We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure [email protected]
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Researchers involved in research misconduct proceedings are increasingly threatening or bringing legal defamation claims against the institutions, complainants, and publications involved in the proceedings. Although defamation claims do not often succeed, they can nevertheless be costly and lengthy. This article analyzes certain defamation cases in the research misconduct space and provides advice for institutions and other involved parties seeking to minimize potential defamation liability associated with research misconduct proceedings.
It is widely presumed that privacy is ‘factive’, i.e. that it cannot be diminished by accessing or disseminating falsehoods. But if this is so, what wrongs are committed in cases where others access documents of ours (letters, medical records, etc.) which contain false information? In this article, I examine various ways of explaining the wrongfulness of accessing and dissemination falsehoods (defamation; that privacy can be violated without being diminished; ‘control’ accounts of privacy; downstream revelations of truths; that falsehoods diminish ‘propositional’ or ‘attentional’ privacy). I lay out what each of these accounts misses about accessing falsehoods, about privacy, and/or about the right to privacy. I then propose two alternative ways of accounting for the intuitive wrongfulness of accessing and disseminating falsehoods: viewing them as merely ‘attempted’ privacy violations and weakening the truth condition of privacy diminishments.
This chapter reviews the regulation of disinformation from an African human rights’ law perspective, focusing on the right to freedom of expression and the right to vote. It provides an overview of the African regional law framework, specifically the African Charter on Human and Peoples Rights of 1981 (the African Charter) and corresponding jurisprudence. The chapter also analyses the way in which freedom of expression and disinformation laws have been applied in African countries, the aim being to contextualize and illustrate how African regional law plays out at the domestic level, but with an emphasis on the position in South Africa.
The victim of a tort can generally claim compensatory damages for any loss suffered as a result of the tort. The assessment of such damages and the attribution of responsibility for such loss are generally governed by the rules discussed in Chs 2 to 4 for civil wrongs in general. Specific rules for tort are discussed in this chapter: the assessment of damages and the attribution of responsibility. The assessment of compensatory damages for personal injury, which are usually claimed in tort, is discussed.
The United States’ free speech regime, as codified in the First Amendment to the United States Constitution, comes with obvious contrasts to Thailand’s ill-famed lèse–majesté law—Section 112 of the Thai Criminal Code—which prohibits defamation or even truthful degradation of the Thai King and Royal Family. Recent scholarship has focused on such differences and has largely depicted the two regimes as diametric opposites. When viewing the First Amendment and Thailand’s lèse–majesté law in temporal isolation, the recent scholarly consensus has significant merit. However, by analyzing the two regimes over time, similarities arise suggesting that both regimes represent each respective country’s attempt to accommodate competing and changing values present within the respective countries.
This article examines what the state of the law regarding the tortious protection of the privacy of corporations tells us about the concept of a legal person. Given that non-human persons are capable of having an interest in at least their informational privacy, logic would seem to dictate that they should be recognised such a right protecting their personality. In reality, the law is most hesitant to concede the right to privacy to non-natural persons (the same being true of reputation). This suggests that, for the dominant strand of the law at least, despite the rhetoric, legal persons do not really have rights of personality; in other words, that they are not really persons.
Dean John Wade, who replaced the great torts scholar William Prosser on the Restatement (Second) of Torts, put the finishing touches on the defamation sections in 1977.1 Apple Computer had been founded a year before, and Microsoft two, but relatively few people owned computers yet. The twenty-four-hour news cycle was not yet a thing, and most Americans still trusted the press.2
The laws of defamation and privacy are at once similar and dissimilar. Falsity is the hallmark of defamation – the sharing of untrue information that tends to harm the subject’s standing in their community. Truth is the hallmark of privacy – the disclosure of facts about an individual who would prefer those facts to be private. Publication of true information cannot be defamatory; spreading of false information cannot violate an individual’s privacy. Scholars of either field could surely add epicycles to that characterization – but it does useful work as a starting point of comparison.
Coordinated campaigns of falsehoods are poisoning public discourse.1 Amidst a torrent of social-media conspiracy theories and lies – on topics as central to the nation’s wellbeing as elections and public health – scholars and jurists are turning their attention to the causes of this disinformation crisis and the potential solutions to it.
It’s accually obsene what you can find out about a person on the internet.1
To some, this typo-ridden remark might sound banal. We know that our data drifts around online, with digital flotsam and jetsam washing up sporadically on different websites across the internet. Surveillance has been so normalized that, these days, many people aren’t distressed when their information appears in a Google search, even if they sometimes fret about their privacy in other settings.
Deep fakes are a special kind of counterfeit image that is difficult to distinguish from an authentic image. They may be used to represent a person doing any act and are generated using advanced machine learning techniques. Currently, such an appropriation of personality is only actionable if the circumstances disclose one of a number of largely unrelated causes of action. As these causes of action are inadequate to protect claimants from the appropriation of their personalities, there should be a new independent tort or statutory action for the appropriation of personalities which is grounded in the protection of a person’s dignitary interests.
The tort of defamation protects the reputation of individuals in society. A cause of action arises where one individual publishes a false matter about another that lowers the reputation of the latter in the eyes of ordinary and reasonable members of the society. While many of the torts covered in this book seek to protect the bodily integrity of individuals, the tort of defamation seeks to protect their reputation. Defamation laws are concerned with balancing freedom of speech with the protection of individuals’ reputation, character and standing in the community. The increased use of social media has a significant role to play in defamation, with the speed and ease of publication on the internet creating new sites for defamation action. Additionally, the emergence of novel technologies and methods of sharing defamatory posts online – such as hashtags, emojis and memes – have raised novel questions about application of traditional defamation principles to the modern technological landscape. This makes defamation a highly relevant tort in contemporary society.
Tort law is a dynamic area of Australian law, offering individuals the opportunity to seek legal remedies when their interests are infringed. Contemporary Australian Tort Law introduces the fundamentals of tort law in Australia today in an accessible, student-friendly way. This edition retains the logical coverage of key aspects of tort law and has been thoroughly updated to cover recent case law and legal developments. The chapter on defamation has been comprehensively updated to reflect recent amendments to uniform legislation and its application in common law. Self-assessment tools throughout the text encourage students to test and apply their knowledge of key concepts. These features include case questions and review questions throughout each chapter, as well as longer end-of-chapter hypothetical problems which consolidate students' application of key concepts to realistic contemporary scenarios. Written by a team of teaching experts, Contemporary Australian Tort Law is an engaging resource for students new to studying tort law.
In the first comprehensive history of libels in Elizabethan England, Joseph Mansky traces the crime across law, literature, and culture, outlining a viral and often virulent media ecosystem. During the 1590s, a series of crises – simmering xenophobia, years of dearth and hunger, surges of religious persecution – sparked an extraordinary explosion of libeling. The same years also saw the first appearances of libels on London stages. Defamatory, seditious texts were launched into the sky, cast in windows, recited in court, read from pulpits, and seized by informers. Avatars of sedition, libels nonetheless empowered ordinary people to pass judgment on the most controversial issues and persons of the day. They were marked by mobility, swirling across the early modern media and across class, confessional, and geographical lines. Ranging from Shakespearean drama to provincial pageantry, this book charts a public sphere poised between debate and defamation, between free speech and fake news.
As stated earlier in this Part of the guide, it can be helpful to determine the defined standard, or benchmark, for the author’s perspective, action or statement, whether that is for a fictional character or plot, or in a non-fiction work (see Identifying the explanatory framework within a text). Once you have clarified that and the author’s intention, the next step is to consider whether there are any potential legal consequences.
As an editor, you should have a basic understanding of copyright, libel, defamation and related legislation, sufficient to be able to identify when a legal reading is needed. However, you should not be expected to provide that legal reading, regardless of how familiar you are with the legislation.
Chapter 4 addresses the rising civil costs of dissent. It examines the various costs and liabilities that apply to protest organizers, participants, and supporters. These include permit fees, damages resulting from personal injury lawsuits, statutory penalty enhancements, and loss of public benefits. The chapter makes the case for stricter First Amendment scrutiny of these costs and argues that certain fee-shifting arrangements and civil causes of action violate the First Amendment. It encourages public officials to commit to reducing rather than piling on the costs of dissent.
This chapter discusses the right to freedom to expression and to freedom of information as it is protected by the European Convention on Human Rights, other Council of Europe instruments, in EU law and in international instruments. Attention is also paid to topics such as hate speech, defamation, press freedom and access to government information. In the final section, a short comparison between the different instruments is made
This chapter introduces and discusses the approach of each body to deference and subsidiarity, and assesses how the differences may affect convergence and fragmentation. From the margin of appreciation (MoA), typical of the European Court, to the conventionality control (CC) of the Inter-American Court, the chapter investigates all the different shades of subsidiarity and deference and put them in a comparative perspective. Moreover, through specific examples, this chapter shows how different approaches may trigger fragmentation (such as in the headscarf cases) and how convergence on the level of deference and subsidiarity may, on the contrary, foster convergence (such as in defamation cases).
Contempt, cursing, and defamation all actively caused harm to others and threatened to destabilize social hierarchies of gentility. As politeness became the political language that enabled the exercise of power by elites and allowed them to recognize each other as the rightful possessors of public authority, criminal prosecutions of uncivil speech helped define political roles and relationships. Contempt prosecutions punished impolite speech from the lower orders, but the law also rewarded appropriately submissive speech (such as apologies) from them. The fact that these negotiations occurred exclusively among men reflects how both the politeness regime and the king’s peace itself were increasingly marginalizing women. The vast majority of those prosecuted for cursing were men of relatively low social status; this offense was understood to threaten the polite ethos and the civil order. Defamation became in the eighteenth century a crime of the lower orders, while polite gentlemen channeled their own defamatory impulses into a highly specific and legally protected written form: satire.