts or crimes committed in an effort to gather news." They are still held liable for the news they gather and how they gather it. But the press is given more latitude to intrude on seclusion to gather important information, so many actions that
2670:
disclose their data collection and sharing practices to consumers and allow consumers to access their data and opt-out if they choose. The Act recently expanded existing consumer rights in the state in 2023, providing citizens the right to reduce the collection of data and correct false information.
2669:
is one of the most stringent privacy laws in the U.S. It provides California residents with the right to know about the personal data collected about them, the right to delete personal information held by businesses, and the right to opt-out of the sale of their personal information. Businesses must
2202:
Personal data must be protected against illegal use by "being processed in good faith and must be proportionate". Also, the reason for the transfer of personal data must be known by the time of data transfer. Data not associated with people (not personal data) is not protected by the Data Protection
2159:
In early 2022, Sri Lanka became the first country in South Asia to enact comprehensive data privacy legislation. The Personal Data Protection Act No. 9 of 2022, effective since March 19, 2022, applies to processing within Sri Lanka and extends extraterritorially to controllers or processors offering
2122:
2013 (POPI) was signed into act, focusing on data privacy and is inspired by other foreign national treaties like the European Union. Minimum requirements are presented in POPI for the act of processing personal data, like the fact that the data subject must provide consent and that the data will be
1718:
The Jamaican constitution grants its people the right to "respect for and protection of private and family life, and privacy of the home". Although the government grants its citizens the right to privacy, the protection of this right is not strong. But in regards to other privacy laws that have been
1518:
In Hong Kong, the law governing the protection of personal data is principally found in the Personal Data (Privacy) Ordinance (Cap. 486) which came into force on 20 December 1996. Various amendments were made to enhance the protection of personal data privacy of individuals through the Personal Data
1465:
In Germany, there are two kinds of restrictions on a transfer of personal data. Since Germany is part of the EU Member States, the transfer of personal data of its citizens to a nation outside the EEA is always subject to a decent level of data protection in the offshore country. Secondly, according
1298:
The rise of digital platforms has also prompted discussions about privacy rights concerning consumer data collected by large tech companies. The Privacy Commissioner of Canada has been active in investigating and regulating how these companies comply with Canadian privacy laws, ensuring they provide
1294:
The digital transformation has brought specific challenges and focus areas for privacy regulation in Canada. The Canadian Anti-Spam Legislation (CASL), for example, regulates how businesses can conduct digital marketing and communications, requiring explicit consent for sending commercial electronic
1260:
In healthcare, provinces like Alberta and British Columbia have specific laws protecting personal health information, which require healthcare providers to manage patient data with high confidentiality and security levels. This includes ensuring that patient consent is obtained before their personal
2678:
Enforcement of these laws is specific to the statutes and the authorities responsible. For instance, HIPAA violations can lead to substantial fines imposed by the Department of Health and Human Services, while the Federal Trade Commission handles penalties under consumer protection laws. State laws
2289:
means that privacy laws have so far been limited in order to preserve national security and public safety. Thailand uses bureaucratic surveillance to maintain national security and public safety, which explains the 1991 Civil Registration Act that was passed to protect personal data in computerized
2127: 1496:
During the military dictatorship era the 57 AK law prohibited taking photos of people without their permission but the law has since been superseded. The 2472/1997 law protects personal data of citizens but consent for taking photos of people is not required as long as they aren't used commercially
1420:
of their personal information; (b) confidentiality of their communications; and (c) respect for their private and family life". But in this very same constitution, it is expressed that it is possible "to the extent that it is necessary" for a law to be passed that limits or impacts the execution of
1398:
Article 39. No organization or individual may disclose the personal privacy of minors. No organization or individual may conceal or destroy letters, diaries, and e-mails of minors, except for the need to investigate crimes. Public security organs or people's procuratorates shall conduct inspections
1005:
In 2011, APEC established the APEC Cross Border Privacy Rules System to balance the flow of information and data across borders, which is crucial for fostering trust and confidence in the online marketplace. This system builds upon the APEC Privacy Framework and incorporates four agreed-upon rules,
905:
The categorization of different laws involving individual rights of privacy assesses how different laws protect individuals from being having their rights of privacy violated or abused by certain groups or persons. These classifications provide a framework for understanding the legal principles and
2815:
A website may commit a "highly offensive" act by collecting information from website visitors using "duplicitous tactics." A website that violates its own privacy policy does not automatically commit a highly offensive act according to the jury. But the Third Circuit Court of Appeals has held that
2590:
Public Disclosure of Private Facts or Publicity Given to Private Life is a tort under privacy law that protects individuals from the unauthorized dissemination of private information that is not of public concern. This tort aims to safeguard an individual's right to privacy and prevent unwarranted
2053:
In January 2013, Singapore's Personal Data Protection Act 2012 came into effect in three separate but related phases. The phases continued through July 2014 and dealt with the creation of the Personal Data Protection Commission, the national Do Not Call Registry, and general data protection Rules.
1773:
express that all its people have the right to privacy, "which includes the right not to have â€” (a) their person, home or property searched; (b) their possessions seized; (c) information relating to their family or private affairs unnecessarily required or revealed, or (d) the privacy of their
1214:
PIPEDA does not apply to non-commercial organizations or provincial governments, which remain within the jurisdiction of provinces. Five Canadian provinces have enacted privacy laws that apply to their private sector. Personal information collected, used and disclosed by the federal government and
929:
laws generally address situations where individuals or entities fail to exercise appropriate caution in protecting the privacy rights of others, often holding them accountable through severe penalties like heavy fines. This aims to ensure compliance and deter future violations, involving incidents
2835:
provides specific regulations for companies collecting consumer data in California organized as particular rights; these include the right to have knowledge about how companies intend to use consumer data, as well as the right to opt-out of its collection and potentially delete this data. The Act
2638:
The Privacy Act of 1974 is foundational, establishing a code of fair information practices that govern the collection, maintenance, use, and dissemination of information about individuals that is maintained in systems of records by federal agencies. This act allows individuals to review and amend
2443:
The goal of the Privacy and Electronic Communications Regulations is to protect individuals’ privacy and control over their electronic communications while promoting responsible and transparent practices by organizations that engage in electronic marketing and in the use of tracking technologies.
1834:
A notable contribution to general privacy law is the Act's distinction between personal data and sensitive personal data, which entails different protections. Personal data includes "information in respect of commercial transactions ... that relates directly or indirectly to a data subject" while
1424:
Other Privacy laws that have been adopted by this country are those that are meant to protect the collected information, cookies and other privacy-related matter of tourist. This is in regards to (but not limited to) information collected during bookings, the use of one technology of another that
1381:
The Supreme People's Court's "Interpretation on Several Issues Concerning the Determination of Liability for Compensation for Mental Damage in Civil Torts" was adopted at the 116th meeting of the Judicial Committee of the Supreme People's Court on February 26, 2001. Article 3 After the death of a
1273:
recognized the tort of intrusion upon seclusion, affirming that individuals have a right to privacy against unreasonable intrusion. This landmark ruling has significant implications for how personal data is handled across all sectors, emphasizing the need for businesses to maintain strict privacy
1118:
The current state of privacy law in Australia includes Federal and state information privacy legislation, some sector-specific privacy legislation at state level, regulation of the media and some criminal sanctions. The current position concerning civil causes of action for invasion of privacy is
2785:
For example, a delicatessen employee told co-workers that she had a staph infection in a private manner. The co-workers then informed their manager, who directly contacted the employee's doctor to determine if she actually had a staph infection, because employees in Arkansas with a communicable
2297:
Thus, with the need for a more general and all-encompassing data protection law, the legislature proposed the Personal Data Protection Bill in 2013, which is heavily influenced by the OECD Guidelines and the EU Directive. The draft law is still under evaluation and its enactment date is not yet
1777:
As of today, Kenya does have laws that focus on specific sectors. The following are the sectors: communication and information. The law pertaining to this is called the Kenya Information and Communication Act. This Act makes it illegal for any licensed telecommunication operators to disclose or
1311:
For detailed guidance and the latest updates on compliance with Canadian privacy laws, businesses and individuals can refer to resources provided by the Office of the Privacy Commissioner of Canada and stay informed about developments in Canadian privacy law through expert analyses and updates.
2789:
The employee with the staph infection sued her employer, the deli, for intruding on her private affairs, as the information she had previously shared had gotten leaked. The court held that the deli manager had not intruded upon the worker's private affairs because the worker had made her staph
2293:
The legislature passed the Official Information Act 1997 to provide basic data protection by limiting personal data collection and retention in the public sector. It defines personal information in a national context in relation to state agencies. Two communication technology related laws, the
2198:
specifically the Data Protection Act, a specific section under the Swiss Federal Protection Act. The Data Protection Act has been enacted since 1992 and is in charge of measuring the consent of sharing of personal data, along with other legislation like the Telecommunication Act and the Unfair
1978:
regulations and laws to apply to more than just individual industries. This act also offered protection of data belonging to the people regardless of where it is stored, be it in private spheres or not. In that very same year, the cybercrime prevention law was passed. This law was "intended to
1830:
passed the Personal Data Protection Act 2010, and it came into effect in 2013. It outlines seven Personal Data Protection Principles that entities operating in Malaysia must adhere to: the General Principle, the Notice and Choice Principle, the Disclosure Principle, the Security Principle, the
1139:
The Bahamas has an official data protection law that protects the personal information of its citizens in both the private and public sector: Data Protection Act 2003 (the Bahamas Law). The Bahamas Law appoints a data protection commissioner to the Office of Data Protection to ensure that data
1054:
superseded the Data Protection Directive of 1995. A significant aspect introduced by the General Data Protection Regulation is the recognition of the "right to be forgotten," which mandates that any organization collecting data on individuals must delete the relevant data upon the individual's
915:
Laws focus on protecting individuals’ rights to control their personal information and prevent unauthorized intrusion into their private lives. They encompass strict regulations governing data protection, confidentiality, surveillance, and the use of personal information by both government and
2413:
is the United Kingdom’s main legislation protecting personal data and how it should be collected, processed, stored and shared. In accordance to this legislature, citizens have rights such as the right to access their personal data, and the right to request their data be deleted under certain
1702:
The Data Protection Commissioner of Ireland is a member of the International Conference of Data Protection and Privacy Commissioners, European Data Protection Authorities, the EU Article 29 Working Party, Global Privacy Enforcement Network, and the British, Irish, and Islands Data Protection
936:
laws regulate the relationships characterized by trust and confidence, where the fiduciary accepts and complies with the legal responsibility for duties of care, loyalty, good faith, confidentiality, and more when entrusted in serving the best interests of a beneficiary. In terms of privacy,
2014:
As a general rule, consent of the individual is required for processing, i.e. obtaining, organizing, accumulating, holding, adjusting (updating, modifying), using, disclosing (including transfer), impersonating, blocking or destroying of his personal data. This rule doesn't apply where such
1638:
oversees the entirety of the enforcement of data privacy regulations for Ireland. All persons that collect and process data must register with the Data Protection Commissioner unless they are exempt (non-profit organizations, journalistic, academic, literary expression etc.) and renew their
1354:
Article 40. The freedom and confidentiality of communications of citizens of the People’s Republic of China are protected by law. Except for the needs of national security or the pursuit of criminal offenses, the public security organs or procuratorial organs shall inspect communications in
1307:
Canadian privacy laws are continually evolving to address new challenges posed by technological advancements and global data flows. Businesses operating in Canada must stay informed about these changes to ensure compliance and protect the personal information of their customers effectively.
2853:
Vietnam, lacking a general data protection law, relies on Civil Code regulations relating to personal data protection. Specifically, the Code "protects information relating to the private life of a person." The 2006 Law on Information Technology protects personal information, such as name,
2250:
In 1995, Taiwan passed the Computer-Processed Personal Data Protection Act which was influenced by the OECD Guidelines and enforced by each separate Ministry depending on their industry sector responsibility. It only protected personal information managed by government agencies and certain
2049:
Singapore, like other Commonwealth jurisdictions, relies primarily on common law, and the law of confidence is employed for privacy protection cases. For example, privacy can be protected indirectly through various common law torts: defamation, trespass, nuisance, negligence, and breach of
1162:
As a consequence of the lack of official data privacy laws, there was a breach of personal data in 2009 when an employee's laptop from Belize's Vital Statistics Unit was stolen, containing birth certification information for all citizens residing in Belize. Even though the robbery was not
1476:
Regarding the protection of children, Germany is potentially the first nation that has played an active role in banning the share of data within toys connected to Wi-Fi and the Internet, like for instance, "My Friend Cayla". The group in charge of protecting the data of children is the
2577:
Defenses against an accusation of appropriation include the newsworthiness of the image; consent, in which the person is argued to have opted for the usage of their likeness; and their celebrity status, as this indicates they have already publicized themselves without facing emotional
2574:, where Glady Loftus sought financial compensation for the usage of her image in a film advertisement distributed around New York City; this reflected a shift in the claims of appropriation cases from emotional damage to a lack of payment for the plaintiff's image being appropriated. 1286:. Although PIPEDA shares many similarities with GDPR, there are nuanced differences, particularly in terms of consent and data subject rights. Canadian businesses dealing with international data need to comply with both PIPEDA and GDPR, making compliance a complex but critical task 2781:
To be successful, a plaintiff "must show the defendant penetrated some zone of physical or sensory privacy" or "obtained unwanted access to data" in which the plaintiff had "an objectively reasonable expectation of seclusion or solitude in the place, conversation or data source."
1728:
and also with the education they received they would be equipped how best to deal with certain situations as well as avoid actions can that could be considered violations, such as invasion of privacy. Additionally, as a member of the United Nations, the Jamaica is bound by the
1027:
to the internet by publishing "Draft Guidelines for the protection of individuals with regard to the collection and processing of personal data on the information highway," developed in collaboration with the European Commission. These guidelines were formally adopted in 1999.
1320:
In 1995, the Computer Processed Personal Information Protection Act was enacted in order to protect personal information processed by computers. The general provision specified the purpose of the law, defined crucial terms, prohibited individuals from waiving certain rights.
2796:"When Fletcher learned that she had a staph infection, she informed two coworkers of her condition. Fletcher's revelation of private information to coworkers eliminated Fletcher's expectation of privacy by making what was formerly private a topic of office conversation." 1095:
On December 18, 2013, the United Nations General Assembly adopted resolution 68/167 on the right to privacy in the digital age. The resolution makes reference to the Universal Declaration of Human Rights and reaffirms the fundamental and protected human right of privacy.
1987:
which states in article two "No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks".
1782:
which states in article two "No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks".
1733:
which states in article two "No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks".
2857:
In 2015, the Vietnam legislature introduced the Law on Information Security, which ensures better information safety and protection online and in user's computer software. It took effect on 1 July 2016 and is Vietnam's first overarching data protection legislation.
2646:(HIPAA) protects sensitive patient health information from being disclosed without the patient's consent or knowledge. HIPAA sets the standard for protecting sensitive patient data held by health care providers, insurance companies, and their business associates. 1973:
the right to privacy, but it also protects its people's right to privacy by attaching consequences to the violation of it thereof. In the year 2012, the Philippines passed the Republic Act No. 10173, also known as the "Data Privacy Act of 2012". This act extended
1473:(OECD). The Federal Data Protection Commission of Germany is a member of the International Conference of Data Protection and Privacy Commissioners, European Data Protection Authorities, the EU Article 29 Working Party, and the Global Privacy Enforcement Network. 1207:(PIPEDA) governs the collection, use, and disclosure of personal information in connection with commercial activities, as well as personal information about employees of federal works, undertakings and businesses. The PIPEDA brings Canada into compliance with 4530:"Commission Implementing Decision (EU) 2019/419 of 23 January 2019 pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council on the adequate protection of personal data by Japan under the Act on the Protection of Personal Information" 2844:
Though the right to privacy exists in several regulations, the most effective privacy protections come in the form of constitutional articles of Uzbekistan. Varying aspects of the right to privacy are protected in different ways by different situations.
1441:
France adopted a data privacy law in 1978. It applies to public and private organizations and forbids gathering sensitive data about physical persons (including sexuality, ethnicity, and political or religious opinions). The law is administered by the
2610:
No Legitimate Public Concern: The disclosed information should not be of legitimate public concern. If the information is newsworthy or serves a public interest, it may be protected under the First Amendment, and the plaintiff may not have a valid
1955:
and regulating the Nigerian information technology industry. Additional laws have been passed that are meant to prevent the disclosure of information without permission and the intercepting of some form of transaction with or without evil intent.
906:
obligations that check privacy protection and enforcement efforts and for policymakers, legal practitioners, and individuals to better understand the complexity of the responsibilities involved in order to ensure the protection of privacy rights.
2230:
The Data Inspection Board of Switzerland is a member of the International Conference of Data Protection and Privacy Commissioners, European Data Protection Authorities, the EU Article 29 Working Party, and the Nordic Data Protection Authorities.
1968:
lets its audience know that "The privacy of communication and correspondence shall be inviolable except upon lawful order of the court, or when public safety or order requires otherwise as prescribed by law". Not only does this country grant the
1079:, Article 17, protects privacy, echoed in the 2013 UN General Assembly resolution affirming privacy as a fundamental human right in the digital age. The Principles on Personal Data Protection and Privacy for the UN System were declared in 2018. 2559:
A rising case for the appropriation tort in the United States appeared in the early 1900s due to companies using individuals' identities and appearances without their consent on packaging and advertisements. A particularly influential case was
2494:- Organizations are required to demonstrate compliance with data protection including the implementation of security measures to protect data and to conduct Data Protection Impact Assessments while maintaining records or processing activities. 2816:
Viacom's data collection on the Nickelodeon website was highly offensive because the privacy policy may have deceptively caused parents to allow their young children to use Nick.com, thinking it was not collecting their personal information.
2602:
Information Must Be Private: The disclosed information must be of a private nature and not generally known to the public. This can include personal details about one's health, finances, relationships, or any other intimate aspects of their
1610:, which regulates the utilization of personal data. The DPA protects data within the private and personal sector. The DPA ensures that when data is transported, the location must be safe and in acknowledgement of the legislation to maintain 1230:
There remains some debate whether there exists a common law tort for breach of privacy across Canada. There have been a number of cases identifying a common law right to privacy but the requirements have not always been articulated clearly.
1257:, which requires financial institutions to obtain consent for the collection, use, or disclosure of personal information. Moreover, these institutions must also provide robust safeguards to protect this information against loss or theft. 2606:
Information Must Be Offensive to a Reasonable Person: The disclosed information must be offensive or embarrassing to a reasonable person. The court will assess whether a reasonable person would find the publication highly offensive and
1399:
in accordance with the law, or letters, diaries, and e-mails of minors who are incapacitated. Diaries and e-mails shall be opened and read by their parents or other guardians, and no organization or individual shall open or read them.
2459:
UK GDPR governs data protection and privacy within the UK applying to the processing of personal data by organizations operating within the UK. It includes specific provisions tailored to the UK's legal framework and requirements.
937:
fiduciary obligations may extend to professionals like lawyers, doctors, financial advisors, and others responsible for handling confidential information, as a result of a duty of confidentiality to their clients or patients.
3711:
Lei 13709 DispĂ”e sobre a proteção de dados pessoais e altera a Lei nÂș 12.965, de 23 de abril de 2014 (Marco Civil da Internet) / Law 13709 Provides for the protection of personal data and amends Law no. 12.965, of April 23,
6378: 2294:
Electronic Transactions Act 2001 and the Computer Crime Act 2007, provide some data privacy protection and enforcement mechanisms. Nevertheless, Thailand still lacks legislation that explicitly addresses privacy security.
1687:
In relation to international data privacy law that Ireland is involved in, the British–Irish Agreement Act 1999 Section 51 extensively states the relationship between data security between the United Kingdom and Ireland.
2768:
ts jurisdiction: A commercial cybersecurity research platform with coverage of 380+ U.S. State & Federal laws that impact cybersecurity before and after a breach. ts jurisdiction also maps to the NIST Cybersecurity
2224:(EU Commission). Switzerland is not under the EU Data Protection Directive 95/46 EC. However, the data protection regulations are sufficient enough under European Union (EU) regulations without being a member of the EU. 6162:
Chik, Warren B. 2013. “The Singapore Personal Data Protection Act and an assessment of future trends in data privacy reform.” Computer Law & Security Review: The International Journal of Technology Law and Practice
6196:
Thomas, Mathews. 2004. “Is Malaysia’s MyKad the ‘one card to rule them all’? The urgent need to develop a proper legal framework for the protection of personal information in Malaysia.” Melbourne University Law Review
1764:
Kenya currently does not have a strong general privacy protection law for its constituents. But in chapter 4 â€” The Bill of Rights, and in the second part which is titled "Rights and Fundamental Freedoms", of the
2009:
the Law of the Russian Federation "On Personal Data" as of 27 July 2006 No. 152-FZ, regulating the processing of personal data by means of automation equipment. It is the operator who is required to comply with that
6144:
Belkhamza, Zakariya. 2017. “The Effect of Privacy Concerns on Smartphone App Purchase in Malaysia: Extending the Theory of Planned Behavior.” International Journal of Interactive Mobile Technologies 11(5):178-194.
3644: 1887:
On 5 July 2010, Mexico enacted a new privacy package, the Federal Law on Protection of Personal Data Held by Individuals, focused on treatment of personal data by private entities. The key elements included were:
1556: 1075:(Organisation for Economic Co-operation and Development) initiated privacy guidelines in 1980, setting international standards, and in 2007, proposed cross-border cooperation for privacy law enforcement. The UN's 6487: 4846: 2682:
The privacy laws in the U.S. reflect a complex landscape shaped by sector-specific requirements and state-level variations, illustrating the challenge of protecting privacy in a federated system of government.
1683:
Considering the protection of internet property and online data, the ePrivacy Regulations 2011 protect the communications and higher-advanced technical property and data such as social media and the telephone.
2598:
Publication of Private Facts: The defendant must have publicized private information about the plaintiff. This publication can be through various means such as media outlets, social media, or any other public
2199:
Competition Act. The Act generally guides on how to collect, process, store, data, use, disclose, and destruct data. The Data Inspection Board is in charge of overseeing data breaches and privacy enforcement.
1723:
is trained and certified. The goal of this is to ensure a safer home, community, and businesses. One of the reasons as to why this law was passed is that as trained workers, the guards could ensure maximum
4120: 2269:
outlines punishments for privacy violations in article 315, sections 315-1 and 315–2. The sections primarily address issues of search and seizure and criminal punishment for wrongful invasion of privacy.
3964: 2804:
In determining whether an intrusion is objectively "highly offensive," a court is supposed to examine "all the circumstances of an intrusion, including the motives or justification of the intruder."
1223: 1211:, although civil society, regulators, and academics have more recently claimed that it does not address modern challenges of privacy law sufficiently, particularly in view of AI, calling for reform. 1951:
and Information Protection Agency Bill was passed. This bill is responsible for the creation of the Cybersecurity and Information Protection Agency. This agency is tasked with the job of preventing
2825:
would be considered "highly offensive" if performed by a private citizen may not be considered offensive if performed by a journalist in the "pursuit of a socially or politically important story."
1242: 1203: 877: 6482: 1443: 6147:
Bhasin, Madan Lal. 2016. “Challenge of guarding online privacy: role of privacy seals, government regulations and technological solutions.” Socio-Economic Problems & the State 15(2):85-104.
2710: 1253:
Canadian privacy laws have significant implications for various sectors, particularly finance, healthcare, and digital commerce. For instance, the financial sector is strictly regulated under
1163:
intentionally targeting the laptop - the robber did not predict the severity of the theft - Belize was put in a vulnerable position which could have been avoided if regulations were in order.
5425:ЗаĐșĐŸĐœ ĐŁĐșŃ€Đ°Ń—ĐœĐž Â«ĐŸŃ€ĐŸ захОст ĐżĐ”Ń€ŃĐŸĐœĐ°Đ»ŃŒĐœĐžŃ… ĐŽĐ°ĐœĐžŃ…Â» ĐČіЮ 1 чДрĐČĐœŃ 2010 р. № 2297-VI. Із Đ·ĐŒŃ–ĐœĐ°ĐŒĐž і ĐŽĐŸĐżĐŸĐČĐœĐ”ĐœĐœŃĐŒĐž / Law of Ukraine No. 2297 VI 'On Personal Data Protection' with changes and amendments 1497:
or are used only for personal archiving ("ÎżÎčÎșÎčαÎșÎź Ï‡ÏÎźÏƒÎ·" / "home use"), for publication in editorial, educational, cultural, scientific or news publications, and for fine art purposes (e.g.
1325: 1469:
Specifically, the Federal Data Protection Commission is in charge of regulating the entirety of the enforcement of data privacy regulations for Germany. In addition, Germany is part of the
6181:
Marvin, Lynn M. and Yohance Bowden. 2015. “Conducting U.S. Discovery in Asia: An Overview of E- Discovery and Asian Data Privacy Laws.” Richmond Journal of Law & Technology 21(4):1-55.
6169:
Greenleaf, Graham. 2009. “Five years of the APEC Privacy Framework: Failure or promise?” Computer Law and Security Review: The International Journal of Technology and Practice 25(1):28-43.
1283: 6150:
Bignami, Francesa. 2011. “Cooperative Legalism and the Non-Americanization of European Regulatory Styles: The Case of Data Privacy.” The American Journal of Comparative Law 59(2):411-461.
4649:
Thomas, Mathews (2004). "Is Malaysia's MyKad the "one card to rule them all"? The urgent need to develop a proper legal framework for the protection of personal information in Malaysia".
850:
is a set of regulations that govern the collection, storage, and utilization of personal information from healthcare, governments, companies, public or private entities, or individuals.
6532: 2653:
plays a crucial role in enforcing federal privacy laws that protect consumer privacy and security, particularly in commercial practices. It oversees the enforcement of laws such as the
1348:
Article 38. The personal dignity of citizens of the People's Republic of China shall not be violated. It is forbidden to use any method to insult, slander, and falsely accuse citizens.
6187:
Mitsilegas, Valsamis. 2016. “Surveillance and Digital Privacy in the Transatlantic “War on Terror”: The Case for a Global Privacy Regime.” Columbia Human Rights Law Review 47(3):1-77.
6159:
Chesterman, Simon. 2012. “After Privacy: The Rise of Facebook, the Fall of WikiLeaks, and Singapore’s ‘Personal Data Protection Act 2012.’” Singapore Journal of Legal Studies 391-415.
4141:
Tschentscher, Axel, The Basic Law (Grundgesetz) 2016: The Constitution of the Federal Republic of Germany (23 May 1949) — Introduction and Translation (Fourth Edition) (6 July 2016).
1295:
messages. This legislation is part of Canada's efforts to protect consumers from spam and related threats while ensuring that businesses conduct their digital marketing responsibly.
2498:
The UK GDPR aims to ensure that personal data is processed legally, fairly and with full transparency while individuals are given control over the handling of their personal data.
1454:
Germany is known to be one of the first countries (in 1970) with the strictest and most detailed data privacy laws in the world. The citizens' right to protection is stated in the
1329: 1815:
in Malaysia has referred less to English common law and instead looked more toward other nations with similar colonial histories and whose written constitutions are more like the
1446:(CNIL), a dedicated national administration. Like in Germany, data violations are considered criminal offenses (Art. 84 GPR with Code PĂ©nal, Section 1, Chapitre VI, Art. 226ff.). 1371:
Article 1032. Natural persons enjoy the right to privacy. No organization or individual may infringe the privacy rights of others by spying, harassing, divulging, disclosing, etc.
5846: 3645:
http://web.ita.doc.gov/ITI/itiHome.nsf/9b2cb14bda00318585256cc40068ca69/a54f62c93fd1572985257623006e32d5/$ FILE/Western%20Hemisphere%20Data%20Protection%20Laws%205-12%20final.pdf
6547: 6428: 2476:- Requires organizations operating within the UK to disclose any and all information regarding recent breaches to the authorities and notify all parties impacted by the breach. 2364: 1088: 1076: 2690: 2643: 2522:
The right to privacy is not explicitly stated anywhere in the Bill of Rights. The idea of a right to privacy was first addressed within a legal context in the United States.
869: 4307: 1159:(2000) currently protects the personal information of the citizens of Belize, but there is no current documentation that distinguishes if this act includes electronic data. 857:
asserts that every person possesses the right to privacy. However, the understanding and application of these rights differ among nations and are not consistently uniform.
6759: 6200:
Ramasoota, Pirongrong and Sopak Panichpapiboon. 2014. “Online Privacy in Thailand: Public and Strategic Awareness.” Journal of Law, Information & Science 23(1):97-136.
6467: 3715: 2807:
It is up to the courts to decide whether someone that is considered "offensive" is acceptable based on the intentions when it comes to searching for that specific news.
2178:
is the world's first national data protection law and was enacted in Sweden on 11 May 1973. The law was then superseded on 24 October 1998 by the Personal Data Act (Sw.
1342: 6724: 6663: 6552: 6153:
Butt, Lesli. 2011. “Can you keep a secret? Pretences of confidentiality in HIV/AIDS counseling and treatment in eastern Indonesia.” Medical Anthropology 30(3):319-338.
4217: 2314:
is mainly regulated by the Law of Ukraine No. 2297-VI 'On Personal Data Protection' enacted on 1 June 2010. On 20 December 2012 legislation was substantially amended.
2277:
address the "personality right" to privacy and the right to compensation when one injures the "rights" of another, such as when someone uses another's name illegally.
880:
governs privacy, with recent case law shaping privacy rights. Digital platform challenges underscore the ongoing evolution and compliance complexities in privacy law.
1355:
accordance with the procedures prescribed by law, no organization or individual may infringe on citizens’ freedom of communication and confidentiality for any reason.
2006:
Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data, signed and ratified by the Russian Federation on December 19.2005;
1175:
The intimacy, private life, honor and image of the people are inviolable, with assured right to indenization by material or moral damage resulting from its violation
1365: 2551:
argued in 1960 that "privacy" was composed of four separate torts, the only unifying element of which was a (vague) "right to be left alone". The four torts were:
2778:
To be able to intrude on someone's seclusion, the person must have a "legitimate expectation of privacy" in the physical place or personal affairs intruded upon.
5688: 6418: 1918:
The introduction into the New Zealand common law of a tort covering invasion of personal privacy at least by public disclosure of private facts was at issue in
1455: 5447: 2504:
For detailed guidance and the latest updates on compliance with United Kingdom privacy laws, businesses and individuals can refer to resources provided by the
6266: 3968: 2836:
recently expanded existing consumer rights in the state in 2023, providing citizens the right to reduce the collection of data and correct false information.
6497: 6175:
Hew, Khe Foon, and Wing Sum Cheung. 2012. “Use of Facebook: A Case Study of Singapore Students’ Experience.” Asia Pacific Journal of Education 32(2):181-196.
6166:
Dove, Edward S. 2015. “Biobanks, Data Sharing, and the Drive for a Global Privacy Governance Framework.” Journal of Law, Medicine & Ethics 43(4):675-689.
1241:
found that CP could collect Eastmond's personal information without his knowledge or consent because it benefited from the exemption in paragraph 7(1)(b) of
87: 2619: 1392: 1351:
Article 39. The residences of the People's Republic of China should be inviolable. It is prohibited to illegally search or trespass into citizens’ houses.
873: 6193:
Tene, Omer. 2013. “Privacy Law’s Midlife Crisis: A Critical Assessment of the Second Wave of Global Privacy Laws.” Ohio State Law Journal 74(6):1217-1261.
5179: 3764: 1791:
After their independence from Great Britain in 1957, Malaysia's existing legal system was based primarily on English common law. The following common law
3990: 1528: 930:
such as any mishandling of sensitive data, poor security measures leading to data breaches, or any non-compliance with privacy policies and regulations.
227: 2758:
Recently, a handful of lists and databases are emerging to help risk managers research U.S. State and Federal laws that define liability. They include:
4353: 2762:
Perkins Coie Security Breach Notification Chart: A set of articles (one per state) that define data breach notification requirements among U.S. states.
3656: 6172:
Greenleaf, Graham. 2012. “Independence of data privacy authorities (Part 1): International standards.” Computer Law & Security Review 28(1):3-13.
5913: 2470:- Establishes principles for the processing of citizen's personal data under the compliance of confidentiality, integrity and availability standards. 1416:. The exact workings from the constitution is the following: "Every person has the right to personal privacy, which includes the right to â€” (a) 1183:. The bill has 65 articles and has many similarities to the GDPR. The first translation into English of the new data protection law was published by 6507: 6423: 6413: 4284: 3089: 2154: 1997: 4568: 4273: 2547:
Their project was never entirely successful, and the renowned tort expert and Dean of the College of Law at University of California, Berkeley,
973:
Health Insurance Portability and Accountability Act: regulates health care providers' collection and disclosure of protected health information.
2138: 2119: 1871: 1851: 1549: 1535:
and an intrinsic part of Article 21 that protects life and liberty of the citizens and as a part of the freedoms guaranteed by Part III of the
162: 6739: 3586: 3419: 3095: 1984: 1779: 1730: 854: 1559:
unanimously held that the right to privacy is an intrinsic part of right to life and personal liberty under Article 21 of the Constitution.
958:
Electronic Communications Privacy Act: prohibits the unauthorized access or interception of electronic communications in storage or transit.
6368: 4908:
Chesterman, Simon (2012). "After Privacy: the Rise of Facebook, the Fall of Wikileaks, and Singapore's Personal Data Protection Act 2012".
3581:"Invasion of privacy: penalties and remedies: review of the law of privacy: stage 3" (2009) (Issues paper 14), New Zealand Law Commission, 2562: 2220:
Switzerland is a white-listed country, meaning that it is a nation that has proper levels of data protection under the surveillance by the
1180: 955:
Consumer Financial Protection Act: regulates unfair, deceptive, or abusive acts in connection with consumer financial products or services.
6562: 4339: 2374:
However, there is no independent tort law doctrine which recognises a right to privacy. This has been confirmed on a number of occasions.
1544:
rules is still uncertain. The Aadhaar Card privacy issue became controversial when the case reached the Supreme Court. The hearing in the
2367:, which guarantees a "right to respect for privacy and family life" from state parties, subject to restrictions as prescribed by law and 1926:, the Supreme Court indicated it had some misgivings with how the tort was introduced, but chose not to interfere with it at that stage. 1756:
The two latter acts (amended in 2016) contain provisions applicable to the protection of personal information by public sector entities.
946:
Children's Online Privacy Protection Act: provides data protection requirements for children's information collected by online operators.
6719: 6527: 6517: 6477: 2625: 2360: 2123:
beneficial, and POPI will be harsher when related to cross-border international data transfers, specifically with personal information.
2112: 1861: 1796: 1015: 5643: 4076: 2426:, established in 2003, gave citizens control in consent and disclosure of information in specific electronic communications including: 2206:
In the case of data transfer to unsafe data protection countries, these are the major regulations required by the Data Protection Act:
2057:
Singapore has also passed various sector-specific statutes that more indirectly deal with privacy and personal information, including:
1866: 6459: 6433: 6393: 6203:
Reidenberg, Joel R. 2000. “Resolving Conflicting International Data Privacy Rules in Cyberspace.” Stanford Law Review 52(5):1315-1371.
5712:"Why parents help their children lie to Facebook about age: Unintended consequences of the 'Children's Online Privacy Protection Act'" 5081: 3101: 2733: 2724: 2453: 2382: 1607: 1051: 865: 834: 4354:"Supreme Court ruling on Right to Privacy: SC decision rejects BJP's ideology of suppression through surveillance, says Rahul Gandhi" 909:
Brief overview of the 4 classifications of each category to understand the ways in which privacy rights are protected and regulated:
6636: 6557: 6542: 6438: 6302: 5597: 5220: 3945: 2622:(COPPA), which requires children under the age of thirteen to gain parental consent before putting any personal information online. 2517: 2368: 1589:
Section 72A, which provides for imprisonment for a period up to three years and/or a fine up to Rs. 500,000 for a person who causes
999: 5372: 6008: 4314: 6325: 3858: 3738: 1567: 1563: 1510:
and legal cases. Photographing the police or children and publishing the photographs in a non-commercial capacity is also legal.
1120: 853:
Privacy laws are examined in relation to an individual's entitlement to privacy or their reasonable expectations of privacy. The
6512: 6443: 6408: 5963: 2832: 2701: 2666: 2274: 1965: 1156: 553: 3727: 2341:
Law of Ukraine No. 80/94-BP 'On Protection of Information in the Information and Telecommunication Systems' dated 5 July 1994;
2285:
Thailand's unique history of being an authoritarian buffer state during the Cold War and being under the constant threat of a
6734: 6714: 6668: 6631: 6537: 6492: 6126: 5014: 4432: 2696: 2240: 2131: 949:
Communications Act of 1934: includes data protection provisions for common carriers, cable operators, and satellite carriers.
4476: 6641: 6472: 6447: 6087: 5399: 5336: 4965: 4869: 4821: 4681: 4614: 4529: 6876: 6190:
Peng, Shin-Yi. 2003. “Privacy and the Construction of Legal Meaning in Taiwan.” The International Lawyer 37(4):1037-1054.
4454: 2227:
In addition, Switzerland is part of the Council of Europe and the Organisation for Economic Cooperation and Development.
2111:
of South Africa guarantees the most general right to privacy for all its citizens. This provides the main protection for
6502: 6112:
The National Assembly of the Socialist Republic of Vietnam. (2005). "Legislature XI, Session 8: Law on E-Transactions."
4250: 3518: 2765:
NCSL Security Breach Notification Laws: A list of U.S. state statutes that define data breach notification requirements.
2108: 1635: 1099:
The Principles on Personal Data Protection and Privacy for the United Nations System were declared on October 11, 2018.
860:
Throughout history, privacy laws have evolved to address emerging challenges, with significant milestones including the
343: 5888: 4206: 2456:, implemented into UK law through the Data Protection Act 2018 and came into effect alongside the EU GDPR in May 2018. 6522: 6178:
Llanillo, Llewellyn L., and Khersien Y. Bautista. 2017. “Zones of Privacy: How Private?” Defense Counsel Journal 1-27.
3497: 2126:
The recording of conversations over phone and internet is not allowed without the permission of both parties with the
1892:
Requirement of all private entities who gather personal data to publish their privacy policy in accordance to the law.
1856: 1812: 1532: 559: 4992: 4584:
Makulilo, Alex Boniface (2013). "Data Protection Regimes in Africa: too far from the European 'adequacy' standard?".
4029: 3883: 1155:
Belize is currently part of the minority of countries that do not have any official data privacy laws. However, the
5743: 4106: 2537: 2195: 1915:) sets out principles in relation to the collection, use, disclosure, security and access to personal information. 1269:
Recent case law in Canada has further defined the scope and application of privacy laws. For instance, the case of
333: 3700:
Constituição da RepĂșblica Federativa do Brasil de 1988 / Constitution of the Federative Republic of Brazil of 1988
2439:
customer privacy as regards traffic and location data, billing, phone line identification, and directory listings.
2030:
Federal Service on supervising in the sphere of communications, information technology and mass media (in Russian)
1006:
which involve self-assessment, compliance review, recognition/acceptance, and dispute resolution and enforcement.
6754: 6698: 6678: 6403: 6363: 6275: 3962:"Constitution of the Republic of Fiji." The Fijian Government — Department of Information. Retrieved 1 May 2017. 3554: 3083: 2715: 2654: 2594:
To establish a claim for public disclosure of private facts, the following elements generally need to be proven:
2183: 1846: 1842:
and business sector-specific laws that exist in Malaysia to indirectly protect confidential information include:
1208: 1113: 1036: 648: 497: 1548:
case went on for 38 days across 4 months, making it the second longest Supreme Court hearing after the landmark
1238: 985: 864:
in the U.S. and the European Union's Data Protection Directive of 1995. Today, international standards like the
5187: 3134: 3077: 2650: 2397: 2378: 1816: 681: 665: 232: 192: 5794: 5155: 5563: 1412:
was founded on 10 October 1970. In its constitution, the people inhabiting the land are granted the right to
1333:
from the security department must be provided. Other laws and regulations related to privacy are as follows:
6749: 6744: 6616: 6398: 3112: 2322: 2244: 1876: 1459: 546: 371: 338: 6212:
U.S. Department of Justice. "Overview of the Privacy Act of 1974 - 2020 Edition". Retrieved April 24, 2024.
5769: 4793: 6790: 6388: 6383: 6330: 5242:
Greenleaf, Graham. 2015. "Global Data Privacy Laws 2015: 109 Countries, with European Laws Now a Minority"
3923: 3683:
Greenleaf, Graham. 2015. "Global Data Privacy Laws 2015: 109 Countries, with European Laws Now a Minority"
3474:"III.V.7 UNITED NATIONS GENERAL ASSEMBLY RESOLUTION 68/167 (ON THE RIGHT TO PRIVACY IN THE DIGITAL AGE)". 2786:
disease are forbidden from working in the food preparation industry due to transmittable health concerns.
2482:- Citizens have the right to access, modify, restrict and delete personal data collected by organizations. 2385:, which is still in force (in amended form) after the UK's exit from the EU as "retained EU legislation". 2354: 2194:
The main legislation over personal data privacy for the personal and private sector in Switzerland is the
2075: 1827: 1820: 1597:. A constitutional bench of the Supreme Court declared 'Privacy' as a fundamental right on 24 August 2017. 1503: 1478: 827: 742: 564: 475: 318: 263: 167: 62: 4004: 3710: 2639:
their records, ensuring personal information is handled transparently and responsibly by the government.
1752:
The Act on the Protection of Personal Information Held by Incorporated Administrative Agencies (APPI-IAA)
1055:
request. The Regulation drew inspiration from the European Convention on Human Rights mentioned earlier.
6769: 6340: 6295: 6113: 5983: 5545: 5540: 5301:
Greenleaf, Graham (2012). "Independence of data privacy authorities (Part 2): Asia-Pacific experience".
4565: 3139: 2752: 2548: 1980: 1766: 1536: 1128: 702: 676: 595: 485: 480: 442: 237: 197: 184: 6209:
California Office of the Attorney General. "California Consumer Privacy Act". Retrieved April 24, 2024.
5689:"Litigation, Overview - Privacy: Public Disclosure of Private Facts or Publicity Given to Private Life" 4857: 3436: 2747: 2452:
The United Kingdom General Data Protection Regulation, is the domestic version of the European Union's
1043:, intended to replace the Privacy and Electronic Communications Directive 2002, further contributes to 964:
Federal Securities Laws: may require data security controls and data breach reporting responsibilities.
5503: 4712:"The Singapore Personal Data Protection Act and an assessment of future trends in data privacy reform" 4370: 3806: 1908: 1823:, the Malaysian Court of Appeal has not yet recognized a constitutionally protected right to privacy. 1540: 6906: 6588: 6373: 3831: 3699: 2067: 1458:, in Art. 2 para. 1, and Art. 1 para. 1. The citizens' data of Germany is mainly protected under the 1221:. Many provinces have enacted provincial legislation similar to the Privacy Act, such as the Ontario 1217: 1196: 174: 114: 2742: 1795:
are related to personal information privacy and continue to play a role in Malaysia's legal system:
6805: 6673: 6658: 6608: 6345: 5435: 5130: 3928: 3751:"Commission finds that EU personal data flows can continue with 11 third countries and territories" 3122: 3107: 2527: 2254:
A few other administrative laws also deal with communication-specific personal privacy protection:
2221: 1804: 1770: 1611: 1144: 1040: 1023:
in Strasbourg, privacy has been clearly defined and universally recognized as a fundamental right.
861: 539: 533: 492: 429: 252: 53: 6156:
Chandran, Ravi. 2000. “Privacy in Employment.” Singapore Journal of Legal Studies 2000(1):263-297.
3750: 6911: 6845: 6246: 6221:
Office of the Privacy Commissioner of Canada. "Privacy Laws in Canada". Retrieved April 24, 2024.
5523: 5276: 4940: 4731: 4175: 3382: 3331: 3117: 2711:
Final Rule on Privacy of Consumer Financial Information, 16 Code of Federal Regulations, Part 313
2532: 1498: 1426: 976:
Video Privacy Protection Act: provides privacy protections related to video rental and streaming.
782: 669: 600: 569: 460: 424: 400: 356: 139: 81: 4228: 3919: 3910: 2737: 2410: 2160:
goods and services to individuals in Sri Lanka and/or monitoring their behavior in the country.
1067:
Countries that are included in the Organisation for Economic Co-operation and Development (OECD)
970:
Gramm-Leach-Bliley Act: regulates financial institutions' use of nonpublic personal information.
6206:
Federal Trade Commission. "Protecting Consumer Privacy and Security". Retrieved April 24, 2024.
6184:
Mehta, Michael D. 2002. “Censoring Cyberspace.” Asian Journal of Social Sciences 30(2):319-338.
4366: 1710:
and Twitter, for data collection and control for any data processed outside the United States.
961:
Fair Credit Reporting Act: covers the collection and use of data contained in consumer reports.
6815: 6598: 5593: 5322: 5318: 5216: 5210: 5077: 4917: 4913: 4658: 4654: 4142: 4100: 4028:"Data protection in the Pacific: what are your obligations?" Lexology . Retrieved 1 May 2017. 3984: 3941: 3582: 3456: 3415: 2423: 2286: 2175: 1948: 1692: 1187:, a Brazilian lawyer specialized in technology, on that same date. There is a newer version. 1019: 820: 727: 722: 712: 707: 523: 502: 366: 312: 299: 247: 207: 5104: 5073: 4084: 3550: 2728: 6916: 6863: 6729: 6688: 6626: 6578: 6335: 6288: 6242: 5723: 5515: 5310: 4723: 4593: 4167: 4050: 3933: 3514: 3479: 3448: 3407: 3374: 3343: 3128: 2508:
and stay informed about developments in UK privacy law through expert analyses and updates.
2390: 2169: 2015:
processing is necessary for performance of the contract, to which an individual is a party.
1912: 1725: 1124: 717: 590: 518: 470: 419: 352: 294: 202: 179: 121: 109: 4993:"Conducting U.S. Discovery in Asia: An Overview of E-Discovery and Asian Data Privacy Laws" 4767: 2019: 6593: 6583: 4572: 4295: 4285:
Aadhaar: Indian Supreme Court Reserves Verdict On The Second-longest Hearing After 38 Days
3918:, Lecture Notes in Computer Science, vol. 2109, Springer Berlin Heidelberg, pp.  3569: 2307: 1417: 1127:
aims to protect and regulate an individual's private information. It manages and monitors
394: 323: 306: 5654:: 1119–1121, 1160–1163 – via Digital Commons @ University at Buffalo School of Law. 4750: 3411: 3302: 2317:
Some general and sector-specific aspects of privacy are regulated by the following acts:
1749:
The Act on the Protection of Personal Information Held by Administrative Organs (APPIHAO)
1706:
Ireland is also the main international location for social media platforms, specifically
5863: 3483: 2790:
infection public by telling her two co-workers about it, no longer making it intrusion.
1666:
Please help update this article to reflect recent events or newly available information.
1171:
A Brazilian citizen's privacy is protected by the country's constitution, which states:
6830: 6810: 6683: 6270: 6033: 5665: 2523: 2329: 1720: 1063: 1044: 952:
Computer Fraud and Abuse Act: prohibits the unauthorized access of protected computers.
772: 528: 410: 328: 130: 76: 71: 3185: 1488:
Like in France, data violations are considered offenses (Art. 84 GPR with § 42 BDSG).
1123:
recommended the enactment of a statutory cause of action for invasion of privacy. The
6900: 6800: 6795: 6693: 6653: 6648: 5644:"From Privacy to Publicity: The Tort of Appropriation in the Age of Mass Consumption" 5068:
Regulating Privacy: Data Protection and Public Policy in Europe and the United States
5066: 4340:"Section 72 A: Punishment for Disclosure of information in breach of lawful contract" 4264:, Ryan, Falvey & Merchant, Journal of Internet Law, Vol 15, No. 4 (October 2011). 4179: 3317: 2488:- Organizations must comply with the legal obligations when processing personal data. 2266: 2142: 1184: 737: 612: 6224:
HealthIT.gov. "Health Information Privacy Law and Policy". Retrieved April 24, 2024.
4735: 6840: 6621: 5744:"Office of Privacy and Civil Liberties | Overview of the Privacy Act: 2020 Edition" 4711: 4564:
Laws of Kenya. "The Constitution of Kenya". Kenya Embassy. Retrieved 13 April 2017
3602: 790: 777: 767: 732: 686: 272: 6227:
Columbia Global Freedom of Expression. "Jones v. Tsige". Retrieved April 24, 2024.
6215:
Library of Parliament (Canada). "Privacy Law in Canada". Retrieved April 24, 2024.
4171: 4030:
http://www.lexology.com/library/detail.aspx?g=ca9980ac-a7ca-4f97-8859-71bd23f05a92
2629:
Privacy Act of 1974 represented by Seal of the United States Department of Justice
1614:. When collecting and processing data, some of the requirements are listed below: 1299:
transparency to users about data usage and uphold the rights of Canadian citizens
5267:
Peng, Shin-Yi (2003). "Privacy and the Construction of Legal Meaning in Taiwan".
3276: 2719: 2705: 2679:
are enforced by respective state attorneys general or designated state agencies.
2020:
Data protection principles and legislation in the Russian Federation (in English)
6885: 6835: 5968: 5613: 4440: 1952: 1942:
Federal Republic of Nigeria's constitution offers its constituents the right to
1606:
The Republic of Ireland is under the Data Protection Act 1988 along with the EU
803: 643: 376: 242: 157: 6230:
Government of Canada. "Canada Anti-Spam Legislation". Retrieved April 24, 2024.
5314: 4768:"Ley Federal de ProtecciĂłn de Datos Personales en PosesiĂłn de los Particulares" 4727: 4552: 3347: 1742:
On 30 May 2003, Japan enacted a series of laws in the area of data protection:
1282:
Canadian privacy laws also interact with international frameworks, notably the
6890: 6820: 5424: 5040: 3765:"Policy Proposals for PIPEDA Reform to Address Artificial Intelligence Report" 2541: 2037: 1839: 1808: 1800: 967:
Federal Trade Commission Act: prohibits unfair or deceptive acts or practices.
808: 752: 655: 607: 277: 218: 144: 36: 5592:(2.0 ed.). Center for Computer Assisted Legal Instruction. p. 562. 4005:"Telecommunications Authority of Fiji - Telecommunications Promulgation 2008" 3937: 3476:
International Law & World Order: Weston's & Carlson's Basic Documents
3460: 3248: 6785: 6218:
DataGuidance. "Canada - Data Protection Overview". Retrieved April 24, 2024.
6063:
State of California - Department of Justice - Office of the Attorney General
5938: 5825:
State of California - Department of Justice - Office of the Attorney General
3643:
Western Hemisphere Data Protection Laws. 2012. U.S. Department of Commerce.
2344:
Law of Ukraine No. 675-VIII 'On Electronic Commerce' dated 3 September 2015.
1970: 1507: 786: 5728: 5711: 3210: 17: 4597: 3452: 2338:
Law of Ukraine No. 1280-IV 'On Telecommunications' dated 18 November 2003;
5212:
Employment Privacy Law in the European Union: Surveillance and Monitoring
4770:[Federal Law on Protection of Personal Data Held by Individuals] 3794:
Eastmond v. Canadian western Railway & Privacy Commissioner of Canada
2657:' which regulates the collection and use of consumer credit information. 2085:
There are also more specific acts for electronically stored information:
1707: 1236:
Eastmond v. Canadian Pacific Railway & Privacy Commissioner of Canada
762: 622: 385: 282: 104: 5280: 4944: 4193: 6311: 5527: 4547: 3386: 3362: 2311: 1975: 1943: 1619: 1545: 1430: 1413: 617: 585: 465: 287: 5710:
Boyd, Danah; Hargittai, Eszter; Schultz, Jason; Palfrey, John (2011).
4414: 3401: 3363:"Resolving Conflicting International Data Privacy Rules in Cyberspace" 2774:
Unreasonably Intruding Upon the Seclusion or Solitude of the Plaintiff
2686:
For additional information on Privacy laws in the United States, see:
2614:
Unreasonably intruding upon the seclusion or solitude of the plaintiff
6114:
https://www.wto.org/english/thewto_e/acc_e/vnm_e/WTACCVNM43_LEG_5.pdf
4566:
https://www.kenyaembassy.com/pdfs/the%20constitution%20of%20kenya.pdf
3739:
Version translated by Luca Belli, Lua Fergus and Laila Lorenzon, 2020
1895:
Set fines for up to $ 16,000,000 MXN in case of violation of the law.
1254: 660: 627: 5519: 5131:"Law in Sweden — DLA Piper Global Data Protection Laws of the World" 4146: 3403:
Protecting Genetic Privacy in Biobanking through Data Protection Law
3378: 1557:
Justice K. S. Puttaswamy (Retd.) and Anr. vs Union Of India And Ors.
989:
Countries that include the Asian Pacific Economic Cooperation (APEC)
923:
cameras), or any unauthorized entry onto the individual’s property.
4371:
http://www.irishstatutebook.ie/eli/2018/act/7/enacted/en/print.html
4261: 4239: 2501:
For more information about the Privacy Laws in the United Kingdom:
1506:(Article 14 and other articles) and free speech laws as well as by 6825: 6091: 6058: 6034:"Zacchini v. Scripps-Howard Broadcasting Co., 433 U.S. 562 (1977)" 5820: 5403: 5340: 4969: 4873: 4825: 4685: 4618: 4402:
European Data Protection Law: Corporate Compliance and Regulation.
4313:. Ministry of Law and Justice, Government of India. Archived from 4218:
Hong Kong Ordinances — Personal Data (Privacy) Ordinance (Cap.486)
2624: 2335:
Law of Ukraine No. 2657-XII 'On Information' dated 2 October 1992;
437: 5850: 3316:
This article incorporates text from this source, which is in the
1630:
the reason for the processing of data is the prevention of injury
1393:
Law of the People's Republic of China on the Protection of Minors
6764: 6233:
Warren and Brandeis (15 December 1890). "The Right to Privacy".
1792: 1696: 1470: 1409: 1072: 451: 44: 6284: 3332:"Five years of the APEC Privacy Framework: Failure or promise?" 4751:"Laws of Malaysia - Act 709 Personal Data Protection Act 2010" 1769:, privacy is allocated its own section. There we see that the 1646: 1555:
On 24 August 2017, a nine-judge bench of the Supreme Court in
868:
set global benchmarks, while sector-specific regulations like
4551:
Text was copied from this source, which is available under a
3534:, 2nd edition, Cambridge University Press, (2016) pp 118-123. 2618:
One of the central privacy policies concerning minors is the
1059:
Organization for Economic Co-operation and Development (OECD)
6127:"Legal Update: New Regulations in the ICT Sector in Vietnam" 5373:"Online Privacy in Thailand: Public and Strategic Awareness" 3728:
Translation of Brazil's Data Protection Law by Ronaldo Lemos
2530:, published an article called "The Right to Privacy" in the 2273:
Finally, articles 18(I),184(I), and 195(I) of the Taiwanese
1930: 1582:
and provides for the compensation of the person affected by
1204:
Personal Information Protection and Electronic Documents Act
4870:"Norton Rose Fulbright - Global Data Privacy (Philippines)" 4847:"Article III, Bill of Rights. 1987 Philippine Constitution" 4251:
The Privacy Commissioner for Personal Data Official Website
4240:
Hong Kong Department of Justice — Legal System in Hong Kong
4158:
Holloway, Donell (16 August 2016). "The Internet of Toys".
3498:"The UN Principles on Personal Data Protection and Privacy" 2544:
allowed for the deduction of a general "right to privacy".
2290:
record-keeping and data-processing done by the government.
2024: 1593:
by disclosing personal information of another person while
6280: 6252:"General Data Protection Regulation (GDPR) – Legal Text". 2526:(later a Supreme Court justice) and another young lawyer, 1570:
and added the following two sections relating to Privacy:
1284:
European Union’s General Data Protection Regulation (GDPR)
4966:"Norton Rose Fulbright - Global Data Privacy (Singapore)" 4504: 2665:
Individual states also enact their own privacy laws. The
1872:
Labuan Islamic Financial Services and Securities Act 2010
1131:
and organisations on how they hold personal information.
5400:"Norton Rose Fulbright - Global Data Privacy (Thailand)" 4682:"Norton Rose Fulbright - Global Data Privacy (Malaysia)" 2583:
Placing the plaintiff in a false light in the public eye
2239:
The right to privacy is not explicitly mentioned in the
2213:
Individual case must have consent from receivers of data
1746:
The Act on the Protection of Personal Information (APPI)
6088:"Norton Rose Fulbright - Global Data Privacy (Vietnam)" 4822:"Norton Rose Fulbright - Global Data Privacy (Nigeria)" 3657:"Data Protection (Privacy of Personal Information) Act" 3159: 2377:
Processing of personal information is regulated by the
2036:
In 2022, in the doctoral dissertation of Doctor of Law
1627:
the reason for the processing of data is for a contract
6009:"United States Court of Appeals for the Ninth Circuit" 5864:"12 U.S. Code Chapter 35 - RIGHT TO FINANCIAL PRIVACY" 5476: 5337:"Norton Rose Fulbright - Global Data Privacy (Taiwan)" 4553:
Creative Commons Attribution 4.0 International License
4194:"§ 42 BDSG – Strafvorschriften | BDSG (neu) 2018" 4077:"Online Privacy Law: France | Law Library of Congress" 2505: 1444:
Commission nationale de l'informatique et des libertés
1408:
An archipelago located in the Pacific, the country of
6874: 5847:
United States Department of Health and Human Services
4615:"Norton Rose Fulbright - Global Data Privacy (Kenya)" 2586:
Publicly disclosing private facts about the plaintiff
2029: 1697:
Organisation for Economic Cooperation and Development
1595:
providing services under the terms of lawful contract
1471:
Organisation for Economic Cooperation and Development
2365:
Article 8 of the European Convention on Human Rights
1979:
protect and safeguard the integrity of computer and
1819:. Unlike the courts in these other nations, such as 1224:
Freedom of Information and Protection of Privacy Act
1089:
International Covenant on Civil and Political Rights
1077:
International Covenant on Civil and Political Rights
6778: 6707: 6607: 6571: 6458: 6354: 6318: 5851:
Health Insurance Portability and Accountability Act
5568:
Law and Ethics for Advertising and Public Relations
4296:
Data Privacy Regime in India: IT Act and SPDI Rules
2691:
Health Insurance Portability and Accountability Act
2644:
Health Insurance Portability and Accountability Act
1290:
Privacy Rights and Obligations in Digital Platforms
876:complement state-level laws in the U.S. In Canada, 6760:International Association of Privacy Professionals 6267:2014 International Compendium of Data Privacy Laws 5065: 4455:"The Jamaica (Constitution) Order in Council 1962" 3909: 3857:Government of Canada, Innovation (19 March 2021). 3303:"Data Protection and Privacy Law: An Introduction" 3301:Research Service, Congressional (12 August 2022). 3160:"U.S. Government Accountability Office (U.S. GAO)" 2570:The tort was also influenced by the later case of 2170:Internet privacy § Internet privacy in Sweden 5683: 5681: 5679: 5677: 5675: 5247:Privacy Laws & Business International Report. 4794:"Constitution of the Federal Republic of Nigeria" 3716:Brazilian Civil Rights Framework for the Internet 2448:United Kingdom General Data Protection Regulation 2424:Privacy and Electronic Communications Regulations 2418:Privacy and Electronic Communications Regulations 2025:On-line database of the Russian laws (in Russian) 1867:Labuan Financial Services and Securities Act 2010 1278:Interaction with International Privacy Frameworks 1227:which applies to public bodies in that province. 6725:Computer Professionals for Social Responsibility 4931:Chandran, Ravi (2000). "Privacy in Employment". 4858:Republic Act No. 10173: Data Privacy Act of 2012 3688:Privacy Laws & Business International Report 1574:Section 43A, which deals with implementation of 1425:belongs to said company or through the use of a 6125:Treutler, Thomas J.; et al. (March 2016). 4477:"The Private Security Regulation Authority Act" 4457:. Ministry of Justice. 23 July 1962. p. 39 4404:Oxford, United Kingdom: Oxford University Press 3567:Jane Doe v. Australian Broadcasting Corporation 1929:Complaints about privacy are considered by the 1173: 4499: 4497: 4308:"Information Technology (Amendment) Act, 2008" 4229:Hong Kong Government Gazette Ord No.18 of 2012 3958: 3956: 3779:Somwar v. McDonald's Restaurants of Canada Ltd 3662:. Statute Law of the Bahamas. 2008. p. 29 2261:Communications Protection and Surveillance Act 1964:In Article III, Section 3, paragraph 1 of the 1343:Constitution of the People's Republic of China 6296: 5984:"Shulman v. Group W Productions, Inc. (1998)" 5015:"New Wave of Privacy Laws in the APAC Region" 4774:(in Spanish). Secretaria General. 5 July 2011 4507:. Private Security Regulation Authority. 2020 4083:. Atwill, Nicole. 5 June 2016. Archived from 3542: 3540: 2243:, but it can be protected indirectly through 2072:Statutory Bodies and Government Companies Act 1618:the subject of personal data must have given 888:Privacy laws can be broadly classified into: 828: 8: 3190:EPIC - Electronic Privacy Information Center 2862:Countries without official data privacy laws 2128:Regulation of Interception of Communications 1922:and was accepted by the Court of Appeal. In 1564:Information Technology (Amendment) Act, 2008 1527:India's data protection law is known as The 1366:Civil Code of the People's Republic of China 88:Intentional infliction of emotional distress 5770:"Health Information Privacy Law and Policy" 5371:Ramasoota, Pirongrong; et al. (2014). 3789: 3787: 1898:Set prison penalties to serious violations. 1303:Future Directions and Compliance Challenges 6303: 6289: 6281: 5795:"Protecting Consumer Privacy and Security" 5180:"The Personal Data Act — Datainspektionen" 4524: 4522: 1529:Digital Personal Data Protection Act, 2023 1261:health information is shared or accessed. 835: 821: 228:Negligent infliction of emotional distress 31: 6254:General Data Protection Regulation (GDPR) 5727: 5477:"Information Commissioner's Office (ICO)" 5377:Journal of Law, Information & Science 4045: 4043: 4041: 4039: 4037: 3927: 2454:General Data Protection Regulation (GDPR) 2210:Need of direct channels for data transfer 2137:In addition, South Africa is part of the 1780:the universal declaration of Human Rights 941:Data Protection Laws in the United States 6276:Handbook on European data protection law 6082: 6080: 6059:"California Consumer Privacy Act (CCPA)" 5821:"California Consumer Privacy Act (CCPA)" 5502:Warren and Brandeis (15 December 1890). 4997:Richmond Journal of Law & Technology 4536:. Official Journal of the European Union 4207:Article 14 of the Constitution of Hellas 3532:Social Media and Electronic Commerce Law 2620:Children's Online Privacy Protection Act 2430:marketing calls, emails, texts and faxes 2155:Personal Data Protection Act (Sri Lanka) 1998:Data protection (privacy) laws in Russia 1062: 984: 981:International legal standards on privacy 6881: 5394: 5392: 5390: 5262: 5260: 5258: 5256: 5254: 4960: 4958: 4956: 4954: 4816: 4814: 4676: 4674: 4672: 4670: 4668: 4609: 4607: 4505:"Private Security Regulation Authority" 4051:"Universal Declaration of Human Rights" 3859:"Canada's anti-spam legislation - Home" 3781:, O.J. No. 64 for a discussion on this 3406:(1 ed.). Oxford University Press. 3151: 2833:California Consumer Privacy Act of 2018 2828:(under the paragraph discussing COPPA) 2132:Provision of Communications Related Act 1877:Common law duty of bank confidentiality 750: 694: 635: 577: 510: 450: 409: 384: 351: 262: 217: 129: 96: 61: 43: 5637: 5635: 5557: 5555: 5471: 5469: 5366: 5364: 5362: 5360: 5358: 5296: 5294: 5292: 5290: 5111:. Law Library of Congress. 10 May 2017 4705: 4703: 4644: 4642: 4640: 4638: 4636: 4098: 3989:: CS1 maint: archived copy as title ( 3982: 3639: 3637: 3635: 3633: 3631: 3629: 3627: 3625: 3623: 3589:, 2009 NZIP 14 accessed 27 August 2011 2697:Right to Financial Privacy Act of 1978 2139:Southern African Development Community 2120:Protection of Personal Information Act 1852:Communications and Multimedia Act 1998 1580:sensitive personal data or information 1550:Kesavananda Bharati v. State of Kerala 1215:crown corporations is governed by the 1179:On 14 August 2018, Brazil enacted its 6740:Electronic Privacy Information Center 5041:"Implementing Data Protection in Law" 4991:Marvin, Lynn M.; et al. (2015). 4903: 4901: 4899: 4897: 4895: 4893: 4891: 4396: 4394: 4392: 3911:"Tailoring Privacy to Users' Needs 1" 3679: 3677: 3597: 3595: 3271: 3269: 3243: 3241: 3239: 3237: 3235: 3233: 3231: 3096:Electronic Communications Privacy Act 2591:intrusion into their personal lives. 2572:Loftus v. Greenwich Lithographing Co. 1985:Universal Declaration of Human Rights 1731:Universal Declaration of Human Rights 1624:the data is in the subject's interest 855:Universal Declaration of Human Rights 7: 5889:"Security Breach Notification Chart" 5072:. Cornell University Press. p.  4749:Parliament of Malaysia (June 2010). 2748:Computer Fraud and Abuse Act of 1986 2702:Financial Services Modernization Act 2563:Roberson v. Rochester Folding Box Co 2463:Key aspects of the UK GDPR include: 1966:1987 Constitution of the Philippines 1691:In addition, Ireland is part of the 1181:General Personal Data Protection Law 6720:Center for Democracy and Technology 5914:"Security Breach Notification Laws" 4384:Global data protection legislation, 4160:Communication Research and Practice 3832:"Canada - Data Protection Overview" 3484:10.1163/2211-4394_rwilwo_com_033375 2361:European Convention on Human Rights 1862:Islamic Financial Services Act 2013 1016:European Convention on Human Rights 5303:Computer Law & Security Review 4933:Singapore Journal of Legal Studies 4910:Singapore Journal of Legal Studies 4716:Computer Law & Security Review 4482:. Ministry of Justice. 3 June 1992 3412:10.1093/oso/9780192896476.001.0001 3336:Computer Law & Security Review 3330:Greenleaf, Graham (January 2009). 3102:General Data Protection Regulation 2725:Fair Debt Collection Practices Act 2383:General Data Protection Regulation 2216:Disclosure is accessible to public 1608:General Data Protection Regulation 1391:Further information (in Chinese): 1052:General Data Protection Regulation 25: 5868:LII / Legal Information Institute 5620:. Wex Definitions Team. June 2022 5618:LII / Legal Information Institute 5436:Data Protection Laws of the world 4382:Hayes, Mason, Curran, "Ireland." 4373:2018-07-20. Retrieved 2020-10-24. 3281:LII / Legal Information Institute 3253:LII / Legal Information Institute 3215:LII / Legal Information Institute 2518:Privacy laws of the United States 2433:cookies and tracking technologies 2369:necessary in a democratic society 1249:Implications for Specific Sectors 1000:Asia-Pacific Economic Cooperation 994:Asia-Pacific Economic Cooperation 6884: 6859: 6858: 6326:Right of access to personal data 5691:. Bloomberg Law. 15 January 2022 5383:: 97–136 – via HeinOnline. 4546: 4262:Regulation of the Cloud in India 3400:Hallinan, Dara (11 March 2021). 3361:Reidenberg, Joel R. (May 2000). 3311: 3090:Data protection and privacy laws 2363:, the United Kingdom adheres to 2265:Additionally, chapter 28 of the 1811:. In recent years, however, the 1651: 1568:Information Technology Act, 2000 1143:The Bahamas is also a member of 1121:Australian Law Reform Commission 802: 5156:"Personal Data Act (1998:204);" 4651:Melbourne University Law Review 3884:"Canada's Federal Privacy Laws" 2734:Driver's Privacy Protection Act 2667:California Consumer Privacy Act 2486:Legal Basis for Data Processing 2182:) that implemented the 1995 EU 1429:of the company, or when making 1387:Law on the Protection of Minors 1265:Case Law and Regulatory Actions 554:Ex turpi causa non oritur actio 6735:Electronic Frontier Foundation 6715:American Civil Liberties Union 6669:Privacy-enhancing technologies 5135:www.dlapiperdataprotection.com 4586:International Data Privacy Law 3441:International Data Privacy Law 3437:"Privacy: The new generations" 2810: 2241:Republic of China Constitution 1591:wrongful loss or wrongful gain 1584:wrongful loss or wrongful gain 884:Classification of privacy laws 1: 6094:. July 2014. pp. 194–195 4688:. July 2014. pp. 184–185 4172:10.1080/22041451.2016.1266124 2492:Accountability and Compliance 2196:Swiss Federal Protection Act, 1643:Electronic Privacy Protection 1576:reasonable security practices 1539:. In June 2011, India passed 664:(term used for torts in some 5186:(in Swedish). Archived from 5105:"Online Privacy Law: Sweden" 4386:Linklaters, 2016, p. 129-134 3811:Global Freedom of Expression 3435:Tene, O. (1 February 2011). 2480:Rights of Data Accessibility 1636:Data Protection Commissioner 1531:, the Right to Privacy is a 6460:Data protection authorities 5562:Senat, Joey (Spring 2005). 2411:Data Protection Act of 2018 2405:Data Protection Act of 2018 2095:National Computer Board Act 2092:Electronic Transactions Act 1857:Financial Services Act 2013 1460:Federal Data Protection Act 1147:, the Caribbean Community. 560:Joint and several liability 6933: 6664:Social networking services 5590:Torts: Cases & Context 5564:"Appropriation in General" 5315:10.1016/j.clsr.2012.01.002 5064:Bennett, Colin J. (1992). 4728:10.1016/j.clsr.2013.07.010 4400:Kuner, Christopher. 2007. 4367:"Data Protection Act 2018" 4274:Aadhaar Card Privacy issue 3572:, County Court of Victoria 3348:10.1016/j.clsr.2008.12.002 2720:15 U.S. Code §§ 1681-1681u 2538:United States Constitution 2515: 2371:towards a legitimate aim. 2352: 2167: 2152: 1995: 1390: 1363: 1340: 1194: 1157:Freedom of Information Act 1111: 334:Comparative responsibility 6854: 6755:Global Network Initiative 6699:Virtual assistant privacy 6679:Privacy-invasive software 5845:Office for Civil Rights, 5642:Barbas, Samantha (2013). 5209:Castro, Catarina (2002). 3553: (10 December 2008), 3084:Data Protection Directive 2811:Websites' Data Collection 2743:Clinger-Cohen Act of 1996 2716:Fair Credit Reporting Act 2706:15 U.S. Code §§ 6801–6810 2655:Fair Credit Reporting Act 2536:in 1890 arguing that the 2474:Data Breach Notifications 2184:Data Protection Directive 1847:Official Secrets Act 1972 1660:This section needs to be 1114:Privacy in Australian law 1037:Data Protection Directive 649:Non-economic damages caps 5799:Federal Trade Commission 5406:. July 2014. p. 193 5343:. July 2014. p. 192 5269:The International Lawyer 4972:. July 2014. p. 189 4876:. July 2014. p. 188 4828:. July 2014. p. 125 4710:Chik, Warren B. (2013). 4621:. July 2014. p. 121 3938:10.1007/3-540-44566-8_52 3135:Regulation of algorithms 3078:Data Protection Act 1998 2903:Central African Republic 2753:E-Government Act of 2002 2651:Federal Trade Commission 2398:Wainwright v Home Office 2379:Data Protection Act 2018 2002:Applicable legislation: 682:Private attorney general 636:Other topics in tort law 264:Principles of negligence 193:Alienation of affections 6750:Future of Privacy Forum 6745:European Digital Rights 6256:. Retrieved 2024-04-27. 5184:www.datainspektionen.se 5003:– via HeinOnline. 3551:[2008] VSCA 236 3307:crsreports.congress.gov 3113:Information Privacy Law 2381:, supplementing the EU 2323:Constitution of Ukraine 2245:judicial interpretation 1639:registration annually. 1541:subordinate legislation 1456:Constitution of Germany 1376:Privacy of the deceased 1201:In Canada, the federal 1103:Privacy laws by country 547:Volenti non fit injuria 372:Ultrahazardous activity 339:Contributory negligence 6791:Cellphone surveillance 6708:Advocacy organizations 6331:Expectation of privacy 5729:10.5210/fm.v16i11.3850 5588:Johnson, Eric (2019). 5543:, "Privacy" (1960) 48 5504:"The Right to Privacy" 4105:: CS1 maint: others ( 3908:Kobsa, Alfred (2001), 3515:[2003] QDC 151 2738:18 U.S.C. §§ 2721–2725 2729:15 U.S.C. §§ 1692-1692 2674:Enforcement and Impact 2630: 2355:Privacy in English law 2258:Telecommunications Act 2081:Telecommunications Act 2076:Central Provident Fund 1981:communications systems 1817:Malaysian Constitution 1721:private security guard 1504:Constitution of Greece 1479:Federal Network Agency 1401: 1384: 1373: 1357: 1239:Canada's Supreme Court 1209:EU data protection law 1177: 1068: 990: 565:Market share liability 498:Shopkeeper's privilege 476:Statute of limitations 319:Restitutio ad integrum 168:Intrusion on seclusion 63:Trespass to the person 6770:Privacy International 6341:Right to be forgotten 6134:Tilleke & Gibbins 5546:California Law Review 5541:William Lloyd Prosser 3557:(Vic, Australia). 3521:(Qld, Australia). 3140:Right to be forgotten 2642:Enacted in 1996, the 2628: 2549:William Lloyd Prosser 2436:secure communications 2330:Civil Code of Ukraine 2089:Spam Control Act 2007 1821:India's Supreme Court 1396: 1379: 1369: 1346: 1326:National Security Law 1129:Australian Government 1066: 1047:privacy regulations. 1018:, established by the 988: 677:Conflict of tort laws 443:Tortious interference 198:Criminal conversation 185:Malicious prosecution 4571:4 March 2016 at the 3050:United Arab Emirates 2634:Federal Privacy Laws 2068:Official Secrets Act 1932:Privacy Commissioner 1907:In New Zealand, the 1828:Malaysian Parliament 1797:breach of confidence 1566:made changes to the 1197:Canadian privacy law 1050:On 25 May 2018, the 916:corporate entities. 175:Breach of confidence 6806:Global surveillance 6674:Privacy engineering 6659:Personal identifier 6609:Information privacy 6346:Post-mortem privacy 4798:www.nigeria-law.org 4598:10.1093/idpl/ips031 4087:on 23 November 2014 3863:ised-isde.canada.ca 3453:10.1093/idpl/ipq003 3367:Stanford Law Review 3186:"U.S. Privacy Laws" 3123:Privacy Act of 1974 3108:Information Privacy 2831:In California, the 2528:Samuel D. Warren II 2506:https://ico.org.uk/ 2359:As a member of the 2222:European Commission 2180:Personuppgiftslagen 2098:Computer Misuse Act 1805:malicious falsehood 1083:United Nations (UN) 1041:ePrivacy Regulation 1031:European Union (EU) 862:Privacy Act of 1974 670:mixed legal systems 540:Respondeat superior 534:Vicarious liability 493:Defence of property 430:Insurance bad faith 344:Attractive nuisance 163:Invasion of privacy 6846:Personality rights 6245::10.2307/1321160. 6235:Harvard Law Review 5964:"Staph Infections" 5648:Buffalo Law Review 5508:Harvard Law Review 5215:. Intersentia nv. 3971:on 6 February 2016 3916:User Modeling 2001 3547:Giller v Procopets 3118:Personality rights 3059:Vatican (Holy See) 2661:State Privacy Laws 2631: 2533:Harvard Law Review 1826:In June 2010, the 1499:street photography 1087:Article 17 of the 1069: 991: 570:Transferred intent 461:Assumption of risk 425:Restraint of trade 401:Rylands v Fletcher 233:Employment-related 82:False imprisonment 6872: 6871: 6816:Mass surveillance 5939:"ts jurisdiction" 5827:. 15 October 2018 5750:. 14 October 2020 5019:Morrison Foerster 4534:eur-lex.europa.eu 4356:. 24 August 2017. 3838:. 26 January 2024 3777:See for example, 3603:"The Privacy Act" 3587:978-1-877316-67-8 3500:. 4 January 2019. 3421:978-0-19-289647-6 2924:Equatorial Guinea 1924:Rogers v TVNZ Ltd 1920:Hosking v Runting 1771:Kenyan government 1693:Council of Europe 1681: 1680: 1634:Specifically the 1533:fundamental right 1483:Bundesnetzagentur 1330:Cybersecurity Law 1020:Council of Europe 1014:Article 8 of the 1010:Council of Europe 845: 844: 718:England and Wales 673: 524:Last clear chance 519:Intentional torts 503:Neutral reportage 486:Defense of others 434: 367:Product liability 313:Res ipsa loquitur 300:Reasonable person 208:Breach of promise 57: 16:(Redirected from 6924: 6889: 6888: 6880: 6862: 6861: 6730:Data Privacy Lab 6689:Privacy software 6336:Right to privacy 6305: 6298: 6291: 6282: 6138: 6137: 6131: 6122: 6116: 6110: 6104: 6103: 6101: 6099: 6084: 6075: 6074: 6072: 6070: 6055: 6049: 6048: 6046: 6044: 6030: 6024: 6023: 6021: 6019: 6013: 6005: 5999: 5998: 5996: 5994: 5980: 5974: 5973: 5972:. 25 April 2024. 5960: 5954: 5953: 5951: 5949: 5935: 5929: 5928: 5926: 5924: 5910: 5904: 5903: 5901: 5899: 5885: 5879: 5878: 5876: 5874: 5860: 5854: 5843: 5837: 5836: 5834: 5832: 5817: 5811: 5810: 5808: 5806: 5791: 5785: 5784: 5782: 5780: 5774:www.healthit.gov 5766: 5760: 5759: 5757: 5755: 5740: 5734: 5733: 5731: 5707: 5701: 5700: 5698: 5696: 5685: 5670: 5669: 5662: 5656: 5655: 5639: 5630: 5629: 5627: 5625: 5610: 5604: 5603: 5585: 5579: 5578: 5576: 5574: 5559: 5550: 5538: 5532: 5531: 5499: 5493: 5492: 5490: 5488: 5473: 5464: 5463: 5461: 5459: 5448:"What are PECR?" 5444: 5438: 5433: 5427: 5422: 5416: 5415: 5413: 5411: 5396: 5385: 5384: 5368: 5353: 5352: 5350: 5348: 5333: 5327: 5326: 5298: 5285: 5284: 5275:(4): 1037–1054. 5264: 5249: 5240: 5234: 5233: 5231: 5229: 5206: 5200: 5199: 5197: 5195: 5176: 5170: 5169: 5167: 5165: 5160: 5152: 5146: 5145: 5143: 5141: 5127: 5121: 5120: 5118: 5116: 5101: 5095: 5094: 5092: 5090: 5071: 5061: 5055: 5054: 5052: 5050: 5045: 5036: 5030: 5029: 5027: 5025: 5011: 5005: 5004: 4988: 4982: 4981: 4979: 4977: 4962: 4949: 4948: 4928: 4922: 4921: 4905: 4886: 4885: 4883: 4881: 4866: 4860: 4855: 4849: 4844: 4838: 4837: 4835: 4833: 4818: 4809: 4808: 4806: 4804: 4790: 4784: 4783: 4781: 4779: 4773: 4764: 4758: 4757: 4755: 4746: 4740: 4739: 4707: 4698: 4697: 4695: 4693: 4678: 4663: 4662: 4646: 4631: 4630: 4628: 4626: 4611: 4602: 4601: 4581: 4575: 4562: 4556: 4550: 4545: 4543: 4541: 4526: 4517: 4516: 4514: 4512: 4501: 4492: 4491: 4489: 4487: 4481: 4473: 4467: 4466: 4464: 4462: 4451: 4445: 4444: 4439:. Archived from 4433:"Privacy Policy" 4429: 4423: 4422: 4415:"Privacy Policy" 4411: 4405: 4398: 4387: 4380: 4374: 4364: 4358: 4357: 4350: 4344: 4343: 4336: 4330: 4329: 4327: 4325: 4319: 4312: 4304: 4298: 4293: 4287: 4282: 4276: 4271: 4265: 4259: 4253: 4248: 4242: 4237: 4231: 4226: 4220: 4215: 4209: 4204: 4198: 4197: 4190: 4184: 4183: 4155: 4149: 4139: 4133: 4132: 4131: 4129: 4117: 4111: 4110: 4104: 4096: 4094: 4092: 4073: 4067: 4066: 4064: 4062: 4057:. 6 October 2015 4047: 4032: 4026: 4020: 4019: 4017: 4015: 4001: 3995: 3994: 3988: 3980: 3978: 3976: 3967:. Archived from 3960: 3951: 3950: 3931: 3913: 3905: 3899: 3898: 3896: 3894: 3880: 3874: 3873: 3871: 3869: 3854: 3848: 3847: 3845: 3843: 3828: 3822: 3821: 3819: 3817: 3807:"Jones v. Tsige" 3803: 3797: 3791: 3782: 3775: 3769: 3768: 3767:. November 2020. 3761: 3755: 3754: 3747: 3741: 3736: 3730: 3725: 3719: 3708: 3702: 3697: 3691: 3681: 3672: 3671: 3669: 3667: 3661: 3653: 3647: 3641: 3618: 3617: 3615: 3613: 3599: 3590: 3579: 3573: 3564: 3558: 3544: 3535: 3528: 3522: 3508: 3502: 3501: 3494: 3488: 3487: 3471: 3465: 3464: 3432: 3426: 3425: 3397: 3391: 3390: 3373:(5): 1315–1371. 3358: 3352: 3351: 3327: 3321: 3315: 3314: 3310: 3298: 3292: 3291: 3289: 3287: 3277:"fiduciary duty" 3273: 3264: 3263: 3261: 3259: 3245: 3226: 3225: 3223: 3221: 3207: 3201: 3200: 3198: 3196: 3182: 3176: 3175: 3173: 3171: 3156: 3129:Privacy Act 1988 3104:(European Union) 3086:(European Union) 3080:(United Kingdom) 3008:Papua New Guinea 2793:The court said: 2391:Kaye v Robertson 2115:privacy so far. 1913:Privacy Act 2020 1909:Privacy Act 1993 1726:Customer service 1676: 1673: 1667: 1655: 1654: 1647: 1562:Previously, the 1125:Privacy Act 1988 837: 830: 823: 807: 806: 663: 432: 295:Standard of care 180:Abuse of process 90: 51: 32: 21: 6932: 6931: 6927: 6926: 6925: 6923: 6922: 6921: 6897: 6896: 6895: 6883: 6875: 6873: 6868: 6850: 6774: 6703: 6603: 6567: 6454: 6448:amended in 2020 6350: 6314: 6309: 6263: 6141: 6129: 6124: 6123: 6119: 6111: 6107: 6097: 6095: 6086: 6085: 6078: 6068: 6066: 6065:. 13 March 2024 6057: 6056: 6052: 6042: 6040: 6032: 6031: 6027: 6017: 6015: 6011: 6007: 6006: 6002: 5992: 5990: 5982: 5981: 5977: 5962: 5961: 5957: 5947: 5945: 5937: 5936: 5932: 5922: 5920: 5912: 5911: 5907: 5897: 5895: 5887: 5886: 5882: 5872: 5870: 5862: 5861: 5857: 5844: 5840: 5830: 5828: 5819: 5818: 5814: 5804: 5802: 5801:. 5 August 2013 5793: 5792: 5788: 5778: 5776: 5768: 5767: 5763: 5753: 5751: 5748:www.justice.gov 5742: 5741: 5737: 5709: 5708: 5704: 5694: 5692: 5687: 5686: 5673: 5664: 5663: 5659: 5641: 5640: 5633: 5623: 5621: 5614:"appropriation" 5612: 5611: 5607: 5600: 5587: 5586: 5582: 5572: 5570: 5561: 5560: 5553: 5539: 5535: 5520:10.2307/1321160 5501: 5500: 5496: 5486: 5484: 5483:. 26 April 2024 5475: 5474: 5467: 5457: 5455: 5446: 5445: 5441: 5434: 5430: 5423: 5419: 5409: 5407: 5398: 5397: 5388: 5370: 5369: 5356: 5346: 5344: 5335: 5334: 5330: 5300: 5299: 5288: 5266: 5265: 5252: 5241: 5237: 5227: 5225: 5223: 5208: 5207: 5203: 5193: 5191: 5178: 5177: 5173: 5163: 5161: 5158: 5154: 5153: 5149: 5139: 5137: 5129: 5128: 5124: 5114: 5112: 5103: 5102: 5098: 5088: 5086: 5084: 5063: 5062: 5058: 5048: 5046: 5043: 5038: 5037: 5033: 5023: 5021: 5013: 5012: 5008: 4990: 4989: 4985: 4975: 4973: 4964: 4963: 4952: 4930: 4929: 4925: 4907: 4906: 4889: 4879: 4877: 4868: 4867: 4863: 4856: 4852: 4845: 4841: 4831: 4829: 4820: 4819: 4812: 4802: 4800: 4792: 4791: 4787: 4777: 4775: 4771: 4766: 4765: 4761: 4753: 4748: 4747: 4743: 4709: 4708: 4701: 4691: 4689: 4680: 4679: 4666: 4648: 4647: 4634: 4624: 4622: 4613: 4612: 4605: 4583: 4582: 4578: 4573:Wayback Machine 4563: 4559: 4539: 4537: 4528: 4527: 4520: 4510: 4508: 4503: 4502: 4495: 4485: 4483: 4479: 4475: 4474: 4470: 4460: 4458: 4453: 4452: 4448: 4443:on 14 May 2013. 4431: 4430: 4426: 4413: 4412: 4408: 4399: 4390: 4381: 4377: 4365: 4361: 4352: 4351: 4347: 4338: 4337: 4333: 4323: 4321: 4317: 4310: 4306: 4305: 4301: 4294: 4290: 4283: 4279: 4272: 4268: 4260: 4256: 4249: 4245: 4238: 4234: 4227: 4223: 4216: 4212: 4205: 4201: 4192: 4191: 4187: 4157: 4156: 4152: 4140: 4136: 4127: 4125: 4119: 4118: 4114: 4097: 4090: 4088: 4075: 4074: 4070: 4060: 4058: 4049: 4048: 4035: 4027: 4023: 4013: 4011: 4003: 4002: 3998: 3981: 3974: 3972: 3965:"Archived copy" 3963: 3961: 3954: 3948: 3907: 3906: 3902: 3892: 3890: 3882: 3881: 3877: 3867: 3865: 3856: 3855: 3851: 3841: 3839: 3830: 3829: 3825: 3815: 3813: 3805: 3804: 3800: 3792: 3785: 3776: 3772: 3763: 3762: 3758: 3749: 3748: 3744: 3737: 3733: 3726: 3722: 3709: 3705: 3698: 3694: 3682: 3675: 3665: 3663: 3659: 3655: 3654: 3650: 3642: 3621: 3611: 3609: 3601: 3600: 3593: 3580: 3576: 3565: 3561: 3555:Court of Appeal 3545: 3538: 3530:Alan Davidson, 3529: 3525: 3511:Grosse v Purvis 3509: 3505: 3496: 3495: 3491: 3473: 3472: 3468: 3434: 3433: 3429: 3422: 3399: 3398: 3394: 3379:10.2307/1229516 3360: 3359: 3355: 3329: 3328: 3324: 3312: 3300: 3299: 3295: 3285: 3283: 3275: 3274: 3267: 3257: 3255: 3247: 3246: 3229: 3219: 3217: 3209: 3208: 3204: 3194: 3192: 3184: 3183: 3179: 3169: 3167: 3166:. 26 April 2024 3158: 3157: 3153: 3149: 3144: 3125:(United States) 3098:(United States) 3073: 3068: 2864: 2851: 2842: 2822: 2813: 2802: 2776: 2676: 2663: 2636: 2520: 2514: 2468:Data Protection 2450: 2420: 2407: 2357: 2351: 2308:data protection 2304: 2283: 2237: 2192: 2172: 2166: 2157: 2151: 2105: 2047: 2000: 1994: 1962: 1940: 1905: 1885: 1813:Court of Appeal 1789: 1762: 1740: 1716: 1677: 1671: 1668: 1665: 1656: 1652: 1645: 1604: 1525: 1516: 1494: 1452: 1439: 1418:confidentiality 1406: 1395: 1389: 1378: 1368: 1362: 1345: 1339: 1318: 1305: 1292: 1280: 1267: 1251: 1199: 1193: 1169: 1153: 1137: 1116: 1110: 1105: 1085: 1061: 1033: 1012: 996: 983: 943: 886: 841: 801: 695:By jurisdiction 395:Public nuisance 324:Rescue doctrine 307:Proximate cause 219:Negligent torts 131:Dignitary torts 86: 28: 23: 22: 15: 12: 11: 5: 6930: 6928: 6920: 6919: 6914: 6909: 6899: 6898: 6894: 6893: 6870: 6869: 6867: 6866: 6855: 6852: 6851: 6849: 6848: 6843: 6838: 6833: 6831:Search warrant 6828: 6823: 6818: 6813: 6811:Identity theft 6808: 6803: 6798: 6793: 6788: 6782: 6780: 6776: 6775: 6773: 6772: 6767: 6762: 6757: 6752: 6747: 6742: 6737: 6732: 6727: 6722: 6717: 6711: 6709: 6705: 6704: 6702: 6701: 6696: 6691: 6686: 6684:Privacy policy 6681: 6676: 6671: 6666: 6661: 6656: 6651: 6646: 6645: 6644: 6639: 6634: 6624: 6619: 6613: 6611: 6605: 6604: 6602: 6601: 6596: 6591: 6586: 6581: 6575: 6573: 6569: 6568: 6566: 6565: 6563:United Kingdom 6560: 6555: 6550: 6545: 6540: 6535: 6530: 6525: 6520: 6515: 6510: 6505: 6500: 6495: 6490: 6485: 6480: 6478:European Union 6475: 6470: 6464: 6462: 6456: 6455: 6453: 6452: 6451: 6450: 6436: 6434:United Kingdom 6431: 6426: 6421: 6416: 6411: 6406: 6401: 6396: 6394:European Union 6391: 6386: 6381: 6376: 6371: 6366: 6360: 6358: 6352: 6351: 6349: 6348: 6343: 6338: 6333: 6328: 6322: 6320: 6316: 6315: 6310: 6308: 6307: 6300: 6293: 6285: 6279: 6278: 6273: 6271:BakerHostetler 6269:, provided by 6262: 6261:External links 6259: 6258: 6257: 6250: 6241:(5): 193–220. 6231: 6228: 6225: 6222: 6219: 6216: 6213: 6210: 6207: 6204: 6201: 6198: 6194: 6191: 6188: 6185: 6182: 6179: 6176: 6173: 6170: 6167: 6164: 6163:29(5):554-575. 6160: 6157: 6154: 6151: 6148: 6145: 6140: 6139: 6117: 6105: 6076: 6050: 6025: 6014:. 18 June 2018 6000: 5975: 5955: 5930: 5905: 5880: 5855: 5838: 5812: 5786: 5761: 5735: 5702: 5671: 5657: 5631: 5605: 5598: 5580: 5551: 5533: 5514:(5): 193–220. 5494: 5465: 5439: 5428: 5417: 5386: 5354: 5328: 5309:(2): 121–129. 5286: 5250: 5235: 5221: 5201: 5171: 5147: 5122: 5096: 5083:978-0801480102 5082: 5056: 5031: 5006: 4983: 4950: 4923: 4887: 4861: 4850: 4839: 4810: 4785: 4759: 4741: 4722:(5): 554–575. 4699: 4664: 4632: 4603: 4576: 4557: 4518: 4493: 4468: 4446: 4424: 4406: 4388: 4375: 4359: 4345: 4331: 4320:on 7 June 2012 4299: 4288: 4277: 4266: 4254: 4243: 4232: 4221: 4210: 4199: 4185: 4166:(4): 506–519. 4150: 4134: 4112: 4068: 4033: 4021: 4009:www.taf.org.fj 3996: 3952: 3946: 3929:10.1.1.29.1262 3900: 3875: 3849: 3823: 3798: 3796:, 11 June 2004 3783: 3770: 3756: 3742: 3731: 3720: 3703: 3692: 3673: 3648: 3619: 3591: 3574: 3559: 3536: 3523: 3519:District Court 3503: 3489: 3466: 3427: 3420: 3392: 3353: 3322: 3293: 3265: 3227: 3202: 3177: 3150: 3148: 3145: 3143: 3142: 3137: 3132: 3126: 3120: 3115: 3110: 3105: 3099: 3093: 3087: 3081: 3074: 3072: 3069: 3067: 3066: 3063: 3060: 3057: 3054: 3051: 3048: 3045: 3042: 3039: 3036: 3033: 3030: 3027: 3024: 3021: 3018: 3015: 3012: 3009: 3006: 3003: 3000: 2997: 2994: 2991: 2988: 2985: 2982: 2979: 2976: 2973: 2970: 2967: 2964: 2961: 2958: 2955: 2952: 2949: 2946: 2943: 2940: 2937: 2934: 2931: 2928: 2925: 2922: 2919: 2916: 2913: 2910: 2907: 2904: 2901: 2898: 2895: 2892: 2889: 2886: 2883: 2880: 2877: 2874: 2870: 2863: 2860: 2850: 2847: 2841: 2838: 2821: 2818: 2812: 2809: 2801: 2798: 2775: 2772: 2771: 2770: 2766: 2763: 2756: 2755: 2750: 2745: 2740: 2731: 2722: 2713: 2708: 2699: 2694: 2675: 2672: 2662: 2659: 2635: 2632: 2616: 2615: 2612: 2608: 2607:objectionable. 2604: 2600: 2588: 2587: 2584: 2581: 2580: 2579: 2575: 2568: 2524:Louis Brandeis 2516:Main article: 2513: 2510: 2496: 2495: 2489: 2483: 2477: 2471: 2449: 2446: 2441: 2440: 2437: 2434: 2431: 2419: 2416: 2406: 2403: 2402: 2401: 2394: 2353:Main article: 2350: 2349:United Kingdom 2347: 2346: 2345: 2342: 2339: 2336: 2333: 2326: 2303: 2300: 2282: 2279: 2263: 2262: 2259: 2236: 2233: 2218: 2217: 2214: 2211: 2191: 2188: 2165: 2162: 2153:Main article: 2150: 2147: 2104: 2101: 2100: 2099: 2096: 2093: 2090: 2083: 2082: 2079: 2073: 2070: 2065: 2064:Statistics Act 2062: 2046: 2043: 2042: 2041: 2033: 2032: 2027: 2022: 2012: 2011: 2007: 1996:Main article: 1993: 1990: 1961: 1958: 1939: 1936: 1904: 1901: 1900: 1899: 1896: 1893: 1884: 1881: 1880: 1879: 1874: 1869: 1864: 1859: 1854: 1849: 1788: 1785: 1761: 1758: 1754: 1753: 1750: 1747: 1739: 1736: 1715: 1712: 1679: 1678: 1659: 1657: 1650: 1644: 1641: 1632: 1631: 1628: 1625: 1622: 1603: 1600: 1599: 1598: 1587: 1524: 1521: 1515: 1512: 1493: 1490: 1451: 1448: 1438: 1435: 1405: 1402: 1388: 1385: 1377: 1374: 1364:Main article: 1361: 1358: 1341:Main article: 1338: 1335: 1317: 1314: 1304: 1301: 1291: 1288: 1279: 1276: 1271:Jones v. Tsige 1266: 1263: 1250: 1247: 1195:Main article: 1192: 1189: 1168: 1165: 1152: 1149: 1136: 1133: 1112:Main article: 1109: 1106: 1104: 1101: 1084: 1081: 1060: 1057: 1032: 1029: 1011: 1008: 995: 992: 982: 979: 978: 977: 974: 971: 968: 965: 962: 959: 956: 953: 950: 947: 942: 939: 903: 902: 899: 896: 893: 885: 882: 843: 842: 840: 839: 832: 825: 817: 814: 813: 812: 811: 809:Law portal 796: 795: 794: 793: 780: 775: 770: 765: 757: 756: 748: 747: 746: 745: 740: 735: 730: 725: 723:European Union 720: 715: 710: 705: 697: 696: 692: 691: 690: 689: 684: 679: 674: 658: 653: 652: 651: 638: 637: 633: 632: 631: 630: 625: 620: 615: 610: 605: 604: 603: 598: 593: 580: 579: 575: 574: 573: 572: 567: 562: 557: 550: 543: 536: 531: 529:Eggshell skull 526: 521: 513: 512: 508: 507: 506: 505: 500: 495: 490: 489: 488: 478: 473: 468: 463: 455: 454: 448: 447: 446: 445: 440: 435: 433:(American law) 427: 422: 414: 413: 411:Economic torts 407: 406: 405: 404: 397: 389: 388: 382: 381: 380: 379: 374: 369: 361: 360: 349: 348: 347: 346: 341: 336: 331: 329:Duty to rescue 326: 321: 316: 309: 304: 303: 302: 292: 291: 290: 285: 280: 267: 266: 260: 259: 258: 257: 256: 255: 250: 240: 235: 230: 222: 221: 215: 214: 213: 212: 211: 210: 205: 200: 195: 187: 182: 177: 172: 171: 170: 160: 155: 154: 153: 150: 142: 134: 133: 127: 126: 125: 124: 119: 118: 117: 112: 99: 98: 97:Property torts 94: 93: 92: 91: 84: 79: 74: 66: 65: 59: 58: 48: 47: 41: 40: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 6929: 6918: 6915: 6913: 6910: 6908: 6905: 6904: 6902: 6892: 6887: 6882: 6878: 6865: 6857: 6856: 6853: 6847: 6844: 6842: 6839: 6837: 6834: 6832: 6829: 6827: 6824: 6822: 6819: 6817: 6814: 6812: 6809: 6807: 6804: 6802: 6801:Eavesdropping 6799: 6797: 6796:Data security 6794: 6792: 6789: 6787: 6784: 6783: 6781: 6777: 6771: 6768: 6766: 6763: 6761: 6758: 6756: 6753: 6751: 6748: 6746: 6743: 6741: 6738: 6736: 6733: 6731: 6728: 6726: 6723: 6721: 6718: 6716: 6713: 6712: 6710: 6706: 6700: 6697: 6695: 6694:Secret ballot 6692: 6690: 6687: 6685: 6682: 6680: 6677: 6675: 6672: 6670: 6667: 6665: 6662: 6660: 6657: 6655: 6654:Personal data 6652: 6650: 6647: 6643: 6640: 6638: 6635: 6633: 6630: 6629: 6628: 6625: 6623: 6620: 6618: 6615: 6614: 6612: 6610: 6606: 6600: 6597: 6595: 6592: 6590: 6587: 6585: 6582: 6580: 6577: 6576: 6574: 6570: 6564: 6561: 6559: 6556: 6554: 6551: 6549: 6546: 6544: 6541: 6539: 6536: 6534: 6531: 6529: 6526: 6524: 6521: 6519: 6516: 6514: 6511: 6509: 6506: 6504: 6501: 6499: 6496: 6494: 6491: 6489: 6486: 6484: 6481: 6479: 6476: 6474: 6471: 6469: 6466: 6465: 6463: 6461: 6457: 6449: 6445: 6442: 6441: 6440: 6439:United States 6437: 6435: 6432: 6430: 6427: 6425: 6422: 6420: 6417: 6415: 6412: 6410: 6407: 6405: 6402: 6400: 6397: 6395: 6392: 6390: 6387: 6385: 6382: 6380: 6377: 6375: 6372: 6370: 6367: 6365: 6362: 6361: 6359: 6357: 6353: 6347: 6344: 6342: 6339: 6337: 6334: 6332: 6329: 6327: 6324: 6323: 6321: 6317: 6313: 6306: 6301: 6299: 6294: 6292: 6287: 6286: 6283: 6277: 6274: 6272: 6268: 6265: 6264: 6260: 6255: 6251: 6248: 6244: 6240: 6236: 6232: 6229: 6226: 6223: 6220: 6217: 6214: 6211: 6208: 6205: 6202: 6199: 6195: 6192: 6189: 6186: 6183: 6180: 6177: 6174: 6171: 6168: 6165: 6161: 6158: 6155: 6152: 6149: 6146: 6143: 6142: 6135: 6128: 6121: 6118: 6115: 6109: 6106: 6093: 6089: 6083: 6081: 6077: 6064: 6060: 6054: 6051: 6039: 6035: 6029: 6026: 6010: 6004: 6001: 5989: 5985: 5979: 5976: 5971: 5970: 5965: 5959: 5956: 5944: 5943:Threat Sketch 5940: 5934: 5931: 5919: 5915: 5909: 5906: 5894: 5890: 5884: 5881: 5869: 5865: 5859: 5856: 5852: 5848: 5842: 5839: 5826: 5822: 5816: 5813: 5800: 5796: 5790: 5787: 5775: 5771: 5765: 5762: 5749: 5745: 5739: 5736: 5730: 5725: 5721: 5717: 5713: 5706: 5703: 5690: 5684: 5682: 5680: 5678: 5676: 5672: 5667: 5666:"False Light" 5661: 5658: 5653: 5649: 5645: 5638: 5636: 5632: 5619: 5615: 5609: 5606: 5601: 5599:9780970582515 5595: 5591: 5584: 5581: 5569: 5565: 5558: 5556: 5552: 5548: 5547: 5542: 5537: 5534: 5529: 5525: 5521: 5517: 5513: 5509: 5505: 5498: 5495: 5482: 5478: 5472: 5470: 5466: 5454:. 25 May 2023 5453: 5449: 5443: 5440: 5437: 5432: 5429: 5426: 5421: 5418: 5405: 5401: 5395: 5393: 5391: 5387: 5382: 5378: 5374: 5367: 5365: 5363: 5361: 5359: 5355: 5342: 5338: 5332: 5329: 5324: 5320: 5316: 5312: 5308: 5304: 5297: 5295: 5293: 5291: 5287: 5282: 5278: 5274: 5270: 5263: 5261: 5259: 5257: 5255: 5251: 5248: 5245: 5239: 5236: 5224: 5222:9789050952392 5218: 5214: 5213: 5205: 5202: 5190:on 6 May 2017 5189: 5185: 5181: 5175: 5172: 5157: 5151: 5148: 5136: 5132: 5126: 5123: 5110: 5106: 5100: 5097: 5085: 5079: 5075: 5070: 5069: 5060: 5057: 5042: 5039:Öman, Sören. 5035: 5032: 5020: 5016: 5010: 5007: 5002: 4998: 4994: 4987: 4984: 4971: 4967: 4961: 4959: 4957: 4955: 4951: 4946: 4942: 4938: 4934: 4927: 4924: 4919: 4915: 4911: 4904: 4902: 4900: 4898: 4896: 4894: 4892: 4888: 4875: 4871: 4865: 4862: 4859: 4854: 4851: 4848: 4843: 4840: 4827: 4823: 4817: 4815: 4811: 4799: 4795: 4789: 4786: 4769: 4763: 4760: 4752: 4745: 4742: 4737: 4733: 4729: 4725: 4721: 4717: 4713: 4706: 4704: 4700: 4687: 4683: 4677: 4675: 4673: 4671: 4669: 4665: 4660: 4656: 4652: 4645: 4643: 4641: 4639: 4637: 4633: 4620: 4616: 4610: 4608: 4604: 4599: 4595: 4591: 4587: 4580: 4577: 4574: 4570: 4567: 4561: 4558: 4554: 4549: 4535: 4531: 4525: 4523: 4519: 4506: 4500: 4498: 4494: 4478: 4472: 4469: 4456: 4450: 4447: 4442: 4438: 4434: 4428: 4425: 4420: 4416: 4410: 4407: 4403: 4397: 4395: 4393: 4389: 4385: 4379: 4376: 4372: 4368: 4363: 4360: 4355: 4349: 4346: 4341: 4335: 4332: 4316: 4309: 4303: 4300: 4297: 4292: 4289: 4286: 4281: 4278: 4275: 4270: 4267: 4263: 4258: 4255: 4252: 4247: 4244: 4241: 4236: 4233: 4230: 4225: 4222: 4219: 4214: 4211: 4208: 4203: 4200: 4195: 4189: 4186: 4181: 4177: 4173: 4169: 4165: 4161: 4154: 4151: 4148: 4144: 4138: 4135: 4124: 4123: 4116: 4113: 4108: 4102: 4086: 4082: 4078: 4072: 4069: 4056: 4052: 4046: 4044: 4042: 4040: 4038: 4034: 4031: 4025: 4022: 4010: 4006: 4000: 3997: 3992: 3986: 3970: 3966: 3959: 3957: 3953: 3949: 3947:9783540423256 3943: 3939: 3935: 3930: 3925: 3921: 3917: 3912: 3904: 3901: 3889: 3885: 3879: 3876: 3864: 3860: 3853: 3850: 3837: 3833: 3827: 3824: 3812: 3808: 3802: 3799: 3795: 3790: 3788: 3784: 3780: 3774: 3771: 3766: 3760: 3757: 3752: 3746: 3743: 3740: 3735: 3732: 3729: 3724: 3721: 3717: 3713: 3707: 3704: 3701: 3696: 3693: 3689: 3686: 3680: 3678: 3674: 3658: 3652: 3649: 3646: 3640: 3638: 3636: 3634: 3632: 3630: 3628: 3626: 3624: 3620: 3608: 3604: 3598: 3596: 3592: 3588: 3584: 3578: 3575: 3571: 3568: 3563: 3560: 3556: 3552: 3548: 3543: 3541: 3537: 3533: 3527: 3524: 3520: 3516: 3512: 3507: 3504: 3499: 3493: 3490: 3485: 3481: 3477: 3470: 3467: 3462: 3458: 3454: 3450: 3446: 3442: 3438: 3431: 3428: 3423: 3417: 3413: 3409: 3405: 3404: 3396: 3393: 3388: 3384: 3380: 3376: 3372: 3368: 3364: 3357: 3354: 3349: 3345: 3341: 3337: 3333: 3326: 3323: 3319: 3318:public domain 3308: 3304: 3297: 3294: 3282: 3278: 3272: 3270: 3266: 3254: 3250: 3244: 3242: 3240: 3238: 3236: 3234: 3232: 3228: 3216: 3212: 3206: 3203: 3191: 3187: 3181: 3178: 3165: 3161: 3155: 3152: 3146: 3141: 3138: 3136: 3133: 3130: 3127: 3124: 3121: 3119: 3116: 3114: 3111: 3109: 3106: 3103: 3100: 3097: 3094: 3091: 3088: 3085: 3082: 3079: 3076: 3075: 3070: 3064: 3061: 3058: 3055: 3052: 3049: 3046: 3043: 3040: 3037: 3034: 3031: 3028: 3025: 3022: 3019: 3016: 3013: 3010: 3007: 3004: 3001: 2998: 2995: 2992: 2989: 2986: 2983: 2980: 2977: 2974: 2971: 2968: 2965: 2962: 2959: 2956: 2953: 2950: 2947: 2944: 2941: 2938: 2935: 2932: 2929: 2926: 2923: 2920: 2917: 2914: 2911: 2908: 2905: 2902: 2899: 2896: 2893: 2890: 2887: 2884: 2881: 2878: 2875: 2872: 2871: 2869: 2868: 2861: 2859: 2855: 2848: 2846: 2839: 2837: 2834: 2829: 2826: 2819: 2817: 2808: 2805: 2800:Offensiveness 2799: 2797: 2794: 2791: 2787: 2783: 2779: 2773: 2767: 2764: 2761: 2760: 2759: 2754: 2751: 2749: 2746: 2744: 2741: 2739: 2735: 2732: 2730: 2726: 2723: 2721: 2717: 2714: 2712: 2709: 2707: 2703: 2700: 2698: 2695: 2692: 2689: 2688: 2687: 2684: 2680: 2673: 2671: 2668: 2660: 2658: 2656: 2652: 2647: 2645: 2640: 2633: 2627: 2623: 2621: 2613: 2609: 2605: 2601: 2597: 2596: 2595: 2592: 2585: 2582: 2576: 2573: 2569: 2566: 2564: 2558: 2557: 2554: 2553: 2552: 2550: 2545: 2543: 2539: 2535: 2534: 2529: 2525: 2519: 2512:United States 2511: 2509: 2507: 2502: 2499: 2493: 2490: 2487: 2484: 2481: 2478: 2475: 2472: 2469: 2466: 2465: 2464: 2461: 2457: 2455: 2447: 2445: 2438: 2435: 2432: 2429: 2428: 2427: 2425: 2417: 2415: 2412: 2404: 2400: 2399: 2395: 2393: 2392: 2388: 2387: 2386: 2384: 2380: 2375: 2372: 2370: 2366: 2362: 2356: 2348: 2343: 2340: 2337: 2334: 2331: 2327: 2324: 2320: 2319: 2318: 2315: 2313: 2309: 2301: 2299: 2295: 2291: 2288: 2280: 2278: 2276: 2271: 2268: 2267:Criminal Code 2260: 2257: 2256: 2255: 2252: 2248: 2246: 2242: 2234: 2232: 2228: 2225: 2223: 2215: 2212: 2209: 2208: 2207: 2204: 2200: 2197: 2189: 2187: 2185: 2181: 2177: 2171: 2163: 2161: 2156: 2148: 2146: 2144: 2143:African Union 2140: 2135: 2133: 2129: 2124: 2121: 2116: 2114: 2113:personal data 2110: 2102: 2097: 2094: 2091: 2088: 2087: 2086: 2080: 2077: 2074: 2071: 2069: 2066: 2063: 2060: 2059: 2058: 2055: 2051: 2044: 2039: 2035: 2034: 2031: 2028: 2026: 2023: 2021: 2018: 2017: 2016: 2008: 2005: 2004: 2003: 1999: 1991: 1989: 1986: 1982: 1977: 1972: 1967: 1959: 1957: 1954: 1950: 1949:Cybersecurity 1945: 1937: 1935: 1934: 1933: 1927: 1925: 1921: 1916: 1914: 1911:(replaced by 1910: 1902: 1897: 1894: 1891: 1890: 1889: 1882: 1878: 1875: 1873: 1870: 1868: 1865: 1863: 1860: 1858: 1855: 1853: 1850: 1848: 1845: 1844: 1843: 1841: 1836: 1832: 1829: 1824: 1822: 1818: 1814: 1810: 1806: 1802: 1798: 1794: 1786: 1784: 1781: 1775: 1772: 1768: 1759: 1757: 1751: 1748: 1745: 1744: 1743: 1737: 1735: 1732: 1727: 1722: 1713: 1711: 1709: 1704: 1703:Authorities. 1700: 1698: 1694: 1689: 1685: 1675: 1663: 1658: 1649: 1648: 1642: 1640: 1637: 1629: 1626: 1623: 1621: 1617: 1616: 1615: 1613: 1609: 1601: 1596: 1592: 1588: 1585: 1581: 1577: 1573: 1572: 1571: 1569: 1565: 1560: 1558: 1553: 1551: 1547: 1542: 1538: 1534: 1530: 1522: 1520: 1513: 1511: 1509: 1505: 1500: 1491: 1489: 1486: 1484: 1480: 1474: 1472: 1467: 1463: 1461: 1457: 1449: 1447: 1445: 1436: 1434: 1432: 1428: 1422: 1419: 1415: 1411: 1403: 1400: 1394: 1386: 1383: 1375: 1372: 1367: 1359: 1356: 1352: 1349: 1344: 1336: 1334: 1331: 1327: 1322: 1315: 1313: 1309: 1302: 1300: 1296: 1289: 1287: 1285: 1277: 1275: 1272: 1264: 1262: 1258: 1256: 1248: 1246: 1244: 1240: 1237: 1232: 1228: 1226: 1225: 1220: 1219: 1212: 1210: 1206: 1205: 1198: 1190: 1188: 1186: 1185:Ronaldo Lemos 1182: 1176: 1172: 1166: 1164: 1160: 1158: 1150: 1148: 1146: 1141: 1134: 1132: 1130: 1126: 1122: 1115: 1107: 1102: 1100: 1097: 1093: 1090: 1082: 1080: 1078: 1074: 1065: 1058: 1056: 1053: 1048: 1046: 1042: 1038: 1030: 1028: 1024: 1021: 1017: 1009: 1007: 1003: 1001: 993: 987: 980: 975: 972: 969: 966: 963: 960: 957: 954: 951: 948: 945: 944: 940: 938: 935: 931: 928: 924: 921: 917: 914: 910: 907: 900: 897: 894: 891: 890: 889: 883: 881: 879: 875: 871: 867: 863: 858: 856: 851: 849: 838: 833: 831: 826: 824: 819: 818: 816: 815: 810: 805: 800: 799: 798: 797: 792: 788: 784: 781: 779: 776: 774: 771: 769: 766: 764: 761: 760: 759: 758: 754: 749: 744: 743:United States 741: 739: 736: 734: 731: 729: 726: 724: 721: 719: 716: 714: 711: 709: 706: 704: 701: 700: 699: 698: 693: 688: 685: 683: 680: 678: 675: 671: 667: 662: 659: 657: 654: 650: 647: 646: 645: 642: 641: 640: 639: 634: 629: 626: 624: 621: 619: 616: 614: 611: 609: 606: 602: 599: 597: 594: 592: 589: 588: 587: 584: 583: 582: 581: 576: 571: 568: 566: 563: 561: 558: 556: 555: 551: 549: 548: 544: 542: 541: 537: 535: 532: 530: 527: 525: 522: 520: 517: 516: 515: 514: 509: 504: 501: 499: 496: 494: 491: 487: 484: 483: 482: 479: 477: 474: 472: 469: 467: 464: 462: 459: 458: 457: 456: 453: 449: 444: 441: 439: 436: 431: 428: 426: 423: 421: 418: 417: 416: 415: 412: 408: 403: 402: 398: 396: 393: 392: 391: 390: 387: 383: 378: 375: 373: 370: 368: 365: 364: 363: 362: 358: 354: 350: 345: 342: 340: 337: 335: 332: 330: 327: 325: 322: 320: 317: 315: 314: 310: 308: 305: 301: 298: 297: 296: 293: 289: 286: 284: 281: 279: 276: 275: 274: 271: 270: 269: 268: 265: 261: 254: 251: 249: 246: 245: 244: 241: 239: 236: 234: 231: 229: 226: 225: 224: 223: 220: 216: 209: 206: 204: 201: 199: 196: 194: 191: 190: 189:Sexual torts 188: 186: 183: 181: 178: 176: 173: 169: 166: 165: 164: 161: 159: 156: 151: 148: 147: 146: 143: 141: 140:Appropriation 138: 137: 136: 135: 132: 128: 123: 120: 116: 113: 111: 108: 107: 106: 103: 102: 101: 100: 95: 89: 85: 83: 80: 78: 75: 73: 70: 69: 68: 67: 64: 60: 55: 50: 49: 46: 42: 38: 34: 33: 30: 19: 6841:Human rights 6356:Privacy laws 6355: 6253: 6238: 6234: 6133: 6120: 6108: 6096:. Retrieved 6067:. Retrieved 6062: 6053: 6041:. Retrieved 6037: 6028: 6016:. Retrieved 6003: 5991:. Retrieved 5987: 5978: 5967: 5958: 5946:. Retrieved 5942: 5933: 5921:. Retrieved 5918:www.ncsl.org 5917: 5908: 5896:. Retrieved 5893:Perkins Coie 5892: 5883: 5871:. Retrieved 5867: 5858: 5841: 5829:. Retrieved 5824: 5815: 5803:. Retrieved 5798: 5789: 5777:. Retrieved 5773: 5764: 5752:. Retrieved 5747: 5738: 5719: 5716:First Monday 5715: 5705: 5693:. Retrieved 5660: 5651: 5647: 5622:. Retrieved 5617: 5608: 5589: 5583: 5571:. Retrieved 5567: 5544: 5536: 5511: 5507: 5497: 5485:. Retrieved 5480: 5456:. Retrieved 5451: 5442: 5431: 5420: 5408:. Retrieved 5380: 5376: 5345:. Retrieved 5331: 5306: 5302: 5272: 5268: 5246: 5243: 5238: 5226:. Retrieved 5211: 5204: 5192:. Retrieved 5188:the original 5183: 5174: 5162:. Retrieved 5150: 5138:. Retrieved 5134: 5125: 5113:. Retrieved 5108: 5099: 5087:. Retrieved 5067: 5059: 5047:. Retrieved 5034: 5022:. Retrieved 5018: 5009: 5000: 4996: 4986: 4974:. Retrieved 4936: 4932: 4926: 4909: 4878:. Retrieved 4864: 4853: 4842: 4830:. Retrieved 4801:. Retrieved 4797: 4788: 4776:. Retrieved 4762: 4744: 4719: 4715: 4690:. Retrieved 4650: 4623:. Retrieved 4592:(1): 42–50. 4589: 4585: 4579: 4560: 4538:. Retrieved 4533: 4509:. Retrieved 4484:. Retrieved 4471: 4459:. Retrieved 4449: 4441:the original 4436: 4427: 4418: 4409: 4401: 4383: 4378: 4362: 4348: 4334: 4322:. Retrieved 4315:the original 4302: 4291: 4280: 4269: 4257: 4246: 4235: 4224: 4213: 4202: 4188: 4163: 4159: 4153: 4137: 4126:, retrieved 4121: 4115: 4091:24 September 4089:. Retrieved 4085:the original 4080: 4071: 4059:. Retrieved 4054: 4024: 4012:. Retrieved 4008: 3999: 3973:. Retrieved 3969:the original 3915: 3903: 3891:. Retrieved 3887: 3878: 3866:. Retrieved 3862: 3852: 3840:. Retrieved 3836:DataGuidance 3835: 3826: 3814:. Retrieved 3810: 3801: 3793: 3778: 3773: 3759: 3745: 3734: 3723: 3706: 3695: 3687: 3684: 3664:. Retrieved 3651: 3610:. Retrieved 3606: 3577: 3566: 3562: 3546: 3531: 3526: 3510: 3506: 3492: 3475: 3469: 3447:(1): 15–27. 3444: 3440: 3430: 3402: 3395: 3370: 3366: 3356: 3342:(1): 28–43. 3339: 3335: 3325: 3306: 3296: 3284:. Retrieved 3280: 3256:. Retrieved 3252: 3249:"negligence" 3218:. Retrieved 3214: 3205: 3193:. Retrieved 3189: 3180: 3168:. Retrieved 3163: 3154: 3131:(Australian) 3044:Turkmenistan 3020:Sierra Leone 3017:Saudi Arabia 2866: 2865: 2856: 2852: 2843: 2830: 2827: 2823: 2814: 2806: 2803: 2795: 2792: 2788: 2784: 2780: 2777: 2757: 2685: 2681: 2677: 2664: 2648: 2641: 2637: 2617: 2593: 2589: 2571: 2561: 2546: 2531: 2521: 2503: 2500: 2497: 2491: 2485: 2479: 2473: 2467: 2462: 2458: 2451: 2442: 2421: 2408: 2396: 2389: 2376: 2373: 2358: 2316: 2306:Privacy and 2305: 2296: 2292: 2284: 2272: 2264: 2253: 2249: 2238: 2229: 2226: 2219: 2205: 2201: 2193: 2179: 2173: 2158: 2136: 2125: 2117: 2109:Constitution 2106: 2103:South Africa 2084: 2056: 2052: 2048: 2038:A. V. Krotov 2013: 2001: 1963: 1953:cyberattacks 1941: 1931: 1928: 1923: 1919: 1917: 1906: 1886: 1837: 1833: 1825: 1790: 1776: 1767:constitution 1763: 1755: 1741: 1717: 1705: 1701: 1690: 1686: 1682: 1669: 1661: 1633: 1612:data privacy 1605: 1594: 1590: 1583: 1579: 1575: 1561: 1554: 1537:Constitution 1526: 1517: 1495: 1487: 1482: 1475: 1468: 1464: 1453: 1440: 1423: 1407: 1397: 1380: 1370: 1353: 1350: 1347: 1337:Constitution 1323: 1319: 1310: 1306: 1297: 1293: 1281: 1270: 1268: 1259: 1252: 1235: 1233: 1229: 1222: 1216: 1213: 1202: 1200: 1178: 1174: 1170: 1161: 1154: 1142: 1138: 1117: 1098: 1094: 1086: 1070: 1049: 1034: 1025: 1013: 1004: 997: 933: 932: 926: 925: 919: 918: 912: 911: 908: 904: 887: 859: 852: 847: 846: 768:Criminal law 687:Class action 552: 545: 538: 481:Self-defense 399: 377:Deep pockets 311: 273:Duty of care 35:Part of the 29: 6907:Privacy law 6836:Wiretapping 6548:Switzerland 6533:South Korea 6523:Philippines 6513:Netherlands 6508:Isle of Man 6429:Switzerland 6409:New Zealand 5969:Mayo Clinic 5109:www.loc.gov 4939:: 263–297. 4912:: 391–415. 4081:www.loc.gov 3888:lop.parl.ca 3164:www.gao.gov 3035:Timor-Leste 2921:El Salvador 2873:Afghanistan 2298:finalized. 2287:coup d'Ă©tat 2190:Switzerland 2061:Banking Act 1960:Philippines 1903:New Zealand 1218:Privacy Act 920:Trespassing 895:Trespassing 848:Privacy law 644:Tort reform 278:Trespassers 243:Malpractice 238:Entrustment 158:False light 27:Area of law 18:Privacy Law 6901:Categories 6821:Panopticon 6444:California 6319:Principles 6038:Justia Law 5988:Justia Law 5873:10 October 5481:ico.org.uk 5452:ico.org.uk 5024:26 January 4540:21 January 4122:Code pĂ©nal 4055:www.un.org 3975:31 January 3612:26 October 3211:"trespass" 3147:References 3053:Uzbekistan 3032:Tajikistan 2981:Mozambique 2882:Bangladesh 2840:Uzbekistan 2769:Framework. 2542:common law 2275:Civil Code 2168:See also: 1840:common law 1809:negligence 1801:defamation 1360:Civil Code 1274:controls. 1092:attacks." 927:Negligence 898:Negligence 753:common law 656:Quasi-tort 608:Injunction 601:Incidental 420:Conspiracy 145:Defamation 122:Conversion 37:common law 6912:Data laws 6786:Anonymity 6622:Financial 6599:Workplace 6589:Education 6498:Indonesia 6468:Australia 6424:Sri Lanka 6419:Singapore 6364:Australia 6098:9 January 5410:9 January 5347:9 January 4976:9 January 4880:9 January 4832:9 January 4803:23 August 4692:9 January 4625:9 January 4511:9 January 4486:9 January 4461:9 January 4180:113767072 4128:23 August 4061:23 August 4014:23 August 3924:CiteSeerX 3666:9 January 3461:2044-3994 3062:Venezuela 3002:Palestine 2939:Guatemala 2820:The Press 2727:(FDCPA), 2599:platform. 2149:Sri Lanka 2045:Singapore 1971:Filipinos 1514:Hong Kong 1485:).  1108:Australia 1035:The 1995 934:Fiduciary 901:Fiduciary 763:Contracts 703:Australia 511:Liability 471:Necessity 359:liability 283:Licensees 203:Seduction 6864:Category 6779:See also 6632:Facebook 6627:Internet 6579:Consumer 6553:Thailand 6249:1321160. 6069:24 April 6043:28 April 6018:25 April 5993:28 April 5948:18 March 5923:18 March 5898:18 March 5831:27 April 5805:27 April 5779:27 April 5754:27 April 5695:25 April 5624:24 April 5573:24 April 5487:27 April 5458:27 April 5281:40707869 4945:24868246 4778:17 April 4736:62566690 4653:: 1–38. 4569:Archived 4437:LinkedIn 4101:cite web 3985:cite web 3893:27 April 3868:27 April 3842:27 April 3816:27 April 3286:28 April 3258:28 April 3220:28 April 3195:28 April 3170:27 April 3092:(Russia) 3071:See also 2996:Pakistan 2978:Mongolia 2975:Maldives 2957:Kiribati 2930:Ethiopia 2912:Djibouti 2900:Cameroon 2897:Cambodia 2891:Botswana 2736:(DPPA), 2718:(FCRA), 2281:Thailand 2176:Data Act 2141:and the 2134:(2002). 1787:Malaysia 1708:LinkedIn 1695:and the 1672:May 2021 1508:case law 1431:payments 1328:and the 778:Property 773:Evidence 623:Replevin 591:Punitive 578:Remedies 452:Defences 386:Nuisance 357:absolute 288:Invitees 115:chattels 105:Trespass 45:Tort law 6917:Privacy 6642:Twitter 6594:Medical 6584:Digital 6503:Ireland 6488:Germany 6473:Denmark 6399:Germany 6389:England 6384:Denmark 6312:Privacy 5528:1321160 5323:1971627 4918:2255274 4659:2065036 4419:Twitter 4147:1501131 3920:301–313 3570:VCC 281 3387:1229516 3056:Vanuatu 3023:Somalia 2987:Namibia 2984:Myanmar 2966:Liberia 2963:Lebanon 2927:Eritrea 2915:Ecuador 2906:Comoros 2894:Burundi 2888:Bolivia 2879:Bahrain 2876:Algeria 2849:Vietnam 2704:(GLB), 2693:(HIPAA) 2578:damage. 2312:Ukraine 2302:Ukraine 1976:privacy 1944:privacy 1938:Nigeria 1714:Jamaica 1662:updated 1620:consent 1602:Ireland 1546:Aadhaar 1450:Germany 1427:service 1414:privacy 1145:CARICOM 1135:Bahamas 913:Privacy 892:Privacy 791:estates 618:Detinue 613:Tracing 596:Special 586:Damages 466:Consent 253:medical 149:Slander 77:Battery 72:Assault 54:Outline 6877:Portal 6637:Google 6558:Turkey 6543:Sweden 6528:Poland 6518:Norway 6483:France 6414:Russia 6374:Canada 6369:Brazil 5722:(11). 5596:  5526:  5321:  5279:  5228:10 May 5219:  5194:10 May 5164:10 May 5140:10 May 5115:10 May 5089:10 May 5080:  5049:10 May 4943:  4916:  4734:  4657:  4178:  4145:  3944:  3926:  3585:  3459:  3418:  3385:  3065:Zambia 3047:Tuvalu 3011:Rwanda 3005:Panama 2972:Malawi 2960:Kuwait 2954:Jordan 2942:Guinea 2936:Gambia 2885:Belize 2867:Source 2611:claim. 2235:Taiwan 2164:Sweden 1992:Russia 1883:Mexico 1838:Other 1807:, and 1492:Greece 1437:France 1255:PIPEDA 1243:PIPEDA 1191:Canada 1167:Brazil 1151:Belize 878:PIPEDA 789:, and 787:trusts 751:Other 738:Taiwan 708:Canada 661:Delict 628:Trover 353:Strict 39:series 6826:PRISM 6649:Email 6572:Areas 6538:Spain 6493:India 6404:Ghana 6379:China 6247:JSTOR 6197:1-38. 6130:(PDF) 6092:Yumpu 6012:(PDF) 5549:, 383 5524:JSTOR 5404:Yumpu 5341:Yumpu 5277:JSTOR 5159:(PDF) 5044:(PDF) 4970:Yumpu 4941:JSTOR 4874:Yumpu 4826:Yumpu 4772:(PDF) 4754:(PDF) 4732:S2CID 4686:Yumpu 4619:Yumpu 4480:(PDF) 4324:3 May 4318:(PDF) 4311:(PDF) 4176:S2CID 3660:(PDF) 3549: 3513: 3383:JSTOR 3041:Tonga 3029:Syria 3026:Sudan 3014:Samoa 2999:Palau 2990:Nauru 2969:Libya 2945:Haiti 2918:Egypt 2603:life. 2203:Act. 1793:torts 1760:Kenya 1738:Japan 1523:India 1316:China 874:COPPA 870:HIPAA 783:Wills 755:areas 733:Japan 728:India 713:China 666:civil 438:Fraud 248:legal 152:Libel 6765:NOYB 6100:2024 6071:2024 6045:2024 6020:2024 5995:2024 5950:2020 5925:2020 5900:2020 5875:2018 5833:2024 5807:2024 5781:2024 5756:2024 5697:2024 5626:2024 5594:ISBN 5575:2024 5489:2024 5460:2024 5412:2024 5349:2024 5319:SSRN 5230:2017 5217:ISBN 5196:2017 5166:2017 5142:2017 5117:2017 5091:2017 5078:ISBN 5051:2017 5026:2024 4978:2024 4937:2000 4914:SSRN 4882:2024 4834:2024 4805:2019 4780:2024 4694:2024 4655:SSRN 4627:2024 4542:2021 4513:2024 4488:2024 4463:2024 4326:2011 4143:SSRN 4130:2019 4107:link 4093:2017 4063:2019 4016:2019 3991:link 3977:2016 3942:ISBN 3895:2024 3870:2024 3844:2024 3818:2024 3712:2014 3668:2024 3614:2020 3607:OAIC 3583:ISBN 3457:ISSN 3416:ISBN 3288:2024 3260:2024 3222:2024 3197:2024 3172:2024 3038:Togo 2993:Oman 2951:Iraq 2948:Iran 2933:Fiji 2909:Cuba 2649:The 2540:and 2422:The 2409:The 2328:The 2321:The 2174:The 2130:and 2118:The 2107:The 2010:Act. 1578:for 1410:Fiji 1404:Fiji 1324:The 1073:OECD 1071:The 998:The 872:and 866:GDPR 668:and 355:and 110:land 6891:Law 6617:Law 6243:doi 5849:, " 5724:doi 5516:doi 5311:doi 4724:doi 4594:doi 4168:doi 3934:doi 3690:21. 3480:doi 3449:doi 3408:doi 3375:doi 3344:doi 2310:in 2078:Act 1234:In 6903:: 6446:, 6239:IV 6237:. 6132:. 6090:. 6079:^ 6061:. 6036:. 5986:. 5966:. 5941:. 5916:. 5891:. 5866:. 5853:". 5823:. 5797:. 5772:. 5746:. 5720:16 5718:. 5714:. 5674:^ 5652:61 5650:. 5646:. 5634:^ 5616:. 5566:. 5554:^ 5522:. 5512:IV 5510:. 5506:. 5479:. 5468:^ 5450:. 5402:. 5389:^ 5381:23 5379:. 5375:. 5357:^ 5339:. 5317:. 5307:28 5305:. 5289:^ 5273:37 5271:. 5253:^ 5182:. 5133:. 5107:. 5076:. 5074:63 5017:. 5001:21 4999:. 4995:. 4968:. 4953:^ 4935:. 4890:^ 4872:. 4824:. 4813:^ 4796:. 4730:. 4720:29 4718:. 4714:. 4702:^ 4684:. 4667:^ 4635:^ 4617:. 4606:^ 4588:. 4532:. 4521:^ 4496:^ 4435:. 4417:. 4391:^ 4174:. 4162:. 4103:}} 4099:{{ 4079:. 4053:. 4036:^ 4007:. 3987:}} 3983:{{ 3955:^ 3940:, 3932:, 3922:, 3914:, 3886:. 3861:. 3834:. 3809:. 3786:^ 3676:^ 3622:^ 3605:. 3594:^ 3539:^ 3517:, 3478:. 3455:. 3443:. 3439:. 3414:. 3381:. 3371:52 3369:. 3365:. 3340:25 3338:. 3334:. 3305:. 3279:. 3268:^ 3251:. 3230:^ 3213:. 3188:. 3162:. 2186:. 2145:. 1803:, 1799:, 1699:. 1552:. 1045:EU 785:, 6879:: 6304:e 6297:t 6290:v 6136:. 6102:. 6073:. 6047:. 6022:. 5997:. 5952:. 5927:. 5902:. 5877:. 5835:. 5809:. 5783:. 5758:. 5732:. 5726:: 5699:. 5668:. 5628:. 5602:. 5577:. 5530:. 5518:: 5491:. 5462:. 5414:. 5351:. 5325:. 5313:: 5283:. 5244:. 5232:. 5198:. 5168:. 5144:. 5119:. 5093:. 5053:. 5028:. 4980:. 4947:. 4920:. 4884:. 4836:. 4807:. 4782:. 4756:. 4738:. 4726:: 4696:. 4661:. 4629:. 4600:. 4596:: 4590:3 4555:. 4544:. 4515:. 4490:. 4465:. 4421:. 4369:. 4342:. 4328:. 4196:. 4182:. 4170:: 4164:2 4109:) 4095:. 4065:. 4018:. 3993:) 3979:. 3936:: 3897:. 3872:. 3846:. 3820:. 3753:. 3718:) 3714:( 3685:. 3670:. 3616:. 3486:. 3482:: 3463:. 3451:: 3445:1 3424:. 3410:: 3389:. 3377:: 3350:. 3346:: 3320:. 3309:. 3290:. 3262:. 3224:. 3199:. 3174:. 2565:. 2332:; 2325:; 1674:) 1670:( 1664:. 1586:. 1481:( 836:e 829:t 822:v 672:) 56:) 52:( 20:)

Index

Privacy Law
common law
Tort law
Outline
Trespass to the person
Assault
Battery
False imprisonment
Intentional infliction of emotional distress
Trespass
land
chattels
Conversion
Dignitary torts
Appropriation
Defamation
False light
Invasion of privacy
Intrusion on seclusion
Breach of confidence
Abuse of process
Malicious prosecution
Alienation of affections
Criminal conversation
Seduction
Breach of promise
Negligent torts
Negligent infliction of emotional distress
Employment-related
Entrustment

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑