Where is the harm in a privacy violation: Calculating the damages afforded in privacy cases by the European Court of Human Rights

Research output: Contribution to journalArticleScientificpeer-review

Abstract

It has always been difficult to pinpoint what harm follows a privacy violation. What harm is done by someone entering your home without permission, or by the state eavesdropping on a telephone conversation when no property is stolen or information disclosed to third parties? The question is becoming ever more difficult to answer now that data gathering and processing initiatives have
grown and are no longer focused on specific individuals, but on large groups or society as a whole. What specific harm is done by the NSA and other intelligence
services gathering data on almost everyone or by the thousands of CCTV cameras registering the daily life of citizens on the corner of almost every
street? There has been a longstanding debate within the literature regarding whether ‘dignitary’ or ‘immaterial’ harm should be protected under the right to
privacy. Or should only harm that can be measured and quantified in monetary terms (economic harm) be taken into account? This article takes a descriptive
and statistical approach to provide an insight into what types of damages are awarded, how they are calculated, and how the damages relate to the type
of harm that is inflicted. It does so by analysing the damages awarded by the European Court of Human Rights with respect to privacy violations.
Original languageEnglish
Pages (from-to)322-351
Number of pages30
JournalJournal of Intellectual Property, Information Technology and E-Commerce Law: JIPITEC
Volume8
Issue number4
Publication statusPublished - 2017

Keywords

  • privacy
  • harm
  • damage
  • financial compensation
  • statistical analysis

Fingerprint

Dive into the research topics of 'Where is the harm in a privacy violation: Calculating the damages afforded in privacy cases by the European Court of Human Rights'. Together they form a unique fingerprint.

Cite this