Professional Documents
Culture Documents
Privacy Tutorial 1
Privacy Tutorial 1
PRIVACY : TUTORIAL 1
1. The plaintiff, a senior executive-level employee, is allowed to use the defendants company-
owned computer for work at home. He agreed to and acknowledged the defendants
computer usage and monitoring policy. The defendant monitors and inspects the computer,
discovering the plaintiff had been accessing pornographic Web sites. The plaintiff claims
the Web sites had simply Popped Up on his computer screen. He is fired and sues for
wrongful termination alleging that because the computer was provided as a perk for senior
executives so they could work at home, he enjoyed a reasonable expectation of privacy.
The defendant disagreed, claiming his actions were legal.
A)Define Privacy.
C) Explain the Fourth Amendment of the right to privacy as declared in United States
Constitution. Give examples with two law cases.
2. Question 2
B) Discuss briefly the sources of the right to privacy as declared in United States Constitution.
1. The plaintiff, a senior executive-level employee, is allowed to use the defendants company-
owned computer for work at home. He agreed to and acknowledged the defendants
computer usage and monitoring policy. The defendant monitors and inspects the computer,
discovering the plaintiff had been accessing pornographic Web sites. The plaintiff claims
the Web sites had simply Popped Up on his computer screen. He is fired and sues for
wrongful termination alleging that because the computer was provided as a perk for senior
executives so they could work at home, he enjoyed a reasonable expectation of privacy.
The defendant disagreed, claiming his actions were legal.
A)Define Privacy.
C) Explain the Fourth Amendment of the right to privacy as declared in United States
Constitution. Give examples with two law cases.
2. Question 2
B) Discuss briefly the sources of the right to privacy as declared in United States Constitution.
a) Define Privacy.
the claim of individuals groups or institutions to determine for themselves when, how and to
what extent information about them is communicated to others. The simple definition is the
right to be let alone.
Generally, privacy can be defined as the quality or condition of being secluded from the
presence or view of others; the state of being concealed; secrecy.
However, it is undesirable to adopt this definition because not every secret information is
subjected to privacy protection and not everything that is disclosed loses its privacy
characteristic.
The term privacy refers to the privilege owned by an individual from any interference by
other(s) with any of his/her private activities so long as these activities are not illegal and do
not harm others.
It is claimed that privacy does not need specific legal recognition because when there is
illegal intrusion to the right to privacy, the plaintiff can claim for remedy under the existing
legal doctrine such as defamation; or breach of intellectual property rights; or breach of
confidential information; or even of contract or trust.
Consider what you expect when entering an area or location, e.g. your bedroom,
which you desire to be off limits to others. Or consider what level of privacy an
employee should anticipate with regard to his office, desk, file cabinet or floppy disk.
your expectation is one that society as a whole would think is legitimate
expectation, what do others believe to be your expectation of privacy when you close
the door to your bedroom or your file or your office, enter a public phone booth, send
"The right of the people to be secure in their persons, houses, papers, and effects,
against unreasonable searches and seizures, shall not be violated, and no Warrants
shall issue, but upon probable cause, supported by Oath or affirmation, and
seized."
A seizure occurs when the government takes possession of items or detains people.
A search is any intrusion by the government into something in which one has a
The claim of individuals, groups or institutions to determine for themselves when. How and to
what extent information about them is communicated to others. (the right to be let alone)
The quality or condition of being secluded from the presence or view of others; the state of
being concealed; secrecy.
b) Discuss briefly the sources of the right to privacy as declared in United States
Constitution.
Consider the Fourth, Fifth and Ninth Amendments of the U.S Constitution.
Fourth Amendment:
o the right of the people to be secure in their persons, houses, papers and effects,
against unreasonable searches and seizures, shall not be violated; and no warrant
shall issue, but upon probable cause, supported by oath or affirmation, and
particularly describing the place to be searched and the person or things to be
seized.
o E.g. Griswold v Connecticut (1965).
o In cyberspace, these requirements are the minimum will satisfied concerning the
mass information, some of a personal nature, being disseminated and accumulated
over the Internet.
Fifth Amendment
o No person shall be compelled, in any criminal case. To be a witness against
himself
o Cyber law application involves the act of encrypting a file that contains possible
incriminating information.
o Eg Doe v United States. 478 U.S 201 (1988)
Ninth Amendment
o The enumeration in the constitution of certain rights shall not be construed to deny
or disparage others retained by the people.
o This amendment was probably the genesis used by the courts and legal scholars to
create a kind of right to privacy.