Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-x4r87 Total loading time: 0 Render date: 2024-04-26T04:35:54.839Z Has data issue: false hasContentIssue false
This chapter is part of a book that is no longer available to purchase from Cambridge Core

A Privacy Doctrine for the Cyber Age

Get access

Summary

A privacy doctrine built for the cyber age must address a radical change in the type and scale of violations that the nation – and the world – face, namely that the greatest threats to privacy come not at the point that personal information is collected, but rather from the secondary uses of such information. Often-cited court cases, such as Katz, Berger, Smith, Karo, Knotts, Kyllo – and most recently Jones – concern whether or not the initial collection of information was legal. They do not address the fact that personal information that was legally obtained may nevertheless be used later to violate privacy. That the ways such information is stored, collated with other pieces of information, analysed, and distributed or accessed – often entails very significant violations of privacy. While a considerable number of laws and court cases cover these secondary usages of information, they do not come together to make a coherent doctrine of privacy – and most assuredly not one of them addresses the unique challenges of the cyber age.

Here I attempt to show that in order to maintain privacy in the cyber age, boundaries on information that may be used by the government should be considered along three major dimensions: The level of sensitivity of the information, the volume of information collected, and the extent of cybernation. These considerations guide one to find the lowest level of intrusiveness holding constant the level of common good. A society ought to tolerate more intrusiveness if there are valid reasons to hold that the threat to the public has significantly increased (e.g. there is a pandemic), and reassert a lower level of intrusiveness when such a threat has subsided.

Sensitivity

One dimension is the level of sensitivity of the information. For instance, data about a person's medical condition is considered highly sensitive, as are one's political beliefs and conduct (e.g. voting) and personal thoughts. Financial information is ranked as less sensitive than medical information, while publicly presented information (e.g. licence plates) and routine consumer choices much less so.

These rankings are not based on ‘expectations of privacy’ or on what this or that judge divines as societal expectations. Rather, they reflect shared social values and are the product of politics in the good sense of the term, of liberal democratic processes, and moral dialogues.

Type
Chapter
Information
The Handbook of Privacy Studies
An Interdisciplinary Introduction
, pp. 295 - 298
Publisher: Amsterdam University Press
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×