Privacy: Privacy Is The Ability of An Individual or Group To Seclude Themselves or Information About
Privacy: Privacy Is The Ability of An Individual or Group To Seclude Themselves or Information About
Contents
1 Privacy aspects
o 1.1 Right to be let alone
o 1.2 Limited access
o 1.3 Control over information
o 1.4 States of privacy
o 1.5 Secrecy
o 1.6 Personhood and autonomy
o 1.7 Self-identity and personal growth
o 1.8 Intimacy
o 1.9 Personal privacy
o 1.10 Organizational
2 History
o 2.1 Technology
o 2.2 Internet
3 Actions which reduce privacy
o 3.1 Collecting information
o 3.2 Aggregating information
o 3.3 Information dissemination
o 3.4 Invasions
4 Right to privacy
o 4.1 Definitions
o 4.2 An individual right
o 4.3 A collective value and a human right
5 Protection
o 5.1 Free market versus consumer protection approaches
5.1.1 Australia
5.1.2 European Union
5.1.3 India
5.1.4 Italy
5.1.5 United Kingdom
5.1.6 United States
o 5.2 Privacy on the Internet
o 5.3 Privacy and location-based services
o 5.4 Privacy self-synchronization
6 Privacy paradox and economic valuation
o 6.1 The privacy paradox
o 6.2 The economic valuation of privacy
o 6.3 Selfie culture
7 See also
8 References
9 External links
o 9.1 Articles, interviews and talks
Privacy aspects
Right to be let alone
In 1890 the United States jurists Samuel D. Warren and Louis Brandeis wrote The Right to
Privacy, an article in which they argued for the "right to be let alone", using that phrase as a
definition of privacy.[1] There is extensive commentary over the meaning of being "let alone",
and among other ways, it has been interpreted to mean the right of a person to choose seclusion
from the attention of others if they wish to do so, and the right to be immune from scrutiny or
being observed in private settings, such as one's own home.[1] Although this early vague legal
concept did not describe privacy in a way that made it easy to design broad legal protections of
privacy, it strengthened the notion of privacy rights for individuals and began a legacy of
discussion on those rights.[1]
Limited access
Limited access refers to a person's ability to participate in society without having other
individuals and organizations collect information about them.[2]
Various theorists have imagined privacy as a system for limiting access to one's personal
information.[2] Edwin Lawrence Godkin wrote in the late 19th century that "nothing is better
worthy of legal protection than private life, or, in other words, the right of every man to keep his
affairs to himself, and to decide for himself to what extent they shall be the subject of public
observation and discussion."[2][3] Adopting an approach similar to the one presented by Ruth
Gavison[4] Nine years earlier,[5] Sissela Bok said that privacy is "the condition of being protected
from unwanted access by others—either physical access, personal information, or attention."[2][6]
Control over information
Control over one's personal information is the concept that "privacy is the claim of individuals,
groups, or institutions to determine for themselves when, how, and to what extent information
about them is communicated to others." Generally, a person who has consensually formed an
interpersonal relationship with another person is not considered "protected" by privacy rights
with respect to the person they are in the relationship with. [7][8] Charles Fried said that "Privacy is
not simply an absence of information about us in the minds of others; rather it is the control we
have over information about ourselves. Nevertheless, in the era of big data, control over
information is under pressure.[9]
States of privacy
Alan Westin defined four states—or experiences—of privacy: solitude, intimacy, anonymity, and
reserve. Solitude is a physical separation from others.[10] Intimacy is a "close, relaxed, and frank
relationship between two or more individuals" that results from the seclusion of a pair or small
group of individuals.[10] Anonymity is the "desire of individuals for times of 'public privacy.'"[10]
Lastly, reserve is the "creation of a psychological barrier against unwanted intrusion"; this
creation of a psychological barrier requires others to respect an individual's need or desire to
restrict communication of information concerning himself or herself.[10]
In addition to the psychological barrier of reserve, Kirsty Hughes identified three more kinds of
privacy barriers: physical, behavioral, and normative. Physical barriers, such as walls and doors,
prevent others from accessing and experiencing the individual.[11] (In this sense, "accessing" an
individual includes accessing personal information about him or her.)[11] Behavioral barriers
communicate to others—verbally, through language, or non-verbally, through personal space,
body language, or clothing—that an individual does not want them to access or experience him
or her.[11] Lastly, normative barriers, such as laws and social norms, restrain others from
attempting to access or experience an individual.[11]
Secrecy
Privacy is sometimes defined as an option to have secrecy. Richard Posner said that privacy is
the right of people to "conceal information about themselves that others might use to their
disadvantage". [12][13]
In various legal contexts, when privacy is described as secrecy, a conclusion if privacy is secrecy
then rights to privacy do not apply for any information which is already publicly disclosed.[14]
When privacy-as-secrecy is discussed, it is usually imagined to be a selective kind of secrecy in
which individuals keep some information secret and private while they choose to make other
information public and not private.[14]
Personhood and autonomy
Privacy may be understood as a necessary precondition for the development and preservation of
personhood. Jeffrey Reiman defined privacy in terms of a recognition of one's ownership of his
or her physical and mental reality and a moral right to his or her self-determination.[15] Through
the "social ritual" of privacy, or the social practice of respecting an individual's privacy barriers,
the social group communicates to the developing child that he or she has exclusive moral rights
to his or her body—in other words, he or she has moral ownership of his or her body.[15] This
entails control over both active (physical) and cognitive appropriation, the former being control
over one's movements and actions and the latter being control over who can experience one's
physical existence and when.[15]
Alternatively, Stanley Benn defined privacy in terms of a recognition of oneself as a subject with
agency—as an individual with the capacity to choose.[16] Privacy is required to exercise choice.[16]
Overt observation makes the individual aware of himself or herself as an object with a
"determinate character" and "limited probabilities."[16] Covert observation, on the other hand,
changes the conditions in which the individual is exercising choice without his or her knowledge
and consent.[16]
In addition, privacy may be viewed as a state that enables autonomy, a concept closely connected
to that of personhood. According to Joseph Kufer, an autonomous self-concept entails a
conception of oneself as a "purposeful, self-determining, responsible agent" and an awareness of
one's capacity to control the boundary between self and other—that is, to control who can access
and experience him or her and to what extent.[17] Furthermore, others must acknowledge and
respect the self's boundaries—in other words, they must respect the individual's privacy.[17]
The studies of psychologists such as Jean Piaget and Victor Tausk show that, as children learn
that they can control who can access and experience them and to what extent, they develop an
autonomous self-concept.[17] In addition, studies of adults in particular institutions, such as
Erving Goffman's study of "total institutions" such as prisons and mental institutions,[18] suggest
that systemic and routinized deprivations or violations of privacy deteriorate one's sense of
autonomy over time.[17]
Self-identity and personal growth
Privacy may be understood as a prerequisite for the development of a sense of self-identity.
Privacy barriers, in particular, are instrumental in this process. According to Irwin Altman, such
barriers "define and limit the boundaries of the self" and thus "serve to help define [the self]."[19]
This control primarily entails the ability to regulate contact with others.[19] Control over the
"permeability" of the self's boundaries enables one to control what constitutes the self and thus to
define what is the self.[19]
In addition, privacy may be seen as a state that fosters personal growth, a process integral to the
development of self-identity. Hyman Gross suggested that, without privacy—solitude,
anonymity, and temporary releases from social roles—individuals would be unable to freely
express themselves and to engage in self-discovery and self-criticism.[17] Such self-discovery and
self-criticism contributes to one's understanding of oneself and shapes one's sense of identity.[17]
Intimacy
In a way analogous to how the personhood theory imagines privacy as some essential part of
being an individual, the intimacy theory imagines privacy to be an essential part of the way that
humans have strengthened or intimate relationships with other humans.[20] Because part of human
relationships includes individuals volunteering to self-disclose most if not all personal
information, this is one area in which privacy does not apply.[20]
James Rachels advanced this notion by writing that privacy matters because "there is a close
connection between our ability to control who has access to us and to information about us, and
our ability to create and maintain different sorts of social relationships with different people."[20]
[21]
Protecting intimacy is at the core of the concept of sexual privacy, which law professor
Danielle Citron argues should be protected as a unique form of privacy.[22]
Personal privacy
Physical privacy could be defined as preventing "intrusions into one's physical space or
solitude."[23] An example of the legal basis for the right to physical privacy is the U.S. Fourth
Amendment, which guarantees "the right of the people to be secure in their persons, houses,
papers, and effects, against unreasonable searches and seizures".[24]
Physical privacy may be a matter of cultural sensitivity, personal dignity, and/or shyness. There
may also be concerns about safety, if for example one is wary of becoming the victim of crime or
stalking.[25]
Organizational
Government agencies, corporations, groups/societies and other organizations may desire to keep
their activities or secrets from being revealed to other organizations or individuals, adopting
various security practices and controls in order to keep private information confidential.
Organizations may seek legal protection for their secrets. For example, a government
administration may be able to invoke executive privilege[26] or declare certain information to be
classified, or a corporation might attempt to protect valuable proprietary information as trade
secrets.[24]
History
Further information: Privacy laws of the United States
Privacy has historical roots in philosophical discussions, the most well-known being Aristotle's
distinction between two spheres of life: the public sphere of the polis, associated with political
life, and the private sphere of the oikos, associated with domestic life.[27] More systematic
treatises of privacy in the United States did not appear until the 1890s, with the development of
privacy law in America.[27]
Technology
Advertisement for dial telephone service available to delegates to the 1912 Republican
convention in Chicago. A major selling point of dial telephone service was that it was "secret", in
that no operator was required to connect the call.
As technology has advanced, the way in which privacy is protected and violated has changed
with it. In the case of some technologies, such as the printing press or the Internet, the increased
ability to share information can lead to new ways in which privacy can be breached. It is
generally agreed that the first publication advocating privacy in the United States was the article
by Samuel Warren and Louis Brandeis, "The Right to Privacy",[28] that was written largely in
response to the increase in newspapers and photographs made possible by printing technologies.
[29]
New technologies can also create new ways to gather private information. For example, in the
United States it was thought that heat sensors intended to be used to find marijuana-growing
operations would be acceptable. However, in 2001 in Kyllo v. United States (533 U.S. 27) it was
decided that the use of thermal imaging devices that can reveal previously unknown information
without a warrant does indeed constitute a violation of privacy.[30]
Internet
Main article: Internet privacy
The Internet has brought new concerns about privacy in an age where computers can
permanently store records of everything: "where every online photo, status update, Twitter post
and blog entry by and about us can be stored forever", writes law professor and author Jeffrey
Rosen.[31]
This currently has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters
and human-resource professionals now do online research about candidates, often using
information provided by search engines, social-networking sites, photo/video-sharing sites,
personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters
have rejected candidates based on internet information. This has created a need by many to
control various online privacy settings in addition to controlling their online reputations, both of
which have led to legal suits against various sites and employers.[31]
The ability to do online inquiries about individuals has expanded dramatically over the last
decade. Facebook for example, as of August 2015, was the largest social-networking site, with
nearly 1,490 million members, who upload over 4.75 billion pieces of content daily. Over 83.09
million accounts were fake. Twitter has more than 316 million registered users and over 20
million are fake users. The Library of Congress recently announced that it will be acquiring—
and permanently storing—the entire archive of public Twitter posts since 2006, reports Rosen.[31]
Importantly, directly observed behaviour, such as browsing logs, search queries, or contents of
the Facebook profile can be automatically processed to infer secondary information about an
individual, such as sexual orientation, political and religious views, race, substance use,
intelligence, and personality.[32]
According to some experts, many commonly used communication devices may be mapping
every move of their users. Senator Al Franken has noted the seriousness of iPhones and iPads
having the ability to record and store users' locations in unencrypted files,[33] although Apple
denied doing so.[34]
Andrew Grove, co-founder and former CEO of Intel Corporation, offered his thoughts on
internet privacy in an interview published in May 2000:[35]
Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet
culture is a force that wants to find out everything about you. And once it has found out
everything about you and two hundred million others, that's a very valuable asset, and people
will be tempted to trade and do commerce with that asset. This wasn't the information that people
were thinking of when they called this the information age.
Actions which reduce privacy
As with other concepts about privacy, there are various ways to discuss what kinds of processes
or actions remove, challenge, lessen, or attack privacy. In 1960 legal scholar William Prosser
created the following list of activities which can be remedied with privacy protection:[36][37]
1. Intrusion into a person's private space, own affairs, or wish for solitude[36]
2. Public disclosure of personal information about a person which could be embarrassing for
them to have revealed[36]
3. Promoting access to information about a person which could lead the public to have
incorrect beliefs about them[36]
4. Encroaching someone's personality rights, and using their likeness to advance interests
which are not their own[36]
Building from this and other historical precedents, Daniel J. Solove presented another
classification of actions which are harmful to privacy, including collection of information which
is already somewhat public, processing of information, sharing information, and invading
personal space to get private information.[38]
Collecting information
In the context of harming privacy, information collection means gathering whatever information
can be obtained by doing something to obtain it.[39] Surveillance is an example of this, when
someone decides to begin watching and recording someone or something, and interrogation is
another example of this, when someone uses another person as a source of information.[39]
Aggregating information
It can happen that privacy is not harmed when information is available, but that the harm can
come when that information is collected as a set then processed in a way that the collective
reporting of pieces of information encroaches on privacy.[40] Actions in this category which can
lessen privacy include the following:[40]
data aggregation, which is connecting many related but unconnected pieces of
information[40]
identification, which can mean breaking the de-identification of items of data by putting
it through a de-anonymization process, thus making facts which were intended to not
name particular people to become associated with those people[40]
insecurity, such as lack of data security, which includes when an organization is supposed
to be responsible for protecting data instead suffers a data breach which harms the people
whose data it held[40]
secondary use, which is when people agree to share their data for a certain purpose, but
then the data is used in ways without the data donors’ informed consent[40]
exclusion is the use of a person's data without any attempt to give the person an
opportunity to manage the data or participate in its usage[40]
Information dissemination
Count not him among your friends who will retail your privacies to the world.
— Publilius Syrus
Information dissemination is an attack on privacy when information which was shared in
confidence is shared or threatened to be shared in a way that harms the subject of the
information.[40]
There are various examples of this.[40] Breach of confidentiality is when one entity promises to
keep a person's information private, then breaks that promise.[40] Disclosure is making
information about a person more accessible in a way that harms the subject of the information,
regardless of how the information was collected or the intent of making it available.[40] Exposure
is a special type of disclosure in which the information disclosed is emotional to the subject or
taboo to share, such as revealing their private life experiences, their nudity, or perhaps private
body functions.[40] Increased accessibility means advertising the availability of information
without actually distributing it, as in the case of doxxing.[40] Blackmail is making a threat to share
information, perhaps as part of an effort to coerce someone.[40] Appropriation is an attack on the
personhood of someone, and can include using the value of someone's reputation or likeness to
advance interests which are not those of the person being appropriated.[40] Distortion is the
creation of misleading information or lies about a person.[40]
Invasions
Invasion of privacy, a subset of expectation of privacy, is a different concept from the collecting,
aggregating, and disseminating information because those three are a misuse of available data,
whereas invasion is an attack on the right of individuals to keep personal secrets.[40] An invasion
is an attack in which information, whether intended to be public or not, is captured in a way that
insults the personal dignity and right to private space of the person whose data is taken.[40]
An intrusion is any unwanted entry into a person's private personal space and solitude for any
reason, regardless of whether data is taken during that breach of space.[40] "Decisional
interference" is when an entity somehow injects itself into the personal decision making process
of another person, perhaps to influence that person's private decisions but in any case doing so in
a way that disrupts the private personal thoughts that a person has.[40]
Right to privacy
Main article: Right to privacy
Privacy uses the theory of natural rights, and generally responds to new information and
communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote
that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting
individuals. This citation was a response to recent technological developments, such as
photography, and sensationalist journalism, also known as yellow journalism.[41]
Definitions
In recent years there have been only few attempts to clearly and precisely define a "right to
privacy." Some experts assert that in fact the right to privacy "should not be defined as a separate
legal right" at all. By their reasoning, existing laws relating to privacy in general should be
sufficient.[42] It has therefore proposed a working definition for a "right to privacy":
The right to privacy is our right to keep a domain around us, which includes all those things that
are part of us, such as our body, home, property, thoughts, feelings, secrets and identity. The
right to privacy gives us the ability to choose which parts in this domain can be accessed by
others, and to control the extent, manner and timing of the use of those parts we choose to
disclose.[42]
An individual right
David Flaherty believes networked computer databases pose threats to privacy. He develops 'data
protection' as an aspect of privacy, which involves "the collection, use, and dissemination of
personal information". This concept forms the foundation for fair information practices used by
governments globally. Flaherty forwards an idea of privacy as information control, "[i]ndividuals
want to be left alone and to exercise some control over how information about them is used".[43]
Richard Posner and Lawrence Lessig focus on the economic aspects of personal information
control. Posner criticizes privacy for concealing information, which reduces market efficiency.
For Posner, employment is selling oneself in the labour market, which he believes is like selling
a product. Any 'defect' in the 'product' that is not reported is fraud.[44] For Lessig, privacy
breaches online can be regulated through code and law. Lessig claims "the protection of privacy
would be stronger if people conceived of the right as a property right", and that "individuals
should be able to control information about themselves".[45]
A collective value and a human right
There have been attempts to establish privacy as one of the fundamental human rights, whose
social value is an essential component in the functioning of democratic societies.[46] Amitai
Etzioni suggests a communitarian approach to privacy. This requires a shared moral culture for
establishing social order.[47] Etzioni believes that "[p]rivacy is merely one good among many
others",[48] and that technological effects depend on community accountability and oversight
(ibid). He claims that privacy laws only increase government surveillance by weakening
informal social controls.[49] Furthermore, the government is no longer the only or even principle
threat to people's privacy. Etzioni notes that corporate data miners, or "Privacy Merchants," stand
to profit by selling massive dossiers personal information, including purchasing decisions and
Internet traffic, to the highest bidder. And while some might not find collection of private
information objectionable when it is only used commercially by the private sector, the
information these corporations amass and process is also available to the government, so that it is
no longer possible to protect privacy by only curbing the State.[50]
Priscilla Regan believes that individual concepts of privacy have failed philosophically and in
policy. She supports a social value of privacy with three dimensions: shared perceptions, public
values, and collective components. Shared ideas about privacy allows freedom of conscience and
diversity in thought. Public values guarantee democratic participation, including freedoms of
speech and association, and limits government power. Collective elements describe privacy as
collective good that cannot be divided. Regan's goal is to strengthen privacy claims in policy
making: "if we did recognize the collective or public-good value of privacy, as well as the
common and public value of privacy, those advocating privacy protections would have a stronger
basis upon which to argue for its protection".[51]
Leslie Regan Shade argues that the human right to privacy is necessary for meaningful
democratic participation, and ensures human dignity and autonomy. Privacy depends on norms
for how information is distributed, and if this is appropriate. Violations of privacy depend on
context. The human right to privacy has precedent in the United Nations Declaration of Human
Rights: "Everyone has the right to freedom of opinion and expression; this right includes
freedom to hold opinions without interference and to seek, receive and impart information and
ideas through any media and regardless of frontiers."[52] Shade believes that privacy must be
approached from a people-centered perspective, and not through the marketplace.[53]
Protection
v
t
e
Substantive human rights
v
t
e
Media culture
Authority GND: 4123980-5
control NARA: 10643791
Categories:
Privacy
Privacy law
Human rights
Identity management
Digital rights
Navigation menu
Not logged in
Talk
Contributions
Create account
Log in
Article
Talk
Read
Edit
View history
Search
Main page
Contents
Featured content
Current events
Random article
Donate to Wikipedia
Wikipedia store
Interaction
Help
About Wikipedia
Community portal
Recent changes
Contact page
Tools
What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Wikidata item
Cite this page
In other projects
Wikimedia Commons
Wikiquote
Print/export
Download as PDF
Printable version
Languages
العربية
বাংলা
Español
हिन्दी
मराठी
Русский
తెలుగు
اردو
中文
Edit links
This page was last edited on 21 May 2020, at 00:37 (UTC).
Text is available under the Creative Commons Attribution-ShareAlike License;
additional terms may apply. By using this site, you agree to the Terms of Use and Privacy
Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-
profit organization.
Privacy policy
About Wikipedia
Disclaimers
Contact Wikipedia
Developers
Statistics
Cookie statement
Mobile view