HOME

TheInfoList



OR:

The right to privacy is an element of various legal traditions that intends to restrain
governmental A government is the system or group of people governing an organized community, generally a State (polity), state. In the case of its broad associative definition, government normally consists of legislature, executive (government), execu ...
and private actions that threaten the
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
of individuals. Over 185 national
constitutions A constitution is the aggregate of fundamental principles or established precedents that constitute the legal basis of a polity, organization or other type of entity, and commonly determines how that entity is to be governed. When these princ ...
mention the right to privacy. Since the global surveillance disclosures of 2013, the right to privacy has been a subject of international debate. Government agencies, such as the NSA,
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
,
CIA The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
, R&AW, and
GCHQ Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
, have engaged in
mass Mass is an Intrinsic and extrinsic properties, intrinsic property of a physical body, body. It was traditionally believed to be related to the physical quantity, quantity of matter in a body, until the discovery of the atom and particle physi ...
,
global surveillance Global mass surveillance can be defined as the mass surveillance of entire populations across national borders. Its existence was not widely acknowledged by governments and the mainstream media until the global surveillance disclosures by Edw ...
. Some current debates around the right to privacy include whether privacy can co-exist with the current capabilities of intelligence agencies to access and analyze many details of an individual's life; whether or not the right to privacy is forfeited as part of the
social contract In moral and political philosophy, the social contract is an idea, theory, or model that usually, although not always, concerns the legitimacy of the authority of the state over the individual. Conceptualized in the Age of Enlightenment, it ...
to bolster defense against supposed terrorist threats; and whether threats of
terrorism Terrorism, in its broadest sense, is the use of violence against non-combatants to achieve political or ideological aims. The term is used in this regard primarily to refer to intentional violence during peacetime or in the context of war aga ...
are a valid excuse to spy on the general population. Private sector actors can also threaten the right to privacyparticularly technology companies, such as
Amazon Amazon most often refers to: * Amazon River, in South America * Amazon rainforest, a rainforest covering most of the Amazon basin * Amazon (company), an American multinational technology company * Amazons, a tribe of female warriors in Greek myth ...
,
Apple An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
, Meta,
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
,
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
, and
Yahoo Yahoo (, styled yahoo''!'' in its logo) is an American web portal that provides the search engine Yahoo Search and related services including My Yahoo, Yahoo Mail, Yahoo News, Yahoo Finance, Yahoo Sports, y!entertainment, yahoo!life, an ...
that use and collect personal data.


International

The right to privacy is a fundamental human right firmly grounded in international law. On10 December 1948, the United Nations General Assembly adopted the
Universal Declaration of Human Rights The Universal Declaration of Human Rights (UDHR) is an international document adopted by the United Nations General Assembly that enshrines the Human rights, rights and freedoms of all human beings. Drafted by a UN Drafting of the Universal D ...
(UDHR); while the right to privacy does not appear in the document, Article 12 mentions privacy: Privacy is later codified in successive (hard) international human human rights treaties, including the
International Covenant on Civil and Political Rights The International Covenant on Civil and Political Rights (ICCPR) is a multilateral treaty that commits nations to respect the civil and political rights of individuals, including the right to life, freedom of religion, freedom of speech, freedom ...
: # No one shall be subjected to arbitrary or unlawful interference with his privacy, family, home or correspondence, nor to unlawful attacks on his honour and reputation. # Everyone has the right to the protection of the law against such interference or attacks. ::�
International Covenant on Civil and Political Rights, Article 17


History

The concept of a human ''"right to privacy"'' begins when the Latin word ''ius'' expanded from meaning "what is fair" to include "a right – an entitlement a person possesses to control or claim something," by the
Decretum Gratiani The , also known as the or or simply as the , is a collection of Catholic canon law compiled and written in the 12th century as a legal textbook by the jurist known as Gratian. It forms the first part of the collection of six legal texts, whic ...
in
Bologna Bologna ( , , ; ; ) is the capital and largest city of the Emilia-Romagna region in northern Italy. It is the List of cities in Italy, seventh most populous city in Italy, with about 400,000 inhabitants and 150 different nationalities. Its M ...
, Italy in the 12th century. In the United States, an article in the 15 December 1890, issue of the ''
Harvard Law Review The ''Harvard Law Review'' is a law review published by an independent student group at Harvard Law School. According to the ''Journal Citation Reports'', the ''Harvard Law Review''s 2015 impact factor of 4.979 placed the journal first out of ...
'' entitled " The Right to Privacy," written by attorney Samuel D. Warren II and future U.S. Supreme Court Justice
Louis Brandeis Louis Dembitz Brandeis ( ; November 13, 1856 – October 5, 1941) was an American lawyer who served as an Associate Justice of the Supreme Court of the United States, associate justice on the Supreme Court of the United States from 1916 to ...
, is often cited as the first explicit finding of a U.S. right to privacy. Warren II and Brandeis wrote that privacy is the "right to be let alone," and focused on protecting individuals. This approach was a response to recent technological developments of the time, such as photography and sensationalist journalism, also known as "
yellow journalism In journalism, yellow journalism and the yellow press are American newspapers that use eye-catching headlines and sensationalized exaggerations for increased sales. This term is chiefly used in American English, whereas in the United Kingdom, ...
." Privacy rights are inherently intertwined with information technology. In his widely cited
dissenting opinion A dissenting opinion (or dissent) is an Legal opinion, opinion in a legal case in certain legal systems written by one or more judges expressing disagreement with the majority opinion of the court which gives rise to its judgment. Dissenting opi ...
in '' Olmstead v. United States'' (1928), Brandeis relied on thoughts he developed in the article "The Right to Privacy." In that dissent, he urged that personal privacy matters were more relevant to
constitutional law Constitutional law is a body of law which defines the role, powers, and structure of different entities within a state, namely, the executive, the parliament or legislature, and the judiciary; as well as the basic rights of citizens and, in ...
, going so far as to say that "the government was identified as a potential privacy invader." He writes, "Discovery and invention have made it possible for the Government, by means far more effective than stretching upon the rack, to obtain disclosure in court of what is whispered in the closet." At that time, telephones were often community assets, with shared party lines and potentially eavesdropping
switchboard operator In the early days of telephony, companies used manual telephone switchboards, and switchboard operators connected calls by inserting a pair of phone plugs into the appropriate jacks. They were gradually phased out and replaced by automated syste ...
s. By the time of '' Katz'', in 1967, telephones had become personal devices with lines not shared across homes and switching was electro-mechanical. In the 1970s, new computing and recording technologies raised more concerns about privacy, resulting in the Fair Information Practice Principles. In recent years, there have been few attempts to clearly and precisely define the "right to privacy."


As an individual right

Alan Westin believes that new technologies alter the balance between privacy and disclosure and that privacy rights may limit government surveillance to protect democratic processes. Westin defines privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others". Westin describes 4 states of privacy: solitude, intimacy, anonymity, and reserve. These states must balance participation against norms:
Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of themself to others, in light of the environmental conditions and social norms set by the society in which they live. :— Alan Westin, ''Privacy and Freedom'', 1968
Under liberal democratic systems, privacy creates a space separate from political life, and allows personal autonomy, while ensuring democratic freedoms of association and expression. Privacy to individuals is the ability to behave, think, speak, and express ideas without the monitoring or surveillance of someone else. Individuals exercise their freedom of expression through attending political rallies and choosing to hide their identities online by using pseudonyms. David Flaherty believes networked computer databases pose threats to privacy. He develops 'data protection' as an aspect of privacy, which involves "the collection, use, and dissemination of personal information". This concept forms the foundation for fair information practices used by governments globally. Flaherty forwards an idea of privacy as information control, "individuals want to be left alone and to exercise some control over how information about them is used". Marc Rotenberg has described the modern right to privacy as Fair Information Practices: "the rights and responsibilities associated with the collection and use of personal information." Rotenberg emphasizes that the allocation of rights are to the data subject and the responsibilities are assigned to the data collectors because of the transfer of the data and the asymmetry of information concerning data practices.
Richard Posner Richard Allen Posner (; born January 11, 1939) is an American legal scholar and retired United States circuit judge who served on the U.S. Court of Appeals for the Seventh Circuit from 1981 to 2017. A senior lecturer at the University of Chicag ...
and
Lawrence Lessig Lester Lawrence "Larry" Lessig III (born June 3, 1961) is an American legal scholar and political activist. He is the Roy L. Furman Professor of Law at Harvard Law School and the former director of the Edmond J. Safra Center for Ethics at Harvar ...
focus on the economic aspects of personal information control. Posner criticizes privacy for concealing information, which reduces market efficiency. For Posner, employment is selling oneself in the labor market, which he believes is like selling a product. Any 'defect' in the 'product' that is not reported is fraud. For Lessig, privacy breaches online can be regulated through code and law. Lessig claims that "the protection of privacy would be stronger if people conceived of the right as a property right," and that "individuals should be able to control information about themselves". Economic approaches to privacy make communal conceptions of privacy difficult to maintain. Adam D. Moore has argued that privacy, the right to control access to and use of personal information is closely connected to human well-being. He notes that "having the ability and authority to regulate access to and uses of locations, bodies, and personal information, is an essential part of human flourishing" and while "the forms of privacy may be culturally relative . . . the need for privacy is not."


As a collective value and a human right

There have been attempts to reframe privacy as a fundamental
human right Human rights are universally recognized moral principles or norms that establish standards of human behavior and are often protected by both national and international laws. These rights are considered inherent and inalienable, meaning t ...
, whose social value is an essential component in the functioning of democratic societies. Priscilla Regan believes that individual concepts of privacy have failed philosophically and in policy. She supports a social value of privacy with three dimensions: shared perceptions, public values, and
collective A collective is a group of entities that share or are motivated by at least one common issue or interest or work together to achieve a common objective. Collectives can differ from cooperatives in that they are not necessarily focused upon an e ...
components. Shared ideas about privacy allow freedom of conscience and diversity in thought. Public values guarantee democratic participation, including freedoms of speech and association, and limit government power. Collective elements describe privacy as a collective good that cannot be divided. Regan's goal is to strengthen privacy claims in policy making: "if we did recognize the collective or public-good value of privacy, as well as the common and public value of privacy, those advocating privacy protections would have a stronger basis upon which to argue for its protection". Leslie Regan Shade argues that the human right to privacy is necessary for meaningful democratic participation, and ensures human dignity and autonomy. Privacy depends on norms for how information is distributed, and if this is appropriate. Violations of privacy depend on context. The human right to privacy has precedent in the United Nations Declaration of Human Rights. Shade believes that privacy must be approached from a people-centered perspective, and not through the marketplace.


Privacy laws in different jurisdictions

Privacy laws apply to both public and private sector actors.


Australia

Australia does not have a constitutional right to privacy. However, the ''
Privacy Act 1988 The ''Privacy Act 1988'' is an Australian law dealing with privacy. Section 14 of the Act stipulates a number of privacy rights known as the Australian Privacy Principles (APPs). These principles apply to Australian Government and Australian C ...
'' ( Cth) provides a degree of protection over an individual's
personally identifiable information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has fou ...
and its usage by the government and large companies. The ''Privacy Act'' also outlines the 13 Australian Privacy Principles. Australia also lacks a
tort A tort is a civil wrong, other than breach of contract, that causes a claimant to suffer loss or harm, resulting in legal liability for the person who commits the tortious act. Tort law can be contrasted with criminal law, which deals with cri ...
against invasions of privacy. In the 2001 case of , the
High Court of Australia The High Court of Australia is the apex court of the Australian legal system. It exercises original and appellate jurisdiction on matters specified in the Constitution of Australia and supplementary legislation. The High Court was establi ...
explained that there stood the possibility of "a tort identified as unjustified invasion of privacy", but that this case lacked the facts to establish it. Since 2001, there have been some state-based casesnamely the 2003 case ; and the 2007 case that attempted to establish a tortious invasion of privacy, but these cases were settled before decisions could be made. Further, they have received conflicting analyses in later cases.


Canada

Canadian privacy law is derived from the
common law Common law (also known as judicial precedent, judge-made law, or case law) is the body of law primarily developed through judicial decisions rather than statutes. Although common law may incorporate certain statutes, it is largely based on prece ...
, statutes of the
Parliament of Canada The Parliament of Canada () is the Canadian federalism, federal legislature of Canada. The Monarchy of Canada, Crown, along with two chambers: the Senate of Canada, Senate and the House of Commons of Canada, House of Commons, form the Bicameral ...
and the various provincial legislatures, and the ''
Canadian Charter of Rights and Freedoms The ''Canadian Charter of Rights and Freedoms'' (), often simply referred to as the ''Charter'' in Canada, is a bill of rights entrenched in the Constitution of Canada, forming the first part of the '' Constitution Act, 1982''. The ''Char ...
''. Perhaps ironically, Canada's legal conceptualization of privacy, along with most modern legal Western conceptions of privacy, can be traced back to Warren and Brandeis’s "The Right to Privacy" published in the ''Harvard Law Review'' in 1890, Holvast states "Almost all authors on privacy start the discussion with the famous article ' The Right to Privacy' of Samuel Warren and Louis Brandeis".


China

The Constitution is the highest law in China. Privacy rights have been applied throughout China. The Constitution provides direction for all states in China and it further stipulates that "all states must abide by and be held accountable for any violation of the Constitution and the law; the law specifically protects civil rights of a citizen's personal dignity and confidentiality of correspondence." China has a new standard and the first of its kind for the country coming into effect 1 January 2021, the Civil Code is the first of its kind sweeping law replacing all laws covering general provisions, real property, contracts, personality rights, marriage and family, inheritance, tort liability, and supplementary provisions. In many cases raised in the legal system, these rights have been overlooked as the courts have not treated each case with the same legal precedent for each case. China deploys
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
on its population including through the use of
closed-circuit television Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific place on a limited set of monitors. It differs from broadcast television in that the signa ...
. The 2021 Data Security Law classifies data into different categories and establishes corresponding levels of protection. It imposes significant data localization requirements, in a response to the extraterritorial reach of the United States CLOUD Act or similar foreign laws. The 2021 Personal Information Protection Law is China's first comprehensive law on personal data rights and is modeled after the European Union's
General Data Protection Regulation The General Data Protection Regulation (Regulation (EU) 2016/679), abbreviated GDPR, is a European Union regulation on information privacy in the European Union (EU) and the European Economic Area (EEA). The GDPR is an important component of ...
.


European Union

The right to privacy is protected in the EU by
European Convention on Human Rights The European Convention on Human Rights (ECHR; formally the Convention for the Protection of Human Rights and Fundamental Freedoms) is a Supranational law, supranational convention to protect human rights and political freedoms in Europe. Draf ...
Article 8: Compared to the United States, the European Union (EU) has more extensive data protection laws. The
General Data Protection Regulation The General Data Protection Regulation (Regulation (EU) 2016/679), abbreviated GDPR, is a European Union regulation on information privacy in the European Union (EU) and the European Economic Area (EEA). The GDPR is an important component of ...
(GDPR) is an important component of EU
privacy law Privacy law is a set of regulations that govern the collection, storage, and utilization of personal information from healthcare, governments, companies, public or private entities, or individuals. Privacy laws are examined in relation to an ind ...
and of
human rights law International human rights law (IHRL) is the body of international law designed to promote human rights on social, regional, and domestic levels. As a form of international law, international human rights law is primarily made up of treaties, ag ...
, in particular Article 8(1) of the
Charter of Fundamental Rights of the European Union The Charter of Fundamental Rights of the European Union (CFR) enshrines certain political, social, and economic rights for European Union (EU) citizens and residents into EU law. It was drafted by the European Convention and solemnly procla ...
. Under GDPR, data about citizens may only be gathered or processed under specific cases, and with certain conditions. Requirements of data controller parties under the GDPR include keeping records of their processing activities, adopting data protection policies, transparency with data subjects, appointing a Data Protection Officer, and implementing technical safeguards to mitigate security risks.


Council of Europe

The
Council of Europe The Council of Europe (CoE; , CdE) is an international organisation with the goal of upholding human rights, democracy and the Law in Europe, rule of law in Europe. Founded in 1949, it is Europe's oldest intergovernmental organisation, represe ...
gathered to discuss the protection of individuals when the Convention Treaty No.108 was created and opened for signature by member states and for accession by non-member States. The Convention closed and was then renamed Convention 108: Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data. Convention 108 has undergone 5 ratifications with the last ratification 10 January 1985 officially changing the name to Convention 108+ and providing the summary stating the intent of the treaty as:
''The first binding international instrument which protects the individual against abuses which may accompany the collection and processing of personal data, and which seeks to regulate at the same time the transfrontier flow of personal data.''
Increase use of the Internet and technological advancement in products lead to the Council of Europe to look at Convention 108+ and the relevance of the Treaty in the wake of the changes. In 2011 the modernization of Convention 108+ started and completed in 2012 amending the treaty with Protocol CETS No223. This modernization of Convention 108+ was in progress while the EU data protection rules were developed, the EU data protection rules would be adapted to become the GDPR.


India

The new
data sharing Data sharing is the practice of making data used for scholarly research available to other investigators. Many funding agencies, institutions, and publication venues have policies regarding data sharing because transparency and openness are consid ...
policy of WhatsApp with Facebook after Facebook acquired WhatsApp in 2014 has been challenged in the Supreme Court. The Supreme Court must decide if the right to privacy can be enforced against private entities. The Indian Supreme Court with nine-judge bench under JS Khehar, ruled on 24 August 2017, that the right to privacy is a fundamental right for Indian citizens per Article 21 of the Constitution and additionally under Part III rights. Specifically, the court adopted the three-pronged test required for the encroachment of any Article 21 right – legalityi.e. through an existing law; necessity, in terms of a legitimate state objective and proportionality, that ensures a rational nexus between the object of the invasion and the means adopted to achieve that object. This clarification was crucial to prevent the dilution of the right in the future on the whims and fancies of the government in power. The Court adopted a liberal interpretation of the fundamental rights to meet the challenges posed an increasing digital age. It held that individual liberty must extend to digital spaces and individual autonomy and privacy must be protected. This ruling by the Supreme Court paved the way for decriminalization of homosexuality in India on 6 September 2018, thus legalizing same-sex sexual intercourse between two consenting adults in private. India is the world's biggest democracy and with this ruling, it has joined United States, Canada, South Africa, the European Union, and the UK in recognizing this fundamental right. India's Data Protection law is known as Digital Personal Data Protection Act, 2023.


Israel

In
Israel Israel, officially the State of Israel, is a country in West Asia. It Borders of Israel, shares borders with Lebanon to the north, Syria to the north-east, Jordan to the east, Egypt to the south-west, and the Mediterranean Sea to the west. Isr ...
privacy protection is a constitutional basic right and is therefore protected by the Basic Law. Basic Law: the Knesset passed on 12 February 1958, by the Third Knesset. The Twelfth Knesset update to the Basic Law occurred on 17 March 1992. This update added to the law Human Dignity and Liberty by defining: Human freedom in Israel as being the right to leave the country and enter it, as well as the right to privacy and intimacy, refrainment from searches relating to one's private property, body and possessions, and avoidance of violations of the privacy of one's speech, writings and notes. October 2006 Israel established a regulatory authority, the PPA, part of the Ministry of Justice. PPA defined the Privacy Law and associated regulates based on two principles: general right to online privacy and the protection of personal data stored in databases.


New Zealand


Russia

The Constitution of the Russian Federation: Article 45 states: # State protection of human and civil rights and freedoms in the Russian Federation shall be guaranteed. # Everyone shall the right to protect his (her) rights and freedoms by all means not prohibited by law. The Russian Constitution specifically articles 23 and 24, institutes individual citizen the right to privacy. Russia, a member of the Strasbourg Convention, ratified processing of personal data against automatic processing and afterwards adopted a new convention. The new Russian Federal Law No.152-FZ R implemented on 27 July 2006, was updated to cover Personal Data and this law extends privacy to include personal and family secrets. Its main target is to protect individuals' personal data. Privacy entered the forefront of Russian legislature in 2014 when the approach to privacy turned to the goal of protecting privacy of government operations and the people of Russia. The amendments originally modified the Personal Data Law which has since been renamed The Data Localisation Law. The new law requires business operators who collect any information on Russian citizens' must maintain the collected data locally. This means that data transmission, processing, and storage must be in a database in Russia. 1 March 2021, the new amendment came into effect. Consent from the data subject is required if the data operator wants to use the data publicly.


United States

The
Constitution of the United States The Constitution of the United States is the Supremacy Clause, supreme law of the United States, United States of America. It superseded the Articles of Confederation, the nation's first constitution, on March 4, 1789. Originally includi ...
and
United States Bill of Rights The United States Bill of Rights comprises the first ten list of amendments to the United States Constitution, amendments to the United States Constitution. It was proposed following the often bitter 1787–88 debate over the Timeline of dr ...
do not explicitly include a right to privacy. Currently no federal law takes a holistic approach to privacy regulation. In the US, privacy and expectations of privacy have been determined via court cases. Those protections have been established through court decisions provide a reasonable expectations of privacy. The
Supreme Court In most legal jurisdictions, a supreme court, also known as a court of last resort, apex court, high (or final) court of appeal, and court of final appeal, is the highest court within the hierarchy of courts. Broadly speaking, the decisions of ...
in ''
Griswold v. Connecticut ''Griswold v. Connecticut'', 381 U.S. 479 (1965), is a landmark decision of the U.S. Supreme Court in which the Court ruled that the Constitution of the United States protects the liberty of married couples to use contraceptives without gove ...
, 381 U.S. 479'' (1965) found that the Constitution guarantees a right to privacy against governmental intrusion via '' penumbras'' located in the founding text. In 1890, Warren and Brandeis drafted an article published in the ''
Harvard Law Review The ''Harvard Law Review'' is a law review published by an independent student group at Harvard Law School. According to the ''Journal Citation Reports'', the ''Harvard Law Review''s 2015 impact factor of 4.979 placed the journal first out of ...
'' titled "The Right To Privacy" that is often cited as the first implicit finding of a U.S. stance on the right to privacy. Right to privacy has been the justification for decisions involving a wide range of
civil liberties Civil liberties are guarantees and freedoms that governments commit not to abridge, either by constitution, legislation, or judicial interpretation, without due process. Though the scope of the term differs between countries, civil liberties of ...
cases, including '' Pierce v. Society of Sisters'', which invalidated a successful 1922
Oregon Oregon ( , ) is a U.S. state, state in the Pacific Northwest region of the United States. It is a part of the Western U.S., with the Columbia River delineating much of Oregon's northern boundary with Washington (state), Washington, while t ...
initiative Popular initiative A popular initiative (also citizens' initiative) is a form of direct democracy by which a petition meeting certain hurdles can force a legal procedure on a proposition. In direct initiative, the proposition is put direct ...
requiring compulsory
public education A state school, public school, or government school is a primary school, primary or secondary school that educates all students without charge. They are funded in whole or in part by taxation and operated by the government of the state. State-f ...
; ''
Roe v. Wade ''Roe v. Wade'', 410 U.S. 113 (1973),. was a List of landmark court decisions in the United States, landmark decision of the U.S. Supreme Court in which the Court ruled that the Constitution of the United States protected the right to have an ...
'', which struck down an abortion law from
Texas Texas ( , ; or ) is the most populous U.S. state, state in the South Central United States, South Central region of the United States. It borders Louisiana to the east, Arkansas to the northeast, Oklahoma to the north, New Mexico to the we ...
, and thus restricted state powers to enforce laws against abortion; and ''
Lawrence v. Texas ''Lawrence v. Texas'', 539 U.S. 558 (2003), is a List of landmark court decisions in the United States, landmark decision of the Supreme Court of the United States, United States Supreme Court in which the Court ruled that U.S. state laws Sodom ...
'', which struck down a Texas
sodomy law A sodomy law is a law that defines certain sexual acts as crimes. The precise sexual acts meant by the term ''sodomy'' are rarely spelled out in the law, but are typically understood and defined by many courts and jurisdictions to include any ...
, and thus eliminated state powers to enforce laws against
sodomy Sodomy (), also called buggery in British English, principally refers to either anal sex (but occasionally also oral sex) between people, or any Human sexual activity, sexual activity between a human and another animal (Zoophilia, bestiality). I ...
. ''
Dobbs v. Jackson Women's Health Organization ''Dobbs v. Jackson Women's Health Organization'', 597 U.S. 215 (2022), is a List of landmark court decisions in the United States, landmark decision of the Supreme Court of the United States, United States Supreme Court in which the court held ...
'' later overruled ''Roe v. Wade'', in part due to the
Supreme Court In most legal jurisdictions, a supreme court, also known as a court of last resort, apex court, high (or final) court of appeal, and court of final appeal, is the highest court within the hierarchy of courts. Broadly speaking, the decisions of ...
finding that the right to privacy was not mentioned in the constitution, leaving the future validity of these decisions uncertain. Legally, the right of privacy is a basic law which includes: # The right of persons to be free from unwarranted publicity # Unwarranted appropriation of one's personality # Publicizing one's private affairs without a legitimate public concern # Wrongful intrusion into one's private activities However, outside of recognized private locations, American law, for the most part, grants next to no privacy for those in public areas. In other words, no verbal or written consent is needed to take photos or videos of those in public areas. This laxness extends to potentially embarrassing situations such as when actress
Jennifer Garner Jennifer Anne Garner (born April 17, 1972) is an American actress. Born in Houston, Texas and raised in Charleston, West Virginia, Garner studied theater at Denison University and began acting as an understudy for the Roundabout Theatre Company ...
bent over to retrieve something from her car and revealed her
thong underwear The thong is a garment generally used as either underwear or in some countries, as a swimsuit. It may also be worn for traditional ceremonies or competitions. Viewed from the front, the thong typically resembles a bikini bottom, but at th ...
to create a whale tail. Because the photographer took the photo in a public location, in this case a pumpkin patch, circulating the photo online was a legal act. For the health care sector where medical records are part of an individual's privacy, The Privacy Rule of the Health Insurance Portability and Accountability Act was passed in 1996. This act safeguards medical data of the patient which also includes giving individuals rights over their health information, like getting a copy of their records and seeking correction. Medical anthropologist Khiara Bridges has argued that the US Medicare system requires so much personal disclosure from pregnant women that they effectively do not have privacy rights.


CCPA

In 2018, California set out to create a policy promoting data protection, the first state in the United States to pursue such protection. The resulting effort is the
California Consumer Privacy Act The California Consumer Privacy Act (CCPA) is a state statute intended to enhance privacy rights and consumer protection for residents of the state of California in the United States. The bill was passed by the California State Legislature and si ...
(CCPA), reviewed as a critical juncture where the legal definition of what privacy entails from California lawmakers' perspective. The California Consumer Protection Act is a privacy law protecting the residents of California and their
Personal identifying information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has fou ...
. The law enacts regulation over all companies regardless of operational geography protecting the six Intentional Acts included in the law. The intentions included in the Act provide California residents with the right to: # Know what personal data is being collected about them. # Know whether their personal data is sold or disclosed and to whom. # Say no to the sale of personal data. # Access their personal data. # Request a business to delete any personal information about a consumer collected from that consumer. # Not be discriminated against for exercising their privacy rights.


Mass surveillance


United States

Governmental organizations such as the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA), CIA, and GCHQ amongst others are authorized to conduct
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
throughout other nations in the world. Programs such as
PRISM PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD . PRISM collects stored internet ...
, MYSTIC, and other operations conducted by
NATO The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental organization, intergovernmental Transnationalism, transnational military alliance of 32 Member states of NATO, member s ...
-member states are capable of collecting a vast quantity of metadata, internet history, and even actual recordings of phone calls from various countries. Domestic law enforcement at the federal level is conducted by the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
, so these agencies have never been authorized to collect US data. PRISM has faced criticism for privacy concerns, in that it collects "metadata and communication content." However, scholars have argued that programs like PRISM do more good than harm, in that they protect Americans from foreign threats. After the
September 11 attacks The September 11 attacks, also known as 9/11, were four coordinated Islamist terrorist suicide attacks by al-Qaeda against the United States in 2001. Nineteen terrorists hijacked four commercial airliners, crashing the first two into ...
, the NSA turned its surveillance apparatus on the US and its citizens. In March 2013,
James Clapper James Robert Clapper Jr. (born March 14, 1941) is a retired lieutenant general in the United States Air Force and former Director of National Intelligence. Clapper has held several key positions within the United States Intelligence Community. ...
, the
Director of National Intelligence The director of national intelligence (DNI) is a Cabinet of the United States#Current Cabinet and Cabinet-rank officials, cabinet-level Federal government of the United States, United States government intelligence and security official. The p ...
at the time, testified under oath that the NSA does not "wittingly" collect data on Americans. Clapper later retracted this statement. The US Government's own Privacy and Civil Liberties Oversight Board (PCLOB) reviewed the confidential security documents, and found in 2014 that the program did not have ''"a single instance involving a threat to the United States in which the program made a concrete difference"'' in counterterrorism or the disruption of a terrorist attack.


China

The Chinese government is conducting mass surveillance in
Xinjiang Xinjiang,; , SASM/GNC romanization, SASM/GNC: Chinese postal romanization, previously romanized as Sinkiang, officially the Xinjiang Uygur Autonomous Region (XUAR), is an Autonomous regions of China, autonomous region of the China, People' ...
province for detention of Muslims. As part of its "Strike Hard Campaign against Violent Terrorism" policy the authorities in China have subjugated 13 million Turkish Muslims to the highest order of restrictions. During the
COVID-19 pandemic The COVID-19 pandemic (also known as the coronavirus pandemic and COVID pandemic), caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), began with an disease outbreak, outbreak of COVID-19 in Wuhan, China, in December ...
the Chinese authorities documented the contact information and travel history of every individual and issued red, yellow and green badges/codes for transportation and entering stores. These badges/codes were also sometimes misused to freeze bank accounts and pressurize the protestors who were angry about the severe restrictions. The privacy of these health codes remain unacknowledged and unaddressed.


Journalism

It is often claimed, particularly by those in the eye of the media, that their right to privacy is violated when information about their private lives is reported in the press. The point of view of the press, however, is that the general public has a right to know personal information about those with status as a public figure. This distinction is encoded in most legal traditions as an element of
freedom of speech Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The rights, right to freedom of expression has been r ...
.


Publication of private facts

Publication of private facts speaks of the newsworthiness of private facts according to the law and the protections that private facts have. If a fact has significant newsworthiness to the public, it is protected by law under the
freedom of the press Freedom of the press or freedom of the media is the fundamental principle that communication and expression through various media, including printed and electronic Media (communication), media, especially publication, published materials, shoul ...
. However, even if the fact is true, if it is not newsworthy, it is not necessarily protected.
Digital Media Law Project The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace. Founded at Harvard Law School, the center traditionally focused on internet-related legal issues. On May 15, 2008, ...
uses examples such as
sexual orientation Sexual orientation is an enduring personal pattern of romantic attraction or sexual attraction (or a combination of these) to persons of the opposite sex or gender, the same sex or gender, or to both sexes or more than one gender. Patterns ar ...
, HIV status, and financial status to show that these can be publicly detrimental to the figure being posted about. The problem arises from the definition of newsworthiness.


Newsworthiness

According to Digital Media Law Project, the courts will usually side with the press in the publication of private facts. This helps to uphold the freedom of the press in the
US Constitution The Constitution of the United States is the supreme law of the United States of America. It superseded the Articles of Confederation, the nation's first constitution, on March 4, 1789. Originally including seven articles, the Constitut ...
. "there is a legitimate public interest in nearly all recent events, as well as in the private lives of prominent figures such as movie stars, politicians, and professional athletes." Digital Media Law Project supports these statements with citations to specific cases. While most recent events and prominent figures are considered newsworthy, it cannot go too far and too deep with a morbid curiosity. The media gain a lot of leverage once a person becomes a prominent figure and many things about their lives become newsworthy. Multiple cases such as Strutner v. Dispatch Printing Co., 442 N.E.2d 129 (Ohio Ct. App. 1982) show that the publication of a person's home address and full name who is being questioned by the police is valid and "a newsworthy item of legitimate public concern." The last part to consider is whether this could be considered a form of
doxxing Doxing or doxxing is the act of publicly providing personally identifiable information about an individual or organization, usually via the Internet and without their consent. Historically, the term has been used to refer to both the aggregati ...
. With the court upholding the newspaper's right to publish, this is much harder to change in the future. Newsworthiness has much around it that is held up by court rulings and
case law Case law, also used interchangeably with common law, is a law that is based on precedents, that is the judicial decisions from previous cases, rather than law based on constitutions, statutes, or regulations. Case law uses the detailed facts of ...
. This is not in legislation but is created through the courts, as many other laws and practices are. These are still judged on a case-by-case basis as they are often settled through a
lawsuit A lawsuit is a proceeding by one or more parties (the plaintiff or claimant) against one or more parties (the defendant) in a civil court of law. The archaic term "suit in law" is found in only a small number of laws still in effect today ...
of some form. While there is a fair amount of case law supporting newsworthiness of subjects, it is hardly comprehensive and, news publications can publish things not covered and defend themselves in court for their right to publish these facts.


Technology

Private sector actors can also threaten the right to privacyparticularly technology companies, such as
Amazon Amazon most often refers to: * Amazon River, in South America * Amazon rainforest, a rainforest covering most of the Amazon basin * Amazon (company), an American multinational technology company * Amazons, a tribe of female warriors in Greek myth ...
,
Apple An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
, Facebook, Google, and
Yahoo Yahoo (, styled yahoo''!'' in its logo) is an American web portal that provides the search engine Yahoo Search and related services including My Yahoo, Yahoo Mail, Yahoo News, Yahoo Finance, Yahoo Sports, y!entertainment, yahoo!life, an ...
that use and collect
personal data Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has fou ...
. These private sector threats are more acute due to AI data processing. In some American jurisdictions, the use of a person's name as a keyword under Google's
AdWords Google Ads, formerly known as Google Adwords, is an online advertising platform developed by Google, where advertisers bid to display brief advertisements, service offerings, product listings, and videos to web users. It can place ads in the res ...
for advertising or trade purposes without the person's consent has raised certain personal privacy concerns. The right to privacy and social media content laws have been considered and enacted in several states, such as California's "online erasure" law protecting minors from leaving a digital trail. State laws, such as the CPPA in California, have granted more comprehensive protection. However, the United States is behind that of European Union countries in protecting privacy online. For example, the "right to be forgotten" ruling by the EU Court of Justice protects both adults and minors. The
General Data Protection Regulation The General Data Protection Regulation (Regulation (EU) 2016/679), abbreviated GDPR, is a European Union regulation on information privacy in the European Union (EU) and the European Economic Area (EEA). The GDPR is an important component of ...
has made significant progress to protect privacy from these risks, and it has led to a wave of privacy and data protection laws around the world. Privacy is a major issue in the health care sector with technology becoming an essential component of it. Connecting personal data of patients to internet makes them vulnerable to cyber attacks. There are also concerns about how much data should be stored and who should have access to it.


Protection of minors


United Kingdom

Laws and courts in the UK uphold the protection of minors in the journalistic space. The Independent Press Standards Organisation (IPSO) in the UK have shown that the usage of footage of a 12-year-old girl being bullied in 2017 can be retroactively taken down due to fears of
cyber-bullying Cyberbullying (cyberharassment or online bullying) is a form of bullying or harassment using Electronic communication network, electronic means. Since the 2000s, it has become increasingly common, especially among teenagers and Adolescence, a ...
and potential harm done to the child in the future. This was after the Mail Online published the video without any attempt to hide the identity of the child. Following the newsworthiness point, it is possible that content like this would be allowed in the United States due to the recentness of the event. Protection of minors is a different matter in the United States with new stories about minors doing certain things and their faces are shown in a news publication. The
Detroit Free Press The ''Detroit Free Press'' (commonly referred to as the ''Freep'') is a major daily newspaper in Detroit, Michigan, United States. It is the largest local newspaper owned by Gannett (the publisher of ''USA Today''), and is operated by the Detro ...
, as an example, chose to do a hard-hitting story about prostitution and drugs from a teenager but never named her or showed her face, only referring to her and the "16-year-old from Taylor". In the UK, during the case of Campbell v MGN, Lord Hope stated that the protection of minors will be handled on a case-by-case basis and affected by the child's awareness of the photo and their expectation of privacy. Many factors will be considered such as the age of the children, activity, usage of real names, etc.


United States

The protection of minors in the United States often falls on the shoulders of the Children's Online Privacy Protection Act (
COPPA Coppa or COPPA may refer to: * '' Coppa'' or ''capocollo'', a type of Italian pork cold cut * Montonico bianco, a white Italian wine grape variety grown in the Calabria region of southern Italy * Coppa (surname) * Coppa Italia, a domestic Italian l ...
). This protects any children under the age of 13 from the collection of their data without their parent's or guardian's permission. This law is the reason why many sites will ask if you are under 13 or require you to be 13 to sign up. While this law is intended to protect preteen children, it fails to protect the information of anyone older than 13, including teenage minors. It also begins to overlap with other privacy protection laws such as the
Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Ted Kennedy, Kennedy–Nancy Kassebaum, Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President ...
(HIPAA).


See also

*
Bank Secrecy Act The Bank Secrecy Act of 1970 (BSA), also known as the Currency and Foreign Transactions Reporting Act, is a U.S. law requiring financial institutions in the United States to assist U.S. government agencies in detecting and preventing money laun ...
, a US law requiring banks to disclose details of financial transactions *
Information privacy Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as dat ...
*
Internet privacy Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. P ...
*
MAINWAY MAINWAY is a database maintained by the United States' National Security Agency (NSA) containing metadata for hundreds of billions of telephone calls made through the largest telephone company, telephone carriers in the United States, including A ...
*
Nothing to hide argument The nothing to hide argument is a logical fallacy which states that individuals have no reason to fear or oppose surveillance programs unless they are afraid it will uncover their own illicit activities. An individual using this argument may clai ...
*
Right to be forgotten The right to be forgotten (RTBF) is the right to have private information about a person be removed from Internet searches and other directories in some circumstances. The issue has arisen from desires of individuals to "determine the developmen ...
*
Stakeholder theory The stakeholder theory is a theory of organizational management and business ethics that accounts for multiple constituencies impacted by business entities like employees, suppliers, local communities, creditors, and others. It addresses morals ...


Notes


References


Sources

* Mordini, Emilio. "Nothing to Hide: Biometrics, Privacy and Private Sphere". In: Schouten, Ben, Niels Christian Juul, Andrzej Drygajlo, and Massimo Tistarelli (editors). ''Biometrics and Identity Management: First European Workshop, BIOID 2008, Roskilde, Denmark, 7–9 May 2008, Revised Selected Papers''.
Springer Science+Business Media Springer Science+Business Media, commonly known as Springer, is a German multinational publishing company of books, e-books and peer-reviewed journals in science, humanities, technical and medical (STM) publishing. Originally founded in 1842 in ...
, 2008. pp. 245–258. . . *


External links

* Lever, Annabelle.
Feminism, Democracy and the Right to Privacy


. ''Minerva – An Internet Journal of Philosophy''. . 2005. Volume 9. * Moore, Adam D
''Privacy Rights: Moral and Legal Foundations''
(Pennsylvania State University Press, 2010). . *

" (19 December 2000). Privacilla.org, a "web-based think tank", devoted to privacy issues, edited by Jim Harper

") {{Authority control Digital rights Human rights