Shobna Gulati and Others v MGN Ltd
Jurisdiction | England & Wales |
Judge | Mr Justice Mann |
Judgment Date | 21 May 2015 |
Neutral Citation | [2015] EWHC 1482 (Ch) |
Docket Number | Case No: Ashworth — HC14 F03184 Frost — HC14F03189 Gascoigne — HC14F03143 Gulati — HC – 2012 000102 Roche — HC14F01927 Taggart — HC14B01234 Yentob — HC14B01645 |
Court | Chancery Division |
Date | 21 May 2015 |
Mr Justice Mann
Case No:
Alcorn — HC14E07267
Ashworth — HC14 F03184
Frost — HC14F03189
Gascoigne — HC14F03143
Gulati — HC – 2012 000102
Roche — HC14F01927
Taggart — HC14B01234
Yentob — HC14B01645
IN THE HIGH COURT OF JUSTICE
CHANCERY DIVISION
Royal Courts of Justice
Rolls Building, 7 Rolls Buildings
London EC4A 1NL
Taylor Hampton for the 1st, 2nd and 7th Claimants;
Steel and Shamash for the 3rd and 6th Claimants
Hamlins LLP for the 4th Claimant
Clintons for the 5th Claimant
Atkins Thomson for the 8th Claimant and as Lead Solicitor
Mr Matthew Nicklin QC and Ms Alexandra Marzec (instructed by RPC LLP) for the Defendant
Hearing dates: 2 nd-6 th March, 9 th-13 th March, 19 th March, and 24 th-25 th March 2015
IMPORTANT NOTE — THE UNREDACTED JUDGMENT ON WHICH THIS IS BASED IS SUBJECT TO REPORTING RESTRICTIONS UNDER AN ORDER OF MR JUSTICE MANN DATED 21 ST MAY 2015. THIS JUDGMENT IS A PUBLICLY AVAILABLE VERSION OF THAT UNREDACTED JUDGMENT PUBLICATION OF THIS FORM OF JUDGMENT DOES NOT OF ITSELF INFRINGE THOSE REPORTING RESTRICTIONS
Case Nos:
Alcorn — HC14E07267
Ashworth — HC14 F03184
Frost — HC14F03189
Gascoigne — HC14F03143
Gulati — HC – 2012 000102
Roche — HC14F01927
Taggart — HC14B01234
Yentob — HC14B01645
Table of Contents
I — INTRODUCTORY Introduction | Paragraph: 1 |
What phone hacking is | 6 |
The general nature of the claims | 12 |
The openings | 17 |
Admissions and apologies | 19 |
Witnesses | 30 |
II — THE GENERAL FACTUAL BACKGROUND The general hacking background to all the claims in these actions | 35 |
The oral evidence of practices at the Mirror group | 40 |
Telephone data | 73 |
Invoices from private investigators | 79 |
PAYGM vouchers | 82 |
III — THE APPROACH TO THE EVIDENCE AND GENERAL FINDINGS Drawing inferences where the evidence has been lost or destroyed by one party — Armory v Delamirie | 85 |
Inferences from a failure to call witnesses | 97 |
Findings of fact in relation to phone hacking — generally | 98 |
Alleged shortcomings in the defendant's disclosure | 99 |
IV — THE LAW AND THE CORRECT APPROACH TO DAMAGES The basis of a damages claim | 108 |
One award per claimant or several? | 146 |
Simmons v Castle — whether 10% should be added to the damages | 160 |
Quantum in privacy claims | 167 |
Comparison with Vento | 185 |
Other areas relied on for guidance and conclusions | 200 |
Aggravated damages — principles and generally | 203 |
Mitigation of damages by the defendant | 216 |
V — THE CLAIMS IN THIS ACTION — GENERALLY The individual claims | 217 |
VI — THE INDIVIDUAL CLAIMS — THE DETAIL Mr Yentob | 234 |
Lauren Alcorn | 253 |
Robert Ashworth | 293 |
Lucy Taggart | 365 |
Shobna Gulati | 436 |
Mr Shane Roche | 481 |
Paul Gascoigne | 538 |
Sadie Frost | 600 |
Compensation generally | 702 |
The "disclosure" relief | 704 |
I — INTRODUCTORY
Introduction
This is a claim based fundamentally on infringements of privacy rights. The defendant is the proprietor of three newspapers — the Daily Mirror, the Sunday Mirror and The People. The claimants are persons in the public eye such as actors, sportsmen, or people with an association with such people. In one case (Mr Yentob) he held important posts in the BBC. In all cases the infringements of privacy rights were founded in what has become known as phone hacking, though there are also claims that confidential or private information was also obtained in other ways (principally from private investigators). In all cases except Mr Yentob's there is also a claim that infringements of privacy rights led to the publication of articles in the various newspapers just described, which articles were themselves said to be an invasion of privacy rights and which would not have been published but for the earlier invasions which provided material for them.
In the events which have happened these proceedings are now, in essence, an assessment of damages, since liability is in all cases conceded save that it is not conceded that a handful of articles were published as a result of phone hacking. The present 8 cases are brought before the court as part of managed litigation, in which a large number of similar claims have been brought. Other claims have been, or are to be, taken up to but not including disclosure but then stayed pending the outcome of these proceedings. Several prior cases have been settled. The professed aim of this trial is to ascertain the damages payable so that the damages can be fixed in these cases and some guidance given as to the damages payable in other cases.
Although this trial is described as a trial to fix quantum, there is an important sense in which liability still remains to be determined. Although the defendant has admitted that there were illicit hacking activities conducted against all the claimants in these cases, and it is admitted that most of the articles were their product, the extent of those activities is not admitted. This is not a trial in which the only hacking activities that matter are those which resulted in published articles. The claims are also based on hacking which did not result in articles (of which, on any footing, there was a substantial amount). It is necessary to reach conclusions on the level and intensity of that hacking in order to determine that aspect of the claims. The defendant's concessions on liability do not enable one to make that assessment.
As well as a difference between the parties as to the level of hacking that went on, what underlies the difference between the parties on quantum is a fundamental disagreement as to what it is that compensation can and should be paid for. The defendant says that what the claimants are entitled to is damages for distress, and nothing more. That is said to provide a lower limit to the sums properly claimable and is also said to justify the methodology of computation adopted by the defendant, which is very different to the claimants'. It is not necessary to identify those differences at this point in the judgment but their stark effect can be seen from comparing the range of damages which the defendant's analysis would allow with the figures claimed by the claimants before any element of aggravation is added. The defendants' figures range from c£10,000 (Mr Yentob) to c£40,000 (Mr Gascoigne). The claimants' lowest figure claimed for damages is Miss Alcorn, whose claim is valued at £168,000, and the highest is Miss Frost's, which is £529,000. The claimants also claim an additional element of 100% of their respective damages by way of aggravated damages. The parties are therefore a very long way apart.
The claimants in this case were all represented by Mr Sherborne and Mr Reed. The defendant was represented by Mr Nicklin QC and Miss Marzec.
What phone hacking is
Although the colloquial expression "phone hacking" has for some time been used to describe the activities which lie at the heart of this case, (and I shall continue to use it) a more accurate description would be "mobile voice-message interception". It does not involve listening in to actual two-way phone conversations. It works in the following way.
A mobile telephone account comes with a voicemail box in which the account holder can receive, and listen to, voice messages left by callers when he or she does not answer the phone. The messages can be retrieved from the phone itself, or by ringing in from an outside line. The mailbox can be protected from an unauthorised person ringing and listening to voicemail messages by a PIN code. At the time of the events covered by this action some of the mobile phone companies had default PIN codes, and many users did not bother to change them (if indeed they knew that they existed). Other users changed the PIN codes but used codes that were predictable — perhaps consecutive numbers, or years of their birth or of others close to them. An unauthorised person who knew or could guess those PIN codes could use them to access another's voicemail account.
There were two ways in which an unauthorised person could access another's voicemail box. The trick is to get through to the voicemail system, and not the owner of the phone in person. If the owner answered the phone the hacker would not be in the voicemail system. So, unless one knows that the owner will not pick up (so that the call goes through to voicemail after a number of unanswered rings) one has to ring when one knows the phone line is in use so that the call goes through to voicemail. The first hacking technique produces this effect. It involves the use of two phones simultaneously. The technique was described by Mr Evans, one of the witnesses. The first phone was used to ring the telephone number of the victim. He would count to three and then use the second phone to dial the same number. Because a call was already being made the second phone was likely to go to the caller's voicemail box. Phone 1 was immediately disconnected, usually without actually ringing the receiving phone so as to alert the owner of the phone, so the owner would often not know that an attempt had been made to ring his or her phone. At that point the unauthorised caller could concentrate on the second phone, and the voicemail box. Once the voicemail system had responded the hacker could behave like the owner, and press keys which allowed the entry of a PIN, which in turn allowed access to the messages that had been left there. This, of course, required knowledge of the PIN, but because so many people never changed their PIN number from the default number...
To continue reading
Request your trial-
Paul Burrell v Max Clifford
...substantial (in the sense of being more than nominal or minimal) damages if [Mr Burrell] establishes the facts that he relies on". In Gulati v MGN Limited [2015] EWHC 1482 (Ch) ( "Gulati"), Mann J had earlier carried out an extensive review of earlier authorities, and made a careful analysi......
-
(1) Shakir Ali v Channel 5 Broadcast Ltd
...Article 8 rights. Damages The law 211 The leading authority on the assessment of damages in privacy claims is the decision of Mann J in Gulati v MGN Ltd [2015] EWHC 1482 (Ch), [2016] FSR 12 which was upheld by the Court of Appeal [2015] EWCA Civ 1291, [2017] QB 149. I do not propose to se......
-
Andrew Prismall v Google UK Ltd
...level of appropriate compensation, if the tort is established. In setting out the principles that he had applied in Gulati v MGN Ltd [2015] EWHC 1482 (Ch), [2016] FSR 12 (“ Gulati”) Mann J said at para 229: “(i) … certain types of information are likely to be more significant than others. ......
-
Richard Lloyd v Google LLC
...QC, leading counsel for Mr Lloyd, relied primarily on the decisions of Mann J and the Court of Appeal in Gulati v. MGN Limited [2015] EWHC 1482 (Ch) (Mann J), [2015] EWCA Civ 1291 (CA) (“ Gulati”) to argue that, if damages are available without proof of pecuniary loss or distress for the ......
-
Data Class Actions: Claim For Misuse Of Private Information Could Not Be Brought As "Opt-out" Representative Action
...recovered in misuse of private information for the loss of control of data, as established by the Court of Appeal in Gulati v MGN Ltd [2015] EWHC 1482 (Ch). The judge rejected the defendants' submission that the assessment of loss of control damages must necessarily be assessed on an indivi......
-
Lloyd v Google: A Good Day For Claimant Lawyers; A Bad Day For Google And Organisations Defending Privacy Group Litigation
...for organisations following a data breach or other breach of the European GDPR. Footnotes Lloyd v Google LLC [2019] EWCA Civ 1599 [2015] EWHC 1482 (Ch) (Mann The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about yo......
-
Risks of unlawful social media content: changes in UK defamation landscape and what you need to know
...press phone-hacking scandal, victims of hacking brought a civil case for invasion of privacy. This case, Gulati & Ors v MGN Limited [2015] EWHC 1482 (Ch) (21 May 2015), confirmed that damages are available for the invasion of privacy per se and for distress (without the need for consequenti......
-
The Wrong Tort in the Right Place: Avenues for the Development of Civil Privacy Protections in New Zealand
...2 WLR 1217 at [48]. Leave to appeal to the Supreme Court was denied: Gulati v MGN Ltd [2016] 1 WLR 2559. 54 Gulati v MGN Ltd (No 2) [2015] EWHC 1482, [2016] FSR 12 at [143]. 308 Canterbury Law Review [Vol 22, 2016] Perhaps unsurprisingly, it is the author’s respectful submission that this r......
-
The Standardisation of Tort Damages
...of the court: see below for the argument that there was a future loss. (The samepoint applies to Mr Yentob.)39 Gulati vMGN Ltd [2015] EWHC 1482 (Ch), [2016] FSR 12 at [111].© 2020 The Author.The Modern Law Review © 2020 The Modern Law Review Limited.(2021) 84(1) MLR 2–29 17 The Standardisat......