Fallout from Phone Hacking – Do We Need Regulation?