Professional Documents
Culture Documents
The recent News of the World phone-hacking scandal has brought into sharp
focus a number of questions surrounding the scope and parameters of
privacy rights for individuals in Australia and around the world. With the
Gillard government announcing its intention to create a federal statutory
action for serious invasions of privacy, this area of law now necessitates
comprehensive analysis and review. This dissertation argues that the
fragmented state of Australian law does not currently provide sufficient or
direct protection of privacy. It surveys the gaps in privacy law previously
canvassed in the 2008 Australian Law Reform Commission Report ‘For Your
Information’ and the 2009 New South Wales Law Reform Commission Report
‘Invasion of Privacy’, and evaluates the proposed reforms in light of recent
developments. This dissertation examines the reluctance of the common law
and the inadequacy of equity to stitch up the unravelling fabric of the current
privacy framework, and draws upon both domestic Commission Reports and
best-practice approaches in overseas jurisdictions to propose a statutory
cause of action which aims to strike a balance between the right to privacy in
a technology and media-driven world, and the fundamental right to freedom of
speech.
Page |2
Page |3
TABLE OF CONTENTS
TABLE OF CONTENTS......................................................................................................................2
INTRODUCTION..................................................................................................................................4
APPROACHES..............................................................................................................................25
2.1. The Missing Cause of Action.................................................................................................25
2.2. Tort: A Negligent Approach?...............................................................................................27
2.2.1. The Case of New Zealand…………………………………………………………...………27
2.2.2. The Case of The United States………………………………………………………………
28
2.2.3. A Privacy Tort in Australia?……………………………………………………………….29
2.3. Equity: The New Fusion Fallacy?.........................................................................................30
2.3.1. The Case of the United
Kingdom…………………………………………………………...30
2.3.2. Extending breach of confidence in Australia?……………………………………………31
2.4. A Statutory Solution..............................................................................................................34
2.4.1. The Case of North America……………………………………………………………....…34
2.4.2. A Statutory Approach in Australia…………………………………………………………36
3. PREVIOUS ATTEMPTS AT REFORM…................................................................................37
3.1. The Australian Law Reform Commission Report..............................................................38
3.2. The New South Wales Law Reform Commission Report..................................................42
3.3. The Australian Government’s Response.............................................................................46
4. REFORM PROPOSALS: THE INVASION OF PRIVACY ACT 2011 (CTH)........................48
4.1. New Federal Statute...............................................................................................................49
4.2. Objects Clause........................................................................................................................49
4.3. Definition.................................................................................................................................52
4.4. Entitlement.............................................................................................................................54
4.5. General Cause of Action........................................................................................................55
4.5.1. Threshold……………………………………………………………………………………...55
4.5.2. Test……………………………………………………………………………………………..56
4.5.3. Mental Element……………………………………………………………………………….59
4.5.4. Factors to be Taken into Account………………………………………………………..…60
4.5.5. Consent………………………………………………………………………………………...61
4.5.6. Limitation
Period……………………………………………………………………………..63
4.6. Defences...................................................................................................................................64
4.7. Remedies.................................................................................................................................66
Page |4
CONCLUSION....................................................................................................................................73
APPENDIX...........................................................................................................................................75
BIBLIOGRAPHY................................................................................................................................93
Page |5
INTRODUCTION
I do not pretend that it is easy to safeguard privacy in the current age. But surrendering the
Most Australians are under the mistaken belief that they have a right to privacy.2 At the same
time, Australians are increasingly willing to disclose private feelings, information and
photographs everyday on social networking websites and through other technological media
such as smart phones. Public knowledge about the realm of privacy protection is lessening,
yet, and somewhat paradoxically, Australians are lamenting the erosion of their privacy rights
as the ‘inevitable result of technological advance’,3 and are outraged by the recent scandal
The fabric of the privacy law framework is unravelling. The recent unveiling of surreptitious
behaviour by News of the World and other media organisations overseas has pulled the last
remaining thread, and has called into question the currently fragmented and ad-hoc approach
Darwin’s theory of evolution states that life’s forms evolve as Mother Nature’s forces respond
to new pressures exerted by changes in the environment. ‘The more dramatic the change, the
greater the pressure, the faster the evolution.’4 The law develops in much the same way, as an
1
The Honourable Michael Kirby AC CMG, ‘Privacy, MySpace, YouTube and Facebook: Can the Law Cope?’
(Speech delivered at the Victorian Privacy Commission Privacy Oration, Melbourne, 1 September 2009) 11.
2
New South Wales Law Reform Commission, Invasion of Privacy, Report No. 120 (2009) 7 [3.1].
3
Ibid.
4
Dr Robert Dean, ‘A right to privacy?’ (2004) 78 Australian Law Journal 114.
Page |6
organic and ever-changing life-form, responding to social, political and economic changes
around it.
privacy framework, and to strike a flexible and common-sense balance6 between the privacy
interests of individuals and public concerns such as freedom of speech, national security and
freedom of information.
The purpose of this paper is to fill a gap in the academic literature by responding directly to
the recent phone-hacking scandal and other contemporary challenges to privacy by offering a
new legislative proposal. In formulating the proposal, this paper addresses the need for
general privacy protection in Australian law, given the current socio-economic climate,
Australians, and the clandestine behaviour by major media organisations, brought to the
widespread attention of the public particularly over the last twelve months. This paper draws
upon the 2008 Australian Law Reform Commission Report For Your Information and the
2009 New South Wales Law Reform Commission Report Invasion of Privacy, and statutory
causes of action operating in Canada and other jurisdictions, which provide sound statutory
This paper firstly considers why the issue of privacy should pervade current legal and
academic thinking. Chapter One evaluates the contemporary arguments as to why Australia
requires privacy protection and how modern threats to private life provide the impetus for
legal reform in 2011. The Chapter pays particular attention to the explosion of social
networking, the free flow of information, and the News of the World phone-hacking scandal.
5
Carolyn Doyle and Mirko Bagaric, Privacy Law in Australia (Federation Press, 2005) 178.
6
Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice, Report No
108 (2008) vol 1, 105-110 [1.82-1.93].
Page |7
Secondly, the paper surveys the currently fragmented state of privacy law in Australia.
Chapter Two examines the fact that privacy is only incidentally protected under Australian
law. There is no general law protecting privacy. The chapter then evaluates the different
legal methods of privacy protection utilised in overseas jurisdictions such as New Zealand,
United Kingdom, Canada and the United States, and applies each approach to the Australian
legal landscape. By demonstrating the reluctance of the common law and the inadequacies of
equity to protect privacy, the chapter concludes that privacy is best protected through statute.
Thirdly, this paper reviews existing academic and legal literature on privacy law reform.
Chapter Three assesses and compares the previous models of reform put forward by the
Australian and New South Wales Law Reform Commissions in 2008 and 2009. The chapter
considers those recommendations in light of recent developments in order to plug the gap in
Finally, this paper will explain how to address the problems and gaps in privacy protection
canvassed in the previous chapters by proposing a new model for reform. Chapter Four
recommends new federal legislation that creates a statutory cause of action for invasions of
privacy. The proposed legislation draws upon the value of individual autonomy, the need for
national consistency and the delicate balancing process between individual privacy interests
and the public interest in freedom of expression. The chapter also recommends a
relating to privacy.
This paper will illustrate that there is urgent need for Australia to build a new privacy
framework that adapts to contemporary concerns and values. The time is ripe for statutory
protection of privacy.
Page |8
In our overexposed world, is anything private anymore? Currently, the law recognises as
private only information that is completely secret. Information exposed to others is public.
In order to understand why protection of privacy is needed in Australia and how it should be
protected, the intricacies and complexities within the meaning of privacy should first be
acknowledged.
While privacy law authors may disagree on the scope and parameters of privacy protection
and how it should be reformed, the one thing they can agree on is that there is no satisfactory
definition of privacy. Rhetoric such as: ‘[n]obody knows what that thing means. But you
have to define it; you have to define it. And the Court has not given it definition’,9 has played
a somewhat critical part in the Australian Government’s failure to develop a coherent and
uniform system of privacy laws.10 This essential first step has also been avoided by the Law
7
Daniel J Solove, The Future of Reputation: Gossip, Rumour, and Privacy on the Internet (Yale University
Press, 2007) 161.
8
Daniel J Solove, Understanding Privacy, (Harvard University Press, 2008) 7.
9
Nomination of Robert H. Bork to be an Associate Justice of the United States Supreme Court, Report of the
Committee on the Judiciary, US Senate, Washington: 13 Oct 1987, 32; cited in Raymond Wacks, Personal
Information: Privacy and the Law (Clarendon Press, 1993) 1.
10
Doyle and Bagaric, above n 5, 6.
Page |9
Reform Commissions in the past, defining privacy as something that should ‘speak for
itself’.11
Some authors have attempted to define privacy’s parameters, despite the commonly-held
belief that privacy is ‘beyond the scope of the law’. 12 In 1979, the Australian Law Reform
thoughts, actions and relationships that he [or she] may legitimately claim the prerogative of
deciding whether, with whom and under what circumstances he [or she] will share it’.13
Westin defined privacy as ‘the claim of individuals, groups, or institutions to determine for
themselves when, how and to what extent information about them is communicated to
The judicial definition proposed by Gleeson CJ in Lenah also appears to be widely accepted,
Certain kinds of information about a person, such as information relating to health, personal
relationships or finances, may be easy to identify as private; as may certain kinds of activity,
which a reasonable person applying contemporary standards of morals and behaviour, would
11
New South Wales Law Reform Commission, Report No. 120, above n 2, 21 [4.16].
12
R F Hixson, Privacy in a Public Society: Human Rights in Conflict (Oxford University Press, 1987) 98.
13
Australian Law Reform Commission, Unfair Publication: Defamation and Privacy, Report No 11 (1979) 109
[206].
14
Alan Westin, Privacy and Freedom (Atheneum, 1970) 7.
15
Thomas M. Cooley, Cooley on Torts 29 (2nd ed, 1888).
16
Irish Working Group on Privacy, Report of Working Group on Privacy (2006) 12.
17
Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd (2001) 208 CLR 199, 226 [42] (Gleeson
CJ).
P a g e | 10
The legal definition of privacy however remains elusive,18 particularly as social norms
change. The concept is ambiguous on at least three levels – status, features and coherence.19
Firstly, the status and value of privacy is uncertain. Privacy is not a recognised right in
Australia. Indeed, Australia has international obligations to protect people’s privacy. Article
12 of the Universal Declaration of Human Rights 1948 and Article 17 of the International
Covenant on Civil and Political Rights [‘ICCPR’] both provide that ‘no one shall be
Despite ratifying the ICCPR on 13 August 1980, Australia’s domestic approach follows a
traditional trend of reticence towards rights.21 In 1988, the Office of the United Nations High
Commissioner for Human Rights announced that Article 17 was to apply to states, natural
persons and legal persons, and that ‘all member states are required to adopt legislative and
other measures to give effect to the prohibition against such interferences and attacks as well
as to the protection of this right’.22 The Australian government passed the Privacy Act 1988
(Cth) as a way to implement the ICCPR obligations. However, the Act only relates to
information privacy and therefore only partially implements Article 17. Furthermore,
Australia does not have a Bill of Rights (although ACT23 and Victoria24 have rights
legislation), which is another possible method of implementing Article 17 and other rights.
18
Raymond Wacks, Personal Information: Privacy and the Law (Clarendon Press, 1993) 13.
19
Ibid, 13-14.
20
International Covenant on Civil and Political Rights, opened for signature 16 December 1966, (entered into
force 13 March 1976) [1980] ATS 23, Article 17; and Universal Declaration on Human Rights, GA Res 217A
[III], UN GAOR, 3rd sess, 183rd plen mtg, UN Doc A/810 (10 December 1948) Article 12.
21
David Lindsay, ‘An Exploration of the Conceptual Basis of Privacy and the Implications for the Future of
Australian Privacy Law’ (2005) Melbourne University Law Review 4, 5.
22
Office of the United Nations High Commissioner for Human Rights (1988) General Comment Number 16.
23
Human Rights Act 2004 (ACT) s12.
24
Charter of Human Rights and Responsibilities Act 2006 (Vic) s13.
P a g e | 11
Secondly, the features of privacy are unformulated. In 1890, American writers Warren and
Brandeis argued that there should be a general right to privacy in the United States.25 This
spawned the development of four types of privacy invasion, which were authoritatively stated
facts, appropriation of the plaintiff’s name and likeness, and publicity which puts the plaintiff
in false light.26 However, Prosser’s features of privacy do not wholly represent all of the
types of privacy interests valued by individuals, nor do they reveal the only ways in which
privacy can be invaded. Wacks argues that by addressing the issue of privacy in terms of
artificial and more effective legal resolution’.27 However, restricting the concept to
information privacy limits the boundaries of the concept. What about some less traditional
features of privacy such as sexual orientation, gender identity or a woman’s decision to use
contraceptives or abort a foetus?28 On the one hand it would be impractical to list every
conceivable invasion of privacy. On the other hand, there is merit in arguing that privacy
must have value to be effective. The worth and features of privacy must therefore derive
from social values and norms. The definition is heavily reliant on context.
Demarcating between what is private and what is public is also an indeterminate exercise. ‘A
strict public/private divide is unsustainable - or at least is a very blurred ideal. Not only is the
boundary between public and private constantly shifting but it is inherently political.’29 A
broad interpretation of the meaning of private life is expounded in Von Hannover v Germany
[2004] ECHR 294, which held that any publication of an unauthorised photograph taken of a
particular person engaged in everyday activities outside their public duty will constitute a
25
Samuel D. Warren and Louis D. Brandeis, ‘The Right to Privacy’ (1890) 4 Harvard Law Review 193, 196.
26
William L. Prosser, ‘Privacy’ (1960) 48 California Law Review 383, 389.
27
Wacks, above n 18, 10.
28
Brett Mason, Privacy without Principle: The Use and Abuse of Privacy in Australian Law and Public Policy
(Australian Scholarly Publishing, 2006) 16.
29
Ibid, 3.
P a g e | 12
violation of the right to privacy under Article 8 of the European Convention on Human
Rights [‘ECHR’].30 In Murray v Big Pictures (UK) Ltd [2008] EWCA Civ 446, the Court
held that the 19-month old son of the writer of the Harry Potter books, JK Rowling, had an
action for invasion of privacy as a result of a photograph being taken of the family walking
down a public street. The Court reasoned that Big Pictures UK Ltd would not have taken the
photograph if he was the child of ordinary parents.31 Drawing a line between public and
simply because it is not done in public, and at the same time, an activity does not lose its
Furthermore, in the modern world of technology and social networking, it may not be
possible to enforce a binary view of public versus private spheres. Rather, a more nuanced
view may need to be adopted, given the ease in which something that takes place in public
can be made permanent and widespread simply by uploading a photo to the internet or
sending photos via mobile phone technology, by members of the public or the members of
what has become known as the ‘citizen media’.33 Other modern developments also highlight
the blurring of the private and public spheres and the increased intrusion upon individual
privacy, such as full body scanners at airports, identification-card scanners and facial
Google Earth and WikiLeaks. How can we deal with an increasingly invasive and globalised
world where nothing is sacred anymore? A flexible definition of privacy will allow the law to
30
Convention for the Protection of Human Rights and Fundamental Freedoms, opened for signature 4
November 1950, 213 UNTS 221 (entered into force 3 September 1953).
31
Murray v Big Pictures (UK) Ltd [2008] EWCA Civ 446.
32
New South Wales Law Reform Commission, Report No 120, above n 2, 20 [5.27].
33
Solove, above n 7, 7-8.
P a g e | 13
Thirdly, protection of privacy is incoherent. The Australian legal system only protects
privacy indirectly through protecting some of the values underpinning it, such as property
rights, human dignity and reputation. This parasitic34 approach means that the current
framework fails to achieve direct and effective legal privacy protection. These difficulties are
further ‘exacerbated when a precise definition of the term is sought for legal purposes’.35
Ultimately, the concept currently does not have a consistent core36 capable of providing hard
and fast answers to what is private and what is not. This is further illustrated in Chapter Two
of this paper.
What makes the meaning of privacy even more difficult to characterise is the fluidity of the
concept. The concept changes according to generational norms, particularly in relation to the
It does appear that young people are more comfortable than their parents, and certainly their
grandparents, in sharing personal information, photos and other material on social networking
websites. The question is whether this represents the beginnings of an enduring cultural shift, or
simply the eternal recklessness of youth, played out in a new medium and utilising new
technology. Put another way, will today’s teenagers be horrified in a decade’s time when
prospective employers—and prospective partners and in-laws—can easily ‘google up’ intimate
There exist immense difficulties for lawmakers and academic writers in arriving at a
definition of privacy. However, the common element that unites the literature is that
legal and social context that should inform the meaning of privacy, which demonstrates why
34
Mason, above n 28, 18. See also Chapter 2 and Appendix: Table 1.
35
New South Wales Law Reform Commission, Report No 120, above n 2, 11 [4.2].
36
Mason, above n 28, 6.
37
Australian Law Reform Commission, Report No 108, above n 6, vol 1, 108.
P a g e | 14
Privacy is a key policy issue facing our legal system.38 There is an overwhelming need for
protection of personal privacy. The exigencies of modern day living, our media-driven
society, the connectedness resulting from the forces of globalisation and the advent of social
networking have coalesced to create a world where there appears to be only one domain – the
public domain. The News of the World phone-hacking scandal should represent the last
A decade has elapsed since Justice Callinan advocated for change to the privacy law
Having regard to current conditions in this country, and developments of law in other
common law jurisdictions, the time is ripe for consideration whether... the legislatures should
be left to determine whether provisions for a remedy for [a tort of invasion of privacy] should
be made...40
Is the time still ripe in 2011? Or has the proverbial privacy fruit gone bad with age?
The Prime Minister, Julia Gillard, believes it is picking season. On 21 July 2011, the Prime
Minister announced ‘[w]hen people have seen telephones hacked into, when people have
seen individuals grieving have to deal with all of this, then I do think that causes them to ask
some questions here in our country.’41 A consultation period for privacy reform was launched
38
Simon Chester, Jason Murphy and Eric Robb, ‘Zapping the paparazzi: is the tort of privacy alive and well?’
(2003) 27 Advocates’ Quarterly 357, 358.
39
Raymond Wacks, Privacy and Press Freedom (Blackstone Press Limited, 1995) 1.
40
Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd (2001) 208 CLR 199, 328 at [335]
(Callinan J).
41
Julia Gillard, quoted in Katharine Murphy, ‘Canberra to move on Privacy Law’, The Age (online) July 21
2011 <http://www.theage.com.au/national/canberra-to-move-on-privacy-law-20110720-
1hp19.html#ixzz1T58aRPfx>.
P a g e | 15
following this announcement, with Federal Privacy and Freedom of Information Minister
Brendan O’Connor explaining that the Government is ‘very serious about having this
discussion’ following the News of the World scandal, and that ‘there are two ideals we uphold
September 2011, the Government released an Issues Paper, confirming this rationale and
expressing support for a statutory cause of action for serious invasions of privacy.43
While Lenah left the door open for the common law to develop a cause of action for breach
of privacy, a judicial majority is yet to take the bold step44 in developing the action.
Moreover, despite the best efforts and recommendations of the Australian and New South
Wales Law Reform Commissions, Australia has succumbed to both political inertia and
The time is ripe45 for a cause of action for invasions of privacy, and Australian lawmakers
must take this step using a legislative framework. This is a logical and desirable step,46 given
the current social, political and technological environment. Privacy laws have not kept pace
with changes in society. The following discussion analyses two broad concerns underpinning
the current debate on privacy reform; the boundless flow of information on the internet, and
the underhanded behaviour by media organisations, both of which seriously threaten personal
privacy.
42
Ibid.
43
Commonwealth, A Commonwealth Statutory Cause of Action for Invasions of Privacy, Issues Paper (2011).
44
Grosse v Purvis [2003] QDC 151 (16 June 2003) (Skoien J).
45
Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd (2001) 208 CLR 199, 328 at [335]
(Callinan J).
46
Grosse v Purvis [2003] QDC 151 (16 June 2003) (Skoien J).
P a g e | 16
Each era in human history faces new threats in the battle for privacy. The cause stays the
same. It is only the weapons that change. From freedom from government intrusion in the
18th century to phone-hacking and Facebook stalking in the 21st Century, the pendulum
constantly swings between the right to privacy and the right to freedom of expression and
never quite seems to reach equilibrium. The inability to achieve a comfortable balance
personal privacy in a way never anticipated. However, it is not just the technology to blame.
We are, somewhat, authors of our own demise; our own worst enemy. We’re invading each
other’s privacy and our own47 almost every day, particularly by what we expose on the
internet. Network sharing sites such as YouTube, Twitter, Flickr and LinkedIn, and social
media sites such as MySpace and Facebook, invite us to share our most private and intimate
thoughts and feelings, our name, our hometown, our workplace, our marital status and our
image. Online services such as Cheaterville allow individuals to post the name, picture and
details of others who have been unfaithful in romantic relationships, in order to warn others
against engaging in relationships with those individuals.48 The website does not check the
accuracy of the allegations, and only provides a comment section so that the identified
individuals can respond. Facebook’s Check-In service allows users to post on their page
where they are and who they’re with. Google’s new Hangouts and Circle services provide
similar features. However, Google claims to allow users to share information with the people
47
Solove, above n 7, vii.
48
Cheaterville, Cheaterville Home (5 October 2011) Cheaterville < http://cheaterville.com/>.
P a g e | 17
You share different things with different people. But sharing the right stuff with the right
people shouldn’t be a hassle. Circles make it easy to put your friends from Saturday night in
one circle, your parents in another, and your boss in a circle by himself, just like real life. 49
Almost every era has seen technology increase the flow of information; with the penny press
in the 1830s, the telephone in 1876, the snap camera in 1884, radio in 1900s, modern
television in the 1950s, the internet in the mid 1990s and smart phones within the last ten
years. The Gillard Government’s current commitment to build the National Broadband
Network [‘NBN’] means that 93% of Australians will have access to the internet via a high
speed fibre network once roll-out of the network is completed,50 and Australia will be among
the world’s leading digital economies by 2020.51 Yet the internet poses different challenges
In the offline world, people had their fifteen minutes of fame and were forgotten the next day.
The internet’s boundless and omnipresent nature means that people’s stories are always
accessible. In a matter of milliseconds, that embarrassing thing you did last night is just a
Google search away,52 accessible to the entire world, saved as personal chronicles for infinity,
With the click of a button, information can be instantaneously uploaded online and shared
with others, whether from a mobile phone, computer, webcam, Ipad or other electronic
online, the free flow of information has reached enormous levels never before seen by
humankind. To illustrate, there are 750 million active users on Facebook, who collectively
49
Google, A Quick Look at Google+ (28 September 2011) Google <https://www.google.com/intl/en/+/
learnmore/index.html#circles>.
50
Commonwealth, Issues Paper, above n 43, 10.
51
Department of Broadband, Communications and the Digital Economy, The Vision (23 October 2011) National
Broadband Network < http://www.nbn.gov.au/the-vision/>.
52
Ruben Rodrigues, ‘Privacy on Social Networks: Norms, Markets and Natural Monopoly’ in Saul Levmore and
Martha C Nussbaum (eds), The Offensive Internet (Harvard University Press, 2010) 237.
53
Solove above n 7, 10.
P a g e | 18
spend over 700 billion minutes on the site a month.54 Facebook is the second most-visited
site in Australia.55 Twitter boasts over 100 million active users.56 Around 3 billion YouTube
videos are viewed everyday.57 This represents a phenomenal flow of information globally.
Online information can be a cash-cow for advertisers and online businesses, and also for the
social networking sites that provide the information. For instance, when a user ‘likes’ a page
on Facebook, such as a certain clothing brand or a confectionary product, Facebook can sell
ads to those businesses targeted at the users who like the page. Facebook receives data from
advertisers when users visit their sites, even if the user’s profile is set to private. Facebook
then sells the user’s endorsement, ‘with no payment other than the continued use of its
website’.58 Facebook made $2 billion last year, which was a 157% increase from 2009.59
sharing. ‘Listen to a music app, and every song will appear in ‘tickers’ of your friends… Go
for a run using Nike Plus, an electronic distance calculator, your effort is logged for all to
critique. Watch a movie, its title is broadcast to all you know.’60 Guvera, a music-sharing
service, provides free music downloads to individuals in exchange for personal information
such as their likes and dislikes, which are used by the company’s advertising partners.61
Individuals may therefore be more inclined to provide personal information if they perceive
54
Facebook, Statistics (14 September 2011) Facebook <http://www.facebook.com/press/info.php?statistics>.
55
Tim Dick, ‘From private life to public knowledge’, News Review, Sydney Morning Herald (Sydney) 1 October
2011, 7.
56
Twitter, ‘One hundred million voices’ on Twitter, Twitter Blog (8 September 2011) <http://blog.twitter.com>.
57
YouTube, Statistics (14 September 2011) YouTube <http://www.youtube.com/t/press_statistics>.
58
Dick, above n 55.
59
eMarketer.com, cited in Dick, above n 55.
60
Dick, above n 55.
61
Michelle Star, ‘Guvera music site uses guerrilla advertising tactics’, C Net (15 March 2010) <http://www.
cnet.com.au/ guvera-music-site-uses-guerrilla-advertising-tactics-339301774.htm>.
P a g e | 19
Critics also argue that Facebook cookies, which are packets of data used to track user
behaviour, keep sending information to Facebook even after the user logs out, resulting in
‘silent total surveillance’.62 Facebook bluntly responded to these criticisms: ‘we don’t share
information we receive about you with others’.63 However, Facebook’s privacy policy, under
the heading ‘how we share information’, provides large exceptions to this rule. Facebook
shares users’ information in a range of situations. For example, when it has the user’s
permission, a user invites a friend to join, or for advertising and offering services.
Significantly, a search engine can gain access to the name and profile picture of a user, and
anything else which is set to the ‘Everyone’ setting.64 Such frictionless sharing of
information is beyond individual control, unless the user leaves the site.
YouTube and social networking sites have meant that the media also has access to this public
and voluntarily-provided information, which has led to the creation of internet sensations,
celebrities and scandals. In 2008, Olympic swimmer Stephanie Rice caused controversy over
raunchy photographs of her in a police costume on her Facebook page. The photos were
removed from Facebook but were then reproduced on the Daily Telegraph’s website,
receiving 1.7 million hits in one week.65 In 2009, 19 year old Sydney woman Claire
Kings Cross shooting went viral on YouTube and was later exposed as an elaborate lie. The
story was covered by the Australian media, including A Current Affair. She was hounded by
the press and turned to a Public Relations agency to handle the attention it caused.66 In
March this year, fifteen year old Casey Haynes fought back against a schoolyard bully, with
62
Dick, above n 55.
63
Dick, above n 55.
64
Facebook, Data Use Policy (September 2011) Facebook <http://www.facebook.com/full_data_use_policy>.
65
Angela Saurine, ‘Stephanie Rice Facebook pictures censored’, Daily Telegraph (online), April 2 2008
<http://www.dailytelegraph.com.au/news/rice-facebook-pics-censored/story-0-1111115947818>.
66
Daily Telegraph, ‘Chk Chk Boom girl Clare Werbeloff flees as Facebook fury erupts’, Daily Telegraph
(online), 25 May 2009 < http://www.dailytelegraph.com.au/news/chk-chk-boom-girl-claire-werbeloff-flees-as-
facebook-fury-erupts/story-e6freuy9-1225715728133>.
P a g e | 20
the fight being caught on camera and posted on YouTube,67 which also created a media
frenzy. Currently, these individuals have no redress for invasion of their privacy.
On the other hand, online anonymity has proved fatal in a number of cases. In the United
States, a thirteen year old girl committed suicide after the mother of one of her school friends
purported to be her boyfriend, and then told her that the world would be better off without
her.68 This and other situations of cyber-bullying indicate that the law currently offers no
comprehensive and effective education campaign so that individuals may be informed and
warned about the long-term consequences of their behaviour online. A US study has revealed
that 20 million Facebook users are under eighteen years of age. Over 7.5 million users are
under thirteen,69 which is the stipulated minimum age of users under Facebook’s Statement of
Rights and Responsibilities.70 Five million are under 10 years.71 These worrying statistics
indicate that young people are placing themselves at risk of dangerous online behaviour such
as cyber-bullying, and could be targeted by sexual predators. Furthermore, young people fail
to appreciate the implications that online information can have for the future.
These scenarios and studies pose the question, has the free flow of information made us less
free?72 The long-term consequences may be dire for people whose personal image or
information is found online and spread further by the media. Employment opportunities and
67
YouTube, Victim fights back in NSW Sydney school (16 March 2011) YouTube, <http://www.youtube.com
/watch? v=isfn4OxCPQs>.
68
Mail Online, ‘Girl, 13, commits suicide after being cyber-bullied by neighbour posing as teenage boy’, Daily
Mail (online) 19 November 2007 <http://www.dailymail.co.uk/news/article-494809/Girl-13-commits-suicide-
cyber-bullied-neighbour-posing-teenage-boy.html>.
69
Dawn.com, ‘7.5 million Facebook users are under 13’, Dawn.com (online), 12 May 2011 <http://www.dawn.
com/2011/05/12/7-5-million-facebook-users-are-under-13-study.html>.
70
See Rule 4.5 in Facebook, ‘Statement of Rights and Responsibilities’ Facebook.com (online), 26 April 2011
<http://www.facebook.com/terms.php>.
71
Dawn.com, above n 69.
72
Solove, above n 7, 2.
P a g e | 21
University in the United States, where a Law Professor, angered by Justice Scalia’s reluctance
to support protection of personal information, set his students the task of collecting as much
information about the judge as they could. The students turned in fifteen pages of
information, which included his Honour’s home address, telephone number, value of his
home, his wife’s personal email address, photos of his grandchildren and even his personal
movie and food preferences.73 His Honour’s response was that the project was ‘perfectly
legal’ but it showed ‘abominably poor judgment’.74 This type of project illustrates that once
information is in the public space, it becomes public property and is therefore beyond
However, this paper is not arguing that such technological advances are all negative within
advantages for human welfare and collective knowledge. Some technological advancements
that might impinge on privacy may in fact facilitate the common good and the public interest,
for example the iPhone Application which captures a photo of anyone who tries to unlock a
stolen phone and sends it to the nominated email address of the phone’s owner.76 However,
there is potential for technology to be abused. For example, in August this year a male
Australian Defence Force Academy cadet was charged with indecency and suspended from
training after he used his mobile phone to film a female cadet in the shower.77 This paper
73
Marta Neal, ‘Fordham Law Class Collects Personal Info about Scalia’ American Bar Association Journal
(online) 29 April 2009 <http://www.abajournal.com/news/article/fordham_law_class_collects_scalia_
info_justice_is_steamed>.
74
Ibid.
75
Kirby, above n 1, 7.
76
CBS News, ‘Say Cheese! iPhone App catches thief’, CBS News (online), 8 October 2011 <http://www.
cbsnews.com/stories/2011/10/08/scitech/main20117622.shtml>.
77
ABC News, ‘ADFA cadet suspended over shower scandal’, ABC News (online), 27 August 2011
<http://www.abc.net.au/news/2011-08-27/adfa-cadet-suspended-after-shower-scandal/2858408>.
P a g e | 22
brings into sharp focus the main challenges and policy issues raised by such technological
Even before the birth of the internet, American writers Warren and Brandeis acknowledged
The intensity and complexity of life, attendant upon advancing civilisation, have rendered
necessary some retreat from the world, and man [or woman], the refining influence of culture,
has become more sensitive to publicity, so that solitude and privacy have become more
essential to the individual; but modern enterprise and invention have, through invasions upon
his [or her] privacy, subjected him [or her] to mental pain and distress, far greater than could
In 1976, after the adoption of the ICCPR, the United Nations [‘UN’] recommended that
for the privacy of the individual against invasions by modern technological devices’.79 As the
information is likely to increase rather than decrease: ‘Access to this information is what
occasions the contemporary fragility of privacy – a human attribute that has been steadily
eroded over the last century’.80 The development of modern technology and communication
therefore provide very strong reasons to protect privacy and provide redress for those whose
privacy is invaded.
78
Warren and Brandeis, above n 25, 196.
79
United Nations Secretary General, Respect for the privacy and integrity and sovereignty of nations in the light
of advances in recording and other techniques, UN Doc E/CN.4/1116 (1976).
80
The Honourable Justice Michael Kirby, ‘Privacy in Cyberspace’ (1998) 21 University of New South Wales
Law Journal 323, 325.
P a g e | 23
While we voluntarily reveal personal information everyday in the online realm, there are
many situations in modern life where invasions of our privacy are out of our control. The
recent behaviour by the now-defunct News of the World sent shockwaves throughout the
globe when serious allegations of phone-hacking were made against the newspaper.
industrial scale.’81 Individuals’ private and innermost feelings were essentially ‘bought and
sold for commercial gain.’82 Subsequent investigation of the newspaper’s actions revealed
that the practice of phone-hacking was widespread within the organisation, and was openly
discussed in editorial conferences, until the Editor, Andy Coulson, banned explicit reference
to the term.83
News of the World hired private investigators to hack into the phones of not only the Royal
family and celebrities, such as Hugh Grant and Scarlett Johansson, but also the phones of
private citizens. The voicemails of victims and families of the victims of the 9/11 terrorist
attacks in New York were allegedly targeted, which would have likely included ‘harrowing
messages from desperate loved ones trying to make contact with their relatives’.84 News of
the World was also found to have hacked into the voicemail of murdered school girl from the
United Kingdom, Milly Dowler, and allegedly deleted some of Milly’s voicemails, which
gave her family hope that she was alive.85 Furthermore, the Murdoch press was recently
81
Australian Broadcasting Corporation, ‘Bad News’, Four Corners, 29 August 2011 (Gordon Brown).
82
Ibid.
83
Julia May, ‘Letter reopens hacking scandal’, Sydney Morning Herald (online) 17 August 2011 <http://www.
smh.com.au/world/letter-reopens-hacking-scandal-20110816-1iwka.html >.
84
Sydney Morning Herald, ‘9/11 victims ‘targeted’ by tabloid phone hackers’, Sydney Morning Herald (online),
11 July 2011 < http://www.smh.com.au/world/911-victims-targeted-by-tabloid-phone-hackers-20110711-
1ha90.html>.
85
Nick Davies and Amelia Hill, ‘Missing Milly Dowler’s voicemail was hacked by News of the World’, The
Guardian (online) 4 July 2011 <http://www.guardian.co.uk/uk/2011/jul/04/milly-dowler-voicemail-hacked-
news-of-world>.
P a g e | 24
investigated for hacking into the computers of competitors and for engaging in industrial
espionage.86 The case settled out of court for an estimated $500 million.87
Although there has been no evidence to suggest that this sort of behaviour is occurring in
Australia, such events ‘put the spotlight on whether there should be a [right to privacy]’,88 and
have led to widespread concern in the community.89 The phone-hacking scandal has brought
into sharp focus the need for adequate privacy protection in Australia so that this kind of
the same fashion, they would be guilty of an offence under section 7 of the
Telecommunications (Interception and Access) Act 1979 (Cth).90 However, looking more
broadly and outside the phone-hacking scandal, there are major deficiencies in privacy laws
in Australia, particularly where the privacy of individuals are being invaded by the media.
The News of the World situation simply sheds light on the need for a closer examination of
Privacy provides individual autonomy, emotional security, the sharing of confidences and
intimacies, and enhances the ability to reflect on personal values.91 Privacy is integral to an
86
Scott Zamost, Todd Schwarzschild and Drew Griffin, ‘Exclusive: Videos detail News America tactics against
competitors’ CNN US (online) 14 October 2011 <http://articles.cnn.com/2011-10-14/us/us_news-corp-
america_1_world-phone-hacking-scandal-news-corp-british-newspaper?_s=PM:US>.
87
CNN, ‘Tapes show News Corp. subsidiary tactics’ CNN (online) 14 October 2011 <http://edition.cnn.com/
video/#/video/crime/2011/10/13/pkg-griffin-newscorp-hacking.cnn?hpt=hp_t2>.
88
Brendan O’Connor, A Right to Privacy in Australia (21 July 2011) Attorney General <http://www.ag.gov.au/
www/ministers/oconnor.nsf/Page/MediaReleases_2011_ThirdQuarter_21July2011-ArighttoprivacyinAustralia>.
89
For example, 51% in an online poll said they had become more concerned about phone-hacking following the
scandal: ‘Aussies concerned about phone-hacking’ The Age (online) 25 July 2011 <http://news.theage.com.au/
breaking-news-national/aussies-concerned-about-phone-hacking-20110725-1hwuc.html>.
90
See also Chapter Two and Appendix Table One.
91
Westin, above n 14, 33.
P a g e | 25
individual’s social and intimate relationships, mental health, employment, freedom and
creativity.92
Invasions of privacy can occur in a myriad of ways in contemporary society. The methods by
which others can invade privacy will only increase as technology advances. The law must
Social networking, globalisation and the free flow of information have operated to increase
the amount of personal information available in the public domain, and events such as phone-
hacking this year have drawn attention to the failure of the law to protect personal privacy
and the ease in which privacy can be invaded. Telemarketing, reality TV shows like Big
Brother, the Bill Henson photography scandal93 and the prospect of introducing an Australia
Card94 also indicate that privacy is a large and topical issue.95 While these situations ‘pose
new and difficult issues, they are variations on the same immemorial tensions in the law in
Australia: the tension between privacy and free speech, the nature of privacy, [and] the
The means used to intrude upon individual privacy will continue to change. The reasons for
privacy protection will remain the same. The law, as it stands currently, does not address
these concerns.
92
Wacks, above n 18, 11.
93
Wendy Frew, ‘Artists may face classification to counter nudity’, The Age (online), 18 April 2011
<http://www.theage.com.au/entertainment/art-and-design/artists-may-face-classification-to-counter-nudity-
20110417-1djrv.html>.
94
Australia Card Bill 1986 (Cth).
95
The invasion of the author’s privacy has further informed the views expressed in this paper. The author’s
wallet was stolen in 2010 by a drug-addicted thief at a supermarket, and later the author’s identity was stolen
through posing as the author to a bank teller to take money from the author’s accounts and to take a car for a
test-drive.
96
Solove, above n 7, 205.
P a g e | 26
Do humans actually have a right to privacy? If so, where does it come from? What is
its scope? How does it rank in comparison to other rights? Legal discourse has not
sufficiently addressed these issues. Most privacy advocates simply assume that the right to
Privacy,100 which shows how different components of privacy are currently protected under
Australian law. The table illustrates that privacy in general is, at best, protected incidentally.
For example, criminal law and tort protect some aspects of territorial privacy101 and bodily
privacy.102 Defamation law protects reputation, but only to the extent that the information
97
Doyle and Bagaric, above n 5, 13.
98
New South Wales Law Reform Commission, Invasion of Privacy, Consultation Paper 1 (2007) 56 [2.85].
99
Doyle and Bagaric, above n 5, 98.
100
See page 75.
101
Inclosed Lands Protection Act 1901 (NSW) s4; Lincoln Hunt Australia Pty Ltd v Willesee (1986) 4 NSWLR
457, 465.
102
Summary Offences Act 1988 (NSW), Crimes Act 1900 (NSW); Wilkinson v Downton [1897] 2 QB 57.
103
Defamation Act 1974 (NSW).
104
Coco v AN Clark (Engineers) Ltd. [1969] RPC 41.
105
Telecommunications (Interception and Access) Act 1979 (Cth).
P a g e | 27
While the most highly regulated protection of privacy occurs in the information privacy
realm,106 even this statutory scheme is ‘complex, uneven, often overlapping and far from
Significantly, there is no general action for breach of privacy in Australia. This creates
uncertainty and inconsistency, particularly because the common law is developing at different
rates and in different ways across the states and territories. This poses large difficulties for
individuals and corporations who need to ‘assess the effect of the law on their operations and
to implement appropriate policies to minimise their potential liability’ under the law.108
other individuals would only be covered peripherally and partially by the current framework.
There is essentially no one-stop-shop for privacy protection. The fabric of the Australian
For the reasons examined below, and through evaluation of the approaches used in overseas
jurisdictions, this paper argues that a statutory cause of action is the preferred method of
protection for privacy. This is also generally supported by the ALRC109 and NSWLRC.110
Extending existing common law or equitable actions is not appropriate for the kind of privacy
protection envisaged by this paper. This Chapter examines the inadequacies of those
methods.
106
Privacy Act 1988 (Cth).
107
Doyle and Bagaric, above n 5, 98.
108
Australian Law Reform Commission, Report 108, above n 6, vol 3, 2536, [74.2].
109
Ibid, vol 3, 2564 [74.116].
110
New South Wales Law Reform Commission, Report No 120, above n 2, 21-22 [4.16]-[4.17].
P a g e | 28
New Zealand takes a common law approach to protection of privacy. The privacy tort
expectation of privacy and secondly, the publicity of those facts are considered highly
offensive to an objective reasonable person.111 The Court has regard to the particular facts of
the case and the use of the offending material in the circumstances.112
However, the approach in New Zealand is narrow. In fact, the Court of Appeal in Hosking
held that any all-encompassing action for breach of privacy should be ‘at the instigation of
the legislature, not the courts’.113 The common law action is restricted only to invasions of
privacy where the defendant gives publicity to private and personal information of the
plaintiff.114 The tort does not cover intrusions upon a plaintiff’s seclusion. The tort does not
protect situations where the private act or information is not publicised, for example in a
peeping-Tom scenario where privacy is invaded by a neighbour looking into the home of
another and viewing intimate acts or conversations. The tort also does not provide a simple
Only fifteen people have taken action under this tort, many of them without a public
profile.116
111
Hosking v Runting [2005] 1 NZLR 1, [117] (Gault P and Blanchard JJ).
112
Rogers v TVNZ [2007] NZSC 91, [59] (Tipping J).
113
Hosking v Runting [2005] 1 NZLR 1, [110] (Gault P and Blanchard JJ).
114
Hosking v Runting [2005] 1 NZLR 1, [148] (Gault P and Blanchard JJ), and [244] (Tipping J).
115
Hosking v Runting [2005] 1 NZLR 1, [110], [119] (Gault and Blanchard JJ); see also Amanda Stickley,
‘Common Law Tort of Privacy – Faltering Steps?’ (2004) 25 Queensland Lawyer 81, 82.
116
This includes lower court decisions before Hosking: Professor John Burrows, ‘Privacy and the Courts’
(Speech delivered to the Privacy Forum, Wellington New Zealand, 27 August 2008).
P a g e | 29
publicity and false light)118 have proved of limited effect in the United States. 119 The torts
‘failed to provide effective protection of privacy,’ 120 because of the priority afforded to free
speech under the First Amendment of the United States Constitution. Whilst the privacy torts
were not originally anchored in any constitutional guarantees, the Courts have since
developed zones of privacy121 within a penumbra of guarantees under the Bill of Rights, in
Despite this, constitutional privacy laws only cover narrow issues such as marriage, the
family, procreation and abortion, and do not extend to information and seclusion privacy.123
This is largely due to the strength of the constitutionally-entrenched right to freedom of the
press,124 and the low threshold requirement for disclosure of information: If information is
117
Only Virginia, Minnesota, Rhode Island and Wisconsin do not protect privacy: see New South Wales Law
Reform Commission, Consultation Paper 1, above n 98, 94 [4.7].
118
Prosser, above n 26, 389.
119
Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2540 [74.19].
120
David A Anderson, ‘The Failure of American Privacy Law’ in Basil S Markensis (ed) Protecting Privacy:
The Clifford Chance Lectures Volume 4 (Oxford University Press, 1999) 151.
121
New South Wales Law Reform Commission, Consultation Paper 1, above n 98, 97-98 [4.15].
122
Griswold v Connecticut 381 US 479 (1965).
123
Mason, above n 28, 47.
124
United States Constitution First Amendment.
125
Restatement (Second) of Torts § 652D.
P a g e | 30
A common law tort for invasion of privacy is not an adequate avenue for protecting privacy
in Australia. Statute is preferred over common law development. Minister for Privacy and
Freedom of Information, Brendan O’Connor, announced in July 2011 that the government
supports a statutory right to sue for serious privacy invasions, ‘rather than letting the system
of privacy regulation evolve in an ad-hoc way through court decisions.’126 Simply plugging
the gaps in Australian privacy law by extending existing common law causes of action is not
preferred.127
Furthermore, the Courts are unwilling to allow such a development. For sixty years,
Australian Courts rejected the proposition that there was a tortious action for invasion of
privacy.128 In 2001, the High Court in Lenah held that the authority in Victoria Park Racing129
did not stand in the way of developing a tort for invasion of privacy, therefore extending an
invitation130 to the common law to create the action. However, no Court has yet taken this
bold step.131 The District Court of Queensland and Victorian County Court represent some of
the only Courts to hold that such a step is a logical and desirable one to take.132 Yet, in the
latter Court, the decision was appealed and eventually settled, therefore providing no
126
Murphy, Katharine, ‘Canberra to move on Privacy Law’, The Age (online) July 21 2011 <http://www.theage.
com.au/national/canberra-to-move-on-privacy-law-20110720-1hp19.html#ixzz1T58aRPfx>.
127
New South Wales Law Reform Commission, Report No 120, above n 2, 19 [4.11].
128
Victoria Park Racing and Recreation Grounds Company Limited v Taylor (1937) 58 CLR 479.
129
Victoria Park Racing and Recreation Grounds Company Limited v Taylor (1937) 58 CLR 479, 496.
130
Amanda Stickley, ‘Personal Privacy: Boldly Going Where No Australian Court Has Gone Before: Part I’
(2003) 24 Queensland Lawyer 72.
131
Grosse v Purvis [2003] QDC 151 (16 June 2003) (Skoien J).
132
Grosse v Purvis [2003] QDC 151 (16 June 2003) (Skoien J) [442].
P a g e | 31
definitive precedent.133 Other Courts continue to reject tortious claims for invasion of
privacy.134
The Lenah High Court had the opportunity to create a tort for invasion of privacy. However,
given this chance, it refused recognition, therefore failing ‘on all counts’135 to protect privacy
generally. The reluctance of the common law to find a cause of action for invasion of privacy
therefore exemplifies why the common law is inadequate to protect privacy in any concrete
Like Australia, the United Kingdom ‘knows no common law tort of invasion of privacy’.136
Furthermore, previous attempts at legislative reform in the UK failed at the first hurdle.137
However, without a general or ‘freestanding’ right to privacy, the UK’s equitable action for
protection.139 This was driven partly by the heavy hand of international privacy obligations
contained in Article 8 of the ECHR,140 which was ratified to some extent in the Human Rights
133
Australian Broadcasting Commission v Jane Doe [2007] VCC 281.
134
See, eg, Giller v Procopets [2004] VSC 113; Kalaba v Commonwealth of Australia [2004] FCA 763; Milne v
Haynes [2005] NSWSC 1107; Moore-Mcquillan v Work Cover Corporation SA [2007] SASC 55;
135
New South Wales Law Reform Commission, Invasion of Privacy, Consultation Paper 1, above n 98, 55
[2.80].
136
OBG v Allan; Douglas v Hello! Ltd [2007] 2 WLR 920, [272]; see, eg, in Australia, Victoria Park Racing and
Recreation Grounds Co Ltd v Taylor (1937) 58 CLR 479 and the decline of the High Court in Lenah to create a
tort for invasion of privacy.
137
See, eg, Right of Privacy Bill 1961 (UK), Right of Privacy Bill 1967 (UK), Right of Privacy Bill 1969 (UK),
Right of Privacy Bill 1987 (UK), Right of Privacy Bill 1989 (UK).
138
Which traditionally is comprised of the elements from Coco v AN Clark (Engineers) Ltd [1969] RPC 41,
which require the information to be confidential, imparted in circumstances where there is an obligation of
confidence, and the unauthorised use of that information is detrimental.
139
Lindsay, above n 21, 4.
140
Convention for the Protection of Human Rights and Fundamental Freedoms, opened for signature 4
November 1950, 213 UNTS 221 (entered into force 3 September 1953) Article 8.
P a g e | 32
Act 1998 (UK).141 Significantly, however, the Act also upholds the right to freedom of
expression,142 which is manifested within Article 10 of the ECHR.143 Both rights are
considered to be prima facie equal and are weighed against each other by the courts using a
proportionality test.144
However, such an extension within the traditional interpretation of the equitable cause of
action represented an attempt to fit a square peg in a round hole. The second element for
breach of confidence – that the information was imparted in circumstances giving rise to an
Media organisations, for example, do not have fiduciary duties to ordinary members of the
public. The obligation of confidence would have to arise once the defendant has unlawfully
or surreptitiously acquired the information that he or she should have known was ‘not free to
use’,146 which is counter-intuitive and would represent a significant leap for Courts of Equity
to make.
The idea that the equitable action for breach of confidence can protect privacy interests in
Australia is not new.147 Rivette argues that the case of Giller v Procopets (2008) 40 FamLR
378 gives breach of confidence the ‘teeth to respond to invasions of privacy arising from the
141
Human Rights Act 1998 (UK) ss2, 6.
142
Human Rights Act 1998 (UK) s12.
143
Convention for the Protection of Human Rights and Fundamental Freedoms, opened for signature 4
November 1950, 213 UNTS 221 (entered into force 3 September 1953) Article 10.
144
Ash v McKennitt [2007] 3 WLR 194, [46].
145
Coco v AN Clark (Engineers) Ltd [1969] RPC 41.
146
Ash v McKennitt [2007] 3 WLR 194, [8].
147
There are a large number of academic articles on the overlap between breach of confidence and privacy,
which are beyond the scope of this paper.
P a g e | 33
non-consensual disclosure of personal information’.148 Read with Lenah, Rivette argues that
or piece of information by the media, where that material is considered private if its
While at first blush, this approach may seem to adequately address the concern, such an
To begin with, confidentiality and privacy are ‘simply different concepts. While most
confidential acts and information could arguably be described as private, not all private
activity is necessarily confidential.’150 To reconcile the two would entail trying to fit a square
peg in a round hole.151 Plaintiffs would be left without redress.152 Breach of confidence is
confidence. Breach of confidence is not, under its current construction, suited to all
situations where one person invades the privacy of another, particularly when the parties
involved are strangers and do not hold obligations of confidence to one another. Only
intrusions of privacy which result in actual publication are actionable under the current test
for breach of confidence, no matter how ‘strong and understandable may be the feeling of
harassment of a person who is hounded by photographers’153 or the media. This would mean
that the plaintiff in Australian Broadcasting Commission v Jane Doe [2007] VCC 281 would
have an equitable action in breach of confidence, because she was identified on television as
148
Michael Rivette, ‘Litigating privacy cases in the wake of Giller v Procopets’ (2010) 15 Media and Arts Law
Review 283.
149
Ibid, 289.
150
New South Wales Law Reform Commission, Invasion of Privacy, Consultation Paper 1, above n 98, 54
[2.80].
151
Johnston, Mark, ‘Should Australia force the square peg of privacy into the round hole of confidence or look
to a new tort?’ (2007) 12 Media and Arts Law Review 441.
152
New South Wales Law Reform Commission, Invasion of Privacy, Consultation Paper 1, above n 98, 56
[2.84].
153
R Toulson, ‘Freedom of Expression and Privacy’ (Paper presented at Association of Law Teachers Lord
Upjohn Lecture, London, 9 February 2007), 7; quoted in Australian Law Reform Commission, Report No 108,
above n 6, 2564.
P a g e | 34
a victim of rape.154 Conversely, the plaintiff in Grosse v Purvis [2003] QDC 151 would not,
because the privacy action related to stalking and other acts that were not publicised by the
media.155 This approach would thereby create inconsistency if it were applied in Australia,
particularly given the reticence of the courts toward providing equitable privacy protection at
would therefore only attach to information that ought not to be disclosed, without any real
regard for the intrinsic value of the information itself.156 Furthermore, not all privacy actions
are information-related. Interference with personal bodily privacy157 would not be covered
Finally, mere emotional distress will often be the only damage for which a plaintiff claims as
alone. While Neave and Ashley JJA relied upon English authority to support a finding of
applicable in Australia.159 Moreover, Australia does not have a Bill of Rights statute upon
154
In this case, the ABC had reported on a court case concerning the plaintiff’s husband. The television
broadcasts identified his name, the offence of rape within marriage which he was convicted with, the suburb in
which they lived, and the victim’s name (which included her maiden name, which she reverted to after the rape).
The plaintiff took action against the Australian Broadcasting Corporation (ABC) for, amongst other claims,
breach of privacy and breach of confidence, and was successful in obtaining compensation.
155
In this case, the plaintiff claimed breach of privacy, amongst other claims, for acts of stalking, intimidation,
abusive phone calls and other acts by the defendant.
156
New South Wales Law Reform Commission, Report No 120, above n 2, 55 [2.82].
157
See, eg, Wainwright v Home Office [2004] 2 AC 406.
158
Giller v Procopets (2008) 40 Fam LR 378.
159
Michael Tilbury, ‘Remedies for breach of confidence in privacy contexts’ (2010) 15 Media and Arts Law
Review 290, 291.
P a g e | 35
Extending the breach of confidence action to cover privacy cases is inappropriate, and
stretches the limits such that the core of both actions is compromised. The two actions
should be separate.
A small number of jurisdictions have created statutory protection for privacy. Australia is
therefore in a unique position to draw upon the benefits of the jurisdictions with successful
legislation, and also to learn from and avoid failures of other jurisdictions. For example,
some provinces of Canada and some American states provide general statutory protection for
privacy; however the laws are not uniform across the countries. Ireland160 and Hong Kong161
have considered passing legislation which create causes of action for invasions of privacy,
however both countries’ respective parliaments have not yet passed any laws. Appendix
Table Two: ‘Elements, Defences and Remedies in Privacy Statutes from Overseas
160
Ireland Working Group on Privacy, Report of Working Group on Privacy (2006).
161
Hong Kong Law Reform Commission, Civil Liability for Invasion of Privacy (2004) 139 [Recommendation
2].
162
See page 81.
P a g e | 36
Columbia166 each passed privacy legislation creating statutory torts for violation of privacy.
All four jurisdictions create a tort, actionable without proof of damage, for a person who
wilfully and without claim of right, violates the plaintiff’s privacy without their consent or
lawful authority.167
Manitoba utilises a higher threshold for the elements of the action by requiring the violation
to be substantial, unreasonable and without a claim of right.168 However, even in the other
three Canadian jurisdictions maintaining lower thresholds, there have been few actions for
violation of privacy, and plaintiffs have successfully instituted such actions in only 25% of
the cases.169 Furthermore, nominal damages and exorbitant litigation costs have meant that
Each province, except for British Columbia, provides a non-exhaustive list of examples of the
types of violations of privacy which would come under the tort, including auditory
Each province lists defences171 for the tort, which include consent, lawful right, public
interest, exercising duties of peace officers, reasonable news gathering172 and defamation
privileges. Each province, except for British Columbia, also provides a range of remedies,
including damages, injunctions, account of profits and destruction of the offending material.
163
Privacy Act 1978 RSS (Saskatchewan) c P-24.
164
Privacy Act 1987 CCSM (Manitoba).
165
Privacy Act 1990 RSNL (Newfoundland and Labrador).
166
Privacy Act 1996 RSBC (British Columbia).
167
British Columbia also creates a tort for unauthorised use of name or portrait.
168
Privacy Act 1987 CCSM (Manitoba) s 2(1).
169
New South Wales Law Reform Commission, Consultation Paper 1, above n 98, 84 [3.49].
170
Chester, Murphy and Robb, above n 38, 359.
171
British Columbia uses the term ‘exception’ instead of ‘defence’.
172
Only in Saskatchewan.
P a g e | 37
There is limited statutory protection of privacy in the United States, however this is also
piecemeal. Some states simply recognise or alter the common law torts through statute.173
The California Civil Code creates a range of statutory torts. For example, the tort of entering
land with the intent to capture images, sound recordings or physical impressions of the
Massachusetts General Law also provides that a person has ‘a right against unreasonable,
substantial or serious interference with his privacy. The superior court shall have jurisdiction
in equity to enforce such right and in connection therewith to award damages.’175 However,
like Australia, the United States has a piecemeal and patchy framework for protection of
privacy. Such an approach lacks consistency and uniformity – two factors that are highly
valued in any legal system. Australia can and should learn from the successes and failures in
overseas jurisdictions in order to formulate the best possible approach to privacy protection.
This paper strongly endorses a statutory approach to the protection of privacy. The reluctance
of the common law to develop, and the inadequacy of equity to formulate the action for
invasion of privacy, provides the impetus for statutory reform within the privacy law area. A
statutory cause of action ‘avoids the problems inherent in attempting to fit all the
circumstances that may give rise to an invasion of privacy into a pre-existing cause of
action.’176 Moreover, a statutory scheme provides a more ‘flexible approach to defences and
173
See, eg, Code of Virginia §§ 8-650, c671; 765 Illinois Consolidated Statutes 1075/10 9; New York State
Consolidated Laws, Civil Rights §50.
174
California Civil Code 1998 §1708.8(a).
175
Massachusetts General Laws, Part III Courts, Judicial Officers and Proceedings in Civil Cases, Title I Courts
and Judicial Officers, Chapter 214 Equity Jurisdiction, Section 1B.
176
Australian Law Reform Commission, Report No 108, above n 6, 2564 [74.116].
P a g e | 38
remedies’,177 is not constrained by rules or assumptions of torts or equity, and allows for
explicit consideration of competing public interests.178 While the Canadian and United States
privacy, the fact that they are inconsistent nationwide means that the Australian approach
should be uniform and dependent on the unique Australian legal, social and political context.
The following two chapters will explore the Australian statutory reform options in detail.
177
Ibid.
178
Ibid, vol 3, 2565 [74.117]-[74.118].
P a g e | 39
The pattern is familiar. Private lives are made public spectacle by the tabloids. A general
sense of unease ensues. Politicians appear to fret. Judges lament the incapacity of the
common law to help. Committees are established. ‘Privacy’ legislation is proposed. Alarms
are sounded by the quality press about the onslaught against freedom of speech. Inertia
settles on politicians, reluctant to offend newspaper editors. The debate subsides until the
The call for privacy reform in Australia is well established. Both the ALRC and NSWLRC
recently recommended the overhaul of the privacy law framework and the creation of a
statutory cause of action for invasions of privacy. The Victorian Law Reform Commission
also recommended privacy reform; however it proposed two narrow causes of action;180 one
related to misuse of private information181 and the other related to intrusion upon seclusion.182
In 2008 and 2009, the ALRC and NSWLRC worked together with the common aim of
creating a statutory cause of action for invasions of privacy, to be introduced under a uniform
proposals.183 Nonetheless, there are some differences in approach between the federal and
179
Wacks, above n 39, 1.
180
Victorian Law Reform Commission, Surveillance in Public Places, Report No 18 (2010) 149
[Recommendation 22].
181
Ibid, 150 [Recommendation 23].
182
Ibid, 151 [Recommendation 24].
183
Australian Law Reform Commission, Review of Australian Privacy Law, Discussion Paper 72 (2007) 26-28,
[Proposals 5-1 – 5-7].
P a g e | 40
recommended change to Australian privacy law in the form of a statutory cause of action for
The ALRC’s 2008 Report, For Your Information: Australian Privacy Law and Practice, was,
amongst numerous other aims,186 designed to create a statutory cause of action for serious
The ALRC recommended that the cause of action be contained in a separate federal statute.188
This aimed to reduce inconsistencies and confusion, particularly surrounding the Privacy Act
1988 (Cth) which already deals with information privacy. The ALRC recommended that all
other common law actions for invasion of privacy (if any) be abolished, in order to ensure the
consistency and primacy of the legislation.189 A new statute would also result in national
uniformity, as the statute would cover federal, state and territory jurisdictions. However, the
ALRC noted that it would be a matter for government to decide how best to achieve
184
See page 86.
185
The proposals of the VLRC are not dealt with in detail in this paper.
186
There were 295 recommendations in the Report. For example, the ALRC sought to redraft the Privacy Act in
order to create Unified Privacy Principles that apply to public and private sector agencies.
187
Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2535-2586.
188
Ibid, vol 3, 2583 [74.195].
189
Ibid, vol 3, 2586 [Recommendation 74-6].
190
Ibid, vol 3, 2582 [74.191].
P a g e | 41
The ALRC took a conservative approach to the cause of action. The cause of action relates to
serious invasions of privacy,191 thereby importing a higher threshold for actionability than the
NSWLRC, which recommended a cause of action for invasions of privacy without the need
for the invasion to be serious.192 This was consciously intended by the ALRC to ensure that
privacy’s concomitant, the public interest in freedom of expression, was not unjustifiably
curtailed.193 The ALRC also recommended that the requisite mental element be limited to
intentional or reckless acts by the respondent.194 This means that accidental invasions are not
actionable under the statute, for example through photography or street art.195
The test to establish a serious invasion of privacy requires both a reasonable expectation of
privacy in all the circumstances, and the act must be ‘highly offensive to a reasonable person
of ordinary sensibilities’.196 Consent is also an essential element of the cause of action at this
The ALRC specified that the court take into account ‘whether the public interest in
maintaining the claimant’s privacy outweighs other matters of public interest’,198 including
matters of public concern and freedom of expression, when determining whether there has
been an invasion of privacy. This reflects the need to balance the public interest in
maintaining the claimant’s privacy with the public interest in freedom of expression, which is
of the cause of action, and not as a defence to the action, the ALRC places the competing
191
Cf New South Wales Law Reform Commission, which recommended an action for invasion of privacy
without the need for a degree of seriousness: New South Wales Law Reform Commission, Report No 120,
above n 2, 8 [3.2].
192
See page 42 under the heading: 3.2 ‘New South Wales Law Reform Commission Report’.
193
Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2568 [74.135].
194
Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2585 [Recommendation 74-3(c)].
195
Ibid, vol 3, 2569 [74.136]. See also SBS, ‘Privacy’, Insight Program, 25 October 2011 (Cherine Fahd).
196
Ibid, vol 3, 2568 [74.133]-[74.135]; Australian Broadcasting Corporation v Lenah Game Meats (2001) 208
CLR 199 at [42] (Gleeson CJ).
197
Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2575 [74.159].
198
Ibid, vol 3, 2584 [Recommendation 74-2].
P a g e | 42
rights on equal footing.199 This contrasts with the Canadian approach, which identifies
reasonable news gathering200 and the public interest and fair comment201 as defences to the
cause of action.
The ALRC recommended including a non-exhaustive list of the types of invasion that might
fall within the cause of action. These comprise of factual scenarios in which there has been
individual’s private life.202 This is a useful method to indicate legislative intention, and
assists courts with developing the scope of the action.203 This mirrors the Canadian statutory
The ALRC recommended that the cause of action be brought only by natural persons, 205 on
the basis that the ‘desire to protect privacy is founded on notions of individual autonomy,
freedom and dignity’,206 which are values that do not extend after death.
The ALRC recommended providing an exhaustive list of the possible defences to the action.
The list contains three main defences: acts or conduct incidental to the exercise of a lawful
right of defence or person or property, conduct required or authorised by law, and the
publicised information was privileged under the law of defamation.207 The ALRC took a
restrictive approach to defences, choosing not to include defences such as consent, rebutting
199
Ibid, vol 3, 2572 [74.147].
200
Privacy Act 1978 RSS (Saskatchewan) c P-24 s4(1)(e).
201
Privacy Act 1978 RSS (Saskatchewan) c P-24 s4(2); Privacy Act 1987 CCSM (Manitoba) s5(f)(i), (iii);
Privacy Act 1990 RSNL (Newfoundland and Labrador) s5(2)(a); Privacy Act 1996 RSBC (British Columbia)
s2(3)(a).
202
Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2584 [Recommendation 74-1].
203
Ibid, vol 3, 2565 [74.119].
204
Privacy Act 1978 RSS (Saskatchewan) c P-24 s3; Privacy Act 1987 CCSM (Manitoba) s3; Privacy Act 1990
RSNL (Newfoundland and Labrador) s4.
205
Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2585 [Recommendation 74-3(a)].
206
Ibid, vol 3, 2576 [74.160].
207
Ibid, vol 3, 2585 [Recommendation 74-4].
P a g e | 43
an untruth or information already being in the public domain. The defences are unnecessary
because the public interest and consent are both addressed in the elements of the cause of
action.208
The ALRC recommended that a Court be empowered to choose the most appropriate remedy
to the factual circumstances before it, free from jurisdictional constraints.209 The proposed
legislation provides a non-exhaustive list of remedies. These include, but are not limited to,
damages (including aggravated but not exemplary damages), account of profits, injunctions,
apology orders, correction orders, destruction orders, and declarations (for example a
declaration stating that an invasion of privacy has occurred).210 The ALRC further
recommended that the cause of action be actionable without proof of damage.211 This enables
individuals to claim damages for humiliation, insult212 and emotional distress they have
Finally, the ALRC recommended that the Office of the Privacy Commissioner provide
information to the public concerning the cause of action,214 so that the public may be
In 2009, the NSWLRC released its Report, Invasion of Privacy. The Report was solely
dedicated to formulating a cause of action for invasions of privacy, unlike the ALRC Report
which made 288 recommendations that were unrelated to the cause of action. The appendix
to the NSWLRC Report contained a draft of the wording of the proposed legislation, called
the Civil Liability Amendment (Privacy) Bill 2009,215 expressed as a Schedule to the Civil
Liability Act 2002 (NSW). This differs to the ALRC’s proposal, which recommended a
separate statute.
Significantly, the NSWLRC recommended an objects clause. The ALRC did not. The clause
recognises the importance of protecting privacy and the need to balance the right against
other interests. The clause also identifies the aims of the legislation, which are to create a
statutory cause of action and to provide remedies to individuals for invasions of privacy.216
The objects clause therefore provides clear legislative intent. This is essential given that the
cause of action is a new concept, and Courts may require assistance with interpreting and
The NSWLRC expressed support for a lower threshold than the ALRC to establish a prima
facie case for a statutory cause of action. The action simply requires an invasion of privacy,
therefore not restricting liability to serious invasions.217 This is a favourable approach given
the:
[A]bsence of any broad protection of privacy in civil law; the detrimental effects on privacy of an
215
Civil Liability Amendment (Privacy) Bill 2009, cited in New South Wales Law Reform Commission, Report
No 120, above n 2, 84-92.
216
Civil Liability Amendment (Privacy) Bill 2009 s72, cited in New South Wales Law Reform Commission,
Report No 120, above n 2, 84.
217
New South Wales Law Reform Commission, Report No 120, above n 2, 8 [3.2].
P a g e | 45
obligations under international law; the need for more general protection of privacy suggested by
consideration of the law of other jurisdictions… and the recent weakening of privacy protection in
defamation law.218
The test states that an individual’s privacy is invaded ‘if the conduct of another person
invaded the privacy that the individual was entitled to expect in all the circumstances having
regard to any relevant public interest,’219 which includes the interest of the public in being
informed of matters of public concern. This is a wider formulation than the ALRC’s qualified
test. However, its objective nature still restricts trivial and unduly sensitive220 claims from
being brought before the courts.221 Like the ALRC, the NSWLRC recommends that only
natural persons can bring actions under the statute,222 and that consent will vitiate
actionability.223
The issue of balancing the right to privacy with the public interest is dealt with as an element
of the action, similar to the ALRC’s approach. Fundamental social values and norms, such as
free speech, safety, security, health and justice, are weighed up against the asserted interest in
time, the NSWLRC acknowledges that those interests are not always at loggerheads. Indeed,
the values that underpin freedom of expression such as autonomy and liberty may also
underpin some privacy interests. Courts must therefore perform incisive and targeted
analysis with regard to the facts of the case.225 Importantly, competing interests are of equal
218
Ibid, 11 [4.1].
219
Civil Liability Amendment (Privacy) Bill 2009 s74(2), cited in New South Wales Law Reform Commission,
Report No 120, above n 2, 85.
220
Campbell v MGN Ltd [2004] 2 AC 457 at [94] (Lord Hope).
221
New South Wales Law Reform Commission, Report No 120, above n 2, 27 [5.9].
222
Ibid, 71 [10.1].
223
Ibid, 46 [5.46]; and see Civil Liability Amendment (Privacy) Bill 2009 s74(4) at page 86 of the Report.
224
New South Wales Law Reform Commission, Report No 120, above n 2, 31 [5.15].
225
Ibid, 21 [4.15].
P a g e | 46
weight, with no interest necessarily trumping another one. The Courts must therefore engage
in exercises of proportionality.226
Like the ALRC, the NSWLRC did not attempt to define privacy, instead opting for a statutory
cause of action which identifies the ‘general conditions in which an invasion of privacy is
actionable’.227 However, the NSWLRC does not list the types of invasion of privacy which
might come under the statute,228 instead leaving this entirely up to the courts. Despite this,
the court is guided through eight matters which must be taken into account in determining
actionability: the nature of the subject matter; nature of the invasion; the relationship between
the parties; whether the claimant has a public profile and whether it affects actionability;
vulnerability; conduct before and after the invasion; the effect of the invasion on health,
welfare and emotional wellbeing; whether the conduct contravenes an Australian law; and
any other matter that the court considers relevant in the circumstances.229 This facilitates
flexibility in the common law interpretation of the statute, and ensures that each case turns
The NSWLRC’s proposal neither specified the requisite mental element for the action, nor
specified the proof of damage required. The ALRC’s proposal was clear on these points. The
NSWLRC argued that specification was not required because the cause of action is statutory
and not tortious.230 The same reasoning applies to the NSWLRC’s remedies
226
Ibid, 33 [5.17].
227
Ibid, 6 [1.8].
228
However the initial Consultation Paper did recommend providing a non-exhaustive list of the types of
invasions of privacy, similar to the ALRC.
229
New South Wales Law Reform Commission, Report No 120, above n 2, 34-46; and see Civil Liability
Amendment (Privacy) Bill 2009 s74(3) at pages 85-86 of the Report.
230
New South Wales Law Reform Commission, Report No 120, above n 2, 50-51 [5.56]-[5.57].
231
Ibid, 49 [5.54].
P a g e | 47
The NSWLRC recommended very similar defences to the ALRC, but added two more.
Clause 75(1)(d) of the proposed legislation provides a defence where the defendant publishes
the matter as an agent or employee of a subordinate distributor, and the defendant ought not
to have known (but not through any negligence) that publication of that matter constituted an
invasion of privacy.232 Secondly, it is a defence under clause 75(1)(e) of the legislation that
the defendant had a corresponding duty to give and have the published information.233 This
defence mirrors the qualified privilege defence in defamation law and would cover the
information about the plaintiff, in a reference, that is relevant to the job.234 The NSWLRC
therefore takes a less restrictive approach to excusing actionability under the statute and
Clause 76 of the NSWLRC draft legislation lists a range of remedies available to a Court to
grant in the event of an invasion of privacy under the statute. The Court is also given
discretion to consider any other relief that would be necessary in the circumstances,235 which
the NSWLRC identifies as possibly including asset preservation orders, search orders and
variation of contract.236 The remedies are largely parallel to the ALRC recommendations,237
although the NSWLRC prefers prohibitory orders over injunctions, because of the statutory
nature of the cause of action.238 There is also a significant monetary restriction under the
232
Civil Liability Amendment (Privacy) Bill 2009 s75(1)(d); in New South Wales Law Reform Commission,
Report No 120, above n 2, 86-87.
233
Civil Liability Amendment (Privacy) Bill 2009 s75(1)(e); in New South Wales Law Reform Commission,
Report No 120, above n 2, 87.
234
New South Wales Law Reform Commission, Report No 120, above n 2, 55-56 [6.12].
235
Civil Liability Amendment (Privacy) Bill 2009 s76(1)(e); in New South Wales Law Reform Commission,
Report No 120, above n 2, 88.
236
New South Wales Law Reform Commission, Report No 120, above n 2, 58 [7.7].
237
Civil Liability Amendment (Privacy) Bill 2009 s76; in New South Wales Law Reform Commission, Report
No 120, above n 2, 87-88.
238
New South Wales Law Reform Commission, Report No 120, above n 2, 63 [7.17].
P a g e | 48
NSWLRC Report which is absent in the ALRC’s proposal. The NSWLRC recommends a
While the ALRC is silent on the limitation period for the action, the NSWLRC’s proposal
specifies a one year limitation period, accruing from the date of the defendant’s conduct.240
The period may be extended for up to three years if reasonable in the circumstances.241
Unlike the ALRC, the NSWLRC does not recommend an education campaign.
The Australian Government has only embarked upon Stage One of its response to the changes
proposed by the ALRC, addressing 197 of the 295 recommendations made in the ALRC’s
Report.242 However, Stage One did not include the recommendations surrounding the
statutory cause of action that are under consideration in this paper. The Government decided
to postpone addressing those particular recommendations until the Second Stage Response
due to the ‘complexity and sensitivity’243 of the proposals to particular interest groups in
Australian society. This is also so that the foundations of privacy reform could be laid down
first.
239
Civil Liability Amendment (Privacy) Bill 2009 s77; in New South Wales Law Reform Commission, Report
No 120, above n 2, 88; and see New South Wales Law Reform Commission, Report No 120, above n 2, 61-62
[7.13].
240
Amendment of Limitation Act 1969 (Cth) s14C; in New South Wales Law Reform Commission, Report No
120, above n 2, 91.
241
Amendment of Limitation Act 1969 (Cth) s56E; in New South Wales Law Reform Commission, Report No
120, above n 2, 91.
242
Commonwealth, Australian Government First Stage Response to the Australian Law Reform Commission
Report 108 For Your Information: Australian Privacy Law and Practice, Cabinet, October 2009, 5 (Joe
Ludwig).
243
Ibid, 14.
P a g e | 49
Despite this delay, an Issues Paper released in September 2011 has called for submissions and
comments from the Australian public244 on the elements, defences and remedies of the
proposed cause of action.245 This provides renewed support for the statutory cause of action
244
The author has submitted this dissertation for consideration by the Department of Prime Minister and Cabinet,
following the release of the Issues Paper.
245
Commonwealth, above n 43, 51.
P a g e | 50
2011 (CTH)
It is most surprising that the Australian courts have yet to develop common law or equitable
principles for breach of privacy in Australia. Australia is becoming increasingly out of step
with other common law jurisdictions in this regard. It may well be that the courts would be
amenable to such a development, should the right case come before them. In the absence of
common law or equitable protection, there is good justification for the development of
Disappointingly, progress in the privacy law area tends to fall idle to media pressure and
political inertia. This is due in part to the eagerness of politicians247 to continue good
relations with the papers that portray them so as to avoid the enmity of the two main players
in the Australian press – Fairfax and Murdoch. This is particularly pertinent because the
Murdoch press controls 68% of capital city and national newsprint in Australia.248 In 2011,
Australia faces new challenges. Potential phone-hacking and the explosion of social network
use in Australia now threaten the value of privacy further. This has led to a gap in the
246
Centre for Law and Genetics, PR 127 to Australian Law Reform Commission, For Your Information:
Australian Privacy Law and Practice, 16 January 2001.
247
There are many sex scandals involving politicians that are featured heavily in the media, for example NSW
Transport Minister David Campbell using his ministerial car to visit gay sex clubs while he was married with
children [see McDonald, Timothy, ‘Campbell sex scandal sparks privacy debate’, ABC News (online), 22 May
2010 <http://www.abc.net.au/news/2010-05-21/campbell-sex-scandal-sparks-privacy-debate/836580>]. Another
example which occurred this year is Federal Member for Labor, Craig Thompson, who has been accused of
using a union credit card to pay for prostitutes [see Steve Lewis et al, ‘Craig Thompson scandal deepens with
allegations of a $70,000 spending spree on a union credit card’, Daily Telegraph (online), 22 August 2011
<http://www.dailytelegraph.com.au/news/craig-thomson-scandal-deepends-with-allegations-of-a-70000-
spending-spree-on-a-union-credit-card/story-e6freuy9-1226119221232>].
248
Kim Jackson, Media Ownership Regulation in Australia, (19 October 2011) Parliamentary Library
<http://www.aph.gov.au/library/intguide/sp/media_regulations.htm>.
P a g e | 51
literature. While the previous Law Reform Commission Reports form the academic literature
upon which this paper is based and canvass the steps to be taken to formulate the cause of
action, the emerging threats and developments in contemporary Australian society require
further analysis and review in order to adapt the cause of action to the climate in 2011 and
beyond.
Reform to the privacy area requires a back to basics approach.249 This involves creating a
new cause of action from the ground up, without recourse to the existing plethora of laws that
might incidentally protect privacy or those which could be extended to cover privacy in a
limited way.
As discussed in Chapter Two, common law and equitable solutions are not appropriate ways
to tackle the issue of privacy in Australia. This paper strongly recommends creating new
federal legislation. A new statute would reduce public confusion and would avoid the
incidental and patchy protection currently provided by a range of laws and forms of law, as
exemplified in Appendix Table 1. A name such as the Invasion of Privacy Act 2011 (Cth)250
would communicate the legislation’s purpose effectively, and would also differentiate it from
249
Doyle and Bagaric, above n 5, 178.
250
The author acknowledges that an Invasion of Privacy Act 1971 (Qld) is still in force in the State of
Queensland.
P a g e | 52
Australian privacy laws currently lack coherence, consistency and an overarching rationale.
A core rationale that sets out the reasons why the legislation is in force and how it will
achieve those goals should therefore be included in the objects clause of the proposed
legislation. ‘This involves a consideration of the justification for the right to privacy and
what we as a community seek to achieve by giving legal recognition and protection to such a
right’.251
The core rationale of the legislation proposed in this paper is to protect the privacy of
individuals, and recognise that privacy protection is important in modern society. Doyle and
Bagaric suggest that privacy protection creates a supportive context for the development of
individual autonomy, which plays an essential role in the pursuit of happiness.252 The authors
argue that individuals ought to be protected where decisions are made on the basis of
information about them without any opportunity to comment or respond to the information.253
They also argue that individuals should be able to enjoy situations of solitude and control the
circumstances in which they are observed. For example, these instances would include
privacy inside the home, and particularly when showering, going to the toilet, and engaging
in sex.254 This paper supports the value of individual autonomy as a core rationale for the
protection of privacy. The need for privacy to be weighed against the public interest should
The objects clause should also explain how it will achieve individual autonomy and a balance
between the right to privacy and the public interest. The clause should clearly state that the
legislation intends to create a statutory cause of action for invasion of privacy and provide
251
Doyle and Bagaric, above n 5, 178.
252
Ibid, 179.
253
Ibid.
254
Ibid, 180.
255
Civil Liability Amendment (Privacy) Bill 2009 s72; cited in New South Wales Law Reform Commission,
Report No 120, above n 2, 84.
P a g e | 53
remedies to individuals whose privacy has been invaded.256 The clause should also explain
that the legislation intends to educate the public on their rights, responsibilities and liabilities
that are created under the statute, and inform the public of how to protect their own private
information and conduct. The education campaign is an important feature of the proposed
legislation. Furthermore, the objects clause should make it clear that the Act is to be enacted
By clearly stating the objectives and aims of the new legislation, the Courts and the
Australian public should be adequately informed about their rights and liabilities, which will
1 Object of Act
4.3.
The objects of this Act are:
Definition
privacy.257 Fluidity and adaptability should be essential features of the proposed legislation,
256
This is in line with the NSWLRC recommendations. See Civil Liability Amendment (Privacy) Bill 2009
s72(b), (c); cited in New South Wales Law Reform Commission, Report No 120, above n 2, 84.
257
See page 7 of this paper under the heading: 1.1. ‘Definitional Difficulties’.
P a g e | 54
It is a ‘perennial fallacy that because something cannot be cut and dried or lightly weighed or
measured therefore it does not exist.’258 The concept of privacy is value-laden and
complex.259 The definition is culturally and historically relative,260 and must be adaptable to
modern developments and the value which privacy is given at the time. . Wacks argues that
‘[i]nstead of pursuing the false god of “privacy”, attention should be paid to identifying what
specific interests of the individual we think the law ought to protect’.261 Similarly, Doyle and
Bagaric believe that ‘[t]o define a term or concept is to set out the necessary and sufficient
conditions which demarcate the correct usage of the term or concept’.262 ‘Bearing in mind the
protection’264 resulting from a fixed definition, the meaning of privacy under the proposed
legislation should be canvassed in a way which lists the types of invasions of privacy and the
conditions which require protection in the circumstances. This allows the judiciary to
develop the concept over time and take into account ‘the need of individuals for privacy in an
In line with the ALRC and NSWLRC recommendations, this paper proposes that there be no
definition per sé.266 Rather, there should be a workable classification of the types of
invasions of privacy that would be protected by the statute. This is similar to the ALRC’s
proposal.267
258
Ridge v Baldwin [1964] AC 40.
259
Lindsay, above n 21, 8.
260
Ibid.
261
Wacks, above n 18, 10.
262
Carolyn Doyle and Mirko Bagaric, ‘The Right to Privacy and Corporations’ (2003) 31 Australian Business
Law Review 237, 238.
263
New South Wales Law Reform Commission, Report No. 120, above n 2, 3 [1.1].
264
New South Wales Law Reform Commission, Invasion of Privacy, Consultation Paper 1, above n 98, 57
[2.87].
265
Australian Law Reform Commission, Report No 108, above n 6, 19 [1(f)].
266
See Australian Law Reform Commission, Report No 108 above n 6, vol 3, Chapter 74; and New South Wales
Law Reform Commission, Report No 120, above n 2, 21 [4.16].
267
Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2584 [Recommendation 74-1].
P a g e | 55
In addition, and as will be discussed in further detail later in this chapter,268 there should be
explicit reference to the ability for family members to take action for invasion of privacy of
their deceased relatives. This refers directly to the News of the World scandal where murder
victims’ voicemails were allegedly intercepted, which caused significant distress to family
members. Reference should also be made to invasions of privacy occurring online such as on
social networking sites, or through websites and email, in order to tackle the various online
privacy issues discussed in Chapter One. The other examples proposed in Recommendation
2 follow those of the ALRC. In addition, a catch-all provision ensures that other situations of
privacy invasion are not limited to the factual matrix contained in the section.
An invasion of privacy may occur in (but is not limited to) the following circumstances:
(a) Where there has been an interference with an individual’s home or family life, which
includes the situation where a deceased family member’s privacy has been invaded and
this causes distress or harm to the living relatives which the court deems to be an
invasion of privacy under the Act; or
(d) Sensitive facts relating to an individual’s private life have been disclosed; or
(e) An individual’s activity online, which includes but is not limited to social networking
sites, is interfered with, misused or disclosed without the individual’s consent;
(f) Under any other circumstances which the court determines is an invasion of privacy.
268
See page 54 under the heading: 4.3. ‘Entitlement’.
P a g e | 56
4.4. Entitlement
Who is entitled to bring an action under the statute is important, particularly in light of the
News of the World phone-hacking scandal. The proposed legislation therefore takes a slightly
different approach to the recommendations of the ALRC269 and NSWLRC in this regard.
This paper acknowledges that generally, deceased individuals have no privacy interests.270
This paper agrees with the recommendation that natural persons are entitled to bring the
action, however extends this concept to where natural persons are directly affected by
invasion of a deceased individual’s privacy, and that the action also invades the privacy of the
natural person bringing the action, particularly in instances where there is a prior relationship,
whether familial or fiduciary, between the deceased and the individual seeking relief for
invasion of privacy.
Recommendation 2(a) therefore specifically states that relational actions are within the ambit
of privacy invasions envisaged by the statute. By extending the concept of home or family-
life privacy invasions to include invasions relating to deceased individuals,271 the statute
responds directly to the fear created by News of the World’s alleged phone-hacking of 9/11
victims and murder victims. Family members in similar situations should be able to seek
remedies and redress for the distress they suffered from media phone-hacking or any other
kind of invasion, as long as the invasion of privacy satisfies the elements of the cause of
269
However the ALRC recommended that personal information relating to deceased individuals should be
protected for up to thirty years following death, in order to prevent mishandling of information after death, to
allow living relatives to access appropriate information and to prevent distress to the families: Australian Law
Reform Commission, above n 6, vol 1, 367 [8.44].
270
Paul Roth, ‘Privacy Proceedings and the Dead’ (2004) 11 Privacy Law and Policy Reporter 50.
271
In any respect, such an invasion would likely be captured under the provision in s2(a) contained in
Recommendation 2 above in regards to interference with home or family life, and would still need to meet the
threshold requirements of the cause of action.
P a g e | 57
4.5.1. Threshold
The cause of action under the new legislation should be general and statutory. It should not
be a tort, because tortious actions ‘do not generally require the courts to engage in an overt
balancing of relevant interests’,272 which would be required in the case of privacy invasions.
The cause of action should relate to invasions of privacy, which is in line with the NSWLRC
recommendation. The higher threshold test suggested by the ALRC, which requires the
ordinary sensibilities’273 is too high a bar for claimants to meet. This would undermine the
effect of the legislation in protecting privacy. Many claimants would be precluded from
taking action for invasions of their privacy, if they had a reasonable expectation of privacy
but it was not considered by the court as objectively serious or highly offensive enough to
warrant liability.274 For example, where an intimate conversation between husband and wife
following their involvement in a car accident involving drink-driving is filmed and broadcast
offensive to the reasonable person.275 A high threshold of seriousness therefore does not give
272
New South Wales Law Reform Commission, Report No 120, above n 2, 50 [5.55].
273
Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2584 [Recommendation 74-2].
274
See, eg, Andrews v TVNZ (Unreported, High Court of New Zealand, Allan J, 15 December 2006), where a
husband and wife took action against Television New Zealand for broadcasting an intimate conversation
between them following a motor accident. The claimants met the reasonable expectation of privacy
requirement, but failed to prove that the publication of the conversation was highly offensive to the reasonable
person of ordinary sensibilities.
275
This example is based on the facts of Andrews v TVNZ (Unreported, High Court of New Zealand, Allan J, 15
December 2006).
P a g e | 58
Instead, as is made clear below, the test should balance the privacy interest against the other
interests in question on the particular facts of the case, and take into account a range of
4.5.2. Test
The test for the statutory cause of action should be flexible, adaptable, reasonably accessible
to individuals, and fair to other competing interests, which is likely to include the interest of
Australian media organisations in delivering news. Most importantly, the test should be
applied by the courts through an intense focus on the facts,276 and should assist in developing
The public interest and freedom of speech issue is a difficult one to reconcile statutorily. A
traditional view is that there will ‘always be a clash of rights, which must be resolved either
in favour of the privacy right or of the right to freedom of speech’.278 Privacy is deemed to be
the arch-nemesis to public interest, the right to know and freedom of expression. Law reform
submissions, primarily from media organisations, urged the freedom of speech right to be a
concomitant279 to the right to privacy, given that Australia does not have a constitutional or
statutory right to freedom of speech or freedom of the press, even though Australian
currently limited protection for privacy under Australian law. The way that privacy and
276
Re S (a child) [2005] 1 AC 593 at [17] (Lord Steyn).
277
New South Wales Law Reform Commission, Report No 120, above n 2, 25 [5.5].
278
Eric Barendt, ‘Privacy and freedom of speech’ in Andrew T Kenyon and Megan Richardson (eds), New
Dimensions in Privacy Law: International and Comparative Perspectives (Cambridge University Press, 2006)
11.
279
Australian Press Council, Submission PR 411 to Australian Law Reform Commission, For Your Information:
Australian Privacy Law and Practice, 7 December 2007.
280
Lange v Australian Broadcasting Corporation (1997) 189 CLR 520.
P a g e | 59
freedom of expression should interact is therefore left uncertain under the current legal
framework.
The notion of privacy, and its conceptual rivalry with freedom of expression, does not occur
in a vacuum. Society’s attitudes towards the correct balance will change according to
demographic changes. The key to a contextual and workable test is therefore adaptability and
proportionality. Courts should be able to apply a sophisticated balancing test to the specific
facts of the case. The proposed legislation should therefore be specific about how to balance
Interestingly, Barendt argues that in limited cases, the two rights will not be in conflict. He
cites a pertinent example. The right to privacy and the right to free speech would both be
or a small group on the internet.282 However, this creates complexity for reform. For
example, if a claimant’s Facebook profile is set to private, but a Facebook friend of the
claimant publishes the information contained in the claimant’s status, should that information
be protected as private information? The explosion of social media has posed difficult
questions relating to defining the realm of what is private and what is public.
Furthermore, the blurring and shifting of the line between public and private life necessitates
public transport, shopping centres, bars and restaurants. However, cultural norms exist which
require privacy in public toilets, change rooms and hotel rooms, despite the ‘absence of a
right to exclusive possession or control of [the] immediate surroundings’.283 On the one hand,
if a line is not drawn between the public and private spheres of life, then ‘there will be
281
Australian Law Reform Commission, For Your Information, Report No 108 (2008) vol 3, 2572 [74.146].
282
Barendt, above n 278, 12-16.
283
Doyle and Bagaric, above n 5, 180.
P a g e | 60
other hand, regard should be given to the degree of privacy reasonably expected in the
circumstances of the particular case.285 A cause of action should not draw such a line in
advance.
The legislation should assist Courts in reshaping those norms in order to reflect the current
challenges to individual privacy, particularly in the face of sly media behaviour and the
As a result, the test recommended in this paper combines some elements of the ALRC and
subjective and objective element. The test requires the individual to have a reasonable
expectation of privacy in the circumstances, but that privacy interest is considered in light of,
and on balance with the relevant public interests, which are presumed to start from an equal
footing. This paper initially considered placing the public interest consideration as a defence
instead of an element of the test, which is the approach used in Canada.286 However, the
former option fails to recognise the value of open justice, accountability and free speech.
However, there should be a clear demarcation between public interest and public curiosity. A
fair balancing process would ensure that interest groups on either side of the fence could have
their say. The test also explicitly provides that the cause of action is actionable without proof
of damage, which is important in the privacy context given that most actions will involve
This paper recommends not specifying the mental element. While the ALRC recommended
that the cause of action only apply to intentional and reckless acts, the NSWLRC did not find
it necessary to lay down an absolute rule,287 as the cause of action is not a tort and does not
import a requirement for a particular mental element. By leaving mental element out of the
equation, courts should still be able to effectively determine liability by applying the
threshold test to the particular facts at hand. This way, accidental invasions of privacy may
still be actionable under the statute, if they occur in the appropriate circumstances.
(1) An individual (the claimant) has a cause of action against a person under this Act
if that person’s conduct invades the individual’s privacy.
(2) An individual’s privacy is invaded for the purpose of this Act if:
(a) the conduct of another person invaded the privacy that the individual was
reasonably entitled to expect in all of the circumstances, and
(b) the individual’s privacy interest, when considered on balance, outweighs any
relevant public interest in the circumstances of the case.
(3) To avoid doubt, privacy interests and public interests are to be considered from an
equal standing point.
(4) Invasion of privacy under this Act is actionable without proof of damage.
287
New South Wales Law Reform Commission, Report No 120, above n 2, 50 [5.56].
P a g e | 62
This paper recommends providing statutory guidance to courts, in order to assist them in
determining actionability and balancing the privacy interest with other competing interests.
In this way, this paper largely supports the approach of the NSWLRC. By directing the
attention of the court to matters such as the nature of the private act or information, nature of
the invasion, relationship between the parties and other relevant matters, the court is
encouraged to decide each case on the specific facts presented to them. Importantly, courts
are given wide discretion under the catch-all provision to consider any other relevant matter,
law interpretations.
Without limiting the factors that a Court may take into account in determining whether
an invasion of privacy has occurred under section 3, the Court may take into account the
following factors:
4.5.5. Consent
Consent becomes complicated when applied to social networking and online privacy
invasions. For example, person X posts a status update on their Facebook profile, which is
set to private, complaining about their employer. Person Y, who is a Facebook friend of X,
prints the status and gives it to X’s employer, E, who terminates X’s employment and tells
other employers of the Facebook status via the company Twitter account, warning others not
friends, which include Y, and the information goes beyond what was consented to, and others
such as E continue to spread that information, are both Y and E liable? Social networks
theory suggests that even if a large group of people (e.g. X’s Facebook friends) know the
private information and one person causes that information to leap the boundary, this is still a
288
Solove, above n 7, 181.
P a g e | 64
However, once information is on the internet, it would be very impractical to hold others
liable who simply spread the information. A line must be drawn, and this may mean that E
would not be liable in the above example. Notably, X is not precluded under the statute from
taking action against E, and X’s success would depend on the circumstances, particularly the
nature of the comment.289 X however would not be likely to satisfy the public interest
balancing test if he or she admitted to stealing money or equipment from the workplace,
where it would likely be in the public interest that the public, in particular other employers,
be informed of criminal behaviour. Nevertheless, this is where the education campaign will
assist. As discussed below, informing the public on the dangers of online information sharing
Another problem with consent occurs in other situations such as newsgathering, where an
individual might consent to an interview with a particular media organisation. If the media
surveillance operations on that individual, beyond the consent that was originally given, this
should be actionable under the statute, despite the original consent being given.
This paper recommends that consent be included as a factor to be taken into account in
determining actionability under the statute, under Recommendation 4(10) above, but only to
the extent that the consent, express or implied, was given to that particular conduct. Conduct
beyond this is potentially liable. Onus should be placed upon the claimant to disprove
consent.
289
Employment law may also assist in this example. See, eg, Fitzgerald v Smith t/a Escape Hair Design [2010]
FWA 735, where the employee was terminated due to a Facebook status she posted which related to her
Christmas bonus and holiday pay.
P a g e | 65
The limitation period should be fairly short so that individuals are encouraged to take prompt
action, but also subject to discretional extensions of time, so that leniency can be afforded in
appropriate circumstances. The limitation period put forward by the NSWLRC provides
guidance on this matter. This comprises a one year period from the date on which the
invasion of privacy occurred, plus a discretionary element which the court can use to extend
the period by up to three years.290 This is not satisfactory to claimants, as many invasions of
privacy may go unnoticed for a long period of time, and well after the damage is done. For
example, becoming aware of the sharing of personal information on the internet once it has
This proposal recommends that the date of accrual be the date that the claimant becomes
aware of the circumstances giving rise to the cause of action. This reflects the nature and
type of privacy invasions that may be actionable under the statute, many of which have long-
term consequences. The proposed wording would most likely be inserted into the Limitation
This paper acknowledges that the limitation period for protection of personal information of
deceased individuals under the current legislative framework varies across states, from five
years in the Northern Territory, thirty years in NSW and Victoria, and unlimited in the ACT.292
However, these limitation periods and associated laws that relate to personal information and
limitation period for invasions of privacy under the proposed legislation in this paper.
290
Amendment of Limitation Act 1969 (Cth) ss14C, 56E; in New South Wales Law Reform Commission,
Report No 120, above n 2, 91.
291
For example spreading intimate sexual details on an internet blog: see Solove, above n 7, 52.
292
Australian Law Reform Commission, Report No 108, above n 6, vol 1, 359 [8.15].
293
Ibid, vol 1, 360 [8.18].
P a g e | 66
(1) An action on a cause of action under section 3 of the Invasion of Privacy Act 2011
(Cth) is not maintainable if brought after the period of one year from the date on
which the cause of action accrues.
(2) A cause of action accrues when the claimant becomes aware of the circumstances
giving rise to the cause of action.
(3) A claimant may apply to the Court for an order extending the limitation period for
the cause of action.
(4) The Court must, if satisfied that it was not reasonable for the claimant to have
commenced an action in relation to the matter complained of within one year from
the date that the cause of action first accrued, extend the limitation period
mentioned in sub-section (1) but only by a period of up to three years running
from that date.
4.6. Defences
This paper supports the recommendations of the ALRC and NSWLRC in relation to two
defences: the defence of lawful requirement and authorisation, and the defence of lawful
statutory functions, and would not inhibit national security or law enforcement.294 This paper
however inserts the words ‘reasonably in the circumstances’ under both sub-sections so that
Courts may determine whether the defence is proved, having regard to the particular facts of
the case.
This paper disagrees with the ALRC and NSWLRC recommendations in relation to the
defamation defences and recommends a more restrictive approach to excusing liability. The
proposal put forward in this paper removes the need for the defamation defences to be spelt
out in the statute, given that such defences would already be covered under the lawful
294
New South Wales Law Reform Commission, Report No 120, above n 2, 52 [6.3].
P a g e | 67
However, Courts will need to take particular care where parliamentary privilege applies. This
year Senator Nick Xenophon utilised his parliamentary privilege to accuse a Catholic
chaplain of allegedly raping a young man 45 years ago.295 Despite the legality of the
accusation under s49 of the Australian Constitution and the Parliamentary Privileges Act
1987 (Cth), parliamentary privilege has the potential to invade individuals’ privacy,
particularly where the accusation is spread by the media and the matter has not been dealt
with in the criminal justice system. Publicity also creates difficulties for empanelling jurors
who might have pre-conceived ideas about the accused person.296 However, unless
RECOMMENDATION 6: DEFENCES
5 Defences
It is a defence to an action under this Act for the invasion of an individual’s privacy if the
defendant proves any of the following:
(1) That the conduct of the defendant was required, authorised or otherwise enabled
reasonably in the circumstances:
(a) By or under a State, Territory or Commonwealth law; or
(b) By an Australian court or tribunal or a process of such a court or tribunal.
(2) That the conduct of the defendant was done for the purpose of lawfully defending or
protecting a person or property reasonably in the circumstances, which includes the
prosecution or defending of civil or criminal proceedings.
4.7. Remedies
‘Remedies do not exist in isolation from the substantive rights and obligations to which they
give effect’.297 Regard must therefore be given to the nature of privacy cases and the impact
295
Phillip Coorey, ‘Xenophon overstepped the mark on parliamentary privilege’, Sydney Morning Herald
(online), 15 September 2011 <http://www.smh.com.au/opinion/politics/xenophon-overstepped-the-mark-on-
parliamentary-privilege-20110915-1kao0.html>.
296
ABC, ‘Xenophon speech puts parliamentary privilege in spotlight’, 7.30 Report, 29 September 2011
(Professor Greg Craven) < http://www.abc.net.au/news/2011-09-14/the-row-over-the-naming-of-an-alleged-
rapist/2899618>.
297
Tilbury, above n 159, 294.
P a g e | 68
that invasions of privacy have on potential claimants. For example, interlocutory injunctive
relief will be an essential remedy for those whose privacy interests have been invaded,
conduct as well as provide relief which cannot be adequately addressed in final relief after the
conduct has occurred.298 An apology should also be an option in the legislation, as it can be a
In addition to those proposed by the ALRC and NSWLRC, this paper recommends that
correction orders should be explicitly listed as a remedy and should be proportionate to the
original publication. ‘[The correction] should be placed in the same place, in the same type
face and on the same page as the original story… If it was significant enough to command
splashing across the front page… then any apology should receive the same importance’.299
This remedy may assist claimants to restore their sense of individual autonomy and may go
some way to repair emotional distress and other damages caused by the publication.
This paper disagrees with the compensation cap recommended by the NSWLRC on actions
RECOMMENDATION
for emotional and mental distress alone. This paper 7: REMEDIES
proposes a compensation remedy without
6 Remedies
monetary restriction, particularly because privacy invasions, by their nature, will often result
In an action under this Act for the invasion of an individual’s privacy, the court may (subject
in emotional and mental distress. The appropriate level of compensation should be reached
to any jurisdictional limits of the court) grant any one or more of the following remedies,
bywhether
a Courton
onanitsinterim or final basis,
own discretion as the court
and analysis considers
according to theappropriate:
facts at hand and with regard to
social(1)andAn order
legal for the
norms paymentat of
operating thecompensation;
time.
(2) An order prohibiting the defendant from engaging in conduct (whether actual,
apprehended or threatened) that the court considers would invade the privacy of the
claimant;
(3) An order declaring that the defendant’s conduct has invaded the privacy of the
claimant;
(4) An order that the defendant deliver to the claimant any articles, documents or other
material, and all copies of them, concerning the claimant or belonging to the claimant
that:
(a) Are in the possession of the defendant or the defendant is able to retrieve; and
298
Tilbury, (b)
above n 159,
Were 294.
obtained or made as a result of the invasion of the claimant’s privacy or were
299
P Youngman, Submission PR 394 to Australian Law Reform Commission, For Your Information: Australian
Privacy Law and published
Practice, 7during the 2007.
December course of conduct giving rise to the invasion of privacy;
(5) An order that the defendant apologise to the claimant for the conduct;
(6) A correction order, which is proportionate to the original publication;
(7) Such other relief as the court thinks appropriate in the circumstances.
P a g e | 69
Education should play an essential role in this reform. The ALRC recommended that the
Office of the Federal Privacy Commissioner should have a role in educating the public about
the recommended statutory cause of action.300 However, privacy education should pervade
Personal information and photographs now find themselves uploaded within seconds and
immediately form part of the public domain via Facebook, MySpace and Twitter. Young
people in particular are unaware of the consequences of these actions and may find that their
‘private’ information is no longer private, which could have serious consequences in the
future.301 Widespread education campaigns should operate within the ideal that prevention is
better than a cure, particularly in relation to private information that is voluntarily, but
unknowingly, entered into the public arena via the online medium.
300
Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2586 [Recommendation 74-7].
301
See Chapter One generally for discussion of the privacy issues that arise online.
P a g e | 70
Rodrigues argues that social norms can often be more effective than legal rules at regulating
online behaviour.302 The power of individual reputation operates as a disincentive for people
to, for example, post derogatory comments on someone’s Facebook for fear of backlash from
the individual and/or his or her friends. An education programme, aimed at young people in
different stages of their development, should be integrated into school and university
curriculum in order to improve knowledge and wariness about the consequences of online
behaviour. However, it is not just online privacy norms that need to be changed. Society’s
acceptance of reality television shows such as Big Brother and Biggest Loser also indicate
entertainment. The legislation proposed in this paper should assist in shaping the ‘norms that
govern the circulation of information’,303 and the education campaign should facilitate the
creation of those norms from society’s expectations of privacy.304 If individuals are taught
from a young age about the importance of controlling self-exposure, particularly on the
internet, then the desired outcome is a society which values and respects privacy, which
should manifest itself in fewer actions under the Invasion of Privacy Act.
However, it is not only members of the public who need to change the way they behave.
Companies like Facebook should be at the forefront of privacy innovation, despite their
seminal role in information sharing. When a new user joins Facebook, the default settings
should be private.305 Currently they are not. This means that complacent users may not think
invasions of privacy. Changes to Facebook services have created public concern about
privacy in the past.306 For example, in 2006 Facebook created News Feeds, which alert users
of recent activity by other Friends on their Home Page. In September 2011, Facebook
302
Rodrigues, above n 52, 238.
303
Solove, above n 7, 113.
304
Solove, above n 7, 167.
305
Solove, above n 7, 200-201.
306
Solove, above n 7, 169.
P a g e | 71
announced the roll-out of the Timeline function, which provides users with a chronological
timeline of their status updates, employment, relationship status and photos.307 Creators of
technology and the media, should be at the forefront of responsible sharing of information.
Not only should the education campaign inform the public about the changes to the law, the
campaign should filter into the primary, secondary and tertiary education sectors as part of
online privacy and security awareness. Such an approach would enhance predictability in the
law – a fundamental tenet valued in most legal systems. The campaign should inform the
public, in particular young people, about the dangers of online behaviour and information
sharing via technology such as Facebook and mobile cameras. The campaign will also
inform the public of their right to privacy, and what they should do if their privacy is invaded.
7 Education
The relevant government department shall create an education campaign relating to the
following:
(1) Informing the public of their rights, responsibilities and liabilities under this Act;
(2) Educating young people in the primary, secondary and tertiary education systems on
a range of issues relating to protecting private information and other private conduct,
particularly online and through other technologies; and
(3) Any other matter that is necessary to inform the public on the contents of this Act
and their implications.
Radical reform such as the proposed legislation in this paper will undoubtedly be opposed.
The legislation effectively creates a human right – the right to privacy – because individuals
can now take action where that right is interfered with. Groups in society whose interest is in
opposition to privacy interests, such as the Australian media, will be strongly advocating
307
Jill Duffy, 10 things you should know about Facebook Timeline (23 September 2011) PC Mag <http://www.
pcmag.com/article2/0,2817,2393464,00.asp#fbid=ZuMPxUB4XV5>.
P a g e | 72
against the legislation. In the past, the media have already argued that a statutory cause of
This is the point where inertia often settles upon Australian politicians, and the privacy debate
subsides again. 309 However, the pendulum must swing from ‘supreme, total power’310
currently held by the media, back to equilibrium where the law respects both the right to
privacy and the right to freedom of expression. The legislation will therefore need to strike
the right balance in order to pass through the House of Representatives and Senate
successfully.
However, there is a risk that the legislation is challenged in the High Court by an interested
party such as the media. This paper would argue that the Government has the Constitutional
power to enact the legislation under the external affairs power,311 because the legislation
intends to implement some of Australia’s obligations under international treaties such as the
ICCPR, which states that individuals have the right to privacy312 and the right to freedom of
power as the basis for legislating on privacy.314 However, the real challenge lies at the
negotiation stage, where passionate advocates on both sides of the debate will argue the value
and utility of such reform. In the past, privacy reform has fallen at this hurdle.
However, the current framework is ineffective and inefficient. A comprehensive and well-
thought out proposal, an effective education campaign and a strong government should
308
New South Wales Law Reform Commission, Report No 120, above n 2, 9 [3.3].
309
Wacks, above n 39, 1.
310
The Honourable Michael Kirby, in Milanda Rout, ‘Kirby says both rights can co-exist’, The Australian
(online), 23 July 2011 <http://www. theaustralian.com.au/national-affairs/kirby-says-both-rights-can-co-
exist/story-fn59niix-1226100083272>.
311
Australian Law Reform Commission, Report No 108, above n 6, vol 1, 196 [3.20].
312
International Covenant on Civil and Political Rights, opened for signature 16 December 1966, (entered into
force 13 March 1976) [1980] ATS 23, Article 17.
313
International Covenant on Civil and Political Rights, opened for signature 16 December 1966, (entered into
force 13 March 1976) [1980] ATS 23, Article 19.
314
See, eg, Australian Constitution ss51(i), 51(xiii), 51(xiv), 51(xx).
P a g e | 73
ensure that the privacy framework is not simply patched up, but is created from scratch
according to the fundamental value of individual autonomy. These features should ensure the
‘Complete privacy does not exist in this world except in a desert.’315 The Act is not built on
such unrealistic goals or vacuum-like contexts. The success of the legislation for aggrieved
individuals will depend highly on the privacy invasion cases that come before the courts, the
long-term social impact of the education campaign and the willingness of organisations such
The cost of litigating the action will also be indicative of the legislation’s accessibility and
success. The particular forum chosen by the parties will largely determine the costs of
litigating invasions of privacy. While the appropriate court will depend on the particular
circumstances of the case and the remedies sought, the ALRC acknowledges that district and
county courts will be the most commonly used due to the extent of their jurisdiction and
expertise on such matters, and importantly because of lower costs.316 The legislation should
be accessible to everyone, not just celebrities, politicians or people with public profiles. The
education campaign aimed at the wider community should not only inform the public of the
contents of the Act, but should also recommend which court(s) to use to mount an action.
The campaign should also recommend that claimants seek legal advice.
Ultimately, the future of privacy law and policy will depend on how the legislation is
interpreted and applied by the courts. By drafting a clear statute like the one proposed in this
315
Restatement (Second) of Torts §652D comment c; cited in NSWLRC Consultation Paper 1, above n 98, 102
[4.28].
316
Australian Law Reform Commission, Report No 108, above n 6, vol 3, 2583 [74.197].
P a g e | 74
paper, the common law interpretation of the new legislation should result in socially and
legally desirable outcomes that value and protect the privacy of individuals in Australia.
P a g e | 75
CONCLUSION
The recent News of the World phone-hacking scandal represents one of many challenges
facing the notion of privacy as both a social and legal construct. Such a scandal should be the
last straw for the Australian legal system, providing strong impetus for change and reform to
the currently unravelling patchwork of laws which, at best, provide incidental protection of
privacy in Australia. A statutory cause of action would ‘create a climate of restraint which
might stem some of the activities that led to the closure of News of the World.’317
If a statutory cause of action like the one proposed in this paper is implemented in Australia,
members of the public would have adequate redress for invasions of privacy where there was
a reasonable expectation of privacy, and there is no public interest outweighing the privacy
interest in the circumstances of the case. By ensuring that both interests begin from an equal
standing point, interest groups in society are assured that no interest is preferred over another,
and that each case will turn on its own merits. Careful compromise and proportionality is
The proposed legislation takes into account present-day challenges to privacy protection, for
private information obtained surreptitiously from social networking sites, which this paper
argues are some of the most threatening weapons against privacy protection. Moreover, the
legislation is adaptable and flexible. The statute encourages judicial discretion and also
provides a list of factors that may be applied to the particular facts of the case in order to
determine actionability. The common law can therefore interpret the legislation according to
317
Victorian Law Reform Commission, ‘Victorian Law Reform: Keeping Private Lives Private’ (2011) 85(10)
Law Institute Journal 87.
P a g e | 76
the social norms and contextual features and developments of the time, therefore reviewing
and redefining the fluid concept of privacy as advancements in society and technology occur.
Importantly, this paper illustrates that there should be active dialogue between politicians,
Law Reform Commissions and interest groups in order to create the most desirable and
effective solution to what has now become one of contemporary society’s key reform issues.
APPENDIX
318
Lincoln Hunt Australia Pty Ltd v Willesee (1986) 4 NSWLR 457, 465, cited in New South Wales Law
Reform Commission, above n 2, 42 [2.40]; and see Doyle and Bagaric, above n 5, 63.
319
Bernstein v Sky News Ltd [1978] QB 479; Raciti v Hughes (1995) 7 BPR 14,837.
320
Lord Bernstein v Skyviews and General Limited [1977] 2 All ER 902, 909, cited in cited in New South Wales
Law Reform Commission, above n 2, 42 [2.45].
P a g e | 78
330
Coco v AN Clark (Engineers) Ltd. [1969] RPC 41.
331
Creation Records Ltd v News Group Newspapers (1997) 39 IPR 1.
332
Franklin v Giddins [1978] QdR 72.
333
New South Wales Law Reform Commission, Invasion of Privacy, Report No 120, above n 6, 19 [4.12].
P a g e | 80
334
Donoghue v Coombe (1987) 45 SASR 330.
335
Crimes Act 1900 (NSW) Part 2, divs 8-10.
336
Ibid, s562AB.
337
Ibid, s547C.
338
Ibid, s529.
339
Summary Offences Act 1988 (NSW) ss21G, 21H.
340
Ibid, s4; see also New South Wales Law Reform Commission, Consultation Paper 1, above n 98, 61 [2.102].
P a g e | 81
341
Workplace Surveillance Act 2005 (NSW) s15.
342
Ibid, ss18, 36, 37.
343
Ibid, s19.
344
Crimes Act 1900 (NSW) Part 6, Criminal Code Act 1995 (Cth) Part 10.7.
P a g e | 82
345
Privacy Act 1988 (Cth) s13 [National Privacy Principles 9, 11].
346
Court Information Act 2010 (NSW) s6.
347
Ibid, s10.
348
Doe v Australian Broadcasting Commission [2007] VCC 281.
349
Health Records and Information Privacy Act 2002 (NSW).
350
Ibid, s68(2).
P a g e | 83
351
Anti-Money Laundering and Counter-Terrorism Financing Act 2006 (Cth) Part 2 Div 5.
352
Ibid, s35J.
353
Wilkinson v Downton [1897] 2 QB 57.
354
Tucker v News Media Ownership Ltd [1986] 2 NZLR 716.
355
Doyle and Bagaric, above n 5, 69.
356
New South Wales Law Reform Commission, Report No 120, above n 2, 19 [4.12].
P a g e | 84
Table Two: Elements, Defences and Remedies in Privacy Statutes from Overseas
Jurisdictions
the lawful
interests of
others, and the
nature,
incidence, and
occasion of the
act or conduct
and to the
relationship
between the
parties, is
relevant
Examples of
invasions of privacy:
Auditory
surveillance
Listening or
recording
conversations
Using person’s
image or
likeness for
advertising
Use of letters,
diaries or
personal
documents
Privacy Act 1996 Two separate torts: These are referred to There does not appear
RSBC (British as ‘exceptions’, not to be a remedies
Columbia) 1. Violation of as ‘defences’, but it section.
privacy: will not be a
(Canada) It is a tort violation of privacy
Actionable where there is:
without proof of
damage Consent
for a person Lawful right or
wilfully and defence of
without claim of person or
right, to violate property
the privacy of Authorised by
another person law
Without consent Duty of peace
or lawful officer and not
authority disproportionate
In determining to gravity of the
the nature and matter
degree of Public interest or
privacy and fair comment
P a g e | 87
2. Unauthorised use
of the name or
portrait of
another
It is a tort
actionable
without proof of
damage
for a person to
use the name or
portrait of
another for the
purpose of
advertising or
promoting
unless the
person consents
There is also an
action for
constructive breach
of privacy, assault or
false imprisonment
with intent to
capture image (etc)
and an action for
directing, soliciting
or inducing another
to commit the
offence.
It is a tort for a Lawful defence Prohibitory order
Privacy Bill 2006* person of person or Appropriate
who wilfully and property damages in the
without lawful Installation of circumstances
(Ireland) authority CCTV in good Account of profits
violates the faith Aggravated,
privacy of an Act of news exemplary or
individual gathering, in punitive damages
*Bill not passed: and the tort is good faith, for
2007 actionable public
without proof of importance, for
special damage public interest,
and fair and
reasonable in the
circumstances
Absolute or
qualified
P a g e | 89
privilege
P a g e | 90
including public
interest
Create a statutory
cause of action
Provide remedies
Educate public on
the new
legislation and on
how they can
protect their
privacy and avoid
invasions of
privacy
Who can bring the Natural persons Natural persons Person whose
action? whose privacy whose privacy privacy has been
has been invaded has been invaded. invaded may
Children and This does not bring the action.
young people continue after the This should
need a litigation death of the extend after death
guardian to bring plaintiff. so that family
a privacy claim. members or
others who are
affected (e.g. with
emotional or
mental distress)
can bring an
action (this is in
direct response to
serious behaviour
by media
organisations in
hacking the
phones of murder
victims).
weighted public
interest,
outweighs that
public interest in
the circumstances
Actionable
without proof of
damage
Mental Element Intentional or Unnecessary to Unnecessary to
reckless acts specify, as this is not specify, as this is not
a tortious action. a tortious action and
courts should be able
to use their discretion
for accidental acts
and other mental
elements
Factors to be taken Whether the Nature of the Nature of the
into account public interest in subject matter subject matter
maintaining the Nature of conduct Nature of conduct
claimant’s Relationship Relationship
privacy between parties between parties
outweighs other Public profile Public profile
matters of public Vulnerability Vulnerability
interest Conduct before Conduct before
(including the and after and after
interest of the Effect on health, Whether an
public to be welfare and apology or
informed about emotional amends is made
matters of public wellbeing Effect on health,
concern and the Contravening welfare and
public interest in other Australian emotional
allowing freedom laws wellbeing
of expression) Contravening
other Australian
laws
Whether there
was consent (and
the extent to
which the activity
was consented to)
Any other matter
which the Court
thinks appropriate
disclosed
Online activity is
interfered with,
misused or
disclosed
Any other
circumstances
which the Court
determines
Defences Exhaustive list: Required or Conduct was
authorised under required,
Lawful right of law authorised or
defence of person Lawful defence enabled by law or
or property of person or Court order
Authorised by property Lawful defence
law (where law Publication of a of person or
includes matter would property or in
Commonwealth give rise to Court
and state and defamation proceedings
territory Acts and defences of
delegated absolute privilege
legislation as well or fair report of
as duties of proceedings
confidentiality Where the
under common defendant
law or equity) publishing the
Privileged under matter is an agent
law of or employee, did
defamation not know or
ought not
reasonably have
known that the
matter was an
invasion of
privacy (innocent
dissemination
defence)
Where matter is
published but
there is a
common interest
or duty in giving
or receiving
information (and
there is no
malice)
Onus Recommendation is Onus is on defendant Onus is on defendant
silent on this issue, to prove defence to prove defence
we assume onus is on
defendant.
P a g e | 95
Remedies The Court should ‘be The Court has wide Compensation
empowered to choose discretion to choose (no cap).
the remedy that is the remedy that is Prohibition order
most appropriate in most appropriate in Declaration
the circumstances’, the circumstances, Delivery up
and the statute and the statute Apology
provides a list of provides a non- Correction order,
examples of possible exhaustive list: proportional to
remedies: Compensation original
Damages (not ‘damages’, publication
(including as compensation Other relief that
aggravated should be able to the Court thinks
damages but not be sought for appropriate
exemplary mental or
damages) emotional
Account of distress alone,
profits although there is
Injunction a cap on non-
Apology order economic loss
Correction order compensation of
Delivery up and $150,000,
destruction of adjustable yearly)
material Prohibitory order
Declaration (not an injunction
necessarily,
depends on
public interest
and free speech
considerations
but also the
importance of
upholding
privacy in the
first place than
leave it to
compensation)
Declaratory
orders
Delivery up of
offending
material
Any other relief
as the court
considers
necessary (relief
could include
asset preservation
orders, search
orders, account of
profits, apology,
P a g e | 96
correction orders
and other
appropriate
remedies, orders,
ancillary orders
or procedural
advices derived
from other
statutory or
general law, or
under the
regulations)
No exemplary or
punitive damages
allowed
Limitation Period No proposal put 1 year from date of 1 year from date of
forward, we assume defendant’s conduct the claimant
ALRC follows the (but court has becoming aware of
NSWLRC proposal. discretion to extend the circumstances
by 3 years) surrounding the
invasion of privacy,
with a 3 year
discretional extension
period)
Education Office of the Privacy No education A comprehensive
Campaign Commissioner campaign was education campaign
should provide proposed should be created
information to the which both informs
public concerning the the general public
recommended about their rights
statutory cause of under the Act, and
action for a serious informs primary,
invasion of privacy secondary and
tertiary students in
particular about the
range of issues
relating to protecting
their own privacy,
particularly online.
Relationship with Abolishes any action Other laws can still Other laws can still
other laws relating for invasion of exist, e.g. Privacy exist, e.g. Privacy
to privacy privacy at common Act and torts and Act and torts and
law. breach of confidence, breach of confidence,
but there cannot be a but there cannot be a
common law tort common law tort
action for invasion of action for invasion of
privacy because it privacy because it
may undermine the may undermine the
statutory cause of statutory cause of
action action (same as
P a g e | 97
NSWLRC approach)
BIBLIOGRAPHY
ABC News, ‘ADFA cadet suspended over shower scandal’, ABC News (online), 27 August
2011 <http://www.abc.net.au/news/2011-08-27/adfa-cadet-suspended-after-shower-
scandal/2858408>
The Age, ‘Aussies concerned about phone-hacking’ The Age (online) 25 July 2011
<http://news.theage.com.au/breaking-news-national/aussies-concerned-about-phone-hacking-
20110725-1hwuc.html>
Anderson, David A., ‘The Failure of American Privacy Law’ in Basil S Markensis (ed)
Protecting Privacy: The Clifford Chance Lectures Volume 4 (Oxford University Press, 1999)
Australian Law Reform Commission, For Your Information: Australian Privacy Law and
Australian Law Reform Commission, Review of Australian Privacy Law, Discussion Paper
72 (2007)
Australian Law Reform Commission, Unfair Publication: Defamation and Privacy, Report
No 11 (1979)
Barendt, Eric, ‘Privacy and freedom of speech’ in Andrew T Kenyon and Megan Richardson
CBS News, ‘Say Cheese! iPhone App catches thief’, CBS News (online), 8 October 2011
<http://www. cbsnews.com/stories/2011/10/08/scitech/main20117622.shtml>
Cheer, Ursula, ‘The Future of Privacy: Recent Legal Developments in New Zealand’ (2007)
Chester, Simon, Murphy, Jason and Robb, Eric, ‘Zapping the paparazzi: is the tort of privacy
CNN, ‘Tapes show News Corp. subsidiary tactics’ CNN (online) 14 October 2011
<http://edition.cnn.com/ video/#/video/crime/2011/10/13/pkg-griffin-newscorp-hacking.cnn?
hpt=hp_t2>
Paper (2011)
Commonwealth, Australian Government First Stage Response to the Australian Law Reform
Commission Report 108 For Your Information: Australian Privacy Law and Practice,
xenophon-overstepped-the-mark-on-parliamentary-privilege-20110915-1kao0.html>
Daily Telegraph, ‘Chk Chk Boom girl Claire Werbeloff flees as Facebook fury erupts’, Daily
girl-claire-werbeloff-flees-as-facebook-fury-erupts/story-e6freuy9-1225715728133>.
P a g e | 99
Daily Telegraph, ‘Sydney airport trials full body scanners’, Daily Telegraph (online), 1
full-body-scanners/story-e6freuyi-1226105853100>
Davies, Nick, and Hill, Amelia, ‘Missing Milly Dowler’s voicemail was hacked by News of
/uk/2011/jul/04/milly-dowler-voicemail-hacked-news-of-world>
Dawn.com, ‘7.5 million Facebook users are under 13’ Dawn.com (online), 12 May 2011
<http://www.dawn.com/2011/05/12/7-5-million-facebook-users-are-under-13-study.html>
Dick, Tim, ‘From private life to public knowledge’, News Review, Sydney Morning Herald
Doyle, Carolyn and Bagaric, Mirko, Privacy Law in Australia (Federation Press, 2005)
Doyle, Carolyn and Bagaric, Mirko, ‘The Right to Privacy and Corporations’ (2003) 31
Duffy, Jill, 10 things you should know about Facebook Timeline (23 September 2011) PC
Mag <http://www.pcmag.com/article2/0,2817,2393464,00.asp#fbid=ZuMPxUB4XV5>
Frew, Wendy, ‘Artists may face classification to counter nudity’, The Age (online), 18 April
2011 <http://www.theage.com.au/entertainment/art-and-design/artists-may-face-
classification-to-counter-nudity-20110417-1djrv.html>
Kirby, The Honourable Justice Michael, ‘Privacy in Cyberspace’ (1998) 21 University of New
Hixson, R F, Privacy in a Public Society: Human Rights in Conflict (Oxford University Press,
1987)
Hong Kong Law Reform Commission, Civil Liability for Invasion of Privacy (2004)
Johnston, Mark, ‘Should Australia force the square peg of privacy into the round hole of
confidence or look to a new tort?’ (2007) 12 Media and Arts Law Review 441
Kirby AC CMG, The Honourable Michael, ‘Privacy, MySpace, YouTube and Facebook: Can
the Law Cope?’ (Speech delivered at the Victorian Privacy Commission Privacy Oration,
Lewis, Steve, Andrew Clennell, Simon Benson, Gemma Jones and Alison Rehn, ‘Craig
Thompson scandal deepens with allegations of a $70,000 spending spree on a union credit
/craig-thomson-scandal-deepends-with-allegations-of-a-70000-spending-spree-on-a-union-
credit-card/story-e6freuy9-1226119221232>
Lindsay, David, ‘An Exploration of the Conceptual Basis of Privacy and the Implications for
the Future of Australian Privacy Law’ (2005) Melbourne University Law Review 4
Mail Online, ‘Girl, 13, commits suicide after being cyber-bullied by neighbour posing as
article-494809/Girl-13-commits-suicide-cyber-bullied-neighbour-posing-teenage-boy.html>
Mason, Brett, Privacy without Principle: The Use and Abuse of Privacy in Australian Law
May, Julia, ‘Letter reopens hacking scandal’, Sydney Morning Herald (online) 17 August
2011 <http://www.smh.com.au/world/letter-reopens-hacking-scandal-20110816-1iwka.html>
McDonald, Timothy, ‘Campbell sex scandal sparks privacy debate’, ABC News (online), 22
debate/836580>.
Murphy, Katharine, ‘Canberra to move on Privacy Law’, The Age (online), July 21 2011
<http://www.theage.com.au/national/canberra-to-move-on-privacy-law-20110720-
1hp19.html#ixzz1T58aRPfx>
Neal, Marta, ‘Fordham Law Class Collects Personal Info about Scalia’ American Bar
/news/article/fordham_law_class_collects_scalia_ info_justice_is_steamed>
New South Wales Law Reform Commission, Invasion of Privacy, Consultation Paper 1
(2007)
New South Wales Law Reform Commission, Invasion of Privacy, Report No. 120 (2009)
O’Connor, Brendan, A Right to Privacy in Australia (21 July 2011) Attorney General
<http://www.ag.gov.au/www/ministers/oconnor.nsf/Page/MediaReleases_2011_ThirdQuarter
_21July2011-ArighttoprivacyinAustralia>
Rivette, Michael, ‘Litigating privacy cases in the wake of Giller v Procopets’ (2010) 15
Rodrigues, Ruben, ‘Privacy on Social Networks: Norms, Markets and Natural Monopoly’ in
Saul Levmore and Martha C Nussbaum (eds), The Offensive Internet (Harvard University
Press, 2010)
Roth, Paul, ‘Privacy Proceedings and the Dead’ (2004) 11 Privacy Law and Policy Reporter
50
Rout, Milanda, ‘Kirby says both rights can co-exist’, The Australian (online), 23 July 2011
<http://www. theaustralian.com.au/national-affairs/kirby-says-both-rights-can-co-exist/story-
fn59niix-1226100083272>
Saurine, Angela, ‘Stephanie Rice Facebook pictures censored’, Daily Telegraph (online),
1111115947818>
Solove, Daniel, The Future of Reputation: Gossip, Rumour, and Privacy on the Internet (Yale
Stickley, Amanda, ‘Common Law Tort of Privacy – Faltering Steps?’ (2004) 25 Queensland
Lawyer 81
Stickley, Amanda, ‘Personal Privacy: Boldly Going Where No Australian Court Has Gone
Sydney Morning Herald, ‘9/11 victims ‘targeted’ by tabloid phone hackers’, Sydney Morning
tabloid-phone-hackers-20110711-1ha90.html>
P a g e | 103
Tilbury, Michael, ‘Remedies for breach of confidence in privacy contexts’ (2010) 15 Media
Victorian Law Reform Commission, ‘Victorian Law Reform: Keeping Private Lives Private’
Wacks, Raymond, Personal Information: Privacy and the Law (Clarendon Press, 1993)
Wacks, Raymond, Privacy and Press Freedom (Blackstone Press Limited, 1995)
Walker, Sally, ‘The Courts, Parliamentary Privilege and the Media’, (1999) UTS Law Review
20
Warren, Samuel D. and Brandeis, Louis D., ‘The Right to Privacy’ (1890) 4 Harvard Law
Review 193
Zamost, Scott, Schwarzschild, Todd and Griffin, Drew, ‘Exclusive: Videos detail News
cnn.com/2011-10-14/us/us_news-corp-america_1_world-phone-hacking-scandal-news-corp-
british-newspaper?_s=PM:US>
B Cases
Andrews v TVNZ (Unreported, High Court of New Zealand, Allan J, 15 December 2006)
P a g e | 104
Australian Broadcasting Corporation v Lenah Game Meats (2001) 208 CLR 199
Victoria Park Racing and Recreation Grounds Company Limited v Taylor (1937) 58 CLR 479
C Legislation
Massachusetts General Laws, Part III Courts, Judicial Officers and Proceedings in Civil
Cases, Title I Courts and Judicial Officers, Chapter 214 Equity Jurisdiction, Section 1B
D Treaties
Convention for the Protection of Human Rights and Fundamental Freedoms, opened for
signature 4 November 1950, 213 UNTS 221 (entered into force 3 September 1953)
International Covenant on Civil and Political Rights, opened for signature 16 December
Universal Declaration on Human Rights, GA Res 217A [III], UN GAOR, 3rd sess, 183rd plen
E Other Sources
Australian Broadcasting Corporation, ‘Bad News’, Four Corners, 29 August 2011 (Gordon
Brown)
Australian Press Council, Submission PR 411 to Australian Law Reform Commission, For
Burrows, Professor John, ‘Privacy and the Courts’ (Speech delivered to the Privacy Forum,
Centre for Law and Genetics, Submission PR 127 to Australian Law Reform Commission,
For Your Information: Australian Privacy Law and Practice, 16 January 2001
Department of Broadband, Communications and the Digital Economy, The Vision (23
/full_data_use_policy>
< http://www.facebook.com/terms.php>
info.php?statistics>
/intl/en/+/learnmore/index.html#circles>
Jackson, Kim, Media Ownership Regulation in Australia, (19 October 2011) Parliamentary
Office of the United Nations High Commissioner for Human Rights (1988) General
Comment Number 16
Star, Michelle, ‘Guvera music site uses guerrilla advertising tactics’, C Net (15 March 2010)
<http://www.cnet.com.au/ guvera-music-site-uses-guerrilla-advertising-tactics-
339301774.htm>
Twitter, ‘One hundred million voices’ on Twitter, Twitter Blog (8 September 2011)
<http://blog.twitter.com/>
United Nations Secretary General, Respect for the privacy and integrity and sovereignty of
nations in the light of advances in recording and other techniques, UN Doc E/CN.4/1116
(1976)
P a g e | 110
Youngman, P., Submission PR 394 to Australian Law Reform Commission, For Your
statistics>
YouTube, Victim fights back in NSW Sydney school (16 March 2011) YouTube <http://