IF ‘MUM’ IS THE WORD, IS IT THE LAW? IRISH PRIVACY LAW: A COMPARATIVE PERSPECTIVE PAUL MCDONAGH-FORDE, SCH.* Introduction In the modern age, privacy is constantly challenged by developments in technology, surveillance, and the administrative state. Recognised as a legal value by Warren and Brandeis in their famed article,1 Ireland protects privacy through an unenumerated constitutional right, pursuant to Article 40.3. of Bunreacht na hÉireann. In the United Kingdom, and in other jurisdictions (most notably New Zealand and the United States of America (USA), common law protections of privacy have seen important developments in the last three to four years. These increasingly provide strong tortious protections based on objective reasonableness standards, and also provide clear defences. Privacy protections at common law in the UK and Australia are characterized by a reluctance to recognise a separate cause of action based solely on privacy interests, and so equitable breach of confidence was used in these jurisdictions as a vehicle to introduce similar protections. Privacy interests that arise in these cases often encompass some of the most personal aspects of life: intimate photographs, private records, wedding photographs, and even the ability to shower without being watched all arise in the case law. This article will examine three key causes of action in privacy that occur throughout the common law world, and will critique the strength of Ireland’s privacy protections through this analysis. It is *Senior Sophister LL.B. candidate and Scholar of Trinity College Dublin. The author would like to thank Dr. Eoin O’Dell for his invaluable guidance, Dr. Niamh Connolly for her insightful comments on an earlier draft of this article, Alastair Richardson, Sch., and the Editorial Board of the TCLR for being the epitome of professionalism. 1 Samuel Warren and Louis Brandeis, ‘The Right to Privacy’ (1890) 4 Harvard LR 193. submitted that Ireland’s privacy right pursuant to the Constitution provides a weaker protection than many common law causes of action, that the courts have shown a tendency to draw inspiration from ill-advised strands of jurisprudence from other jurisdictions, and that some of the strongest constitutional protections of privacy here actually stem from the right of the person in Article 40.3, rather than the unenumerated right to privacy. Legal protections of privacy have a long history in the United States, and the torts protecting privacy interests recognised there have been categorised by William Prosser into four causes of action: Public Disclosure of Private Facts, Intrusion, Appropriation, and Portrayal in a False Light.2 Two of these causes of action will be dealt with directly in detail in this article, and it will also address privacy protections framed through breach of confidence, as this has arisen in Australia, the UK, and this jurisdiction. The first of Prosser’s torts this article will address is ‘intrusion’, often called ‘intrusion upon seclusion’ in some jurisdictions.3 This relates to physical intrusion such as stalking, and can also relate to intrusion based on activities like eavesdropping. An ‘offensive to the reasonable person test’ is used here.4 The second is called ‘public disclosure of truth’,5 or ‘public disclosure of private facts’.6 This consists of 1. a disclosure made in public 2. of facts that a reasonable person would consider to be private and 3. the facts must be highly offensive to a reasonable person of ordinary sensibilities (from the perspective of the aggrieved party). A ‘public interest’ defence is also available.7 This defence is balanced against the reasonableness consideration, and arises in circumstances where the media has an interest in informing the public. There is also a tort of ‘false light’, pertaining to the portrayal of the aggrieved party in a false light,8 and a tort of ‘appropriation’, mostly relating to the use of images or likenesses of a celebrity 2 William Prosser, Werdner Page Keeton, Dan Dobbs, Robert Keeton, David Owen, Prosser and Keaton on The Law of Torts (5th edn, West Publishing Co 1984). 3 Marc Franklin, Robert Rabin, Michael Green, Tort Law and Alternatives (Foundation Press 2011) 1091; ibid 854. 4 Prosser & Keaton (n 2) 855. 5 Franklin & Rabin (n 3) 1046. 6 Prosser & Keaton (n 2) 856. 7 ibid 857. 8 Franklin & Rabin (n 3) 1080; Prosser & Keaton (n 2) 863. without consent, to secure financial gain.9 The privacy protections introduced through the doctrine of breach of confidence will also be analysed. These have been particularly prominent in the UK and Australia, and has been referenced at times by the Irish courts. This article will comparatively assess Irish law through an analysis of remedies for ‘intrusion’, followed by a critique of protections of privacy through doctrines based on ‘confidence’. The third part will focus on ‘publication’, dealing with the interests that most commonly arise in the tort of public disclosure mentioned above, but sometimes encompass interests protected in the USA by the last two torts as well. I. Intrusion The Irish constitutional protection on privacy is fundamentally grounded in the ‘natural law’ theory that was prominent during an era of judicial constitutional activism. The Kennedy case, concerning the tapping of a journalist’s phone, prompted Hamilton P to discover the right as stemming from the ‘Christian and democratic nature of the State’.10 He echoed the dissent of Henchy J in the Norris case, where it was also suggested that the constitution protected a right to privacy.11 The ‘natural’ nature of the right is supported by Digital Rights Ireland v Minister for Communications, where it was held that any corporate protection was as far as possible from the right’s ‘core’.12 The test elucidated by Hamilton P in Kennedy was that any interference by the State into this right must be justified by the ‘exigencies of the common good’, and an actionable interference must be done ‘deliberately, consciously, and unjustifiably’.13 This requirement for a ‘deliberate’ interference is seen in other areas of constitutional protections in this jurisdiction as well, such as the recent reformulation of the exclusionary rule in the context of criminal evidence.14 This test does not seem to be applied stringently, as a party who did not have their right ‘deliberately’ interfered with was awarded 9 Franklin & Rabin (n 3) 1114; Prosser & Keaton (n 2) 851-852. Kennedy v Ireland [1987] IR 587, 592. 11 Norris v Attorney General [1984] IR 36, 71. 12 [2010] IEHC 221; See also the South African position in Bernstein v Bester [1996] ZACC 2. 13 Kennedy (n 10) 593. 14 JC v DPP [2015] IESC 31. 10 damages, albeit only 50% of the figure awarded to those who did have their rights ‘deliberately’ interfered with.15 Moving on from the initial circumstances of intrusion in Kennedy, it is worth viewing other intrusion-based remedies from a comparative perspective, in order to assess the effectiveness of the Irish model. The first observation to make is that there is a shortage of case law from Ireland relating to intrusions that are decided on privacy grounds. The Kennedy case is an obvious exception. Other cases involving warrants have shown that various safeguards in relation to searches exist to protect the privacy rights of the citizen,16 and some cases have utilised privacy as a general guarantee in criminal trials, such as the interception of phone calls without notice.17 A right of non-disclosure also exists in relation to one’s gender and sexual identities, meaning that an employer or other individual cannot acquire this information through intrusion.18 One of the most significant cases in this jurisdiction that deals with an instance of intrusion is the Cogley case, where recordings of abuse in a nursing home for the elderly were made without the consent of the owners and operators of the home. The applicants sought an interlocutory injunction from the High Court to prevent the broadcasting of a documentary on RTÉ, and the application was rejected by Clarke J. In his speech, the trial judge addressed the privacy concerns arising from the presence of a journalist; an unauthorised intruder. He held that a right to privacy might be engaged as a result of how the information was acquired (through intrusion). 19 He held that he saw no reason why information on the conduct of their business being abusive should engage a privacy protection, and that stronger questions were raised by the intrusion consideration.20 Clarke J relied on a case from New Zealand with very similar facts, but where the misconduct was on the part of a medical practitioner. In this case, TV3 Network Services Ltd v Fahey, the New Zealand Court of Appeal did not concern itself with a tort of privacy, but it was held that if the film was obtained ‘in breach of the plaintiff’s rights’ (again, through intrusion), then the competing rights and interests 15 Kennedy (n 10) 595. Hanahoe v Hussey [1998] 3 IR 69, 96. 17 DPP v Dillon [2002] 4 IR 501. 18 MA v Minister for Justice [2011] 3 IR 41. 19 Cogley v RTÉ [2005] 4 IR 79, [28]. 20 ibid 34. 16 would be balanced against the plaintiff’s.21 The trial judge followed the approach in TV3, where he decided to balance a public interest consideration and find for RTÉ. We see that where privacy concerns are raised in the context of intrusion in Ireland, this constitutional balancing act once again comes into play. No consideration was given to a ‘deliberate and conscious’ test, and thus it is not clear if this is applicable when privacy disputes of this nature arise. It is submitted that a balance of this nature could be struck more effectively by applying an objective test reminiscent of tort law, even if it were to derive from the Constitution. Moving on to New Zealand, we see that intrusion on seclusion has recently been accepted as a cause of action there as well. Moreover, their Law Reform Commission has suggested that codification in relation to privacy is not necessary, and judicial development should continue.22 In C v Holland,23 the High Court was asked to consider intrusion on seclusion when the defendant was found to have installed a camera to watch his housemate’s girlfriend while she was showering. Whata J almost immediately introduced Prosser’s four torts to his judgment.24 He summarised the law on this issue in New Zealand, Australia, Canada, and the UK.25 As well as opining on the general benefits of protecting an entitlement not to have one’s seclusion intruded on, Whata J also referred to the Law Reform Commission’s recommendation that the courts continue to develop the law, rather than defer to hypothetical legislative action on privacy. 26 He held that such privacy protections are merited by modern technological developments, independent of any obligation to conform to international standards.27 The North American standard for the tort was followed, while requirements for a ‘reasonable expectation of privacy’ and an unreasonable invasion that was ‘highly offensive to a reasonable person’.28 This test protects the relevant interest, and 21 TV3 Network Services Ltd v Fahey [1999] 2 NZLR 129. New Zealand Law Commission Report 113 ‘Invasion of Privacy: Penalties and Remedies – Review of the Law of Privacy Stage 3’ ch 7, January 2010, <http://www.lawcom.govt.nz/sites/default/files/projectAvailableFormats/NZLC%20R 113.pdf> accessed on 15 January 2017 23 [2012] NZHC 2155 (24 August 2012). 24 ibid [12]. 25 ibid [33]-[64]. 26 ibid [83]. 27 ibid [86]. 28 ibid [94]. 22 clearly elucidates the standards that must be met, by using the commonly accepted ‘reasonableness’ tortious standards. In the same year that the Holland case was decided, a tort of ‘intrusion on seclusion’ was recognised in the province of Ontario. Most of the other Canadian provinces have statutory causes of action for breach of privacy,29 and so common law developments have generally been confined to Ontario. In the case of Jones v Tsige,30 Sharpe J held that Prosser’s four torts were an acceptable method of defining the different causes of action that could exist in privacy claims.31 The trial judge rejected an argument that it was a matter for the legislature, holding that there was no expression of legislative reluctance in respect of individual civil actions.32 The decision to recognise the tort was based on other common law developments, general protections of privacy in Canada, and the judge’s view that the facts ‘cried out for a remedy’.33 The test is similar to that of New Zealand, but there is no ‘reasonable expectation’ element; only intrusion on seclusion that would be highly offensive to a reasonable person.34 It may be taken as given that the expectation of seclusion must be a reasonable one, but clarity on this would have been welcome. It was also held that where competing interests such as freedom of expression might arise, they should be balanced appropriately, in line with Canada’s constitutional framework.35 The test was applied in Ontario once again very recently, where a plaintiff was awarded $15,000 in damages against a defendant who filmed her in her bedroom without permission.36 The strong reliance on Prosser’s torts once again does bring clarity, but, admittedly leaves little scope for jurisdiction-specific innovation such as is facilitated by the right of the person in Ireland. 29 Personal Information Protection Act 2003 (Alberta), Personal Information Protection Act (British Columbia) 2004, Personal Information Protection Act (Nova Scotia) 2003, Privacy Act 1978 (Saskatchewan), Privacy Act 1987 (Manitoba), Privacy Act 1990 (Newfoundland and Labrador), An Act Respecting the Protection of Personal Information in the Private Sector (Québec). 30 [2012] 108 OR 241. 31 ibid [21]. 32 ibid [50]-[51]. 33 ibid [65]-[69]. 34 ibid [70]. 35 ibid [73]. 36 Patel v Seth [2016] ONSC 6964 (9 December 2016). Some Irish cases that were not decided based on the unenumerated right to privacy could well have engaged the tort of intrusion, should they have been decided in other jurisdictions. The Irish constitutional framework is sufficiently robust to provide remedies for such breaches that are not entirely grounded in privacy, such as the case of Sullivan v Boylan.37 Hogan J held that there was no action in tort that could vindicate the rights of a lady that was subjected to reprehensible stalking on the part of a debt collector, and thus awarded damages for the breach of the constitutional right to the person under Article 40.3.38 This right has arisen in other cases,39 and seems to be, as Kenny has argued, becoming fundamental to our contemporary constitutional jurisprudence.40 There may well be no need to recognise Prosser’s tort of intrusion in Ireland if the right to the person, in conjunction with the privacy rights acknowledged in Cogley, provide parties with an appropriate remedy. Another constitutional provision relevant to the issue of seclusion is Article 40.5, which protects the inviolability of the dwelling. In Schrems v Data Protection Commissioner, 41 Hogan J suggested that this article should not be confined to the criminal law, and that ‘communications originating in the home’ might be protected under this provision as well as through the unenumerated right to privacy.42 It is difficult to agree with this logic. Should communications ‘originating’ in the home be protected, the question immediately arises of what might happen to the protection of the communication once it appears on the device that is owned and operated by an individual with no connection to the dwelling it was sent from. If the right applies to the information, it is difficult to see why it would be attached to the home. If it applies to devices that are in the home, it is difficult to see why this is any different from the existing physical protection of the dwelling, as it only applies to communications on devices that can be seen from inside the home. If the right applies to the device, then the approach taken by the US Supreme Court in Riley 37 [2013] 1 IR 510. ibid [44]. 39 Kinsella v Governor of Mountjoy Prison [2012] 1 IR 467. 40 David Kenny ‘Recent Developments in the Right of the Person in Article 40.3: Fleming v Ireland and the Spectre of Unenumerated Rights’ (2013) 36 DULJ 322. 41 Maximilian Schrems v Data Protection Commissioner [2014] 3 IR 75 42 ibid [48]. 38 v California, where it was held that a warrant is required to search a mobile phone, might be a better one.43 It would be better to apply a more robust general privacy guarantee to protect intrusion into information, rather than engaging rights that might in practice actually limit privacy protections, because of the strained logic involved.44 Instances of ‘intrusion’ in Ireland have strong protections, interestingly, that are found more in the right of the person than in the right to privacy. The reasonableness tests used in other jurisdictions provide a very clear and predictable cause of action for litigants. Some confusion exists at Irish law, due to a conglomeration of actions through both of the above-mentioned constitutional provisions, and through Article 40.5. It is submitted, however that robust and eclectic forms of protection can be provided to Irish citizens in this context, by effective use of these multiple causes of action (provided some are not misused, such as in the Schrems example). The value placed on personal autonomy in Irish law means that, of the interests considered in this article, constitutional rights-holders in this jurisdiction are protected the most in respect of privacy violations in this particular area. Before turning to privacy in the context of publication, privacy protections relying on breach of confidence will be considered. II. Breach of Confidence This section will comparatively critique privacy protections grounded in breach of confidence, and ultimately argue that the use of breach of confidence in such contexts is fundamentally misguided, and should be abandoned by the Irish courts insofar as they have used it. Breach of confidence is an equitable cause of action, grounded in a pre-existing relationship of confidence between two parties. The doctrine has evolved in some jurisdictions, however, to take on tortious characteristics in order to protect privacy interests. Some forms of the doctrine have become confused and over-stretched; the original and quite 43 [2014] 573 US. See also Paul McDonagh-Forde ‘There’s no place like home: Does Schrems v Data Protection Commissioner stretch Article 40.5 to breaking point?’ (2017) TCLR Online, <http://trinitycollegelawreview.org/theres-no-place-like-home/> accessed on 15 January 2017. 44 separate interest of personal relationships that it once protected was abandoned in some instances, in favour of protections focusing on privacy. The tort of invasion of privacy will not be directly addressed in this part, but will only address it insofar as tortious qualities begin to appear in actions and rulings based on breach of confidence. Developments in the rest of the common law world will provide a useful prism with which to view recent Irish developments on the matter, and are often indicators of avenues it might be best to avoid. Irish cases have tentatively referred to privacy-based developments on breach of confidence in other jurisdictions. It is submitted that they should be reluctant to follow this line of precedent, as it will be shown that these developments were fundamentally misguided, as they limit the comprehensiveness and clarity of the privacy protection while simultaneously moving away from a separate protection of relationships based on agreed confidence. The original law of breach of confidence and breach of confidence subsequent to the introduction of privacy concerns will be distinguished (although the latter has happened in different ways), by allocating a letter to each form. - Breach of confidence (a): The requirements to make out an action in its original form are that the information is confidential, that it was originally imparted in circumstances importing an obligation of confidence, and that there has been or is threatened an unauthorised use of the information by the confidant to the detriment of the confider.45 - Breach of confidence (b): The more recent conceptions of the doctrine do not require a pre-existing relationship of confidence, and a ‘duty’ is often implied based on the circumstances of the case. This doctrine is often, in contrast to breach of confidence (a), treated as a tort. The distinction relied on between (a) and (b) in this article is a lack of a pre-existing relationship of confidence.46 45 Coco v AN Clark (Engineers) Ltd [1969] RPC 41, 47 (McGarry J); Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd [2001] HCA 63 [30] (Gleeson CJ). 46 Douglas and Others v Hello! Ltd [2001] QB 967, 984, 998. A. The Decline of Breach of Confidence (a) The principle of equitable breach of confidence – i.e. breach of confidence (a) – was, initially, based on the specifics of a relationship between the relevant parties. Early case law deals with confidence in the context of marriage.47 It was necessary for the breaching party to be on ‘notice’ as to the confidentiality of the information, and therefore an element of subjectivity was significant.48 The treating of confidence as a ‘duty’, based on an objective responsibility attached to a party by a court, began to emerge in Attorney General v Guardian Newspapers Ltd (No 2) 49 (the Spycatcher case). In this case, the Attorney General of England and Wales took an action against Mr Wright, a former MI5 agent who published memoirs containing sensitive information on national security. The case introduced the notion of a ‘duty’ of silence, and declared the question of whether it was of legal or equitable origin as solely academic interest.50 However, it is a long established principle that an equitable obligation of confidence and a contractual one have the same nature.51 The nature of these obligations is either fiduciary or based on a freely made contract. Spycatcher thus represented a pre-cursor to the confusion that hindered modern-day privacy actions. Relying on an interest grounded in personal relationships confuses actions based on duty, and on the objective significance of particular information. Specifically, Lord Donaldson MR held that, as in Schering Chemicals,52 a confidant can still be considered a confidant if they acquired the information from other sources, and the original confider can be treated as the source.53 This reasoning is difficult to accept. MI5 was only the source of the information insofar as they provided Mr Wright with the source of employment that facilitated discovering this information. This is fundamentally different from information that is conveyed directly as part of a contract, or as part of an equitable relationship. A hospital can obviously not be treated as a source of information when a doctor discovers a 47 Duchess of Argyll v Duke of Argyll and Others [1967] Ch 302. Attorney General v Guardian Newspapers Ltd (No 2) [1990] 1 AC 109, 140. 49 ibid. 50 ibid 145, 148. 51 Lamb v Evans [1893] 1 Ch 218. 52 Schering Chemicals Ltd v Falkman Ltd [1982] QB 1. 53 Guardian Newspapers (No 2) (n 48) 177. 48 patient’s illness; reasoning such as this in the context of Mr Wright’s employment introduces artificiality, by attempting to fashion a remedy using an unsuitable doctrine. The incorporation of ‘duty’ for secret information introduces a responsibility unconnected to an explicit relationship of ‘confidence’, and so begins to change the action and thus neglect agreements of confidence freely entered into. This is the first appearance of what is termed breach of confidence (b), for the sake of convenience, and facilitated incorporating the concept of ‘duty’ into an actual tort. The Attorney General of England and Wales took actions in a number of countries to attempt to stop the publication of the book in question in the Spycatcher case. One such action was taken in Ireland, in the case of The Attorney General for England and Wales v Brandon Book Publishers Limited.54 In this case, similar arguments to those in the House of Lords were made before the Irish High Court. Carroll J found for the book publishers. She held that at Irish law, breach of confidence applied in a private, commercial context, and not between individuals and foreign governments.55 Given that these questions tend to engage the Constitution, breach of confidence as an equitable cause of action is not quite as developed in this jurisdiction. In the case of House of Spring Gardens Limited,56 a complex dispute arose in relation to the construction of bullet-proof vests based on information that the plaintiffs alleged was confidential. The Supreme Court held that the decision of Costello J in the High Court was correct, and so most of the relevant legal findings are in Costello J’s judgment. The trial judge made clear that this doctrine was fundamentally grounded in equity.57 The principles that he elucidates at length consist of the traditional requirements under breach of confidence (a), namely confidential information that revealed, when the parties have a relationship of confidence, and the disclosure is unauthorised and to the detriment of the aggrieved party. In the Supreme Court, O’Higgins CJ quoted Costello J’s declaration of the relevant principles in full, and held that it correctly sets out ‘the principles which apply to this branch of the law and I cannot think of anything that I would wish to 54 [1986] 1 IR 597. ibid 601-602. 56 House of Spring Gardens Limited and Ors v Point Blank Ltd and Ors [1984] 1 IR 611. 57 ibid 659. 55 add’.58 McCarthy J held that he ‘would question’ whether breach of confidence relates to a moral duty, and suggested that it amounted more to a ‘commercial necessity’.59 This statement was supported by Carroll J in Brandon Books. 60 Similarly, in Private Research Limited v Brosnan,61 McCracken J held that breach of confidence consists of the criteria for breach of confidence (a), but does not mention the detriment requirement. The principles of breach of confidence (a) outlined here helpfully present the distinction between moral and rights-based protections of privacy, and protections of confidence based on equitable protections of personal agreements (and often, commercial contracts). When the law fails to take account of this distinction, the protection of the former is lost, and the protection of the latter is rendered unclear. Similarly, the original Australian position was that breach of confidence (a) was the law,62 and that no tort of invasion of privacy exists there.63 But recent developments have moved away from this position. The most significant authority for this discussion is Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd,64 which concerned the unauthorised recording of footage of controversial animal slaughter methods, and raised the issue of the conflict between traditional breach of confidence (a), breach of confidence (b), and a tort of invasion of privacy. In his judgment, Gleeson CJ explicitly endorsed breach of confidence (b), by holding that equity can impose obligations of confidence even when there is ‘no imparting of information in trust and confidence’.65 When addressing arguments made in relation to a tortious action for breach of privacy, he held that provided the information is private, the law of breach of confidence is ‘adequate to cover the case’, as long as the discloser ‘knew, or ought to have known, the manner in which they have been obtained’. 66 This is not an equitable standard. Breach of confidence (b), when creating a fictional 58 ibid 696. ibid 709. 60 Brandon Books (n 54) 601. 61 Private Research Limited v Paul Brosnan and Network Financial Services Limited [1995] 1 IR 534. 62 Coco v AN Clark (n 45). 63 Victoria Park Racing and Recreation Grounds Ltd v Taylor [1937] 58 CLR 479. 64 [2001] HCA 63. 65 ibid [34]. 66 ibid [39]. 59 ‘confidence’ based on privacy, and assessed objectively using language normally associated with ‘reasonableness’, strays too far from its origins and the interests equitable confidence exists to protect. It simultaneously neglects the initial protection of relationships of confidence freely entered into, and fails to acknowledge that objective standards of privacy based on ‘reasonableness’ have the basic characteristics of a tort with no relationship to the concept of ‘confidence’. B. The Rise of Breach of Confidence (b) The tort of privacy has been framed in terms akin to breach of confidence. This is undesirable and two distinct protections should be allowed to develop separately. Breach of confidence (b) has sometimes been argued in Irish courts in a way that could move the courts away from distinct protections of privacy interests, as opposed to interests based on relationships of confidence. In National Irish Bank v Radio Telefís Éireann,67 which concerned an application by the bank in question to prevent RTÉ from publicising information it had acquired about the bank that was not in the public domain. In the High Court, Shanley J, citing no authorities, squarely applied a tortious standard.68 This is the first sign of language of ‘duty’ in Irish breach of confidence, based on an objective assessment of reasonable expectation of ‘confidence’, as opposed to an obligation arising from a confidential relationship. Shanley J also introduced a defence of public interest.69 It is old authority that there is ‘no confidence in iniquity’70 (i.e. that an individual cannot be expected to be a confidant of a crime or fraud or some other inequitable result) and therefore there is some basis for a public interest defence in breach of confidence actions, even outside of tort.71 The Irish Supreme Court has recognised this.72 The recent developments on this internationally have been criticized for being ‘uncertain’ and for being treated with a 67 National Irish Bank Limited v Radio Telefís Éireann [1998] 2 IR 465. ibid 474. 69 ibid. 70 Gartside v Outram (1856) 26 LJNS 113. 71 ibid 114. 72 NIB v RTE [1998] 2 IR 465. 68 ‘piecemeal approach’. 73 The remedy in National Irish Bank, however, was strongly based on traditional tort principles, and so the public interest defence breaks new, and even more uncertain ground, with no tortious authorities seemingly available. However, even if the facts of this particular case could meet the threshold required to establish breach of confidence (a), introducing this tortious language risks neglecting the original purpose of breach of confidence; protecting relationships of confidence entered by the parties, rather than imposing privacy ‘duties’. In the Supreme Court, Keane J referred to the public interest ‘balancing act’ engaged in by the English courts in Guardian Newspapers.74 He also, once again, refers to confidence as a ‘duty’.75 However, as Keane J pointed out, the relationship of confidence at issue is not that between the bank and RTÉ, but between the bank and its customers, as RTÉ intended to publish the names of customers engaging in questionable activity through the bank.76 A minority of 2 held that there must be an injunction against RTÉ divulging the names to any party, with the exception of the Revenue Commissioners, with a majority of 3 holding that publication was in the public interest by virtue of the offence’s criminal nature. The case could easily have swung on equitable breach of confidence (breach of confidence (a)) and a countervailing public interest in the context of crime, in the form of tax evasion. The use of the term ‘duty’ is unfortunate, as it introduces tortious language. This issue has arisen in the UK and Australia to a large extent. The position in Australia on breach of confidence (b) is now tentative and uncertain, as the Australian courts seem reluctant to recognise a separate cause of action in privacy. Initially, a tort of privacy was described as ‘developing’ in the jurisdiction,77 and Kirby J (one of the main proponents of the tort in Lenah) described it as the result of ‘legislative inaction’.78 The High Court in Lenah was specifically asked to recognise a tort of invasion of privacy.79 73 Jason Pizer ‘The Public Interest Exception to the Breach of Confidence Action: Are the Lights about to Change?’ (1991) 20 Monash LR 67, 68. 74 Guardian Newspapers (n 48) 483. 75 ibid 485. 76 ibid 481. 77 Church of Scientology v Woodward (1982) 154 CLR 25, 68. 78 Australian Consolidated Press Ltd v Ettingshausen [1993] NSWCA CA40079/93 15. 79 Lenah Game Meats (n 64) [38]. Gleeson CJ further questioned the lack of precision surrounding privacy.80 The Victoria Park81 case pertained to a suit by a racing ground, in an attempt to prevent a radio station and an individual from broadcasting information on races displayed on a screen twenty minutes before they actually took place. Gummow and Hayne JJ held that this case did not preclude a tort of privacy, as was submitted by Lenah Game Meats, but instead simply held that there was no protection of privacy under the heading of nuisance.82 They further held that privacy protections, as in the USA, could not apply to corporations.83 It is interesting that Lenah has become such an important and leading authority not only in Australia, but for also in other jurisdictions, when the very tentative tort that was discussed was not even applicable to the litigant in the case itself. Kirby J, who had been open to the tort in the past, refrained from addressing it directly in the instant case for that very reason.84 It is ironic that a case preventing the publication of material revealing animal rights abuses, that did not make any decisions on the tort of privacy, has been so significant in influencing developments in an action so often associated with vindicating victims of stalking, revenge porn, and identity appropriation. It instead gives fodder to the artificial concept of ‘duty’ found in breach of confidence (b), and to the instance in Australia and (for many years) in the UK that privacy is not actionable at common law. Breach of confidence (b) emerged as a tort in the UK in the case of Douglas v Hello!85 in the English Court of Appeal. The case was a claim by celebrity couple Michael Douglas and Catherine Zeta Jones taken against Hello! Magazine, for publishing wedding pictures without authorisation (a commercial deal for the photographs was awarded to OK! Magazine). Brooke and Sedley LJJ held that privacy considerations can be introduced to breach of confidence when there is no existing relationship of trust.86 This is significant, particularly as in the same case the defendants were held to be ‘on notice’, a phrase traditionally reserved for existing 80 ibid [42]. Victoria Park (n 65). 82 Lenah Game Meats (n 63) [107]-[108]. 83 ibid [116], [126], [129]. 84 ibid [190]-[191]. 85 [2005] EWCA Civ 595. 86 ibid 984, 998. 81 relationships of confidence.87 The Court of Appeal felt it necessary, prompted by the European Court on Human Rights decision in Earl Spencer v United Kingdom, 88 to incorporate privacy protections enshrined in Article 8 ECHR into the action breach of confidence at English law, through the Human Right Act 1998. Mac Síthigh has also pointed out that the expansion of breach of confidence stems from the ECHR.89 This, then, is the birth of breach of confidence (b) in its pure, privacy-based form. Sedley LJ explicitly referred to the cause of action as a tort, where – as it has been pointed out – it was held that these preexisting relationships were not necessary. In particular, he referred at length to the ‘tort of breach of confidence’, and correctly held that a ‘right to privacy’ now existed at English law, and that despite naming concerns, it had been applied as such for some time.90 On the other hand, Brooke LJ held that no tort of invasion of privacy was known to English law, following Kaye v Robertson.91 Keene LJ sought to split the difference on this issue; he held that there is no ‘watertight division’ between privacy and breach of confidence and, based on Article 8 ECHR, suggests that Kaye would have been decided differently if it were heard at the same time as Douglas.92 Keene LJ is right to point out the distinction between these two areas of law. To move breach of confidence (b) so far from its initial roots would be to neglect the interest of protecting relationships based on confidence, rather than ones based on an individual’s privacy. This case prompted further distortion of the law in England and other jurisdictions, which remains today somewhat in Ireland, and very much in Australia. Two distinct interests arising out of two very different legal orders (equity and the ECHR) being conflated led to confusion causes of action, and confusing and conflicting judgments such as this one, without a clear test even existing. The contribution of Douglas and Lenah to the dilution of breach of confidence, at the expense of both confidence interests and privacy interests led to a series of confused actions, with very 87 ibid 984. [1998] 25 EHRR CD 105. 89 Dáithí Mac Síthigh, ‘Beyond Breach of Confidence: an Irish eye on English and Scottish privacy law’ (2014) 1 Jur Rev 27, 32. 90 Douglas (n 85) [1000-1]. 91 [1991] FSR 62. 92 ibid 1012. 88 different initial objectives; one, being the protection of relationships of confidence, the other being protections of privacy rights and enforcement of privacy duties (such as under Article 8 ECHR). The courts in England did not recognise this danger in the same way, and the distortion of breach of confidence continued in the case of Campbell v MGN. The case concerned media revelations about Naomi Campbell’s addiction to drugs, and her attendance at ‘Narcotics Anonymous’ meetings. The action was successful at first instance, 93 was overturned in the Court of Appeal, 94 and was overturned once again in the House of Lords.95 The ruling helped movement towards a tort of invasion of privacy in the UK, but contributed, yet again, to its slowing down through use of breach of confidence (b). At first instance, Morland J held that the obligation of confidence must be assessed objectively, and not subjectively.96 This neglects the traditional idea that breach of confidence protects relationships of confidence, whereby the parties are aware of it and then breach it. Rather than applying a test based on the nature of the relationship itself, the test morphs into an objective one, asking whether they were ‘clothed in conscience with the duty of confidentiality’.97 Confidence implies that somebody has had the confidence in somebody else to impart information, in confidence (my emphasis).98 Morris is right to argue that the trial judge’s failure to call the objective duty what it is – a tort of invasion of privacy – simultaneously neglects the worthy interest of relationships of confidence, and the worthy interest of privacy, and conflates them into a single cause of action when both should be distinct.99 This is not a model that should be followed. In the Court of Appeal, Lord Philips was receptive to the idea that it was not possible to imply a relationship of confidence based 93 Campbell v MGN Ltd. [2002] EWHC 499. v MGN Ltd. [2002] EWCA 1373. 95 Campbell v MGN Ltd. [2004] 2 AC 457. 96 Campbell (n 94) [42]. 97 ibid. 98 See particularly the conclusion and footnote 32 of Hilary Delany ‘Breach of Confidence of Breach of Privacy: The Way Forward’ (2005) 27(1) DULJ 151; See also Oxford English Dictionary ‘definition of confidence’ <https://en.oxforddictionaries. com/definition/confidence> Accessed on December 30th 2016. 99 Joanna Morris, ‘Towards a Modern Privacy Law in Ireland? Recent Developments in Privacy Law’ (2006) 24(24) ILT 39. 94.Campbell on photographs taken on the street, in the way breach of confidence (b) was applied in the Douglas case, when a relationship had been established.100 This, at least, acknowledges that a different action would be required in order to vindicate Ms. Campbell’s rights. The appeal eventually swung on an interpretation of Gleeson CJ’s test in Lenah. When determining what is ‘private’ and what is not, Gleeson CJ suggested that the revelation should be ‘highly offensive to a reasonable person of ordinary sensibilities’.101 Whereas Morland J applied this test to the publication of the information itself at first instance, Lord Philips held that this test was not met.102 We do not get clarity in this judgment as to whether Lord Philips’s position was that the test applies to determining whether information is private, or should be used to determine whether the publication of information already confirmed to be private was unreasonable.103 In the House of Lords, Lord Nicholls is clear that this action is now a ‘tort’, and that the law has shaken off the requirement for ‘actual confidence’.104 Lord Hofmann agreed,105 in contrast to his position in Wainwright v Home Office, where he held that Douglas was merely an authority for removing the requirement of a relationship of confidence.106 Despite dissenting from the majority, their lordships showed no division as to the nature of the tort of confidence; breach of confidence (b). Lord Hope clarified Gleeson CJ’s test, and held that it should be applied when there is difficulty in determining whether the information itself is ‘private’.107 He went on to hold that because the information in Campbell was obviously private, a duty of confidence was automatically engaged. Most of Lord Hope’s analysis is based on academic commentary and US case law, rather than an adapted form of breach of confidence. It was not wise of the English courts to attempt to follow the confused decision in Lenah, and thus abandon what was a sound legal protection in order to introduce another, rather than simply introducing another. The need to raise issues that were 100 Campbell (n 94) [33]. Leah Game Meats (n 66) [42]. 102 Campbell (n 94) [55]. 103 ibid [49]. 104 Campbell (n 95) [14]-[15]. 105 ibid [46]-[48]. 106 [2004] 2 AC 406, 422. 107 ibid [94]. 101 associated with both or either of breach of confidence (a) and breach of confidence (b) in what is quite clearly a tortious case, creates confusion. Applying a reasonableness test to engage a ‘duty of confidence’ fits more with the specific determination Gleeson CJ needed to make about animal welfare-based publication. The use of breach of confidence is partially to blame for the misapplication of tests in cases such as these. Academic commentary from the time called for ECHR obligations to be met by recognising a general tort of privacy, acknowledging the issues this approach could raise.108 Before returning to the Irish position on breach of confidence (b), it is necessary to mention Mosley v Mirror Group Newspapers.109 The claimant sued the newspaper in question for breach of confidence, arising from publication of articles alleging that he took part in a Nazi-themed sadomasochistic sexual orgy. Not insignificantly, the claimant is the son of Sir Oswald Mosley, the former leader of the British Union of Fascists. Eady J restated the fact that ‘old-fashioned’ breach of confidence (a) was well established, and that breach of confidence (b) was based on a ‘reasonable expectation’, arising from the Human Rights Act 1998.110 The trial judge held that a proportional ‘balancing act’ must take place, in order to assess whether there is a public interest in publication.111 He then engaged in a lengthy enquiry of fact in an attempt to determine if there was a genuine Nazi theme to the orgy, and held that there was not.112 He also engaged in a lengthy analysis of various claims by the defendant that there was a public interest in the publication, and eventually rejects them.113 Mosley, which can be criticised for the same reasons as the above cases, and its predecessors, had an unfortunate influence in the recent Irish decision of Slattery v Friends First.114 When addressing Slattery, it is necessary to deal with both the decision of the High Court115 and the decision of the Court of Appeal,116 as the appeal swung on a nuanced aspect of Irish law on 108 Hector MacQueen, ‘Protecting Privacy’ (2004) Edin LR 249, 251. Mosley v Mirror Group Newspapers [2008] EMLR 20. 110 ibid [7]. 111 ibid [14]. 112 ibid [44]-[72]. 113 ibid [110]-[171]. 114 [2013] IEHC 136 (HC); [2015] IECA 149 (CA). 115 [2013] IEHC 136. 116 [2015] IECA 149. 109 banking-related breach of confidence (commercial obligations under breach of confidence (a)). The action pertained to a disclosure made by the defendant to a client in relation to financial dealings between the plaintiff and the defendant, the client being an investor in the defendant company (the investment was crucial to the client’s success). The initial authorities cited by McGovern J in the High Court pertain to a duty of confidence specific to a banker-client relationship.117 He goes on to refer to the ‘tort of breach of confidence’ from National Irish Bank critiqued above,118 and soon afterwards refers to cases based on constitutional balancing acts concerning privacy.119 McGovern J delved into the law surrounding the application of a right to privacy in business dealings, despite the fact the claim was grounded in breach of confidence.120 The trial judge’s use of these authorities is extremely ill-advised, since one of the strengths of Irish law’s approach to breach of confidence is its reluctance to conflate breach of confidence (a) and privacy actions. In a short series of paragraphs, the trial judge manages to hold that 1. a duty of confidence can be framed in equity,121 2. a tort of misuse of private information is recognised in England (while citing Campbell, a case that is not an authority for that proposition), 122 3. in England breach of confidence (b) exists through the prism of the ECHR (using Mosely as his authority of choice).123 It is unclear which of these, if any, McGovern J was favourably disposed to. The plaintiffs were successful, and we were left none the wiser. The summary of the law on privacy and breach of confidence seems to amount to little more than an acknowledgement that legal protections of privacy and confidence are a good thing. The High Court decision in Slattery is a perfect example of what can arise if authorities relating to the relationship between confidence and privacy are not treated with caution. On appeal, the submissions by both sides were confined to issues of breach of confidence in relation to the relationship between banker and 117 Slattery (n 114) [100]; see also Tournier v National Provincial & Union Bank of England [1924] 1 KB 461. 118 ibid [102]. 119 ibid [104]. 120 ibid [105]-[108]. 121 ibid [107]. 122 ibid [109]. 123 ibid [110]. client.124 Moreover, Ryan P overturned the decision of McGovern J purely on this basis, and did not engage with the conflict between constitutional privacy, privacy torts, tortious breach of confidence (b), and equitable breach of confidence (a).125 Robbie Slattery BL argued that prior to Slattery Irish law had turned its back on the extended form of breach of confidence used in England to protect privacy interests (breach of confidence (b).126 This is now not entirely true. The aspects of the Slattery judgment in the High Court that were not dealt with on appeal leave a shadow over Irish law in this area. It is unfortunate that the appeal was not taken as an opportunity to clarify the Irish situation. It could be argued that McGovern J was not asserting that some of these doctrines were persuasive in Ireland. It is difficult to see, however, why he would refer to them at all if he did not deem this to be the case. We can take some comfort from the fact that the banker-client relationship focused on by Ryan P fits comfortably within breach of confidence (a). Providing authority for this flawed strand of jurisprudence in this jurisdiction makes for unclear causes of action and potentially inconsistent remedies; the Irish courts should be further discouraged by the very recent move away from breach of confidence (b) in the UK. In Google v Vidal-Hall,127 the Court of Appeal of England and Wales finally held that equitable breach of confidence (or breach of confidence (a)) was an entirely separate cause of action from claims of ‘misuse of private information’ (or, breach of confidence (b)); the latter, it was decided, is part of tort law. 128 This marks the culmination of a line of common law authorities engaging in legal gymnastics, with varying degrees of success. It affirmed the decision of Tugendhat J (who as a barrister had argued so strongly in Douglas in favour of a separate tortious action of breach of privacy), recognising the tort. The case concerned an action against Google for retaining personal search data for advertising purposes. Lord Dyson MR and Sharp LJ held in a joint judgment that privacy 124 Slattery (n 114) [79], [80]. ibid [93]. 126 Robbie Slattery, ‘The Law on Privacy’ (2009) 14(4) Bar Review 74. 127 [2016] QB 1003. 128 Carter-Ruck, ‘Vidal-Hall v Google goes to Supreme Court’ Update (1 July 2016), <http://www.carter-ruck.com/blog/read/vidal-hall-v-google-goes-to-thesupreme-court> Accessed on 28 December 2016. 125 must be a separate cause of action, as it was a separate interest.129 The trial judges were keen to point out that they were inspired by some previous cases, such as the speech of Lord Nicholls in Campbell,130 which is presumably the reason for the use of the phrase ‘misuse of private information’. The trial judges went on to hold that they were not recognising a new cause of action, but were affirming a tortious action that already existed in practice.131 This completely sidesteps previous authorities, which held in no uncertain terms that there is no tort of invasion of privacy. The judgment gives no indication of what legal test will be used, which was one of the main causes of confusion during the ‘halfway house’ stage between breach of confidence (a) and this new tort. No reference is made to other jurisdictions recognising similar causes of actions, and no attempt is made to distinguish the publication of information and the acquiring of information. Bennett is correct to argue that the UK’s development here, mostly based on the protection of ‘public figures’, has been slow.132 In contrast to the approach of the UK Supreme Court, the Supreme Court of Western Australia continues to insist that privacy actions should be grounded in breach of confidence. The case of Wilson v Ferguson133 concerned the online publication of intimate photographs of the defendant by the plaintiff (her former lover). Mitchell J held that the relationship between the parties was sufficient in itself to constitute a breach of confidence.134 This method provides a remedy for litigants, but the confusion that can ensue if breach of confidence (b) is used to protect privacy interests is still a concern. Moreover, it is unclear whether breach of privacy (b) will continue to be a common law action in the UK, or whether the equitable action will once again begin to look more like breach of confidence (a). Mitchell J only refers to ‘privacy’ on two occasions, when pointing out that the Australian High Court have been open to it as a tort in Lenah.135 It appears that breach of confidence is unlikely to disappear from these cases; particularly if 129 Vidal-Hall (n 127) 1021. ibid 1022. 131 ibid 1031. 132 Thomas Bennet, ‘Emerging Privacy Torts in Canada and New Zealand: an English perspective’ (2014) EIPR 298, 304-305. 133 Wilson v Ferguson [2015] WASC 15. 134 ibid [56]. 135 ibid [54], [76]. 130 the courts make decisions like the one in Wilson and provide equitable damages for emotional distress and anxiety arising from the publication of embarrassing material. The interest in such circumstances, as will be seen more clearly later when directly discussing the tort, is the invasion of the privacy of the victim by publishing pictures. The interest is not the imparting of information in confidence with a legal protection, with a view to attaching significance to the relationship. Pauline Walley SC argues that, normatively, Wilson is a step forward for victims of revenge porn,136 and that a statutory solution in Ireland would be preferable, to avoid complex and uncertain litigation for victims.137 This is all arguably true, but further clarity at common law could also provide for a less confusing atmosphere for litigants. In any case, it seems to be the intention of the Irish government to treat revenge porn as a criminal matter.138 This approach is of little comfort to those seeking private, financial redress, and so the issue in that respect still very much stands. The UK has finally given clarity on the distinction between tortious actions for breach of privacy and the concept of breach of confidence. We have not yet, unfortunately, seen such clarity from the Australian High Court or from Western Australia. As far as Ireland is concerned, we are at first glance not excessively burdened by misuse of ‘breach of confidentiality’. The courts here do, however, struggle to distinguish their approaches to various forms of remedies, often as a result of the ‘catch-all’ constitutional dimension. It is a very useful exercise to examine the fact that the origins of tortious actions for breach of privacy in many jurisdictions stem from breach of confidence, as we see the courts in Ireland drawing on those lines of authorities. Ireland should not blindly follow the errors of other jurisdictions in developing these areas of the law; nor should we allow the courts to become complacent and not elucidate clear standards. Otherwise confusion surrounding the relationship between ‘pure’ constitutional breaches of privacy, the constitutional tort of privacy, the common 136 Pauline Walley, ‘“In Memoriam Amore”: Revenge, Sex and Cyberspace’ (2015) 20(2) Bar Review 33, 35-36. 137 ibid 37. 138 Sarah Bardon, ‘Stalking and revenge porn to become criminal offences’ The Irish Times (Dublin 31 December 2016). law tort of privacy, and now, (mostly thanks to the High Court judgment in Slattery) breach of confidence (b) is left behind. III. Publication The final interest that arises in Ireland in the context of privacy is what will be termed ‘publication’; the sharing of information with others in breach of an individual’s privacy rights. It is submitted that the Irish constitutional test for cases such as these provides a weaker protection than the torts that exist in other jurisdictions; particularly in light of the broad range of countervailing circumstances that the courts will accept, due to various public interest considerations. The case of Herrity v Associated Newspapers concerned publication of information about the plaintiff’s extramarital relationship with a Roman Catholic priest.139 Submissions were accepted based on the non-existence of a common law tort of invasion of privacy,140 and so recent developments could have had implications for any trial on similar facts happening in a contemporary context. It was made clear by Dunne J that constitutional privacy actions were actionable horizontally as well as vertically, as are all Irish constitutional rights.141 She eventually held that at Irish law, there was a right to privacy, it was not unqualified, it derives from the information in question (which must be private in nature), and there are circumstances where competing interests mean that there is a public interest in publication. She referred to O’Hanlon J’s reluctance in MM v Drury142 to interfere with what he saw as a legislative role, but held that as there was a relevant legislative provision, this did not apply in the case she was deciding.143 She also held that truth was not a sufficient reason for there to be a competing interest,144 and that there was no public interest in revealing the affairs of a priest because the plaintiff was not the priest, but the woman who had an 139 [2009] 1 IR 316. ibid [31]. 141 ibid [54]; See also Meskell v Coras Iompar Éireann [1973] IR 121 and Conway v Irish National Teachers Organisation [1991] 2 IR 305. 142 [1994] 2 IR 8. 143 ibid [61]. 144 ibid [64]. 140 affair with him.145 Although it was not dealt with in the substance of the case, when awarding damages Dunne J once again referred to the ‘deliberate and conscious’ requirement. 146 Irish law on privacy is based fundamentally on a constitutional balancing act, but many of the competing rights can be easily seen as analogous to a ‘public interest’ defence in tort. Being inherently constitutional in nature, this also makes it easier to fit our privacy regime into the ECHR framework. LK (a minor) v Independent Star Limited (and others) 147 restated the test in Herrity, and seems to place yet more emphasis on the ‘deliberate and conscious’ requirement. The facts concerned publication of a woman’s identity in connection with a rape that she was a victim of. Hedigan J affirmed the fact that prohibition of an activity by the legislature will have very strong weight in a privacy claim.148 He held that the four necessary elements in a privacy action were that the information ‘must be private’, that ‘the violation must be deliberate’, that ‘the violation must be conscious’, and that ‘the violation must [sic] be justified’ (presumably this should read ‘must not’).149 The trial judge found for the defendant on the grounds that the defendant did not know that publicising certain information would make the plaintiff identifiable.150 Three points arise out of this judgment. The trial judge made a point of acknowledging that ‘deliberate’ and ‘conscious’ were two separate tests to be met, although he held that they were not met in this case for the same reason. It is very difficult to discern the difference between a ‘deliberate’ and ‘conscious’ violation is. It may be that one requires the act to be deliberate, and the other requires a conscious awareness on the part of the violating party that they are breaching somebody’s constitutional right. This seems to be a very high bar to meet. The more likely alternative is that these are so similar as to be effectively the same requirement, and that it was an inaccuracy to label them as separate hurdles for claimants to jump through. The second point is that this seems to introduce quite an explicit mental element to privacy breaches under the Constitution in Ireland. 145 ibid [66]. ibid [79]. 147 [2010] IEHC 500 (3 November 2010). 148 ibid [62]. 149 ibid [93]. 150 ibid. 146 Torts in other jurisdictions merely apply a ‘reasonableness’ standard, not delving into the mental state of the breaching party at all. This suggests that constitutional actions for breach of privacy here are more difficult to make out. Finally, the first requirement in the LK test is that the ‘information’ must be private. This suggests that this test pertains specifically to the publication aspect of this right (as opposed to other privacy interests that might be raised in cases like Kennedy). Although our constitutional framework probably makes adhering to Prosser’s torts unnecessary, they do helpfully elucidate the different interests and considerations that can arise in these claims. As an example of a more objective standard, the position in New Zealand (at least insofar as the publication tort is concerned) is quite settled, and it is easily the jurisdiction most open to the tort (with the exception of the USA). Since it began to move towards recognising the tort of invasion of privacy in Tucker v News Media Ownership,151 it has, as a jurisdiction, tended to follow the Prosser model.152 In the Court of Appeal, Jeffries J held in Tucker that the next logical step from liability for emotional distress is a general tort of privacy, 153 in contrast once again to Lord Hoffmann’s position in Wainwright. In the case of Hosking v Runting, an action was taken by a celebrity couple to stop the publication of unauthorised photographs taken of their young twins. At first instance in the High Court, Randerson J opined that he saw no reason why New Zealand could develop the English breach of confidence model, i.e. breach of confidence (b).154 On appeal to the Supreme Court, Gault P (Blanchard J concurring) held that changing the meaning of ‘confidence’ would confuse the law, and fail to protect the distinct interests of both confidence and privacy.155 This lends yet more support to the arguments that the actions should not be conflated. As developments continued, Prosser’s test for ‘public disclosure of private facts’ directly applied in Wingnut Films, when famed director Peter Jackson was sued for involving a family gravestone in a ‘splatter film’ (the headstone was shown during a 151 [1986] 2 NZLR 716. ibid 31, 32. 153 Tucker v News Media Ownership Ltd [1986] NZCA 92 (23 October 1986) 30. 154 Hosking v Runting [2003] NZLR 285 [158]. 155 Hosking v Runting [2004] NZCA 34 [49]. 152 very violent incident involving a lot of blood).156 A public good requirement was added in the later case of P v D157 (later clarified in the Hosking case as a public interest defence).158 This amounts to a defence that can dispense with a finding of unreasonableness if there is a public interest in the publication. The tort now requires public disclosure of private facts, a reasonable expectation of privacy, and publicity that would be highly offensive to a reasonable person. 159 Developments in New Zealand on the publication of private material have remained true to this tort, and are outlined further by Delany and Carolan. 160 It should be acknowledged here that New Zealand is a useful example of a jurisdiction that has adopted aspects of Prosser’s formulation with little to no alterations. Given its size, it is a much more useful point of reference than the United States for Irish purposes, as US decisions vary hugely from state to state, and the doctrine is so established there that it is a weaker aid in a discussion of how to incorporate newer privacy protections into the law. This tort is clear, is based on established objective reasonableness tests, and provides a public interest defence that could easily fit with existing Irish defences of that nature. The objective nature of the obligation renders it a more comprehensive protection than one based on a ‘deliberate and conscious’ breach. The main authority on publication in Australia, tentative as it may be, is the Victoria County Court decision in Jane Doe v Australian Broadcasting Corporation, 161 dealing with the identification of a rape victim by a news broadcaster. Although much of the case concerned the situation with respect to breach of confidence at the time, mostly acknowledging the English position dealt with above,162 Hempel J held that a tort of privacy did exist in Victoria, based on the ‘invitation’ of the Lenah case, and that she would not apply the English merging of equity and tort.163 156 Bradley v Wingnut Films [1993] 1 NZLR 415, 423. P v D [2000] 2 NZLR 592, [34]. 158 Hosking (n 155) [129]. 159 ibid 32. 160 Hilary Delany and Eoin Carolan, The Right to Privacy (Thomson Round Hall 2008) 116-123. 161 Jane Doe v Australian Broadcasting Corporation [2007] VCC 281. 162 ibid [106]. 163 ibid [157]. 157 Giller v Procopets, in the Court of Appeal branch of Victoria’s Supreme Court, concerned the publication of videos by the defendant of the plaintiff and defendant engaging in sexual activity.164 Ashley J held that no tort of invasion of privacy existed in Australia, and that it might be better to pursue privacy interests using existing causes of action.165 Neave J dealt with the situation in Australia thus far, as well as in New Zealand, and did not express an opinion on the matter, instead holding that it was not a matter for that case.166 Other Australian authorities from that time have also taken a tentative approach to recognising a tort of privacy for similar reasons.167 More recently, the South Australian Supreme Court have held that a further development would be required in order for this tort to develop there, 168 and a local Queensland court has acknowledged that there might be an unclear cause of action in privacy.169 The Australian Law Reform Commission has argued for the introduction of a tort of invasion of privacy based on both intrusion on seclusion and misuse of private information.170 The Australian experience provides a good lesson for this jurisdiction on following vague and poorly constructed law from another jurisdiction with its own constitutional quirks (as Australia did with the UK). Using Lenah and its successors to make arguments in this area is unwise, considering the dicta on privacy were not binding, and in the end the High Court endorsed breach of confidence (b). The original Australian authority has not only provided unhelpful precedent for courts in the UK, (and, through the UK, Ireland in Slattery) but can be clearly shown to have led to a confused and inconclusive strand of jurisprudence in its jurisdiction of origin as well. From the perspective of publication, it 164 [2008] VSCA 236. ibid [167]. 166 ibid [447]-[452]. 167 Milne v Haynes [2005] NSWSC 1107; Moore-McQuillan v Work Cover Corporation [2007] SASC 13; Kabala v Commonwealth of Australia [2004] FCA 763 (on appeal from a Queensland court, which recognised a tort of invasion of privacy); Delany and Carolan (n 160) 110-116. 168 Sands v State of South Australia [2013] SASC 44 [614]. 169 Doe v Yahoo! Pty Ltd [2013] QDC 181 [310]-[311]. 170 Australian Law Reform Commission Report 123 (Serious Invasions of Privacy in the Digital Era), ch 4-12, 3 September 2014, <http://www.alrc.gov.au/publica tions/serious-invasions-privacy-digital-era-alrc-report123/recommendations> accessed on 5 January 2017. 165 is clear that reliance on the breach of confidence model has slowed any development in Australia, due to the reluctance in Lenah to openly recognise tortious protections of privacy. In one of many classic ‘revenge porn’ cases in this area, the Superior Court of Ontario was asked to consider privacy in the context of publication in Jane Doe (which is entirely different to the Jane Doe case from Victoria).171 Confusingly, the trial judge also refers to a tort of ‘breach of confidence’.172 In this case, however, Stinson J also introduced Prosser’s tort of publication to the law of Ontario.173 Moreover, the trial judge awarded not only general damages against the plaintiff, but also punitive and aggravated damages, amounting to $100,000.174 Use of the term ‘breach of confidence’ is unfortunate, however it is difficult to associate this with that remedy because of Stinson J’s explicit use of one of Prosser’s torts of privacy, in a jurisdiction where another is already recognised. For the most part, it is now clear that Ontario is open to litigation based on breach of privacy rights under Prosser’s headings. Adherence to them have benefitted Ontario, by producing a reasonably consistent and sound approach to tortious suits for breach of privacy, that has clear standards and remedies. An Irish case that addresses publication/disclosure directly through the prism of tort law is Gray v Minister for Justice, Equality and Law Reform.175 The most striking aspect of the judgment is that it is very difficult to discern whether it concerns a tortious breach of privacy, a constitutional tort of privacy, some combination of the above, or something else entirely. The facts relate to the disclosure of information by Gardaí to journalists; namely that the applicants allowed their relative, a convicted sex offender, to live with them. On disclosure of confidential information, Quirke J held that ‘disclosure emanating from careless conduct on the part of one or more gardaí would amount to negligence…’.176 This issue entirely turned on case-law relating to tortious duties of public officials not to negligently expose members of the public to foreseeable 171 Jane Doe 464533 v ND [2016] ONSC 541. ibid [22]-[25]. 173 ibid [41]. 174 ibid [69]. 175 [2007] 2 IR 654. 176 ibid [55]. 172 damage.177 Quirke J appears to be suggesting that a tortious duty exists for public officials in relation to the distribution of confidential information. Applying case law based on pure negligence to circumstances such as this is a strained exercise, when privacy cases from other jurisdictions of a tortious nature were easily available. This is to say nothing of constitutional protections of privacy. It is difficult to see why Quirke J grounded part of his ruling under a separate heading of ‘negligence’ pertaining specifically to the disclosure of private information. When, however, the constitutional issue is addressed, Quirke J returns to the consideration of negligence, holding that it had been ‘established…on the balance of probabilities that…members of An Garda Síochána negligently disclosed confidential and sensitive information…’.178 He held that the State was liable constitutionally on that basis.179 It is well established, as will be considered later, that horizontal constitutional torts exist in Ireland and are perfectly acceptable legal remedies for breach of privacy.180 All the same, it is unhelpful to mix approaches to a remedy focusing on negligence by public officials, negligent disclosure of private information, and a constitutional tort., particularly as Irish law dictates that constitutional torts must only be considered if tort law is not sufficient to vindicate the right in question.181 Delany and Carolan add that this leaves the question of whether such liability can be imposed on a non-state actor open to question.182 They are correct to make this observation. It is unfortunate that Gray was not used to clarify the tortious position in Ireland in relation to disclosure of private facts. The general recognition of a ‘deliberate and conscious’ test means that the rights of others are dependent upon the intentions and desires, however ill-informed and negligently arrived at, of the breaching party. Such a test imposes no duty of substance, and cannot possibly be as strong a protection as those in other jurisdictions that are grounded on reasonableness. O’Hanlon J in the Drury case, which concerned publications about a woman’s 177 ibid [73]; see also Anns v Merton London Borough [1978] AC 728; Ward v McMaster [1988] IR 337; Hanahoe v Hussey [1998] 3 IR 69. 178 ibid [87]. 179 ibid [89]. 180 See n 143. 181 Meskell (n 141); Hanrahan v Merck Sharpe and Dohme [1988] ILRM 629. 182 Delany and Carolan (n 160) 213. extra-marital affair, expressed reluctance to allow the courts to protect privacy at the expense of other rights unless explicitly authorised by the legislature.183 Although it is arguable that the Herrity case has broadened this standard, such extreme difference seems unnecessary when it is not practiced in relation to many other constitutional rights, and in the context of generally recognised common law torts. The courts seem even unable to agree on the origins of a right to privacy, with one High Court judge referring to the ‘Christian and democratic’ origins of the right as ‘antiquated’, and inappropriate for a modern ‘laic republic’.184 There are multiple defences based on countervailing considerations, such as state security,185 the prevention of crime,186 the right to have justice administered in public,187 a right to know who sex offenders are,188 and having ‘actively sought publicity’ in relation to other public aspects of the private information.189 On the State security ground, it should be noted that this only extends to Ireland and not to foreign states, as held by Carroll J in Brandon Book Publishers.190 All of these countervailing considerations are not balanced by a consistent or robust privacy protection, and it is unclear when tort law, constitutional torts, ‘pure’ constitutional damages per Sullivan, or tests such as those in Herrity, are the relevant cause of action. The unenumerated right to privacy provides an opportunity to state that the right exists, and to state that a balancing act is necessary, without providing a regular and consistent position on how exactly this right should be applied. We see reluctance on the part of the Court of Appeal in Slattery to address which of the many domestic and common law causes of action are relevant in the Irish context. Having said that, it is clear from the recent LK v Minister for Justice decision that proportionality tests must be applied when the right comes into 183 Drury (n 142) 17. Max Barret J in Irish Cement Limited v The Competition and Consumer Protection Commission [2016] IEHC 162 (5 April 2016) [58]. 185 AP (Islamic Rep of Iran) v Minister for Justice [2016] IEHC 408 (16 July 2016). 186 EMI Records (Ireland) Limited v UPC [2012] IEHC 264 (27 June 2012). 187 Roe v Blood Transfusion Services Board [1996] 3 IR 67. 188 Murray v Newsgroup Newspapers Ltd [2011] 2 IR 156. 189 Hickey v Sunday Newspapers [2010] IEHC 249. 190 Brandon Book Publishers (n 54) 600. 184 force (and the Court of Appeal remitted a case to the District Court for that reason).191 Conclusion While it could be argued that we are better placed than other jurisdictions to protect privacy by virtue of the Constitution, it seems that the opposite is in fact dangerously close to the truth. Providing a legal mechanism that sounds like a strong, general and consistent guarantee is not the same as actually providing a strong, general and consistent guarantee. There is probably no need to adopt Prosser’s formula in Ireland. What we can learn from it, however, is that our own constitutional protections in the context of publication are much weaker than many common law equivalents (although thankfully, the opposite seems to be the case for intrusion). We should look to our neighbours, and to modern technological developments. Our seemingly strong constitutional privacy rights should not be a smokescreen, or an easy get-out clause from delving deeply into issues that every other major common law jurisdiction (The USA, Canada, The UK, Australia, New Zealand and South Africa), with the exception of Ireland and Hong Kong,192 has addressed directly. These traditional ‘private law’ protections are sometimes stronger and clearer, and we would do well do heed them. The courts should be conscious of the underlying weaknesses surrounding privacy actions grounded in the concept of confidence. Some comfort, however, can be taken from developments in the right of the person that protect some interests that are also connected to privacy. 191 LK v Minister for Justice and Equality (No 2) [2016] IECA 162 (30 November 2016). Report of the Hong Kong Law Reform Commission on Civil Liability for Invasion of Privacy, 9 December 2004 <http://www.hkreform.gov.hk/en/publications/r privacy.htm> accessed on 2 January 2017. 192
© Copyright 2026 Paperzz