Privacy In File Sharing Networks
   HOME

TheInfoList



OR:

Privacy (, ) is the ability of an individual or group to seclude themselves or
information Information is an Abstraction, abstract concept that refers to something which has the power Communication, to inform. At the most fundamental level, it pertains to the Interpretation (philosophy), interpretation (perhaps Interpretation (log ...
about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with
security Security is protection from, or resilience against, potential harm (or other unwanted coercion). Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or ...
, which can include the concepts of appropriate use and protection of information. Privacy may also take the form of bodily integrity. Throughout history, there have been various conceptions of privacy. Most cultures acknowledge the right of individuals to keep aspects of their personal lives out of the public domain. The right to be free from unauthorized invasions of privacy by governments, corporations, or individuals is enshrined in the privacy laws of many countries and, in some instances, their constitutions. With the rise of technology, the debate regarding privacy has expanded from a bodily sense to include a digital sense. In most countries, the right to
digital privacy Digital privacy is often used in contexts that promote advocacy on behalf of individual and consumer privacy rights in e-services and is typically used in opposition to the business practices of many e-marketers, businesses, and companies to coll ...
is considered an extension of the original
right to privacy The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 185 national constitutions mention the right to privacy. Since the globa ...
, and many countries have passed acts that further protect digital privacy from public and private entities. There are multiple techniques to invade privacy, which may be employed by corporations or governments for profit or political reasons. Conversely, in order to protect privacy, people may employ
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
or
anonymity Anonymity describes situations where the acting person's identity is unknown. Anonymity may be created unintentionally through the loss of identifying information due to the passage of time or a destructive event, or intentionally if a person cho ...
measures.


Etymology

The word privacy is derived from the Latin word and concept of ‘''
privatus In Roman law, the Latin adjective makes a legal distinction between that which is "private" and that which is , "public" in the sense of pertaining to the Roman people (). Used as a substantive, the term refers to a citizen who is not a p ...
''’, which referred to things set apart from what is public; personal and belonging to oneself, and not to the state. Literally, ‘''privatus''’ is the past participle of the Latin verb ‘''privere''’ meaning ‘to be deprived of’.


History


Philosophical views on privacy

The concept of privacy has been explored and discussed by numerous philosophers throughout history. Privacy has historical roots in ancient Greek philosophical discussions. The most well-known of these was
Aristotle Aristotle (; 384–322 BC) was an Ancient Greek philosophy, Ancient Greek philosopher and polymath. His writings cover a broad range of subjects spanning the natural sciences, philosophy, linguistics, economics, politics, psychology, a ...
's distinction between two spheres of life: the public sphere of the ''
polis Polis (: poleis) means 'city' in Ancient Greek. The ancient word ''polis'' had socio-political connotations not possessed by modern usage. For example, Modern Greek πόλη (polē) is located within a (''khôra''), "country", which is a πατ ...
'', associated with political life, and the private sphere of the ''
oikos ''Oikos'' ( ; : ) was, in Ancient Greece, two related but distinct concepts: the family and the family's house. Its meaning shifted even within texts. The ''oikos'' was the basic unit of society in most Greek city-states. For regular Attic_G ...
'', associated with domestic life. Privacy is valued along with other basic necessities of life in the Jewish deutero-canonical Book of Sirach. Islam's holy text, the Qur'an, states the following regarding privacy: ‘Do not spy on one another’ (49:12); ‘Do not enter any houses except your own homes unless you are sure of their occupants' consent’ (24:27). English philosopher
John Locke John Locke (; 29 August 1632 (Old Style and New Style dates, O.S.) – 28 October 1704 (Old Style and New Style dates, O.S.)) was an English philosopher and physician, widely regarded as one of the most influential of the Enlightenment thi ...
’s (1632-1704) writings on natural rights and the social contract laid the groundwork for modern conceptions of individual rights, including the right to privacy. In his '' Second Treatise of Civil Government''(1689), Locke argued that a man is entitled to his own self through one’s natural rights of life, liberty, and property. He believed that the government was responsible for protecting these rights so individuals were guaranteed private spaces to practice personal activities. In the political sphere, philosophers hold differing views on the right of private judgment. German philosopher
Georg Wilhelm Friedrich Hegel Georg Wilhelm Friedrich Hegel (27 August 1770 – 14 November 1831) was a 19th-century German idealist. His influence extends across a wide range of topics from metaphysical issues in epistemology and ontology, to political philosophy and t ...
(1770-1831) makes the distinction between '' moralität'', which refers to an individual’s private judgment, and ''
sittlichkeit ''Sittlichkeit'' () is the concept of "ethical life" or "ethical order" furthered by German philosopher Georg Wilhelm Friedrich Hegel. It was first presented in his work '' Phenomenology of Spirit'' (1807) to refer to "ethical behavior grounded i ...
'', pertaining to one’s rights and obligations as defined by an existing corporate order. On the contrary,
Jeremy Bentham Jeremy Bentham (; 4 February Dual dating, 1747/8 Old Style and New Style dates, O.S. 5 February 1748 Old Style and New Style dates, N.S.– 6 June 1832) was an English philosopher, jurist, and social reformer regarded as the founder of mo ...
(1748-1832), an English philosopher, interpreted law as an invasion of privacy. His theory of
utilitarianism In ethical philosophy, utilitarianism is a family of normative ethical theories that prescribe actions that maximize happiness and well-being for the affected individuals. In other words, utilitarian ideas encourage actions that lead to the ...
argued that legal actions should be judged by the extent of their contribution to human wellbeing, or necessary utility. Hegel’s notions were modified by prominent 19th century English philosopher
John Stuart Mill John Stuart Mill (20 May 1806 – 7 May 1873) was an English philosopher, political economist, politician and civil servant. One of the most influential thinkers in the history of liberalism and social liberalism, he contributed widely to s ...
. Mill’s essay ''
On Liberty ''On Liberty'' is an essay published in 1859 by the English philosopher John Stuart Mill. It applied Mill's ethical system of utilitarianism to society and state. Mill suggested standards for the relationship between authority and liberty. H ...
'' (1859) argued for the importance of protecting individual liberty against the tyranny of the majority and the interference of the state. His views emphasized the right of privacy as essential for personal development and self-expression. Discussions surrounding surveillance coincided with philosophical ideas on privacy. Jeremy Bentham developed the phenomenon known as the Panoptic effect through his 1791 architectural design of a prison called
Panopticon The panopticon is a design of institutional building with an inbuilt system of control, originated by the English philosopher and social theorist Jeremy Bentham in the 18th century. The concept is to allow all prisoners of an institution to be ...
. The phenomenon explored the possibility of surveillance as a general awareness of being watched that could never be proven at any particular moment. French philosopher
Michel Foucault Paul-Michel Foucault ( , ; ; 15 October 192625 June 1984) was a French History of ideas, historian of ideas and Philosophy, philosopher who was also an author, Literary criticism, literary critic, Activism, political activist, and teacher. Fo ...
(1926-1984) concluded that the possibility of surveillance in the instance of the Panopticon meant a prisoner had no choice but to conform to the prison's rules.


Technology

As technology has advanced, the way in which privacy is protected and violated has changed with it. In the case of some technologies, such as the
printing press A printing press is a mechanical device for applying pressure to an inked surface resting upon a printing, print medium (such as paper or cloth), thereby transferring the ink. It marked a dramatic improvement on earlier printing methods in whi ...
or the
Internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
, the increased ability to share information can lead to new ways in which privacy can be breached. It is generally agreed that the first publication advocating privacy in the United States was the 1890 article by Samuel Warren and
Louis Brandeis Louis Dembitz Brandeis ( ; November 13, 1856 – October 5, 1941) was an American lawyer who served as an Associate Justice of the Supreme Court of the United States, associate justice on the Supreme Court of the United States from 1916 to ...
, "The Right to Privacy", and that it was written mainly in response to the increase in newspapers and photographs made possible by printing technologies. In 1948, ''
1984 Events January * January 1 – The Bornean Sultanate of Brunei gains full independence from the United Kingdom, having become a British protectorate in 1888. * January 7 – Brunei becomes the sixth member of the Association of Southeas ...
,'' written by
George Orwell Eric Arthur Blair (25 June 1903 – 21 January 1950) was an English novelist, poet, essayist, journalist, and critic who wrote under the pen name of George Orwell. His work is characterised by lucid prose, social criticism, opposition to a ...
, was published. A classic dystopian novel, ''1984'' describes the life of Winston Smith in 1984, located in Oceania, a totalitarian state. The all-controlling Party, the party in power led by Big Brother, is able to control power through mass
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
and limited freedom of speech and thought. George Orwell provides commentary on the negative effects of
totalitarianism Totalitarianism is a political system and a form of government that prohibits opposition from political parties, disregards and outlaws the political claims of individual and group opposition to the state, and completely controls the public s ...
, particularly on privacy and
censorship Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governmen ...
. Parallels have been drawn between ''1984'' and modern censorship and privacy, a notable example being that large social media companies, rather than the government, are able to monitor a user's data and decide what is allowed to be said online through their censorship policies, ultimately for monetary purposes. In the 1960s, people began to consider how changes in technology were bringing changes in the concept of privacy.
Vance Packard Vance Oakley Packard (May 22, 1914 – December 12, 1996) was an American journalist and social critic. He was the author of several books, including ''The Hidden Persuaders'' and '' The Naked Society''. He was a critic of consumerism. Early l ...
's '' The Naked Society'' was a popular book on privacy from that era and led US discourse on privacy at that time. In addition, Alan Westin's ''Privacy and Freedom'' shifted the debate regarding privacy from a physical sense, how the government controls a person's body (i.e. '' Roe v. Wade'') and other activities such as wiretapping and photography. As important records became digitized, Westin argued that personal data was becoming too accessible and that a person should have complete jurisdiction over their data, laying the foundation for the modern discussion of privacy. New technologies can also create new ways to gather private information. In 2001, the legal case '' Kyllo v. United States'' (533 U.S. 27) determined that the use of thermal imaging devices that can reveal previously unknown information without a warrant constitutes a violation of privacy. In 2019, after developing a corporate rivalry in competing voice-recognition software,
Apple An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
and
Amazon Amazon most often refers to: * Amazon River, in South America * Amazon rainforest, a rainforest covering most of the Amazon basin * Amazon (company), an American multinational technology company * Amazons, a tribe of female warriors in Greek myth ...
required employees to listen to intimate moments and faithfully transcribe the contents.


Police and government

Police and citizens often conflict on what degree the police can intrude a citizen's digital privacy. For instance, in 2012, the
Supreme Court In most legal jurisdictions, a supreme court, also known as a court of last resort, apex court, high (or final) court of appeal, and court of final appeal, is the highest court within the hierarchy of courts. Broadly speaking, the decisions of ...
ruled unanimously in '' United States v. Jones'' (565 U.S. 400), in the case of Antoine Jones who was arrested of drug possession using a GPS tracker on his car that was placed without a warrant, that warrantless tracking infringes the Fourth Amendment. The Supreme Court also justified that there is some "reasonable expectation of privacy" in transportation since the reasonable expectation of privacy had already been established under ''Griswold v. Connecticut'' (1965). The Supreme Court also further clarified that the Fourth Amendment did not only pertain to physical instances of intrusion but also digital instances, and thus ''United States v. Jones'' became a landmark case. In 2014, the Supreme Court ruled unanimously in '' Riley v. California'' (573 U.S. 373), where David Leon Riley was arrested after he was pulled over for driving on expired license tags when the police searched his phone and discovered that he was tied to a shooting, that searching a citizen's phone without a warrant was an unreasonable search, a violation of the Fourth Amendment. The Supreme Court concluded that the cell phones contained personal information different from trivial items, and went beyond to state that information stored on the cloud was not necessarily a form of evidence. ''Riley v. California'' evidently became a landmark case, protecting the digital protection of citizen's privacy when confronted with the police. A recent notable occurrence of the conflict between law enforcement and a citizen in terms of digital privacy has been in the 2018 case, '' Carpenter v. United States'' (585 U.S. ____). In this case, the FBI used cell phone records without a warrant to arrest Timothy Ivory Carpenter on multiple charges, and the Supreme Court ruled that the warrantless search of cell phone records violated the Fourth Amendment, citing that the Fourth Amendment protects "reasonable expectations of privacy" and that information sent to third parties still falls under data that can be included under "reasonable expectations of privacy". Beyond law enforcement, many interactions between the government and citizens have been revealed either lawfully or unlawfully, specifically through whistleblowers. One notable example is
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
, who released multiple operations related to the mass surveillance operations of the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA), where it was discovered that the NSA continues to breach the security of millions of people, mainly through mass surveillance programs whether it was collecting great amounts of data through third party private companies, hacking into other embassies or frameworks of international countries, and various breaches of data, which prompted a culture shock and stirred international debate related to digital privacy.


Internet

The Internet and technologies built on it enable new forms of social interactions at increasingly faster speeds and larger scales. Because the computer networks which underlie the Internet introduce such a wide range of novel security concerns, the discussion of ''privacy'' on the Internet is often conflated with ''security''. Indeed, many entities such as corporations involved in the surveillance economy inculcate a security-focused conceptualization of privacy which reduces their obligations to uphold privacy into a matter of
regulatory compliance In general, compliance means conforming to a rule, such as a specification, policy, standard or law. Compliance has traditionally been explained by reference to deterrence theory, according to which punishing a behavior will decrease the viol ...
, while at the same time
lobbying Lobbying is a form of advocacy, which lawfully attempts to directly influence legislators or government officials, such as regulatory agency, regulatory agencies or judiciary. Lobbying involves direct, face-to-face contact and is carried out by va ...
to minimize those regulatory requirements. The Internet's effect on privacy includes all of the ways that computational technology and the entities that control it can subvert the privacy expectations of their
users Ancient Egyptian roles * User (ancient Egyptian official), an ancient Egyptian nomarch (governor) of the Eighth Dynasty * Useramen, an ancient Egyptian vizier also called "User" Other uses * User (computing), a person (or software) using an ...
. In particular, the right to be forgotten is motivated by both the ''computational ability'' to store and search through massive amounts of data as well as the ''subverted expectations'' of users who share information online without expecting it to be stored and retained indefinitely. Phenomena such as revenge porn and
deepfakes ''Deepfakes'' (a portmanteau of and ) are images, videos, or audio that have been edited or generated Generative artificial intelligence, using artificial intelligence, AI-based tools or AV editing software. They may depict real or fictional p ...
are not merely individual because they require both the ability to obtain images without someone's consent as well as the social and economic infrastructure to disseminate that content widely. Therefore, privacy advocacy groups such as the Cyber Civil Rights Initiative and the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties. It provides funds for legal defense in court, ...
argue that addressing the new privacy harms introduced by the Internet requires both technological improvements to
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
and
anonymity Anonymity describes situations where the acting person's identity is unknown. Anonymity may be created unintentionally through the loss of identifying information due to the passage of time or a destructive event, or intentionally if a person cho ...
as well as societal efforts such as legal regulations to restrict corporate and government power. While the
Internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
began as a government and academic effort up through the 1980s, private corporations began to enclose the hardware and software of the Internet in the 1990s, and now most Internet infrastructure is owned and managed by for-profit corporations. As a result, the ability of governments to protect their citizens' privacy is largely restricted to
industrial policy Industrial policy is proactive government-led encouragement and development of specific strategic industries for the growth of all or part of the economy, especially in absence of sufficient private sector investments and participation. Historica ...
, instituting controls on corporations that handle communications or
personal data Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has fou ...
. Privacy regulations are often further constrained to only protect specific demographics such as children, or specific industries such as credit card bureaus.


Social networking

Several online social network sites (OSNs) are among the top 10 most visited websites globally. Facebook for example, as of August 2015, was the largest social-networking site, with nearly 2.7 billion members, who upload over 4.75 billion pieces of content daily. While
Twitter Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
is significantly smaller with 316 million registered users, the US
Library of Congress The Library of Congress (LOC) is a research library in Washington, D.C., serving as the library and research service for the United States Congress and the ''de facto'' national library of the United States. It also administers Copyright law o ...
recently announced that it will be acquiring and permanently storing the entire archive of public Twitter posts since 2006. A review and evaluation of scholarly work regarding the current state of the value of individuals' privacy of online social networking show the following results: "first, adults seem to be more concerned about potential privacy threats than younger users; second, policy makers should be alarmed by a large part of users who underestimate risks of their information privacy on OSNs; third, in the case of using OSNs and its services, traditional one-dimensional privacy approaches fall short". This is exacerbated by deanonymization research indicating that personal traits such as sexual orientation, race, religious and political views, personality, or intelligence can be inferred based on a wide variety of digital footprints, such as samples of text, browsing logs, or Facebook Likes. Intrusions of social media privacy are known to affect employment in the United States.
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and
Twitter Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information. This has created a need by many candidates to control various online
privacy settings Privacy settings are the part of a social networking website, web browser, or other piece of software, that allows a user to control who sees information about the user. With the growing prevalence of social networking services, opportunities for p ...
in addition to controlling their online reputations, the conjunction of which has led to legal suits against both social media sites and US employers.


Selfie culture

Selfies are popular today. A search for photos with the hashtag #selfie retrieves over 23 million results on Instagram and 51 million with the hashtag #me. However, due to modern corporate and governmental surveillance, this may pose a risk to privacy. In a research study which takes a sample size of 3763, researchers found that for users posting selfies on social media, women generally have greater concerns over privacy than men, and that users' privacy concerns inversely predict their selfie behavior and activity.


Online harassment

An invasion of someone's privacy may be widely and quickly disseminated over the Internet. When social media sites and other online communities fail to invest in content moderation, an invasion of privacy can expose people to a much greater volume and degree of harassment than would otherwise be possible. Revenge porn may lead to misogynist or
homophobic Homophobia encompasses a range of negative attitudes and feelings toward homosexuality or people who identify or are perceived as being lesbian, Gay men, gay or bisexual. It has been defined as contempt, prejudice, aversion, hatred, or ant ...
harassment, such as in the suicide of Amanda Todd and the suicide of Tyler Clementi. When someone's physical location or other sensitive information is leaked over the Internet via
doxxing Doxing or doxxing is the act of publicly providing personally identifiable information about an individual or organization, usually via the Internet and without their consent. Historically, the term has been used to refer to both the aggregati ...
, harassment may escalate to direct physical harm such as
stalking Stalking is unwanted and/or repeated surveillance or contact by an individual or group toward another person. Stalking behaviors are interrelated to harassment and intimidation and may include following the victim in person or monitorin ...
or swatting. Despite the way breaches of privacy can magnify online harassment, online harassment is often used as a justification to curtail
freedom of speech Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The rights, right to freedom of expression has been r ...
, by removing the expectation of privacy via
anonymity Anonymity describes situations where the acting person's identity is unknown. Anonymity may be created unintentionally through the loss of identifying information due to the passage of time or a destructive event, or intentionally if a person cho ...
, or by enabling law enforcement to invade privacy without a search warrant. In the wake of Amanda Todd's death, the Canadian parliament proposed a motion purporting to stop bullying, but Todd's mother herself gave testimony to parliament rejecting the bill due to its provisions for warrantless breaches of privacy, stating "I don't want to see our children victimized again by losing privacy rights." Even where these laws have been passed despite privacy concerns, they have not demonstrated a reduction in online harassment. When the Korea Communications Commission introduced a registration system for online commenters in 2007, they reported that malicious comments only decreased by 0.9%, and in 2011 it was repealed. A subsequent analysis found that the set of users who posted the most comments actually increased the number of "aggressive expressions" when forced to use their real name. In the US, while federal law only prohibits online harassment based on protected characteristics such as gender and race, individual states have expanded the definition of harassment to further curtail speech: Florida's definition of online harassment includes "any use of data or computer software" that "Has the effect of substantially disrupting the orderly operation of a school."


Privacy and location-based services

Increasingly, mobile devices facilitate location tracking. This creates user privacy problems. A user's location and preferences constitute
personal information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has fou ...
, and their improper use violates that user's privacy. A recent MIT study by de Montjoye et al. showed that four spatio-temporal points constituting approximate places and times are enough to uniquely identify 95% of 1.5M people in a mobility database. The study further shows that these constraints hold even when the resolution of the dataset is low. Therefore, even coarse or blurred datasets confer little privacy protection. Several methods to protect user privacy in location-based services have been proposed, including the use of anonymizing servers and blurring of information. Methods to quantify privacy have also been proposed, to calculate the equilibrium between the benefit of obtaining accurate location information and the risks of breaching an individual's privacy.


Ethical controversies over location privacy

There have been scandals regarding location privacy. One instance was the scandal concerning
AccuWeather AccuWeather, Inc. is a private-sector American media company that provides commercial weather forecasting services. AccuWeather was founded in 1962 by Joel N. Myers. The company adopted the name 'AccuWeather' in 1971. AccuWeather is headquar ...
, where it was revealed that AccuWeather was selling locational data. This consisted of a user's locational data, even if they opted out within Accuweather, which tracked users' location. Accuweather sold this data to Reveal Mobile, a company that monetizes data related to a user's location. Other international cases are similar to the Accuweather case. In 2017, a leaky API inside the McDelivery App exposed private data, which consisted of home addresses, of 2.2 million users. In the wake of these types of scandals, many large American technology companies such as Google, Apple, and Facebook have been subjected to hearings and pressure under the U.S. legislative system. In 2011, US Senator
Al Franken Alan Stuart Franken (born May 21, 1951) is an American politician, comedian, and actor who served from 2009 to 2018 as a United States senator from Minnesota. A member of the Democratic Party (United States), Democratic Party, he worked as an ...
wrote an open letter to
Steve Jobs Steven Paul Jobs (February 24, 1955 – October 5, 2011) was an American businessman, inventor, and investor best known for co-founding the technology company Apple Inc. Jobs was also the founder of NeXT and chairman and majority shareholder o ...
, noting the ability of iPhones and iPads to record and store users' locations in unencrypted files. Apple claimed this was an unintentional
software bug A software bug is a design defect ( bug) in computer software. A computer program with many or serious bugs may be described as ''buggy''. The effects of a software bug range from minor (such as a misspelled word in the user interface) to sev ...
, but Justin Brookman of the
Center for Democracy and Technology Center for Democracy & Technology (CDT) is a Washington, D.C.–based 501(c)(3) nonprofit organization that advocates for digital rights and freedom of expression. CDT seeks to promote legislation that enables individuals to use the Internet for ...
directly challenged that portrayal, stating "I'm glad that they are fixing what they call bugs, but I take exception with their strong denial that they track users." In 2021, the U.S. state of Arizona found in a court case that Google misled its users and stored the location of users regardless of their location settings.


Advertising

The Internet has become a significant medium for advertising, with digital marketing making up approximately half of the global ad spending in 2019. While websites are still able to sell advertising space without tracking, including via
contextual advertising Contextual advertising (also called contextual targeting) is a form of targeted digital advertising. Contextual advertising is also called "In-Text" advertising or "In-Context" technology. Contextual targeting involves the use of linguistic fact ...
, digital ad brokers such as
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
and
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
have instead encouraged the practice of
behavioral advertising Targeted advertising or data-driven marketing is a form of advertising, including online advertising, that is directed towards an audience with certain traits, based on the product or person the advertiser is promoting. These traits can either ...
, providing code snippets used by website owners to track their users via
HTTP cookie HTTP cookie (also called web cookie, Internet cookie, browser cookie, or simply cookie) is a small block of data (computing), data created by a web server while a user (computing), user is browsing a website and placed on the user's computer o ...
s. This tracking data is also sold to other third parties as part of the mass surveillance industry. Since the introduction of mobile phones, data brokers have also been planted within apps, resulting in a $350 billion digital industry especially focused on mobile devices. Digital privacy has become the main source of concern for many mobile users, especially with the rise of privacy scandals such as the Facebook–Cambridge Analytica data scandal.
Apple An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
has received some reactions for features that prohibit advertisers from tracking a user's data without their consent. Google attempted to introduce an alternative to cookies named FLoC which it claimed reduced the privacy harms, but it later retracted the proposal due to antitrust probes and analyses that contradicted their claims of privacy.


Metadata

The ability to do online inquiries about individuals has expanded dramatically over the last decade. Importantly, directly observed behavior, such as browsing logs, search queries, or contents of a public Facebook profile, can be automatically processed to infer secondary information about an individual, such as sexual orientation, political and religious views, race, substance use, intelligence, and personality. In Australia, the
Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015 The ''Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015'' (Cth) is an amending Act of the Parliament of Australia that adds to the '' Telecommunications (Interception and Access) Act 1979'' (the Principal Act) ...
made a distinction between collecting the contents of messages sent between users and the metadata surrounding those messages.


Legal right to privacy

Most countries give citizens rights to privacy in their constitutions. Representative examples of this include the
Constitution of Brazil The Constitution of the Federative Republic of Brazil () is the Constitution, supreme law of Brazil. It is the foundation and source of the legal authority underlying the existence of Brazil and the federal government of Brazil. It replaced the ...
, which says "the privacy, private life, honor and image of people are inviolable"; the
Constitution of South Africa The Constitution of South Africa is the supreme law of the Republic of South Africa. It provides the legal foundation for the existence of the republic, it sets out the human rights and duties of its citizens, and defines the structure of t ...
says that "everyone has a right to privacy"; and the
Constitution of the Republic of Korea The Constitution of the Republic of Korea () is the supreme law of South Korea. It was promulgated on July 17, 1948, and last revised on October 29, 1987. Background The Provisional Charter of Korea The preamble of the Constitution of Sou ...
says "the privacy of no citizen shall be infringed." The Italian Constitution also defines the right to privacy. Among most countries whose constitutions do not explicitly describe privacy rights, court decisions have interpreted their constitutions to intend to give privacy rights. Many countries have broad privacy laws outside their constitutions, including Australia's
Privacy Act 1988 The ''Privacy Act 1988'' is an Australian law dealing with privacy. Section 14 of the Act stipulates a number of privacy rights known as the Australian Privacy Principles (APPs). These principles apply to Australian Government and Australian C ...
, Argentina's Law for the Protection of Personal Data of 2000, Canada's 2000 Personal Information Protection and Electronic Documents Act, and Japan's 2003 Personal Information Protection Law. Beyond national privacy laws, there are international privacy agreements. The United Nations
Universal Declaration of Human Rights The Universal Declaration of Human Rights (UDHR) is an international document adopted by the United Nations General Assembly that enshrines the Human rights, rights and freedoms of all human beings. Drafted by a UN Drafting of the Universal D ...
says "No one shall be subjected to arbitrary interference with
heir Inheritance is the practice of receiving private property, titles, debts, entitlements, privileges, rights, and obligations upon the death of an individual. The rules of inheritance differ among societies and have changed over time. Offi ...
privacy, family, home or correspondence, nor to attacks upon
heir Inheritance is the practice of receiving private property, titles, debts, entitlements, privileges, rights, and obligations upon the death of an individual. The rules of inheritance differ among societies and have changed over time. Offi ...
honor and reputation." The
Organisation for Economic Co-operation and Development The Organisation for Economic Co-operation and Development (OECD; , OCDE) is an international organization, intergovernmental organization with 38 member countries, founded in 1961 to stimulate economic progress and international trade, wor ...
published its Privacy Guidelines in 1980. The European Union's 1995 Data Protection Directive guides privacy protection in Europe. The 2004 Privacy Framework by the
Asia-Pacific Economic Cooperation Asia-Pacific Economic Cooperation (APEC ) is an inter-governmental forum for 21 member economy , economies in the Pacific Rim that promotes free trade throughout the Asia-Pacific region. Following the success of Association of Southeast Asia ...
is a privacy protection agreement for the members of that organization.


Free market vs consumer protection

Approaches to privacy can, broadly, be divided into two categories: free market or
consumer protection Consumer protection is the practice of safeguarding buyers of goods and services, and the public, against unfair practices in the marketplace. Consumer protection measures are often established by law. Such laws are intended to prevent business ...
. One example of the free market approach is to be found in the voluntary OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. The principles reflected in the guidelines, free of legislative interference, are analyzed in an article putting them into perspective with concepts of the
GDPR The General Data Protection Regulation (Regulation (EU) 2016/679), abbreviated GDPR, is a European Union regulation on information privacy in the European Union (EU) and the European Economic Area (EEA). The GDPR is an important component of ...
put into law later in the European Union. In a consumer protection approach, in contrast, it is claimed that individuals may not have the time or knowledge to make informed choices, or may not have reasonable alternatives available. In support of this view, Jensen and Potts showed that most privacy policies are above the reading level of the average person.


By country


Australia

The ''Privacy Act 1988'' is administered by the Office of the Australian Information Commissioner. The initial introduction of privacy law in 1998 extended to the public sector, specifically to Federal government departments, under the Information Privacy Principles. State government agencies can also be subject to state based privacy legislation. This built upon the already existing privacy requirements that applied to telecommunications providers (under Part 13 of the ''Telecommunications Act 1997''), and confidentiality requirements that already applied to banking, legal and patient / doctor relationships. In 2008 the Australian Law Reform Commission (ALRC) conducted a review of Australian privacy law and produced a report titled "For Your Information". Recommendations were taken up and implemented by the Australian Government via the Privacy Amendment (Enhancing Privacy Protection) Bill 2012. In 2015, the
Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015 The ''Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015'' (Cth) is an amending Act of the Parliament of Australia that adds to the '' Telecommunications (Interception and Access) Act 1979'' (the Principal Act) ...
was passed, to some controversy over its human rights implications and the role of media.


Canada

Canada is a federal state whose provinces and territories abide by the
common law Common law (also known as judicial precedent, judge-made law, or case law) is the body of law primarily developed through judicial decisions rather than statutes. Although common law may incorporate certain statutes, it is largely based on prece ...
save the province of Quebec whose legal tradition is the civil law. Privacy in Canada was first addressed through the ''Privacy Act'', a 1985 piece of legislation applicable to personal information held by government institutions. The provinces and territories would later follow suit with their own legislation. Generally, the purposes of said legislation are to provide individuals rights to access personal information; to have inaccurate personal information corrected; and to prevent unauthorized collection, use, and disclosure of personal information. In terms of regulating personal information in the private sector, the federal '' Personal Information Protection and Electronic Documents Act'' ("PIPEDA") is enforceable in all jurisdictions unless a substantially similar provision has been enacted on the provincial level. However, inter-provincial or international information transfers still engage PIPEDA. PIPEDA has gone through two law overhaul efforts in 2021 and 2023 with the involvement of the Office of the Privacy Commissioner and Canadian academics. In the absence of a statutory private right of action absent an OPC investigation, the common law torts of intrusion upon seclusion and public disclosure of private facts, as well as the Civil Code of Quebec may be brought for an infringement or violation of privacy. Privacy is also protected under ss. 7 and 8 of the ''
Canadian Charter of Rights and Freedoms The ''Canadian Charter of Rights and Freedoms'' (), often simply referred to as the ''Charter'' in Canada, is a bill of rights entrenched in the Constitution of Canada, forming the first part of the '' Constitution Act, 1982''. The ''Char ...
'' which is typically applied in the criminal law context. In Quebec, individuals' privacy is safeguarded by articles 3 and 35 to 41 of the
Civil Code of Quebec The ''Civil Code of Quebec'' (CCQ; , ) is the civil code in force in the Canadian province of Quebec, which came into effect on January 1, 1994. It replaced the '' Civil Code of Lower Canada'' () enacted by the Legislative Assembly of the Provin ...
as well as by s. 5 of the
Charter of human rights and freedoms The ''Charter of Human Rights and Freedoms'' (, ), also known as the "Quebec Charter", is a statutory bill of rights and human rights code passed by the National Assembly of Quebec on June 27, 1975. It received Royal Assent from Lieutenant Go ...
.


European Union

In 2016, the European Union passed the General Data Protection Regulation (GDPR), which was intended to reduce the misuse of personal data and enhance individual privacy, by requiring companies to receive consent before acquiring personal information from users. Although there are comprehensive regulations for data protection in the European Union, one study finds that despite the laws, there is a lack of enforcement in that no institution feels responsible to control the parties involved and enforce their laws. The European Union also champions the Right to be Forgotten concept in support of its adoption by other countries.


India

Since the introduction of the
Aadhaar Aadhaar (Hindi: आधार, ) is a twelve-digit unique identity number that can be obtained voluntarily by all residents of India, based on their biometrics and demography, demographic data. The data is collected by the Unique Identification ...
project in 2009, which resulted in all 1.2 billion Indians being associated with a 12-digit biometric-secured number. Aadhaar has uplifted the poor in India by providing them with a form of identity and preventing the fraud and waste of resources, as normally the government would not be able to allocate its resources to its intended assignees due to the ID issues. With the rise of Aadhaar, India has debated whether Aadhaar violates an individual's privacy and whether any organization should have access to an individual's digital profile, as the Aadhaar card became associated with other economic sectors, allowing for the tracking of individuals by both public and private bodies. Aadhaar databases have suffered from security attacks as well and the project was also met with mistrust regarding the safety of the social protection infrastructures. In 2017, where the Aadhar was challenged, the Indian Supreme Court declared privacy as a human right, but postponed the decision regarding the constitutionality of Aadhaar for another bench. In September 2018, the Indian Supreme Court determined that the Aadhaar project did not violate the legal right to privacy.


United Kingdom

In the United Kingdom, it is not possible to bring an action for invasion of privacy. An action may be brought under another
tort A tort is a civil wrong, other than breach of contract, that causes a claimant to suffer loss or harm, resulting in legal liability for the person who commits the tortious act. Tort law can be contrasted with criminal law, which deals with cri ...
(usually breach of confidence) and privacy must then be considered under EC law. In the UK, it is sometimes a defence that disclosure of private information was in the public interest. There is, however, the
Information Commissioner's Office The Information Commissioner's Office (ICO) is a non-departmental public body which reports directly to the Parliament of the United Kingdom and is sponsored by the Department for Science, Innovation and Technology. It is the independent regu ...
(ICO), an independent public body set up to promote access to official information and protect personal information. They do this by promoting good practice, ruling on eligible complaints, giving information to individuals and organisations, and taking action when the law is broken. The relevant UK laws include:
Data Protection Act 1998 The Data Protection Act 1998 (c. 29) (DPA) was an act of Parliament of the United Kingdom designed to protect personal data stored on computers or in an organised paper filing system. It enacted provisions from the European Union (EU) Data Pr ...
;
Freedom of Information Act 2000 The Freedom of Information Act 2000 (c. 36) is an Act of the Parliament of the United Kingdom that creates a public right of access to information held by public authorities. It is the implementation of freedom of information legislation in t ...
; Environmental Information Regulations 2004; Privacy and Electronic Communications Regulations 2003. The ICO has also provided a "Personal Information Toolkit" online which explains in more detail the various ways of protecting privacy online.


United States

In the United States, more systematic treatises of privacy did not appear until the 1890s, with the development of privacy law in America. Although the
US Constitution The Constitution of the United States is the supreme law of the United States of America. It superseded the Articles of Confederation, the nation's first constitution, on March 4, 1789. Originally including seven articles, the Constitut ...
does not explicitly include the
right to privacy The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 185 national constitutions mention the right to privacy. Since the globa ...
, individual as well as locational privacy may be implicitly granted by the Constitution under the 4th Amendment. The
Supreme Court of the United States The Supreme Court of the United States (SCOTUS) is the highest court in the federal judiciary of the United States. It has ultimate appellate jurisdiction over all Federal tribunals in the United States, U.S. federal court cases, and over Stat ...
has found that other guarantees have ''penumbras'' that implicitly grant a right to privacy against government intrusion, for example in '' Griswold v. Connecticut'' and '' Roe v. Wade.'' ''
Dobbs v. Jackson Women's Health Organization ''Dobbs v. Jackson Women's Health Organization'', 597 U.S. 215 (2022), is a List of landmark court decisions in the United States, landmark decision of the Supreme Court of the United States, United States Supreme Court in which the court held ...
'' later overruled ''Roe v. Wade'', with Supreme Court Justice
Clarence Thomas Clarence Thomas (born June 23, 1948) is an American lawyer and jurist who has served since 1991 as an associate justice of the Supreme Court of the United States. President George H. W. Bush nominated him to succeed Thurgood Marshall. Afte ...
characterizing ''Griswold'''s penumbral argument as having a "facial absurdity", casting doubt on the validity of a constitutional right to privacy in the United States and of previous decisions relying on it. In the United States, the right of
freedom of speech Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The rights, right to freedom of expression has been r ...
granted in the First Amendment has limited the effects of lawsuits for breach of privacy. Privacy is regulated in the US by the
Privacy Act of 1974 Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of ...
, and various state laws. The Privacy Act of 1974 only applies to federal agencies in the executive branch of the federal government. Certain privacy rights have been established in the United States via legislation such as the
Children's Online Privacy Protection Act The Children's Online Privacy Protection Act of 1998 (COPPA) is a United States federal law The law of the United States comprises many levels of Codification (law), codified and uncodified forms of law, of which the supreme law is ...
(COPPA), the
Gramm–Leach–Bliley Act The Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999, () is an act of the 106th United States Congress (1999–2001). It repealed part of the Glass–Steagall Act of 1933, removing barriers in ...
(GLB), and the
Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Ted Kennedy, Kennedy–Nancy Kassebaum, Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President ...
(HIPAA). Unlike the EU and most EU-member states, the US does not recognize the right to privacy of non-US citizens. The UN's Special Rapporteur on the right to privacy, Joseph A. Cannataci, criticized this distinction.


Conceptions of privacy


Privacy as contextual integrity

The theory of contextual integrity, developed by Helen Nissenbaum, defines privacy as an appropriate information flow, where appropriateness, in turn, is defined as conformance with legitimate, informational norms specific to social contexts.


Right to be let alone

In 1890, the United States
jurists A jurist is a person with expert knowledge of law; someone who analyzes and comments on law. This person is usually a specialist legal scholar, mostly (but not always) with a formal education in law (a law degree) and often a legal practition ...
Samuel D. Warren and Louis Brandeis wrote "The Right to Privacy", an article in which they argued for the "right to be let alone", using that phrase as a definition of privacy. This concept relies on the theory of
natural rights Some philosophers distinguish two types of rights, natural rights and legal rights. * Natural rights are those that are not dependent on the laws or customs of any particular culture or government, and so are ''universal'', ''fundamental rights ...
and focuses on protecting individuals. The citation was a response to recent technological developments, such as photography, and sensationalist journalism, also known as
yellow journalism In journalism, yellow journalism and the yellow press are American newspapers that use eye-catching headlines and sensationalized exaggerations for increased sales. This term is chiefly used in American English, whereas in the United Kingdom, ...
.Warren and Brandeis
"The Right To Privacy"
1890) 4 Harvard Law Review 193
There is extensive commentary over the meaning of being "let alone", and among other ways, it has been interpreted to mean the right of a person to choose seclusion from the attention of others if they wish to do so, and the right to be immune from scrutiny or being observed in private settings, such as one's own home. Although this early vague legal concept did not describe privacy in a way that made it easy to design broad legal protections of privacy, it strengthened the notion of privacy rights for individuals and began a legacy of discussion on those rights in the US.


Limited access

Limited access refers to a person's ability to participate in society without having other individuals and organizations collect information about them. Various theorists have imagined privacy as a system for limiting access to one's personal information.
Edwin Lawrence Godkin Edwin Lawrence Godkin (2 October 183121 May 1902) was an American journalist and newspaper editor. He founded ''The Nation'' and was the editor-in-chief of the ''New York Evening Post'' from 1883 to 1899.Eric Fettman, "Godkin, E.L." in Stephen ...
wrote in the late 19th century that "nothing is better worthy of legal protection than private life, or, in other words, the right of every man to keep his affairs to himself, and to decide for himself to what extent they shall be the subject of public observation and discussion." Adopting an approach similar to the one presented by Ruth Gavison Nine years earlier,
Sissela Bok Sissela Bok (born Myrdal; 2 December 1934) is a Swedish-born American philosopher and ethicist, the daughter of two Nobel Prize winners: Gunnar Myrdal who won the Economics prize with Friedrich Hayek in 1974, and Alva Myrdal who won the Nobel P ...
said that privacy is "the condition of being protected from unwanted access by others—either physical access, personal information, or attention."


Control over information

Control over one's personal information is the concept that "privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others." Generally, a person who has consensually formed an interpersonal relationship with another person is not considered "protected" by privacy rights with respect to the person they are in the relationship with. Charles Fried said that "Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves." Nevertheless, in the era of
big data Big data primarily refers to data sets that are too large or complex to be dealt with by traditional data processing, data-processing application software, software. Data with many entries (rows) offer greater statistical power, while data with ...
, control over information is under pressure.


States of privacy

Alan Westin defined four states—or experiences—of privacy: solitude, intimacy, anonymity, and reserve.
Solitude Solitude, also known as social withdrawal, is a state of seclusion or isolation, meaning lack of socialisation. Effects can be either positive or negative, depending on the situation. Short-term solitude is often valued as a time when one may wo ...
is a physical separation from others; Intimacy is a "close, relaxed; and frank relationship between two or more individuals" that results from the seclusion of a pair or small group of individuals. Anonymity is the "desire of individuals for times of 'public privacy.'" Lastly, reserve is the "creation of a psychological barrier against unwanted intrusion"; this creation of a psychological barrier requires others to respect an individual's need or desire to restrict communication of information concerning themself. In addition to the psychological barrier of reserve, Kirsty Hughes identified three more kinds of privacy barriers: physical, behavioral, and normative. Physical barriers, such as walls and doors, prevent others from accessing and experiencing the individual. (In this sense, "accessing" an individual includes accessing personal information about them.) Behavioral barriers communicate to others—verbally, through language, or non-verbally, through personal space, body language, or clothing—that an individual does not want the other person to access or experience them. Lastly, normative barriers, such as laws and social norms, restrain others from attempting to access or experience an individual.


Privacy as personal control

Psychologist A psychologist is a professional who practices psychology and studies mental states, perceptual, cognitive, emotional, and social processes and behavior. Their work often involves the experimentation, observation, and explanation, interpretatio ...
Carl A. Johnson has identified the psychological concept of “personal control” as closely tied to privacy. His concept was developed as a process containing four stages and two behavioural outcome relationships, with one’s outcomes depending on situational as well as personal factors. Privacy is described as “behaviors falling at specific locations on these two dimensions”. Johnson examined the following four stages to categorize where people exercise personal control: outcome choice control is the selection between various outcomes. Behaviour selection control is the selection between behavioural strategies to apply to attain selected outcomes. Outcome effectance describes the fulfillment of selected behaviour to achieve chosen outcomes. Outcome realization control is the personal interpretation of one’s achieved outcome. The relationship between two factors– primary and secondary control, is defined as the two-dimensional phenomenon where one reaches personal control: primary control describes behaviour directly causing outcomes, while secondary control is behaviour indirectly causing outcomes. Johnson explores the concept that privacy is a behaviour that has secondary control over outcomes. Lorenzo Magnani expands on this concept by highlighting how privacy is essential in maintaining personal control over one's identity and consciousness. He argues that consciousness is partly formed by external representations of ourselves, such as narratives and data, which are stored outside the body. However, much of our consciousness consists of internal representations that remain private and are rarely externalized. This internal privacy, which Magnani refers to as a form of "information property" or "moral capital," is crucial for preserving free choice and personal agency. According to Magnani, when too much of our identity and data is externalized and subjected to scrutiny, it can lead to a loss of personal control, dignity, and responsibility. The protection of privacy, therefore, safeguards our ability to develop and pursue personal projects in our own way, free from intrusive external forces. Acknowledging other conceptions of privacy while arguing that the fundamental concern of privacy is behavior selection control, Johnson converses with other interpretations including those of Maxine Wolfe and Robert S. Laufer, and Irwin Altman. He clarifies the continuous relationship between privacy and personal control, where outlined behaviours not only depend on privacy, but the conception of one’s privacy also depends on his defined behavioural outcome relationships.


Secrecy

Privacy is sometimes defined as an option to have secrecy. Richard Posner said that privacy is the right of people to "conceal information about themselves that others might use to their disadvantage". In various legal contexts, when privacy is described as secrecy, a conclusion is reached: if privacy is secrecy, then rights to privacy do not apply for any information which is already publicly disclosed. When privacy-as-secrecy is discussed, it is usually imagined to be a selective kind of secrecy in which individuals keep some information secret and private while they choose to make other information public and not private.


Personhood and autonomy

Privacy may be understood as a necessary precondition for the development and preservation of personhood. Jeffrey Reiman defined privacy in terms of a recognition of one's ownership of their physical and mental reality and a moral right to
self-determination Self-determination refers to a people's right to form its own political entity, and internal self-determination is the right to representative government with full suffrage. Self-determination is a cardinal principle in modern international la ...
. Through the "social ritual" of privacy, or the social practice of respecting an individual's privacy barriers, the social group communicates to developing children that they have exclusive moral rights to their bodies—in other words, moral ownership of their body. This entails control over both active (physical) and cognitive appropriation, the former being control over one's movements and actions and the latter being control over who can experience one's physical existence and when. Alternatively, Stanley Benn defined privacy in terms of a recognition of oneself as a subject with agency—as an individual with the capacity to choose. Privacy is required to exercise choice. Overt observation makes the individual aware of himself or herself as an object with a "determinate character" and "limited probabilities." Covert observation, on the other hand, changes the conditions in which the individual is exercising choice without his or her knowledge and consent. In addition, privacy may be viewed as a state that enables autonomy, a concept closely connected to that of personhood. According to Joseph Kufer, an autonomous self-concept entails a conception of oneself as a "purposeful, self-determining, responsible agent" and an awareness of one's capacity to control the boundary between self and other—that is, to control who can access and experience him or her and to what extent. Furthermore, others must acknowledge and respect the self's boundaries—in other words, they must respect the individual's privacy. The studies of psychologists such as Jean Piaget and Victor Tausk show that, as children learn that they can control who can access and experience them and to what extent, they develop an autonomous self-concept. In addition, studies of adults in particular institutions, such as Erving Goffman's study of "total institutions" such as prisons and mental institutions, suggest that systemic and routinized deprivations or violations of privacy deteriorate one's sense of autonomy over time.


Self-identity and personal growth

Privacy may be understood as a prerequisite for the development of a sense of self-identity. Privacy barriers, in particular, are instrumental in this process. According to Irwin Altman, such barriers "define and limit the boundaries of the self" and thus "serve to help define he self" This control primarily entails the ability to regulate contact with others. Control over the "permeability" of the self's boundaries enables one to control what constitutes the self and thus to define what is the self. In addition, privacy may be seen as a state that fosters personal growth, a process integral to the development of self-identity. Hyman Gross suggested that, without privacy—solitude, anonymity, and temporary releases from social roles—individuals would be unable to freely express themselves and to engage in self-discovery and
self-criticism Self-criticism involves how an individual evaluates oneself. Self-criticism in psychology is typically studied and discussed as a negative personality trait in which a person has a disrupted self-identity. The opposite of self-criticism would be ...
. Such self-discovery and self-criticism contributes to one's understanding of oneself and shapes one's sense of identity.


Intimacy

In a way analogous to how the personhood theory imagines privacy as some essential part of being an individual, the intimacy theory imagines privacy to be an essential part of the way that humans have strengthened or intimate relationships with other humans. Because part of human relationships includes individuals volunteering to self-disclose most if not all personal information, this is one area in which privacy does not apply. James Rachels advanced this notion by writing that privacy matters because "there is a close connection between our ability to control who has access to us and to information about us, and our ability to create and maintain different sorts of social relationships with different people." Protecting intimacy is at the core of the concept of sexual privacy, which law professor Danielle Citron argues should be protected as a unique form of privacy.


Physical privacy

Physical privacy could be defined as preventing "intrusions into one's physical space or solitude." An example of the legal basis for the right to physical privacy is the U.S. Fourth Amendment, which guarantees "the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures". Physical privacy may be a matter of cultural sensitivity, personal dignity, and/or shyness. There may also be concerns about safety, if, for example one is wary of becoming the victim of crime or
stalking Stalking is unwanted and/or repeated surveillance or contact by an individual or group toward another person. Stalking behaviors are interrelated to harassment and intimidation and may include following the victim in person or monitorin ...
. There are different things that can be prevented to protect one's physical privacy, including people watching (even through recorded images) one's intimate behaviours or intimate parts and unauthorized access to one's personal possessions or places. Examples of possible efforts used to avoid the former, especially for
modesty Modesty, sometimes known as demureness, is a mode of dress and deportment which intends to avoid the encouraging of sexual attraction in others. The word ''modesty'' comes from the Latin word ''wikt:modestus, modestus'' which means 'keeping with ...
reasons, are
clothes Clothing (also known as clothes, garments, dress, apparel, or attire) is any item worn on a human human body, body. Typically, clothing is made of fabrics or textiles, but over time it has included garments made from animal skin and other thin s ...
,
wall A wall is a structure and a surface that defines an area; carries a load; provides security, shelter, or soundproofing; or serves a decorative purpose. There are various types of walls, including border barriers between countries, brick wal ...
s,
fence A fence is a structure that encloses an area, typically outdoors, and is usually constructed from posts that are connected by boards, wire, rails or net (textile), netting. A fence differs from a wall in not having a solid foundation along its ...
s, privacy screens,
cathedral glass Cathedral glass is the name given commercially to monochromatic sheet glass. It is thin by comparison with 'slab glass', may be coloured, and is textured on one side. The name draws from the fact that windows of stained glass were a feature of me ...
,
window covering Window coverings are considered any type of materials used to cover a window to manage sunlight, privacy, additional weatherproofing or for purely Window treatment, decorative purposes. Description and design Window coverings comprise materia ...
s, etc.


Organizational

Government agencies, corporations, groups/societies and other organizations may desire to keep their activities or secrets from being revealed to other organizations or individuals, adopting various
security Security is protection from, or resilience against, potential harm (or other unwanted coercion). Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or ...
practices and controls in order to keep private information confidential. Organizations may seek legal protection for their secrets. For example, a government administration may be able to invoke
executive privilege Executive privilege is the right of the president of the United States and other members of the executive branch to maintain confidential communications under certain circumstances within the executive branch and to resist some subpoenas and ot ...
or declare certain information to be classified, or a corporation might attempt to protect valuable proprietary information as
trade secret A trade secret is a form of intellectual property (IP) comprising confidential information that is not generally known or readily ascertainable, derives economic value from its secrecy, and is protected by reasonable efforts to maintain its conf ...
s.


Privacy self-synchronization

Privacy self-synchronization is a hypothesized mode by which the stakeholders of an enterprise privacy program spontaneously contribute collaboratively to the program's maximum success. The stakeholders may be customers, employees, managers, executives, suppliers, partners or investors. When self-synchronization is reached, the model states that the personal interests of individuals toward their privacy is in balance with the business interests of enterprises who collect and use the personal information of those individuals.


An individual right

David Flaherty believes networked computer databases pose threats to privacy. He develops 'data protection' as an aspect of privacy, which involves "the collection, use, and dissemination of personal information". This concept forms the foundation for fair information practices used by governments globally. Flaherty forwards an idea of privacy as information control, " dividuals want to be left alone and to exercise some control over how information about them is used".
Richard Posner Richard Allen Posner (; born January 11, 1939) is an American legal scholar and retired United States circuit judge who served on the U.S. Court of Appeals for the Seventh Circuit from 1981 to 2017. A senior lecturer at the University of Chicag ...
and Lawrence Lessig focus on the economic aspects of personal information control. Posner criticizes privacy for concealing information, which reduces market efficiency. For Posner, employment is selling oneself in the labour market, which he believes is like selling a product. Any 'defect' in the 'product' that is not reported is fraud. For Lessig, privacy breaches online can be regulated through code and law. Lessig claims "the protection of privacy would be stronger if people conceived of the right as a property right", and that "individuals should be able to control information about themselves".


A collective value and a human right

There have been attempts to establish privacy as one of the fundamental
human rights Human rights are universally recognized Morality, moral principles or Social norm, norms that establish standards of human behavior and are often protected by both Municipal law, national and international laws. These rights are considered ...
, whose social value is an essential component in the functioning of democratic societies. Priscilla Regan believes that individual concepts of privacy have failed philosophically and in policy. She supports a social value of privacy with three dimensions: shared perceptions, public values, and
collective A collective is a group of entities that share or are motivated by at least one common issue or interest or work together to achieve a common objective. Collectives can differ from cooperatives in that they are not necessarily focused upon an e ...
components. Shared ideas about privacy allows freedom of conscience and diversity in thought. Public values guarantee democratic participation, including freedoms of speech and association, and limits government power. Collective elements describe privacy as collective good that cannot be divided. Regan's goal is to strengthen privacy claims in policy making: "if we did recognize the collective or public-good value of privacy, as well as the common and public value of privacy, those advocating privacy protections would have a stronger basis upon which to argue for its protection". Leslie Regan Shade argues that the human right to privacy is necessary for meaningful democratic participation, and ensures human dignity and autonomy. Privacy depends on norms for how information is distributed, and if this is appropriate. Violations of privacy depend on context. The human right to privacy has precedent in the
United Nations Declaration of Human Rights The Universal Declaration of Human Rights (UDHR) is an international document adopted by the United Nations General Assembly that enshrines the rights and freedoms of all human beings. Drafted by a UN committee chaired by Eleanor Roosevelt, ...
: "Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers." Shade believes that privacy must be approached from a people-centered perspective, and not through the marketplace. Dr. Eliza Watt, Westminster Law School, University of Westminster in London, UK, proposes application of the International Human Right Law (IHRL) concept of “virtual control” as an approach to deal with extraterritorial mass surveillance by state intelligence agencies. Dr. Watt envisions the “virtual control” test, understood as a remote control over the individual's right to privacy of communications, where privacy is recognized under the ICCPR, Article 17. This, she contends, may help to close the normative gap that is being exploited by nation states.


Privacy paradox and economic valuation

The ''privacy paradox'' is a phenomenon in which online users state that they are concerned about their privacy but behave as if they were not.Swartz, J., "'Opting In': A Privacy Paradox", The Washington Post, 03 Sep 2000, H.1. While this term was coined as early as 1998, it was not used in its current popular sense until the year 2000. Susan B. Barnes similarly used the term ''privacy paradox'' to refer to the ambiguous boundary between private and public space on social media. When compared to adults, young people tend to disclose more information on
social media Social media are interactive technologies that facilitate the Content creation, creation, information exchange, sharing and news aggregator, aggregation of Content (media), content (such as ideas, interests, and other forms of expression) amongs ...
. However, this does not mean that they are not concerned about their privacy. Susan B. Barnes gave a case in her article: in a television interview about Facebook, a student addressed her concerns about disclosing personal information online. However, when the reporter asked to see her Facebook page, she put her home address, phone numbers, and pictures of her young son on the page. The privacy paradox has been studied and scripted in different research settings. Several studies have shown this inconsistency between privacy attitudes and behavior among online users. However, by now an increasing number of studies have also shown that there are significant and at times large correlations between privacy concerns and information sharing behavior, which speaks against the privacy paradox. A meta-analysis of 166 studies published on the topic reported an overall small but significant relation between privacy concerns and informations sharing or use of privacy protection measures. So although there are several individual instances or anecdotes where behavior appear paradoxical, on average privacy concerns and privacy behaviors seem to be related, and several findings question the general existence of the privacy paradox. However, the relationship between concerns and behavior is likely only small, and there are several arguments that can explain why that is the case. According to the attitude-behavior gap, attitudes and behaviors are ''in general'' and in most cases not closely related. A main explanation for the partial mismatch in the context of privacy specifically is that users lack awareness of the risks and the degree of protection. Users may underestimate the harm of disclosing information online. On the other hand, some researchers argue that the mismatch comes from lack of technology literacy and from the design of sites. For example, users may not know how to change their default settings even though they care about their privacy. Psychologists Sonja Utz and Nicole C. Krämer particularly pointed out that the privacy paradox can occur when users must trade-off between their privacy concerns and impression management.


Research on irrational decision making

A study conducted by Susanne Barth and Menno D.T. de Jo demonstrates that decision making takes place on an irrational level, especially when it comes to mobile computing. Mobile applications in particular are often built up in such a way that spurs decision making that is fast and automatic without assessing risk factors. Protection measures against these unconscious mechanisms are often difficult to access while downloading and installing apps. Even with mechanisms in place to protect user privacy, users may not have the knowledge or experience to enable these mechanisms. Users of mobile applications generally have very little knowledge of how their personal data are used. When they decide which application to download, they typically are not able to effectively interpret the information provided by application vendors regarding the collection and use of personal data. Other research finds that this lack of interpretability means users are much more likely to be swayed by cost, functionality, design, ratings, reviews and number of downloads than requested permissions for usage of their personal data.


The economic valuation of privacy

The willingness to incur a privacy risk is suspected to be driven by a complex array of factors including risk attitudes, personal value for private information, and general attitudes to privacy (which are typically measured using surveys). One experiment aiming to determine the monetary value of several types of personal information indicated relatively low evaluations of personal information. Providing personal data does not only regard monetary value, but also increased ease of use in voluntary interactions in government processes. Despite claims that ascertaining the value of data requires a "stock-market for personal information", surveillance capitalism and the mass surveillance industry regularly place price tags on this form of data as it is shared between corporations and governments.


=Information asymmetry

= Users are not always given the tools to live up to their professed privacy concerns, and they are sometimes willing to trade private information for convenience, functionality, or financial gain, even when the gains are very small. One study suggests that people think their browser history is worth the equivalent of a cheap meal. Another finds that attitudes to privacy risk do not appear to depend on whether it is already under threat or not. The methodology of user empowerment describes how to provide users with sufficient context to make privacy-informed decisions.


Inherent necessity for privacy violation

It is suggested by Andréa Belliger and David J. Krieger that the privacy paradox should not be considered a paradox, but more of a ''privacy dilemma'', for services that cannot exist without the user sharing private data. However, the general public is typically not given the choice whether to share private data or not, making it difficult to verify any claim that a service truly cannot exist without sharing private data.


Privacy calculus model

The privacy calculus model posits that two factors determine privacy behavior, namely privacy concerns (or perceived risks) and expected benefits. By now, the privacy calculus has been supported by several studies.


Actions which reduce privacy

As with other conceptions of privacy, there are various ways to discuss what kinds of processes or actions remove, challenge, lessen, or attack privacy. In 1960 legal scholar William Prosser created the following list of activities which can be remedied with privacy protection: # Intrusion into a person's private space, own affairs, or wish for solitude # Public disclosure of personal information about a person which could be embarrassing for them to have revealed # Promoting access to information about a person which could lead the public to have incorrect beliefs about them # Encroaching someone's personality rights, and using their likeness to advance interests which are not their own From 2004 to 2008, building from this and other historical precedents, Daniel J. Solove presented another classification of actions which are harmful to privacy, including collection of information which is already somewhat public, processing of information, sharing information, and invading personal space to get private information.


Collecting information

In the context of harming privacy, information collection means gathering whatever information can be obtained by doing something to obtain it. Examples include surveillance and
interrogation Interrogation (also called questioning) is interviewing as commonly employed by law enforcement officers, military personnel, intelligence agencies, organized crime syndicates, and terrorist organizations with the goal of eliciting useful informa ...
. Another example is how consumers and marketers also collect information in the business context through facial recognition which has recently caused a concern for things such as privacy. There is currently research being done related to this topic. Companies like Google and Meta collect vast amounts of personal data from their users through various services and platforms. This data includes browsing habits, search history, location information, and even personal communications. These companies then analyze and aggregate this data to create detailed user profiles, which are sold to advertisers and other third parties. This practice is often done without explicit user consent, leading to an invasion of privacy as individuals have little control over how their information is used. The sale of personal data can result in targeted advertising, manipulation, and even potential security risks, as sensitive information can be exploited by malicious actors. This commercial exploitation of personal data undermines user trust and raises significant ethical and legal concerns regarding data protection and privacy rights.


Aggregating information

It can happen that privacy is not harmed when information is available, but that the harm can come when that information is collected as a set, then processed together in such a way that the collective reporting of pieces of information encroaches on privacy. Actions in this category which can lessen privacy include the following: *
data aggregation Data aggregation is the compiling of information from databases with intent to prepare combined datasets for data processing. Description The United States Geological Survey explains that, “when data are well documented, you know how and where to ...
, which is connecting many related but unconnected pieces of information * identification, which can mean breaking the
de-identification De-identification is the process used to prevent someone's personal identity from being revealed. For example, data produced during human subject research might be de-identified to preserve the privacy of research participants. Biological data ...
of items of data by putting it through a de-anonymization process, thus making facts which were intended to not name particular people to become associated with those people * insecurity, such as lack of
data security Data security or data protection means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach. Technologies Disk encryption ...
, which includes when an organization is supposed to be responsible for protecting data instead suffers a
data breach A data breach, also known as data leakage, is "the unauthorized exposure, disclosure, or loss of personal information". Attackers have a variety of motives, from financial gain to political activism, political repression, and espionage. There ...
which harms the people whose data it held * secondary use, which is when people agree to share their data for a certain purpose, but then the data is used in ways without the data donors'
informed consent Informed consent is an applied ethics principle that a person must have sufficient information and understanding before making decisions about accepting risk. Pertinent information may include risks and benefits of treatments, alternative treatme ...
* exclusion is the use of a person's data without any attempt to give the person an opportunity to manage the data or participate in its usage


Information dissemination

Information dissemination is an attack on privacy when information which was shared in confidence is shared or threatened to be shared in a way that harms the subject of the information. There are various examples of this. Breach of confidentiality is when one entity promises to keep a person's information private, then breaks that promise. Disclosure is making information about a person more accessible in a way that harms the subject of the information, regardless of how the information was collected or the intent of making it available. Exposure is a special type of disclosure in which the information disclosed is emotional to the subject or taboo to share, such as revealing their private life experiences, their nudity, or perhaps private body functions. Increased accessibility means advertising the availability of information without actually distributing it, as in the case of
doxing Doxing or doxxing is the act of publicly providing personally identifiable information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The ...
. Blackmail is making a threat to share information, perhaps as part of an effort to coerce someone. Appropriation is an attack on the
personhood Personhood is the status of being a person. Defining personhood is a controversial topic in philosophy and law and is closely tied with legal and political concepts of citizenship, equality, and liberty. According to law, only a legal person (ei ...
of someone, and can include using the value of someone's reputation or likeness to advance interests which are not those of the person being appropriated. Distortion is the creation of misleading information or lies about a person.


Invasion

Invasion of privacy, a subset of
expectation of privacy In United States constitutional law, reasonable expectation of privacy is a legal test which is crucial in defining the scope of the applicability of the privacy protections of the Fourth Amendment to the U.S. Constitution. It is related to, ...
, is a different concept from the collecting, aggregating, and disseminating information because those three are a misuse of available data, whereas invasion is an attack on the right of individuals to keep personal secrets. An invasion is an attack in which information, whether intended to be public or not, is captured in a way that insults the personal dignity and right to private space of the person whose data is taken.


Intrusion

An ''intrusion'' is any unwanted entry into a person's private personal space and solitude for any reason, regardless of whether data is taken during that breach of space. ''Decisional interference'' is when an entity somehow injects itself into the personal decision-making process of another person, perhaps to influence that person's private decisions but in any case doing so in a way that disrupts the private personal thoughts that a person has.


Examples of invasions of privacy

* In 2019, contract workers for
Apple An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
and
Amazon Amazon most often refers to: * Amazon River, in South America * Amazon rainforest, a rainforest covering most of the Amazon basin * Amazon (company), an American multinational technology company * Amazons, a tribe of female warriors in Greek myth ...
reported being forced to continue listening to " intimate moments" captured on the companies' smart speakers in order to improve the quality of their automated
speech recognition Speech recognition is an interdisciplinary subfield of computer science and computational linguistics that develops methodologies and technologies that enable the recognition and translation of spoken language into text by computers. It is also ...
software.


Techniques to improve privacy

Similarly to actions which reduce privacy, there are multiple angles of privacy and multiple techniques to improve them to varying extents. When actions are done at an organizational level, they may be referred to as
cybersecurity Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
.


Encryption

Individuals can encrypt e-mails via enabling either two encryption protocols, S/MIME, which is built into companies like Apple or Outlook and thus most common, or PGP. The
Signal A signal is both the process and the result of transmission of data over some media accomplished by embedding some variation. Signals are important in multiple subject fields including signal processing, information theory and biology. In ...
messaging app, which encrypts messages so that only the recipient can read the message, is notable for being available on many mobile devices and implementing a form of perfect forward secrecy. Signal has received praise from whistleblower
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
. Encryption and other privacy-based security measures are also used in some cryptocurrencies such as Monero and ZCash.


Anonymity

Anonymizing proxies or anonymizing networks like I2P and
Tor Tor, TOR or ToR may refer to: Places * Toronto, Canada ** Toronto Raptors * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor ...
can be used to prevent Internet service providers (ISP) from knowing which sites one visits and with whom one communicates, by hiding IP addresses and location, but does not necessarily protect a user from third party data mining. Anonymizing proxies are built into a user's device, in comparison to a
Virtual Private Network Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not con ...
(VPN), where users must download software. Using a VPN hides all data and connections that are exchanged between servers and a user's computer, resulting in the online data of the user being unshared and secure, providing a barrier between the user and their ISP, and is especially important to use when a user is connected to public Wi-Fi. However, users should understand that all their data does flow through the VPN's servers rather than the ISP. Users should decide for themselves if they wish to use either an anonymizing proxy or a VPN. In a more non-technical sense, using incognito mode or private browsing mode will prevent a user's computer from saving history, Internet files, and cookies, but the ISP will still have access to the users' search history. Using anonymous search engines will not share a user's history, clicks, and will obstruct ad blockers.


User empowerment

Concrete solutions on how to solve paradoxical behavior still do not exist. Many efforts are focused on processes of decision making, like restricting data access permissions during application installation, but this would not completely bridge the gap between user intention and behavior. Susanne Barth and Menno D.T. de Jong believe that for users to make more conscious decisions on privacy matters, the design needs to be more user-oriented. That being said, delivering on privacy protections is difficult due to the complexity of online consent processes, for example.


Other security measures

In a social sense, simply limiting the amount of personal information that users posts on social media could increase their security, which in turn makes it harder for criminals to perform identity theft. Moreover, creating a set of complex passwords and using two-factor authentication can allow users to be less susceptible to their accounts being compromised when various data leaks occur. Furthermore, users should protect their digital privacy by using anti-virus software, which can block harmful viruses like a pop-up scanning for personal information on a users' computer.


Legal methods

Although there are laws that promote the protection of users, in some countries, like the U.S., there is no federal digital privacy law and privacy settings are essentially limited by the state of current enacted privacy laws. To further their privacy, users can start conversing with representatives, letting representatives know that privacy is a main concern, which in turn increases the likelihood of further privacy laws being enacted.


Privacy in non-human animals

David Attenborough Sir David Frederick Attenborough (; born 8 May 1926) is an English broadcaster, biologist, natural historian and writer. He is best known for writing and presenting, in conjunction with the BBC Studios Natural History Unit, the nine nature d ...
, a
biologist A biologist is a scientist who conducts research in biology. Biologists are interested in studying life on Earth, whether it is an individual Cell (biology), cell, a multicellular organism, or a Community (ecology), community of Biological inter ...
and natural historian, affirmed that
gorilla Gorillas are primarily herbivorous, terrestrial great apes that inhabit the tropical forests of equatorial Africa. The genus ''Gorilla'' is divided into two species: the eastern gorilla and the western gorilla, and either four or five su ...
s "value their privacy" while discussing a brief escape by a gorilla in
London Zoo London Zoo, previously known as ZSL London Zoo or London Zoological Gardens and sometimes called Regent's Park Zoo, is the world's oldest scientific zoo. It was opened in London on 27 April 1828 and was originally intended to be used as a colle ...
. Lack of privacy in public spaces, caused by overcrowding, increases health issues in animals, including
heart disease Cardiovascular disease (CVD) is any disease involving the heart or blood vessels. CVDs constitute a class of diseases that includes: coronary artery diseases (e.g. angina pectoris, angina, myocardial infarction, heart attack), heart failure, ...
and
high blood pressure Hypertension, also known as high blood pressure, is a long-term medical condition in which the blood pressure in the arteries is persistently elevated. High blood pressure usually does not cause symptoms itself. It is, however, a major ri ...
. Also, the stress from overcrowding is connected to an increase in infant mortality rates and maternal stress. The lack of privacy that comes with overcrowding is connected to other issues in animals, which causes their relationships with others to diminish. How they present themselves to others of their species is a necessity in their life, and overcrowding causes the relationships to become disordered. For example, David Attenborough claims that the gorilla's right to privacy is being violated when they are looked at through glass enclosures. They are aware that they are being looked at, therefore they do not have control over how much the onlookers can see of them. Gorillas and other animals may be in the enclosures due to safety reasons, however Attenborough states that this is not an excuse for them to be constantly watched by unnecessary eyes. Also, animals will start hiding in unobserved spaces. Animals in zoos have been found to exhibit harmful or different behaviours due to the presence of visitors watching them: *
Cotton-top tamarins The cotton-top tamarin (''Saguinus oedipus'') is a small New World monkey weighing less than . This New World monkey can live up to 24 years, but most of them die by 13 years. One of the smallest primates, the cotton-top tamarin is easily recog ...
in zoos engage in less social behaviours, including physical contact and sex, than ones in off-exhibit buildings. *
Chimpanzee The chimpanzee (; ''Pan troglodytes''), also simply known as the chimp, is a species of Hominidae, great ape native to the forests and savannahs of tropical Africa. It has four confirmed subspecies and a fifth proposed one. When its close rel ...
s become more aggressive towards each other. * Lion-tailed macaques pace and bite themselves more in direct proportions to
human Humans (''Homo sapiens'') or modern humans are the most common and widespread species of primate, and the last surviving species of the genus ''Homo''. They are Hominidae, great apes characterized by their Prehistory of nakedness and clothing ...
visitors. * In one zoo,
orangutan Orangutans are great apes native to the rainforests of Indonesia and Malaysia. They are now found only in parts of Borneo and Sumatra, but during the Pleistocene they ranged throughout Southeast Asia and South China. Classified in the genus ...
s have been shown to cover their heads less as the density of visitors decreased.


See also

*
Civil liberties Civil liberties are guarantees and freedoms that governments commit not to abridge, either by constitution, legislation, or judicial interpretation, without due process. Though the scope of the term differs between countries, civil liberties of ...
*
Digital identity A digital identity is data stored on Computer, computer systems relating to an individual, organization, application, or device. For individuals, it involves the collection of personal data that is essential for facilitating automated access to ...
*
Global surveillance Global mass surveillance can be defined as the mass surveillance of entire populations across national borders. Its existence was not widely acknowledged by governments and the mainstream media until the global surveillance disclosures by Edw ...
* Identity theft in the United States *
Open data Open data are data that are openly accessible, exploitable, editable and shareable by anyone for any purpose. Open data are generally licensed under an open license. The goals of the open data movement are similar to those of other "open(-so ...
*
Open access Open access (OA) is a set of principles and a range of practices through which nominally copyrightable publications are delivered to readers free of access charges or other barriers. With open access strictly defined (according to the 2001 de ...
* Transparency *
Visual privacy Visual privacy is the relationship between collection and dissemination of visual information, the expectation of privacy, and the legal issues surrounding them. These days digital cameras are ubiquitous. They are one of the most common sensors f ...
*
Privacy software Privacy software, also called privacy platform, is software built to protect the privacy of its users. The software typically works in conjunction with Internet usage to control or limit the amount of information made available to third parties. ...


References


Works cited

* *


Further reading

*


External links


Glenn Greenwald: Why privacy matters
Video on
YouTube YouTube is an American social media and online video sharing platform owned by Google. YouTube was founded on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim who were three former employees of PayPal. Headquartered in ...
, provided by TED. Published 10 October 2014.
International Privacy Index world map
''The 2007 International Privacy Ranking'', Privacy International (London).
"Privacy"
entry in the ''
Stanford Encyclopedia of Philosophy The ''Stanford Encyclopedia of Philosophy'' (''SEP'') is a freely available online philosophy resource published and maintained by Stanford University, encompassing both an online encyclopedia of philosophy and peer-reviewed original publication ...
'' * Wikipedia's privacy policy
Wikimedia Foundation The Wikimedia Foundation, Inc. (WMF) is an American 501(c)(3) nonprofit organization headquartered in San Francisco, California, and registered there as foundation (United States law), a charitable foundation. It is the host of Wikipedia, th ...
{{Authority control Civil rights and liberties Digital rights Human rights Identity management Privacy law