Cargando…

Egalitarian Digital Privacy : Image-based Abuse and Beyond /

This book considers the social, legal and technological features of unauthorised dissemination of intimate images. With a focus on private law theory, the book defines the appropriate scope of liability of platforms and viewers. Through its analysis, it develops a new theory of egalitarian digital p...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Keren-Paz, Tsachi
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Bristol : Bristol University Press, 2023.
Colección:Law, society, policy series.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Front Cover
  • Egalitarian Digital Privacy: Image-based Abuse and Beyond
  • Copyright information
  • Dedication
  • Table of Contents
  • Acknowledgements
  • Series Editor's Preface
  • 1 Introduction
  • 1. Definition and terminology
  • 2. Theoretical framework and readership
  • 3. The main contributions in terms of policy
  • 4. The main theoretical/conceptual contributions
  • 5. The main doctrinal contributions
  • 6. Organization
  • 2 Setting the Ground: The Intermediary Liability Debate and Framing Issues
  • 1. Introduction
  • 2. A primer of intermediary liability
  • 3. Control and fairness in courts' decisions on intermediary liability
  • A. Control
  • B. Fairness
  • 4. Situating the argument
  • 3 First Principles and Occupiers' Liability: The Case against Immunity
  • 1. Introduction
  • 2. Control and knowledge of offline intermediaries: rejecting post notice immunity
  • A. Offline defamation
  • B. Occupiers liability and nuisance
  • 3. Burden, control and fairness
  • A. Burden
  • B. Fairness: business model and complicity
  • 4. Right to an effective remedy
  • 5. Pre-notice liability
  • A. Active contribution to claimant's injury
  • B. Control beyond knowledge
  • 4 Property and Privacy: The Case for Strict Liability
  • 1. Introduction
  • 2. Conflicts over title: nemo dat versus market overt
  • 3. Similarities and differences: the intermediaries and the thing sold
  • 4. The viewer's inferior claim ought to deny immunity to the intermediary
  • A. Immunity as expropriation
  • B. Asymmetrical harm
  • C. Risk taking and victim blaming
  • 1. NCII victim blaming
  • 2. Rejecting entrustment
  • D. An effective alternative remedy
  • E. Regressive redistribution
  • 5. Policies in favour of merchant/intermediary liability
  • A. Efficiency
  • B. Fairness
  • C. Loss spreading
  • 6. Doctrinal translation
  • 5 Property and Privacy: Objections and Possible Extensions
  • 1. Introduction
  • 2. Privacy, property and inalienability
  • A. The Inalienability paradox
  • B. Why property?
  • C. We need to talk about (the harshness of) conversion
  • D. Consistency and transitivity
  • 3. Competing quasi/proprietary interests
  • 4. Possible extensions beyond NCII?
  • A. Private (sexual) information beyond images
  • B. Defamation and copyright
  • 5. Conclusion
  • 6 The Policy Debate: Uniqueness of Harm from NCII
  • 1. Introduction
  • 2. Harm from NCII
  • A. Severe, multifaceted, and irreparable
  • B. Gendered, systemic, a form of sexual abuse
  • 1. Gendered
  • 2. Systemic
  • 3. Form of sexual abuse
  • 3. NCII exceptionalism: the normative significance of irreparable gendered harm
  • A. Deprioritizing copyright
  • B. Privacy > Defamation
  • C. Just regulation
  • D. Theory of rights
  • 1. Primary and secondary duties
  • 2. Interim injunctions
  • 3. Anticipatory injunctions
  • E. Gendered harm and broader egalitarian considerations
  • F. Policy implications