Privacy Laws Of The United States
   HOME

TheInfoList



OR:

Privacy laws of the United States deal with several different
legal Law is a set of rules that are created and are law enforcement, enforceable by social or governmental institutions to regulate behavior, with its precise definition a matter of longstanding debate. It has been variously described as a Socia ...
concepts. One is the ''invasion of privacy'', a
tort A tort is a civil wrong, other than breach of contract, that causes a claimant to suffer loss or harm, resulting in legal liability for the person who commits the tortious act. Tort law can be contrasted with criminal law, which deals with cri ...
based in common law allowing an aggrieved party to bring a lawsuit against an individual who unlawfully intrudes into their private affairs, discloses their private information, publicizes them in a false light, or appropriates their name for personal gain. The essence of the law derives from a ''
right to privacy The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 185 national constitutions mention the right to privacy. Since the globa ...
'', defined broadly as "the right to be let alone". It usually excludes personal matters or activities which may reasonably be of public interest, like those of celebrities or participants in newsworthy events. Invasion of the right to privacy can be the basis for a lawsuit for damages against the person or entity violating the right. These include the Fourth Amendment right to be free of unwarranted search or seizure, the
First Amendment First most commonly refers to: * First, the ordinal form of the number 1 First or 1st may also refer to: Acronyms * Faint Images of the Radio Sky at Twenty-Centimeters, an astronomical survey carried out by the Very Large Array * Far Infrared a ...
right to free assembly, and the Fourteenth Amendment due process right, recognized by the
Supreme Court of the United States The Supreme Court of the United States (SCOTUS) is the highest court in the federal judiciary of the United States. It has ultimate appellate jurisdiction over all Federal tribunals in the United States, U.S. federal court cases, and over Stat ...
as protecting a general right to privacy within family, marriage, motherhood, procreation, and child rearing. Attempts to improve consumer privacy protections in the U.S. in the wake of the 2017 Equifax data breach, which affected 145.5 million U.S. consumers, failed to pass in Congress.


Right to privacy


Early years

The early years in the development of privacy rights began with
English common law English law is the common law legal system of England and Wales, comprising mainly criminal law and civil law, each branch having its own courts and procedures. The judiciary is independent, and legal principles like fairness, equality bef ...
, protecting "only the physical interference of life and property". The Castle doctrine analogizes a person's home to their castle – a site that is private and should not be accessible without permission of the owner. The development of tort remedies by the common law is "one of the most significant chapters in the history of privacy law".Solove, Daniel J., Marc Rotenberg, and Paul M. Schwartz (2006)
''Privacy, Information, and Technology''
Aspen Publishers, pp. 9–11, .
Those rights expanded to include a "recognition of man's spiritual nature, of his feelings and his intellect." Eventually, the scope of those rights broadened even further to include a basic "right to be let alone," and the former definition of "property" would then comprise "every form of possession – intangible, as well as tangible." By the late 19th century, interest in privacy grew as a result of the growth of print media, especially newspapers. Between 1850 and 1890, U.S. newspaper circulation grew by 1,000 percentfrom 100 papers with 800,000 readers to 900 papers with more than 8 million readers. In addition, newspaper journalism became more sensationalized, and was termed
yellow journalism In journalism, yellow journalism and the yellow press are American newspapers that use eye-catching headlines and sensationalized exaggerations for increased sales. This term is chiefly used in American English, whereas in the United Kingdom, ...
. The growth of industrialism led to rapid advances in technology, including the handheld camera, as opposed to earlier studio cameras, which were much heavier and larger. In 1884,
Eastman Kodak The Eastman Kodak Company, referred to simply as Kodak (), is an American public company that produces various products related to its historic basis in film photography. The company is headquartered in Rochester, New York, and is incorporated i ...
company introduced their Kodak Brownie, and it became a
mass market The term "mass market" refers to a market for goods produced on a large scale for a significant number of end consumers. The mass market differs from the niche market in that the former focuses on consumers with a wide variety of backgrounds with ...
camera by 1901, cheap enough for the general public. This allowed people and journalists to take candid snapshots in public places for the first time. Privacy was dealt with at the state level. For example, '' Pavesich v. New England Life Insurance Company'' (in 1905) was one of the first specific endorsements of the right to privacy as derived from
natural law Natural law (, ) is a Philosophy, philosophical and legal theory that posits the existence of a set of inherent laws derived from nature and universal moral principles, which are discoverable through reason. In ethics, natural law theory asserts ...
in US law. Judith Wagner DeCew stated, "''Pavesich'' was the first case to recognize privacy as a right in tort law by invoking natural law, common law, and constitutional values." Samuel D. Warren and Louis D. Brandeis, partners in a new law firm, feared that this new small camera technology would be used by the "sensationalistic press." Seeing this becoming a likely challenge to individual privacy rights, they wrote the "pathbreaking" ''
Harvard Law Review The ''Harvard Law Review'' is a law review published by an independent student group at Harvard Law School. According to the ''Journal Citation Reports'', the ''Harvard Law Review''s 2015 impact factor of 4.979 placed the journal first out of ...
'' article in 1890, "The Right to Privacy".Samuel Warren and Louis D. Brandeis (1890)
"The Right To Privacy"
''Harvard Law Review'' (Vol. 4, No. 193). Retrieved 17 October 2013.
According to legal scholar
Roscoe Pound Nathan Roscoe Pound (October 27, 1870 – June 28, 1964) was an American legal scholar and educator. He served as dean of the University of Nebraska College of Law from 1903 to 1911 and was dean of Harvard Law School from 1916 to 1936. He was a ...
, the article did "nothing less than add a chapter to our law", and in 1966 legal textbook author,
Harry Kalven Harry Kalven Jr. (September 11, 1914 – October 29, 1974) was an American legal scholar known for his scholarship on tort law and United States constitutional law. He was the Harry A. Bigelow Professor of Law at the University of Chicago Law Sc ...
, hailed it as the "most influential law review article of all". In the Supreme Court case of '' Kyllo v. United States'', 533 U.S. 27 (2001), the article was cited by a majority of justices, both those concurring and those dissenting.


Brandeis and Warren article

The development of the doctrine regarding the tort of "invasion of privacy" was largely spurred by the Warren and Brandeis article, "The Right to Privacy". In it, they explain why they wrote the article in its introduction: "Political, social, and economic changes entail the recognition of new rights, and the common law, in its eternal youth, grows to meet the demands of society". More specifically, they also shift their focus on newspapers:
The press is overstepping in every direction the obvious bounds of propriety and of decency. Gossip is no longer the resource of the idle and of the vicious, but has become a trade, which is pursued with industry as well as effrontery. To satisfy a prurient taste the details of sexual relations are spread broadcast in the columns of the daily papers. ... The intensity and complexity of life, attendant upon advancing civilization, have rendered necessary some retreat from the world, and man, under the refining influence of culture, has become more sensitive to publicity, so that solitude and privacy have become more essential to the individual; but modern enterprise and invention have, through invasions upon his privacy, subjected him to mental pain and distress, far greater than could be inflicted by mere bodily injury.
They then clarify their goals: "It is our purpose to consider whether the existing law affords a principle which can properly be invoked to protect the privacy of the individual; and, if it does, what the nature and extent of such protection is". Warren and Brandeis write that privacy rights should protect both businesses and private individuals. They describe rights in
trade secrets A trade secret is a form of intellectual property (IP) comprising confidential information that is not generally known or readily ascertainable, derives economic value from its secrecy, and is protected by reasonable efforts to maintain its conf ...
and unpublished literary materials, regardless whether those rights are invaded intentionally or unintentionally, and without regard to any value they may have. For private individuals, they try to define how to protect "thoughts, sentiments, and emotions, expressed through the medium of writing or of the arts". They describe such things as personal diaries and letters needing protection, and how that should be done: "Thus, the courts, in searching for some principle upon which the publication of private letters could be enjoined, naturally came upon the ideas of a
breach of confidence The tort of breach of confidence is, in United Kingdom law and the United States law, a common-law tort that protects private information conveyed in confidence. A claim for breach of confidence typically requires the information to be of a co ...
, and of an
implied contract A quasi-contract (or implied-in-law contract or constructive contract) is a Legal fiction, fictional contract recognised by a court. The notion of a quasi-contract can be traced to Roman law and is still a concept used in some modern legal systems ...
". They also define this as a breach of trust, where a person has trusted that another will not publish their personal writings, photographs, or artwork, without their permission, including any "facts relating to his private life, which he has seen fit to keep private". And recognizing that technological advances will become more relevant, they write: "Now that modern devices afford abundant opportunities for the perpetration of such wrongs without any participation by the injured party, the protection granted by the law must be placed upon a broader foundation". There have been many laws related to privacy and data protection in recent years that have been enforced as a result of the rapid technological advancements. However, critics and scholars have argued that these guidelines are usually focused on legal factors, rather than technical details, which make it difficult for engineers and developers to ensure that new designs meet the guidelines stated in privacy laws.


Modern tort law

In the United States,"invasion of privacy" is a commonly used
cause of action A cause of action or right of action, in law, is a set of facts sufficient to justify suing to obtain money or property, or to justify the enforcement of a legal right against another party. The term also refers to the legal theory upon which a ...
in legal
pleading In law as practiced in countries that follow the English models, a pleading is a formal written statement of one party's claims or defenses in response to another party's complaint(s) in a civil action. The parties' pleadings in a case define t ...
s. Modern
tort law A tort is a civil wrong, other than breach of contract, that causes a claimant to suffer loss or harm, resulting in legal liability for the person who commits the tortious act. Tort law can be contrasted with criminal law, which deals with crime ...
, as first categorized by William Prosser, includes four categories of invasion of privacy: * Intrusion of
solitude Solitude, also known as social withdrawal, is a state of seclusion or isolation, meaning lack of socialisation. Effects can be either positive or negative, depending on the situation. Short-term solitude is often valued as a time when one may wo ...
: physical or electronic intrusion into one's private quarters * Public disclosure of private facts: the dissemination of truthful private information which a reasonable person would find objectionable * False light: the publication of facts which place a person in a false light, even though the facts themselves may not be defamatory * Appropriation: the unauthorized use of a person's name or likeness to obtain some benefits


Intrusion of solitude and seclusion

Intrusion of solitude occurs where one person intrudes upon the private affairs of another. In a famous case from 1944, author
Marjorie Kinnan Rawlings Marjorie Kinnan Rawlings (August 8, 1896 – December 14, 1953)
ac ...
was sued by Zelma Cason, who was portrayed as a character in Rawlings' acclaimed memoir, ''Cross Creek''. The
Florida Supreme Court The Supreme Court of Florida is the state supreme court, highest court in the U.S. state of Florida. It consists of seven justices—one of whom serves as Chief Justice. Six members are chosen from six districts around the state to foster geog ...
held that a cause of action for invasion of privacy was supported by the facts of the case, but in a later proceeding found that there were no actual damages. Intrusion upon seclusion occurs when a perpetrator intentionally intrudes, physically, electronically, or otherwise, upon the private space, solitude, or seclusion of a person, or the private affairs or concerns of a person, by use of the perpetrator's physical senses or by electronic device or devices to oversee or overhear the person's private affairs, or by some other form of investigation, examination, or observation intrude upon a person's private matters if the intrusion would be highly offensive to a reasonable person. Hacking into someone else's computer is a type of intrusion upon privacy, as is secretly viewing or recording private information by still or video camera. In determining whether intrusion has occurred, one of three main considerations may be involved:
expectation of privacy In United States constitutional law, reasonable expectation of privacy is a legal test which is crucial in defining the scope of the applicability of the privacy protections of the Fourth Amendment to the U.S. Constitution. It is related to, ...
; whether there was an intrusion, invitation, or exceedance of invitation; or deception, misrepresentation, or fraud to gain admission. Intrusion is "an information-gathering, not a publication, tort ... legal wrong occurs at the time of the intrusion. No publication is necessary".
Restrictions against the invasion of privacy encompasses journalists as well:
The First Amendment has never been construed to accord newsmen immunity from torts or crimes committed during the course of newsgathering. The First Amendment is not a license to trespass, to steal, or to intrude by electronic means into the precincts of another's home or office.


Public disclosure of private facts

Public disclosure of private facts arises where one person reveals information which is not of public concern, and the release of which would offend a reasonable person. "Unlike libel or slander, truth is not a defense for invasion of privacy." Disclosure of private facts includes publishing or widespread dissemination of little-known, private facts that are non-newsworthy, not part of public records, public proceedings, not of public interest, and would be offensive to a reasonable person if made public.


False light

False light is a
legal Law is a set of rules that are created and are law enforcement, enforceable by social or governmental institutions to regulate behavior, with its precise definition a matter of longstanding debate. It has been variously described as a Socia ...
term that refers to a
tort A tort is a civil wrong, other than breach of contract, that causes a claimant to suffer loss or harm, resulting in legal liability for the person who commits the tortious act. Tort law can be contrasted with criminal law, which deals with cri ...
concerning
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
that is similar to the tort of
defamation Defamation is a communication that injures a third party's reputation and causes a legally redressable injury. The precise legal definition of defamation varies from country to country. It is not necessarily restricted to making assertions ...
. For example, the privacy laws in the United States include a non-public person's right to privacy from
publicity In marketing, publicity is the public visibility or awareness for any product, service, person or organization. It may also refer to the movement of information from its source to the general public, often (but not always) via the media. The sub ...
which creates an untrue or misleading impression about them. A non-public person's right to privacy from publicity is balanced against the
First Amendment First most commonly refers to: * First, the ordinal form of the number 1 First or 1st may also refer to: Acronyms * Faint Images of the Radio Sky at Twenty-Centimeters, an astronomical survey carried out by the Very Large Array * Far Infrared a ...
right of
free speech Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The right to freedom of expression has been recognise ...
. False light
law Law is a set of rules that are created and are enforceable by social or governmental institutions to regulate behavior, with its precise definition a matter of longstanding debate. It has been variously described as a science and as the ar ...
s are "intended primarily to protect the
plaintiff A plaintiff ( Π in legal shorthand) is the party who initiates a lawsuit (also known as an ''action'') before a court. By doing so, the plaintiff seeks a legal remedy. If this search is successful, the court will issue judgment in favor of the ...
's mental or
emotion Emotions are physical and mental states brought on by neurophysiology, neurophysiological changes, variously associated with thoughts, feelings, behavior, behavioral responses, and a degree of pleasure or suffering, displeasure. There is ...
al well-being". If a
publication To publish is to make content available to the general public.Berne Convention, articl ...
of
information Information is an Abstraction, abstract concept that refers to something which has the power Communication, to inform. At the most fundamental level, it pertains to the Interpretation (philosophy), interpretation (perhaps Interpretation (log ...
is false, then a tort of
defamation Defamation is a communication that injures a third party's reputation and causes a legally redressable injury. The precise legal definition of defamation varies from country to country. It is not necessarily restricted to making assertions ...
might have occurred. If that
communication Communication is commonly defined as the transmission of information. Its precise definition is disputed and there are disagreements about whether Intention, unintentional or failed transmissions are included and whether communication not onl ...
is not technically false but is still misleading, then a tort of false light might have occurred. The specific elements of the Tort of false light vary considerably even among those
jurisdiction Jurisdiction (from Latin 'law' and 'speech' or 'declaration') is the legal term for the legal authority granted to a legal entity to enact justice. In federations like the United States, the concept of jurisdiction applies at multiple level ...
s which do recognize this tort. Generally, these elements consist of the following: * A publication by the
defendant In court proceedings, a defendant is a person or object who is the party either accused of committing a crime in criminal prosecution or against whom some type of civil relief is being sought in a civil case. Terminology varies from one juris ...
about the
plaintiff A plaintiff ( Π in legal shorthand) is the party who initiates a lawsuit (also known as an ''action'') before a court. By doing so, the plaintiff seeks a legal remedy. If this search is successful, the court will issue judgment in favor of the ...
; * Made with actual malice (very similar to that type required by '' New York Times v. Sullivan'' in defamation cases); * Places the plaintiff in a false light; and * Highly offensive (i.e., embarrassing to
reasonable person In law, a reasonable person or reasonable man is a hypothetical person whose character and care conduct, under any ''common set of facts,'' is decided through reasoning of good practice or policy. It is a legal fiction crafted by the courts an ...
s) Thus in general, the doctrine of false light holds:
One who gives publicity to a matter concerning another before the public in a false light is subject to liability to the other for invasion of privacy, if (a) the false light in which the other was placed would be highly offensive to a reasonable person, and (b) the actor had knowledge of or acted in a reckless disregard as to the falsity of the publicized matter and the false light in which the other would be placed.
For this wrong, money damages may be recovered from the first person by the other. At first glance, this may appear to be similar to
defamation Defamation is a communication that injures a third party's reputation and causes a legally redressable injury. The precise legal definition of defamation varies from country to country. It is not necessarily restricted to making assertions ...
(libel and slander), but the basis for the harm is different, and the remedy is different in two respects. First, unlike libel and slander, no showing of actual harm or damage to the plaintiff is usually required in false light cases, and the court will determine the amount of damages. Second, being a violation of a Constitutional right of privacy, there may be no applicable statute of limitations in some jurisdictions specifying a time limit within which period a claim must be filed. Consequently, although it is infrequently invoked, in some cases false light may be a more attractive cause of action for plaintiffs than libel or slander, because the burden of proof may be less onerous. What does "publicity" mean? A newspaper of general circulation (or comparable breadth) or as few as 3–5 people who know the person harmed? Neither defamation nor false light has ever required everyone in society be informed by a harmful act, but the scope of "publicity" is variable. In some jurisdictions, publicity "means that the matter is made public, by communicating it to the public at large, or to so many persons that the matter must be regarded as substantially certain to become one of public knowledge." Moreover, the standards of behavior governing employees of government institutions subject to a state or national Administrative Procedure Act (as in the United States) are often more demanding than those governing employees of private or business institutions like newspapers. A person acting in an official capacity for a government agency may find that their statements are not indemnified by the principle of agency, leaving them personally liable for any damages. Example: If someone's reputation was portrayed in a false light during a personnel performance evaluation in a government agency or public university, one might be wronged if only a small number initially learned of it, or if adverse recommendations were made to only a few superiors (by a peer committee to department chair, dean, dean's advisory committee, provost, president, etc.). Settled cases suggest false light may not be effective in private school personnel cases, but they may be distinguishable from cases arising in public institutions.


Appropriation of name or likeness

Although privacy is often a common-law tort, most states have enacted statutes that prohibit the use of a person's name or image if used without consent for the commercial benefit of another person. Appropriation of name or likeness occurs when a person uses the name or likeness of another person for personal gain or commercial advantage. Action for misappropriation of right of publicity protects a person against loss caused by appropriation of personal likeness for commercial exploitation. A person's exclusive rights to control their name and likeness to prevent others from exploiting without permission is protected in similar manner to a trademark action with the person's likeness, rather than the trademark, being the subject of the protection. Appropriation is the oldest recognized form of invasion of privacy involving the use of an individual's name, likeness, or identity without consent for purposes such as ads, fictional works, or products.


Privacy law legislation


Fair Credit Reporting Act

The
Fair Credit Reporting Act The Fair Credit Reporting Act (FCRA), 15 U.S.C. § 1681 ''et seq.'', is federal legislation enacted to promote the accuracy, fairness, and privacy of consumer information contained in the files of consumer reporting agencies. It was intended ...
became effective on April 25, 1971, and implemented limitations on the information that could be collected, stored, and utilized by agencies such as credit bureaus, tenant screenings, and health agencies. The law also defined the rights granted to individuals in regards to their financial information including the right to obtain a credit score; the right to know what information is in your financial file; the right to know when your information is being accessed and used; and the right to dispute any inaccurate or incorrect information.


Video Privacy Protection Act

The Video Privacy Protection Act of 1988 (VPPA) was signed into law by President
Ronald Reagan Ronald Wilson Reagan (February 6, 1911 – June 5, 2004) was an American politician and actor who served as the 40th president of the United States from 1981 to 1989. He was a member of the Republican Party (United States), Republican Party a ...
to preserve the privacy of people's information collected when they rented, purchased, or delivered audio visual materials, and specifically videotapes. The law arose out of the Bork tapes controversy surrounding the
Washington City Paper The ''Washington City Paper'' is a U.S. alternative weekly newspaper serving the Washington, D.C., metropolitan area since 1981. The ''City Paper'' is distributed on Thursdays; its average circulation in 2006 was 85,588. The paper's editorial ...
's publication of a list of films rented by
Robert Bork Robert Heron Bork (March 1, 1927 – December 19, 2012) was an American legal scholar who served as solicitor general of the United States from 1973 until 1977. A professor by training, he was acting United States Attorney General and a judge on ...
, a U.S. District of Columbia Circuit Court of Appeals Judge who had been nominated to fill a seat on the United States Supreme Court at the time. The law prohibits the disclosure of personal information collected by video tape service providers unless it falls under certain exceptions. The VPPA became a focus of attention in the legal industry once again around 2022. Its revival came as part of a larger trend in consumer
class actions A class action is a form of lawsuit. Class Action may also refer to: * ''Class Action'' (film), 1991, starring Gene Hackman and Mary Elizabeth Mastrantonio *Class Action (band), a garage house band * "Class Action" (''Teenage Robot''), a 2002 epi ...
filed based on privacy law violations, both through new laws like the
California Consumer Privacy Act The California Consumer Privacy Act (CCPA) is a state statute intended to enhance privacy rights and consumer protection for residents of the state of California in the United States. The bill was passed by the California State Legislature and si ...
and older laws like the VPPA and wiretapping statutes.


Health Insurance Portability and Accountability Act

Signed in law on August 21, 1996,
Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Ted Kennedy, Kennedy–Nancy Kassebaum, Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President ...
(HIPAA) is a piece of legislation passed in the United States that limits the amount and types of information that can be collected and stored by healthcare providers. This includes limits on how that information can be obtained, stored, and released. HIPAA also developed data confidentiality requirements that are a part of "The Privacy Rule."


Gramm-Leach-Bliley Act

The Gramm-Leach-Bliley Act (GLA) is a federal law that was signed into effect on November 12, 1999. This act placed increased limits and requirements for data collection by financial institutions, as well as limited how that information could be collected and stored. It focused on requiring financial institutions to take specific measure to increase the safety and confidentiality of the information being collected. In addition to this, the law also put limitations on what type of data could be collected by financial institutions and how they could use that information. The act strives to protect NPI, or nonpublic personal information, which is any information that is collected regarding an individual's finances that is not otherwise publicly available.


Children's Online Privacy Protection Act

The
Children's Online Privacy Protection Act The Children's Online Privacy Protection Act of 1998 (COPPA) is a United States federal law The law of the United States comprises many levels of Codification (law), codified and uncodified forms of law, of which the supreme law is ...
(COPPA), passed on April 21, 2000, is a federal law in the United States that puts severe restrictions on what data companies can collect, share, or sell about children who are under the age of 13. A core provision under COPPA is that a website operator must "obtain verifiable parental consent before any collection, use, or disclosure of personal information from children."


Constitutional basis for right to privacy


Federal

Although the word "privacy" is actually never used in the text of the
United States Constitution The Constitution of the United States is the Supremacy Clause, supreme law of the United States, United States of America. It superseded the Articles of Confederation, the nation's first constitution, on March 4, 1789. Originally includi ...
, there are Constitutional limits to the government's intrusion into individuals' right to privacy. This is true even when pursuing a public purpose such as exercising police powers or passing legislation. The Constitution, however, only protects against
state actor State most commonly refers to: * State (polity), a centralized political organization that regulates law and society within a territory **Sovereign state, a sovereign polity in international law, commonly referred to as a country **Nation state, a ...
s. Invasions of privacy by individuals can only be remedied under previous court decisions. The
First Amendment First most commonly refers to: * First, the ordinal form of the number 1 First or 1st may also refer to: Acronyms * Faint Images of the Radio Sky at Twenty-Centimeters, an astronomical survey carried out by the Very Large Array * Far Infrared a ...
protects the right to free assembly, broadening privacy rights. The Fourth Amendment to the Constitution of the United States ensures that "the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." The Fourth Amendment was the
Framers The Constitutional Convention took place in Philadelphia from May 25 to September 17, 1787. While the convention was initially intended to revise the league of states and devise the first system of Federal government of the United States, fede ...
' attempt to protect each citizen's spiritual and intellectual integrity. A government that violates the Fourth Amendment in order to use evidence against a citizen is also violating the Fifth Amendment. The Ninth Amendment declares that "The enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people."


State


Alaska

On August 22, 1972, the Alaska Right of Privacy Amendment, Amendment 3, was approved with 86% of the vote in support of the legislatively referred constitutional amendment. Article I, Section 22 of Alaska's constitution states, "The right of the people to privacy is recognized and shall not be infringed. The legislature shall implement this section."


California

The
California Constitution The Constitution of California () is the primary organizing law for the U.S. state of California, describing the duties, powers, structures and functions of the government of California. California's constitution was drafted in both English ...
articulates privacy as an
inalienable right Some philosophers distinguish two types of rights, natural rights and legal rights. * Natural rights are those that are not dependent on the laws or customs of any particular culture or government, and so are ''universal'', '' fundamental'' and ...
. CA SB 1386 expands on privacy law and guarantees that if a company exposes a Californian's sensitive information this exposure must be reported to the citizen. This law has inspired many states to come up with similar measures.US State Privacy Laws
. Protegrity. n.p., 2008. Web. October 25, 2010.
California's "Shine the Light" law (SB 27, CA Civil Code § 1798.83), operative on January 1, 2005, outlines specific rules regarding how and when a business must disclose use of a customer's
personal information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has fou ...
and imposes civil damages for violation of the law. California's Reader Privacy Act was passed into law in 2011. The law prohibits a commercial provider of a book service, as defined, from disclosing, or being compelled to disclose, any personal information relating to a user of the book service, subject to certain exceptions. The bill would require a provider to disclose personal information of a user only if a court order has been issued, as specified, and certain other conditions have been satisfied. The bill would impose civil penalties on a provider of a book service for knowingly disclosing a user's personal information to a government entity in violation of these provisions. This law is applicable to electronic books in addition to print books. The California Privacy Rights Act created the California Privacy Protection Agency, the first data protection agency in the United States.


Florida

Article I, §23 of the
Florida Constitution The Constitution of the State of Florida is the document that establishes and describes the powers, duties, structure, and function of the government of the U.S. state of Florida, and establishes the basic law of the state. The current Constitu ...
states that "Every natural person has the right to be let alone and free from governmental intrusion into the person's private life except as otherwise provided herein. This section shall not be construed to limit the public's right of access to public records and meetings as provided by law."


Montana

Article 2, §10 of the Montana Constitution states that "The right of individual privacy is essential to the well-being of a free society and shall not be infringed without the showing of a compelling state interest".


Washington

Article 1, §7 of the Washington Constitution states that "No person shall be disturbed in his private affairs, or his home invaded, without authority of law". * Law enforcement are required to obtain a warrant before using IMSI-catcher technology. * Private individual's
text messages Text messaging, or texting, is the act of composing and sending electronic messages, typically consisting of alphabetic and numeric characters, between two or more users of mobile phones, tablet computers, smartwatches, desktop computer, des ...
are protected from warrantless searches.


State privacy laws

The right to privacy is protected also by more than 600 laws in the states and by a dozen federal laws, like those protecting health and student information, also limiting electronic surveillance. As of 2022 however, only five states had data privacy laws.


"Opt-out" requirements

Several of the US federal privacy laws have substantial "
opt-out The term opt-out refers to several methods by which individuals can avoid receiving unsolicited product or service information. This option is usually associated with direct marketing campaigns such as e-mail marketing or direct mail. A list of th ...
" requirements, requiring that the individual specifically opt-out of commercial dissemination of personally identifiable information (PII). In some cases, an entity wishing to "share" (disseminate) information is required to provide a notice, such as a GLBA notice or a
HIPAA The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Kennedy– Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, ...
notice, requiring individuals to specifically opt-out. These "opt-out" requests may be executed either by use of forms provided by the entity collecting the data, with or without separate written requests.


Privacy of health-related information

The Health Information Technology for Economic and Clinical Health Act (HITECH Act) is an important piece of legislation in the United States that relates to the privacy of health-related information. Enacted as part of the American Recovery and Reinvestment Act of 2009, the HITECH Act addresses the privacy and security concerns associated with the electronic transmission of health information.


See also

* Canadian privacy law * Communications Assistance for Law Enforcement Act (CALEA) *
Expectation of privacy In United States constitutional law, reasonable expectation of privacy is a legal test which is crucial in defining the scope of the applicability of the privacy protections of the Fourth Amendment to the U.S. Constitution. It is related to, ...
* Financial privacy laws in the United States * HTLINGUAL, a former
CIA The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
project to intercept mail destined for the Soviet Union and China. *
Mass surveillance in the United States The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveill ...
** U.S. government databases **
MAINWAY MAINWAY is a database maintained by the United States' National Security Agency (NSA) containing metadata for hundreds of billions of telephone calls made through the largest telephone company, telephone carriers in the United States, including A ...
, an NSA database containing
metadata Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive ...
for billions of calls made over the
Verizon Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
and
AT&T AT&T Inc., an abbreviation for its predecessor's former name, the American Telephone and Telegraph Company, is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the w ...
networks. **
PRISM PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD . PRISM collects stored internet ...
, an NSA program meant to collect online communication information. * '' Olmstead v. United States'' * United States Constitution **
Ninth Amendment to the United States Constitution The Ninth Amendment (Amendment IX) to the United States Constitution addresses rights, retained by the people, that are not specifically enumerated in the Constitution. It is part of the Bill of Rights. The amendment was introduced during the dr ...
**
Tenth Amendment to the United States Constitution The Tenth Amendment (Amendment X) to the United States Constitution, a part of the Bill of Rights, was ratified on December 15, 1791. It expresses the principle of federalism, whereby the federal government and the individual states share pow ...
*
United States free speech exceptions In the United States, some categories of speech are not protected by the First Amendment. According to the Supreme Court of the United States, the U.S. Constitution protects free speech while allowing limitations on certain categories of speech. ...


References


Further reading

* Samantha Barbas, ''Laws of Image: Privacy and Publicity in America.'' Stanford, CA: Stanford University Press, 2015. * * Amy Gajda, '' Seek and Hide: The Tangled History of the Right to Privacy''. Viking, 2022. *


External links


Invasion of Privacy
Annotation 19 – First Amendment, U.S. Constitution, from
FindLaw FindLaw is a business of Internet Brands that provides online legal information in the form of state laws, case law and codes, legal blogs and articles, a lawyer directory, DIY legal services and products, and other legal resources. The compa ...
online legal information.
"Invasion of Privacy and the Media: The Right 'To Be Let Alone' "
by John A. Bussian and Paul J. Levine, in the Reporters Handbook from The Florida Bar, updated August 2004.

by Warren and Brandeis, in the ''Harvard Law Review'' (Vol. IV, No. 5), December 15, 1890.
Privacy Rights Clearinghouse
a consumer education and privacy rights advocacy organization.
"Privacy"
in the ''Stanford Encyclopedia of Philosophy'', revised August 9, 2013. {{Portal bar, United States, Law United States tort law Privacy in the United States