WHEN PRIVACY BECOMES RISK-BASED: THE SUPREME COURT’S DECISION IN GORNI V VODAFONE

 INTRODUCTION

The recent decision of the Supreme Court in Gorni v Vodafone Ghana Ltd & Others signals an important shift in the constitutional understanding of privacy under Article 18(2) of the 1992 Constitution. In effect, it reflects a move toward a more risk-based conception of privacy, particularly in the context of SIM registration and digital identity systems.

At first glance, the case appears straightforward: an individual discovers that a telephone number has been linked to his Ghana Card without his consent and seeks constitutional redress. The concern is legitimate. In an era of mobile money, digital transactions and identity-linked services, the misuse of identity documents carries real risks.

However, beyond the facts lies a deeper legal issue. Did the Supreme Court determine the case within the proper constitutional framework required under Article 18(2) of the 1992 Constitution? Or did it expand the right to privacy beyond what that provision actually provides?

This article examines the decision of the Supreme Court in Gorni v Vodafone Ghana Ltd & Others (Civil Appeal No. J4/40/2025, delivered 25th February 2026), arguing that while the majority opinion by Prof. Mensa-Bonsu JSC identified a genuine concern about identity misuse within Ghana’s SIM registration system, it expanded Article 18(2)’s right to privacy beyond its textual limits. In doing so, the Court effectively recast privacy under Article 18(2) into a risk-based, informational framework not grounded in the Constitution’s specific protections of property, correspondence, or communication. In contrast, Dzamefe JSC’s dissent maintains constitutional discipline by requiring actual interference with enumerated interests, not merely risk of misuse. On a proper analysis, even if the claim is reframed within statutory data protection frameworks, the facts remain contestable, raising doubt as to whether any actionable breach is established.

THE CONSTITUTION AND THE RIGHT TO PRIVACY

Article 18(2) of the 1992 Constitution provides:

“No person shall be subjected to interference with the privacy of his home, property, correspondence or communication…”

This provision is not an open-ended guarantee of privacy. It is structured and specific, protecting identifiable and constitutionally enumerated interests:

privacy of property;
privacy of correspondence;
privacy of communication.

The constitutional question, therefore, is not whether there has been a general “breach of privacy,” but whether the facts disclose an interference with any of these specific protected interests, as defined in Article 18(2).

Privacy, in constitutional terms, is not merely anything that may be regarded as private. The Constitution itself defines, with precision, the categories of privacy it protects.

That distinction is fundamental. It marks the boundary between what properly constitutes a constitutional violation and what falls outside the scope of Article 18(2), however legitimate the underlying concern may be. It is against this constitutional framework that the appellant’s claim must be understood.

THE FACTS AND CLAIM OF THE APPELLANT

The appellant, a Vodafone subscriber, discovered that a number (0203618193) unknown to him had been linked to his Ghana Card without his consent. He further discovered that the number had subsequently been de-linked, again without his involvement.

He brought an action under Article 33 of the Constitution against the respondents, including Vodafone Ghana Ltd, alleging a violation of his right to privacy under Article 18(2) of the Constitution, and sought declarations, disclosure of registration records, and damages.

It is important to emphasise that the claim was squarely constitutional, not statutory. The appellant did not rely on the Data Protection Act, 2012 (Act 843) but grounded his entire case on Article 18(2) as the basis of his claim. This choice of legal framework determines the scope and limits of the constitutional inquiry before the Court. It is this constitutional framing that shaped the issues before the Court and informed the reasoning of the majority.

THE DECISION OF THE SUPREME COURT (MAJORITY)

Against this background, the Supreme Court proceeded to determine the claim. The majority of the Supreme Court held that the appellant’s right to privacy had been breached and awarded damages. In reaching this conclusion, the Court focused on:

• the unauthorised linkage of the appellant’s identity to a SIM card;
• the risks associated with identity misuse;
• the responsibility of the respondents within the SIM registration system.

However, a critical difficulty arises. The majority, in effect, asked its own question—whether there had been a breach of a broad and evolving “right to privacy”, which can be understood as extending to a form of informational privacy—and answered that question correctly on its own terms. But that was not the constitutional question placed before the Court.

At this point, a legitimate question arises: if the majority asked the wrong constitutional question but answered it correctly on its own terms, what then were the real issues before the Court? The appellant’s claim was not an abstract appeal to a general right to privacy. It was a specific constitutional complaint under Article 18(2), requiring the Court to determine whether the facts disclosed an interference with the privacy of his property, communication or correspondence. That was the question the Court was called upon to answer—not whether there had been a broad or undefined breach of “privacy.”

At the same time, the majority’s approach may be understood as implicitly recognising informational privacy as an extension of the constitutional protection of communication, and as responding to the risks inherent in digital identity systems, where misuse of personal data may occur without direct interception or traditional forms of intrusion. On this view, the absence of proven misuse or harm may not be decisive, as the risk of identity misuse itself could justify constitutional protection in an increasingly digital environment.

However, while this reasoning is intuitively appealing, it lacks a clear anchor in the text and structure of Article 18(2). The constitutional provision requires an identifiable interference with specific protected interests, not a generalised concern with risk or potential harm. To treat informational privacy, or the risk of its violation, as falling within the scope of “communication” without clear textual grounding is to extend the provision beyond its defined limits. In that sense, the difficulty is not merely that the majority reached a broad conclusion, but that it did so by transforming the nature of the constitutional inquiry itself.

The effect of this reasoning is to introduce what may properly be described as a risk-based, informational privacy expansion of Article 18(2). The ratio decidendi—the legal principle upon which the decision rests—may be understood as holding that:

“Where an individual’s identity is linked to a SIM card without their consent, and that linkage exposes the individual to the risk of identity misuse, this constitutes a breach of the right to privacy under Article 18(2) of the Constitution, even in the absence of proven misuse or actual interference with property, correspondence, or communication.”

So framed, the decision departs from the traditional requirement of an identifiable interference with the privacy of property, communication or correspondence, and instead recognises a broader, risk-oriented conception of privacy grounded in the potential for data misuse. While this approach reflects a legitimate concern for the protection of personal identity in a digital environment, it extends the scope of Article 18(2) beyond its textual and structural limits, thereby transforming a provision defined by specific protected interests into one that accommodates a more generalised and evolving notion of privacy. This approach, however, was not unanimous.

THE DISSENTING VIEW – A TEXTUALLY FAITHFUL APPROACH

Dzamefe JSC, in dissent, approached the matter from a textually anchored constitutional standpoint. His analysis was grounded in three key points:

• the absence of any proprietary interest in the telephone number;
• the absence of any evidential basis for interference with communication or correspondence;
• the absence of any demonstrated harm or misuse.

The dissent insisted on fidelity to the constitutional text and declined to extend Article 18(2) beyond its defined scope. This approach is doctrinally significant. It recognises that while constitutional interpretation may be informed by broader policy considerations, and the Court may in appropriate cases adopt a purposive approach, such interpretive latitude must remain disciplined by the text and structure of the Constitution.

In that sense, the dissent does not reject constitutional evolution. Rather, it insists that such evolution must occur within the limits of the constitutional provision itself, and not by effectively transforming Article 18(2) into a free-standing and open-ended right to privacy.

At the same time, it must be acknowledged that this textually disciplined approach may give rise to legitimate concerns, particularly in relation to modern forms of informational intrusion and the misuse of personal identity in digital systems. Such harms may not always fit neatly within the traditional categories of property, communication or correspondence, yet they remain real and increasingly significant. However, this concern does not justify extending Article 18(2) beyond its text. Rather, it underscores the importance of resorting to the proper legal framework, including statutory regimes such as the Data Protection Act, 2012 (Act 843), which are specifically designed to regulate the collection, use and misuse of personal data. In this way, the protection of informational privacy can be effectively secured without distorting the structure and limits of the Constitution. The divergence between the majority and dissent ultimately reflects a deeper question about the proper limits of constitutional interpretation.

CONSTITUTIONAL INTERPRETATION: EVOLUTION WITHIN LIMITS

The Constitution is a living organism, as recognised by Justice Sowah in Tuffuor v. Attorney-General, and must adapt to changing realities. The Supreme Court is therefore empowered to interpret constitutional provisions purposively to address contemporary circumstances. However, this interpretive power is not unlimited. The critical distinction lies between legitimate interpretation and judicial creation, and the limit is reached where interpretation becomes creation.

A clear example of legitimate purposive interpretation is Article 18(2)’s protection of “communication.” While originally referring to letters and telephone calls, it naturally extends to emails, WhatsApp messages, and other digital forms. This is because the text protects “communication” without restricting the medium. The Court, in such instances, applies an existing right to new forms—it does not create a new right.

The present case is materially different. Article 18(2) protects privacy in respect of “property, correspondence or communication”—a defined set of interests. The majority’s reasoning treats the risk of identity misuse as sufficient to constitute a constitutional violation, even without interference with these categories. However, the Constitution does not expressly protect “information” or “identity” in the abstract, nor does “risk” equate to interference within the meaning of Article 18(2). This, in effect, introduces a form of risk-based informational privacy not grounded in the text of the Constitution.

The distinction is therefore clear: while digital messages fall within “communication,” the risk of identity misuse does not fall within “property, correspondence or communication.” Without adherence to these textual limits, there is no principled boundary to constitutional rights. If risk alone suffices, then risks of financial loss or reputational harm could equally be constitutionalised, effectively transforming courts into super-legislatures. Constitutional expansion, where necessary, should occur through the amendment process under Article 290, ensuring democratic legitimacy and predictability.

It is my position that the Constitution evolves within its textual structure, not beyond it. In this case, the majority treats the risk of identity misuse as a constitutional violation without any demonstrated interference with property, correspondence, or communication. This, in my view, is not an adaptation of an existing right—as in the extension of “communication” to digital forms—but the creation of a new protection not grounded in the text. It is on this basis that I align with the dissenting opinion. That interpretive question becomes particularly concrete when applied to the specific issue of whether a telephone number can constitute “property” within the meaning of Article 18(2).

TELEPHONE NUMBERS AND THE QUESTION OF OWNERSHIP

(A) International Position – ITU Framework

Globally, under the regulatory framework of the International Telecommunication Union (ITU), telephone numbers are not treated as private property but as national and public resources subject to regulatory control.

The ITU’s numbering principles make it clear that:

• numbering resources are finite public resources administered in the public interest;
• they are allocated by national regulators, not owned by end-users; and
• subscribers are granted only a right of use, which is non-transferable and revocable.

This framework is reflected across jurisdictions and forms the basis of modern telecommunications regulation. The legal consequence is straightforward and decisive:

A subscriber does not acquire any proprietary interest in a telephone number. The number remains part of a regulated national resource pool.

There is therefore no legal basis, within ITU-aligned systems, for treating a telephone number as private property capable of constitutional protection.

(B) Ghana Position

The position in Ghana is entirely consistent with the international framework. Under the Electronic Communications Act, 2008 (Act 775) and the regulatory authority of the National Communications Authority (NCA):

•numbering resources are owned and controlled by the State;
•they are allocated to network operators for management and assignment; and
• their use is subject to regulatory oversight in the public interest.

Specifically, Section 65 of Act 775 provides that:

“The Authority shall establish, control, and manage a National Electronic Communication Numbering Plan for network and applications services.”

This provision establishes that numbering resources constitute state property under the exclusive control of the NCA, not assets capable of private ownership.

The statutory framework further provides that:

• network operators receive number allocations under license conditions specified in Section 4(2)(u) of Act 775, which governs “the allocation to and use by the licensee of numbers”;
• subscribers possess usage rights protected by the Mobile Number Portability Regulations, 2011 (L.I. 1994), which permit portability between operators while maintaining state ownership of the underlying numbering resource; and
Section 6(1)(n) of Act 775 mandates that operators “provide number portability when required to do so,” reinforcing that numbers are regulatory instruments, not proprietary assets.

Critically, the legal regime makes it clear that the assignment of a number does not confer any proprietary interest on the end-user.

Further:

• subscribers cannot sell, transfer or commercially exploit telephone numbers as property;
• operators merely assign numbers for use, subject to regulatory conditions;
• and such assignments may be withdrawn, reassigned or modified in accordance with regulatory directives.

The legal position, both internationally and domestically, is therefore settled. A telephone number is not property, but a regulated public resource, the use of which is granted to subscribers on a conditional and revocable basis.

Accordingly, a claim grounded in the “privacy of property” under Article 18(2) of the Constitution, in respect of a telephone number, is fundamentally misplaced. The appellant had no proprietary interest in the disputed number 0203618193, which was linked to his Ghana Card without his knowledge or consent, and was subsequently de-linked.

While subscribers possess protected usage rights—indeed, usufructuary rights (rights to use but not own)—under L.I. 1994 and regulatory conditions, these do not constitute “property” within the meaning of Article 18(2). Moreover, on the facts before the Court, the appellant never actively used the disputed number, suffered no disruption to any service, and exercised no usage rights in respect of it.

The absence of any proprietary interest is therefore fatal to this limb of the claim, as it fails to satisfy a necessary constitutional precondition. It also reinforces the appropriateness of the dissenting approach.

This position is not merely doctrinal; it exposes a deeper interpretive divide in the Court’s reasoning. The majority’s approach reflects what may properly be described as an expansive or free-form purposivism, in which constitutional rights are extended beyond their explicit textual categories in response to evolving societal concerns.

The dissent, however, embodies a controlled or textually disciplined purposivism, which recognises that while the Constitution is a living organism, its interpretation must remain anchored within its language and structure.

Under Article 18(2), “privacy” is not a free-standing, abstract right, but one expressly tied to property, communication and correspondence. To detach privacy from these constitutionally defined categories is to transform interpretation into reconstruction.

The dissent’s rejection of a generalised privacy claim is therefore not a denial of constitutional evolution, but an insistence that such evolution must occur within the limits of the constitutional text itself. Even if the proprietary argument fails, the question of liability still turns on how the alleged linkage occurred in practice.

THE STAGE ONE REGISTRATION PROBLEM

A critical factual issue, which appears to have been insufficiently addressed by the majority, relates to the two-stage SIM registration process.

The evidence before the Court showed that:

Stage One involves merely linking a Ghana Card number to a SIM number;
• this stage can be completed by any person with access to the Ghana Card or its number;
• it does not require access to any internal database of the service provider.

Indeed, the respondents made it clear that:

• the process could be initiated without interaction with secure telecom systems;
no biometric verification occurs at that stage.

This has significant legal implications. If the initial linkage can be carried out by any person with access to the Ghana Card, then the act complained of does not necessarily involve any misuse of data within the respondents’ controlled systems.

This raises a fundamental evidential question: on what basis can liability be attributed to the respondents for a process that does not require access to their internal data infrastructure? In such circumstances, the chain of attribution and causation becomes legally uncertain, and the burden of establishing responsibility on the part of the respondents is correspondingly difficult to sustain.

However, Vodafone’s admission that its system automatically creates Vodafone Cash accounts upon Stage One completion, without verification or biometric confirmation, calls into question system design and the adequacy of safeguards against identity misuse within the respondents’ controlled infrastructure. This is more appropriately addressed through data protection and regulatory frameworks. These evidential uncertainties further underscore the difficulty of sustaining the claim within the framework of Article 18(2).

MISPLACED RELIANCE ON ARTICLE 18(2) OF THE CONSTITUTION

When the facts are tested against Article 18(2), the difficulties become clear.

(a) Privacy of Property

• The appellant had no proprietary interest in the number;
• this limb fails to satisfy a necessary constitutional requirement.

(b) Privacy of Communication or Correspondence

No evidence of any interception;
no evidence of monitoring of calls or messages;
• this limb also fails for lack of any evidential basis.

The core problem is that the majority avoided the real constitutional inquiry and instead relied on a generalised notion of privacy not expressly grounded in Article 18(2). In doing so, the Court applied a constitutional standard not grounded in Article 18(2) and expanded the right beyond its textual limits. The question therefore remains: even at its strongest, what right was in fact breached?

WHAT RIGHT WAS ACTUALLY BREACHED?

At best, the appellant’s complaint may be framed as a data protection concern. However, even this is not straightforward. Under the Data Protection Act, 2012 (Act 843), sections 17–20 impose obligations relating to transparency (section 17), lawful and fair processing (section 18), data minimality (section 19), and the requirement for a lawful basis for processing, including consent (section 20).

However, the application of these provisions to the present facts is not straightforward. The data used at the initial stage of registration consists of:

• name;
• date of birth.

These details are visible on the face of the Ghana Card and do not require access to any protected database. As acknowledged by the respondents, no access to internal subscriber data or biometric systems is required at Stage One, raising no obvious issue of excess under section 19.

More fundamentally, the evidence suggests that Stage One registration can be undertaken without access to the respondents’ systems, thereby creating uncertainty as to whether any “processing” can properly be attributed to them within the meaning of sections 17 and 18.

The question of consent under section 20 is equally complex. The appellant’s complaint appears to extend to both the linking and subsequent de-linking of the number. However, if the initial linkage was not undertaken at his instance, the subsequent de-linking may plausibly be characterised as a corrective or remedial step, rather than an independent act requiring separate consent. In such circumstances, the absence of consent does not operate in a straightforward manner, and its attribution to the respondents becomes legally uncertain.

Accordingly, any alleged breach of data protection principles is, at best, contestable. This reinforces the point that no clear constitutional right under Article 18(2) was established, even when the appellant’s case is considered at its strongest formulation. It is in this context that the broader implications of the majority’s reasoning become apparent.

THE DANGER OF CONSTITUTIONAL OVERREACH

The broader implication of the majority’s reasoning is significant. By elevating the risk of identity misuse—absent any demonstrable interference with property, communication, or correspondence—into a constitutional violation, the Court effectively expands Article 18(2) beyond its defined limits.

If such an approach is sustained, it risks blurring the distinction between constitutional rights and statutory or regulatory obligations, particularly in areas such as data protection. Courts may increasingly be drawn into adjudicating matters more appropriately addressed within specialised regulatory frameworks, thereby altering the nature of constitutional adjudication itself.

More fundamentally, a risk-based conception of privacy that is not grounded in the specific categories protected under Article 18(2) creates uncertainty about the scope of constitutional rights. Without clear limiting principles, the boundaries of constitutional protection become difficult to define, and the coherence of constitutional interpretation correspondingly weakened.

IMPLICATIONS

For the Judiciary: This decision underscores the role of courts in bridging the gap between existing legal frameworks and rapidly evolving technological realities. As the law often lags behind technological change, courts may extend constitutional provisions to new contexts, as seen in the recognition of digital forms such as emails and WhatsApp messages as “communication.” However, such adaptation must remain anchored in the constitutional text. Where this balance is not carefully maintained, there is a risk of creating parallel and inconsistent standards between traditional and digital contexts, leading to doctrinal uncertainty.

For Telecommunications Operators: Liability may arise without proof of causation, control, or system involvement, extending responsibility to processes outside operational systems and reflecting a risk-based model of liability that leaves little room to distinguish between operational fault and external misuse.

For the Legal System: There is a blurring of lines between:

  • constitutional law
  • data protection law
  • regulatory enforcement

creating confusion about both the applicable legal framework and the roles of the institutions responsible for enforcing it.

For Policy Makers and Regulators: The majority decision, in effect, adopts a zero-tolerance posture toward the risk of wrongful identity linkage within the SIM registration framework. Where liability may arise even in the absence of proven misuse, causation, or system control, regulators are compelled to ensure that registration processes are structured in a manner that does not permit such linkages to occur at all, particularly at the initial stages. This places a heightened obligation on system design and oversight, and underscores the need for robust SIM registration reform and strengthened data governance frameworks that eliminate vulnerabilities capable of enabling unauthorised identity linkage.

These concerns are not merely theoretical; they carry significant institutional and regulatory consequences.

CONCLUSION

The decision of the Supreme Court in Gorni v Vodafone reflects a legitimate and commendable concern for the protection of personal identity in an increasingly digital and interconnected environment. There is no doubt that the misuse of identity documents, particularly in the context of SIM registration and mobile money services, presents real and potentially serious risks. However, constitutional adjudication must remain anchored in the text, structure, and intent of the Constitution.

Article 18(2) does not establish a free-standing, open-ended right to privacy. It protects specific interests—the privacy of property, communication, and correspondence. The appellant’s claim, as framed, required him to demonstrate an interference within one or more of these constitutionally defined categories. On the facts, that burden was not discharged.

A telephone number is not property. There was no evidence of interference with communication or correspondence. The linking of the number at the preliminary stage of registration, which could be undertaken by any person with access to the Ghana Card and without recourse to any internal database of the service provider, further weakens the attribution of liability to the respondents. Even when viewed through the lens of data protection, the alleged breach is not as straightforward as presented.

In these circumstances, the majority’s approach—though well-intentioned—effectively broadened the constitutional right beyond its textual limits, substituting a generalised notion of privacy for the specific guarantees under Article 18(2). In doing so, the Court asked a broader question than the Constitution required and, unsurprisingly, arrived at a correspondingly broader answer. This reflects, in effect, a shift toward a risk-based and informational conception of privacy under Article 18(2)—one that, while responsive to modern concerns, remains difficult to reconcile with the constitutional text and structure.

The dissenting opinion of Dzamefe JSC, in contrast, remains firmly grounded in constitutional principle. It recognises that not every irregularity in a regulatory process, nor every perceived misuse of identity, rises to the level of a constitutional violation. It insists, correctly, that claims brought under Article 18(2) must be tested against the actual rights protected by that provision.

Ultimately, the protection of personal data is vital and must be robustly enforced. But that enforcement must occur through the proper legal framework. Where the facts disclose, at best, a contestable issue of data protection compliance, it is to the statutory regime—not the Constitution—that recourse should properly be had, including frameworks such as the Data Protection Act, 2012 (Act 843).

In that regard, the dissent does not diminish the importance of privacy. Rather, it preserves the integrity of constitutional adjudication by ensuring that the right questions are asked before answers are given. As a digital rights advocate, I fully recognise the importance of robust privacy protections in an increasingly digital society. However, the majority’s decision, in my respectful view, does not advance that objective. By extending constitutional protection beyond its textual limits and on facts that do not disclose a cognisable violation under Article 18(2), the Court not only risks doctrinal uncertainty but, more fundamentally, reaches a conclusion that is difficult to sustain on the facts of the case. In that sense, while well-intentioned, the decision ultimately falls short.

Comments

Popular posts from this blog

“LEARNED” NO MORE?: AI AND THE QUIET REVOLUTION IN LEGAL PRACTICE

LEGAL ISSUES IN E-COMMERCE WEBSITE DEVELOPING IN GHANA: OWNER BEWARE

RETHINKING LEGAL EDUCATION IN GHANA: IT’S NOT JUST ABOUT THE LAW