Buscar

Understanding Privacy; 2010 - Daniel J Solove - Harvard University Press

Prévia do material em texto

D a n i e l J . S o l o v e
HARVARD U N I V E R S I T Y PRESS 
Cambridge, Massachusetts 
London, England 2008
Copyright © 2008 by the President and Fellows of Harvard Collegi 
All rights reserved
Printed in the United States of America
Library o f Congress Cataloging-in-Publication Data
Solove, Daniel J., 1972- 
Understanding privacy / Daniel J. Solove. 
p. cm.
Includes bibliographical references (p. ) and index. 
ISBN-13: 978-0-674-02772-5 (alk. paper) 
ISBN-10: 0-674-02772-8 (alk. paper)
1. Privacy. I. Tide.
BF637.P74S65 2008
155.9'2—dc22 2007032776
T o m y grandfather, C urtis
Contents
Preface
Privacy: A C o ncep t in D isarray 
Privacy: A n Issue o f Global Concern 2 
Technology and the Rising Concern over Privacy 
V The Concept o f Privacy 6 
^ /A New Theory o f Privacy 8
2 T h e o rie s o f Privacy and T h e ir Shortcom ings
'/M e th o d s o f C onceptualizing 13 - / 7i 
/ Conceptions o f Privacy 14 
/ I Can Privacy Be Conceptualized? 37
\ y R econstructing Privacy 2 J { y f
M ethod 41 - t,
G enerality 46 X *>
Variability 50 f *
Focus 67
4 •- T h e Value o f Privacy fa 'X {
The V irtues and Vices o f Privacy 79 
Theories o f the Valuation o f Privacy 84 l rc 
The Social Value o f Privacy 89 / X\
Privacy's P luralistic Value 98
ix
1
12
39
78
Contents
\J
\p A Taxonom y o f Privacy
Inform ation Collection 106 ' jt 
Inform ation Processing 111 
Injbrm ation Dissemination 136 * T,r 
Invasion 161
\ 6 /Privacy: A N ew U nderstanding
\ / The N ature o f Privacy Problems 174
Privacy and C ultural Difference 183 
The Benefits o f a Pluralistic Conception ofPrivacy 187 
The Future o f Privacy 196
N otes
Index
Mil/
101
171
199
247
Preface
For over a decade, the topic o f privacy has had a hold on me. I was at­
tracted to privacy issues because o f their im m ense complexity, philo­
sophical richness, and con tem porary relevance. W hen I first began 
exploring privacy issues, I sought to reach a definitive conclusion 
about w hat “privacy” is, bu t after delving in to the question, I was 
hum bled by it. I could n o t reach a satisfactory answer. T h is struggle 
ultim ately m ade m e recognize th a t privacy is a plurality o f different 
things and th a t the quest for a singular essence o f privacy leads to a 
dead end. T h e re is no overarching conception o f privacy— it m ust be 
m apped like terrain , by painstakingly studying the landscape. In my 
initial years o f studying privacy, I was no t yet ready to do the m ap­
ping. T h e only way to do so would be to becom e fully im m ersed in 
the issues.
Over the years, my understanding o f privacy grew, and I now believe 
that I am ready to set forth my theo ry o f privacy. Although I feel that 
my theory is m ature enough to take form in this book, it is but a snap­
shot o f one point in an ongoing evolutionary process. T heories are not 
lifeless pristine abstractions but organic and dynamic beings. T hey are 
m eant to live, breathe, and grow. T hroughou t their lifetimes, they will, 
it is hoped, be tested, doubted, criticized, amended, supported, and 
reinterpreted. Theories, in short, are no t m eant to be the final word, 
but a new chapter in an ongoing conversation.
This book is the product o f many years of conversations. Countless 
people have helped me shape my ideas, and this book would not have 
been possible without them. A project such as this—one that attempts 
to make sense of the sprawling and complex concept of privacy—cannot 
be created by one individual alone. M any people helped by providing 
insightful comments on the manuscript or portions thereof. Deserving 
special mention is Michael Sullivan, who has been a great friend and 
teacher. H is comments on this book have truly been indispensable. 
M any others contributed greatly to all or part o f this project: Michelle 
Adams, Anita Allen, Francesca Bignami, Julie Cohen, Deven Desai, 
Howard Erichson, Jim Freeman, Robert Gellman, Tim othy Glynn, 
Rachel Godsil, Stan Karas, Orin Kerr, Raymond Ku, Erik Lillquist, 
Chip Lupu, Jon Michaels, Larry Mitchell, M arc Poirier, Robert Post, 
Neil Richards, Alichael Risinger, Peter Sand, Heidi Schooner, Paul 
Schwartz, Richard St. John, Lior Strahilevitz, Charles Sullivan, Peter 
Swire, Robert Tsai, Robert Tuttle, Sarah Waldeck, Richard Weisberg, 
and James W hitman. I would also like to thank my research assistants, 
Jessica Kahn, Romana Kaleem, Poomima Ravishankar, Erica Ruddy, 
Sheerin Shahinpoor, John Spaccarotella, and Tiffany Stedman, for 
their excellent work. M atthew Braun deftly assisted me in the library, 
quickly tracking down any books and articles I needed. Additionally, I 
benefited from helpful comments on parts o f this book at workshops at 
Washington University Law School, the International Association of 
Privacy Professionals, and the American Philosophical Association Pa­
cific Division Annual Meeting. And lastly, Dean Fred Lawrence of the 
George W ashington University Law School graciously provided me 
with all the resources I asked for.
Portions of this book were adapted from the following articles: 
“Conceptualizing Privacy,” 90 California Law Review 1087 (2002); 
“T he Virtues o f Knowing Less: Justifying Privacy Protections against 
Disclosure,” 53 Duke Law Journal 967 (2003); and “A Taxonomy of 
Privacy,” 154 University o f Pennsylvania Law Review 477 (2006). In some 
cases, I have used only selected passages from the articles; in many 
cases, the text and argument o f the articles have been significantly 
reworked.
Understanding Privacy
Privacy: A Concept in Disarray
Privacy. U .S . Suprem e C o u rt Justice Louis Brandeis pronounced it 
“the m ost comprehensive o f righ ts and the righ t m ost valued by civi­
lized m en.”1 C om m entators have declared it “essential to dem ocratic 
governm ent,” critical to “our ability to create and m aintain different 
sorts o f social relationships w ith different people,” necessary for “per­
m itting and protecting an autonom ous life,” and im portan t for “em o­
tional and psychological tranquility.”2 I t has been hailed as “an integral 
part o f ou r hum anity,” the “heart o f ou r liberty,” and “the beginning o f 
all freedom .”3
Privacy, however, is a concept in disarray. N obody can articulate what 
it means. Currently, privacy is a sweeping concept, encompassing 
(among o ther things) freedom o f thought, control over one’s body, soli­
tude in one’s hom e, control over personal inform ation, freedom from 
surveillance, protection o f one’s reputation, and protection from 
searches and interrogations. Philosophers, legal theorists, and jurists 
have frequently lam ented the great difficulty in reaching a satisfying 
conception o f privacy.4 Legal scholar A rthur M iller has declared that 
privacy is “difficult to define because it is exasperatingly vague and 
evanescent.”5 “O n closer exam ination,” author Jonathan Franzen ob­
serves, “privacy proves to be the Cheshire cat o f values: n o t m uch sub­
stance, bu t a very w inning smile.”6 According to philosopher Julie In- 
ness, the legal and philosophical discourse o f privacy is in a state of
juutu
Realce
juutu
Realce
juutu
Realce
juutu
Realce
juutu
Realce
juutu
Realce
7 P rivacy: A C o n c e p t i n D isarray
“chaos.”7 Professor Hyman Gross asserts that “the concept of privacy is 
infected with pernicious ambiguities.”8 Political scientist Colin Bennett 
declares that “[ajttempts to define the concept o f ‘privacy’ have gener­
ally not met with any success.”9 According to legal theorist Robert Post, 
“Privacy is a value so complex, so entangled in competing and contra­
dictory dimensions, so engorged with various and distinct meanings, 
that I sometimes despair whether it can be usefully addressed at all.”10
Widespread discontent over conceptualizing privacy persists even 
though privacy is an essential issue for freedom and democracy. To 
beginto solve some of the problems of privacy, we must develop an ap­
proach to conceptualizing privacy to guide policymaking and legal in­
terpretation. Although a large body of law' pertains to privacy, it thus 
far has suffered numerous failures and difficulties in resolving privacy 
problems. Judges, politicians, businesspeople, government officials, 
and scholars have often failed to adequately conceptualize the prob­
lems that privacy law is asked to redress. Privacy problems are often 
not well articulated, and as a result, we frequently lack a compelling ac­
count of what is at stake when privacy is threatened and what precisely 
the law must do to solve these problems. The difficulty in articulating 
what privacy is and why it is important has often made privacy law in­
effective and blind to the larger purposes it must serve. Thus the need 
to conceptualize privacy is significant, but the discourse about concep­
tualizing privacy remains deeply dissatisfying.
In this book, I aim to bring clarity to privacy’s current conceptual 
muddle. I develop a new understanding of privacy that strives to ac­
count for privacy’s breadth and complexities without dissipating into 
vagueness. I endeavor to set forth a theory of privacy that will guide 
our understanding of privacy7 issues and the crafting of effective laws 
and policies to address them.
Privacy: An Issue of Global Concern
Privacy is an issue of profound importance around the world. In nearly 
ever}7 nation, numerous statutes, constitutional rights, and judicial de­
cisions seek to protect privacy. In the constitutional law of countries 
around the globe, privacy is enshrined as a fundamental right. Al­
though the U.S. Constitution does not explicitly mention the word 
“privacy,” it safeguards the sanctity of the home and the confidentiality
juutu
Realce
juutu
Realce
juutu
Realce
juutu
Realce
juutu
Realce
juutu
Realce
Privacy: A Concept in Disarray 3
o f com m unications from governm ent intrusion. T h e Supreme C ourt 
has concluded that the Fourth Amendment protects against government 
searches whenever a person has a “reasonable expectation o f privacy.”11 
Additionally, the Supreme C ourt has held that the Constitution pre­
serves a “zone o f privacy” encompassing decisions people make about 
their sexual conduct, birth control, and health, as well as protects their 
personal information against unwarranted disclosures by the govern­
m ent.12 M any states explicitly protect privacy in their constitutions.13
Beyond the U nited States, the vast majority o f nations pro tect p ri­
vacy in their constitutions. F o r example, Brazil proclaim s tha t “the pri­
vacy, private life, honor and image o f people are inviolable”; South 
Africa declares that “ [e]veryone has the righ t to privacy”; and South 
Korea announces tha t “the privacy o f no citizen shall be infringed.”14 
W hen privacy is no t directly m entioned in constitutions, the courts o f 
m any countries have recognized im plicit constitutional rights to pri­
vacy, such as Canada, France, Germany, Japan, and India.13
In addition, thousands o f laws protect privacy around the world. 
M ultinational privacy guidelines, directives, and frameworks have in­
fluenced the passage o f privacy laws in a vast num ber o f nations. In 
1980, the O rganization for Econom ic C ooperation and Developm ent 
(O E C D ) issued its Privacy Guidelines.16 In 1995, the European 
U n ion’s Directive on D ata Protection specified fundam ental principles 
for privacy protection in E urope.17 T h e Asia-Pacific Econom ic C oop­
eration (APEC), with over tw enty m em ber nations, set forth a Privacy 
Fram ew ork in 2004.18 N um erous countries have enacted extensive pri­
vacy protections, such as Canada’s Personal Inform ation Protection 
and E lectronic D ocum ents Act o f 2000, Japan’s Personal Inform ation 
Protection Law o f 2003, Australia’s Privacy Act o f 1988, and Ar­
gentina’s Law for the P ro tection o f Personal Data o f 2000, to nam e just 
a few. In the U nited States, hundreds o f laws at state and federal levels 
protect privacy. C ourts in m ost states recognize four torts to remedy 
privacy wrongs.19 Since 1970, the U.S. Congress has passed several 
dozen statutes to pro tect the privacy o f governm ent records, student 
records, financial inform ation, electronic com m unications, video 
rental data, and drivers’ records, am ong o ther things.20
Furtherm ore, privacy is recognized as a fundam ental hum an right. 
According to the U nited N ations Universal D eclaration o f H um an 
Rights o f 1948, “N o one shall be subjected to arb itrary interference
juutu
Realce
4 P r i v a c y : A C o n c e p t i n D i sa rr ay
with his privacy, family, home o r correspondence, nor to attacks upon 
his honor and reputation.”21 T h e European Convention o f Hum an 
Rights o f 1950 provides that “[ejveryone has the right to respect for his 
private and family life, his home and his correspondence.”22 T hus there 
appears to be worldwide consensus about the importance o f privacy 
and the need for its protection.
Beyond this outer layer o f consensus, however, lurks an underworld 
of confusion. W hat exactly is privacy? W hy is it w orth protecting? 
H ow valuable is it? Legal protections o f privacy depend upon a con­
ception o f privacy tha t informs w hat m atters are protected and the 
nature and scope o f the particular protections employed, b u t this un­
derlying conception o f privacy is often poorly theorized and rarely 
examined.
Technology and the Rising Concern over Privacy
Since antiquity, people in nearly all societies have debated issues o f pri­
vacy, ranging from gossip to eavesdropping to surveillance. T h e devel­
opm ent o f new technologies kept concern about privacy smoldering 
for centuries, but the profound proliferation o f new information tech­
nologies during the twentieth century—especially the rise o f the 
computer—made privacy erupt into a frondine issue around the world. 
Starting in the 1960s, the topic of privacy received steadily increasing 
attention.23 T h e discourse has ranged from popular writers to journal­
ists to experts in law, philosophy, psychology, sociology, literature, eco­
nomics, and coundess other fields. In 1964, journalist Vance Packard 
declared in his best-selling book The Naked Society that privacy was rap­
idly “evaporating.”24 T h a t same year, in another best seller, The Privacy 
Invade?‘s, author M yron Brenton declared that “we stand on the 
threshold o f what m ight be called the Age o f the Goldfish Bow l.^H e 
asked, “A couple o f generations hence, will some automated society 
look upon privacy with the same air o f amused nostalgia we now re­
serve for, say, elaborate eighteenth-century drawing room manners?”25 
In his 1967 book Privacy and Freedom, Professor Alan W estin noted “a 
deep concern over the preservation o f privacy under the new pressures 
from surveillance technology.”26 Psychologist Bruno Bettelheim ob­
served in 1968, “Everywhere one turns these days it seems that the 
right to privacy is constandy under assault.”27
juutu
Realce
juutu
Realce
Privacy: A Concept in Disarray 5
Today, the concern remains largely the same. Philosopher Thom as 
Nagel notes that there has been “a disastrous erosion o f the precious but 
fragile conventions o f personal privacy in the U nited States over the past 
ten o r twenty years.”28 Coundess comm entators have declared that pri­
vacy is “under siege” and “attack”; that it is in “peril,” “distress,” or 
“danger”; that it is “eroding,” “evaporating,” “dying,” “shrinking,” “slip­
ping away,” “diminishing,” o r “vanishing”; and that it is “lost” or 
“dead.”29 Legions o f books and articles have warned o f the “destruction,” 
“death,” o r “end” o f privacy.30 As Professor D eborah N elson has put it, 
“Privacy, it seems, is no t simply dead. I t is dying over and over again.”31
B ut n o t everyone is concerned.Some argue that despite what people 
say, their actions dem onstrate tha t they really do n o t w ant privacy at all. 
Jonathan Franzen notes, “T h e panic about privacy has all the finger- 
pointing and paranoia o f a good old American scare, bu t it’s missing one 
vital ingredient: a genuinely alarmed public. Americans care about pri­
vacy mainly in the abstract.”32 Although polls indicate that people care 
deeply about privacy, people routinely give out their personal informa­
tion and willingly reveal intim ate details about their lives on the In­
ternet. Law professor Eric G oldm an points out that people’s “stated 
privacy concerns diverge from w hat [they] do.”33 Canadian scholar 
Calvin G otlieb declares that “m ost people, when o ther interests are at 
stake, do n o t care enough about privacy to value it.”34
O thers contend tha t privacy can be socially detrim ental. According 
to law professor R ichard Epstein, privacy is “a plea for the righ t to mis­
represent one’s self to the rest o f the world.”35 Judge Richard Posner 
views privacy as giving individuals “power to conceal inform ation 
about themselves that others m ight use to [the individuals’] disadvan­
tage.”36 Legal scholar Fred C ate declares that privacy is “an antisocial 
c o n s tru c t. . . [that] conflicts w ith o ther im portant values within the so­
ciety, such as society’s in terest in facilitating free expression, preventing 
and punishing crim e, protecting private property, and conducting gov­
ernm ent operations efficiently.”37
T hus privacy is a fundam ental right, essential for freedom, democracy, 
psychological well-being, individuality, and creativity. I t is proclaimed 
inviolable but decried as detrim ental, antisocial, and even pathological. 
Some claim that privacy is nearing extinction; others argue that the 
threat to privacy is illusory.38 I t seems as though everybody is talking 
about “privacy,” but it is no t clear exactly what they are talking about.
juutu
Realce
juutu
Realce
6 P ri vacy : A C o n c e p t i n D isarray
The Concept of Privacy
Privacy violations involve a variety of types of harmful or problematic 
activities. Consider the following examples of activities typically re­
ferred to as privacy violations:
^ ■ A newspaper reports the name of a rape victim.39
• Reporters deceitfully gain entry to a person’s home and secretly 
photograph and record him.40
• New X-ray devices can see through people’s clothing, amounting to 
what some call a “virtual strip-search.”41
V • The government uses a thermal sensor device to detect heat 
patterns in a person’s home.42
• A company markets a list of five million elderly incontinent 
women.43
y • Despite promising not to sell its members’ personal information to 
others, a company does so anyway.44
Although these violations are clearly not the same, courts and policy­
makers frequently have a singular view of privacy in mind when they 
assess whether an activity violates privacy. As a result, they either con­
flate distinct privacy problems despite significant differences or fail to 
recognize a problem entirely. In short, privacy problems are frequently 
misconstrued or inconsistently recognized in the law.
Merely being more contextual about privacy, however, will not be 
sufficient to develop a fruitful understanding of privacy. In author 
Jorge Luis Borges’s illuminating parable “Everything and Nothing,” a 
gifted playwright creates breathtaking works of literature, populated 
with an unforgettable legion of characters, one after the other imbued 
with a unique, unforgettable personality. Despite his spectacular feats 
of imagination, the playwright lives a life of despair. He can dream up a 
multitude of characters—become them, think like them, understand 
the depths of their souls—yet he himself has no core, no way to under­
stand himself, no way to define who he is. His gift of assuming so many 
different personalities has left him with no identity of his own. At the 
end of the parable, before he dies, the playwright communicates his de­
spair to God:
juutu
Realce
Privacy: A Concept in Disarray 7
“I w ho have been so m any m en in vain w ant to be one and my­
self.” T h e voice o f the L ord answered from a whirlwind: “N either 
am I anyone; I have dream t the world as you dream t your work, 
m y Shakespeare, and am ong the forms in my dream are you, who 
like m yself are m any and no one.”45
Privacy seems to encompass everything, and therefore it appears to be 
noth ing in itself. O ne com m entator observed:
I t is apparent that the word “privacy” has proven to be a powerful 
rhetorical battle c ry in a plethora o f unrelated con tex ts .. . . Like 
the emotive word “freedom ,” “privacy” means so m any different 
things to so m any different people that it has lost any precise legal 
connotation that i t m ight once have had.46
Legal scholar Lillian BeVier writes, “Privacy is a cham eleon-like word, 
used denotatively to designate a wide range o f wildly disparate 
interests— from confidentiality o f personal inform ation to reproduc­
tive autonom y—and connotatively to generate goodwill on behalf o f 
whatever in terest is being asserted in its nam e.”4/ O th e r com m entators 
have lam ented tha t privacy is “protean” and suffers from “an em bar­
rassm ent o f m eanings.”48 “Perhaps the m ost striking th ing about the 
righ t to privacy,” philosopher Jud ith Jarvis T hom son has observed, “is 
that nobody seems to have any clear idea w hat it is.”49 
O ften, privacy problem s are m erely stated in knee-jerk form: “T h a t 
violates m y privacy!” W h en we contem plate an invasion o f privacy— 
such as having our personal inform ation gathered by companies in 
databases—we instinctively recoil. M any discussions o f privacy appeal 
to people’s fears and anxieties. Com m entators, however, often fail to 
translate those instincts in to a reasoned, w ell-articulated account o f 
why privacy problem s are harm ful. W hen people claim that privacy 
should be protected, it is unclear precisely w hat they mean. T h is lack 
o f clarity creates difficulty w hen m aking policy o r resolving a case be­
cause lawmakers and judges cannot easily articulate the privacy harm. 
T h e interests on the o ther side— free speech, efficient consum er trans­
actions, and security— are often m uch m ore readily articulated. C ourts 
and policymakers frequently struggle in recognizing privacy interests, 
and w hen this occurs, cases are dismissed o r laws are n o t passed. T h e
juutu
Realce
juutu
Realce
8 P r i v a c y : A C o n c e p t i n D i sa rr ay
result is that privacy is not balanced against countervailing interests. 
For example, in England, discontent over defining privacy led the 
Younger Com m ittee on Privacy to recommend in 1972 against recog­
nizing a right to privacy, as was proposed in legislation at the time. T he 
major difficulty in enacting a statutory protection o f privacy, the com­
m ittee’s report declared, is the “lack o f any clear and generally agreed 
definition o f what privacy itself is.” Courts would struggle in dealing 
with “so ill-defined and unstable a concept.”50 As a result, the legisla­
tion failed to pass.
Despite the wide-ranging body o f law that addresses privacy issues 
today, commentators often lam ent the law’s inability to adequately pro­
tect privacy.51 Moreover, abstract incantations o f “privacy” are no t nu- 
anced enough to capture the problems involved. In the U nited States, 
for example, the 9/11 Commission Report recommended that as govern­
m ent agencies engage in greater information sharing with each other 
and with businesses, they should “safeguard the privacy o f individuals 
about whom information is shared.”52 But what does safeguarding “pri­
vacy” mean? W ithout an understanding o f what the privacy problems 
are, privacy cannot be addressed in a meaningful way.
A New Theory of Privacy
T hereis a great need to understand privacy in a clear and comprehen­
sive manner. In this book, I set forth a new theory o f privacy. I begin in 
Chapter 2 by critiquing the existing attempts to conceptualize privacy 
by a wide array o f jurists, legal scholars, philosophers, psychologists, 
and sociologists. In examining these theories o f privacy, I survey the 
criticisms o f various scholars regarding each other’s conceptions o f pri­
vacy and suggest a num ber o f m y own criticisms. Almost all the criti­
cisms boil down to claims that the theories are too narrow, too broad, 
or too vague. M ore generally, many existing theories o f privacy view it 
as a unitary concept with a uniform value that is unvarying across 
different situations. I contend that with a few exceptions, traditional 
accounts o f privacy seek to conceptualize it in terms o f necessary and 
sufficient conditions. In other words, m ost theorists attem pt to define 
privacy by isolating a common denominator in all instances o f privacy. 
I argue that the attem pt to locate the “essential” o r “core” characteris­
tics o f privacy has led to failure.
Privacy: A Concept in Disarray 9
In C hap ter 3, I develop an alternative approach to conceptualizing 
privacy. T h e re are four dim ensions to my approach: (1) m ethod, (2) 
generality, (3) variability, and (4) focus. Regarding m ethod, I suggest 
abandoning the traditional way o f conceptualizing privacy and instead 
understanding it w ith Ludw ig W ittgenstein’s notion o f “family resem ­
blances.” W ittgenstein suggests tha t certain concepts m ight n o t have a 
single com m on characteristic; rather, they draw from a com m on pool 
o f sim ilar elem ents.53 Privacy, therefore, consists o f m any different yet 
related things.
In term s o f generality, I argue tha t privacy should be conceptualized 
from the bottom up ra ther than the top down, from particular contexts 
ra ther than in the abstract. All conceptions m ust exist a t some level o f 
generality, however, so m y theo ry generalizes beyond the myriad o f 
specific contexts.
Regarding variability, a workable theory o f privacy should account 
for the differing attitudes toward privacy across m any cultures. It 
should recognize that no tions about what inform ation o r m atters are 
private have evolved th roughou t history. A theory o f privacy, however, 
should avoid being too variable and contingent, o r else it will n o t have 
lasting o r widespread usefulness.
Finally, an approach to conceptualizing privacy m ust have a focus. I t 
needs to unravel the complexities o f privacy in a consistent manner; 
otherwise i t m erely picks a t privacy from m any angles, becom ing a dif­
fuse and discordant mess. Follow ing philosopher Jo h n Dewey’s view 
that philosophical inquiry should begin,as a response to dealing with 
life’s problem s and difficulties, I argue that the focal po in t should be on 
privacy problems.*4 W hen we p ro tect privacy, we p ro tec t against disrup­
tions to certain activities. A privacy invasion interferes w ith the in­
tegrity o f certain activities and even destroys o r inhibits some activities. 
Instead o f attem pting to locate the com m on denom inator o f these ac­
tivities, we should conceptualize privacy by focusing on the specific 
types o f disruption.
T herefore, m y approach to conceptualizing privacy understands it 
pluralistically ra ther than as having a unitary com m on denom inator. In 
focusing on privacy problem s, m y approach seeks to be contextual 
w ithout being overly tied to specific contexts, flexible enough to ac­
com m odate changing attitudes toward privacy, yet firm enough to re­
main stable and useful.
10 P r i v a c y : A C o n c e p t i n D i sarray
In Chapter 4, I contend that the value o f privacy must be deter­
mined on the basis o f its importance to society, not in terms o f indi­
vidual rights. M oreover, privacy does no t have a universal value that 
is the same across all contexts. T he value of privacy in a particular 
context depends upon the social importance o f the activities that it 
facilitates.
In Chapter 5, having laid out the general groundwork for what needs 
to be done to develop a theory o f privacy, I propose a taxonomy of 
privacy—a framework for understanding privacy in a pluralistic and 
contextual manner. T he taxonomy is grounded in the different kinds of 
activities that impinge upon privacy. I endeavor to shift the focus away 
from the vague term “privacy” and toward the specific activities that 
pose privacy problems. Additionally, the taxonomy is an attem pt to 
identify and understand the different kinds of socially recognized pri­
vacy violations, one that I hope will enable courts and policymakers to 
better balance privacy against countervailing interests. Ultimately, the 
purpose of this taxonomy is to aid the development o f the body of law 
that addresses privacy.
T he taxonomy consists of four principal groups of activities: (1) 
information collection, (2) information processing, (3) information dis­
semination, and (4) invasion. Each group encompasses a variety o f ac­
tivities that can create privacy problems. T he taxonomy is as follows:
1. Information collection
Surveillance
Interrogation
2. Information processing
Aggregation 
Identification 
Insecurity 
Secondary use 
Exclusion
3. Information dissemination
Breach o f confidentiality
Disclosure
Exposure
Increased accessibility 
Blackmail
Privacy: A Concept in Disarray 11
Appropriation 
Distortion
4. Invasion 
Intrusion
Decisional interference
In the chapter, I explain in depth each o f these types o f problems and 
why they can be problematic.
In C hapter 6 ,1 conclude by explaining the benefits o f understanding 
privacy with the taxonomic framework I have developed. I t is my hope 
that the theory o f privacy set forth in this book will clear the fog of 
confusion that often envelops the concept of privacy. A lucid, compre­
hensive, and concrete understanding of privacy will aid the creation of 
law and policy to address privacy issues. Far too often, the effective res­
olution o f privacy issues gets lost in navigating the conceptual 
labyrinth o f privacy. This book endeavors to guide us in understanding 
this bewildering terrain.
2
Theories o f Privacy 
and Their Shortcomings
W hat is “privacy”? This question is essential for making legal and 
policy decisions. Many recognize the importance of privacy for freedom, 
democracy, social welfare, individual well-being, and other ends. Many 
also assert that i t is worth protecting at significant cost. Society’s com­
m itm ent to privacy often entails restraining or even sacrificing inter­
ests of substantial importance, such as freedom o f speech and press, ef­
ficient law enforcement, and access to information. Balancing privacy 
against countervailing interests requires having some notion of what 
privacy is. W hen we protect “privacy,” what are we protecting?
T here is a vast literature attempting to address this question. Many 
philosophers, jurists, sociologists, and scholars in other fields have 
tried valiantly to develop a theory o f privacy, but m ost o f their en­
deavors have major shortcomings. Traditionally, theorists o f privacy 
have attempted to locate the essential elements common to the aspects 
o f life we deem “private” and then formulate a conception based on 
these elements. A robust discourse has developed about conceptual­
izing privacy, and a multitude o f different conceptions o f privacy have 
been proposed and critiqued.
Although the extensive scholarly and judicial writing on privacy has 
produced many different conceptions o f privacy, they can be classified 
into six general types: (1) the right to be let alone—Samuel W arren and 
Louis Brandeis’s famous formulation o f the right to privacy; (2) limited
13
access to the self—the ability to shield oneself from unwanted accessby 
others; (3) secrecy—the concealm ent o f certain m atters from others; 
(4) control over personal inform ation— the ability to exercise control 
over inform ation about oneself; (5) personhood— the protection o f 
one’s personality, individuality, and dignity; and (6) intimacy—control 
over, o r lim ited access to, one’s intim ate relationships o r aspects o f life.1 
T h e conceptions often overlap, bu t each has a distinctive perspective 
on privacy. In this chapter, I delve into the extensive literature on the 
subject, analyzing and critiquing the privacy conceptions set forth in 
judicial opinions and legal scholarship, as well as in works by philoso­
phers, psychologists, sociologists, and others. I dem onstrate that the 
different conceptions suffer from similar problems.
T h e m ost prevalent problem w ith the conceptions is that they are ei­
ther too narrow because they fail to include the aspects o f life we typi­
cally view as private o r too broad because they fail to exclude m atters 
tha t we do n o t deem private. Some conceptions even suffer from being 
both too narrow and too broad. T hese problems stem from the m ethod 
m ost theorists use to conceptualize privacy.
Theories o f Privacy and Their Shortcomings
Methods of Conceptualizing
A conception o f privacy is different from the usage o f the word “pri­
vacy.” T h e usage o f the word “privacy” constitutes the ways in which we 
employ the word in everyday life and the things we are referring to 
when we speak o f “privacy.” A conception o f privacy is an abstract 
mental picture o f what privacy is and what makes it unique and distinct.
U nder w hat I will refer to as the “traditional m ethod,” conceptual­
izing privacy is understood as an attem pt to articulate w hat separates 
privacy from other things and w hat identifies it in its various manifes­
tations. T h e purpose o f conceptualizing is to define the unique charac­
teristics o f privacy. Usage o f the word “privacy” m ust then be cleaned 
up to m atch the conceptual category o f privacy, because people can use 
the word “privacy” im properly by referring to things outside the con­
ceptual boundaries. G iven the great difficulties o f capturing everything 
referred to by “privacy,” the often-disparate ways tha t the word “pri­
vacy” is used, and the lack o f agreem ent over the precise m eaning of 
the word, m any scholars seek to establish criteria to distinguish “pri­
vacy” from other things. A few things m ight be left out, but the aim is
juutu
Realce
juutu
Realce
14 T h e o r i e s of P rivacy a nd T h e i r S h o r t c o m i n g s
to establish a conception that encompasses most things that are com­
monly viewed under the rubric of privacy.
Most attempts to conceptualize privacy thus far have followed the 
traditional method of conceptualizing. The majority of theorists con­
ceptualize privacy by defining it per genus et differentiam. In other 
words, theorists look for a common set of necessary and sufficient ele­
ments that single out privacy as unique from other conceptions.2 Al­
though the terminologies theorists employ differ, most theorists strive 
to locate the “essence” of privacy—the core common denominator that 
makes things private. The traditional method endeavors to conceptu­
alize privacy by constructing a category that is separate from other 
conceptual categories (such as autonomy or freedom) and that has 
fixed, clear boundaries so we can know when things fall within or out­
side the category.
Under the traditional method, conceptions of privacy are evaluated 
by determining their accuracy in capturing what privacy is and by their 
coherence—whether they are logical and consistent. Theorists often 
examine whether a conception of privacy includes the things we view as 
private and excludes the things we do not. For example, if a conception 
of privacy were to omit things we commonly view as private—such as 
medical information, intimate marital secrets, and freedom from 
surveillance—theorists would likely reject the conception. A successful 
conception thus aims to get close to the modem usage of the word 
“privacy,” yet maintain coherence by identifying a combination of 
common elements that are unique to privacy. This is certainly not the 
only way to evaluate conceptions of privacy, but it is the way most often 
used by theorists.
In the remainder of this chapter, I will examine the various attempts 
to conceptualize privacy and will demonstrate the shortcomings of 
these conceptions. Ultimately, the problem emerges from the fact that 
theorists are attempting to conceptualize privacy with the traditional 
method. They are seeking to isolate its core characteristics. Privacy, 
however, does not lend itself very well to this form of conceptualization.
Conceptions of Privacy
The philosophical and legal discourse about privacy has proposed nu­
merous conceptions in an attempt to capture the common denominator
Theories o f Privacy and Their Shortcomings 15
o f privacy. In this section, I will explore and analyze these conceptions. 
A lthough I am critical o f m ost conceptions o f privacy, I do n o t intend 
to imply tha t they are devoid o f m erit. In fact, m any o f the conceptions 
capture useful insights about privacy. Each o f them , however, has sig­
nificant lim itations if it is to serve as a conceptual account o f privacy.
The Right to Be Let Alone
In 1890, Samuel W arren and Louis Brandeis penned their famous ar­
ticle “T h e R ight to Privacy,” arguing for the legal recognition o f a 
righ t to privacy, which they defined as a “righ t to be let alone.”3 M any 
scholars have proclaim ed W arren and Brandeis’s article the foundation 
o f privacy law in the U nited States.4 O ne has called it the “m ost influ­
ential law review article o f all,” and another has observed that it “has 
attained w hat some m ight call legendary status.”5 I t has also been de­
scribed as “one o f the m ost brilliant excursions in the field o f theoret­
ical jurisprudence.”6 T h e influence o f W arren and Brandeis’s article 
cannot be questioned— the article brought significant attention to pri­
vacy, spawned a t least four com m on-law to rt actions to protect privacy, 
and fram ed the discussion o f privacy in the U nited States throughout 
the tw entieth century.7
W arren and Brandeis began by describing new technological devel­
opm ents tha t were posing a potential threat to privacy. T h ey observed 
tha t “ [ijnstantaneous photographs and newspaper enterprise have in­
vaded the sacred precincts o f private and dom estic life; and num erous 
mechanical devices th reaten to make good the prediction that ‘w hat is 
whispered in the closet shall be proclaimed from the house-tops.’ ”8 By 
“instantaneous photographs,” they were referring to the new snap 
cameras invented by Eastm an K odak Com pany in 1884. Before this in­
vention, photography was largely practiced by professionals, since 
cameras were large, expensive, and tim e consum ing to set up. Kodak’s 
new cameras were small and cheap, allowing anybody to become a 
photographer. In 1889, a year before W arren and Brandeis published 
their article, photography was so popular tha t it was referred to in 
newspapers as a “craze.”9
W arren and Brandeis were concerned n o t only w ith new technology 
but w ith how it would in tersect w ith the media. T h e press was highly 
sensationalistic a t the time. “T h e press is overstepping in every direction
juutu
Realce
juutu
Realce
16 T h e o r i e s o f P rivacy a n d T h e i r S h o r t c o m i n g s
the obvious bounds o f propriety and o f decency,” W arren and Brandeis 
wrote. “Gossip is no longer the resource o f the idle and o f the vicious, 
but has become a trade.”10 Indeed, the press was quite piquant. T he ad­
vent o f “yellow journalism” and cheap papers brim ming with lurid 
hum an-interest stories fueleda dramatic increase in newspaper circula­
tion. In 1850, only about 100 papers were read by 800,000 readers; by 
1890, the numbers had swelled to 900 papers being read by 8 million 
readers.11
“It is our purpose,” W arren and Brandeis declared, “to consider 
whether the existing law affords a principle which can properly be in­
voked to protect the privacy o f the individual; and, if it does, what the 
nature and extent o f such protection is.” T he authors argued that a 
right to privacy could be derived from the common law. W arren and 
Brandeis defined privacy as the “right to be let alone,” a phrase adopted 
from Judge Thom as Cooley’s famous treatise on torts in 1880.12 
Cooley’s right to be let alone was, in fact, a way o f explaining that at­
tempted physical touching was a to rt injury; he was not defining a right 
to privacy. W arren and Brandeis used the phrase to demonstrate that 
many o f the elements o f a right to privacy existed implicitly within the 
common law.
T he authors declared that the underlying principle o f privacy was 
“that o f inviolate personality.” T hey noted that the value o f privacy “is 
found not in the right to take the profits arising from publication, but 
in the peace o f mind or the relief afforded by the ability to prevent any 
publication at all.” W hile the law o f defamation protected injuries to 
reputations, privacy involved “injury to the feelings.” W arren and 
Brandeis argued that the “common law secures to each individual the 
right o f determining, ordinarily, to what extent his thoughts, senti­
ments, and emotions shall be communicated to others.” T his right— 
the “right to be let alone”—-was a “general right to the immunity o f the 
person, the right to one’s personality.”13
W arren and Brandeis’s article, and their conception o f privacy as the 
right to be let alone, profoundly influenced privacy law in the United 
States. Soon after the article’s publication, courts and legislatures 
began to recognize the right to privacy. Today, nearly all states in 
America recognize a num ber o f privacy torts that trace their inspira­
tion back to W arren and Brandeis.14 T h e authors’ conception o f pri­
vacy influenced not only to rt actions but constitutional and statutory
juutu
Realce
juutu
Realce
juutu
Realce
Theories o f Privacy and Their Shortcomings 17
law as well. Indeed, W arren and Brandeis spoke o f privacy as a “right,” 
no t m erely a ground for a to rt lawsuit.15 In 1891, just a year after the 
article was published, the Suprem e C ourt referred to the righ t to be let 
alone in holding tha t a court could no t force a plaintiff in a civil case to 
subm it to a surgical examination: “As well said by Judge Cooley: ‘T he 
righ t to one’s person m ay be said to be a righ t o f com plete immunity; 
to be let alone.’ ”16
N early forty years later, w hen he was a justice on the U .S. Supreme 
C ourt, Brandeis w rote his famous dissent in Olmstead v. United States. 
In Olmstead, the C ourt held th a t w iretapping was no t a violation under 
the F ourth A m endm ent o f the U.S. C onstitution because it was no t a 
physical trespass into the hom e.17 Brandeis fired off a prescient dissent, 
declaring tha t the framers o f the C onstitution “conferred, as against 
the governm ent, the rig h t to be let alone— the m ost comprehensive o f 
rights and the righ t m ost valued by civilized m en.”18 
W arren and Brandeis’s article and Brandeis’s dissent in Olmstead 
shaped constitutional law significantly in the decades to come. In 1967, 
the Suprem e C ourt adopted Brandeis’s view o f the Fourth Am end­
m ent, overruling Olmstead in K atz v. United States.'9 In its Fourth 
A m endm ent jurisprudence, as well as its protection o f the righ t to pri­
vacy, the Suprem e C ourt frequendy has invoked Brandeis’s form ula­
tion o f privacy as “the rig h t to be let alone.”20 “[The righ t to privacy] 
is, simply stated, the righ t to be let alone,” Justice Abe Fortas observed, 
“to live one’s life as one chooses, free from assault, intrusion o r inva­
sion except as they can be justified by the clear needs o f com m unity 
living under a governm ent o f law.”21 According to Justice W illiam O. 
Douglas:
[The] righ t o f privacy was called by M r. Justice Brandeis the right 
“to be le t alone.” T h a t righ t includes the privilege o f an individual 
to plan his own affairs, for “outside areas o f plainly harm ful con­
duct, every American is left to shape his own life as he thinks best, 
do w hat he pleases, go w here he pleases.”22
T h e conception o f privacy as the righ t to be let alone, however, fails 
to provide m uch guidance about what privacy entails. Understanding 
privacy as being let alone does n o t inform us about the m atters in which 
we should be let alone. W arren and Brandeis did speak o f “inviolate
18 T h e o r i e s of P rivacy a n d T h e i r S h o r t c o m i n g s
personality,” which could be viewed as describing the content of the 
private sphere, but this phrase is vague, and the authors failed to elabo­
rate. To the extent that being let alone refers to “noninterference by the 
state,” legal scholar Ruth Gavison argues, it often neglects to under­
stand that “the typical privacy claim is not a claim for noninterference 
by the state at all. It is a claim f i r state interference in the form of legal 
protection against other individuals.”23
The right to be let alone views privacy as a type of immunity or 
seclusion. As many commentators lament, defining privacy as the 
right to be let alone is too broad.24 For example, legal scholar Anita 
Allen explains, “If privacy simply meant ‘being let alone,’ any form of 
offensive or harmful conduct directed toward another person could be 
characterized as a violation o f personal privacy. A punch in the nose 
would be a privacy invasion as much as a peep in the bedroom.”25 Ac­
cording to philosopher Ferdinand Schoeman, W arren and Brandeis 
“never define what privacy is.”26 Edward Bloustein, a legal theorist of 
privacy, observed that instead of developing a conception o f privacy, 
W arren and Brandeis’s article focused mostly on the gaps in existing 
common-law torts.27
To its credit, the article was far ahead of its time, and it contained 
flashes of insight into a more robust theory of privacy. And to be fair, 
W arren and Brandeis’s aim was not to provide a comprehensive con­
ception of privacy but instead to explore the roots of the right to pri­
vacy in the common law and explain how it could develop. T he article 
was certainly a profound beginning toward developing a conception of 
privacy. However, although the right to be let alone has often been in­
voked by judges and commentators, it still remains a rather broad and 
vague conception of privacy.
Lim ited Access to the S e lf
A number of theorists conceptualize privacy as “limited access” to the 
self. This conception recognizes the individual’s desire for conceal­
ment and for being apart from others. In this way, it is closely related to 
the right-to-be-let-alone conception and is perhaps even a more so­
phisticated formulation of it.
The limited-access conception is not equivalent to solitude. Solitude 
is a form of seclusion, of withdrawal from other individuals, of being
juutu
Realce
19
alone. Solitude is a com ponent o f limited-access conceptions, as well as 
o f the right-to-be-let-alone conception, bu t these theories extend far 
m ore broadly than solitude, em bracing freedom from governm ent in­
terference, as well as from intrusions by the press and others. Lim ited- 
access conceptions recognize tha t privacy extends beyond m erely being 
apart from others.
E. L. G odkin, a well-known w riter o f the late n ineteen th century, 
advanced an early version o f the limited-access th eo ry when he ob­
served th a t “noth ing is b e tte r w orthy o f legal pro tection than private 
life, or,in o ther words, the righ t o f every m an to keep his affairs to 
himself, and to decide for h im self to w hat extent they shall be the sub­
ject o f public observation and discussion.”28 A round the same tim e 
as the publication o f W arren and Brandeis’s article in 1890, Godkin 
published an article in which he noted tha t privacy constituted the 
“righ t to decide how m uch knowledge o f [a person’s] personal thought 
and feeling . . . private doings and affairs . . . the public at large shall 
have.”29
Several contem porary theorists also have advanced limited-access 
conceptions. F o r philosopher Sissela Bok, privacy is “the condition of 
being protected from unw anted access by others— either physical ac­
cess, personal inform ation, o r attention.”30 H ym an G ross, a legal theo­
rist o f privacy, conceives o f privacy as “the condition o f hum an life in 
which acquaintance with a person o r with affairs o f his life which are 
personal to him is lim ited.”31 According to E rnest Van D en Haag, 
“Privacy is the exclusive access o f a person (or o ther legal entity) to a 
realm o f his own. T h e righ t to privacy entides one to exclude others 
from (a) watching, (b) utilizing, (c) invading (intruding upon, or in 
o ther ways affecting) his private realm .”32 Legal theorist Anita Allen 
asserts tha t “a degree o f inaccessibility is an im portant necessary condi­
tion for the apt application o f privacy.”33
Legal scholar David O ’Brien argues that there is an im portant dis­
tinction am ong theorists who propound privacy as limited-access for­
mulations. Some view lim ited access as a choice, a form o f individual 
control over who has access to the self. O thers view lim ited access as a 
state o f existence. Arguing for the latter view, O ’Brien claims that pri­
vacy “may be understood as fundamentally denoting an existential con­
dition o f lim ited access to an individual’s life experiences and engage­
m ents.” “Privacy is n o t identical with control over access to oneself,
Theories o f Privacy and Their Shortcomings
20 T h e o r i e s o f P r i v a c y a n d T h e i r S h o r t c o m i n g s
because n o t all privacy is chosen. Some privacy is accidental, compul­
sory, o r even involuntary.”34 For O ’Brien, privacy boils down to the 
condition o f being alone. O ’Brien’s conception, however, om its any 
notion o f the individual’s power to make certain choices about re­
vealing aspects o f herself to others. For example, O ’Brien would claim 
that a person stranded on a deserted island has complete privacy, but 
this is probably better described as a state o f isolation. Privacy involves 
one’s relationship to society; in a world w ithout others, claiming that 
one has privacy does no t make m uch sense.
W ithou t a notion o f what m atters are private, limited-access concep­
tions do no t tell us the substantive m atters for which access would im­
plicate privacy. Certainly not all access to the self infringes upon pri­
vacy, only access relating to specific dimensions o f the self or to 
particular m atters and inform ation. T h e theory provides no under­
standing as to the degree o f access necessary to constitute a privacy vi­
olation. In the continuum between absolutely no access to the self and 
total access, the im portant question is where the lines should be 
drawn— that is, w hat degree o f access should we recognize as reason­
able? Like the right-to-be-let-alone conception, the limited-access 
conception suffers from being too broad and too vague.
In an attem pt to address these shortcomings, legal theorist Ruth 
Gavison develops the m ost compelling limited-access conception. H er 
aim is to define “a neutral concept o f privacy” that is “distinct and co­
herent” because “the reasons for which we claim privacy in different 
situations are similar.” F or Gavison, limited access is the com m on d e - . 
nom inator o f privacy: “O ur interest in privacy. . . is related to our con­
cern over ou r accessibility to others: the extent to which we are known 
to others, the extent to which others have physical access to us, and the 
extent to which we are the subject o f others’ attention.” According to 
Gavison, privacy cannot be understood “as a claim, a psychological 
state, o r an area tha t should not be invaded . . . [or] as a form o f con­
tro l.” Unlike m any limited-access theorists who neglect to elaborate on 
the value o f privacy, Gavison argues tha t privacy as lim ited access to 
the self is valuable in furthering liberty, autonomy, and freedom .35
Further, Gavison explains what constitutes limited access, which con­
sists o f “three independent and irreducible elements: secrecy, anonymity, 
and solitude.”36 T h e way that Gavison defines access, however, restricts 
privacy to m atters o f withdrawal (solitude) and concealm ent (secrecy,
Theories o f Privacy and Their Shortcomings 21
anonymity). Excluded from this definition are invasions into one’s pri­
vate life by harassment and nuisance and the government’s involvement 
in decisions regarding one’s body, health, sexual conduct, and family 
life.37 Although Gavison contends that “the collection, storage, and 
computerization o f information” falls within her conception, these ac­
tivities often do no t reveal secrets, destroy anonymity, or thwart soli­
tude.38 Therefore, although Gavison avoids the broadness and vague­
ness o f m ost limited-access conceptions, her attem pt to define what 
“access” entails winds up being too narrow.
Secrecy
One o f the m ost common understandings o f privacy is that it consti­
tutes the secrecy o f certain matters. Under this view, privacy is violated 
by the public disclosure o f previously concealed information^ Ac­
cording to Judge Richard Posner:
[T]he word “privacy” seems to embrace at least two distinct inter­
ests. O ne is the interest in being left alone—the interest that is in­
vaded by the unwanted telephone solicitation, the noisy sound 
truck, the music in elevators, being jostled in the street, or even an 
obscene theater billboard o r shouted obscenity.. . . T he other pri­
vacy interest, concealment o f information, is invaded whenever 
private information is obtained against the wishes o f the person to 
whom the information pertains.39
T he latter privacy interest, “concealment o f information,” involves se­
crecy, and Posner defines it as an individual’s “right to conceal discred­
itable facts about himself.”40 Posner sees privacy as a form o f self- 
interested economic behavior, concealing true but harmful facts about 
oneself for one’s own gain. People “want to manipulate the world 
around them by selective disclosure of facts about themselves.”41 
“[W]hen people today decry lack o f privacy,” Posner argues, “what 
they want, I think, is mainly something quite different from seclusion; 
they want m ore power to conceal information about themselves that 
others m ight use to their disadvantage.”42 In a less normatively charged 
manner, psychologist Sidney Jourard emphasizes secrecy in his defini­
tion o f privacy: “Privacy is an outcome of a person’s wish to withhold
juutu
Realce
juutu
Realce
juutu
Realce
juutu
Realce
juutu
Realce
juutu
Realce
juutu
Realce
22 T h e o r i e s of P rivacy a n d T h e i r S h o r t c o m i n g s
from others certain knowledge as to his past and present experience 
and action and his intentions for the future.”43
The privacy-as-secrecy conception can be understood as a subset of 
limited access to the self. Secrecy of personal information is a way to 
limit access to the self. This conception is narrower than limited-access 
conceptions because secrecy involves only one dimension of access to 
the self—the concealment of personal facts.
The conception of privacy as concealing information about the self 
underpins the constitutional right to information privacy, an offshoot 
of the U.S. Supreme Court’s“right-to-privacy” cases such as Qriswold 
v. Connecticut and Roe v. Wade.44 In Whalen v. Roe, the Court held that 
The constitutionally protected “zone of privacy” not only protects an 
individual’s “independence in making certain kinds of important deci­
sions” but also encompasses the “individual interest in avoiding disclo­
sure of personal matters.”45 Consonant with the notion of privacy as 
secrecy, this formulation views privacy as limiting disclosure of con­
cealed information.
In a variety of legal contexts, the view of privacy as secrecy often 
leads to the conclusion that once a fact is publicly divulged—no matter 
how limited or narrow the disclosure—it can no longer remain private. 
Privacy is thus viewed as coextensive with the total secrecy of informa­
tion. For example, the Supreme Court’s Fourth Amendment jurispru­
dence holds that matters that lack complete secrecy are not private. 
William Stuntz observes that according to the Supreme Court, Fourth 
Amendment privacy “flows out of the interest in keeping secrets, not 
out of the interest in being free from unreasonable police coercion or 
from other kinds of dignitary harms that search targets may suffer.”46 
In a series of cases, the Supreme Court has held that there can be no 
“reasonable expectation of privacy” in things exposed to the public, 
even if it is highly unlikely that anybody will see or discover them. The 
Supreme C ourt observed in Katz: “W hat a person knowingly exposes 
to the public, even in his own home or office, is not a subject of 
Fourth Amendment protection.”4' Later, in California v. Greenwood, the 
Supreme Court held that there is no reasonable expectation of privacy 
in garbage because it is knowingly exposed to the public: “It is common 
knowledge that plastic garbage bags left on or at the side of a public 
street are readily accessible to animals, children, scavengers, snoops, 
and other members o f the public.”48 Similarly, in Florida v. Riley, the
juutu
Realce
juutu
Realce
Theories o f Privacy and Their Shortcomings 23
Suprem e C ourt held that the Fourth A m endm ent did no t apply to sur­
veillance o f a person’s property from an aircraft flying in navigable air­
space because the surveillance was conducted from a public vantage 
point.49
Several theorists have claimed that understanding privacy as secrecy 
conceptualizes privacy too narrowly. Legal theorist Edward Bloustein 
has criticized the theory o f privacy as secrecy as failing to recognize 
group privacy.50 Likewise, sociologist Arnold Simmel observes:
W e become what we are no t only by establishing boundaries 
around ourselves but also by a periodic opening o f these boundaries 
to nourishm ent, to learning, and to intimacy. B ut the opening of 
a boundary o f the self m ay require a boundary farther ou t, a 
boundary around the group to which we are opening ourselves.51
T h e privacy-as-secrecy conception fails to recognize tha t individuals 
w ant to keep things private from some people bu t n o t others. C riti­
cizing a boss to a coworker does no t mean tha t the employee desires 
tha t her boss know her comm ents. Being a m em ber o f an organization, 
especially an unpopular one, is also regarded by m any as a private 
m atter. Further, the conception o f privacy as secrecy m aintained by 
m any courts views secrecy as tantam ount to total secrecy rather than 
selective secrecy. As sociologist Edward Shils notes, contrary to privacy 
as secrecy, the individual does n o t intend an act o f disclosure to be lim­
itless.52 “M eaningful discussion o f privacy,” legal scholar Kenneth 
K arst states, “requires the recognition that ordinarily we deal no t with 
an in terest in total nondisclosure but with an in terest in selective dis­
closure.”53 In o ther words, sometim es people do n o t w ant com plete se­
crecy; rather, they desire confidentiality, which consists o f sharing the 
inform ation w ith a select g roup o f trusted people.
Some theorists attem pt to avoid these problem s by focusing on se­
lective secrecy. For example, sociologist Amitai E tzioni defines privacy 
as “the realm in which an actor (either a person o r a group, such as a 
couple) can legitimately act w ithout disclosure and accountability to 
others.”54 N evertheless, even under the selective-secrecy conception, 
the harm caused by an invasion o f privacy is understood as the disclo­
sure o f previously concealed inform ation. Privacy, however, involves 
m ore than avoiding disclosure; it also involves the individual’s ability to
juutu
Realce
juutu
Realce
juutu
Realce
24 T h e o r i e s of P ri vacy a n d T h e i r S h o r t c o m i n g s
ensure that personal information is used for the purposes she desires. 
According to philosopher Judith W agner DeCew, secrecy is certainly 
not coextensive with privacy; secret information is often not private 
(for example, secret military plans), and private m atters are not always 
secret (for example, one’s debts).55
W e often expect privacy even in public. N o t all activities we deem 
private occur behind the curtain. T he books we read, the products we 
buy, and the people we associate with are often no t secrets, but we 
nonetheless view them as private matters. Philosopher Julie Inness ob­
serves that privacy as secrecy omits the elem ent o f control: “[Pjrivacy 
m ight not necessarily be opposed to publicity; its function m ight be to 
provide the individual with control over certain aspects o f her life.”56 
Likewise, Stanley Benn argues that m atters are private not because 
they “are kept out of sight or from the knowledge o f others” but be­
cause they “are matters that it would be inappropriate for others to try 
to find out about, much less report on, without one’s consent.”5"
Therefore, although m ost theorists would recognize the disclosure 
o f certain secrets to be a violation o f privacy, many commonly recog­
nized privacy invasions do not involve the loss o f secrecy. Secrecy as 
the common denom inator o f privacy makes the conception o f privacy 
too narrow.
Control over Personal Information
O ne o f the m ost predom inant theories o f privacy is that o f control over 
personal information. According to Alan W estin, “Privacy is the claim 
o f individuals, groups, or institutions to determine for themselves 
when, how, and to what extent information about them is communi­
cated to others.”58 Num erous o ther scholars have articulated similar 
theories.59 A rthur M iller declares that “the basic attribute o f an effec­
tive right o f privacy is the individual’s ability to control the circulation 
o f information relating to him.”60 According to Charles Fried, “Privacy 
is not simply an absence o f information about us in the minds o f others; 
rather it is the control we have over information about ourselves.”61 
President Bill C linton’s Information Infrastructure Task Force defined 
privacy as “an individual’s claim to control the terms under which per­
sonal inform ation— inform ation identifiable to the individual— is 
acquired, disclosed, and used.”62 T h e Supreme C ourt has even stated
Theories o f Privacy and Their Shortcomings 25
that privacy constitutes the individual’s “control over inform ation con­
cerning his or her person.”63
T h e control-over-inform ation conception can be viewed as a subset 
o f the limited-access conception. T h e theory’s focus on information, 
however, makes it too narrow, for it excludes those aspects o f privacy 
tha t are no t inform ational, such as the righ t to make certain funda­
m ental decisions about one’s body, reproduction, o r rearing o f one’s 
children. Additionally, the theory is too vague because it fails to define 
the types o f inform ation over which individuals should have control. 
Philosopher Ferdinand Schoeman, for example, observes that “re­
garding privacy as a claim o r entitlem ent to determ ine w hat informa­
tion about oneselfis to be available to others . . . [wrongly] presumes 
privacy is som ething to be protected at the discretion o f the individual 
to whom the inform ation relates.”64 In o ther words, the control-over- 
inform ation conception focuses on all inform ation over which individ­
uals w ant to retain control, bu t privacy is no t simply a subjective m atter 
o f individual prerogative; it is also an issue o f w hat society deems ap­
propriate to protect.
Some theorists attem pt to define the scope o f w hat constitutes per­
sonal inform ation over which individuals should exercise control, but 
their attem pts run in to significant difficulties. F o r example, legal 
scholar Richard Parker’s theory defines the scope o f personal informa­
tion extremely broadly: “C ontrol over who can see us, hear us, touch us, 
smell us, and taste us, in sum, control over who can sense us, is the core 
o f privacy.”65 Parker’s definition would make m ost interpersonal contact 
in society a privacy invasion. W e are frequently seen and heard by 
others w ithout perceiving this as even the slightest invasion o f privacy.
O ther scholars lim it the scope o f personal inform ation to that which 
relates to the individual. R ichard M urphy, a law and economics scholar, 
defines the scope o f personal inform ation as consisting o f “any data 
about an individual tha t is identifiable to that individual.”66 M urphy’s 
definition is too broad because there is a significant am ount o f infor­
m ation identifiable to us tha t we do n o t deem as private. For example, 
the fact tha t a person is a well-known politician is identifiable to her, 
bu t is not private. M urphy’s definition thus provides no reasonable lim ­
itation in scope.
In addition to failing to adequately define the scope o f information, 
control-over-inform ation conceptions fail to define w hat is m eant by
26 T h e o r i e s of P rivacy a n d T h e i r S h o r t c o m i n g s
“control.” Theorists provide little elaboration on what control really 
entails, and it is often defined too narrowly or too broadly. Frequently, 
control is understood as a form of ownership of information. For ex­
ample, Westin concludes that “personal information, thought of as the 
right of decision over one’s private personality, should be defined as a 
property right.”6' This notion is partially embodied in the tort of ap­
propriation, which protects people against others’ using their image or 
likeness for commercial gain.68
The notion that individuals have a property right in information 
about themselves can be traced to John Locke, who asserted that indi­
viduals have property rights in their person and the fruits of their labor. 
According to Locke, property flows naturally from selfhood: “[EJvery 
man has a property in his own person.” From this principle, Locke de­
duced that property extends to the products of one’s labor: “W hatso­
ever then he removes out of the state that nature hath provided, and 
left it in, he hath mixed his labor with, and joined it to something that is 
his own, and thereby makes it his property.”69
Locke’s conception of property as the fruit o f labor and as an exten­
sion of the self has formed the backbone of intellectual-property law, 
which, as legal theorist James Boyle has observed, has developed around 
the notion of the “romantic author,” the individual who mixes her 
unique personality with ideas, who most displays originality and nov­
elty in her creations.70 Unlike physical property, intellectual property 
protects the expression of ideas. Copyright law, for example, protects 
“original works o f authorship fixed in any tangible medium of expres­
sion.”71 Copyright law provides control not over the underlying ideas 
and facts but over the particular manner in which they are expressed. 
The “romantic-author” notion of intellectual property embodies Locke’s 
idea that one gains a property right in something when it emanates 
from one’s self.
Conceiving of personal information as property is justified by 
viewing it as an extension of personality. As the authors o f our own 
lives, we generate information as we develop our personalities. The 
growth of individualism spawned the “belief that one’s actions and 
their history ‘belonged’ to the self which generated them and were to 
be shared only with those with whom one wished to share them.”'2 
“One’s self—for other people—is one’s expression of one’s self,” ob­
serves Madame Merle in H enry James’s The Portrait o f a Lady, “and
27
one’s house, one’s furniture, one’s garm ents, the books one reads, the 
com pany one keeps— these things are all expressive.”73
Extending property concepts to personal inform ation, however, has 
difficulties. Inform ation can be easily transm itted and, once known by 
others, cannot be eradicated from their minds. U nlike physical objects, 
inform ation can be possessed simultaneously w ithin the minds o f mil­
lions. T h is is why intellectual-property law protects particular tangible 
expressions o f ideas ra ther than the underlying ideas themselves. T he 
complexity o f personal inform ation is that it is bo th an expression of 
the self and a set o f facts— a historical record o f one’s behavior.
Further, there are problem s with viewing personal inform ation as 
equivalent to any o ther commodity. Personal inform ation is often 
form ed in relationships with others. All parties to tha t relationship 
have some claim to the inform ation. For example, individuals are not 
the lone creators o f their web-browsing inform ation, for m ost o f that 
inform ation is created from the interaction betw een the user and web­
sites.74 O ften, the m arket value o f inform ation is n o t created exclu­
sively by the labor o f the individual to whom it relates b u t in part by 
the th ird party that compiles the inform ation.0 F or instance, the value 
o f personal inform ation for advertisers and m arketers emerges in part 
from their consolidation and categorization o f tha t inform ation.
An example o f the difficulty in assigning ownership to inform ation is 
illustrated by Haynes v. A lfred A . Knopf Inc.'6 T h is case involved 
N icholas Lem ann’s highly praised book about the social and political 
history o f African Americans who migrated from the South to northern 
cities. T h e book chronicled the life o f Ruby Lee Daniels, who suffered 
greatly from her form er husband L uther Haynes’s alcoholism, selfish­
ness, and irresponsible conduct. Haynes sued the au thor and the pub­
lisher under the public-disclosure-of-private-facts to rt, claiming that 
he had long since turned his life around and tha t the disclosure o f his 
past destroyed the new life he had worked so hard to construct. Judge 
Posner, w riting for the panel, concluded that there could be no liability 
for invasion o f privacy because “ [a] person does n o t have a legally pro­
tected righ t to a reputation based on the concealm ent o f the tru th ”77 
and because the book narrated “a story no t only o f legitim ate but of 
transcendent public in terest.”78
Although this case did n o t hinge on the shared nature o f the infor­
m ation, it illustrates tha t personal inform ation rarely belongs to just
Theories o f Privacy and Their Shortcomings
28 T h e o r i e s of P ri vacy a n d T h e i r S h o r t c o m i n g s
one individual; it is often formed in relationships with others. Ruby 
Daniels’s story was deeply interwoven with Haynes’s story. Daniels had 
a right to speak about her own past, to have her story told. T his was 
her life story, n o t just Luther Haynes’s. In sum, understanding control 
as ownership presents difficulties in grappling with the unique shared 
nature o f much private information. A claim o f privacy is not the same 
as a claim o f ownership.
N o t only does defining control prove difficult, but also control over 
information is too broad a conception. Professor TomGerety claims 
that control-over-information conceptions include “all control over all 
information about oneself, one’s group, one’s institutions. Surely pri­
vacy should come, in law as in life, to much less than this.”79 According 
to Inness, not all personal information is private; she contends that “it 
is the intimacy o f this information that identifies a loss o f privacy.”80 
T hus one possibility is that the control-over-information conception 
could be limited in scope by including only intimate information. 
Charles Fried seeks to lim it his control-over-inform ation conception 
in this manner, defining privacy as “control over knowledge about one­
self” that is necessary to protect “fundamental relations” o f “respect, 
love, friendship and trust.”81 His theory speaks about the value o f pri­
vacy (prom oting respect, love, friendship, and trust) and presumably 
would define the scope o f information as “intim ate” information (in­
formation necessary to form and foster relationships involving respect, 
love, friendship, and trust).
Even if the conception is narrowed to include only intimate infor­
mation, however, it is still too broad. According to DeCew, we often 
lose control over information in ways that do not involve an invasion o f 
our privacy.82 To illustrate this point, Daniel Farber invokes the ex­
ample o f the flasher. A flasher is controlling visual access to his body by 
allowing it, but preventing flashing is no t a violation o f the flasher’s pri­
vacy; rather, flashing is seen as a violation o f the privacy-of o thers.83
David O ’Brien also criticizes the conception o f privacy as the control 
o f information for being too narrow.84 M any privacy interests involve 
an individual’s “freedom to engage in private activities” rather than the 
disclosure or nondisclosure o f inform ation.83 O ’Brien correctly recog­
nizes that privacy is invaded no t just by the loss o f control over infor­
mation but also by nuisances such as noises, smells, and other noxious 
disruptions o f one’s peace o f m ind.86 DeCew points out that the
Theories o f Privacy and Their Shortcomings 29
control-over-inform ation conception is too narrow because privacy 
does no t involve only personal information. Privacy, contends DeCew, 
can be invaded even if nobody else knows som ething new about a 
person. Examples include being forced to hear propaganda, being ma­
nipulated by subliminal advertisements, o r being disrupted in a m anner 
that thwarts one’s ability to th ink o r read.8' Anita Allen critiques the 
control-over-inform ation conception for om itting issues such as abor­
tion and sexual freedom .88 T h e theory o f privacy as control over infor­
m ation thus excludes m any aspects o f life that we com m only assume to 
be private.
Additionally, some theorists critique the control-over-inform ation 
conception as being too narrow because it focuses too heavily on indi­
vidual choice. Paul Schwartz argues that it wrongly assumes tha t indi­
viduals have autonom y to exercise control over their personal data in 
all situations. T h is assum ption fails to recognize “that individual self- 
determ ination is itself shaped by the processing o f personal data.”89 
Schwartz also questions the assumption that individuals are able to ex­
ercise meaningful choices w ith regard to their inform ation, given dis­
parities in knowledge and pow er in bargaining over the transfer of 
their inform ation.90 T h e implication is that privacy involves not only 
individual control, bu t also the social regulation o f inform ation.91 In 
o ther words, privacy is an aspect o f social structure, an architecture o f 
inform ation regulation, n o t just a m atter for the exercise o f individual 
control.
T o summarize, conceptualizing privacy as control over personal in­
form ation can be too vague, too broad, o r too narrow. Conceptions o f 
inform ation control are too vague o r too broad when theorists fail to 
define w hat “control” entails. Attempts to define control often delin­
eate it as a form o f ownership, m aking the conception falter in a 
num ber o f respects. Finally, conceptions o f inform ation control are too 
narrow because they reduce privacy to informational concerns, om it 
decisional freedom from the realm o f privacy, and focus too exclusively 
on individual choice.
Personhood
A nother theory o f privacy views it as a form o f protecting personhood. 
Building upon W arren and Brandeis’s notion o f “inviolate personality,”
juutu
Realce
30 T h e o r i e s of P rivacy a n d T h e i r S h o r t c o m i n g s
Paul Freund coined the term “personhood” to refer to “those attri­
butes of an individual which are irreducible in his selfhood.”92
The theory o f privacy as personhood differs from the theories dis­
cussed earlier because it is constructed around a normative end of pri­
vacy, namely, the protection of the integrity of personality. This theory 
is not independent of the other theories, and it often is used in conjunc­
tion with them to explain why privacy is important, what aspects of the 
self should be limited, or what information we should have control over.
W hat is personhood? W hat aspects of the self does privacy protect? 
According to Edward Bloustein, privacy protects individuality.93 Pri­
vacy is a unified and coherent concept protecting against conduct that 
is “demeaning to individuality,” “an affront to personal dignity,” or an 
“assault on human personality.”94 Philosopher Jeffrey Reiman also rec­
ognizes a personhood component to privacy: “T he right to privacy. . . 
protects the individual’s interest in becoming, being, and remaining a 
person.”95
Philosopher Stanley Benn also develops a personhood conception of 
privacy, noting that privacy amounts to respect for individuals as 
choosers: “[Rjespect for someone as a person, as a chooser, implie[s] 
respect for him as one engaged in a kind of self-creative enterprise, 
which could be disrupted, distorted, or frustrated even by so limited an 
intrusion as watching.” Drawing from Jean-Paul Sartre’s Being and 
Nothingness, Benn explains that being “an object of scrutiny, as the 
focus o f another’s attention, brings one to a new consciousness of one­
self, as something seen through another’s eyes.” T he observed “be­
comes aware of himself as an object, knowable, having a determinate 
character.” According to Benn, the result is that the observed person 
“is fixed as something—with limited probabilities rather than infinite, 
indeterminate possibilities.”96 In other words, Benn contends that sur­
veillance restricts an individual’s range of choices and thus limits her 
freedom. Accordingly, privacy is about respect for personhood, with 
personhood defined in terms of the individual’s capacity to choose.
The U.S. Supreme C ourt has espoused a personhood theory of pri­
vacy in its right to privacy decisions, such as Griswold v. Connecticut, 
Eisenstadt v. Baird, and Roe v. Wade.91 The Court characterized privacy 
as an “interest in independence in making certain kinds o f important 
decisions.”98 Specifically, these cases involved decisions relating to 
marriage, procreation, contraception, family relationships, and child
juutu
Realce
juutu
Realce
juutu
Realce
juutu
Realce
juutu
Realce
juutu
Realce
juutu
Realce
Theories o f Privacy and Their Shortcomings 31
rea rin g ." In Planned Parenthood v. Casey, the Supreme C ourt provided 
its m ost elaborate explanation o f what the constitutional right to pri­
vacy encompasses:
T hese m atters, involving the m ost intim ate and personal choices a 
person may make in a lifetime, choices central to personal dignity 
and autonomy, are central to the liberty protected by the Four­
teenth Am endm ent. At the heart o f liberty is the right to define 
one’s own concept o f existence, o f meaning, o f the universe, and of 
the m ystery o f hum an life. Beliefs about these m atters could not 
define

Outros materiais