The article is written to help voters, journalists and civic readers understand legal concepts and practical steps. It avoids legalese and points to official guidance and complaint routes for further action.
What is the right to privacy? Definition and legal context
The right to privacy protects individuals against arbitrary or unlawful interference with their personal life and personal data. International human-rights bodies and regional data-protection frameworks treat specific acts, such as interception or secret mass collection, as potential privacy violations under certain conditions, and they recommend legal safeguards and oversight to limit those harms UN Human Rights Council resolution.
In data-protection law, privacy-related claims are usually assessed through legal concepts about processing personal data, including who controls processing, what purpose is allowed, and whether the use is transparent and proportionate. The EU General Data Protection Regulation sets out these tests and the remedies that follow when the rules are broken GDPR text.
Stay informed and connected with Michael Carbonara’s campaign
See the 'Where to find help' section at the end for regulator links and official complaint pages if you think your privacy has been violated.
Core legal concepts include personal data, processing, controller and processor, and automated decision-making. These terms shape whether a fact pattern amounts to a privacy violation and which legal routes are available to a person who seeks redress.
How human-rights fits into human-rights and data-protection law is not identical across jurisdictions, but regional instruments like the Council of Europe Convention 108 and the GDPR provide widely used frameworks for identifying unlawful collection, disclosure and intrusive processing Council of Europe data-protection resources.
How data protection bills define violations: the core legal tests
Most modern data-protection laws use a set of core legal tests to decide whether processing is lawful. These include lawfulness of processing, purpose limitation, data minimisation, transparency, and accountability. When those principles are breached, regulators can impose administrative fines and courts can award civil remedies GDPR text.
Lawful basis is central. Lawful bases under GDPR-style regimes include consent, performance of a contract, legal obligation, vital interests, public task and legitimate interests. Consent differs from legitimate interest because consent requires a freely given, specific and informed agreement, while legitimate interest requires a balancing test.
Purpose limitation and data minimisation mean data collected for one purpose should not be repurposed without a lawful basis and minimal collection. A data protection bill that fails to require purpose clarity or that allows broad retention risks creating violations when data are later used in a way individuals did not expect.
Many national data-protection bills reference or align with Convention 108 and the European Data Protection Board’s guidance on automated processing and cross-border flows, because those instruments provide practical tests for when automated systems and cross-border transfers create legal risk EDPB materials.
International guidance on surveillance and state action
UN resolutions and rights-based mandates have repeatedly flagged interception, bulk surveillance and secret collection as actions that can violate privacy unless strict safeguards are in place. Those safeguards typically include a clear legal basis, necessity, proportionality and independent oversight UN Human Rights Council resolution.
International guidance stresses proportionality and supervision. Where state surveillance reaches large-scale or indiscriminate collection, the chances that the action will fail proportionality or necessity tests increase, creating a potential violation of the right to privacy.
Surveillance can affect personal data when it involves collection, interception or processing of identifiable information; whether it is a legal violation depends on factors like legal basis, proportionality and oversight.
When state action depends on private cloud or third-party processors, cross-border enforcement and attribution can be complicated, which is why modern instruments call for clearer rules on transfers and provider responsibilities Council of Europe data-protection resources.
Automated processing and profiling: what counts as a violation
Automated decision-making and profiling can become privacy violations when they occur without safeguards such as meaningful transparency, impact assessments and human oversight. The European Data Protection Board has published guidance that clarifies when profiling requires stricter measures and when it may trigger rights to contest or obtain human review EDPB guidance.
Convention 108 and related texts highlight cross-border flow and automated processing risks, encouraging states to require impact assessments and technical measures to reduce discriminatory outcomes or opaque profiling Council of Europe data-protection resources.
One concrete example is an algorithmic credit decision that uses undisclosed inputs and results in a poorer outcome for a protected group; without safeguards and suitable legal basis, such profiling is commonly cited as an unlawful or discriminatory practice under modern data-protection frameworks.
Concrete examples: common privacy violations in practice
Unauthorized collection: Gathering personal data without a lawful basis, such as scraping contact details and combining them with other records to create detailed profiles, is frequently treated as a privacy violation in guidance and law GDPR text.
Unlawful disclosure and data breach: When an organization exposes personal data without authorization, whether through poor security or deliberate disclosure, regulators often characterise that as a violation that may trigger breach notifications and corrective actions.
Covert or mass surveillance: Bulk interception or secret monitoring of communications can violate privacy rights when carried out without narrow, supervised legal authority and proportionality safeguards UN Human Rights Council resolution.
Intrusive workplace monitoring and covert tracking can be violations where employers collect far more data than necessary, lack transparency, or use monitoring to make automated decisions about staff without review.
Profiling and automated decision-making without safeguards is another common example. If systems make consequential choices without impact assessments, explanation or human oversight, regulators treating these as privacy law violations have recommended corrective measures EDPB guidance.
How individuals can seek remedies: complaints, fines and civil claims
Supervisory authorities can receive complaints, open investigations, and impose administrative fines where laws like the GDPR apply. Many countries also permit civil claims for damages when processing breaches legal duties GDPR text.
Regulatory complaint routes are practical first steps in many jurisdictions. Agencies such as the UK Information Commissioner’s Office publish step-by-step guidance for making complaints and reporting breaches ICO complaint guidance.
In the United States, consumer agencies like the Federal Trade Commission list reporting steps for identity theft and other privacy harms and may pursue enforcement in parallel with individual remedies FTC reporting steps.
Civil claims and criminal sanctions vary by law. Some breaches lead to private damages claims, while certain unlawful acts may carry criminal penalties depending on jurisdiction and the conduct involved.
Practical immediate steps: a reporter checklist for victims
Preserve evidence first. Save logs, screenshots, emails and any records that show what data was collected or shared and when. This step is essential for regulator complaints and civil claims ICO guidance.
Record dates and actors. Note when the event occurred, which systems were involved, and who you suspect accessed or disclosed the data. Identify the likely data controller and any processors tied to the incident.
A short checklist to preserve and report evidence
Use with regulator complaint pages
Check retention and consent records. Look for account settings, privacy notices and any consent forms that may clarify whether processing had a lawful basis. If notices are missing or inconsistent, note that for your complaint.
File a complaint with the relevant supervisory authority and consider legal counsel for civil claims and see the contact page. National authorities like the ICO and the FTC publish forms and step-by-step pages to guide complainants ICO complaint guidance.
How to assess responsibility: controller, processor and third parties
A data controller decides the purposes and means of processing. A data processor acts on behalf of the controller. Identifying which entity played each role helps name the right party in a complaint and focus requests for access or deletion GDPR text.
Cloud and platform settings can create shared responsibilities. A controller may remain responsible for legal compliance even when a third-party processor handles storage or analytics, although contracts and local law affect liability and enforcement.
Cross-border arrangements complicate remedies because differing rules on transfers and local enforcement can slow or limit regulator powers. Convention 108 and EDPB guidance address these allocation issues in part by encouraging clear contractual terms and transfer safeguards Council of Europe data-protection resources.
Decision criteria: applying proportionality, purpose limitation and transparency
To evaluate whether conduct likely amounts to a privacy violation, map the facts against tests for lawful basis, necessity and proportionality, purpose limitation, minimisation and transparency. Courts and regulators use these frameworks when deciding whether to find a violation GDPR text.
For instance, extensive tracking without clear notice would typically fail the transparency and purpose limitation tests and would likely be seen as disproportionate if less intrusive means existed.
Apply the tests step by step. First, ask whether a lawful basis exists. Second, check necessity and proportionality. Third, confirm whether the purpose matches the notice given to individuals. Fourth, verify that the amount of data collected is minimal for the stated purpose.
Cross-border enforcement and open questions for cloud and AI-driven harms
Cross-border enforcement remains an unresolved challenge, especially where data reside in multiple jurisdictions or where cloud providers operate internationally. National authorities have limited reach outside their territory and often rely on cooperation mechanisms to enforce decisions Council of Europe data-protection resources.
AI-driven harms add complexity because automated systems can combine data sources and produce unexpected profiling outcomes that cross borders. Harmonising remedies and enforcement for these harms is an active concern in policy and legislative debates.
Many national data-protection bills under discussion reference Convention 108 or EDPB materials as a way to align domestic rules with international expectations, but legislative flux means outcomes and remedies can differ significantly across states.
Common mistakes and pitfalls for individuals and organisations
Do not delay reporting. Failing to preserve logs or screenshots can weaken regulator or civil claims, and may make it harder to establish timelines and scope when filing complaints ICO guidance.
Misidentifying the controller or overstating facts is also common. Before filing, try to confirm who controlled the processing and keep descriptions factual and document-based rather than speculative.
Organisations should avoid vague notices and weak minimisation practices. Poor documentation of legal bases and retention policies often attracts regulatory scrutiny and increases the risk the processing will be judged unlawful.
Short practical scenarios: applying the test to real situations
Scenario A: Covert workplace monitoring. An employer installs cameras and keystroke logging without clear notice. Apply the tests: is there a lawful basis, was the monitoring necessary and proportionate, and was there transparency? If answers are negative, filing a complaint with a supervisory authority is a common next step ICO complaint guidance.
Scenario B: Algorithmic profiling for credit decisions. A lender uses a model that weights non-transparent data and produces poorer outcomes for a protected group. Check for documented impact assessments, human review and a lawful basis for processing. Absence of safeguards can be a ground for regulatory action under EDPB guidance EDPB guidance.
Scenario C: Data breach. A service provider exposes user records due to insecure storage. Preserve logs, notify affected accounts, and file a regulator complaint while considering civil remedies. Many supervisory authorities have explicit breach-reporting rules and timelines that shape how cases proceed ICO complaint guidance.
Conclusion: next steps and where to find help
In short, core indicators of a privacy violation include lack of lawful basis, absent purpose limitation, excessive collection, opaque automated processing and secret or mass surveillance. Mapping conduct against the legal tests helps decide whether to pursue complaints or civil remedies GDPR text.
For practical help, consult supervisory authority guidance such as the ICO or FTC complaint pages and consider legal counsel when civil claims are appropriate. Remedies and enforcement timelines vary by jurisdiction, so expect different processes depending on where the processing occurred ICO complaint guidance.
Preserve evidence such as logs and screenshots, record dates and actors, identify the likely data controller, and file a complaint with the relevant supervisory authority while considering legal counsel for civil options.
Contact your national supervisory authority; in the UK consult the ICO and in the US consult the FTC. Many authorities publish step-by-step complaint and breach-reporting procedures.
Possibly. Many jurisdictions allow civil claims for damages where processing breaches legal duties, but outcomes depend on local law and the facts of the case; consider legal advice.
This piece does not provide legal representation. It aims to summarize public guidance and primary texts so readers can take informed next steps.
References
- https://undocs.org/A/HRC/RES/55/3
- https://eur-lex.europa.eu/eli/reg/2016/679/oj
- https://www.coe.int/en/web/data-protection
- https://www.edpb.europa.eu/our-work-tools/our-documents/guidelines/automated-decision-making-and-profiling_en
- https://www.edpb.europa.eu/our-work-tools/our-documents/topic/automated-decision-profiling_en
- https://www.edpb.europa.eu/system/files/2025-09/edpb_guidelines_202503_interplay-dsa-gdpr_v1_en.pdf
- https://ico.org.uk/make-a-complaint/
- https://www.ftc.gov/faq/consumer-protection/report-identity-theft
- https://michaelcarbonara.com/contact/
- https://michaelcarbonara.com/privacy/
- https://michaelcarbonara.com/issue/constitutional-rights/

