Preview

The Application of Privacy Laws

Powerful Essays
Open Document
Open Document
1898 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Application of Privacy Laws
THE APPLICATION OF PRIVACY LAWS

TOPIC READING:

City of Ontario, California, et al. v Quon, et al. 560 U.S.___(2010)

DISCUSSION QUESTIONS:
1. What were the material facts of City of Ontario, California, et al. v Quon, et al. (Ontario v Quon)?

 Petitioner Ontario (hereinafter City) acquired alphanumeric pagers able to send and receive text messages. Its contract with its service provider, Arch Wireless, provided for a monthly limit on the number of characters each pager could send or receive, and specified that usage exceeding that number would result in an additional fee.
 The City issued the pagers to respondent Quon and other officers in its police department (OPD), also a petitioner here.
 When Quon and others exceeded their monthly character limits for several months running, petitioner Scharf, OPD’s chief, sought to determine whether the existing limit was too low, i.e., whether the officers had to pay fees for sending work-related messages or, conversely, whether the overages were for personal messages.
 After Arch Wireless provided transcripts of Quon’s and another employee’s August and September 2002 text messages, it was discovered that many of Quon’s messages were not work related, and some were sexually explicit.

It it also important to note that the pager use was covered by the OPD's computer and Internet use policy, under which employees agreed that "the city reserves the right to monitor and log all network activity including e-mail and Internet use, with or without notice."

2. Briefly describe the procedural history of Ontario v Quon.

The district court: ruled that Quon and his fellow plaintiffs had a reasonable expectation of privacy. It ordered a jury trial to determine whether the purpose of the audit was, as the department maintained, to find out whether it needed higher character limits or, as Quon claimed, to expose the personal nature of the texts.

Court of Appeal: Quon et al. On appeal in 2008, a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Eposito Case

    • 551 Words
    • 3 Pages

    3. Briefly state the facts of this case, using the information found in the case in LexisNexis.…

    • 551 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Esposito v. SFX

    • 1107 Words
    • 5 Pages

    3. Briefly – state the facts of this case, using the information found in the case in LexisNexis. (5 points)…

    • 1107 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The federal Privacy Act 1988 is designed to promote the protection of individuals’ privacy in Australia by imposing obligations on those who collect and handle personal information to manage it responsibly and transparently. It does so by reference to a number of principles known as the Australian Privacy Principles. These principles are similar to those found in other jurisdictions such as Canada and Europe.…

    • 64 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Identity theft is when someone steals another person’s identity through the internet. The identity stolen can be personal information such as account names and security numbers to use it for their own benefit. For example, a Facebook user can steal another Facebook user’s personal details by either hacking or visiting their profile, uploading their profile picture, gaining personal details and using it to create a fake account of that Facebook…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Chapter 3 is titled "Basic Underlying Concepts: Privacy, Probable Cause, and Reasonableness." Privacy refers to an American citizen's expectation of privacy. Probable cause is usually needed by law enforcement officers before they can arrest an individual as well as search with or without a warrant. Reasonableness refers to the standard of searches and seizures to be valid under the Fourth Amendment. Katz v. United States (1967) is the case that demonstrated a change in the interpretation of the Fourth Amendment.…

    • 615 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    G. for what principle of law was the Esposito case used (cited for) in the case? (5 points)…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When it comes to protecting and saving lives of the American people, private invasion used in order to locate and capture potential terrorist should be unlimited. The 911 attack has provided active proof to the American peoples of the damage that terrorist groups can impose on our society. Therefore, invading the privacy of individuals may prevent future terrorist attacks.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Invasion of Privacy

    • 968 Words
    • 4 Pages

    Invasion of privacy is something that is a major concern among Americans. In this paper I will discuss Steve, who has recently joined a church. The church doctrine is such that members are to reveal indiscretions from their past. Steve has told them of some of his indiscretions but Steve is not happy about this and decides he would rather leave the church. The church leaders have told Steve even if he leaves his neighbors as well as members of the church will be notified of his past. In this paper I will discuss which privacy torts are involved as well as if this is a libel case. I will also discuss whether the expectation of privacy applies to the facts of this case as well as the defenses to the tort and if there is a legal difference in disclosing personal indiscretions to members of the church, its’ elders and to the general public.…

    • 968 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Invasion of Privacy

    • 510 Words
    • 2 Pages

    In this case Dharun Ravi, a college student at Rutgers University was accused and charged for knowingly filming and outing his gay roommate, Tyler Clementi, having a sexual encounter with his boyfriend on multiple occasions. The video footage was being broadcasted live to students who Ravi told about it. He set up a camera and used iChat to get the footage. He would tell students when to tune in through his twitter account. This being said Ravi’s roommate saw the tweets about himself and it caused him to later commit suicide. He was so devastated and humiliated from this that he jumped off of the George Washington Bridge.…

    • 510 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cellular devices and other technology has grown to be extremely popular. With this popularity technology has pervaded our lives and changed social interaction. Text messaging also known as texting is when people with cell phones send short typed messages. The rate of Americans sending text messages drastically increased year by year. Teenagers are large contributors to the presence of text messaging in society. The majority of the people into the texting frenzy are usually between 13 and 17 years old. In this paper we will discuss both the pros and cons of texting.…

    • 528 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Importance Of Privacy

    • 637 Words
    • 3 Pages

    Has anyone ever look through your belonging without asking and thought it was moral? Having privacy is a huge problem in our society too many individuals and celebrity.Without Privacy, anyone could invade your life by stealing your identity and personal records. In the first amendment, The bill of rights says that everyone should have their right of privacy no matter what. Privacy is having freedom way from others. "Individuals who live in a civil country or state deserve their right to privacy under any condition even though they are a celebrity because…

    • 637 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Why Privacy Is Important

    • 937 Words
    • 4 Pages

    When you think of going to the hospital or doctor's office to get checked up, the last thing on your mind is what could possibly go wrong with your personal health information. Because of this, there are steps put in place that have the sole purpose to protect you and your information from outsiders and accidents that could possibly put your health information at risk. This is called the Privacy and Security Rule and it's priority is keeping patients and other's health information safe on paper or electronically. These rules protect any information that relates to the past, present, or future physical or mental health of a patient, any plan of healthcare or payments, and any information that could possibly identify an individual.…

    • 937 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Invasion of Privacy

    • 1063 Words
    • 5 Pages

    While straightening your teenager's room, a book falls on the floor. You pick it up and see that it is her diary. As a parent, do you have the right to read it? Would it matter if you found the diary outside her room? Is it okay to read the diary if you suspect there is problem your teen is not telling you about? As a child, did you ever go into your parent's room (without permission) and snoop around? Was that an "invasion of their privacy"? Did you find anything you weren't supposed to? Did you learn from it? Did you tell them? You have every right to read your child's diary whether it's found in the laundry or their bedroom. There is nothing wrong with knowing what your child is thinking, the changes that they are experiencing, or perhaps any troubling matters they don't feel they can approach one of their parents with. Consider yourself lucky you found it. Invasion of privacy? I don't think so; it could save their life.…

    • 1063 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Electronic Privacy

    • 573 Words
    • 3 Pages

    We live in the era of technology; you may hear some say I do not know what I would do without my laptop, cell phone, tablet, and other technical devices. In recent years, the production and use of drones are advancements in our hi-tech world. These resources likewise make creates the debate has the Government crossed the privacy barriers and overly monitor the citizens. After you search things online or send private text, have you ever wondered if Government agencies have access to your electronic privacy? The other situation is that of civilian use of drones and our privacy rights being lost in the process. The technological progress we are gaining, yet have we lost our privacy as a result. First, let us consider our rights as an American…

    • 573 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Communications Privacy Management Theory is more of an interpretive theory. There are 6 things an interpretive theory is supposed to meet in order to be considered a good theory. The first is the clarification of values which this theory did meet when it came to this situation. This theory has helped clarify where my co-owner of my private information’s values stood when it came to our agreement. It also meets the second requirement and helped me see and gave me a new understanding of who she truly was as a person. The one shortcoming this theory has when it comes to this theory is, it doesn’t cause a reform of society. While it did enlighten me on how to prevent this situation from occurring again, it did not help to change…

    • 691 Words
    • 3 Pages
    Satisfactory Essays