Ch 12 mass media law

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/111

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

112 Terms

1
New cards

Which statement best captures the original idea behind the legal "right to privacy"?

It limits government power to regulate personal information.

2
New cards

Privacy is not explicitly mentioned in the U.S. constitution, but...

it underpins many freedoms.

3
New cards

Warren & Brandeis (1890)

ramed privacy as "the right to be let alone" — protecting emotional and psychological integrity

4
New cards

Early privacy theory

emerged as a reaction to new technology

5
New cards

Modern privacy debates mirror this tension

the tension between personal dignity and public curiosity

6
New cards

Why Is Privacy a Difficult Concept?

No single, clear definition- privacy varies by culture, context, and law

7
New cards

The Founders attitudes towards privacy

prioritized property and liberty, not solitude

8
New cards

what do courts struggle to balance?

struggle to balance press freedom, public interest, and individual seclusion

9
New cards

evolution of privacy

What society considers "private" evolves continually

letters-telephones-smartphones-data streams

10
New cards

"The Right to Privacy" (1890)

Law review article

written by Samuel Warren and Louis Brandeis, published

in Harvard Law Review, that is widely regarded

as one of the most influential essays in American law.

First publication in U.S. to advocate right to privacy,

which in authors' words mean "right to be left alone."

11
New cards

Samuel Warren and Louis Brandeis

proposed privacy as a moral and legal right

"the right to be let alone"

12
New cards

Key Idea behind "The Right to Privacy"

Privacy should protect the individual's peace of mind — not just property or reputation — from intrusive publicity

13
New cards

Privacy by the mid-20th century

privacy was recognized as a distinct tort (civil wrong)

14
New cards

Restatement (Second) of Torts §652 (ALI,1960s)

formally recognized four privacy torts:

intrusion, disclosure of private facts, false light, and appropriation

15
New cards

four privacy torts

These torts mirror the ways journalists, advertisers, and citizens can invade personal space

16
New cards

A central tension

individual seclusion vs.the public's right to know

17
New cards

Ethical journalism requires

distinguishing what the public is interested in from what is in the public interest

18
New cards

Privacy vs. The Right to Know example

journalists protected FDR's image by not photographing him in his wheelchair — a courtesy unlikely today

19
New cards

Common Law type of protection

Civil remedies for invasion of privacy

eg. intrusion, false light, disclosure, appropriation

20
New cards

Statutory Law type of protection

Federal and state privacy acts

eg. FERPA, HIPAA, COPPA, FCRA

21
New cards

Constitutional Law type of protection

Implied "zones of privacy" from the Bill of Rights

eg. griswold, roe, dobbs

22
New cards

Administrative Law type of protection

Agency rules enforcing privacy

eg. FTC and FCC data-handling regulations

23
New cards

Olmstead v. United States (1928)

Supreme Court allowed the use of wiretaps on telephone lines without a court order.

Justice Brandeis dissented: the constitution must protect the "right to be let alone" against emerging technologies

dissent laid the foundation for modern privacy doctrine

Privacy tied to physical space

24
New cards

Katz v. United States (1967)

Katz used a public phone booth to place illegal bets, which the FBI wiretapped without a warrant

fourth amendment protects people, not places

"reasonable expectation of privacy" test established

25
New cards

Carpenter v. United States (2018)

Government needs a warrant to collect location data from cellular service providers

Katz principle extended into the digital era

Extended privacy protection to digital data and metadata (cell tracking, GPS)

26
New cards

Griswold v. Connecticut (1965)

Court struck down a state law banning contraceptives for married couples

linked privacy to martial intimacy and individual choice

foundation for following reproductive-right cases

27
New cards

Roe v. Wade (1973)

constitutional right to abortion based on privacy and liberty interests in the Due Process Clause

28
New cards

Dobbs v. Jackson Women's Health (2022)

Overturned Roe, holding that privacy does not extend to abortion

29
New cards

roe v. wade & dobbs v. jackson women's health

privacy interpretations shift with judicial philosophy and social change

30
New cards

What did Griswold v. Connecticut establish?

Recognized a constitutional "right to privacy" in marital decisions.

31
New cards

Why does Griswold v. Connecticut matter for privacy law?

First case to find implied privacy rights in the"penumbras" (shadows) of several amendments (1st, 3rd,4th, 5th, 9th). Laid the foundation for modern privacy doctrine

32
New cards

Why does Roe v. Wade matter for privacy law?

Framed reproductive choice aspart of personal autonomy and liberty under the Due Process Clause of the 14th Amendment. Cemented privacy as a constitutional value

33
New cards

What did Roe v. Wade establish?

Extended privacy rights to include a woman's decision to terminate a pregnancy

34
New cards

What did Dobbs v. Jackson Women's Health establish?

Overturned Roe, holding that the Constitution does not confer a right to abortion.

35
New cards

Why does Dobbs v. Jackson Women's Health matter for privacy law?

Marked a major retraction of privacy rights, returning authority over reproductive privacy to the states. Shows that constitutional privacy is not absolute or permanent.

36
New cards

How is Common Law created?

Developed through judicial decisions and precedent — judges interpret and apply principles case by case

37
New cards

What does common law do?

Creates rules protecting individuals from other private parties (individuals, media, organizations) that can be cited in later cases

38
New cards

Examples of common law in privacy law

The four privacy torts (intrusion, false light, disclosure, appropriation)— originated from state court decisions following Warren & Brandeis (1890) and the Restatement of Torts.

39
New cards

How constitutional Law is created

Comes from judicial interpretation of theU.S. Constitution or state constitutions

40
New cards

What constitutional law does

Defines fundamental rights and limits government power, protecting individuals from government intrusion

41
New cards

Examples of constitutional law in privacy law

Griswold v. Connecticut (1965), Roe v. Wade (1973), and Dobbs v.Jackson (2022) — courts interpret constitutional "liberty" and "privacy."

42
New cards

When court recognizes a new rule through precedent

common law

43
New cards

When the court interprets the Constitution to protect a right

constitutional law

44
New cards

both common and constitutional law

Both come from the courts, but they operate at different levels of authority

45
New cards

FERPA

educational records - limits disclosure of student info

46
New cards

HIPAA

medical data- protects health privacy and access rights

47
New cards

FCRA

financial information- regulates credit reporting accuracy

protects from misuse of credit info

48
New cards

COPPA

children's online data- parental consent for under 13 users

49
New cards

FTC Oversight

digital commerce- polices deceptive data practices

50
New cards

modern privacy concerns

social media blurs private/public boundaries

AI, data mining, and facial recognition- threaten anonymity

51
New cards

Governments and corporations

collect massive personal data

52
New cards

Legal frameworks lag behind technology

"new technology demands new rights"

53
New cards

Privacy originated as a moral and emotional protection, but has evolved into

a legal right

54
New cards

bridges constitutional, statutory, administrative, and common law doctrines

privacy

55
New cards

The four privacy torts

1. False Light

2. Appropriation

3. Intrusion

4. Private Facts

56
New cards

Intrusion

invasion of private space or affairs

57
New cards

Disclosure

revelation of private but true facts

58
New cards

False Light

misleading or distorted portrayal

59
New cards

Appropriation

unauthorized commercial use of identity

60
New cards

What the torts form together

they form the common law foundation of privacy, focusing on personal seclusion and dignity, not reputation or government intrusion

61
New cards

Where did the four torts come from?

Emerged from state common law, not federal statute.

62
New cards

Focus of the Privacy Torts

protecting emotional and dignitary harm, rather than economic loss or reputation

63
New cards

What does the intrusion tort protect?

Freedom from physical or technological invasion

64
New cards

What does the public disclosure tort protect?

Protection against widespread revelation of private facts

65
New cards

What does the false light tort protect?

Protection against misleading portrayal

66
New cards

What does the appropriation tort protect?

Control over use of name, image, or likeness

67
New cards

Key limitation/defense/standard of intrusion tort

Consent; newsworthiness

68
New cards

Key limitation/defense/standard of public disclosure tort

Public record; consent

69
New cards

Key limitation/defense/standard of false light tort

Truth; actual malice (for public figures); negligence (for private figures)

70
New cards

Key limitation/defense/standard of appropriation tort

Consent; newsworthiness

71
New cards

Invasion

occurs when one intentionally intrudes, physically or otherwise, upon the solitude or private affairs of another

72
New cards

intrusion must be deemed to be

highly offensive to a reasonable person.

73
New cards

intrusion focuses on how information is gathered rather than

how the information is published

74
New cards

Hidden cameras, drones, and smart devices

have blurred the lines between physical and digital boundaries

75
New cards

in cases of intrusion with modern technology, courts examine:

Location: Did the person have a reasonable expectation of privacy?

Method: Was access achieved through deception, trespass, or technology?

76
New cards

Modern Intrusion trend

balancing public interest vs. personal seclusion

77
New cards

Consent as a Defense

Consent is a complete defense to intrusion or appropriation claims

78
New cards

How can consent be obtained?

through deception or duress may be invalid

79
New cards

expiration of consent

consent often expires with purpose

example: one-time or one-context use

80
New cards

Practical Rule (consent)

Always obtain informed consent when entering private spaces or using personal likenesses commercially.

81
New cards

Public Disclosure of Private Facts

Publishing true but private information that would be highly offensive to a reasonable person and not of legitimate public concern

82
New cards

Which tort is the most ethically challenging for journalists?

Public Disclosure

83
New cards

Cox Broadcasting v. Cohn (1975)

No liability for publishing info from public court records

84
New cards

Virgil v. Time, Inc (1976)

Magazines may publish unusual but newsworthy behavior if it relates to a public figure

85
New cards

Catsouras v. California Highway Patrol (2010)

Graphic accident photos shared by officers violated privacy

86
New cards

Modern Issues w/ Public Disclosure

Social media sharing and viral distribution multiply the harm of disclosure

87
New cards

When can public record defense be blurred?

when online access makes private info globally visible

88
New cards

emerging disclosure claims

Revenge porn, leaked medical info, and deepfake content

89
New cards

Key Concept of Public Disclosure

Truth is not a defense — the harm lies in the exposure itself.

90
New cards

What does false light do?

Portrays someone in a misleading or distorted way that would be highly offensive

91
New cards

False light vs. Defamation

Similar to defamation, but the statement may be technically true while creating a false impression

92
New cards

Time, Inc. v. Hill (1967) - false light case

Public figures must prove actual malice in false light cases

93
New cards

Cantrell v. Forest City Publishing (1974) - false light case

Fabricated interview violated false light standards

94
New cards

false light and defamation as a combined tort

Many states overlap false light with defamation; some do not recognize it as a separate tort

95
New cards

focus of false light vs. defamation

false light: offensiveness or humilation

defamation: damage to reputation

96
New cards

truth of false light vs. defamation

false light: may be true but misleading

defamation: must be false

97
New cards

harm of false light vs. defamation

false light: emotional distress

defamation: reputational loss

98
New cards

Appropriation (of Name or Likeness)

Using a person's name, image, voice, or identity for commercial gain without consent

99
New cards

Commercial Appropriation

Using someone's likeness in advertising or products

100
New cards

Right of Publicity

Protecting celebrities' ability to control and profit from their image