![]() |
[Home] [Databases] [World Law] [Multidatabase Search] [Help] [Feedback] | |
England and Wales High Court (Queen's Bench Division) Decisions |
||
You are here: BAILII >> Databases >> England and Wales High Court (Queen's Bench Division) Decisions >> Underwood & Anor v Bounty UK Ltd & Anor [2022] EWHC 888 (QB) (13 April 2022) URL: http://www.bailii.org/ew/cases/EWHC/QB/2022/888.html Cite as: [2022] EWHC 888 (QB), [2022] ECC 22 |
[New search] [Printable PDF version] [Help]
QUEEN'S BENCH DIVISION
MEDIA & COMMUNICATIONS LIST
Strand, London, WC2A 2LL |
||
B e f o r e :
____________________
(1) Pamela Underwood (2) Dominic Underwood (a child by Pamela Underwood his litigation friend) |
Claimants |
|
- and - |
||
(1) Bounty UK Limited (2) Hampshire Hospitals NHS Foundation Trust |
Defendants |
____________________
Nicola Atkins (instructed by DAC Beachcroft Claims Ltd) for the Second Defendant
The First Defendant did not attend and was not represented
Hearing dates: 11-12 January 2022
____________________
Crown Copyright ©
The Honourable Mr Justice Nicklin :
A: The Parties
B: Information Commissioner investigation into Bounty
C: Events giving rise to the claim
i) employees of Bounty would attend hospitals to distribute Bounty Packs;
ii) the Second Defendant would "use its best endeavours to maximise the distribution of the Pregnancy Information Folders" and provide daily access to Bounty employees to carry out activities under the agreement;
iii) Bounty agreed to use information provided "in strict accordance with the Data Protection Act to mail product information and offers to mothers who express a wish to receive such mailings from Bounty and other reputable companies"; and
iv) subject to an upper limit, Bounty would pay 80p to the Second Defendant for each Bounty Pack that was delivered.
i) Bounty would be given daily access to the hospital for the purpose of presenting a photography service at bedsides "and collecting mothers' name and address information to enable them mother to access the offers presented by Bounty";
ii) Bounty would provide "opt-out cards" for mothers to confirm if they would prefer not to see a Bounty employee;
iii) all data and information would be "held in strict accordance with the Data Protection Act 1998";
iv) the Second Defendant would not permit any competitive photography service; and
v) subject to an upper limit, Bounty would pay £1.50 to the Second Defendant for each mother who received a photography presentation.
"1. COURTESY – Always introduce yourself each day at the maternity ward reception, and ask the ward staff to confirm which mums you can visit – it is imperative that mum has been seen by a midwife after giving birth before you visit.
…
5. PRIVACY – Respect mums' personal space at the bedside, stand far enough away for her not to feel crowded. If the curtains are drawn, NEVER draw them back or peep around the curtain without first informing mum that you are there and asking her if she would prefer to come back later.
…
7. DATA PROTECTION - Always ask mum if she wishes to give permission for her details to be shared with Bounty and other carefully selected companies. (Provision of mums' contact details and permission is NOT a condition for receiving the Bounty bag)
…
10. BOUNTY PORTRAIT – offer mums the opportunity to have a photo taken, take pride in offering the highest quality portrait possible, but NEVER pressure her to accept the offer or purchase at bedside.
REMEMBER – All Bounty Services are offered on the basis of choice and this code respects mums' freedom of choice.
D: The civil claim
E: The evidence at trial
F: Issues to be resolved
"The Trust made the Claimant's Private Information available to Bounty on 16 October 2017. It did so through its arrangements with Bounty whereby its employee was given access to the Claimants. Their information was available to be gathered either by way of the feeding chart and other medical notes in full view, and/or by knowingly allowing the Bounty employee to gather information from Pamela herself when she was exhausted, confused and unfit to make informed decisions about her data".
i) what information/data was contained in the documents that were stored at the end of the First Claimant's bed or thereabouts?
ii) what (if any) information/data was obtained from these documents by the Bounty representative?
iii) was the obtaining of that information either (a) a breach by the Second Defendant of the Data Protection Act 1998; and/or (b) a misuse of private information by the Second Defendant?
iv) if so, what remedies should the Court grant to the Claimants in respect of the breach(es)/misuse that has been established?
(1) What information/data was contained in the documents that were stored at the end of the First Claimant's bed or thereabouts?
(2) What (if any) information/data was obtained from these documents by the Bounty representative
(3) Was the obtaining of that information either (a) a breach by the Second Defendant of the Data Protection Act 1998; and/or (b) a misuse of private information by the Second Defendant?
"In order for there to be an 'act of communication', and consequently, an act of making available, it is sufficient, in the final analysis, that a work is made available to a public in such a way that the persons comprising the public may access it, from wherever and whenever they individually choose, irrespective of whether or not they avail themselves of that opportunity… The concept of an 'act of communication' refers, in that regard, to any transmission of the protected works, irrespective of the technical means or process used".
"[27] I accept that a 'misuse' may include unintentional use, but it still requires a 'use': that is, a positive action. In the language of art.8 ECHR (the basis for the MPI tort), there must be an 'interference' by the defendant, which falls to be justified. I have not overlooked the Claimant's argument that the conduct of DSG was 'tantamount to publication'. Although it was attractively presented, I do not find it persuasive. If a burglar enters my home through an open window (carelessly left open by me) and steals my son's bank statements, it makes little sense to describe this as a 'misuse of private information' by me. Recharacterising my failure to lock the window as "publication" of the statements is wholly artificial. It is an unconvincing attempt to shoehorn the facts of the data breach into the tort of MPI."