BLR 2023121516181593
BLR 2023121516181593
BLR 2023121516181593
https://www.scirp.org/journal/blr
ISSN Online: 2159-4635
ISSN Print: 2159-4627
Timothy S. McNamara
Keywords
Right to an Image, Privacy, Dignity, Reputation, Loss of Face
1. Introduction
Under the common law, from time to time, English judges have found it neces-
sary to “recognize” the existence of certain pre-existing common law rights,
(Chafee Jr., 1947: p. 406)1 or even forgotten equitable interests, which can be
discerned from earlier cases. (Day, 1976)2 Although judges may claim they are
able to find such common laws from a careful examination of previous cases, the
exact methodology used for making such determinations is still somewhat mys-
terious. (Reid, 1972: p. 22)3 Moreover, in recent years, the scope for making such
determinations appears to have receded somewhat, perhaps owing to a growing
political sensitivity on the part of the judiciary or simply the inherent deference
given to the ever-increasing number of encroaching statutes on the books. Non-
etheless, the scope for Anglosphere4 judges to create—or more properly stated,
belatedly “discover”—inherent common law has never been abandoned.5
It is argued here that technological innovations associated with digital images,
and their dissemination over the Internet, have given rise to a need to recognize
a new common law right or legal interest, perhaps even a new generation of in-
ternational human right, so as to address the harms stemming from a loss of
face. Specifically, the fact-based scenarios can fall into at least three recognizable
patterns of dissemination: 1) “privacy in public” image capture scenarios in
which uncharacteristic behavior is displayed or unfortunate mishap befalls the
image subject, 2) non-consensual pornographic and suis generis images, and 3)
non-satirical images which are edited or morphed, such as deepfake imagery.
Dissemination of any of these images to the public at large would likely consti-
tute a serious affront to the interests of the image subject, leading to a possible
loss of face.
1
In considering this problem, Professor Chafee puts forward the traditional argument thusly: “So,
when the Wrights launched their airplane at Kittyhawk, there was already in existence a law relating
to airplanes and the aviator’s right to fly over another man’s land. The judge before whom the action
of trespass came would merely have to discover what this law was.” Zechariah Chafee Jr., Do Judges
Make or Discover Law, Harvard University School of Law, p. 405. However, it seems his own view of
the law might be called the “skyscraper theory”: some beams were erected by legislators, others by
judges. Together they created the edifice.
2
While there may be broad acceptance of the need for judicial activism to address lacunae in a sta-
tute’s coverage, there may be less agreement on what those gaps actually are (e.g. whether they were
left intentionally). Judge Day argues that judicial legislation is not only necessary, it is also contem-
plated by the structure of the legal system.
3
Lord Reid dismissed the idea that judges merely declare the law as a “fairy tale”. He advised judges,
when creating common law, to have regard to common sense, legal principle and public policy (in
that order).
4
Notwithstanding the tendency to emphasize the “commonality” amongst the common law legal
systems, it is worth bearing in mind that, in the background, American judges operate under a sys-
tem of self-designated judicial supremacy (see Marbury v. Madison) whereas English law can be
characterized as possessing legislative supremacy. Under the latter, the scope for judicial review is
necessarily curtailed. It is suggested that, at the margin, this may impact legal culture and attitudes
towards judicial activism.
5
In the past century, this power has been used by the judiciary both to create entirely new areas of the
law (e.g. modern negligence) and to redefine crimes so as expand or contract the scope of criminal
wrongdoing (e.g. recognition of marital rape). For the former, see Donaghue v. Stevenson [1932] AC
562, 1932 SC (HL) 31. For the redefinition of marriage, see S v HM Advocate 1989 SLT 469 (in Scot-
land) and R v R [1991] 2 All ER 257 (CA), [1992] 1 AC 599 (HL) (in England and Wales). This be-
lated recognition by the judiciary of the need to more closely align the law with existing societal val-
ues stands as a testament to the likely, eventual, acceptance of some iteration of a right to an image.
Failure to protect against these harms can have real world consequences. Such
negative effects can range from teenage mental depression and damaged rela-
tionships to loss of employment opportunities (Coleman, 2005: pp. 205-234)6
and even altered election outcomes.7
dium. However, the degree of harm suffered—and the potential for harm is ob-
viously greater with deepfakes, given the potential for deception—might be
relevant in assessing the value of damages.
The second possible answer would be to conceive of the right to an image, at
the level of municipal law, as a form of expanded tort or criminal violation. Un-
der this scenario, actual harm suffered by the claimant would likely be a re-
quirement, both to succeed at trial and to sustain any claim for damages. Like-
wise, compensation would normally, but not necessarily, be assessed based on
harm suffered rather than the defendant’s ability to pay. The important point is
not that deepfakes will necessarily be more damaging (i.e. harmful) than tradi-
tional oil paintings. However, the new medium has the potential to be much
more harmful due to its realism.
Traditional news outlets, journalists and actors are another set of competing
interests that could be negatively impacted by recognition of the right to an im-
age.
The distinction between “fundamentally true” and “technically true” will un-
doubtedly prove particularly problematic when news outlets are trying to estab-
lish the character or reputation of an individual whose image they do not wish to
pixelate. Here, the competing interests of truth and freedom of expression must
contend with what amounts to a near privacy right, i.e. the right to an image.
The Strasbourg Court has considerable experience managing this sort of prob-
lem.
In regards to deepfakes, the news outlets and crime documentaries etc. would
obviously prefer simply to let AI create the imaginary or stylized recreations,
rather than employing paid actors to re-enact dialogues and crime scenes. Al-
though such scenarios would likely violate a suspect’s right to an image, it stands
to reason that the rights of a convicted criminal will be fewer, in practice, than
those of non-convicts. Thus, it is uncertain, but likely, that the “fundamentally
true or fair” formulation would permit the staging of deepfake crime scene re-
enactments using the real or recognizable images of a convicted criminal but not
the images of a mere suspect.
Finally, the new technology of social media has allowed for the rapid horizon-
tal or “viral” dissemination of unusual or extreme images, often from friend to
friend. These images, such as public humiliation videos, may be true or doctored
and can be recognized to some degree by AI. (If the image has not been altered,
it should be possible to back-trace to the initial time and place it was uploaded
onto the Internet.)
Unfortunately, the virality of these images is often correlated to the extremity
of the human condition. For example, a certain segment of the population ap-
pears to find satisfaction in viewing gruesome images and/or the suffering of
others. The rationale for legal tolerance of this form of negative individualism
tends to be couched in freedom of thought or freedom of expression arguments.
The right to an image offers a “pro-society” legal response to this problem.
While those who engage in image capture and dissemination have rights, they
are not the only stakeholders. Those who are image subjects also have rights.
Except for the special cases where those rights have been waived (e.g. profes-
sional models or actors who have received consideration for specified images),
image subjects have a natural right to control against the unreasonable dissemi-
nation of their image.
of the public square through its doorbell security service. (Burgess, 2022) How-
ever, in the future, it may also acquire images from within the home with its ro-
bot cleaner. (Johnson, 2022) Recognition of the right to an image would not
prevent any of these instances of image capture although it should curtail some
of the images from being disseminated.
Although image capture through such technological innovations will neces-
sarily impinge the privacy interest, the innovations need not unnecessarily im-
pact the interest which the right to an image seeks to protect (i.e. if the images
are not disseminated). Much like the distinction between privacy in fact and the
right to privacy, a distinction can also be drawn between loss of face (or harm)
and the risk of loss of face (or risk of harm). In other words, images captured
non-consensually (e.g. with Google Glass) will not lead to a right to an image
type infringement unless disseminated.
However, if the concept of harm is conceived in an extremely expansive way,
so as to include exposure to an unwanted risk (such as accidental dissemina-
tion), then the right to an image would also be impinged by the image capture
process. In the abstract, it may be difficult to compare the risk of accidental fu-
ture disclosure under new versus older technologies. Salesmen in both eras
would likely have claimed their products or systems were “secure”. However,
insofar as some understanding of complex technology may be required to prop-
erly navigate under the new framework (e.g. by controlling access to images in
the cloud) the risk of accidental disclosure seems to have risen.
under which images might be legally viewed remotely, since the images would not be “possessed”
unless downloaded.
represent a wide category that could be open to more than one interpretation, or
characterization, and may require knowledge of special facts in order to be de-
ciphered correctly. Such images could include a middle-aged man talking to a
teenage girl of a different race, at a bus stop, or of a man talking to a young
woman in an area where prostitutes are known to work. Other examples include
couples entering or leaving “short time” motels, a man talking to a transgen-
dered individual, or famous people seen holding hands with their non-spouses.
In some of these cases, innocent explanations may exist e.g. a man may be
talking to his neighbor or student, or a man new to the city may be asking
strangers for directions etc. If we are to assume that the photographed behavior
reveals no wrongdoing, it could be argued that dissemination of the image alone
without a false or misleading counterfactual explanation attached would not in
itself violate the right to an image. Any offensive interpretation would then rest
upon the viewer’s own discretion or imagination, rather than at the instigation
of the image disseminator. In contrast, however, at least in the ECHR context,
such image disseminations might well violate the Art 8 privacy rights.20
world.
Also falling within scenario two, albeit a slight variance from the above, would
involve a third party, such as a computer repair employee, accessing such images
while in the course of employment. The employee(s), often hiding behind the
veil of anonymity, might later upload the images onto the Internet. This was
thought to be how images spread of both a famous Hong Kong actor and Hunter
Biden (son of the US President).
In the American context, the core legal issues with respect to revenge pornog-
raphy have traditionally been twofold: 1) whether giving consent to a partner to
take an image also constitutes consent to him distributing that image and 2)
whether the First Amendment protects revenge pornography (Driscoll, 2016: p.
82).24
Although the problem may have abated somewhat in recent years, revenge
pornography has been a serious problem in the United States. One survey found
that ten percent of former partners threaten to post sexually explicit images after
breakup and sixty percent of this cohort later follow through (Eichorn, 2013).25
Even where there is no follow-through, many will live in fear that such exposure
will lead to loss of employment or relationships.
While many jurisdictions already prohibit non-consensual disseminations of
the pornographic image (generally under tort or criminal law), such laws will
often fail to prevent dissemination of the near-pornographic. For example, dis-
semination of images of bikini-clad women, surreptitiously captured in third
world go-go bars, will often lead to loss of face or even a risk of violence for the
women concerned. Yet, due to the high factual (nudity) threshold set under re-
venge pornography law, these women will often be left without a remedy.
Also falling within scenario two would be “hacking” that could result in image
capture (e.g. web cameras surreptitiously and remotely activated) or images sto-
len from one’s computer or smartphone etc. Here, the issue of the legality or
circumstance of the image capture itself will often pale as a priority: the victim’s
main concern may simply be to prevent image dissemination. As the right to an
image prioritizes the rights of image subjects over copyright holders, the onus
for establishing consent to disseminate would then fall upon the image dissemi-
nator.26 Under the implementing legislation, failure of a nefarious image dis-
seminator to prove such consent could be conceived as a criminal violation or a
tortious matter or both.
It is thus envisioned that the right to an image can protect against not only
scenario one but also scenario two and three type disseminations. Rather than a
piecemeal or enumerated list type approach (e.g. revenge pornography, hacking,
24
Sarah E. Driscoll, Supra note 30, at 82.
25
Based on a survey of 1182 American adults aged 18 - 54.
26
In devising the right to an image, it is worth considering the relationship between the copyright
holder and the image subject. Under copyright law, the general rule holds that the physical image is
the property of its creator (e.g. photographer or painter). However, revenge pornography laws impli-
citly recognize that intellectual property conceptualizations are not supreme: there are higher inter-
ests, implied interests, such as dignity, which sometimes must take priority.
consent.
Internet access is introduced. However, where the women are professional pros-
titutes it is unclear if they still have a reasonable expectation their images would
remain private (Driscoll, 2016: p. 107).
ing a story: such a plaintiff would not be entitled to recover (Prosser, 1960: p.
400).
Everyone has the right to freedom of opinion and expression; this right in-
cludes freedom to hold opinions without interference and to seek, receive
and impart information and ideas through any media and regardless of
frontiers. (UN General Assembly, 1948)
counting for twelve percent of such images. Amanda Levendowski, Supra note 52, at 424.
6. Conclusion
There can be no doubt that a basic sense of morality does exist within main-
stream society. Yet this universal value is often violated by the non-consensual
image disseminator in at least three specific contexts, as outlined above. What
unifies the three scenarios is that in all three there is a violation of the image
subject’s right to control against harmful disseminations of his or her image.
In theory, the regional and international instruments, such as the UDHR and
the ECHR, should offer adequate protection against these infringements, either
under the dignity or the privacy rubric. In practice, however, the dignity con-
ceptualization is often under-inclusive and fails to provide the same level of re-
putational protection as the right to an image would. In contrast, the privacy in-
terest is often over-protective, failing to recognize the nuance or subtlety re-
quired when distinguishing between the reputation-harmful and the reputa-
tion-harmless privacy infringement. In the long run, over-protection may be
almost as harmful as under-protection, insofar as the affected interest risks be-
coming trivialized.
In response to this quandary, in order to offer both the correct type and the
correct level of protection for image subjects, this paper has laid out, in skeleton
form, the right to an image. The formula developed to protect this interest is, in
many ways, a compromise. For some, it will swing the balance too far away from
freedom of expression and, for others, it will not swing it far enough. However,
Professor Solove, and the ECrtHR, show us that it is sometimes possible to find a
balance, despite the binary tendency of the law.
The “fundamentally untrue or unfair” formulation is designed to distinguish
between characteristic and uncharacteristic behavior of image subjects. Only
images of atypical unfortunate circumstances or uncharacteristic bad behavior
would be deserving of protection. Nonetheless, some will argue that no restric-
tions should ever be placed on the photographer operating in the public square
while others will argue that the photographer has no right to ever disseminate,
or perhaps even capture, images without consent. To upset both extremes sug-
gests perhaps a good balance has been found.
As technology such as facial recognition, digital identity and Central Bank
Digital Currencies (CBDC) continue to develop, privacy will increasingly be lost,
yet dignity need not be. The technology under which every face in a stadium can
be recognized and broadcast does not mean that every face should be. Under
circumstances where full spectrum images are taken, and the photographer dis-
seminates them without close examination, or instantaneously, or without the
mens rea of one who seeks to harm or humiliate, it is one thing. Yet, where he
disseminates with the intent to harm or humiliate, it is quite another. The mu-
nicipal authority may need to determine the duty of care.43
Confucius tells us that the beginning of wisdom is to call things by their true
name. For many years, the law has struggled to define the vague, yet heartfelt,
43
It is open to the implementing legislation to provide differentiated sanctions based on the duty of
care and the seriousness of the infringement. For example, a scenario one infringement could result
in merely a financial sanction whereas scenario two and three infringements would more likely be
deemed criminal matters.
Conflicts of Interest
The author declares no conflicts of interest regarding the publication of this pa-
per.
References
Ahmed, T. (2017, January 25). Jennifer Lawrence’s Nude Photo Hacker Sentenced to
Nine Months in Prison. Newsweek.
Anushka (2023, May 8). From 2024, You Won’t Need a Passport at Singapore Check-
points. Yahoo Life.
https://sg.style.yahoo.com/2024-won-t-passport-singapore-044153483.html
BBC (2019, September 19). Canada’s Justin Trudeau Cannot Say How Often He Wore
Blackface. https://www.bbc.com/news/world-us-canada-49763805
Beasley, K. M. (2006). Up-Skirt and Other Dirt: Why Cell Phone Cameras and Other
Technologies Require a New Approach to Protecting Personal Privacy in Public Places.
Southern Illinois University Law Journal, 31, 69-93.
Bloustein, E. J. (1964). Privacy as an Aspect of Human Dignity: An Answer to Dean
Prosser. NYU Law Review, 38, 962-1007.
Bradley, G. V. (2018). Prolegomenon on Pornography. Harvard Journal of Law & Public
Policy, 41, 447-498.
Buchan, R. (2016, August 3). Oil Workers’ Explicit Video: All Charges Dropped against
Ex-Wife. The Press and Journal.
https://www.pressandjournal.co.uk/fp/news/aberdeen-aberdeenshire/992034/charges-d
ropped-oil-workers-wife-accused-sending-lover-explicit-videos/
Burgess, M. (2022, August 5). All the Data Amazon’s Ring Cameras Collect about You.
Wired UK. https://www.wired.com/story/ring-doorbell-camera-amazon-privacy/
Burt, C. (2023, April 29). Digital Wallets Present Biometrics Providers with Another Po-
tential Next Big Thing. Biometric Update.
https://www.biometricupdate.com/202304/digital-wallets-present-biometrics-providers
-with-another-potential-next-big-thing
Calvert, C., & Brown, J. (2000). Video Voyeurism, Privacy, and the Internet: Exposing
Peeping Toms in Cyberspace. Cardozo Arts & Entertainment Law Journal, 18, 469-568.
Chafee Jr., Z. (1947). Do Judges Make or Discover Law. Proceedings of the American
Philosophical Society, 91, 405-420.
Chesney, R., & Citron, D. (2019). Deep Fakes: A Looming Challenge for Privacy, Democ-
racy, and National Security. California Law Review, 107, 1753-1819.
https://doi.org/10.2139/ssrn.3213954
Coleman, J. B. (2005). Digital Photography and the Internet, Rethinking Privacy Law.