In an age of social media, businesses have become more aware of the sway that influential individuals (“influencers”) hold with their respective followers. A personal endorsement of a company or their product by an influencer, with a substantial follower count, may have an impact comparable to an extensive marketing campaign. While influencers hold greater autonomy to facilitate direct connections with brands they find appealing, they are also exposed to potential exploitation by businesses seeking to leverage their platform and influence. A company aligning itself with an individual without their knowledge or consent could be committing a violation of that individual’s personality rights.

 

The power of an individual’s goodwill

In a press conference during the 2022 FIFA World Cup, Cristiano Ronaldo removed a bottle of Coca-Cola placed next to him by event organisers. This simple act correlated with a $4 billion drop in Coca-Cola’s market value. While this act may not have been the sole reason for the drop, numerous commentators have highlighted it as an example of the tangible impact of the parasocial relationships developed between influential figures in society and their followers on social media and symbolic of the increased value of an individual’s influence.

Social media has enabled individuals to monetize the strong positive image, or goodwill, that they enjoy with their large follower bases, through licensing aspects of their image, names and likeness. ‘Goodwill’, in this context, refers to the trust that individuals have established with their followers over time. Akin to the goodwill which businesses develop with their customers, it is based on a relationship of trust developed through carefully crafted parasocial connections with their followers. It is inextricably linked to the reputation or standing of the individual on social media and has therefore become an intangible asset which is worthy of protection.

 

How does South African law protect this asset?

 In South Africa, ‘personality rights’ is the broad term which encompasses all of the unique identifiers attributed to an individual. These rights are protected under our law of delict and are further preserved within each individual’s constitutional rights to dignity and privacy. The principle underpinning personality rights is that an individual should be able to control the use and exploitation of aspects of their identity such as their name, image or likeness, these aspects being inherently linked to one’s dignity.

Where personality rights are infringed, the actio inuriurum, an action based in the law of delict, may be invoked to protect a person’s physical integrity, reputation and dignitas (i.e. one’s honour, privacy and identity). When invoking this remedy, the plaintiff needs to establish that the defendant had intended to produce the infringing act or publication and that this act resulted in an impairment of the plaintiff’s personality rights.

The Supreme Court of Appeal (“the SCA”) approved the use of this legal remedy in the case of Grütter v Lombard [2007] SCA 2 (RSA) 628/05 (“Grütter”), where it held that it was unlawful to use any aspect of an individual’s personality or identity for commercial purposes without their consent. Building upon the reasoning in Grütter, the SCA in Wells v Atoll Media (Pty) Ltd 2007 (4) SA 89 SCA  stated the following:

“the appropriation of a person’s image or likeness for the commercial benefit or advantage of another may well call for legal intervention in order to protect the individual concerned. That may not apply to the kinds of photographs or television images of crowd scenes which contain images of individuals therein. However, when the photograph is employed, as in this case, for the benefit of a magazine sold to make profit, it constitutes an unjustifiable invasion of the personal rights of the individual, including the person’s dignity and privacy.”

In summary, personality rights are infringed where an aspect of a person’s identity is used without their consent, for the purpose of misleading the public for commercial gain. In such a case the actio iniurium may be invoked by an individual to claim damages.

 

Practical protection

Therefore, when engaging individuals to market their goods or services, businesses should ensure that they conclude a written agreement, whereby they obtain explicit consent from the individual concerned. This agreement should state which aspects of the individual’s identity may be used, clearly outlining the terms and extent of the use of the individual’s personality rights in order to avoid any potential claims against them.

 

If you have any queries in connection with the above, please contact us here.

 

About the author

We use cookies to analyse website usage and other technical information to improve the functionality of our website   View more
Cookies settings
Accept
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active
This policy informs you how we will use your personal information, by using our services and/or website you consent to our use of your personal information for the purposes described herein.
  1. DEFINITIONS
  •  “PERSONAL INFORMATION”
    • Personal Information means information relating to an identifiable, living, natural person, and where it is applicable, an identifiable, existing juristic person, including, but not limited to, name and surname; identification number; physical address; contact information such as an email address and telephone number.
  • “DATA SUBJECT”
    • Data Subject means the person to whom personal information relates.
  • “RESPONSIBLE PARTY”
    • Responsible Party means a public or private body or any other person which, alone or in conjunction with others, determines the purpose of and means for processing personal information.
  • “IDENTIFICATION INFORMATION”
    • Identification Information means information that can be used to identify the data subject.
  • “COMPLIANCE INFORMATION”
    • Compliance Information means information that is needed by Dunsters Attorneys for us to be compliant with relevant laws including the Financial Intelligence Centre Act “FICA” and regulatory standards and government orders such as Anti-Money Laundering (AML), Know-Your-Client (KYC) and Counter-Terrorist Financing (CTF).
  •  “COMMUNICATION INFORMATION”
    • Communication Information includes all correspondence such as emails and messages.
  • “FINANCIAL INFORMATION”
    • Financial information means any information relating to payment of invoices, including but not limited to banking information and account details
  1. PERSONAL INFORMATION COLLECTED
  • We may collect website usage and other technical information such as details of your visits to our website through cookies and other tracking technologies. Cookies are small data files stored by your computer to help improve functionality or tailor information to provide visitors with more relevant pages.
  • The information we collect may include information provided to us through your initial correspondence, possibly including:
    • Name and Surname
    • Email address
    • Contact numbers; and/or
  • This may also include information that we may have requested, and you subsequently provided, including, but not limited to:
    • Compliance Information
    • Identification Information
    • Communication Information
    • Financial Information
    • Other Personal Information
  • Reasons for collection of your personal information will be explained to you when we collect/request the information. We may request certain personal information to comply with global industry regulatory standards, local regulatory standards or government orders.
  • You, the data subject, consent to our use of your information in line with this privacy policy and/or any terms of engagement you may sign with us. If you wish to revoke your consent, please email enquiries@dunster.co.za .
  1. ACQUISITION OF PERSONAL INFORMATION
  • We acquire information from you directly, save where accessible from publicly available sources.
  • Information may be collected through various platforms, including:
    • Our onboarding process with you
    • Email engagement
    • Telephonic engagement
    • In-person engagement
    • Cookies
  1. PURPOSE OF COLLECTION OF PERSONAL INFORMATION
    • Your personal information may be collected and saved on our system for the following purposes:
      • To enable us to provide legal services.
      • To send news, updates and marketing information.
      • To review job applications.
      • To comply with legal requirements
    • Your personal information will not be used for the following purposes:
      • We will never use your personal information for direct marketing purposes without your consent (you may opt-out of our newsletter at any time)
      • We will never disclose your personal information to another third party without permission from yourself, unless it is required for fulfilment of our legal services or as mandated by law.
  1. RIGHTS OF DATA SUBJECTS
  • Right of the data subject under the POPI Act include, but are not limited to:
    • Having access to their recorded personal information
    • Requesting correction or amendment to their personal information and to have information corrected or amended
    • Requesting deletion or destruction of personal information from the responsible party’s system
    • Objecting to the processing of personal information
    • Submitting a complaint to the Regulator regarding the alleged interference with the protection of the personal information of any data subject or submitting a complaint to the Regulator (POPIAComplaints@inforegulator.org.za)
    • Instituting civil proceedings regarding the alleged interference with the protection of their personal information.
  1. RETENTION OF RECORDS
  • We will retain your information for the period required by law.
  • Where we retain your contact information for any period other than may be prescribed by law, we retain this information to keep you updated of our various offerings and news. By not unsubscribing from newsletter, you consent to us retaining your personal information on our records indefinitely, for the purposes explained above, including, to keep you informed about news and updates pertaining to Dunsters Attorneys Inc.
  1. SECURITY AND DATA PROTECTION
  • We take reasonable technical and organisational measures to secure the integrity of your personal information and use accepted technological standards to prevent unauthorised access to or disclosure of your personal information, and protect your personal information from misuse, loss, alteration and destruction.
  • The measures that are taken in order to protect your personal information include:
    • Physical measures: access to physical copies of your information is controlled using strict protocol.
    • Electronic measures: firewalls and password protection
  1. DISCLAIMER AND USER OBLIGATIONS
  • While we will take all reasonable steps to ensure the security of your data and personal information according to industry standards, it is not possible to guarantee the complete security of all information provided at all times.
  • We will notify you as soon as reasonably practicable of any breach of security, loss of or damage to your personal information.
  • Data subjects are responsible for taking reasonable precautions to safeguard their personal information.
  • Although we endeavour to ensure your information is as correct as possible, you are responsible for notifying us of any changes to your data or personal information in respect of the services provided and/or your account with us.
  • We will not be held liable for losses of any nature which are due to incorrect data or personal information provided by users in respect of the service provided.
  • We will not be held liable for any loss or damage arising from a security breach or disclosure of your personal information or data, to the maximum extent permitted by law.
  • We shall not be liable for any damage or interruptions caused by any computer viruses or other malicious code that may affect your computer or other equipment, or any phishing, spoofing or other attack.
  • If you suspect that your personal information has been compromised, or that there has been unauthorised use of your email address by any person, or any other violations to the security of the website, please contact us.
Save settings
Cookies settings