S o lo v e
HARV AR D U N I V E R S I T Y P R E SS
Cambridge, Massachusetts
London, England 2008
Copyright © 2008 by the President and Fellows of Harvard Collegi
All rights reserved
Printed in the United States of America
Preface ix
N otes 199
Index 247
Preface
Today, the concern rem ains largely the same. Philosopher T hom as
N agel notes th at there has been “a disastrous erosion o f the precious but
fragile conventions o f personal privacy in the U nited States over the past
ten o r tw enty years.”28 C oundess com m entators have declared th at pri
vacy is “under siege” and “attack”; th at it is in “peril,” “distress,” or
“danger”; th at it is “eroding,” “evaporating,” “dying,” “shrinking,” “slip
ping away,” “dim inishing,” o r “vanishing”; and th at it is “lost” or
“dead.”29 Legions o f books and articles have w arned o f the “destruction,”
“death,” o r “end” o f privacy.30 As Professor D eborah N elson has p u t it,
“Privacy, it seems, is n o t simply dead. It is dying over and over again.”31
B ut n o t everyone is concerned. Som e argue th at despite w hat people
say, th e ir actions dem onstrate th a t they really do n o t w ant privacy at all.
Jo nathan F ranzen notes, “T h e panic about privacy has all the finger-
pointing and paranoia o f a good old Am erican scare, b u t it’s missing one
vital ingredient: a genuinely alarm ed public. Am ericans care about pri
vacy m ainly in the abstract.”32 A lthough polls indicate th at people care
deeply about privacy, people routinely give ou t th eir personal inform a
tion and willingly reveal intim ate details about th eir lives on the In
ternet. Law professor E ric G oldm an points ou t th at people’s “stated
privacy concerns diverge from w hat [they] do.”33 C anadian scholar
Calvin G otlieb declares th at “m ost people, w hen o th er interests are at
stake, do n o t care enough about privacy to value it.”34
O th ers contend th a t privacy can be socially detrim ental. A ccording
to law professor R ichard E pstein, privacy is “a plea for the rig h t to m is
rep resen t one’s self to the rest o f the w orld.”35 Judge R ichard Posner
views privacy as giving individuals “pow er to conceal inform ation
about them selves th at oth ers m ig h t use to [the individuals’] disadvan
tage.”36 Legal scholar F red C ate declares th at privacy is “an antisocial
c o n s tru c t. . . [that] conflicts w ith o th er im p o rtan t values w ithin th e so
ciety, such as society’s in terest in facilitating free expression, preventing
and punishing crim e, pro tectin g private property, and conducting gov
ern m en t operations efficiently.”37
T h u s privacy is a fundam ental right, essential for freedom , democracy,
psychological well-being, individuality, and creativity. I t is proclaimed
inviolable bu t decried as detrim ental, antisocial, and even pathological.
Some claim th at privacy is nearing extinction; others argue that the
threat to privacy is illusory.38 It seems as though everybody is talking
about “privacy,” b u t it is n o t clear exactly w hat they are talking about.
6 P r i v a c y : A C o n c e p t i n D i sarray
Although these violations are clearly not the same, courts and policy
makers frequently have a singular view of privacy in mind when they
assess whether an activity violates privacy. As a result, they either con
flate distinct privacy problems despite significant differences or fail to
recognize a problem entirely. In short, privacy problems are frequently
misconstrued or inconsistently recognized in the law.
Merely being more contextual about privacy, however, will not be
sufficient to develop a fruitful understanding o f privacy. In author
Jorge Luis Borges’s illuminating parable “Everything and N othing,” a
gifted playwright creates breathtaking works o f literature, populated
with an unforgettable legion o f characters, one after the other imbued
with a unique, unforgettable personality. Despite his spectacular feats
o f imagination, the playwright lives a life of despair. H e can dream up a
multitude o f characters—become them, think like them, understand
the depths o f their souls—yet he himself has no core, no way to under
stand himself, no way to define who he is. His gift of assuming so many
different personalities has left him with no identity o f his own. A t the
end o f the parable, before he dies, the playwright communicates his de
spair to God:
Privacy: A Concept in D isarray 7
Legal scholar Lillian BeV ier w rites, “Privacy is a cham eleon-like w ord,
used denotatively to designate a wide range o f wildly disparate
interests— from confidentiality o f personal inform ation to reproduc
tive autonom y— and connotatively to generate goodw ill o n behalf o f
w hatever in te rest is b ein g asserted in its nam e.”4/ O th e r com m entators
have lam ented th a t privacy is “protean” and suffers from “an em bar
rassm ent o f m eanings.”48 “P erhaps the m ost striking th in g about the
rig h t to privacy,” p h ilosopher Ju d ith Jarvis T h o m so n has observed, “is
th at nobody seem s to have any clear idea w hat it is.”49
O ften, privacy problem s are m erely stated in knee-jerk form : “T h a t
violates m y privacy!” W h e n we contem plate an invasion o f privacy—
such as having o u r personal inform ation gathered by com panies in
databases— w e instinctively recoil. M any discussions o f privacy appeal
to people’s fears and anxieties. C om m entators, however, often fail to
translate those instincts in to a reasoned, w ell-articulated account o f
w hy privacy problem s are harm ful. W h e n people claim th a t privacy
should be protected, it is unclear precisely w hat th ey m ean. T h is lack
o f clarity creates difficulty w hen m aking policy o r resolving a case be
cause lawmakers and judges cannot easily articulate the privacy harm .
T h e interests o n th e o th e r side— free speech, efficient consum er trans
actions, and security— are often m uch m ore readily articulated. C ourts
and policym akers frequently struggle in recognizing privacy interests,
and w hen this occurs, cases are dismissed o r laws are n o t passed. T h e
8 P r iv a cy : A C o n c e p t i n D isarray
Appropriation
D istortion
4. Invasion
Intrusion
Decisional interference
access to the self—th e ability to shield oneself from unw anted access by
others; (3) secrecy—th e concealm ent o f certain m atters from others;
(4) control over personal inform ation— the ability to exercise control
over inform ation a b o u t oneself; (5) personhood— the protection o f
one’s personality, individuality, and dignity; and (6) intim acy— control
over, o r lim ited access to, o n e ’s intim ate relationships o r aspects o f life.1
T h e conceptions often overlap, b u t each has a distinctive perspective
o n privacy. I n this chapter, I delve into the extensive literature on the
subject, analyzing and critiquing the privacy conceptions set forth in
judicial opinions and legal scholarship, as well as in w orks by philoso
phers, psychologists, sociologists, and others. I dem onstrate th at the
different conceptions suffer from sim ilar problem s.
T h e m ost prevalent pro b lem w ith th e conceptions is th at they are ei
th er too narrow because th ey fail to include th e aspects o f life we typi
cally view as private o r to o broad because they fail to exclude m atters
th a t we do n o t deem private. Som e conceptions even suffer from being
b o th to o narro w and to o broad. T h e se problem s stem from the m ethod
m ost theorists use to conceptualize privacy.
Methods of Conceptualizing
A conception o f privacy is different from the usage o f the w ord “pri
vacy.” T h e usage o f th e w ord “privacy” constitutes th e ways in which we
em ploy th e w ord in everyday life and the things w e are referring to
w hen we speak o f “privacy.” A conception o f privacy is an abstract
m ental picture o f w hat privacy is and w hat makes it unique and distinct.
U n d e r w hat I will refer to as the “traditional m eth o d ,” conceptual
izing privacy is understood as an attem p t to articulate w hat separates
privacy from o th er things and w hat identifies it in its various m anifes
tations. T h e purpose o f conceptualizing is to define the unique charac
teristics o f privacy. U sage o f th e w ord “privacy” m ust then be cleaned
up to m atch the conceptual category o f privacy, because people can use
the w ord “privacy” im properly by referring to things outside the con
ceptual boundaries. G iven the g reat difficulties o f capturing everything
referred to by “privacy,” the often-disparate ways th a t the w ord “pri
vacy” is used, and the lack o f agreem ent over the precise m eaning of
the w ord, m any scholars seek to establish criteria to distinguish “pri
vacy” from o th er things. A few things m ight be left out, b u t the aim is
14 T h e o r i e s of P ri vacy a n d T h e i r S h o r t c o m i n g s
Conceptions of Privacy
T he philosophical and legal discourse about privacy has proposed nu
merous conceptions in an attempt to capture the common denominator
Theories o f Privacy and T heir Shortcomings 15
law as well. Indeed, W a rre n and Brandeis spoke o f privacy as a “rig h t,”
n o t m erely a ground for a to rt law suit.15 In 1891, just a year after the
article was published, th e Suprem e C o u rt referred to the rig h t to be let
alone in h olding th a t a c o u rt could n o t force a plaintiff in a civil case to
subm it to a surgical exam ination: “As well said by Judge Cooley: ‘T h e
rig h t to o n e ’s person m ay be said to be a rig h t o f com plete im m unity;
to be let alone.’ ”16
N early forty years later, w hen he was a justice on th e U .S . Suprem e
C o u rt, Brandeis w rote his fam ous dissent in Olmstead v. U nited States.
In Olmstead, the C o u rt held th a t w iretapping was n o t a violation under
the F o u rth A m endm ent o f th e U .S. C onstitution because it was n o t a
physical trespass into th e h o m e .17 Brandeis fired off a prescient dissent,
declaring th a t th e fram ers o f th e C onstitution “conferred, as against
the governm ent, the rig h t to be let alone— the m ost com prehensive o f
rights and th e rig h t m ost valued by civilized m en .”18
W arren and B randeis’s article and Brandeis’s dissent in Olmstead
shaped constitutional law significantly in th e decades to com e. In 1967,
the Suprem e C o u rt adopted Brandeis’s view o f the F o u rth A m end
m ent, overruling Olmstead in K atz v. United States.'9 In its Fourth
A m endm ent jurisprudence, as well as its protection o f the rig h t to pri
vacy, the Suprem e C o u rt frequendy has invoked B randeis’s form ula
tion o f privacy as “the rig h t to be let alone.”20 “[T he rig h t to privacy]
is, sim ply stated, the rig h t to be let alone,” Justice Abe F ortas observed,
“to live o n e ’s life as one chooses, free from assault, intrusion o r inva
sion except as they can be justified by the clear needs o f com m unity
living u n d e r a governm ent o f law.”21 A ccording to Justice W illiam O .
Douglas:
anonymity). Excluded from this definition are invasions into one’s pri
vate life by harassm ent and nuisance and the governm ent’s involvement
in decisions regarding one’s body, health, sexual conduct, and family
life.37 Although Gavison contends that “the collection, storage, and
com puterization o f inform ation” falls within her conception, these ac
tivities often do n o t reveal secrets, destroy anonymity, o r thw art soli
tude.38 T herefore, although Gavison avoids the broadness and vague
ness o f m ost limited-access conceptions, h er attem pt to define what
“access” entails winds up being too narrow.
Secrecy
ensure that personal inform ation is used for the purposes she desires.
According to philosopher Judith W agner DeCew, secrecy is certainly
n o t coextensive with privacy; secret inform ation is often n o t private
(for example, secret m ilitary plans), and private m atters are no t always
secret (for example, one’s debts).55
W e often expect privacy even in public. N o t all activities we deem
private occur behind the curtain. T h e books we read, the products we
buy, and the people we associate with are often n o t secrets, b u t we
nonetheless view them as private m atters. Philosopher Julie Inness ob
serves th at privacy as secrecy om its the elem ent o f control: “[Pjrivacy
m ight no t necessarily be opposed to publicity; its function m ight be to
provide the individual with control over certain aspects o f h er life.”56
Likewise, Stanley Benn argues that m atters are private no t because
they “are kept o u t o f sight or from the knowledge o f others” bu t be
cause they “are m atters that it would be inappropriate for others to try
to find o u t about, m uch less rep o rt on, w ithout one’s consent.”5"
T herefore, although m ost theorists would recognize the disclosure
o f certain secrets to be a violation o f privacy, m any com m only recog
nized privacy invasions do n o t involve the loss o f secrecy. Secrecy as
the com m on denom inator o f privacy makes the conception o f privacy
too narrow.
one’s house, o n e ’s furniture, o n e ’s garm ents, the books one reads, the
com pany one keeps— these things are all expressive.”73
E xtending property concepts to personal inform ation, however, has
difficulties. Inform ation can be easily transm itted and, once know n by
others, cannot be eradicated from th eir m inds. U nlike physical objects,
inform ation can be possessed sim ultaneously w ithin the m inds o f m il
lions. T h is is why intellectual-property law protects particular tangible
expressions o f ideas ra th e r than the underlying ideas them selves. T h e
com plexity o f personal inform ation is th at it is b o th an expression of
the self and a set o f facts— a historical record o f o n e ’s behavior.
F urther, th ere are problem s w ith viewing personal inform ation as
equivalent to any o th e r com m odity. Personal inform ation is often
form ed in relationships w ith others. All parties to th a t relationship
have som e claim to the inform ation. F or example, individuals are n o t
the lone creators o f th e ir w eb-brow sing inform ation, for m ost o f that
inform ation is created from th e interaction betw een the user and w eb
sites.74 O ften, the m arket value o f inform ation is n o t created exclu
sively by the labor o f the individual to w hom it relates b u t in part by
the th ird party th at com piles the inform ation.0 F o r instance, the value
o f personal inform ation for advertisers and m arketers em erges in part
from th eir consolidation and categorization o f th a t inform ation.
An exam ple o f the difficulty in assigning ow nership to inform ation is
illustrated by Haynes v. A lfred A . K nopf In c.'6 T h is case involved
N icholas L em ann’s highly praised book about th e social and political
history o f African Am ericans w ho m igrated from th e South to northern
cities. T h e book chronicled the life o f Ruby L ee D aniels, w ho suffered
greatly from h e r form er husband L u th e r H aynes’s alcoholism , selfish
ness, and irresponsible conduct. H aynes sued the a u th o r and the pub
lisher u n d er the public-disclosure-of-private-facts to rt, claim ing that
he had long since tu rn ed his life around and th a t th e disclosure o f his
past destroyed th e new life he had w orked so hard to construct. Judge
Posner, w riting for the panel, concluded th at th ere could be no liability
for invasion o f privacy because “ [a] person does n o t have a legally p ro
tected rig h t to a reputation based on the concealm ent o f th e tru th ”77
and because the book narrated “a sto ry n o t only o f legitim ate b u t of
transcendent public in terest.”78
A lthough this case did n o t hinge on the shared natu re o f the infor
m ation, it illustrates th a t personal inform ation rarely belongs to just
28 T h e o r i e s of P ri vacy a n d T h e i r S h o r t c o m i n g s
Personhood
Intim acy
does n o t capture the dim ension o f private life that is devoted to the self
alone. W . L . W einstein observes:
however, it has lim ited usefulness because n o t m uch can be said about
privacy beyond each specific situation. T h e th eo ry will struggle to
guide the resolution o f privacy issues in a principled and consistent
m anner. T h erefo re, a th e o ry o f privacy m ust establish a balance be
tw een generality and particularity. A lthough m y th eo ry o f privacy is
contextual, it also generalizes to provide a fram ew ork for under
standing a broad range o f privacy problem s.
Variability. O n e o f the key issues in developing a th e o ry o f privacy is
how to deal w ith the variability o f attitudes and beliefs about privacy.
Privacy is a p ro d u ct o f norm s, activities, and legal protections, and as a
result, it is culturally and historically contingent. A th eo ry o f privacy
m ust therefore w ork from w ithin h istory and culture, n o t from a posi
tio n outside. T h is m eans th at a th eo ry should leave ro o m for signifi
can t variability in n orm s and attitudes about privacy. I t should be flex
ible enough to adapt to privacy’s dynam ic and evolving character. O ne
o f the criticism s o f em bracing such variability, however, is th a t the
th eo ry will becom e n o th in g m ore than a discordant collection o f local
ized practices and cease to tell us m uch th at is useful. I contend th at
th ere is indeed a w ay to develop an understanding o f privacy w ith
w idespread applicability. A lthough such an understanding does n o t
stand up o n p erm anent and fixed foundations, it can still have sufficient
stability while accom m odating variability.
Focus. An approach to conceptualizing privacy m ust have a focus.
Privacy issues are im m ensely com plex and can be viewed from m any
different angles and perspectives. M y th eo ry o f privacy focuses on pri
vacy problem s. Instead o f pondering the natu re o f privacy in the ab
stract, w e should begin w ith concrete problem s and th en use th eo ry as
a way to b e tte r understand and resolve these problem s.
In this chapter, I discuss each o f these dim ensions in depth. I seek to
develop a th e o ry o f privacy th a t is pluralistic and cognizant o f context
and contingency, b u t also general and stable enough to be useful in ad
dressing legal and policy issues.
M e th o d
may n o t all resem ble each o th er in the same way. Nevertheless, they all
bear a resemblance to each other.
In contrast, the traditional m ethod o f conceptualizing views things
as related in the way that spokes are linked by the hub o f a wheel, all
connected by a com m on point. T h is comm on point, where all spokes
converge, defines the way in which the spokes are related to each other.
W ittgenstein suggests, however, th at sometimes there is no hub, only a
web o f connected parts th at lack a single center point.3
O ne m ight object that a conception consisting o f a web o f connected
parts w ithout a com m on denom inator is deficient because it has no
boundaries and thus is endless. Although W ittgenstein suggests that
no t all conceptions are “closed by a frontier,” this does n o t m ean that
conceptions are endless. Rather, it means th at n o t all conceptions have
fixed and sharp boundaries th at separate them from o th er conceptions.
Boundaries can be fuzzy or can be in a state o f constant flux. W e can
draw im m utable boundaries, bu t we do so for special purposes, n o t be
cause the boundary is a necessary p art o f a conception. As W ittgen
stein asserts, conceptions can still be useful w ithout having to be cir
cum scribed by rigid boundaries.4
T h e ram ification o f W ittg en stein ’s insight is n o t th a t all attem pts
to conceptualize by locating a com m on denom inator are doom ed;
rather, as he suggests, th ere are o th er ways to approach th e conceptu
alization o f certain things. Philosopher Ju d ith G enova characterizes
W ittg en stein ’s view: “O nce one sees the variety o f cases and the
family resem blances betw een them , the attem p t to establish an a
priori generalization is thw arted. T h e re is n o one answer, b u t a va
riety o f answers depending o n a variety o f factors. T h e m oral is: Look
to th e circum stances!”5 Shifting the focus away from finding a
com m on denom inator m ay prove im m ensely fruitful. T h e top-dow n
approach o f beginning w ith an overarching conception o f privacy de
signed to apply in all contexts often results in a conception th a t does
n o t fit well w hen it is applied to the m ultitude o f situations and prob
lems involving privacy. As philosopher Stanley Cavell observes,
W ittg en stein ’s notion o f family resem blances dem onstrates th a t “un i
v e rs a l are n eith er necessary n o r even useful in explaining how words
and concepts apply to different things.” Cavell notes th a t “a new ap
plication o f a w ord o r concept will still have to be made out, explained,
in the particular case, and th en the explanations them selves will be
44 R e c o n s t r u c t i n g P rivacy
“privacy” will work well, but there are times when more specificity is
required. Using the general term “privacy” can result in the conflation
o f different kinds o f problems and can lead to understandings o f the
meaning of “privacy” that distract courts and policymakers from ad
dressing the issues before them.
Nevertheless, it is no accident that various things are referred to
under the rubric o f “privacy.” T h ey bear substantial similarities to each
other. T h e analogies between different things can be useful and in
structive, for we m ight seek to create similar laws and policies to regu
late them. W e should classify som ething as involving “privacy” when it
bears resemblance to other things we classify in the same way. T his is a
form o f analogical reasoning. “T h e key task for analogical reasoners,”
law professor Cass Sunstein observes, “is to decide when there are rel
evant similarities and differences.”10 Similarity, however, is no t same
ness, and we m ust also recognize where the many related things we call
“privacy” diverge.
Generality
W hen we define privacy, we m ust do so at a certain level o f generality.
Framing a concept with a degree o f generality allows it to transcend
the particularities of specific contexts and thus gives it wide-ranging
applicability. M any o f the conceptions discussed in the previous
chapter are framed at a very general level, such as control over infor
mation, limited access, and the right to be let alone. T h eir generality,
however, often makes them so broad and vague that they frequently do
not help us in identifying and addressing specific privacy issues.
T h e philosophy of pragmatism provides fruitful guidance about how
to conceptualize in a more contextual way. Pragmatism was originally
developed by Charles Sanders Peirce, W illiam James, Jo h n Dewey,
Josiah Royce, G eorge H erb ert M ead, and others.11 A num ber of
prom inent contem porary scholars identify themselves as pragmatists,
such as Richard Rorty, Richard Posner, and Cornell W est.12 Although
many pragmatists share certain ideas and assumptions, they also have
profound differences—sometimes m ore differences than similarities.
T h e pragmatic ideas I draw from are generally those o f the classical
pragmatists, and they are ones that m ost classical pragmatists held in
common. Primarily, I look to Jo h n Dewey and W illiam James.
Reconstructing Privacy 47
V ariability
W ithout an a priori conception o f privacy, we must determine what is
private at least in part by looking at social practices. Privacy is depen
dent on society and culture, and thus it is contingent. “T h e realm of
the practical is the region of change,” John Dewey observed, “and
change is always contingent.” Dewey also noted, “Experience cannot
deliver to us necessary truths; truths completely demonstrated by
reason. Its conclusions are particular, not universal.”2. W e need n o t de
mand that a theory of privacy be impervious to history or culture. A
theory can still be useful without being the immutable final answer. It
m ight not work as effectively hundreds of years in the future, nor
m ight it work in every society. But still it can help us advance in ad
dressing problems, it can remain useful over a long period o f time, and
it can be applicable in many cultures.
T h e matters we consider private change over time. Although some
form of dichotomy between public and private has been maintained
throughout the history of W estern civilization,28 the m atters that have
been considered public and private have evolved because of changing
attitudes, institutions, living conditions, and technology. T he matters
we consider private are shaped by culture and time and have differed
across societies and epochs.
To say simply that something is private is to make a rather general
claim; what it means for something to be private is the central question.
Particular matters have long remained private, though in different
ways. We consider our Social Security number, our sexual behavior,
our diary, and our home private, but we do not consider them private
in the same way.
A num ber of aspects o f life have commonly been viewed as private:
family, body, sex, home, and communications, to name a few. T here
appears to be broad consensus about the importance o f protecting the
privacy o f these matters. For example, the right to privacy in the
United Nations Universal Declaration o f Hum an Rights of 1948
specifically mentions the family, home, and communications.29
Yet to say simply that these things are private is imprecise because
what it means for them to be private is different today than it was in the
past and different in each subject matter. I will sketch a brief genealogy
of the privacy o f the family, body, sex, home, and communications.
Reconstructing Pr ivacy 51
Fam ily
“concept o f the self as unique, and free to pursue his o r her own goals;
and a related decline in the idea th at the overriding obligation was to
the kin, the society, o r the state”— led to a rebellion against arranged
m arriages, transform ing m arriage into a venture based on personal
choice.36 Gradually, the family began to evolve into a “private entity
focused into itself.”37
Still, for wom en, the family was for a long tim e no t associated with
self-developm ent. A ccording to Anita Allen, thro u g h o u t m uch o f his
tory, “[mjarriage has been described as a w om an’s greatest obstacle to
privacy.”38 Reva Siegel explains th at a “wife was obliged to obey and
serve h er husband, and the husband was subject to a reciprocal duty to
support his wife and represent h e r w ithin the legal system .” H usbands
could also physically punish their wives (known as “chastisem ent”) so
long as no perm anent injury was inflicted. C hastisem ent was justified
by courts n o t w anting to interfere w ith m arital privacy.39 As one court
explained, although wife beating would typically be classified as an as
sault, doing so would “throw open the bedroom to the gaze o f the
public; and spread discord and misery, contention and strife, where
peace and concord ought to reign.”40 T h u s, “privacy” o f the family
consisted o f an association o f noninterference o f the state in dom estic
affairs th at served, as Siegel explains, “to enforce and preserve au
thority relations betw een m an and wife.”41 T h is association has led a
num ber o f fem inist scholars to attack privacy in the dom estic context.42
T h a t privacy o f the family once m eant noninterference o f the state in
dom estic affairs does n o t m ean th at this is inherendy w hat privacy o f
the family m eans. In con tem p o rary A m erican society, we accept
greater governm ent intervention in spousal relationships, as well as in
child rearing. T o argue that there is less privacy o f the family today be
cause o f this developm ent is too broad a claim. To the extent that family
privacy consists o f attributes such as independence, freedom o f thought,
freedom from coercion, self-development, and pursuing activities o f per
sonal interest, governm ent intervention actually can enhance privacy.
Body
sacred, o r is m ore carefully guarded by the com m on law, than the right
o f every individual to the possession and control o f his own person.”44
A nother co u rt declared: “O n e ’s naked body is a very private p art o f
one’s person and generally known to others only by choice.”45
T h e claim th a t the body is “private” is really a claim about certain
practices regarding the body, such as concealm ent o f certain bodily
parts, secrecy about specific diseases and physical conditions, norm s o f
touching and interpersonal contact, and individual control and do
m inion over decisions regarding one’s body. As legal scholar Radhika
Rao explains, the constitutional right to privacy is often characterized
by self-ow nership o f the body, the notion that a person belongs to h er
self.46 T h e se attributes w ere certainly n o t always associated w ith the
body. A lthough we currendy associate the body w ith concealm ent (we
hide o u r bodies u n d er layers o f clothes), the naked body was far from
private in ancient G reece and Rom e.47 Sociologist R ichard Sennett ob
serves th a t in ancient Athens, the public display o f the naked body
“m arked the presence o f a strong rather than vulnerable person— and
m ore, som eone w ho was civilized.” Public nudity “affirm ed one’s dig
nity as a citizen.”48 A t the gym nasium in ancient G reece, people exer
cised in the nude. In ancient Rom e, m en and w om en bathed naked to
gether.49 In the M iddle Ages, it was also n o t uncom m on for people to
bathe in front o f others, and bathing was often part o f celebrations and
social congregation.50
N orm s o f interpersonal contact and nudity gradually shifted toward
today’s norm s o f greater concealm ent and distancing from others. Chris
tian beliefs about the body contrasted sharply w ith those o f the ancient
Greeks and Romans. T o the Greeks and Romans, the body was an object
o f pride and beauty, som ething to be put on display- T o the Christians, it
was dirty and shameful, som ething to be hidden.51 In the Renaissance,
am ong the wealthy (and spreading to the middle class), people tried to
distance themselves from their body and others’ bodies: “[M]en and
w om en became m ore secretive and m odest about bodily functions; they
ceased to share beds w ith strangers at home, at school, o r in inns. T h ey
ceased to eat and drink o u t o f comm unal dishes and cups, which m ight
contain traces o f saliva o f others.”52 After the sixteenth century, people
became quite guarded about their bodies and reserved about touching
others.113T h is new m odesty was so extreme at tim es th at it even made it
difficult for doctors to be at the bedside o f wom en in labor.54
54 R e c o n s t r u c t i n g P ri vacy
Sex
Sexual activity has long been considered private. In the United States,
for example, the Restatement of Torts declares, “Sexual relations . . .
are normally entirely private matters.”61 T h e European C ourt o f Human
Rights has held that “sexual orientation and sexual life are im portant
elements o f the personal sphere.”62 But even in this general notion of
sex as private, there are several different meanings of “private.” First is
the ability o f people to have sex in seclusion. Second, sex can be private
in the sense that information about people’s sexual activity is viewed as
their personal business and not something spoken about in the com
munity. A third meaning o f sex as being private is that it should remain
free from regulation by the community and the law. As with privacy of
the family and the body, these different dimensions o f privacy regarding
sex varied throughout history.
Reconstructing Privacy 55
“w hat was outlawed now was n o t simple adultery, b u t ‘open and noto
rious’ adultery.”83 As professors Jo h n D ’Em ilio and Estelle Freedm an
observe, “[S]exuality had to be restored to the private sphere; th ere
fore, any public expression o f sexuality was considered, by definition,
obscene.”84
T h e V ictorian reticence did n o t last long. In the early tw entieth cen
tury, social reform ers lam basted V ictorian m orality as prudish and suc
ceeded in reshaping attitudes about sex tow ard greater openness. Sig
m und Freud, for example, dem onstrated an “unblinking candor about
sex.”85 T h ro u g h o u t the tw entieth century, regulation o f sex diminished
considerably.86 In America, by the late 1960s, m ost o f the legal h in
drances to contraception had vanished.87 T h e Suprem e C o u rt issued a
series o f decisions that held th at the C onstitution protected a “rig h t to
privacy” preventing the state from becom ing involved in people’s inti
m ate affairs. F o r example, in 1965, in Griswold v. Connecticut, the
Suprem e C o u rt proclaim ed th at governm ent invasion in to “the
precincts o f m arital bedroom s” is “repulsive to the notions o f privacy
surrounding the m arriage relationship.”88 A lthough sodom y was a
crim e in every state in th e U n ited States in 1960, by the tw ilight o f the
tw entieth century, antisodom y laws had been elim inated in m any
states.89 In 2003, the Suprem e C o u rt held th a t laws prohibiting hom o
sexual sodom y w ere an unconstitutional infringem ent o f “the personal
and private life.”90 “In the contem porary W estern w orld,” Friedm an
observes, “there is an extraordinary am ount o f sexual freedom . Alm ost
all form s o f sexual behavior betw een consenting adults are legal, in
cluding same-sex behavior. T h e laws against adultery and fornication
have either disappeared o r are m oribund.”91 N evertheless, certain
form s o f sex still rem ain outlawed in nearly every society, such as incest
and bestiality. Sim on G oldhill notes, “All societies find som e form of
sexual activity unacceptable o r disgusting.”92
T h e sto ry o f the privacy o f sex illustrates th a t “privacy” m eans sev
eral different things. Privacy in each sense— seclusion, freedom from
com m unity m eddling, and freedom from state regulation— has gener
ally increased in W estern societies. M oreover, it is n o t happenstance
th at these form s o f privacy increased together. A lthough they are dis
tinct, these form s o f privacy are related. W h e n sex betw een consenting
adults was seen as the com m unity’s business, it is n o t surprising th at the
state heavily regulated sexual activity. T h e increased ability to have sex
58 R e c o n s t r u c t i n g P ri vacy
free from the watchful gaze o f others is deeply connected to the extent
to which society involves itself in m atters o f sex. Privacy thus includes
many distinct but intertwined dimensions.
Home
T h e home has often been viewed as the quintessential place o f pri
vacy. Countless constitutions around the world safeguard privacy of
the home; for example, Argentina proclaims that the “hom e is invio
lable,” Finland guarantees the “sanctity of the hom e,” Greece de
clares that “[e]very person’s home is a sanctuary,” and South Korea
declares that “[a]ll citizens are free from intrusion into their place o f
residence.”93
For a long time, the home has been regarded as one’s “castle,” where
the individual enjoyed freedom from government intrusion.94 T he
“immunity” o f the home originates in “ancient times, biblical litera
ture, and Roman law.”93 Barrington M oore observes, “According to
what appears to be an ancient tradition, the citizen’s home was invio
lable. . . . T hus the tradition that a m an’s hom e is his castle harks back
n o t to English tradition but to classical Athens.”96 In England, the
maxim that the home is one’s castle found its way into law when it ap
peared in 1604 in Semayne’s Case: “[Tjhe house o f every one is to him
as his casde and fortress.”97 W illiam P itt once remarked, “T h e poorest
man may in his cottage bid defiance to the Crown. It may be frail—its
roof may shake— the wind may enter—the rain may enter—but the
K ing of England cannot enter—all his force dares not cross the
threshold of the ruined tenement!”98
In 1886, in Boyd v. United States, the U.S. Supreme C ourt vigorously
protected “the sanctity of a m an’s hom e.”99 T h e C ourt’s preservation of
the home has not wavered, and almost a century later, the C ourt reit
erated its staunch protection of the home: “In none is the zone o f pri
vacy more clearly defined than when bounded by the unambiguous
physical dimensions of an individual’s home.”100 Privacy in people’s
houses is safeguarded by the T h ird Amendment’s prohibition o f the
quartering o f troops in homes during peacetime and the Fourth
Amendment’s prohibition o f unreasonable searches and seizures.101
T he C ourt declared, “T h e Fourth Amendment, and the personal
rights which it secures, have a long history. At the very core stands the
Reconstructing Privacy 59
right o f a m an to retreat in to his own hom e and there be free from un
reasonable governm ental intrusion.”102
Beyond being a haven from the governm ent, the hom e is currently
understood as a place w here individuals retreat to find peace o f m ind,
cultivate intim ate relationships, and engage in personal activities of
self-developm ent. A ccording to Justice Douglas, “T h e hom e o f course
is the essence o f privacy, in no way dedicated to public use, in no way
extending an invitation to th e public.”103 Legal scholar M ichelle Adams
apdy describes the contem porary view o f the hom e in W estern soci
eties as “a place o f retreat to the (not always) protective sphere o f
family life, and it is reflective of, and a conduit for, familial and em o
tional intimacy.”104
A lthough the hom e has long been viewed as a private space, in the
past it was private in a different way than it is now. F o r m uch o f history,
m any did n o t view the hom e as “the family’s haven and dom estic re
treat.” In W estern societies, this concept becam e m ore widely held in
the nineteenth century and was at first lim ited to the urban middle
classes. P rio r to this tim e, m any people unrelated to the family would
be present in the hom e, such as apprentices, servants, and lodgers.
Tam ara H areven explains, “[B]y contrast to the conception o f the
hom e in contem porary society as a private retreat from the outside
w orld, to preindustrial society the family conducted its w ork and public
affairs inside the household.” T his, o f course, is a generalization about
the practices o f particular families, m ainly the families o f shopkeepers
in urban centers. F o r these families, business was conducted in the
house, and the house was a crowded, bustling place w ith little opportu
nity for the family to retreat into isolation.103
U ntil the seventeenth century, m any hom es m erely consisted o f a
large, m ultipurpose space.106 A m ong the rising bourgeoisie, hom es
w ere prim arily devoted to work— a shop, w ith a place in the back or
above to eat and sleep.107 H ouses w ere hectic, crowded places, often
cram m ed w ith one or m ore large families.108 D w elling places were
noisy; they w ere built o f creaky w ood with cracks and peepholes and
were equipped w ith n o soundproofing to stop noise from echoing
throughout the hom e. O n e historian observes about living quarters in
Renaissance Europe: “An apartm ent building was a public theater.
Some held forth, others squabbled, b u t no one had any privacy. M arital
disputes, illicit love affairs, noisy tenants, restless children— nothing
60 R e c o n s t r u c t i n g P rivacy
innovations such as plum bing, central heating, and gas and electric
lighting lim ited the need for servants to be ever-present.120
T h e expansion o f living space also contributed to the grow ing asso
ciation o f solitude w ith the hom e. A m ong larger hom es in the eigh
teen th century, hallways em erged, perm itting an unprecedented ability
to be alone and u ndisturbed.121 Privacy began to be possible within
certain special room s. T h e study, for example, was a place w here the
m aster o f the house could w ithdraw for quiet reading o r for confiden
tial conversations.122 I t was a private place for m en only; w om en had
no com parable private room o f th eir ow n.123 T h e study becam e so pri
vate th a t it was used to store th e m aster’s secret letters o f extram arital
affairs.124
W h e n em ploym ent shifted from agriculture to factories and offices
in the late nineteenth century, th e hom es o f m any began to be physi
cally separated from the place o f w ork.125 O n e’s professional life began
to be viewed as a realm o f existence separate from o n e ’s life at hom e.126
T h e gradual severing o f w ork from hom e helped alter the nature o f the
dom estic life. H areven notes, “Follow ing the removal o f the workplace
from th e hom e as a result o f urbanization and industrialization, the
household was recast as the family’s private retreat, and hom e em erged
as a new concept and existence.”12'
Communications
T h e privacy o f com m unications— in a variety o f form s— has long been
protected in m any societies. N um erous constitutions from around the
w orld p ro tect the privacy o f com m unications. F o r example, M exico
provides th at “ [pjrivate com m unications are inviolable,” Chile protects
“the inviolability. . . o f all form s o f private com m unications,” G er
m any ensures th at the “[pjrivacy o f letters, posts, and telecom m unica
tions shall be inviolable,” Belgium guarantees th at the “confidentiality
o f letters is inviolable,” and the Czech Republic protects the “secrecy o f
letters,” as well as “messages com m unicated by telephone, telegraph or
o th er such facilities.”128
T h e h istory o f com m unications privacy indicates th a t it was m ore
the p roduct o f social desires than existing realities. In o th er words,
com m unications privacy was n o t a natural state the law preserved, but
a form o f pro tectio n the law created. F o r exam ple, in Am erica, the
62 R e c o n s t r u c t i n g P ri vacy
one could claim that some desires for privacy stem from biological in
stinct. Further study is necessary to understand the origin o f the desire
for privacy in particular situations. Even if the desire for privacy in cer
tain matters stems in part from biological nature, we control our de
sires, and a mere desire for privacy in a certain activity does not neces
sarily make that activity private.
Alan W estin aptly states, “[TJhere are no universal needs for privacy
and no universal processes for adjusting the values o f privacy, disclo
sure, and surveillance within each society.”159 Nevertheless, although
privacy is n o t universal, it should not be viewed as too radically contin
gent. T here are remarkable similarities in attitudes toward privacy
around the world. Professor Adam M oore notes that some cultures
“appear to contain no privacy. T h e Tikopia of Polynesia, T hlinget In
dians o f N orth America, Java o f Indonesia, as well as a few others, have
cultural systems that appear to leave everything open for public con
sumption.” T he Tikopia have hardly any moments o f solitude; they are
rarely alone. T h e T hlinget Indians walk into each other’s houses unan
nounced. Likewise, the Java wander into each other’s homes; in fact,
their houses have no doors. U pon closer examination, however, even
these societies have dimensions o f privacy. M oore observes, “T h e Java
still have bathing enclosures, while the Thlingets and Tikopia hide be
hind psychological walls to ensure private domains. Like viewing a
stripper, we may see everything and nothing at all o f the real person.
Moreover, in each o f these cultures there are time restrictions on
access—for example, visiting someone in the middle o f the night would
typically be prohibited.” M oore astutely concludes, “W hile privacy
may be a cultural universal necessary for the proper functioning of
hum an beings, its form—the actual rules o f association and
disengagement—is culturally dependent.”160
T here is a tendency to create too strong a dichotomy between uni
versality and contingency, with something being either universal or
hopelessly variable. Instead, many things are somewhere in between.
T hey are no t universal, but there are many shared attitudes toward
them. A theory o f privacy should leave room for cultural and historical
variation, but n o t err by becoming too variable. A theory should strive
for enough generality so that it has stability and broad applicability.
Otherwise, it becomes nothing but a catalog o f activities specific to one
culture at one particular time in history. T here is indeed a wide array o f
Reconstnicting Privacy 67
Focus
I have argued thus far th a t a th eo ry o f privacy should be pluralistic,
should be general bu t n o t too vague, and should accom m odate the dy
nam ic nature o f privacy w hile m aintaining widespread applicability. A
th eo ry o f privacy, therefore, should consist o f a fram ew ork for identi
fying the plurality o f things th at fall under the rubric o f privacy. T h e
fram ew ork m ust be concrete enough to be useful, b u t n o t so overly
contextual as to fail to provide guidance across a m ultitude o f situa
tions. T o develop a fram ework, however, one critical issue remains.
T h e fram ework needs a particular focal point—a lens through which to
view the territory. Privacy issues are rem arkably complex because they
are highly contextual and contingent. In o rd er to generalize in a useful
way about privacy, we m ust focus on a dim ension o f privacy th at is
stable enough to discuss generally b u t flexible enough to account for
privacy’s dynamism. Ultim ately, I focus on problem s, b u t to justify why
this focal point is preferred, I will first explore som e o th er potential
ways to focus a conceptual analysis o f privacy and why each has severe
shortcom ings.
famous person’s] life, such as sexual relations, w hich even [she] is enti
tled to keep to herself.”161
A round the w orld, some courts approach privacy by focusing on the
nature of the inform ation. T h e C onstitutional C o u rt o f South Africa
has noted that there is “a continuum o f privacy rights w hich m ay be re
garded as starting w ith a wholly inviolable in n er self, m oving to a rela
tively impervious sanctum o f the hom e and personal life and ending in
a public realm w here privacy would only rem otely be im plicated.”162
O n e Canadian co u rt held th at th ere is no reasonable expectation of
privacy in inform ation gleaned from a dog sniff because the inform a
tion “did n o t offer any insight into his private life o r biographical core
o f personal inform ation, o th er than the fact th at he was carrying p ro
hibited drugs.”163
U.S. law som etim es focuses heavily on the nature o f the inform ation.
In Illinois v. Caballes, the U .S. Suprem e C o u rt concluded th at people
lack a reasonable expectation o f privacy in the possession o f drugs from
drug-sniffing dogs because “governm ental conduct th a t only reveals
the possession o f contraband com prom ises no legitim ate privacy in
tere st.”164 T h e C o u rt’s reasoning suggests th a t privacy is violated
only if inform ation about legal activities is revealed. In Sm ith v. M ary
land, the Suprem e C o u rt held th at people lacked a reasonable expecta
tion o f privacy in the phone num bers they dialed because this inform a
tion was n o t as sensitive as the “contents” o f the com m unications.165
T h e Electronic C om m unications Privacy A ct o f 1986 makes a sim ilar
distinction. It provides strict protections for the contents o f com m uni
cations but only lim ited protections for “envelope” data— inform ation
used to deliver com m unications (such as nam es o f senders and recipi
ents, addresses, and phone num bers).166 Law professor O rin K err de
fends this distinction because “in the great m ajority o f cases contents o f
com m unications im plicate privacy concerns on a higher o rd er o f m ag
nitude than n o n -co n ten t inform ation, and it makes sense to give
greater privacy protections for the form er and lesser to the latter.”167
E nvelope inform ation, however, often exposes the identities o f a
person’s colleagues and friends, revealing a person’s associational ties.
In m any instances, people m ay care m ore about concealing w ith whom
they are talking than w hat they are saying.168
T h u s far, the law has often viewed disclosure in black-and-w hite
fashion. Inform ation is classified as public o r private u n d er the assump-
Reconstructing Privacy 69
rion that these are qualities th at inhere in the inform ation. N o particu
lar kind o f inform ation o r m atter, however, is inherently private. T h e
problem w ith focusing on the nature of the inform ation o r m atter in
volved is th at often there are strong privacy interests in relatively in
nocuous inform ation o r m atters. F or example, some people m ight no t
consider an address to be private because it is n o t an intim ate secret.
T h is view too rigidly focuses on the nature o f the data. F o r m any indi
viduals, concealing their address is quite im portant. Celebrities w ant to
keep th eir addresses private to prevent being hounded by obsessed
fans, stalkers, and paparazzi. Dom estic-violence victims strive to hide
their w hereabouts to seek refuge from their abusers. W itnesses, jurors,
o r judges in a crim inal case m ay need to conceal w here they live to pre
vent retaliation against themselves and their families.
Because o f these concerns, the law in many instances recognizes ad
dresses as private. In Kallstrom v. City o f Columbus, for example, police
officers successfully prevented the disclosure o f their hom e addresses
because it could enable the criminals whom they arrested to seek them
ou t and threaten their families.169 In another case, an antiabortion ac
tivist group published abortion doctors’ names, photos, addresses, and
other inform ation on a website called the “N urem berg Files.” N am es o f
doctors w ho were m urdered were crossed o u t w ith a black line, and the
names o f wounded doctors were shaded in gray. T h e disclosure o f this
inform ation, often relatively innocuous and n o t considered private, was
quite an im portant m atter for the doctors, w ho feared for their safety
and th at o f their families. T h e doctors sued and w on.170 T h e D river’s
Privacy Protection Act o f 1994, which limits governm ent disclosures o f
m otor-vehicle record inform ation, was inspired by an incident in which
a deranged fan m urdered actress Rebecca Shaeffer outside h e r hom e
after acquiring Shaeffer’s address from the D epartm ent o f M o to r Vehi
cles.171 T herefore, although address inform ation is n o t intim ate, this
does n o t autom atically make it public. Inform ation is public o r private
depending upon the purposes for which people w ant to conceal it and
the uses th at others m ight make o f it.
In sum, a th eo ry o f privacy should n o t focus o n the nature o f the in
form ation o r m atters. T h e privacy o f inform ation o r m atters also in
volves the condition o f the inform ation o r m atter. By “condition,” I am
referring to a particular state o f existence, such as being concealed, held
in confidence, o r kept secure. Som ething is private in p a rt if certain
70 R e c o n s t r u c t i n g P ri vacy
differ from their actions. Econom ists Alessandro Acquisti and Jens
Grossklags observe th at “recent surveys, anecdotal evidence, and exper
im ents have highlighted an apparent dichotom y betw een privacy atti
tudes and actual behavior.” A lthough m any people in surveys express
strong desires for privacy, “individuals are willing to trade privacy for
convenience o r to bargain the release o f personal inform ation in ex
change for relatively small rewards.”184 T h is disjunction leads Strahile-
vitz to argue that w hat people say m eans less than w hat they do. “Behav
ioral data,” he contends, “is thus preferable to survey data in privacy.”185
B ut care m ust be used in interpreting behavior because several fac
tors can affect people’s decisions about privacy. Acquisti and
Grossklags point to th e problem o f inform ation asym m etries, w hen
people lack adequate know ledge o f how their personal inform ation will
be used, and bounded rationality, w hen people have difficulty applying
w hat they know to com plex situations.186 Some privacy problem s shape
behavior. People often su rren d er personal data to com panies because
they perceive th at they do n o t have m uch choice. T h e y m ight also do
so because they lack know ledge about the potential future uses o f the
inform ation. P a rt o f th e privacy problem in these cases involves
people’s lim ited bargaining pow er respecting privacy and inability to
assess th e privacy risks.18' T h u s looking at people’s behavior m ight
present a skewed picture o f societal expectations o f privacy.
Even w ith the appropriate em pirical m etric for c u rren t social expec
tations o f privacy, a significant problem rem ains. W ith o u t a norm ative
com ponent to establish w hat society should recognize as private, the
reasonable-expectations approach provides only a status rep o rt on ex
isting privacy norm s ra th e r than guides us tow ard shaping privacy law
and policy in the future. Indeed, if the governm ent has a long-standing
practice o f infringing upo n privacy, then a logical conclusion would be
th at people should reasonably expect th at th eir privacy will be invaded
in these ways.188 Similarly, the governm ent could gradually condition
people to accept w iretapping o r o th er privacy incursions, thus altering
society’s expectations o f privacy.189 Indeed, in G eorge O rw ell’s Nineteen
Eighty-four.; Big B rother conditioned its citizens to have virtually no ex
pectations o f privacy:
they watched everybody all the time. But at any rate they could
plug in your wire whenever they wanted to. You had to live—did
live, from habit that became instinct—in the assumption that
every sound you made was overheard, and, except in darkness,
every movement scrutinized.190
Focusing on Problems
As I have demonstrated in the previous sections, we should not focus
on the nature o f the information or m atter. Privacy is n o t an inherent
property o f things; it depends upon conditions that can attach to par
ticular information o r matters. Privacy is not an individual preference,
Reconstructing Privacy 75
m any conflicting interests. I contend that privacy has a social value and
th a t its im portance em erges from the benefits it confers upon society
depends need space as well as time: sanctuaries from the gaze o f the
crowd in w hich slow m utual self-disclosure is possible.”10
Several others have pointed o u t privacy’s im portance for democracy.
R uth Gavison argues, “Privacy is also essential to dem ocratic govern
m ent because it fosters and encourages th e m oral autonom y o f the cit
izen, a central requirem ent o f a democracy.”11 K eith Boone observes
th at privacy is “vital to a dem ocratic society in several specific ways as
well. F o r example, it underw rites the freedom to vote, to hold political
discussions, and to associate freely away from the glare o f the public
eye and w ithout fear o f reprisal.”12 F o r Paul Schwartz, privacy creates
spaces for civic dialogue and dem ocratic deliberation.13 According to
Anita Allen, “[P]rivacy make[s] persons m ore fit for social participation
and contribution to the pool o f resources and assets available to all.”14
Privacy perm its individuals to contem plate and discuss political
change, create counterculture, or engage in a m eaningful critique of
society. Privacy also enables creative expression that is often n o t pos
sible w ithin the constraints o f public life.13 People have the opportu
nity to develop th eir views, political opinions, and artistic expressions
w ithout having them prem aturely leaked to the world, w here harsh
judgm ents m ight crush them . G row th and developm ent require exper
im entation and the opportunity to alter one’s opinions before m aking
them public.16 Privacy allows people to speak anonymously, encour
aging robust com m unication w ithout fear o f com m unity reprisal.
But others see privacy as socially detrim ental. Privacy has long been
criticized as a form o f retreat from society. According to H annah
Arendt, the ancient G reek conception o f privacy “m eant literally a state
o f being deprived o f som ething.” T h e public sphere was the truly im
portant realm o f existence; th e private sphere was valuable solely to the
extent that it nourished people for public participation. F or the Greeks,
A rendt writes, “an entirely private fife m eans above all to be deprived of
things essential to a truly hum an life: to be deprived o f the reality that
comes from being seen and heard by o th e rs ,. . . to be deprived o f the
possibility o f achieving som ething m ore perm anent than fife itself.”17
Privacy has been viewed as a threat to com m unity and solidarity. In
m ore com m unal societies, a prevailing view is that privacy protects the
individual to the detrim ent o f the community. Professor Yao-Huai Lii
observes th a t in “traditional C hinese society, the old collectivism that
ignored individual interests certainly had no serious interest in pro
The Value o f Privacy 81
T hey claim that historically the public sphere has been the domain of
men, with women, families, and the household composing the private
sphere. By being relegated to the private sphere, women were excluded
from public life, and many women’s issues were banished from public
discourse because they were considered private matters. Courts in the
nineteenth century, for example, turned a blind eye to issues o f do
mestic abuse in the name o f family “privacy.”28 Therefore, some femi
nist scholars attack privacy as a shadowy realm that has impeded
women’s political power. According to legal scholar Catharine M ac
K innon, the “right o f privacy is a right o f m en ‘to be let alone’ to op
press women one at a tim e.” T hus “feminism has seen the personal as
the political. T he private is public for those for whom the personal is
political.”29 Carole Pateman contends that “the dichotomy between
the private and the public obscures the subjection of women to men
within an apparently universal, egalitarian and individualist order.”30
Some commentators view privacy as a vestige o f a genteel age that
has long since passed away. Alan W estin, for example, argues that
W arren and Brandeis’s call for a right to privacy “was essentially a
protest by spokesmen for patrician values against the rise o f the politi
cal and cultural values o f ‘mass society.’ ”31 Legal scholar H arry Kalven
contends that “[tjhere is a curious nineteenth-century quaintness
about the grievance [of privacy], an air o f injured gentility.”32 Cultural
historian Rochelle Gurstein notes that during the twilight o f the Vic
torian age, many critics o f privacy championed the value of exposure
and publicity. Calls for privacy were viewed as yearning for a return to
Victorian prudishness.33 In contem porary times, the criticism is made
in terms o f emerging generations growing accustomed to living in the
open and not expecting privacy. O ne com m entator writes that young
people increasingly blog “about their personal lives [with details] their
elders would have blushed to p u t in their diaries. Parents and
teachers . . . chalk this up to naivete, suggesting that, when these chil
dren grow up, they will be as concerned about privacy as past genera
tions were. But maybe not.”34 Privacy, in other words, is a fading ex
pectation and value that people increasingly find to be o f little concern
or consequence. It is the lingering reticence o f a bygone era.
Privacy can impede commercial efficiency and profitability. Fred
Cate contends, “Privacy interferes with the collection, organization,
The Value o f Privacy 83
and storage o f inform ation on which businesses and others can draw to
make rapid, inform ed decisions, such as w hether to g ran t credit o r ac
cept a check.” Privacy, he argues, “m ay reduce productivity and lead to
higher prices for products and services.”35
Privacy also conflicts w ith the free flow o f inform ation. I t can im
pede transparency and openness. L ibertarian w riter V irginia Postrel
observes th at privacy restricts “the freedom to gather and disseminate
truthful inform ation— otherw ise known as freedom o f speech and the
press.”36 Eugene Volokh contends th at privacy interferes w ith people’s
rig h t to speak about each other. Privacy im pedes speech th at is “o f in
terest to people deciding how to behave in th eir daily lives, w hether
daily business o r daily personal lives—w hom to approach to do busi
ness, w hom to tru st with th eir money, and the like.”37 C om m entator
Solveig Singleton argues th at “ [th ro u g h o u t history, people have gen
erally been free to learn about one another in th e course o f business
transactions and o th er day-to-day contracts. Restrictions th a t alter this
default rule sweep a potentially enorm ous pool o f facts and ideas ou t of
the shared dom ain.”38 Legal scholar D iane Z im m erm an contends that
privacy is outw eighed by the “powerful countervailing interest in ex
changes o f accurate inform ation about the private lives and characters
o f its citizenry.”39
Privacy also conflicts with o th er values, such as the detection and pre
vention o f crime and national security. Law professor W illiam Stuntz
argues th at “effective, active governm ent—governm ent that innovates,
th at protects people w ho need protecting, that acts aggressively when
action is needed— is dying.” Because it impedes swift governm ent re
sponses to security threats, privacy is one o f the “diseases.”40 Judge
Richard Posner points o u t the em erging dangers o f terrorism : “In an
era o f global terrorism and proliferations o f weapons o f mass destruc
tion, the governm ent has a com pelling need to gather, pool, sift, and
search vast quantities o f inform ation, m uch o f it personal.”41
T h u s th ere is a litany o f reasons for and against protecting privacy.
H o w do we make sense o f the bewildering array o f argum ents about
privacy’s benefits and harms? A broader exam ination o f the value of
privacy is necessary because several critical issues m ust be resolved
regarding the basic m ethod and approach to understanding privacy’s
value.
84 T h e Va l u e o f P rivacy
turm oil, and be free from being disturbed in our activities. T h e value
o f am eliorating privacy problem s lies in the activities th at privacy pro
tections enable.
which ultim ately involves inform ation about your identity. W ith o u t
m ore details, however, it is hard to see how my snooping rises to the
level o f kidnapping. I have gleaned knowledge about you th at will
shape my judgm ent o f you, b u t my judgm ent o f you is n o t equivalent to
your identity. T h e harm does n o t stem from the fact th a t I have seized
your identity b u t th at I have used inform ation you did n o t w ant to ex
pose to m e in form ing m y im pression o f you.
P rivacy as an In d iv id u a l R ig h t
A lthough the com m unitarians are correct that viewing privacy as an in
dividual rig h t fails to justify why the needs o f the individual should
trum p societal interests, they subscribe to the same dichotom y between
individual and society th at form s the backbone o f the view they cri
tique. In contrast, I take a pragm atic approach to the value o f privacy.
T h e value o f privacy should be assessed on the basis o f its contributions
to society. P rotecting individual privacy need n o t be at society’s
expense—in fact, th e value o f safeguarding people’s privacy should be
justified by its social benefits. W e do n o t live in isolation, b u t am ong
others, and social engagem ent is a necessary part o f life. In direct con
trast to Jo h n Locke and m any m odem liberals, w ho view th e individual
as preceding society, Jo h n Dewey noted th at the individual is inextri
cably bound up in society: “W e cannot think o f ourselves save as to
some extent social beings. H ence we cannot separate the idea o f our
selves and o u r own good from o u r idea o f others and o f th eir good.”70
T h e individual is n o t b o m in a self-sufficient state; instead, the indi
vidual requires nurture and care. Society form s the individual, for it
provides protection, education, food, and entertainm ent necessary for
the individual’s developm ent.
Individualism should be incorporated into the conception o f the
com m on good, n o t viewed as outside it. As D ew ey aptly argued, we
m ust insist upon a “social basis and social justification” for civil liber
ties.71 W h en individualism is severed from the com m on good, the
weighing o f values is often skewed toward those equated w ith the
com m on good, since the interests o f society often outw eigh the inter
ests o f particular individuals. W h en individualism is n o t considered at
odds w ith the com m on good, we can better assess its values, contribu
tions, and limitations.
92 T h e V a l u e o f P ri vacy
value emerges from the activities it protects, but the value m ust be as
sessed m ore systemically, no t m erely by the happenstance o f the spe
cific activities involved in any one particular circumstance.
Privacy, therefore, is a set of protections from a plurality o f problems
th at all resem ble each other, yet no t in the same way. T h e value o f pro
tecting against a particular problem emerges from the activities that
are implicated. Privacy problems impede valuable activities, and ame
liorating these problem s is essential to protecting the activities. T h e
value o f privacy is n o t absolute; privacy should be balanced against
conflicting interests that also have significant value. T h e value o f pri
vacy is n o t uniform, b u t varies depending upon the nature o f the prob
lems being protected against.
T hus far, I have spoken generally about my approach to conceptual
izing privacy and its value. It is now tim e to set forth a framework for
understanding privacy in a pluralistic way.
A Taxonomy o f Privacy
the goal is simply to define these activities and explain why and how
they can cause trouble. T h e question o f when and how the law should
regulate can be answered only in each specific context in which the
question arises. But attem pts to answer this question are increasingly
suffering because o f confusion about defining the troublesom e activi
ties th at fall under the rubric o f privacy. T h is taxonom y will aid us in
analyzing various privacy problem s so the law can b etter address them
and balance them with opposing interests. Since the goal o f the law is
to have privacy protections th at best prevent and redress particular
problem s, we first need to understand the problem s in order to eval
uate the effectiveness o f the protections.
T herefore, m y focus is on activities that create problem s. I aim to
show th at these activities differ significandy, yet share m any com m on
alities. Privacy is too com plicated a concept to be boiled down to a
single essence. A ttem pts to find such an essence often end up being too
broad and vague, w ith litd e usefulness in addressing concrete issues.
T herefore, my goal is to define m ore precisely w hat the problem is in
each context— how it is unique, how it differs from oth er problems,
and how it is related to o th er types o f privacy problem s.
In th e taxonom y th at follows, there are four basic groups o f harmful
activities: (1) inform ation collection, (2) inform ation processing, (3) in
form ation dissem ination, and (4) invasion. Each o f these groups con
sists o f different related subgroups o f harm ful activities.
I have arranged these groups around a m odel th at begins with the
data subject— the individual whose life is m ost direcdy affected by the
activities classified in the taxonomy. From that individual, various enti
ties (other people, businesses, and the governm ent) collect inform a
tion. T h e collection o f this inform ation itself can constitute a harmful
activity, though n o t all inform ation collection is harm ful. T hose that
collect the data (the “data holders”) then process it— th at is, they store,
com bine, m anipulate, search, and use it. I label these activities “infor
m ation processing.” T h e next step is “inform ation dissem ination,” in
which the data holders transfer the inform ation to others o r release the
inform ation. T h e general progression from inform ation collection to
processing to dissem ination is the data m oving further away from the
individual’s control. T h e last grouping o f activities is “invasions,”
which involve im pingem ents direcdy on the individual. Instead o f the
progression away from the individual, invasions progress toward the
104 A T a x o n o m y o f P r i vac y
INFORMATION
PROCESSING
Aggregation
Identification
Insecurity
INFORMATION
Secondary use
COLLECTION
Exclusion
Surveillance
t
DATA
SUBJECT
Interrogation
DATA
HOLDERS
INFORMATION
DISSEMINATION
Breach of confidentiality
Disclosure
Exposure
INVASIONS Increased accessibility
Intrusion Blackmail
Decisional interference Appropriation
Distortion
Model of taxonomy
Information Collection
Information collection creates disruption through the process o f data
gathering. Even if no information is revealed publicly, information col
lection can create harm. I will identify two forms o f information col
lection: (1) surveillance and (2) interrogation.
Surveillance
they ride the bus o r subway, but persistent gawking can create feelings
o f anxiety and discomfort.
N o t only can direct awareness o f surveillance make a person feel ex
tremely uncomfortable, but it can also cause that person to alter her
behavior. Surveillance can lead to self-censorship and inhibition.17 Be
cause of its inhibitory effects, surveillance is a tool o f social control. It
enhances the power o f social norm s, which work m ore effectively when
people are being observed by others.18 Political scientist John Gilliom
observes, “Surveillance o f hum an behavior is in place to control hum an
behavior, w hether by lim iting access to programs o r institutions, m on
itoring and affecting behavior w ithin those arenas, or otherwise en
forcing rules and norm s by observing and recording acts o f compliance
and deviance.”19 T his aspect o f surveillance does no t automatically
make it harmful, though, because social control can be beneficial, and
every society m ust exercise a sizeable degree o f social control. For ex
ample, surveillance can serve as a deterrent to crime. M any people de
sire the discipline and control surveillance can bring. Jeffrey Rosen ob
serves that Britain’s closed-circuit television (C C TV )— a netw ork o f
over four million public surveillance cameras—is widely perceived as
“a friendly eye in the sky, not Big Brother but a kindly and watchful
uncle or aunt.”20
Too much social control, however, can adversely impact freedom,
creativity, and self-development. According to Julie Cohen, “[P erva
sive m onitoring o f every first move or false start will, at the margin, in
cline choices toward the bland and the m ainstream .” M onitoring con
strains the “acceptable spectrum o f belief and behavior,” and it results
in “a subtle yet fundamental shift in the content of our character, a
blunting and blurring o f rough edges and sharp lines.” Surveillance
thus “threatens n o t only to chill the expression o f eccentric individu
ality, but also, gradually, to dampen the force o f o u r aspirations to it.”21
Similarly, Paul Schwartz argues that surveillance inhibits freedom o f
choice and impinges upon self-determ ination.22
In many instances, people are not directly aware that they are being
observed. Does covert surveillance cause a problem? U nder one view,
surveillance is a prim a facie wrong, w hether overt o r covert, because it
demonstrates a lack o f respect for its subject as an autonom ous person.
Philosopher Stanley Benn explains that overt surveillance threatens its
target’s “consciousness o f pure freedom as subject, as originator and
A Taxonomy o f Privacy 109
Interrogation
I am a census inquisitor.
I travel about from door to door,
F rom house to house, from store to store,
W ith pencil and paper and power galore.
I do as I like and ask w hat I please.
D ow n before m e you m ust get on your knees;
So open your books, hand over your keys,
And tell me about your chronic disease.54
Information Processing
Inform ation processing is the use, storage, and m anipulation o f data
that has been collected. Inform ation processing does no t involve the
collection o f data; rather, it concerns how already-collected data is han
dled. I will discuss five forms o f inform ation processing: (1) aggregation,
(2) identification, (3) insecurity, (4) secondary use, and (5) exclusion.
Processing involves various ways o f connecting data and linking it to
the people to w hom it pertains. Even though processing can involve
the transm ission o f data, it diverges from dissem ination because the
data transfer does n o t involve the disclosure o f the inform ation to the
public— o r even to another person. Rather, data is often transferred be
tween various record systems and consolidated w ith o th er data. P ro
cessing diverges from inform ation collection because processing cre
ates problem s th rough the consolidation and use o f inform ation, n o t
through the m eans by which it is gathered.
Aggregation
T h e whole is greater than the sum o f its parts.
—Anonymous apholism78
118 A T a x o n o m y o f P rivacy
[Djecisions that were formerly based on judgm ent and hum an fac
tors are instead often decided according to prescribed formulas. In
today’s world, this response is often characterized by reliance on a
rigid, unyielding process in which com puterized inform ation is
given great weight. Facts that actually require substantial evalua
tion could instead be reduced to discrete entries in preassigned
categories.86
Identification
Every hum an being carries w ith him from his cradle to his grave
certain physical m arks which do n o t change their character, and
by w hich he can always be identified— and that w ithout shade or
doubt o r question. T h e se m arks are his signature, his physiolog
ical autograph.
Insecurity
I live in peace in the innermost chamber o f my house, and mean
while the enemy may be burrowing his way slowly and stealthily
straight toward me.
Secondary Use
[An] individual w ho is asked to provide a simple item o f inform a
tion for w hat he believes to be a single purpose m ay om it explana
to ry details th at becom e crucial when his file is surveyed for unre
lated purposes.
and the A PEC Privacy' Fram ework also contain a restriction on sec
ondary' use.155 In Australia, the Privacy' Act “prohibits an organisation
using o r disclosing personal inform ation about an individual for a pur
pose o th er than the prim ary purpose o f collection (described as the ‘sec
ondary purpose’), unless an exception applies.”*56 South Korea’s Infor
m ation Protection Act and C anada’s Personal Inform ation Protection
and Electronic D ocum ents Act (PIPEDA) protect against secondary
uses.157 According to the U nited N ations Guidelines C oncerning C om
puterized Personal D ata Files, “All the personal data collected and
recorded [must] rem ain relevant and adequate to the purposes . . . spec
ified [at the tim e the data was collected].”158
W h a t is the concern over secondary uses o f inform ation beyond
those purposes for which it is collected? W h y are th ere so many' legal
attem pts to lim it secondary uses o f data?
“Secondary use” is the use o f data for purposes unrelated to the pur
poses for w hich the data was initially collected w ithout the data sub
ject’s consent. T h e re are certainly many desirable instances o f sec
ondary use. Inform ation m ight be used to stop a crim e o r to save a life.
T h e variety o f possible secondary uses o f data is virtually infinite, and
they range from benign to m alignant. Secondary use is often referred
to as “mission creep” o r “data creep,” which describes the gradual ex
pansion o f uses o f inform ation over time.
Secondary use can cause problem s. It involves using inform ation in
ways th a t a person does n o t consent to and th at she m ight n o t find de
sirable. Secondary uses thw'art people’s expectations about how the
data they give o u t will be used. People m ight not give o u t data if they
know about a potential secondary use, such as telem arketing, spam, or
o th er form s o f intrusive advertising. F or example, fingerprints o f U.S.
m ilitary recruits originally collected to screen their backgrounds were
sent to the FBI and incorporated into the FB I’s crim inal fingerprint
database.159 T h ese individuals may no t have expected n o r desired to
have th eir fingerprints m aintained in a law -enforcem ent database o f
convicts and criminals. Secondary use resem bles breach o f confiden
tiality in th at there is a betrayal of the person’s expectations when
giving o u t inform ation.
Perhaps people should simply expect that their data m ight be used in
different ways when they relinquish it. U nder this view, there is no harm
to expectations. But even w hen privacy policies state th at inform ation
132 A T a x o n o m y o f P r i v a c y
bom bing asked the husband o f a wom an killed in the incident for a
copy o f h er diary. H e provided the diary believing th at it would rem ain
confidential. However, the police allowed a w riter to read the diary and
quote from it in a book about the bom bing. T h e co u rt concluded that
the police violated the constitutional right to inform ation privacy. T h e
police argued th at the diary was n o t private “considering the m any in
vestigators w ho had access to the diary.” However, the court con
cluded, “T o turn a diary over to a lim ited group for w hat one perceived
to be a lim ited and proper purpose is quite different than inviting pub
lication o f th e m aterial.” 162 Similarly, in another case, the police dis
closed a video o f a rape to a television station. A lthough the video
would eventually be played a t trial, the court held th at “ [ j]ust because
disclosing private inform ation at a possible crim inal trial is justified by
the evidentiary nature o f th at inform ation, it does n o t follow that dis
closing the same inform ation on a television news broadcast is similarly
justified.”163
Exclusion
F o r in general the proceedings are kept secret n o t only from the
public b u t from the accused as well.
— Franz Kafka, T h e Trial (1925fM
Am ong the Fair Inform ation Practices are three related principles: (1)
the existence o f record systems cannot be kept secret; (2) an individual
m ust be able to “find ou t w hat inform ation about him is in a record and
how it is used”; and (3) an individual m ust be able to “correct o r am end
a record o f identifiable inform ation about him .”166 T ogether these
principles allow individuals to have some knowledge o f the records
about them m aintained by governm ent agencies and businesses. T h e
134 A T a x o n o m y o f P r iv a c y
Some statutes also allow people to opt out o f certain uses o f informa
tion. T he Gramm-Leach-Bliley Act, for example, allows people to re
fuse to allow financial institutions to share their data with third par
ties.176 T h e opt-out right, which assumes consent unless an individual
affirmatively indicates a preference for no t sharing the information,
does n o t ensure that consent is informed beyond providing customers
with notice that information may be shared. Accordingly, it would m ost
likely fail to constitute informed consent within a fiduciary relationship.
T h e law thus partially protects against exclusion. It provides people
with some rights over their inform ation when in the possession o f
others, but it stops short of allowing individuals to exercise a significant
degree of control over their data.
Breach o f Confidentiality
T h e frankest and freest and privatest product o f the hum an mind
and heart is a love letter; the w riter gets his limidess freedom o f
statem ent and expression from his sense th at no stranger is going
to see what he is writing. Sometimes there is a breach-of-prom ise
case by and by; and when he sees his letter in p rint it makes him
cruelly uncom fortable and he perceives th at he never would have
unbosomed him self to that large and honest degree if he had
known that he was writing for the public.
—M ark Twain177
a party with im plicit (and often explicit) promises that the information
will be confidential.192
M ore than ten American states have rejected the reasoning o f the
third-party doctrine in interpreting their own constitutional protec
tions against search and seizure.193 Dissent from the third-party doc
trine is not limited to American courts. In 2004, the Supreme C ourt of
India, after looking to U.S. Fourth Am endm ent law for guidance in a
case similar to Miller, declared that bank custom er records “m ust con
tinue to remain confidential vis-a-vis the person, even if they are no
longer at the custom er’s house and have been voluntarily sent to a
Bank.” Therefore, the court concluded, “[W]e cannot accept the line of
M iller in which the [U.S. Supreme] C ourt proceeded on the basis that
the right to privacy' is referable to the right o f ‘property’ theory.”194
In the U nited States, to rt law, unlike Fourth Am endm ent law, recog
nizes breach o f confidentiality as a distinct harm . T h e breach-of-
confidentiality to rt applies to the patient-physician relationship and to
other relationships as well. As m entioned previously, some courts have
held that the to rt applies to banks. In Peterson v. Idaho First National
Bank, the court observed, “All agree that a bank should protect its busi
ness records from the prying eyes o f the public, moved by curiosity or
malice. N o one questions its rig h t to protect its fiduciary relationship
with its customers, which, in sound banking practice, as a m atter of
common knowledge, is done everywhere.” N o t divulging custom ers’
financial inform ation to others “is an implied term o f the contract be
tween a banker and his customer.” M oreover, the court reasoned, “In
violate secrecy is one o f the inherent and fundamental precepts of the
relationship o f the bank and its custom ers or depositors.”195 M any
other courts have agreed.196
Disclosjtre
[I]t ain’t going to be possible to keep out anywhere the light o f the
press. N ow w hat I ’m going to do is to set up the biggest lamp yet
made over and make it shine all over the place. W e’ll see w ho’s pri
vate then.
— George Flack, a journalist in Henry James,
T he Reverberator (I888)197
A Taxonomy o f Privacy 141
to the court, there was a “legal right and assurance that one’s private
life will not be wantonly opened to the public.”209 Mishima had to pay
800,000 yen, about $2,200 at the time, then the largest verdict in Japan
after W orld W ar II.210
W hy does the law protect people against disclosure o f true informa
tion about them? Some critics of these protections contend that they
infringe upon free speech. Eugene Volokh argues that “the right to in
formation privacy—my right to control your communication o f per
sonally identifiable information about me—is a right to have the gov
ernm ent stop you from speaking about me.”211 Others have charged
that protection against disclosure inhibits our ability to judge others
and determine whether they are worthy o f our trust. According to
Richard Posner, disclosure protections provide people the “power to
conceal information about themselves that others might use to their
disadvantage.”212
“Disclosure” occurs when certain true information about a person is
revealed to others. Disclosure differs from breach o f confidentiality be
cause the harm in disclosure involves the damage to reputation caused
by the dissemination; the harm in breach o f confidentiality is the viola
tion of trust in the relationship. Disclosure can harm even if the infor
mation is revealed by a stranger. In “T he Right to Privacy,” W arren
and Brandeis took issue with the argument that express or implied con
tractual duties o f confidentiality could adequately protect privacy. In
particular, they noted that strangers were increasingly able to gather
personal information:
things they cannot control and deter people from learning their gene
tic makeup.222
Disclosure can also be harmful because it makes a person a “prisoner
o f his recorded past.”223 People grow and change, and disclosures o f in
formation from their past can inhibit their ability to reform their be
havior, to have a second chance, or to alter their life’s direction. M ore
over, when information is released publicly, it can be used in a host o f
unforeseeable way's, creating problems related to those caused by sec
ondary use.
T h e law often protects against disclosure when the inform ation is
kept secret but not when others know about it. As one court observed,
appearing in public “necessarily^ involves doffing the cloak o f privacy
which the law protects.”224 In Pemvell v. Taft Broadcasting Co., the court
held that a husband and wife wTongfully arrested in public had no pri
vacy interest against the broadcast o f video footage o f the arrest be
cause it was filmed in public and was “left open to the public eye.”223
M oreover, if a fact about a person is known to others, m any courts con
clude that it is no longer private. T h is was the case in Sipple v. Chronicle
Publishing Co., where newspapers “outed” Oliver Sipple, who hero
ically saved President G erald Ford from an assassination attempt. T h e
court concluded that his sexuality was not private because it was well
known in the gay community.226 In Duran v. Detroit News, Inc., a
form er Colom bian judge was attem pting to lie low because o f death
threats and a bounty placed on her head by a drug lord. W hen a news
paper disclosed her address, a court found no privacy interest because
she had revealed it to a few people.22' A few' courts, however, have
come to different conclusions regarding w hether there is a privacy in
terest in inform ation comm unicated to others. F or example, in Times
M irror Co. v. Superior Court, a newspaper article disclosed the identity
o f a m urder witness. Although the witness had confided in a few friends
and family members, she had not “rendered otherwise private informa
tion public by cooperating in the criminal investigation and seeking
solace from friends and relatives.”228
L ior Strahilevitz aptly observes that disclosure involves spreading in
formation beyond existing networks of information flow.229 T h e harm
o f disclosure is not so m uch the elimination o f secrecy as it is the
spreading of information beyond expected boundaries. People often
disclose information to a limited circle o f friends, and they expect the
146 A T a x o n o m y o f P r iv a c y
Exposure
Let not thy privy members be
layd upon to be view’d
it is most shameful and abhord,
detestable and rude.
Increased Accessibility
Obscurity often brings safety.
Federal courts, along w ith m any state courts and agencies, are devel
oping systems to place their records online.24' T h ese records are
readily available at local courthouses o r governm ent offices. N everthe
less, placing them online has given rise to an extensive debate over pri
vacy. Some argue that the inform ation is already publicly available, and
that therefore it should be available on the Internet in the same m anner
as it is in physical form at the localities. But many administrative bodies
150 A T a x o n o m y o f P r iv a c y
charged with examining the issue have hesitated because of the in
creased accessibility the Internet will bring. T h e U.S. Judicial Confer
ence Committee concluded, for example, that “any benefits o f public
remote electronic access to criminal files were outweighed by the safety
and law enforcement risks such access would create.”248
If the information is already available to the public, what is the harm
in increasing its accessibility? Increased accessibility does not involve a
direct disclosure. Secret information is not revealed. Confidentiality is
not breached. Rather, information that is already available to the public
is made easier to access. W ith increased accessibility, a difference in
quantity becomes a difference in quality—it heightens the risk of the
harms of disclosure.
Increased accessibility to personal information has many benefits. It
enhances openness by allowing people to locate information that they
are seeking more easily. Ready accessibility of records, for example, can
assist in investigating the background o f a person wrhom one is plan
ning to hire. Robert Gellman notes, “Some basic functions and institu
tions depend on the public availability o f records to operate. T h e U.S.
system o f land ownership relies on the public availability of records, al
though that has not always been the case. T he public availability of
bankruptcy records is also integral to the process.”249
Increased accessibility, however, creates problems, such as the
greater possibility of disclosure. Information can readily be exploited
for purposes other than those for which it was originally made publicly
accessible. F or example, companies are gathering data from public rec
ords for commercial and marketing purposes or for profiling and other
analysis.230 Peter W inn notes that increased access to court records will
cause harms to participants in the judicial system: “They will lose . . .
their interest in privacy—their identities will be subject to potential
misuse by thieves, and their children may be exposed to sexual preda
tors.”251
U nder the secrecy paradigm, courts often view privacy as a binary
status—information is either completely private or completely public.
Accordingly, once information is released into the public domain, it is
no longer private. In U.S. law, the secrecy paradigm is pervasive. For
example, according to the Restatement o f Torts, the public-disclosure
tort does not apply “when the defendant merely gives further publicity
to information about the plaintiff that is already public.”232 For the
A Taxonomy o f Privacy 151
Blackmail
T h e robber on the highway who was bold and wicked enough to
hold a pistol at the head o f his fellow man, and dem and his m oney
o r his fife, was an innocent offender, compared with the cowardly
assassin o f honour and reputation, who sheltered by darkness and
secrecy, would seek in cold blood to gratify his sordid views by
w ounding the peace and blasting the happiness o f his terrified
victim.
another. W ith blackmail, the harm is not in the actual disclosure o f the
inform ation, b u t in th e control exercised by the one who makes the
threat over the data subject. In some cases, blackmail can also involve
inform ation m ore akin to exposure than disclosure. Breach o f confi
dentiality is also related to blackmail because a confidant can threaten
to disclose a secret in retu rn for money. Blackmail differs from disclo
sure, exposure, and breach o f confidentiality in that it involves a threat
o f disclosure rather than an actual disclosure.
A rough analogy m ay be m ade to the crimes o f battery and assault.
B attery involves actual physical harm , whereas assault is putting a
person in fear o f physical harm .269 But there are im portant differences
betw een blackmail and assault. Unlike assault, w here the violence
threatened is illegal, w ith blackmail, the threatened disclosure can be
perfectly legal. Indeed, the disclosure m ight be socially beneficial in
that it m ight reveal th at the blackmail victim com m itted a crim e or
heinous act. T h e th re a t o f disclosure, however, is so profoundly disem-
pow ering that society still wants to protect against it. Toward the end
o f H en rik Ibsen’s play Hedda Gable?; Judge Brack, w ho knows a dam
aging secret about H edda Gabler, says to her, “M y dearest H edda, be
lieve m e, I shall n o t abuse the position.” H edda replies, “In your
power, all the same. A t the m ercy o f your will and demands. And so a
slave! A slave!”2/0 T h e m ore people know about us, the m ore they can
exercise control over us. T h is is why telling one’s deepest secrets to an
o th er makes one vulnerable. Prohibiting blackmail prevents people
from taking advantage o f us w ith our personal inform ation.
T h e purpose o f restricting blackmail is no t to lim it disclosure b u t to
prevent the threat o f disclosure from being used as a tool for exerting
pow er and dom inion over others. O ur society prohibits slavery, labor
below the m inim um wage, dangerous workplace conditions, and quid
pro quo sexual harassm ent even if the victim seem ingly consents. T h e
rationale for these prohibitions stems in p art from the fact th at these
acts are so coercive th at the consent is n o t voluntary, and so they give a
person excessive pow er over another. Blackmail involves a similar kind
o f coercive power. Indeed, criminal codes classify blackmail as a form
o f extortion, which involves the use o f fear o r threats to force someone
to subm it to another’s will.271
Laws th at make blackmail a crim e thus prohibit the use o f disclosure,
exposure, o r breach o f confidentiality as a m eans for exercising power
154 A T a x o n o m y o f P r i v a c y
Appropriation
Shortly after the decision, a com m ent in the Yale Law Journal criticized
the Roberson decision for no t recognizing a rem edy for the “undoubted
injury to the plaintiff.”2' 6 T h e strong criticism o f the decision even led
one o f th e judges o f the m ajority to defend the opinion in the Columbia
Law Review.2" A year later, N ew York passed a law creating a cause of
action to redress the type o f injury Roberson suffered.278 T h e law re
mains in force today.279
T h e to rt o f appropriation was the first privacy to rt to be recognized
after W arren and Brandeis’s article. T h e to rt o f appropriation occurs
w hen “ [o]ne . . . appropriates to his own use o r benefit the nam e or
likeness o f another.” T o be liable for appropriation, “the defendant
m ust have appropriated to his own use or benefit the reputation, pres
tige, social o r comm ercial standing, public interest o r oth er values of
the plaintiff’s nam e o r likeness.”280
W h y did Roberson create such a response? W h a t spurred such an ex
tensive public discussion and prom pt legislative action? W h a t is prob
lem atic about using a person’s nam e or photograph in an advertise
ment? A fter all, one’s nam e and image are often n o t secret. T h e picture
o f R oberson was flattering and did n o t ruin h er reputation. W h a t was
the injury?
“A ppropriation” is the use o f one’s identity o r personality for the
purposes and goals o f another. A ppropriation, like the privacy disrup
tions o f disclosure and distortion, involves the way an individual desires
to present herself to society.
Beyond the U nited States, the law o f m any o th er countries protects
against appropriation o f one’s name or likeness. French law provides
people w ith a “rig h t o f m onopoly over exploitation o f one’s image,
nam e, and notoriety.”281 France’s protection o f the unauthorized use of
people’s photographs traces back to Pajfawe Rachel in 1858 (discussed
earlier in the section on exposure).282 G erm any has a rem edy for the
“[mjisuse o f another’s nam e, likeness, ideas or personal history that
causes economic o r emotional damage to ‘personality developm ent.’ ”28J
T h e E uropean C o u rt o f H um an Rights has recognized a person’s right
to control h er image even w hen taken in public. In Von Hannover v.
Geimany, Princess C aroline o f M onaco sued three G erm an magazines
to halt th e publication o f photos o f h er in various public places. T h e
court concluded that “the concept o f the private life extends to aspects
relating to personal identity, such as a p erson’s nam e, o r a person’s
156 A T a x o n o m y o f P r i v a c y
Distortion
Defamation law has existed for centuries. Consisting of the torts o f libel
and slander, defamation law protects against falsehoods that injure a
person’s reputation. Defamation law has its origins in the ancient
Roman law o f injuria,298 During the early Middle Ages, defamation was
considered so contemptible that it was punished by slicing off the
tongue.299Today, in the United States, in order to be liable for defama
tion, one must make “a false and defamatory statement concerning an
other.”300A “defamatory” statement “tends so to harm the reputation of
A Taxonomy o f Privacy 159
Invasion
Intrusion
T h e soul selects h er own society
T h e n shuts the door;
O n h er divine m ajority
O btrude no m ore
— Emily Dickinson (1890)ixs
do we want to allow people to have a realm in which they can avoid the
presence o f others in society?
“[individuals need a place of sanctuary where they can be free from
societal control,” the Supreme C ourt o f India aptly stated. “T h e im
portance o f such sanctuary is that individuals can drop the mask, desist
for a while from projecting to the world the image they w ant to be ac
cepted as themselves, an image that may reflect the values of their peers
rather than the realities o f their natures.”333 T h e protection o f a realm
o f solitude does no t m erely benefit the individual; it is built into so
ciety’s structure for a social purpose. H annah A rendt notes that al
though the Greeks viewed the public sphere as having param ount im
portance, the private sphere was essential to shaping the dimensions
and quality o f life in the public sphere:
In other words, solitude does n o t detract from a rich public life but in
fact enhances it. Solitude enables people to rest from the pressures o f
living in public and perform ing public roles.335 T oo m uch envelopm ent
in society can be destructive to social relationships. W ithout refuge
from others, relationships can become m ore bitter and tense.336 M ore
over, a space apart from others has enabled people to develop artistic,
political, and religious ideas that have had lasting influence and value
when later introduced into the public sphere.337
Generally, U.S. courts recognize intrusion-upon-seclusion tort ac
tions only when a person is at home or in a secluded place.338 T his ap
proach is akin to courts recognizing a harm in surveillance only when it
is conducted in private, not in public. However, beyond solitude, people
often expect space apart from others even when they are with other
people. According to sociologist Irwin Altman, we need “personal
space,” a land o f zone or aura around us to separate ourselves from
others. Spatial distance provides for “comfort, ease, and relaxation.” Ani
mals maintain “remarkably constant” distances from other animals o f the
same species. In one series o f studies, people placed themselves very
A Taxonomy o f Privacy 165
Decisional Interference
I avoid looking down at my body, n o t so m uch because it’s
shameful or im m odest but because I don’t wrant to see it. I don’t
want to look at som ething that determines me so completely.
noted that “[vjarious guarantees [by the Bill of Rights] create zones of
privacy.”344
In Eisenstadt v. Baird, the C ourt extended the reasoning in Griswold
to the use of contraceptives by unmarried persons as well. T he C ourt
explained that privacy “is the right o f the individual, married or single,
to be free from unwarranted governmental intrusion into matters so
fundamentally affecting a person as the decision whether to bear or
beget a child.”345 Subsequently, the C ourt held in Roe v. Wade that the
right to privacy “encompass[es] a woman’s decision whether or not to
terminate her pregnancy.”346
Griswold, Eisenstadt, and Roe all protect against what I call “decisional
interference”—that is, governmental interference with people’s deci
sions regarding certain matters in their lives. These cases extend to de
cisions relating to sex and sexuality, as well as parents’ child-rearing de
cisions.347
Many commentators have argued that the language of privacy is in
appropriate for decisional-interference cases because they primarily
concern a harm to autonomy and liberty, not to privacy7. T hus Lau
rence Tribe argues that the central issue in Roe v. Wade is “not privacy7,
but autonomy7.”348 Similarly7, Louis Henldn contends that the Supreme
C ourt’s substantive due process right-to-privacv cases are about pro
tecting a “zone o f autonomy7, o f presumptive immunity to govern
mental regulation,” not about protecting privacy.349 W hat relationship
does decisional interference have to the other forms of privacy in the
taxonomy?
T h e decisional-interference cases are deeply connected to informa
tion privacy. Legal scholar Neil Richards notes that the “canonical ‘de
cisional’ privacy case law has long had a substantial informational com
ponent.” Griswold “relied extensively upon several lines o f cases now
commonly considered as falling on the information privacy side o f the
informational/decisional binary o f information privacy scholars.”330 In
particular, the Supreme C ourt explained in Whalen v. Roe that the con
stitutionally protected “zone of privacy” extends n o t only to the “in
terest in independence in making certain kinds o f im portant decisions”
but also to the “individual interest in avoiding disclosure o f personal
matters.”331 T his gave rise to the constitutional right to information
privacy, which, although not developed further by the Supreme Court,
has been recognized by most federal circuit courts.332 Whalen involved
A Taxonomy o f Privacy 167
F or quite a long time, the concept o f privacy has been a source o f cha
grin. Despite the profound importance and increasing prevalence o f pri
vacy issues, efforts to conceptualize privacy have been plagued by a curse
o f difficulties. Attempts to locate a common denom inator for the mani
fold things that constitute privacy have proven unsatisfying. Concep
tions that attem pt to locate the core o r essence o f privacy have been too
broad o r too narrow. Despite many good insights, the philosophical
discourse about privacy has left a sense o f emptiness and dissatisfaction.
Yet we need to conceptualize privacy because it affects the way we
craft legal solutions to particular problems. Even if we eschew attem pts
to conceptualize privacy, we are relying in part on im plicit understand
ings o f privacy whenever we discuss it. Judges, legislators, policy
makers, and com m entators all have some notion o f privacy in mind
when they address privacy issues. T h e way we conceptualize privacy is
o f param ount im portance for the information age because we are beset
with a num ber o f complex privacy problems that cause great disruption
to num erous im portant activities o f high social value.
T herefore, I have proposed a new way to conceptualize privacy.
U nder m y conception, we should understand privacy as a set o f protec
tions against a plurality o f distinct but related problems. T hese problems
are no t related by a com m on denom inator o r core elem ent. Instead,
each problem has elem ents in comm on with others, yet no t necessarily
172 P r i v a c y : A N e w U n d e r s t a n d i n g
the same elem ent— they share family resemblances with each other.
W e label the whole cluster “privacy,” but this term is useful primarily
as a shorthand way o f describing the cluster. Beyond that, it is more
fruitful to discuss and analyze each type o f problem specifically.
I am n o t arguing that we m ust always avoid referring to privacy in
the abstract; som etim es it is m ore efficient to do so. Rather, such ab
stract references to privacy often fail to be useful when we need to con
ceptualize privacy to solve legal and policy' problems. By shifting the
focus to a plurality o f related problem s, we can better understand what
is at stake in particular situations. W e can better recognize each situa
tion for what it is rather than conflating it with o th er situations.
I proposed a framework of four general types o f privacy problem s
with sixteen different subgroups. First, information collection consists o f
problem s that arise in the gathering o f inform ation about individuals. I
identified two distinct forms o f inform ation collection: surveillance
and interrogation. A second group o f problem s, information processing,
involves difficulties th at arise in the storage, usage, and analysis o f per
sonal data. I listed five types o f inform ation processing: aggregation,
identification, insecurity, secondary use, and exclusion. T h ird , informa
tion dissemination involves the transfer and publicizing o f personal data.
I described seven form s o f inform ation dissemination: breach o f confi
dentiality, disclosure, exposure, increased accessibility, blackmail, ap
propriation, and distortion. Finally, invasion involves interference with
one’s personal life. I identified two forms: intrusion and decisional in
terference.
I do no t base this framework on a top-dow n norm ative vision about
w hat I believe privacy ought to be. Rather, it is a bottom -up descriptive
account o f the kinds o f privacy problem s that are addressed in various
discussions about privacy, laws, cases, constitutions, guidelines, and
other sources. T h e problem s identified in the taxonom y are not eternal
and unchanging. Reasonable people may certainly disagree about the
inclusion o f certain problem s and the exclusion o f others. Even with
such disagreem ent, the prim ary function o f my approach to conceptu
alizing privacy has been to shift the kind o f theoretical discussions we
have about privacy. Instead o f looking for a unified conception o f pri
vacy, we can free ourselves to focus on the various problems. Shifting
the focus in this way will provide greater clarity and guidance in ad
dressing privacy issues.
Privacy: A New Understanding 173
T h e N a tu re o f Privacy Problem s
because they shape the social and political atm osphere in which people
live. In some cases, they have direct effects on individuals because they
can result in chilling effects o r vulnerability harms. O ften, the aggran
dizem ent o f power by institutions does not arise out o f malicious aims,
but it nevertheless creates dangers such as drift in purposes and abuse.
Joel Reidenberg apdy notes, “[D]ata privacy is a societal value and a
requisite elem ent o f democracy. Society as a whole has an im portant
stake in the contours o f the protection of personal inform ation.”21
In a related manner, the Fourth Am endment’s requirem ent o f judi
cial oversight of governm ent searches does not protect only the specific
individuals being searched; it is a protection o f society as a whole
against excessive governm ent power. T h e Fourth A m endm ent is en
forced through the exclusionary rule, by which a criminal defendant
can exclude evidence obtained improperly from trial. If we view the
Fourth Am endm ent as protecting the privacy rights o f the defendant,
it is hard to justify why we should protect her privacy at the cost o f the
safety o f the rest o f the community. Instead, if we view the Fourth
Am endm ent as protecting privacy as a social value, we are enforcing
privacy rights because o f the larger value to the com m unity in ensuring
that the police follow appropriate procedures when conducting searches.
Priscilla Regan observes, “A public value o f privacy derives not only
from its protection o f the individual as an individual b u t also from its
usefulness as a restraint on the governm ent or on the use o f power.”22
T h e Fourth Am endm ent rectifies a set o f power imbalances; it aims to
provide a structural balance of power between the governm ent and
citizens.
Even when it appears that the law recognizes a problem , the law can
also falter in understanding its nature and effects. In other words, there
is a distinction between recognizing a problem and understanding a
problem. T h e law sometimes acknowledges the privacy problems in
volved in a given context but fails to effectively redress the harms caused
by the problems. For example, in the U.S. Privacy Act o f 1974, C on
gress sought to regulate the collection, processing, and dissemination o f
personal information by governm ent agencies.23 O n the surface, the act
embodies a pluralistic conception o f privacy that recognizes many of
180 P r i v a c y : A N ew U n d e r s t a n d i n g
[T]he governm ent m ust show that the dissemination o f the infor
m ation desired to be kept private would inflict specific and signif
icant harm on individuals, such as undue em barrassm ent o r ridi
cule, intim idation or harassment, or m isappropriation of sensitive
personal inform ation for the purposes o f assuming another’s
identity.
are so divergent that little can be done to bridge the gaps. T here is no
shared worldwide understanding o f privacy, they argue, just a num ber
o f localized notions. F or example, Professor James W hitm an argues
that American and European privacy law emerge from two very dis
tinct underlying conceptions of privacy: “[T]here are, on the two sides
o f the Adantic, two different cultures of privacy, which are hom e to
different intuitive sensibilities, and which have produced two signifi
cantly different laws o f privacy.” According to W hitm an, “American
privacy law is a body caught in the gravitational orbit o f liberty values,
while European law is caught in the orbit o f dignity.” Europeans have a
deeper concern for honor and dignity, whereas Americans have prized
liberty in the form of freedom from governm ent control. “Continental
jurists,” W hitm an observes, “have always tried to understand ‘privacy’
as a species o f personal honor.” W hitm an concludes that W arren and
Brandeis tried to im port “a continental-style o f privacy into American
law,” and that this was an “unsuccessful continental transplant.” Be
cause o f the difference between American and European conceptions,
W hitm an concludes that “there is little reason to suppose that Ameri
cans will be persuaded to think o f their world o f values in a European
way any tim e soon; American law simply does n o t endorse the general
norm o f personal dignity found in Europe.”33
M any com m entators have embraced W hitm an’s thesis because his
characterizations o f American and European society resonate at a gen
eral level. America and Europe certainly have created different legal
regimes to regulate privacy. T hrough the European U nion Data P ro
tection Directive, Europe regulates privacy with a comprehensive set
o f rules. T h e approach in the U nited States is “sectoral,” a patchwork
o f laws that protect privacy in certain areas, b u t w ith significant gaps
and omissions. Joel Reidenberg notes, “[T]he U nited States has re
sisted all calls for om nibus o r comprehensive legal rules for fair infor
m ation practice in the private sector. Legal rules have developed on an
ad hoc, targeted basis, while industry has elaborated voluntary norms
and practices for particular problem s.”34
It is erroneous, however, to view differences betw een the protection
o f privacy in different countries in too essentialist a m anner—as rooted
in fundam entally incom patible conceptions o f privacy. Divergences
between the ways different societies protect privacy do n o t necessarily
stem from conceptual differences about privacy. Comparative-law
186 P r i v a c y : A N e w U n d e r s t a n d i n g
D rug Testing
In Board o f Education v. Earls, a school district in Tecumseh, Oklahoma,
required all m iddle- and high-school students to undergo drug testing
before participating in any extracurricular activity. Some o f the stu
dents challenged the policy under the Fourth Am endm ent. T h e U.S.
Suprem e C o u rt recognized that drug testing involves a search under
the F ourth Am endm ent. Because of “special needs beyond the normal
need for law enforcem ent,” the C ourt concluded that the Fourth
A m endm ent’s w arrant and probable-cause requirem ents were imprac
tical for school searches.38 T herefore, the C o u rt proceeded to deter
m ine w hether the drug-testing policy was “reasonable” under the
F ourth Am endm ent, a determ ination that required balancing the pri
vacy interest against th e school’s interest in testing.
In analyzing the privacy interest, the C ourt viewed it in term s o f ex
posure and disclosure. F or example, the C ourt focused on the fact that
190 P r i v a c y : A N e w U n d e r s t a n d i n g
n o t m erely probe for drug use o r cause embarrassment but also teaches
and instructs. Justice Sandra Day O ’C onnor observed, dissenting in
Vem m ia School District v. Acton, where the C ourt upheld a drug-testing
program for student athletes:
data-m ining project called Total Inform ation Awareness under the
leadership o f Admiral John Poindexter. T h e program involved col
lecting extensive information about people, such as financial, educa
tional, health, and other data. T h e inform ation would then be analyzed
for behavior patterns to identify terrorists. According to Poindexter,
“T h e only way to d e te c t. . . terrorists is to look for patterns o f activity
that are based on observations from past terrorist attacks as well as es
timates about how terrorists will adapt to our measures to avoid detec
tion.”45 W h e n the program came to light, a public outcry erupted that
led to the demise o f the program when the U.S. Senate voted to deny it
funding. Nevertheless, m any com ponents of Total Inform ation Aware
ness continue in various governm ent agencies in a less systematic and
more clandestine fashion.46
Beyond Total Inform ation Awareness, the governm ent engages in a
num ber o f data-m ining program s— about 200 according to a 2004
governm ent report.47 O ne example is the M ulti-State A nti-Terrorism
Inform ation Exchange (MATRIX), a database o f personal inform a
tion used by various states.48 A nother is the N ational Security Ad
m inistration (NSA) data-m ining program on telephone records.
After Septem ber 11, the N SA obtained custom er records from sev
eral m ajor phone companies and analyzed them to identify potential
terrorists.49 T h e telephone-call database was reported to be the
“largest database ever assembled in the w orld.”50 T h e governm ent
has also been devising a series o f data-m ining program s for airline
passenger screening.51
Some scholars argue that data m ining does no t pose a significant
threat to privacy. M uch o f the inform ation involves relatively in
nocuous daily transactions and is n o t particularly sensitive o r revealing.
M oreover, Richard Posner argues:
Posner’s argum ent is one com m only made about the privacy of per
sonal inform ation in large databases. T h e data is stored and analyzed
by com puters. N o hum an m ight actually see the inform ation. T h e pri
m ary concern with data m ining, according to Posner, is that the infor
m ation m ight be used to blackmail people o r leaked in order to “ridi
cule or embarrass.”53
Posner focuses only on problem s o f inform ation dissem ination (dis
closure and blackmail), b u t data m ining also implicates several prob
lems o f inform ation collection and inform ation processing. Data
m ining often begins w ith the collection o f personal inform ation, usu
ally from various third parties that possess people’s data. U nder cur
ren t Suprem e C o u rt F o u rth A m endm ent jurisprudence, when the
governm ent gathers data from third parties, th ere is no Fourth
A m endm ent protection because people lack a “reasonable expectation
o f privacy” in inform ation exposed to others) As I argued extensively
in my book The D igital Person, the lack o f F ourth A m endm ent protec
tion o f third-party records results in the governm ent’s ability to access
an extensive am ount o f personal inform ation with m inim al lim itation
or oversight.54 M any scholars have referred to the collection o f infor
m ation as a form o f surveillance. “Dataveillance,” a term coined by
R oger C larke, refers to the “systemic use o f personal data systems in
the investigation or m onitoring of the actions or com m unications o f
one o r m ore persons.”55 C hristopher Slobogin has referred to the
gathering o f personal inform ation in business records as “transac
tional surveillance.”56 Surveillance can create chilling effects on im
po rtan t activities, especially ones essential for democracy, such as free
speech and free association.57
Surveillance, however, like disclosure, is just one o f the problem s
created by data m ining. Far too often, discussions o f governm ent data
m ining define the problem solely in term s o f surveillance o r disclo
sure. I have argued th at this way o f understanding the problem has
been em bodied by the m etaphor o f G eorge O rw ell’s novel Nineteen
Eighty-four. 58 In O rw ell’s novel, a totalitarian governm ent known as
Big B rother engages in repressive surveillance o f its citizens.59 T h e
problem , as understood by O rw ell’s m etaphor, is one o f surveillance,
which chills people’s behavior. Privacy is violated w hen people can no
longer conceal inform ation they w ant to hide. B ut data m ining is
problem atic even if no inform ation we w ant to hide is uncovered. An
194 P r i v a c y : A N e w U n d e r s t a n d i n g
evolving. In the future, new technologies and ways o f living will create
new privacy problem s and transform old ones. But w e need a frame
work, a way o f conceptualizing privacy that does n o t get bogged down
and befuddled by its manifold complexities. T h is book is the beginning
o f w hat I hope will be a m ore comprehensive and clear understanding
o f privacy.
Notes
(subjective) expectation of privacy” and “the expectation [must] be one that society
is prepared to recognize as ‘reasonable.’” Id. at 360-61 (Harlan, J., concurring).
12. Griswold v. Connecticut, 381 U.S. 479 (1965); Eisenstadt v. Baird, 405 U.S.
438 (1972); Roe v. Wade, 410 U.S. 113 (1973); Whalen v. Roe, 429 U.S. 589
(1977); Lawrence v. Texas, 539 U.S. 558 (2003).
13. See Alaska Const, art. I, §22 (“The right of the people to privacy is recog
nized and shall not be infringed”); Ariz. Const, art. II, §8 (“No person shall be dis
turbed in his private affairs, or his home invaded, without authority of law”); Cal.
Const, art. I, §1 (“All people are by their nature free and independent and have in
alienable rights. Among these are enjoying and defending life and liberty, ac
quiring, possessing, and protecting property, and pursuing and obtaining safety,
happiness, and privacy”); Fla. Const, art. I, §23 (“Every natural person has the
right to be let alone and free from governmental intrusion into his private life ex
cept as otherwise provided herein”); see also Haw. Const, art. I, §6; 111. Const, art.
I, §6; La. Const, art. I, §5; Mont. Const, art. II, §10; S.C. Const, art. I, §10; Wash.
Const, art. I, §7. For a further discussion of state constitutional protections of pri
vacy, see Timothy O. Lenz, “ ‘Rights Talk’About Privacy in State Courts,” 60 A l
bany Law Review 1613 (1997); Mark Silverstein, Note, “Privacy Rights in State
Constitutions: Models for Illinois?” 1989 University o f Illinois Law Review 215
(1989).
14. Brazilian Constitution art. 5; South African Constitution §14 (1996); Consti
tution of The Republic of Korea, art. 17, quoted in Electronic Privacy Information
Center & Privacy International, Privacy and Human Rights 288, 904, 917 (2005).
15. Although Canada’s Charter of Rights and Freedoms does not explicitly pro
tect a right to privacy, the Supreme Court of Canada has interpreted it to imply
such a right. Privacy and Human Rights, 323. The Constitutional Court in France
declared in 1995 that the French constitution has an implied right of privacy. Pri
vacy and Human Rights, 463-64. Germany’s Basic Law protects the privacy of com
munications, and the Federal Constitutional Court in 1983 recognized the protec
tion of a person’s “right to informational self-determination” under Basic Law
(Grundgesetz), art. 10 (1949). See Federal Constitutional Court, decision of Dec.
15, 1983, 1 BvR209, quoted in Privacy and Human Rights, 480. Although the word
“privacy” does not appear in Japan’s constitution, the Supreme Court has recog
nized a right to privacy since 1963. Privacy and Human Rights, 620. Likewise, even
though privacy is not mentioned in India’s constitution, the Supreme Court of
India has declared, “The right to privacy has since been widely accepted as implied
in our Constitution.” Distt. Registrar & Collector, Hyderabad & Anr v. Canara
Bank Etc, [2004] INSC 668, available at http://www.commonlii.org/in/cases/
INSC/2004/668.html.
16. Organization for Economic Cooperation and Development (OECD),
Guidelines on the Protection of Privacy and Transborder Flows of Personal Data
(1980).
17. Directive of the European Parliament and the Council of Europe on the
Protection of Individuals witl^ Regard to the Processing of Personal Data and on
the Free Movement of Such Data (1995).
18. Asia-Pacific Economic Cooperation (APEC), Privacy Framework, Nov.
2004.
19. William Prosser, “Privacy,” 48 California Law Review 383 (1960).
Notes to Pages 3 -5 201
20. Privacy Act, Pub. L. No. 93-579, 5 U.S.C. §552a; Family Educational Rights
and Privacy Act of 1974, Pub. L. No. 93-380,20 U.S.C. §§1221 note, 1232; Right
to Financial Privacy Act of 1978, Pub. L. No. 95-630, 12 U.S.C. §§3401-3422;
Privacy Protection Act of 1980, Pub. L. No. 96-440, 42 U.S.C. §2000aa; Elec
tronic Communications Privacy Act of 1986, Pub. L. No. 99-508 and Pub. L. No.
103-414, 18 U.S.C §§2510-2522, 2701-2709; Video Privacy Protection Act of
1988, Pub. L. No. 100-618, 18 U.S.C. §§2710-2711; Driver’s Privacy Protection
Act of 1994, Pub. L. No. 103-322, 18 U.S.C. §§2721-2725.
21. United Nations Universal Declaration of Human Rights, GA Res 217A(III),
UN Doc A/Res/810(1948).
22. European Convention of Human Rights art. 8 (1950).
23. Deborah Nelson, Pursuing Privacy in Cold War America xii-xiii (2002) (“Since
the end of the 1950s, the cry ‘the death of privacy’has rung out from a wide variety
of sources: journalism, television, film, literature, law enforcement, philosophy,
medical discourse, and more”). Abarrage of books warned of the growing threat to
privacy, including Morris Ernst and Alan Schwartz’s Privacy: The Right to Be Let
Alone (1962), Edward Long’s The Intruders (1967), Jerry Martin Rosenberg’s The
Death o f Privacy (1969), Arthur Miller’s The Assault on Privacy (1971), John Curtis
Raines’s Attack on Privacy (1974), and Robert Ellis Smith’s Privacy: How to Protect
What's Left o f It (1979). A number of books in Britain and Germany in the 1970s
likewise examined the issue. Bennett, Regulating Privacy, 46-57 (citing and dis
cussing the books).
24. Vance Packard, The Naked Society 12 (1964).
25. Myron Brenton, The Privacy Invaders 21,225 (1964).
26. Westin, Privacy and Freedom, 3.
27. Bruno Bettelheim, “The Right to Privacy Is a Myth,” Saturday Evening Post,
July 27, 1968, at 8.
28. Thomas Nagel, “The Shredding of Public Privacy,” Times Literary Supple
ment, Aug. 14, 1998, at 15.
29. See, e.g., Roger Rosenblatt, “Who Killed Privacy?” New York Times Maga
zine, Jan. 31, 1994; Robert O’Harrow, Jr., “Privacy Eroding, Bit by Byte,” Wash
ington Post, Oct. 15, 2004, at El; Craig Mullins, “Data Privacy Policies,”
DBAzine.com Online, Mar. 4, 2006, http://www.dbazine.com/blogs/blog-cm/
craigmullins/blogentry.2006-03-04.7587002706 (“Our privacy is evaporating”);
Jonathan Turley, “ ‘Big Brother’ Bush and Connecting the Data Dots,” Los Angeles
Times, June 24, 2006 (“Privacy is dying in America”); Stephen J. Kobrin, “With
Technology Growing, Our Privacy Is Shrinking,” Philadelphia Inquirer, Jan. 3, 2001
(“Privacy is threatened by the digital age”); Bob Sullivan, “Privacy Lost: Privacy
Under Attack, but Does Anybody Care?” MSNBC, Oct. 17, 2006, http://www
.msnbc.msn.com/id/15221095/ (noting that many say that privacy is “vanishing”
and “slipping away”); Alan Stafford, “Privacy in Peril,” PC World, Sept. 30, 2005;
Joyce Slaton, “Homeland Insecurity: Is Your Privacy in Danger?” SF Gate, Dec.
12, 2002, available at http://www.sfgate.com/cgi-bin/article.cgi?file=/gate/archive/
2002/12/12/csea.DTL; Jennifer Granick, “Computer Privacy in Distress,” Wired
News, Jan. 17, 2007, available at http://www.wired.com/news/columns/0,72510-0
.html.
30. Simson Garfinkel, Database Nation: The Death o f Privacy in the 21st Century
(2001); Charles Sykes, The End o f Privacy (1999); Reg Whitaker, The End o f Privacy
202 Notes to Pages 5-9
(2000); Jeffrey Rosen, The Unwanted Gaze: The Destruction o f Privacy in America
( 2000) .
31. Nelson, Pursuing Privacy, xii.
32. Franzen, How to Be Alone, 40.
33. Eric Goldman, “The PrivacyHoax,” Forbes, Oct. 14, 2002.
34. Calvin C. Gotlieb, “Privacy: AConcept Whose Time Has Come and Gone,”in
Computers, Surveillance, and Privacy 156,156 (David Lyon &Elia Zuriek eds. 1996).
35. Richard A. Epstein, “The Legal Regulation of Genetic Discrimination: Old
Responses to NewTechnology,” 74 Boston University Law Review 1,12 (1994).
36. Richard Posner, The Economics o f Justice 271 (1981).
37. Fred H. Cate, Privacy in the Information Age 29 (1997).
38. Amitai Etzioni, “The Myth of Privacy Invasion,” Christian Science Monitor,
Sept. 10,2001, at 9.
39. See Florida Star v. B.J.F., 491 U.S. 524, 527 (1989).
40. See Dietemann v. Time, Inc., 449 F.2d 245, 246 (9th Cir. 1971).
41. “Beyond X-ray Vision: Can Big Brother See Right Through Your Clothes?”
Discover, July 2002, at 24; Guy Gugliotta, “Tech Companies See Market for Detec
tion: Security Techniques Offer New Precision,” Washington Post, Sept. 28, 2001,
at A8.
42. See Kyllov. United States, 533 U.S. 27,29 (2001).
43. See Standards for PrivacyofIndividuallyIdentifiable Health Information, 65
Fed. Reg. 82,461, 82,467 (Dec. 28, 2000) (codified at 45 C.F.R. pts. 160 & 164).
44. See In re GeoCities, 127 F.T.C. 94,97-98 (1999).
45. Jorge Luis Borges, “Everything and Nothing,” in Labyrinths 248, 249
(Donald A. Yates &James E. Irby eds., J.E.I. trans., 1964).
46. J. Thomas McCarthy, The Rights o fPublicity and Privacy §5.59 (2d ed. 2005).
47. Lillian R. BeVier, “Information About Individuals in the Hands of Govern
ment: Some Reflections on Mechanisms for Privacy Protection,” 4 William and
Mary Bill o fRightsJournal 455,458 (1995) (footnote omitted).
48. Tom Gerety, “Redefining Privacy,” 12 Harvard Civil Rights-Civil Liberties
Law Review 233,234 (1977); Kim Lane Scheppele, Legal Secrets 184— 85 (1988).
49. JudithJarvis Thomson, “The Right to Privacy,” in Philosophical Dimensions o f
Privacy: A n Anthology 272, 272 (Ferdinand David Schoeman ed., 1984).
50. Report of the Committee on Privacy (HMSO 1972) Cmnd 5012 (Sir Ken
neth Younger, Chairman), at ^658, 665.
51. See, e.g., Joel R. Reidenberg, “Privacy in the Information Economy: A
Fortress or Frontier for Individual Rights?” 44 Federal Communications Law Journal
195,208 (1992) (“The American legal systemdoes not contain a comprehensive set
of privacy rights or principles that collectively address the acquisition, storage,
transmission, use and disclosure of personal information within the business com
munity”); Paul M. Schwartz, “Privacy and Democracy in Cyberspace,” 52 Vander
bilt Law Review 1609, 1611 (1999) (“At present, however, no successful standards,
legal or otherwise, exist for limiting the collection and utilization of personal data
in cyberspace”).
52. National Commission on Terrorist Attacks upon the U.S., The 9/11 Commis
sion Report 394 (2004).
53. Ludwig Wittgenstein, Philosophical Investigations §§66-67 (G.E.M.
Anscombe trans., 1958).
Notes to Pages 9 -1 5 203
54. SeeJohn Dewey, Logic: The Theory o f Inquiry (1938), in 12 The Later Works o f
John Dewey 1, 106-10 (Jo Ann Boydston ed., 1988).
7. See, e.g., Richard C. Turkington, “Legacy of the Warren and Brandeis Ar
ticle: The Emerging Unencumbered Constitutional Right to Informational Pri
vacy,” 10Northern Illinois University Law Review 479,481-82 (1990) (observing that
the article “has acquired legendary status in the realm of legal scholarship” and
“has had as much impact on the development of law as any single publication in
legal periodicals”).
8. Warren & Brandeis, “Right to Privacy,” 195.
9. Robert E. Mensel, “ ‘Kodakers Lying in Wait’: Amateur Photography and
the Right to Privacy in New York, 1885-1915,” 43 American Quarterly 24, 28
(1991).
10. Warren & Brandeis, “Right to Privacy,” 196.
11. Robert Ellis Smith, Ben Franklin's Web Site: Privacy and Curiosity from Ply
mouth Rock to the Internet 108-09 (2000); Gini Graham Scott, M ind Your Own Busi
ness: The Battle fo r Personal Privacy 37-38 (1995).
12. Warren & Brandeis, “Right to Privacy,” 197, 193. Cooley’s treatise was
originally published in 1880, and a second edition was published in 1888. See
Thomas M. Cooley, Law o f Torts (2d ed. 1888).
13. Warren & Brandeis, “Right to Privacy,” 205, 200, 197, 198, 207.
14. DanielJ. Solove, Marc Rotenberg, &Paul M. Schwartz, Information Privacy
Law 31 (2d ed. 2006).
15. David W. Leebron, “The Right to Privacy’s Place in the Intellectual His
tory of Tort Law,” 41 Case Western Reseive Law Review 769, 807-09 (1991).
16. Union Pac. Ry. Co. v. Botsford, 141 U.S. 250, 251 (1891).
17. Olmstead v. United States, 277 U.S. 438,466 (1928).
18. Id. at 478 (Brandeis, J., dissenting).
19. Katz v. United States, 389 U.S. 347 (1967).
20. See, e.g., Eisenstadt v. Baird, 405 U.S. 438, 454 n.10 (1972); Stanley v.
Georgia, 394 U.S. 557, 564 (1969); Katz, 389 U.S. at 350.
21. Time, Inc. v. Hill, 385 U.S. 374,413 (1967) (Fortas, J., dissenting).
22. Doe v. Bolton, 410 U.S. 179, 213 (1973) (Douglas, J., concurring) (citations
omitted) (quoting Kent v. Dulles, 357 U.S. 116, 126 (1958)).
23. Gavison, “Privacy and the Limits of Law,” 438.
24. See, e.g., O’Brien, Privacy, Law, and Public Policy, 5; Gerety, “Redefining
Privacy,” 263.
25. Anita L. Allen, Uneasy Access: Privacyfo r Women in a Free Society 7 (1988).
26. Ferdinand Schoeman, “Privacy: Philosophical Dimensions of the Litera
ture,” in Philosophical Dimensions o f Privacy: A n Anthology 1, 14 (Ferdinand David
Schoeman ed., 1984).
27. See Bloustein, “Privacy as an Aspect of Human Dignity,” 970.
28. E. L. Godkin, “Libel and Its Legal Remedy,” 12Journal o f Social Science 69,
80 (1880).
29. E. L. Godkin, “The Rights of the Citizen, IV—To His Own Reputation,”
Scribner's Magazine, July-Dee. 1890, at 65. For a discussion of this article’s influ
ence on Warren and Brandeis, see Richard C. Turkington & Anita L. Allen, Pri
vacy Law: Cases and Materials 40-41 (1999).
30. Sissela Bok, Secrets: On the Ethics o f Concealment and Revelation 10-11 (1983).
31. Hyman Gross, “The Concept of Privacy,” 43 New York University Law Re
view 34, 35-36 (1967) (emphasis removed).
Notes to Pages 19-24 205
32. Ernest Van Den Haag, “On Privacy,” in Nomos X III: Privacy 149, 149
(J. Roland Pennock &J. W. Chapman eds., 1971).
33. Allen, Uneasy Access, 10. For additional proponents of limited-access concep
tions, see Edward Shils, “Privacy: Its Constitution and Vicissitudes,” 31 Law and
Contemporary Problems 281, 281 (1966) (privacy “is constituted by the absence of in
teraction or communication or perception within contexts in which such interaction,
communication, or perception is practicable”); Adam Carlyle Breckenridge, The
Right to Privacy 1 (1970) (“Privacy, in my view, is the rightful claimof the individual
to determine the extent to which he wishes to share of himselfwith others”).
34. O’Brien, Privacy, Law, and Public Policy, 15, 16.
35. Gavison, “Privacy and the Limits of Law,” 423,426, 433.
36. Id. at 433.
37. Gavison openly recognizes that her theory excludes these things. See id.
at 436.
38. Id.
39. Richard A. Posner, TheEconomics o f Justice 272-73 (1981).
. 40. Richard A^Posner, Economic Analysis o f Law 46 (5th ed. 1998).
41. Posner, Economics o f Justice, 234.
42. Id. at 271. Posner’s conception of privacy is infused with his own normative
assessment of privacy as a form of deception. According to Posner, the “economist
sees a parallel to the efforts of sellers to conceal defects in their products.” Posner,
Economic Analysis o f Law, 46.
43. Sidney M. Jourard, “Some Psychological Aspects of Privacy,” 31 Law and
Contemporary Problems 307, 307 (1966).
44. Griswold v. Connecticut, 381 U.S. 479 (1965); Roe v. Wade, 410 U.S. 113
(1973).
45. 429 U.S. 589, 599-600 (1977).
46. WilliamJ. Stuntz, “Privacy’s Problemand the Lawof Criminal Procedure,”
93 Michigan Law Review 1016, 1022 (1995).
47. Katz v. United States, 389 U.S. 347, 351 (1967).
48. 486 U.S. 35,40(1988).
49. 488 U.S. 445, 450-51 (1989); see also California v. Ciraolo, 476 U.S. 207
(1986) (holding that the Fourth Amendment did not apply to surveillance of prop
erty from airplane flying at 1,000 feet); Dow Chem. Co. v. United States, 476 U.S.
227 (1986) (holding that the Fourth Amendment did not apply to aerial surveil
lance of property with high-tech camera that could enlarge objects so that objects
half an inch in diameter could be seen).
50. EdwardJ. Bloustein, Individual and Group Privacy 123-86 (1978).
51. See, e.g., Arnold Simmel, “Privacy Is Not an Isolated Freedom,” in Nomos
X III: Privacy 71, 81 (J. Roland Pennock &J. W. Chapman eds., 1971).
52. See Shils, “Privacy,” 305.
53. Kenneth L. Karst, “ ‘The Files’: Legal Controls over the Accuracy and Ac
cessibility of Stored Personal Data,” 31 Law and Contemporary Problems 342, 344
(1966).
54. Amitai Etzioni, The Lim its o f Privacy 196 (1999).
55. Judith Wagner DeCew, In Pursuit o f Privacy: Law, Ethics, and the Rise ofTech
nology 48 (1997).
56. Inness, Privacy, Intimacy, and Isolation, 6.
206 Notes to Pages 24-27
57. Stanley I. Benn, “Privacy, Freedom, and Respect for Persons,” in Nornos
XIII: Privacy 2 (J. Roland Pennock &J.W. Chapman eds., 1971).
58. Alan Westin, Privacy and Freedom 1 (1967).
59. See, e.g., Breckenridge, Right to Privacy, 1(noting that privacy is “the in
dividual’s right to control dissemination of information about himself”); Execu
tive Office of the President, Office of Science and Technology, Privacy and Be
havioral Research 2 (Washington, D.C., G.P.O. 1967) (“The right to privacy is the
right of the individual to decide for himself how much he will share with others
his thoughts, his feelings, and the facts of his personal life”); Randall P. Ben-
zanson, “The Right to Privacy Revisited: Privacy, News, and Social Change,
1890-1990,” 80 California Law Review 1133, 1135 (1992) (“I will advance a con
cept of privacy based on the individual’s control of information”); Oscar M.
Ruebhausen & Orville G. Brim, Jr., “Privacy and Behavioral Research,” 65 Co
lumbia Law Review 1184, 1189 (1965) (“The essence of privacy is no more, and
certainly no less, than the freedom of the individual to pick and choose for him
self the time and circumstances under which, and most importantly, the extent to
which, his attitudes, beliefs, behavior and opinions are to be shared with or with
held fromothers”); Ian Goldberg, Austin Hill, &AdamShostack, “Trust, Ethics,
and Privacy,” 81 Boston University Law Review 407, 418 (2001) (“We build our
own definition of privacy on what we consider the most elegant definition, ‘in
formational self-determination,’ which refers to a person’s ability to control the
flow of his own personal information”). Anne Wells Branscomb focuses almost
exclusively on the importance of control over information for privacy. See Anne
Wells Branscomb, Who Owns Information? From Privacy to Public Access (1994).
60. Miller, Assault on Privacy, 25.
61. Fried, “Privacy,” 482-83.
62. President Clinton’s Information InfrastructureTask Force (HTF), Principles
for Providing and Using Personal Information 5 (1995).
63. United States Dep’t of Justice v. Reporters Comm, for Freedom of the
Press, 489 U.S. 749, 763 (1989).
64. Schoeman, “Privacy,” 3.
65. Parker, “Definition of Privacy,” 280.
66. Richard S. Murphy, “Property Rights in Personal Information: An Eco
nomic Defense ofPrivacy,” 84 Georgetown Law Journal 2381,2383 (1996).
67. Westin, Privacy and Freedom, 324.
68. According to the Restatement of Torts, “One who appropriates to his own
use or benefit the name or likeness of another is subject to liability to the other for
invasion of his privacy.” Restatement (Second) of Torts §652C (1977).
69.John Locke, Second Treatise of Government §27, at 19 (1980) (1690).
70. SeeJames Boyle, Shamans, Software, and Spleens: Law and the Construction of
the Information Society 54 (1996).
71. 17 U.S.C. §102(a) (1994).
72. Shils, “Privacy,” 290.
73. Henry James, The Portrait o f a Lady 253 (Geoffrey Moore ed., Penguin
Books 1986) (1881).
74. Jerry Kang, “Information Privacyin Cyberspace Transactions,” 50 Stanford
Law Review 1193, 1202, 1246 (1998).
75. Miller, Assault on Privacy, 213.
Notes to Pages 27-31 207
3. Reconstructing Privacy
1. LudwigWittgenstein, Philosophical Investigations §§91,43 (G. E. M. Anscombe
trans., 1958). After publishing his highly influential Tractatus Logico-philosopbicus in
Notes to Pages 4 2 -4 6 209
1921, ’Wittgenstein disappeared from the philosophical scene for over a decade.
See Ludwig Wittgenstein, Tractatus Logico-philosophicus (D. F. Pears & B. F. McGui-
ness trans., 1961). When he returned, he had substantially altered his views, recog
nizing that he had made “grave mistakes” in Tractatus. See Wittgenstein, Philosoph
ical Investigations, vi. Because Wittgenstein’s thinking changed dramatically during
his career, Tractatus is often referred to as “early” Wittgenstein, and Philosophical
Investigations, along with other works such as On Certainty, is referred to as “late”
Wittgenstein.
2. Wittgenstein, Philosophical Investigations, §§65, 66, 67. Wittgenstein uses
the term “language-games” to describe the activities involving language. Id. at §7.
Wittgenstein uses “games” as a metaphor to describe language as an active en
deavor such as playing chess, tennis, or a card game. Wittgenstein thus sees lan
guage not as an abstract system of signs, but as a functioning aspect of our daily
lives, as something we do, as a “form of life.” Id. at §19. There are a “multiplicity”
of language games, such as giving orders, describing appearances, reporting an
event, speculating, singing, and telling a joke. See id. at §23. For more background
on Wittgenstein’s notion of familyresemblances, see P.M. S. Hacker, Insight and Il
lusion: Themes in the Philosophy o f Wittgenstein 131-34 (1986); Hanna Feinchel
Pitkin, Wittgenstein and Justice: On the Significance o f Ludwig Wittgenstein fo r Social
and Political Thought 63-65 (1972).
3. Legal scholar Steven Winter develops a related view of conceptualization.
He argues, “On the standard view, categories are descriptive, definitional, and
rigidly bounded. The empirical evidence, in contrast, presents a picture of catego
rization as an imaginative and dynamic process that is flexible in application and
elastic in scope.” Steven L. Winter, A Clearing in the Forest: Law, Life, and M ind 69
(2001). Winter contends that categories are “radial”; they consist of a “central
model” or paradigm example and related extensions radiating outward. Id. at 71.
These extensions, “though related to the central case in some fashion, nevertheless
cannot be generated by rule.” Id.
4. Wittgenstein, Philosophical Investigations, §§68-69,499. Wlien describing the
boundaries of categories, Wittgenstein uses the terms “blurred edges” and “indis
tinct picture.” Id. at §71; see also Winter, Clearing in the Forest, 100-01 (contending
that categories are not static entities but are tools created for particular purposes).
5.Judith Genova, Wittgenstein: A Way o f Seeing 44 (1995).
6. Stanley Cavell, “Excursus on Wittgenstein’s Vision of Language,” in The
New Wittgenstein 35 (Alice Crary & Rupert Read eds., 2000).
7. Genova, Wittgenstein, 35.
8. Richard Bruyer, “Privacy: AReviewand Critique of the Literature,” 43 A l
berta Law Review 553, 576 (2006).
9. Raymond Wacks, Law, Morality, and the Private Domain 222 (2000).
10. Cass R. Sunstein, Legal Reasoning and Political Conflict 61 (1996).
11. For more background about the origins of pragmatism, see Richard Shus-
terman, Practicing Philosophy: Pragmatism and the Philosophical Life (1997); John J.
Stuhr, Genealogical Pragmatism: Philosophy, Experience, and Community (1997);
Michael Sullivan & Daniel J. Solove, “Can Pragmatism Be Radical? Richard
Posner and Legal Pragmatism,” 113 Yale Law Journal 687 (2003); Daniel J. Solove,
“The Darkest Domain: Deference, Judicial Review, and the Bill of Rights,” 84 Iowa
Law Review 941, 970-71 (1999).
210 Notes to Pages 46-51
12. See Richard A. Posner, Overcoming Law (1995); Richard Rorty, Consequences
o f Pragmatism: Essays, 1911-1980 (1982); Cornell West, Keeping Faith: Philosophy
and Race in America (1993).
13. WilliamJames, Pragmatism 25 (Prometheus Books 1991) (1907). Pragma
tists reject the viewof philosophy“as a purely theoretical quest for eternal truths or
knowledge of an ultimate and unchanging reality.” Pragmatism and Classical Amer
ican Philosophy: Essential Readings and Interpretive Essays 3 (JohnJ. Stuhr ed., 2000);
see alsoJohn Dewey, Logic: The Theory o f Inquiry (1938), in 12 The Later Works o f
John Dewey 1, 72 (Jo Ann Boydston ed., 1988).
14. Although there are many interesting affinities in the thought of Wittgen
stein and the pragmatists, there are many differences as well, and a complete ac
count of the similarities and differences is beyond the scope of this book. For some
interesting examinations of the relationship between pragmatic and Wittgen-
steinian thought, see Hilary Putnam, Pragmatism 27-56 (1995); Rorty, Consequences
o fPragmatism, 19-36; Shusterman, Practicing Philosophy, 17-64.
15. Dewey, Logic, 72.
16. John Dewey, Experience and Nature (1925), in 1 The Later Works o f John
Dewey 1, 67 (Jo Ann Boydston ed., 1988).
17. Robert C. Post, “The Social Foundations of Privacy: Community and Self
in the Common LawTort,” 77 California Law Review 957,980, 981 (1989).
18. Serge Gutwirth, Privacy and the Information Age 34 (Raf Casert trans.,
2002) .
19. Gary T. Marx, “Murky Conceptual Waters: The Public and the Private,” 3
Ethics and Information Technology 157 (2001).
20. Helen Nissenbaum, “Privacy as Contextual Integrity,” 79 Washington Law
Rrview 119, 137-38, 154-55 (2004).'
21. Anita L. Allen, Why Privacy Isn't Everything. Feminist Reflections on Personal
Accountability 2 , 29-30 (2003).
22. See Dewey, Logic, 76, 111-12.
23. John Dewey, “In Reply to Some Criticisms” (1930), in 5 The Later Works of
John Dewey 210, 216 (Jo Ann Boydston ed., 1984).
24. James, Pragmatism, 33.
25. See Dewey, Logic, 16.
26. SeeJohn Dewey, “What Pragmatism Means by Practical” (1908), in 4 The
Middle Works o f John Dewey 98, 100 (Jo Ann Boydston ed., 1977).
27.John Dewey, “The Quest for Certainty” (1929) in 4 The Later Works o fJohn
Dewey 16, 21 (Jo Ann Boydston ed., 1988).
28. Georges Duby, “Foreword” to A History o f Private Life, vol. 1, From Pagan
Rome to Byzantium viii (Paul Veyne ed. & Arthur Goldhammer trans., 1987).
29. United Nations Universal Declaration of Human Rights, GA Res
217A(III), UN Doc A/Res/810 (1948) (“No one shall be subjected to arbitrary in
terference with his privacy, family, home or correspondence, nor to attacks upon
his honor and reputation”).
30. Jurgen Habermas, The Structural Transformation o f the Public Sphere 47-48
(1991).
31. Georges Duby, “Private Power, Public Power,” in A History o f Private Life,
vol. 2, Revelations o f the Medieval World 7 (Georges Duby ed. & Arthur Gold-
hammer trans., 1988).
Notes to Pages 51-53 211
49. Simon Goldhill, Love, Sex, and Tragedy: Hera the Ancient World Shapes Our
Lives 15, 19 (2004).
50. Witold Rybczynski, Home: A Short History o f an Idea 28, 30 (1986). Of
course, practices in these matters differed due to the influence of the customs of
each specific society, as well as religious beliefs and the social status of individuals.
51. Goldhill, Lave, Sex, and Tragedy, 112, 113; see also Peter Brown, The Body
and Society: Men, Women, and Sexual Renunciation in Early Christianity 438 (1988)
(“No longer were the body’s taut musculature and its refined poise, signs of the
athlete and the potential warrior, put on display, as marks of upper-class status”).
52. Stone, “Public and the Private,” 229 (1991).
53. Philippe Aries, “Introduction” to A History o f Private Life, vol. 3, 4; Roger
Chartier, “Forms of Privatization: Introduction,” in A History o f Private Life, vol. 3,
163-64.
54. See Aries, “Introduction,” 5.
55. Sennett, Flesh and Stone, 343.
56. Stone, “Public and the Private,” 228.
57. Id. at 244.
58. Barrington Moore, Jr., Privacy: Studies in Social and Cultural History 146
(1984). Historian Lewis Mumford observes, “In the castles of the thirteenth cen
tury, one notes the existence of a private bedroom for the noble owners; and one
also finds, not far from it, perched over the moat, a private toilet: the first hint of
the nineteenth-century luxury of a private toilet for every family.” Lewis Mum-
ford, The City in History 285 (1961).
59. John Stuart Mill, On Liberty 11 (David Spitz ed., 1975) (“Over himself, over
his own body and mind, the individual is sovereign”).
60. Jacques Gelis, “Forms of Privatization: The Child: From Anonymity to In
dividuality,” in A History o f Private Life, vol. 3, 310, 316.
61. Restatement (Second) of Torts §652D cmt. b.
62. Peck v. United Kingdom, [2003] ECHR 44 (2003), at *057.
63. B. Moore, Privacy, 256.
64. Mumford, City in History, 286.
65. Laura Gowing, Domestic Dangers: Women, Words, and Sex in Early Modem
London 70 (1996); Anthony Giddens, Modernity and Self-Identity: S e lf and Society in
the Late M odem Age 163 (1991).
66. Richard F. Hixson, Privacy in a Public Society: Human Rights in Conflict 11
(1987); Flaherty, Privacy in Colonial New England, 79. “The small size of colonial
dwellings allowed children quite early in their lives to hear and see sexual activity
among adults. Although curtains might isolate the parental bed, all family mem
bers commonly slept in the same room, especially during winters, where a single
fireplace provided the heat.”John D’Emilio & Estelle B. Freedman, Intim ate M at
ters: A History o f Sexuality in America 17 (2d ed. 1997).
67. Richard Godbeer, Sexual Revolution in Early America 93 (2002)..
68. Thomas Nagel, Concealment and Exposure and Other Essays 16 (2002).
69. B. Moore, Privacy, 66.
70. Gowing, Domestic Dangers, 70-74, 192; Lawrence Stone, The Family, Sex,
and Marriage in England, 1500-1800, 324 (Penguin Books ed. 1990).
71. D’Emilio & Freedman, Intim ate Matters, 17; Flaherty, Privacy in Colonial
New England, 92.
Notes to Pages 55-58 213
72. Flaherty, Privacy in Colonial New England, 93-94; Godbeer, Sexual Revolu
tion, 867-88; D’Emilio & Freedman, Intim ate Matters, 11 (“In Puritan theology,
the entire community had responsibility for upholding morality”).
73. Godbeer, Sexual Revolution, 100. “In New England, public confession and
repentance both restored the individual to the congregation and at the same time
confirmed the propriety of sexual rules.” D’Emilio & Freedman, Intim ate M at
ters, 27.
74. Godbeer, Sexual Revolution, 100.
75. Id. at 236, 300, 301.
76. “Sexual access to other persons is subject to some limitations in every
known human society. There may possibly be a desire, which cannot always be
gratified, to keep the human body inviolate, to prohibit or prevent intrusion in
times of weakness or great emotional excitement, such as excretion or sexual inter
course.” B. Moore, Privacy, 13.
77. Lawrence M. Friedman, Crime and Punishment in American History 34
(1993); D’Emilio & Freedman, Intim ate Matters, 11.
78. Godbeer, Sexual Revolution, 102.
79. D’Emilio & Freedman, Intim ate Matters, 49-50; Godbeer, Sexual Revolu
tion, 228.
80. D’Emilio & Freedman, Intim ate Matters, 83.
81. Id. at 138.
82. Id. at 138, 160, 133-35,213.
83. Lawrence M. Friedman, “Name Robbers: Privacy, Blackmail, and Assorted
Matters in Legal History,” 30 H ofitra Law Review 1093, 1100 (2002).
84. D’Emilio & Freedman, Intim ate Matters, 160.
85. Rochelle Gurstein, The Repeal o f Reticence 91-145, 99 (1996).
86. Angus McLaren, Sexual Blackmail: A Modern History 274 (2002) (“At the be
ginning of the twentieth century the knowledge that a woman had had an abortion
or an out-of-wedlock child or that a man was a homosexual or had had an adul
terous affair could have disastrous consequences. By the 1990s a distinct shift had
obviously occurred. The majority of the population had come to accept the notion
that adults’ private, consensual sexual acts should be left alone”).
87. D’Emilio & Freedman, Intim ate Matters, 242-43.
88. 381 U.S. 479,485-86 (1965).
89. Lawrence M. Friedman, Private Lives: Family, Individuals, and the Law 173
(2004).
90. Lawrence v. Texas, 539 U.S. 558, 578 (2003).
91. Friedman, Private Lives, 94-95.
92. Goldhill, Love, Sex, and Tragedy, 99.
93. Argentine Constitution art. 18-19 (1994); Constitution of Finland §10;
Constitution of Greece art. 9 (1975); Constitution of the Republic of Korea art. 16;
quoted in Electronic Privacy Information Center & Privacy International, Privacy
and Human Rights 212,449, 507, 917-18 (2005).
94. Hixson, Privacy in a Public Society, 13. In the eighteenth century, William
Blackstone declared that the law has “so particular and tender a regard to the im
munity of a man’s house that it stiles it his castle, and will never suffer it to be vio
lated with impunity.” 4 William Blackstone, Commentaries on the Laws o f England
223 (1769).
214 Notes to Pages 58-60
Histoiy o f Private Life, vol. 3, 225. The rise of the bourgeoisie made solitude more
widely available. SeeJoseph Bensman & Robert Lilienfeld, Between Public and Pri
vate: The Lost Boundaries o f the S e lf 31 (1979).
119. Stone, “Public and the Private,” 227, 232-34.
120. Mumford, City in History, 286, 243; Georges Duby, “Preface” to A History
o f Private Life , vol. 2, xii.
121. Gini Graham Scott, M ind Your Own Business: The Battle fo r Personal Privacy
32 (1995); Flaherty, Privacy in Colonial New England, 40.
122. Roger Chartier, “Figures of Modernity: The Practical Impact of Writing,”
in A History o f Private Life, vol. 3, 134.
123. See Philippe Braunstein, “Toward Intimacy: The Fourteenth and Fifteenth
Centuries,” in A Histoty o f Private Life, vol. 2, 538.
124. See Ranum, “Forms of Privatization,” 226-27.
125. Edward Shils, “Privacy: Its Constitution and Vicissitudes,” 31 Law and Con
tentporary Problems 281, 289 (1966).
126. Aries, “Introduction,” 1-2.
127. Hareven, “Home and the Family,” 259.
128. Mexican Constitution, art. 16 (amended 1996), quoted in Jorge A. Vagas,
“Privacy Rights Under Mexican Law: Emergence and Legal Configuration of a
Panoply of New Rights,” 27 Houston Journal o f International Law 73, 89 (2004);
Constitution of the Republic of Chile art. 19 (1980); Germany, Basic Law
(Grundgesetz) art. 10 (1949); Constitution of Belgium art. 29 (1831, latest revision
1993); Czech Republic, Charter of Fundamental Rights and Freedoms art. 7
(1993); quoted in Privacy and Human Rights, 352,480, 270, 399.
129. Robert Ellis Smith, Ben Franklin's Web Site: Privacy and Curiosity from Ply
mouth Rock to the Internet 23-25 (2000).
130. Flaherty, Privacy in Colonial New England, 116-17.
131. Id. at 119, 122-23; Smith, Ben Franklin's Web Site, 50-51.
132. DavidJ. Seipp, The Right to Privacy in American History 11 (1978).
133. Smith, Ben Franklin's Web Site, 50.
134. Cynthia A. Kiemer, Scandal at Bizarre: Rumor and Reputation in Jefferson's
America 64 (2004).
135. Flaherty, Privacy in Colonial New England, 120, 121.
136. Smith, Ben Franklin's Web Site, 50-51.
137. Ex parte Jackson, 96 U.S. 727, 733 (1877).
138. See Seipp, Note, “Right to Privacy,” 1899.
139. Denis v. Leclerc, 1Martin (O.S.) 297, 313 (La. 1811). See also Seipp, Note,
“Right to Privacy,” 1899 (collecting examples).
140. Seipp, Note, “Right to Privacy,” 1900.
141.Joseph Story, 2 Commentaries on Equity Jurisprudence: A s Administered in En
gland and America 261,262,264 (3d ed., 1843). The desire for privacyof letters was
not unique to America. In 1790 in France, “the National Assembly in Paris de
clared the secret of letters to be inviolable, and the French penal code incorporated
this sweeping declaration.” Many other countries enacted laws to safeguard the
privacy of letters. Peter Gay, Schnitzler's Century: The M aking o f Middle-Class Cul
ture 1813-1914,258 (2002).
142. Seipp, Right to Privacy, 32 (quoting Western Union Rule 128).
143. Seipp, Note, “Right to Privacy,” 1901.
216 Notes to Pages 6 3 -7 0
190. George Orwell, N ineteen E ighty-four 3 (Plume ed. 2003) (originally pub
lished in 1949).
191. See Dewey, Experience and Nature., 9. Thinking is thus a “tool” for solving
problems. Michael Eldridge, Transform ing Experience: John Dewey's C ultural Instru
m entalism 4 (1998).
192. See, e.g., Dewey, Experience and N ature, 151; see alsoJohn Dewey, How We
T hin k (1910).
193. Dewey, Experience and N ature, 65-66.
194. Dewey, Logic, 106-10.
195. Dewey, Experience and N ature, 154.
196. Alan Dershowitz, R ights fro m Wrongs: A Secular Theory o f the O rigins o f
R ights 6-9(2004).
197. See Solove, D ig ita l Person, 13-55 (discussing Kafka’s The Trial, Orwell’s
N ineteen Eighty-four, and Huxley’s Brave N ew World).
198. Henry DavidThoreau, Walden, in Walden and O ther W ritings 113 (Barnes &
Noble Books 1993) (1854).
199. B. Moore, Privacy, 73.
200. Id. at 14.
14. Anita L. Allen, Uneasy Access: Privacy fo r W omen in a Free Society 51 (1988).
15. Westin, Privacy a n d Freedom , 37.
16. See id. at 33— 34.
17. Hannah Arendt, T he H u m a n Condition 38, 58 (1958).
18. Yao-Huai Lii, “Privacy and Data Privacy Issues in Contemporary China,” 7
Ethics and Inform ation Technology 7, 12 (2005).
19. Thomas More, U topia 73 (Clarence H. Miller trans., 2001) (originally pub
lished in 1516). For more examples of utopian literature’s distaste for privacy, see
Jean Marie Goulemot, “Literary Practices: Publicizing the Private,” in A H istory o f
P rivate L ife , vol. 3, Passions o f th e Renaissance 376-78 (Roger Chartier ed. & Arthur
Goldhammer trans., 1989).
20.Joseph Pulitzer, quoted in Brent Fisse &John Braithwaite, T he Im pact o f Pub
licity on Corporate O ffenders 1(1983).
21. Bruno Bettelheim, “The Right to Privacy Is a Myth,” Saturday E vening Post,
July 27, 1968, at 8.
22. James B. Rule, P rivate L ives a n d Public Surveillance: Social C ontrol in the Com
p u te rA g e 21-22 (1974).
23. Kent Walker, “The Costs of Privacy,” 25 H a rva rd J o u rn a l o f L aw a n d Public
Policy 87,91 (2002) (“The final consequence of increased privacyregulation of per
sonal information is the loss of trust”).
24. Francis Fukuyama, T rust: T he Social V irtues a n d the C reation o f Prosperity 26
(1995).
25. Steven L. Nock, T h e Costs o f Privacy: Surveillance an d R eputation in A m erica
124(1993).
26. Richard Posner, Economic A nalysis o f L aw 46 (5th ed. 1998); Richard A. Ep
stein, “The Legal Regulation of Genetic Discrimination: Old Responses to New
Technology,” 74 Boston U niversity L aw Review 1, 12 (1994).
27. For an overview of the feminist critique of privacy, see Patricia Boling, P ri
vacy a n d the Politics o f In tim a te L ife (1996); Judith Wagner DeCew, In P u rsu it o f P ri
vacy: L aw , Ethics, a n d th e R ise o f Technology 81— 94 (1997); Frances Olsen, “Feminist
Critiques of the Public/Private Distinction,” 10 C onstitutional C om m entary 327
(1993).
28. Reva B. Siegel, “ ‘The Rule of Love’: Wife Beating as Prerogative and Pri
vacy,” 105 Yale L aw J o u rn a l 2117, 2122 (1996).
29. Catharine MacKinnon, Toward a F em inist T heory o f the S ta te 194, 191 (1989).
30. Carole Pateman, “Feminist Critiques of the Public/Private Dichotomy,” in
T he D isorder o f W omen: Democracy, F em inism , a n d P olitical T heory 121 (1989).
31. Westin, Privacy a n d Freedom , 348.
32. Harry Kalven, Jr., “Privacy in Tort Law—Were Warren and Brandeis
Wrong?” 31 L aw a nd C ontem porary Problems 326, 329 (1966).
33. Rochelle Gurstein, T h e Repeal o f Reticence 61-90 (1996).
34. Eve Fairbanks, “The Porn Identity,” N ew Republic, Feb. 6,2006.
35. Fred H. Cate, Privacy in the Inform ation A g e 28-29 (1997).
36. Virginia Postrel, “No Telling,” Reason M agazine, June 1998, available at
http://www.reason.com/news/show/30656.html.
37. Eugene Volokh, “Freedom of Speech and Information Privacy: The Trou
bling Implications of a Right to Stop People from Speaking About You,” 52 Sta n
fo rd L aw R eview 1049, 1050-51, 1115 (2000).
220 Notes to Pages 83 -8 9
38. Solveig Singleton, “Privacy Versus the First Amendment: A Skeptical Ap
proach,” 11 Fordbam Intellectual Property. M edia a n d E n terta in m en t L aw Jou rna l 97,
152 (2000).
39. Diane L. Zimmerman, “Requiem for a Heavy-weight: A Farewell to Warren
and Brandeis’s Privacy Tort,” 68 C ornell L aw R eview 291, 341 (1983); see also
Kalven, “Privacy in Tort Law.”
40. WilliamJ. Stuntz, “Against Privacy and Transparency,” N ew Republic, Apr. 7,
2006.
41. Richard A. Posner, N o t a Suicide Pact: T he C onstitution in a T im e o f N a tio na l
Em ergency 141 (2006).
42. Ronald Dworkin, L ife's D om inion: A n A rg u m en t A b o u t A bortion, Euthanasia,
a n d In d ivid u a l Freedom 69-70 (1993).
43. Anita L. Allen, “Privacy,” in T he O xford Handbook o f Practical E thics 485, 492
(Hugh LaFollette ed., 2003).
44. Beate Rossler, T he Value o f P rivacy 69 (2005).
45. Anita Allen describes these theories as follows: “Kantian deontologists judge
privacy on the basis of whether it represents satisfaction of duties, principles, or
rules called for by due regard for the traits of personhood in virtue of which indi
viduals have a special dignity and ought to be accorded with respect.” Allen, Uneasy
Access, 39.
46. Stanley I. Benn, Privacy, “Freedom, and Respect for Persons,” in N o m o sX lII:
P rivacy 2, 26 (J. Roland Pennock &J. W. Chapman eds., 1971).
47. Julie C. Inness, Privacy, Intim acy, a n d Isolation 95 (1992).
48. Rossler, Value o f P rivacy, 1, 117.
49. Charles Fried, “Privacy,” 77 Yale L aw J o u rn a l 475, 477, 478 (1968).
50. Bonome v. Kaysen, 32 Media L. Rep. 1520 (Mass. Super. 2004).
51. Thomas Powers, “Can We Be Secure and Free?” 151 Public Interest 3, 5
(Spring 2003).
52. Luciano Floridi, “The Ontological Interpretation of Informational Privacy,”
7 E thics and Inform ation Technology 185 (2005).
53. See T. Alexander Aleinikoff, “Constitutional Law in the Age of Balancing,”
96 Yale L aw J o u rn a l 943 (1987).
54. James P. Nehf, “Incomparability and the Passive Virtues of Ad Hoc Privacy
Policy,” 76 U niversity o f Colorado L a w R eview 1, 35,41 (2005).
55. Margaret Jane Radin, Contested C om m odities 8-12 (1996).
56. Aleinikoff, “Constitutional Law,” 982.
57. Frank N. Coffin, “Judicial Balancing: The Protean Scales ofJustice,” 63 N ew
York U niversity L aw R eview 16, 25 (1988).
58. Thomas I. Emerson, T he System o f Freedom o f Expression 545, 549 (1970).
59. Richard F. Hixson, P rivacy in a Public Society: H u m a n R ights in C onflict 212
(1987).
60. See Daniel J. Solove, T he D ig ita l Person: Technology a n d Privacy in th e Inform a
tion A ge 93-97 (2004).
61. Samuel D. Warren & Louis D. Brandeis, “The Right to Privacy,” 4 H arvard
L aw R eview 193, 207 (1890).
62. Restatement (Second) of Torts §652(1) cmt. a.
63. Smith v. City of Artesia, 772 P.2d 373, 376 (N.M.Ct. App. 1989).
Notes to Pages 89 -9 6 221
5. A Taxonomy o f Privacy
1. In 1967, Alan Westin identified four “basic states of individual privacy”: (1)
solitude, (2) intimacy, (3) anonymity, and (4) reserve (“the creation of a psycholog
ical barrier against unwanted intrusion”). Alan F. Westin, Privacy and Freedom
31-32 (1967). These categories focus mostly on spatial distance and separateness
and fail to capture the many different dimensions of informational privacy. In
1992, Ken Gormley surveyed the lawof privacy. See generally Ken Gormley, “One
Hundred Years of Privacy,” 1992 Wisconsin Law Review 1335 (1992). His
categories—tort privacy, Fourth Amendment privacy, First Amendment privacy,
fundamental-decision privacy, and state constitutional privacy—are based on
different areas of law rather than on a more systematic conceptual account of pri
vacy. Id. at 1340. In 1998, Jerry Kang defined privacy as a union of three overlap
ping clusters of ideas: (1) physical space (“the extent to which an individual’s terri
torial solitude is shielded frominvasion byunwanted objects or signals”); (2) choice
(“an individual’s ability to make certain significant decisions without interfer
ence”); and (3) flow of personal information (“an individual’s control over the
processing—i.e., the acquisition, disclosure, and use—of personal information”).
Jerry Kang, “Information Privacy in Cyberspace Transactions,” 50 Stanford Law
Revirw 1193, 1202-03 (1998). Kang’s understanding of privacy is quite rich, but the
breadth ofhis categories limits their usefulness in law. The same is true of the three
categories identified by philosopherJudith DeCew: (1) “informational privacy,” (2)
“accessibilityprivacy,” and (3) “expressive privacy.”Judith W. DeCew, In P ursuit o f
Privacy: Law , Ethics, a n d the Rise o f Technology IS —11 (1997).
2. Wiliam L. Prosser, “Privacy,” 48 C alifornia Law Review 383, 389 (1960).
3. Samuel D. Warren & Louis D. Brandeis, “The Right to Privacy,” 4 H arvard
Law Review 193, 195-96 (1890).
4. Of course, there remains the issue ofwhat constitutes valid consent because
there are many occasions in which people affirmatively give out information that
should not be assumed to be consensual. SeeJulie E. Cohen, “Examined Lives: In
formational Privacy and the Subject as Object,” 52 Stanford Law Review 1373,
1397— 98 (2000) (arguing that “people are demonstrably bad at” assessing the risk
of future harms that may flowfrom the piecemeal, otherwise consensual collection
Notes to Pages 102—107 223
17. See Kang, “Information Privacy,” 1193, 1260 (“Simply put, surveillance
leads to self-censorship”); Peter P. Swire, “Financial Privacy and the Theory of
High-Tech Government Surveillance,” 77 W ashington U niversity L aw Q uarterly
461,473 (1999) (“If I knowr I am under surveillance, I might_restrict my activi
ties, so that nothing embarrassing or otherwise harmful could be detected”).
18. Judge Richard Posner notes, “[Njorms are more effective when people are
under the observation of their peers.” Richard A. Posner, T he Problematics o f M oral
an d L egal T heory 75 (1999); see alsoJames B. Rule, P rivate L ives an d Public S u rveil
lance 28 (1974) (finding that surveillance is helpful to a government “or any other
agency seeking to obtain compliance from a mass clientele in a large-scale social
setting”).
19. John Gilliom, O verseers o f the Poor: Surveillance, Resistance, a n d the L im its o f
Privacy 3 (2001).
20. Jeffrey Rosen, T h e N a ked Crowd: R eclaim ing Security a n d Freedom in an A n x
ious A ge 36 (2004).
21. Cohen, “Examined Lives,” 1426.
22. See Schwartz, “Privacy and Democracy in Cyberspace,” 1656.
23. Stanley I. Benn, “Privacy, Freedom, and Respect for Persons,” in Nom os
X III: Privacy 1,7, 10 (J. Roland Pennock &John W. Chapman eds., 1971).
24. David Lyon, T he Electronic Eye: T he Rise o f Surveillance Society 6 2 -6 7 (1994).
25. Michel Foucault, D iscipline a n d P unish 200 (Alan Sheridan trans., Vintage
Books 2d ed. 1995) (1977).
26. Lyon, Electronic Eye, 63.
27. Daniel J. Solove, T h e D ig ita l Person: Technology a n d Privacy in th e Inform ation
A g e 185 (2004). For a more extensive account of King’s experience with the FBI,
see DavidJ. Garrow, T he F B I a n d M a rtin L u th er K ing, Jr. (1981).
28. 533 U.S. 27,40 (2001).
29. Id. (internal quotation marks omitted); see also Andrew E. Taslitz, “The
Fourth Amendment in die Twenty-First Century: Technology, Privacy, and Human
Emotions,” 65 L a w a n d C ontem porary Problems 125, 144 (2002) (“Central to the
Court’s reasoning was that the thermal imager revealed information concerning ac
tivities inside the hom e”).
30. 488 U.S. 445, 449 (1989) (alteration in original) (internal quotation marks
omitted).
31.476 U.S. 227,238-39 (1986).
32. 468 U.S. 705, 714 (1984).
33. United States v. Knotts, 460 U.S. 276, 277, 281 (1983).
34. See, e.g., MarcJonathan Blitz, “Video Surveillance and the Constitution of
Public Space: Fitting the Fourth Amendment to a World That Tracks Image and
Identity,” 82 Texas L aw R eview 1349, 1357 (2004) (“[Contemporary Fourth
Amendment jurisprudence differentiates pervasive video surveillance from more
familiar mass suspicionless searches in one crucial respect: by holding that it is not
a ‘search’ at all”); Christopher Slobogin, “Public Privacy: Camera Surveillance of
Public Places and the Right to Anonymity,” 72 M ississippi L aw Jo u rn a l 213, 233
(2002) (“Meaningful legal strictures on government use of public surveillance cam
eras in Great Britain, Canada, and the United States are non-existent”).
35. Solove, D ig ita l Person, 42-44.
36. Restatement (Second) of Torts §652B (1977).
Notes to Pages 111-113 225
37. 206 A.2d 239,241-42 (N.H. 1964); see also Wolfcon v. Lewis, 924 F. Supp.
1413, 1431 (E.D. Pa. 1996) (finding media surveillance of a couple’s activities in
their home to be actionable under intrusion tort); Rhodes v. Graham, 37 S.W.2d
46,47 (Ky. 1931) (holding that wiretapping a person’s phone gives rise to a tort ac
tion because it violates his right “to the privacy of his home as against the unwar
ranted invasion of others”).
38. See, e.g., Furman v. Sheppard, 744A.2d 583, 586 (Md. Ct. Spec. App. 2000)
(holding that the defendant was not liable under intrusion tort for trespassing into
a private club to engage in video surveillance of the plaintiff because the club was
not a secluded place); Forster v. Manchester, 189 A.2d 147, 149-50 (Pa. 1963)
(finding no intrusion liability when a private investigator followed and filmed the
plaintiff because the surveillance was conducted in public).
39. Nader v. General Motors Corp., 225 N.E.2d 765, 767, 771, 769 (N.Y.
1970).
40. See ABA Criminal Justice Section’s Standards Comm., ABA Criminal Jus
tice Standards on Electronic Surveillance Relating to Technologically-Assisted
Physical Surveillance §2-6.1(d) to (g) (Draft 3d ed. 1997) (recommending that the
law begin to address the harms of public surveillance).
41. Westin, Privacy a n d Freedom , 31.
42. Justice William O. Douglas observed in another case, “Monitoring, if
prevalent, certainly kills free discourse and spontaneous utterances.” United States
v. White, 401 U.S. 745, 762 (1971) (Douglas, J., dissenting).
43. Quoted in Leonard W. Levy, O rigins o f th e F ifth A m en d m en t 273 (1968).
44. John Adams, as quoted in John H. F. Shattuck, R ig h ts o f Privacy xiii-xiv
(1976), and Charles J. Sykes, T he E n d o f Privacy: Personal R ig h ts in the Surveillance
Society 14— 15 note (1999) (capitalization in original quote altered).
45. U.S. Const, amend. V.
46. David M. O’Brien, Privacy, L aw , a n d Public Policy 92-93 (1979) (emphasis
omitted).
47. Brown v. Walker, 161 U.S. 591, 637 (1896) (Field, J., dissenting).
48. Ullmann v. United States, 350 U.S. 422, 445 (1956) (Douglas, J., dis
senting).
49. Charles Fried, “Privacy,” 77 Yale L aw J o u rn a l 475, 488 (1968).
50. Mark Berger, “Europeanizing Self-Incrimination: The Right to Remain
Silent in the European Court of Human Rights,” 12 C olum bia J o u rn a l o f European
L aw 339, 341 (2006). Some examples include India, Canada, and New Zealand.
See India Constitution art. 20, §3; Canadian Charter of Rights and Freedoms
§ll(c); New Zealand Bill of Rights Act §25(d). Jewish law also protected against
self-incrimination, forbidding punishment based on self-incriminating statements
gleaned through interrogation, as well as confession. See Samuel J. Levine, “An
Introduction to Self-Incrimination inJewish Law, with Applications to the Amer
ican Legal System: APsychological and Philosophical Analysis,” 28 Loyola Los A n
geles In tern a tio n a l a n d C om parative L aw R eview 257 (2006).
51. International Covenant on Civil and Political Rights art. 14(3)(g), Dec. 19,
1996, 999 U.N.T.S. 171.
52. Murray v. United Kingdom, 22 ECHR 29 (1996).
53. See Daniel J. Solove, “Privacy and Power: Computer Databases and Meta
phors for Information Privacy,” 53 S ta n fo rd L aw R eview 1393, 1401 (2001).
226 Notes to Pages 113-116
54. Robert Ellis Smith, Ben F ranklin's Web Site: Privacy and Curiosity fro m Ply
m outh Rock to the In tern et 62, 63 (2000).
55. See, e.g., iMiranda v. Arizona, 384 U.S. 436,467 (1966) (explaining the Fifth
Amendment protections against self-incrimination in the context of custodial in
terrogation).
56. Charles I, Letter to the High Commission, Feb. 4, 1637, quoted in R.
Carter Pittman, “The Colonial and Constitutional History of the Privilege Against
Self-Incrimination in America,” 21 V irginia L aw Review 763, 770-71 (1935).
57. Levy, O rigins o f the F ifth A m endm ent, 43-82.
58. Ellen Schrecker, M any A re the Crimes: M cC arthyism in Am erica 369-70
(1998).
59. 360 U.S. 109, 127, 134, 144 (1959) (Black,J., dissenting) (emphasis added).
60. AsJohn Henry Wigmore noted, “The simple and peaceful process of ques
tioning breeds a readiness to resort to bullying and to physical force and torture.”
8John Henry Wigmore, Evidence in Trials a t Common Law §2251 n.l(c) (John T.
McNaughton ed., 4th ed. 1961).
61. Peter Brooks, Troubling Confessions: Speaking G uilt in Law and L iterature 40
(2000). The interrogation of Dimitri Karamazov in Fyodor Dostoevsky’s The
Brothers Karam azov is an excellent literary example of how interrogation distorts
the truth even when the interrogators bear no deliberate motivation to distort. See
Richard H. Weisberg, The Failure o f the W ord 55-58 (1984) (commenting on “Dos-
toevsk[y]’s belief that the legal investigator, like the novelist himself, is motivated
by an essentially personalized vision of reality”).
62. 364 U.S. 479,488-90 (1960).
63. Bairdv. State Bar, 401 U.S. 1, 6-7 (1971). If the government has other pur
poses for askingsuch information, however, questions about political views and or
ganizations are permissible. See LawStudents Civil Rights Research Council, Inc.
v. Wadmond, 401 U.S. 154, 165-66 (1971) (remarking that questions about mem
bership and intent to further a subversive organization’s illegal aims were constitu
tionally proper); Barenblatt v. United States, 360 U.S. 109, 127-28 (1959) (holding
that a person could be compelled to disclose before the House Un-American Ac
tivities Committee whether he was a member of the Communist Party because
questions were related to a “valid legislative purpose”).
64. Baird , 401 U.S. at 6.
65. See Harriet R. Galvin, “Shielding Rape Victims in the State and Federal
Courts: AProposal for the Second Decade,” 70 M innesota Law Review 763, 765-66
(1986) (discussing howrape shield laws reversed the common-law doctrine that al
lowed a defendant to inquire into the complainant’s tendency to engage in extra
marital sexual relations).
66. See 42 U.S.C. §12112(d)(2) (limiting the legality of inquiries during the
preemployment period); id. at §12112(d)(4) (prohibiting inquiries during the em
ployment period). Drug testing is not considered a “medical examination” under
the ADA. Id. at §12114(d)(1).
67. Wis. Stat. Ann. §103.15(2) (West 2002).
68. Mass. Gen. Laws Ann. ch. 15IB, §4(9), (9A) (LexisNexis 1999).
69. See, e.g., Cal. Gov’t Code §12940(o) (West 2005); Conn. Gen. Stat. Ann.
§46a-60(l 1)(A) (West 2004); Del. Code Aim. tit. 19, §711(e) (Supp. 2004); N.Y.
Exec. Law§296.19(a)(l) (McKinney 2004).
Notes to Pages 116—118 111
70. See, e.g., Ariz. Rev. Stat. Ann. §12-2235 (2005) (privileging, in civil actions,
any patient communication to a physician or surgeon regarding “any physical or
mental disease or disorder or supposed physical or mental disease or disorder or as
to any such knowledge obtained by personal examination of the patient”); Cal.
Evid. Code §954 (West 1995) (“[T]he client... has a privilege to refuse to dis
close, and to prevent another from disclosing, a confidential communication be
tween client and lawyer”); 735 111. Comp. Stat. Ann. 5/8-803 (West 2005) (ren
dering privileged any “confession or admission” made to an accredited practitioner
of a religious denomination in her official capacity). As Catherine Ross contends,
privileges protect against “forced betrayal.” Catherine J. Ross, “Implementing
Constitutional Rights for Juveniles: The Parent-Child Privilege in Context,” 14
S ta n fo rd L aw a nd Policy R eview 85, 86 (2003).
71. WilliamJ. Stuntz, “Self-Incrimination and Excuse,” 88 Colum bia L aw Re
view 1227, 1234 (1988) (footnotes omitted).
72. See Brown v. Walker, 161 U.S. 591,605-06 (1896) (“The design of the con
stitutional privilege [against self-incrimination] is not to aid the witness in vindi
cating his character, but to protect him against being compelled to furnish evi
dence to convict him of a criminal charge”).
73. 350 U.S. 422,430,439 (1956).
74. Id. at 450, 452 (Douglas, J., dissenting).
75. Stuntz, “Self-Incrimination and Excuse,” 1228.
76. See In re Grand Jury, 103 F.3d 1140, 1146 (3d Cir. 1997) (“The over
whelming majority of all courts—federal or state—have rejected such a privilege”).
77. In re A & M, 403 N.Y.S.2d 375, 380 (App. Div. 1978). When Monica
Lewinsky’s mother was subpoenaed to testify against her by Independent Counsel
Kenneth Starr in his investigation of President Bill Clinton, there was an enor
mous public outcry. See Ruth Marcus, “To Some in the Law, Starr’s Tactics Show
a Lack of Restraint,” W ashington Post, Feb. 13, 1998, at A1 (providing reactions
from prosecutors who believed that Starr’s tactics were unwarranted). Critics have
likened the tactic of having parents and children testify about each other to some
of the infamous horrors of totalitarian societies, such as Nazi Germany, where the
government sought to make family members divulge information about each
other. See, e.g., J. Tyson Covey, “Making Form Follow Function: Considerations
in Creating and Applying a Statutory Parent-Child Privilege,” 1990 U niversity o f
Illinois L aw R eview 879, 890; Wendy Meredith Watts, “The Parent-Child Privi
leges: Hardly a New or Revolutionary Concept,” 28 W illia m a n d M a ry L aw R eview
583,590-94(1987).
78. Sometimes this quote has been attributed to Aristotle, although it is not
written in any of his texts. Euclid is credited with a similar quote: “The whole is
greater than the part,” which he stated in E lem ents in the third century b .c.
79. Priscilla M. Regan, L egislating Privacy: Technology, Social Values, a n d Public
Policy 82 (1995).
80. R. E. Smith, Ben F ra n klin s’ Web S ite, 309-11. But cf. Note, “Privacy and Ef
ficient Government: Proposals for a National Data Center,” 82 H a rvard L aw Re
view 400,412 (1968) (criticizing the congressional task force for undertaking “only
a surface treatment” of the privacy issue and arguing that “Congress should give
very careful consideration to essential legal and technological safeguards for the
privacy interest”).
228 Notes to Pages 118-122
and Public Policy' Issues,” 7 Inform ation, Technology, a n d People 6, 8 (1994), available
at http://www.anu.edu.au/people/Roger.Clarke/DV/HumanID.html.
105. For a history of criminal identification techniques, see Simon A. Cole, S u s
p ect Identities: A H isto ry o f F in g erp rin tin g an d C rim in a l Identification 4-5 (2001).
106. See generally'John D. Woodward, Jr., Nicholas M. Orlans, & Peter T. Hig
gins, Biom etrics: Id en tity A ssurance in th e Inform ation A g e (2003) (commenting that
reliable identification improves public safety and the safety of business transac
tions).
107. See Communications Disclaimer Requirements, 11 C.F.R. §110.11 (2005)
(requiring disclaimers on “general public political advertising”). The identification
requirement was originally part of the Federal Election Campaign Act of 1971,
Pub. L. No. 92-225, 86 Stat. 3 (1972) (codified as amended at 2 U.S.C. §§431-456
(2000 & Supp. II 2002)), which required identification for any expenditure with
the purpose of influencing an election. The Court in B uckley v. Valeo held that the
provision can only7apply' to speech that “expressly advocate[s] the election or defeat
of a clearly' identified candidate.” 424 U.S. 1, 79-80 (1976).
108. 2 U.S.C. §441d(a)(3) (2000 & Supp. II 2002).
109. See Clarke, “Human Identification in Information Systems,” 32-34 (de
scribing proponents of this view).
110. Article 8 of the convention provides for the protection of “the right to re
spect for [an individual’s] private and family life, his home and his correspon
dence.” Convention for the Protection of Human Rights and Fundamental Free
doms art. 8, Nov. 4, 1950, 213 U.N.T.S. 221.
111. B. v. France, 232 ECHR 33, 36, 52 (1992). The science-fiction movie G at-
taca also illustrates these points. Vincent, the protagonist, is linked to his high risk
of developing heart problems, and this renders him unfit for all but the most me
nial jobs. G attaca (Columbia Pictures 1997).
112. Solove, D ig ita l Person, 1.
113. Clarke, “Human Identification in Information Systems,” 20.
114. Richard Sobel observes, “Identity systems and documents have a long his
tory of uses and abuses for social control and discrimination.” Richard Sobel,
“The Degradation of Political Identity Under a National Identification System,”
8 Boston U n iversity J o u r n a l o f Science a n d Technology L aw 37, 48 (2002). Indeed,
one of the primary reasons that governments created passports and identity cards
was to restrict movement, alter patterns of migration, and control the move
ments of poor people and others viewed as undesirable. Marc Garcelon, “Colo
nizing the Subject: The Genealogy and Legacy of the Soviet Internal Passport,”
in D o cum enting In d ivid u a l Id e n tity 83, 86 (Jane Caplan &John Torpey eds., 2001).
115. Sobel, “Degradation of Political Identity,” 49.
116. R. E. Smith, Ben F ra n klin 's Web S ite, 41, 43.
117. McIntyre v. Ohio Elections Comm’n, 514 U.S. 334, 343 n.6 (1995).
118. Gary Marx notes that anonymity can “facilitate the flowof information and
communication on public issues” and “encourage experimentation and risk taking
without facing large consequences, risk of failure, or embarrassment since one’s
identity is protected.” Gary T. Marx, “Identity and Anonymity: Some Conceptual
Distinctions and Issues for Research,” in D ocum enting In d ivid u a l Id en tity, 311, 316,
318; see also A. Michael Froomkin, “Flood Control on the Information Ocean:
Living with Anonymity, Digital Cash, and Distributed Databases,” 15 Jo u rn a l o f
230 Notes to Pages 125-128
179. McCormick v. England, 494 S.E.2d 431, 432, 435, 438 (S.C. Ct. App.
1997).
180. See, e.g., Peterson v. Idaho First Nat’l Bank, 367 P.2d 284,290 (Idaho 1961)
(recognizing a breach-of-confidentiality tort for disclosure by a bank). For more
information on the breach-of-confidentiality tort, see generally Alan B. Vickery,
Note, “Breach of Confidence: An Emerging Tort,” 82 C olum bia L aw R eview 1426,
1426(1982).
181. See Hammonds v. Aetna Cas. & Sur. Co., 243 F. Supp. 793 (N.D. Ohio
1965) (holding an insurance company liable for inducing a physician to disclose
confidential information).
182. Neil M. Richards & Daniel J. Solove, “Privacy’s Other Path: Recovering
the Law of Confidentiality,” 96 Georgetown Lam Jo u rn a l 123 (2007); Raymond
Wacks, Privacy a n d Press Freedom 48— 58 (1995).
183. Barrymore v. News Group Newspapers Ltd., [1997] F.S.R. 600, 601 (Ch.).
184. Av. B, [2003] Q.B. 195, 207, 216.
185. See Mark S. Hayes, “Privacy Law in Canada,” in Proskauer on Privacy 13-1,
13-41 (Christopher Wolf ed., 2006) (discussing Canada’s breach-of-confidence
tort); DavidJ. Seipp, “EnglishJudicial Recognition of a Right to Privacy,” 3 O xford
Jo u rn a l o f L egal Studies 325, 366 (1983) (discussing Scotland’s recognition of breach
of confidence); Hosking v. Runting, [2004] NZCA 34, at [46] (Mar. 25, 2004) (dis
cussing New Zealand’s breach-of-confidentiality tort); Australian Broadcasting
Corp. v. Lenah Game Means, [2001] 208 CLR 199 (discussing Australia’s breach-
of-confidentiality tort).
186. Simonsen v. Swenson, 177 N.W. 831, 832 (Neb. 1920).
187. Id. at 831, 832.
188. Tarasoff v. Regents of the Univ. of Cal., 551 P.2d 334, 339-40, 347 (Cal.
1976) (en banc).
189. United States v. Miller, 425 U.S. 435,437,442— 43 (1976).
190. Smith v. Maryland, 442 U.S. 735, 743 (1979).
191. Solove, D ig ita l Person, 201-09.
192. See, e.g., Brex v. Smith, 146 A. 34, 36 (N.J. Ch. 1929) (finding an “implied
obligation” for banks to keep customers’ bank records confidential unless com
pelled by a court to disclose them).
193. The states are California, Colorado, Florida, Hawaii, Idaho, Illinois, Mon
tana, New Jersey, Pennsylvania, Utah, and Washington. See Stephen E. Hen
derson, “Learning from All Fifty States: How to Apply the Fourth Amendment
and Its State Analogs to Protect Third Party Information from Unreasonable
Search,” 55 Catholic U niversity L aw Review 373, 395 (2006).
194. Distt. Registrar & Collector, Hyderabad & Anr v. Canara Bank Etc, [2004]
INSC 668, available at http://www.commonlii.org/in/cases/INSC/2004/668.html.
195. Peterson v. Idaho First Nat’l Bank, 367 P.2d 284, 290 (Idaho 1961).
196. See, e.g., Barnett Bank of W. Fla. v. Hooper, 498 So. 2d 923,926 (Fla. 1986)
(recognizing that banks establish fiduciary relationships with customers when they
enter into transactions); Ind. Nat’l Bank v. Chapman, 482 N.E.2d 474, 482 (Ind.
Ct. App. 1985) (finding an implied contract not to disclose personal financial
information between a bank and its customers); Suburban Trust Co. v. Waller, 408
A.2d 758, 762 (Md. Ct. Spec. App. 1979) (“[A] bank implicitly warrants to main
tain, in strict confidence, information regarding its depositor’s affairs”); Richfield
234 Notes to Pages 140-142
Bank &Trust Co. v. Sjogren, 244 N.W.2d 648, 651 (Minn. 1976) (recognizing a
duty of confidentiality for banks); McGuire v. Shubert, 722 A.2d 1087, 1091 (Pa.
Super. Ct. 1998) (finding a duty for a bank to keep its customers’account informa
tion confidential).
197. HenryJames, The Reverberator 62 (1888).
198. Restatement (Second) of Torts §652D (1977); see Warren & Brandeis,
“Right to Privacy,” 195-96.
199.429 U.S. 589, 598-99 (1977).
200. See, e.g., Doe v. Borough of Barrington, 729 F. Supp. 376, 382 (D.N.J.
1990) (holding that it was a violation of the plaintiff’s constitutional right to infor
mation privacy for police to disclose to neighbors that the plaintiff’s husband was
infected with AIDS).
201. Privacy Act of 1974, 5 U.S.C. §552a(e) (10) (prohibiting agencies from dis
closing information about an individual without her prior written consent); Family
Educational Rights and Privacy Act of 1974, 20 U.S.C. §1232g(b) (1) (requiring
educational agencies or institutions that receive government funding not to dis
close education records without written consent); Cable Communications Policy
Act of 1984, 47 U.S.C. §§551(b)-(c) (limiting the extent to which a cable service
may collect or disclose personally identifiable information about subscribers);
Video Privacy Protection Act of 1988, 18 U.S.C. §2710(b) (1) (creating civil lia
bility for video stores that disclose personally identifiable information about any
customer); Driver’s Privacy Protection Act of 1994, 18 U.S.C. §§2721-2725 (re
stricting the use of personal information contained in state motor-vehicle records);
Health Insurance Portability and Accountability Act of 1996,42 U.S.C. §1320d-2
(protecting the privacy of personal health information in transactions).
202. See, e.g., Cal. Health & Safety Code §199.21 (West 1990) (repealed 1995)
(prohibiting, inter alia, disclosure of HIV test results); N.Y. Pub. Health Law §17
(McKinney 2001) (permitting the release of medical records of minors relating to
sexuallytransmitted diseases and abortion upon written request, but prohibiting dis
closure to parents without consent); 71 Pa. Stat. Ann. §1690.108 (West 1990) (pro
hibiting disclosure ofall records prepared during alcohol- or drug-abuse treatment).
203. Argentine Civil Code art. 1071, incorporated by LawNo. 21.173, quoted in
Privacy and H um an Rights, 217.
204. PrivacyAct 1978 RSS c P-24 (Saskatchewan) s 2; Privacy Act 1990 RSNL c
P-22 (Newfoundland and Labrador) s 3(1); Privacy Act 1996 RSBCc 373 (British
Columbia) s 1(1); PrivacyAct CCSM s P125 (Manitoba) s 2(1).
205. Jeanne M. Hauch, “Protecting Private Facts in France: The Warren &
Brandeis Tort Is Alive and Well and Flourishing in Paris,” 68 Tulane L aw Revirw
1219,1222,1231-32 (1994).
206. Jorge A. Vargas, “Privacy Rights Under Mexican Law: Emergence and
Legal Configuration of a Panoply of New Rights,” 27 Houston Jou rna l o f Interna
tional Law 73, 111 (2004).
207. Hosking v. Runting, [2005] 1NZLR 1, [117].
208. Cap. 217, 9-8, quoted in D.S. Choi & S.C. Park, “Korea,” in International
Libel a nd Privacy Handbook 7-1, 7-2 (CharlesJ. Glasser, Jr., ed., 2006).
209. Lawrence W. Beer, “Freedom of Expression: The Continuing Revolution,”
53 Law and Contem porary Problems 36, 54-55 (1990); see also Serge Gutwirth, P ri
vacy and the Inform ation A ge 26 (Raf Casert trans., 2002).
Notes to Pages 142-145 235
210. Dan Rosen, “Private Lives and Public Eyes: Privacy in the United States
andJapan,” 6 F lorida J o u rn a l o f In tern atio n a l L aw 141, 153 (1990).
211. Eugene Volokh, “Freedom of Speech and Information Privacy: The Trou
bling Implications of a Right to Stop People from Speaking About You,” 52 S ta n
fo rd L aw R eview 1049, 1050-51 (2000); see also Thomas I. Emerson, T he System o f
Freedom o f Expression 556 (1970) (“[T]he right of privacy depends upon guaran
teeing an individual freedom from intrusion and freedom to think and believe, not
freedom from discussion of his opinions, actions or affairs”).
212. Richard A. Posner, T h e Economics o f Justice 271 (1981).
213. Warren & Brandeis, “Right to Privacy,” 210-11.
214. See Daniel J. Solove, “The Virtues of Knowing Less: Justifying Privacy
Protections Against Disclosure,” 53 D uke L aw Jo u rn a l 967, 990-92 (2003).
215. Cohen, “Right to Read Anonymously,” 1012-13.
216. 816 A.2d 1001, 1008 (N.H. 2003).
217. Diane L. Zimmerman, “Requiem for a Heavyweight: AFarewell to Warren
and Brandeis’s Privacy Tort,” 68 C ornell L aw R eview 291, 334 (1983).
218. See, e.g., Kathleen Guzman, “About Outing: Public Discourse, Private
Lives,” 73 W ashington U niversity L a w Q uarterly 1531, 1568 (1995) (“Outers offer
up the victim as a ‘sacrificial lamb’ to portray themselves as purifying redeemers,
able to solve the problems of discrimination”).
219. John P. Elwood, “Outing, Privacy, and the First Amendment,” 102 Yale L aw
J o u rn a l 747, 773 (1992) (“Even under the best of circumstances, the relationship
between outing a particular figure and effecting a societal change is simply too at
tenuated to override the outing target’s privacy rights”).
220. John D’Emilio & Estelle B. Freedman, In tim a te M atters: A H istory o f Sexu
a lity in A m erica 285-86 (2d ed. 1997).
221. See J. Rosen, U nw anted G aze, 200 (“[Cjhanges in media technology have
increased the risk of mistaking information for knowledge”); Lawrence Lessig,
“Privacy and Attention Span,” 89 Georgetown L aw J o u rn a l 2063, 2068-69 (2001)
(arguing that access to limited amounts of information only “creates the impres
sion of knowledge”); Solove, “Virtues,” 1037 (“Much misunderstanding occurs be
cause of the disclosure of private information”).
222. See Solove, “Virtues,” 1041— 43 (describing the stigma attached to those
with certain diseases and illnesses).
223. U.S. Dep’t of Health, Educ., & Welfare, Records, 112.
224. Cefalu v. Globe Newspaper Co., 391 N.E.2d 935,939 (Mass. App. Cl 1979).
225. 469 N.E.2d 1025, 1028 (Ohio Cl App. 1984) (quotingJackson v. Playboy
Enters., 574 F. Supp. 10, 13 (S.D. Ohio 1983)).
226. 201 Cal. Rptr. 665, 666, 669 (Cl App. 1984).
227. Duran v. Detroit News, Inc., 504N.W.2d 715, 720 (Mich. Cl App. 1993)
(finding her identity to be “open to the public eye” because her work in Colombia
had been disclosed in newspaper articles, and because she had occasionally used
her real name in the United States); see also Fisher v. Ohio Dep’t of Rehab. &
Com, 578 N.E.2d 901, 903 (Ohio Ct. Cl. 1988) (holding that the disclosure of a
public conversation between a plaintiff and her fellowemployees was not a privacy
violation).
228. Times Mirror Co. v. Superior Court, 244 Cal. Rptr. 556, 561 (Ct. App.
1988); see also Multimedia WMAZ, Inc. v. Kubach, 443 S.E.2d 491, 500 (Ga. Ct.
236 Notes to Pages 145-148
App. 1994) (finding that the plaintiff’s disclosure of his infection status to family,
friends, and members of an HIV support group did not render the information
public); Y.G. v. Jewish Hosp., 795 S.W.2d 488, 500 (Mo. Ct. App. 1990) (holding
that disclosure to doctors and other participants of the plaintiff’s in vitro fertiliza
tion did not render that information public).
229. See Lior Jacob Strahilevitz, “A Social Networks Theory of Privacy,” 72
U niversity o f Chicago L aw R eview 919, 974 (2005).
230. Quoted in Norbert Elias, T h e C iv ilizin g Process 112 (1994).
231. DeMay v. Roberts, 9 N.W. 146, 148-49 (Mich. 1881).
232. Nat’l Archives & Records Admin, v. Favish, 541 U.S. 157, 171, 168 (2004)
(quoting 5 U.S.C. §552(b) (7) (C) (2000)) (internal quotation marks omitted).
Courts have also allowed tort suits based on the dissemination of autopsy photos.
See Reid v. Pierce County, 961 P.2d 333, 339-42 (Wash. 1998) (en banc) (holding
that relatives of deceased persons maintained a cause of action for invasion of pri
vacy when coroner’s office employees disseminated autopsy photos).
233. Earnhardt v. Volusia County Office of the Medical Examiner, No. 2001-
30373-CICI, at 7 (7thJudicial Circuit, July 9, 2001).
234. Judgement of June 16, 1858, Trib. Pr. Inst, de la Seine, 1858 D.P. Ill 62
(Fr.) (1’affaire Rachel), quoted in Hauch, “Protecting Private Facts in France,”
1233.
235. See, e.g., Anita L. Allen, “Lying to Protect Privacy,” 44 V illanova L aw R e
view 161, 177 (1999) (“Sex is an area in which we encounter our desires, prejudices
and shame, and cloak these emotions in privacy”).
236. See Elias, C ivilizin g Process, 114 (“The social reference of shame and em
barrassment recedes more and more from consciousness. Preciselybecause the social
command not to show oneself exposed or performing natural functions now oper
ates with regard to everyone[,]... it seems to the adult a command of his own
inner self”).
237. Martha C. Nussbaum, H id in g fro m H u m a n ity: D isgust, Sham e, a n d the L aw
115-16(2004).
238. See William Ian Miller, T h e A n a to m y o f D isg u st Y l l (1997) (“The civi
lizing process, according to [Norbert] Elias, means the expansion of the private
sphere at the expense of the public. The new norms demand private spaces in
which one prepares, grooms, and does the things that would disgust others if
they were to be witnessed”); Carl D. Schneider, Sham e, Exposure, a n d P rivacy 49
(W. W. Norton 1992) (1977) (“The open display of bodily functions—defecating,
great pain, the process of dying—threatens the dignity of the individual, re
vealing an individual vulnerable to being reduced to his bodily existence, bound
by necessity”).
239. Certain activities, such as defecation, we view as uncivilized to perform in
front of others. William Ian Miller observes, “Clearly defecation is degrading and
contaminating. It is hedged in with rules about appropriateness as to place. And to
violate those rules is a cause for disgrace and shame.” Miller, A n a to m y o f D isgust,
147,178.
240. Rochelle Gurstein, T he Repeal o f Reticence 11 (1996).
241. One victim of Chicago’s invasive strip-search policy testified that “the inci
dent caused her emotional distress that manifested itself in reduced socializing,
poor work performance, paranoia, suicidal feelings, depression, and an inability to
Notes to Pages 148-152 111
disrobe in any place other than a closet.” Joan W. v. City of Chicago, 771 F.2d
1020, 1021-22 (7th Cir. 1985).
242. Restatement (Second) of Torts §652D (1977).
243. Eugene Volokh explains that this difference may be because the informa
tion revealed via exposure is less useful to those to whom the information is given
than that revealed via disclosure. Volokh, “Freedom of Speech,” 1094.
244. Daily Times Democrat v. Graham, 162 So. 2d 474, 478 (Ala. 1964).
245. McNamara v. Freedom Newspapers, Inc., 802 S.W.2d 901, 905 (Tex. App.
1991).
246. Aesop, Fables, in 17 T he H a rva rd Classics (Joseph Jacobs trans., New York,
P.F. Collier & Son 1909-14).
247. See Solove, D ig ita l Person, 131-32 (observing that digital filing require
ments and the conversion of paper files to digital format will lead to significant on
line accessibility of court records).
248. Judicial Conference Comm, on Court Admin. & Case Mgmt., R eport on
P rivacy a nd Public Access to Electronic Case Files (2001), http://www.privacy.uscourts
.gov/Policy.htm.
249. Robert Gellman, “Public Records, Public Policy, and Privacy,” H um an
R ights, Winter 1999, at 7, 9.
250. Solove, D ig ita l Person, 131-32; see also Gellman, “Public Records,” 7
(warning that although “[p]rivacy protections were inherent in the technology of
paper,” digitization has led to increased accessibility).
251. Peter A. Winn, “Online Court Records: BalancingJudicial Accountability
and Privacy in an Age of Electronic Information,” 79 W ashington L aw R eview 307,
315 (2004).
252. Restatement (Second) of Torts §652D cmt. b.
253. See, e.g., Cline v. Rogers, 87 F.3d 176, 179 (6th Cir. 1996) (holding that the
constitutional right to information privacy did not apply to the disclosure of police
records because “one’s criminal history is arguably not a private ‘personal matter’
at all, since arTest and conviction information are matters of public record”); Doe v.
City of New York, 15 F.3d 264, 268-69 (2d Cir. 1994) (finding that “an individual
cannot expect to have a constitutionally protected privacy interest in matters of
public record” but that plaintiff’s HIV status was not a matter of public record);
Scheetz v. Morning Call, Inc., 946 F.2d 202, 207 (3d Cir. 1991) (holding that be
cause information about the victim’s claims of spousal abuse potentially “would
have wound up on the public record,” the victim did not have a privacy interest in
the claims).
254. Walls v. City of Petersburg, 895 F.2d 188, 193-94 (4th Cir. 1990).
255. United States Dep’t of Justice v. Reporters Comm, for Freedom of the
Press, 489 U.S. 749, 780, 764 (1989).
256. Angus McLaren, S exu a l B lackm ail: A Modem H isto iy 17 (2002).
257. Id. at 20 (quoting “Central Criminal Court,” T im es (London), June 20,
1895, at 3).
258. Id. at 17, 21.
259. See Leo Katz, Ill-G o tte n G a ins 140-45 (1996) (discussing various philos
ophers’ interpretations of the connection between blackmail and coercion and
the difficulties of formulating a complete theory). The term “blackmail” origi
nated in Tudor times and referred to extortion in general. McLaren, S ex u a l
238 Notes to Pages 152-155
Blackm ail, 12. “Modem blackmail first emerged when criminals in the eigh
teenth century recognized that the laws against sodomy provided them with the
means by which they could extort money from those whom they could entrap.”
Id. at 3.
260. See 31AAm. Jur. 2d, “Extortion, Blackmail, and Threats” §20 (2002) (rec
ognizing that although statutes differ in form, the use of a threat to extract some
thing is at the heart of blackmail). For a discussion of howblackmail laws protected
reputations in different periods of American history, see Lawrence M. Friedman,
“Name Robbers: Privacy, Blackmail, and Assorted Matters in Legal History,” 30
H ofstra L aw R eview 1093, 1112-13 (2002) (observing that blackmail went “against
the American grain” of allowing second chances and fresh starts).
261. Walter Block & Gary M. Anderson, “Blackmail, Extortion, and Exchange,”
44 New York L aw School L aw Review 541, 541 (2001).
262. Joseph Isenbergh, “Blackmail from Ato C,” 141 U niversity o f Pennsylvania
Law Review 1905, 1914 (1993) (noting that in any given case, individuals who have
obtained valuable information are most likely to disclose it in the presence of a
lawforbidding bargaining for secrecy with data subjects, though in the long run,
such laws will deter potential blackmailers fromdigging for valuable information).
263. Richard A. Posner, “Blackmail, Privacy, and Freedom of Contract,” 141
U niversity o f Pennsylvania Law Review 1817, 1818-20 (1993).
264. Block &Anderson, “Blackmail,” 541— 17.
265. Jennifer Gerarda Brown, “Blackmail as Private Justice,” 141 U niversity o f
Pennsylvania L aw R eview 1935,1971 (1993).
266. Richard A. Epstein, “Blackmail, Inc.,” 50 U niversity o f Chicago Law Review
553,565 (1983).
267. Wendy J. Gordon, “Truth and Consequences: The Force of Blackmail’s
Central Case,” 141 U niversity o f Pennsylvania Law Review 1741, 1761 (1993).
268. Richard H. McAdams, “Group Norms, Gossip, and Blackmail,” 144 U ni
versity o f Pennsylvania Law Review 2237, 2243-64 (1996).
269. See Restatement (Second) of Torts §13 (1965) (defining battery); id. at §21
(defining assault).
270. Henrik Ibsen, H edda Gabler, in Hedda G ablerand Other-Plays 362 (Una Ellis-
Fermor trans., Penguin Books 1961).
271. See, e.g., Cal. Penal Code §518 (West 1999) (defining extortion as “the ob
taining of property from another, with his consent, or the obtaining of an official
act of a public officer, induced by a wrongful use of force or fear”).
272. Edison v. Edison PolyformMfg. Co., 67 A. 392, 394 (N.J. 1907).
273. Roberson v. Rochester Folding Box Co., 64 N.E. 442,442,442-43,447-48
(N.Y. 1902).
274. Editorial, “The Right of Privacy,” N ew York Tim es, Aug. 23, 1902, at 8,
reprinted in Denis O’Brien, “The Right of Privacy,” 2 Columbia Law Review 437,
438 (1902).
275. Editorial, N ew York Tim es, Aug. 12, 1902.
276. Comment, “An Actionable Right to Privacy? Roberson v. Rochester
Folding Box Co.,” 12 Yale Law Jo u rn a l 35, 36 (1902).
277. Denis O’Brien, “Right of Privacy,” 437.
278. See, e.g., Irwin R. Kramer, “The Birth of Privacy Law: A Century Since
Warren and Brandeis,” 39 Catholic U niversity Law Review 703, 717 (1990) (noting
Notes to Pages 155-158 2 39
that the statutes “made it both a tort and a misdemeanor ... to use another’s name,
portrait, or picture for commercial purposes without the subject’s consent”).
279. N.Y. Civ. Rights Law §§50, 51 (McKinney 1992).
280. Restatement (Second) of Torts §652C & cmt. c (1977).
281. Hauch, “Protecting Private Facts in France,” 1223.
282. Ruth Redmond-Cooper, “The Press and the Law of Privacy,” 34 In tern a
tio n a l a n d C om parative L aw Q u a rterly 769, 772 (1985); James Whitman, “The Two
Western Cultures of Privacy: Dignity Versus Liberty,” 113 Yale L aw J o u rn a l 1151,
1175 (2004).
283. Bruce W. Sanford, L ib el a n d P rivacy §2.4, at 43 (2d ed. 1991). For more on
the lawof appropriation in Germany and France, see Ansgar Ohly &Agnes Lucas-
Schloetter, Privacy, Property, a n d Personality: C iv il L aw Perspectives on C om m ercial
A ppropriation (2005).
284. Von Hannover v. Germany, [2004] ECHR 294 (23 June 2004), at U50.
285. Aubry v. Editions Vice-Versa, Inc., [1998] 1 S.C.R. 591.
286. See generally Robert C. Post, “Rereading Warren and Brandeis: Privacy,
Property, and Appropriation,” 41 Case W estern Reserve L aw R eview (A 1 (1991) (con
trasting the “property” and “dignity” rationales for the tort of appropriation).
287. Edward J. Bloustein, “Privacy as an Aspect of Human Dignity: An Answer
to Dean Prosser,” 39 N ew York U niversity L aw R eview 962, 987 (1964).
288. Prosser, “Privacy,” 406.
289. Jonathan Kahn, “Bringing Dignity Back to Light: Publicity Rights and
the Eclipse of the Tort of Appropriation of Identity,” 17 Cardozo A r ts a n d E n ter
ta in m e n t L aw J o u rn a l 213, 223 (1999). A new tort, known as the “right of pub
licity,” has emerged to redress violations of property rights in one’s name or like
ness. See, e.g., Thomas McCarthy, T h e R ig h ts o f P ublicity a n d P rivacy §5.63 (1991)
(“Simplistically put, while the appropriation branch of the right of privacy is in
vaded by an injury to the psyche, the right of publicity is infringed by an injury
to the pocketbook”).
290. David A. Elder, T h e L aw o f P rivacy §6:1, at 375 (1991) (quoting McQueen v.
Wilson, 161 S.E.2d 63, 66 (Ga. Ct. App. 1968), re v ’d on oth er grounds, 162 S.E.2d
313 (Ga. 1968)).
291. See AndrewJ. McClurg, “AThousand Words Are Worth a Picture: APri
vacy Tort Response to Consumer Data Profiling,” 98 N orthw estern U niversity L aw
R eview 63, 109, 114 (2003) (arguing that Prosser’s characterization of appropria
tion as vindicating property interests obscured the dignitary interests the tort pro
tected, and noting that “[m]odem courts are prone to subsuming the privacy claim
under the label of publicity”).
292. Pavesich v. New England Life Ins. Co., 50 S.E. 68, 68, 69, 70, 80 (Ga.
1905).
293. Roberson v. Rochester Folding Box Co., 64 N.E. 442, 449 (N.Y. 1902)
(Gray, J., dissenting).
294. Edison v. Edison Polyform Mfg. Co., 67 A. 392, 392 (N.J. 1907). The court
granted the injunction. Id. at 395.
295. Onassis v. Christian Dior-New York, Inc., 472 N.Y.S.2d 254, 257 (Sup. Ct.
1984).
296. Quoted in Beate Rossler, T h e Value o f Privacy 14-15 (2005).
297. Arthur Miller, T h e C rucible 133 (Penguin Books 1995) (1953).
240 Notes to Pages 158-161
298. Van Vechten Veeder, “The History and Theory of Defamation,” 3 Co
lum bia L aw R eview 546, 563 (1903).
299. Rodney A. Smolla, L aw o f D efam ation, at 1-4 (2d ed. 1999).
300. Restatement (Second) of Torts §558(a) (1977).
301. Id. at §559.
302. Id. at §652E; Gary T. Schwartz, “Explaining and Justifying a Limited Tort
of False Light Invasion of Privacy,” 41 Case W estern R eserve L aw R eview 885, 885
(1991) (noting that Warren and Brandeis’s article led to decisions that Prosser later
labeled the false-light tort). Although there is a significant amount of overlap be
tween the two torts, false light has a more expansive view of the harm caused by
distortion. While defamation requires proof of reputational harm, false light does
not, and plaintiffs can be compensated solely for emotional distress. Id. at 887.
303. Restatement (Second) of Torts §652E cmt. b.
304. Constitution of the Republic of Hungary art. 59; Poland, The Constitu
tional Act of 1997, art. 47; Constitution of the Portuguese Republic art. 26; Con
stitution of the Russian Federation art. 23 (1993); Constitution of the Democratic
Socialist Republic of Sri Lanka art. 14(1) (1978); quoted in Privacy a n d H um an
R ights, 543, 812, 828, 850, 951.
305. United Nations Universal Declaration of Human Rights, GA Res
217A(m), UN Doc A/Res/810 (1948).
306. Janmejay Rai & Barunesh Chandra, “India,” in In tern a tio n a l L ibel a n d P ri
vacy Handbook 7-1, 7-2 (Charles J. Glasser, Jr., ed., 2006).
307. Supreme Court, May 27, 1997, Minshu 51-5-2024; quoted in Intern a tio n a l
L ib el a n d P rivacy H andbook 8-1, 8-2 (CharlesJ. Glasser, Jr., ed., 2006).
308. Quoted in Daniel Buchanan, Japanese Proverbs an d Sayings 120 (1965).
309. Peter F. Carter-Ruck & Rupert Eliott, C arter-R uck on L ibel a n d Sla n d er 18
(5th ed. 1997); Maryann McMahon, “Defamation Claims in Europe: A Survey of
the Legal Armory,” 19 C om m unications L aw yer 24 (2002).
310. The statutory provisions are Privacy Act, 5 U.S.C. §552a(d); Fair Credit
Reporting Act, 15 U.S.C. §1681i; and Family Educational Rights and Privacy Act,
20 U.S.C. §1232g(a) (2).
311. See Dep’t of Health, Educ., & Welfare, Records, xx-xxiii; OECD Privacy
Guidelines; European Union Data Protection Directive, art. 6. For more back
ground on the OECD Privacy Guidelines, see Joel R. Reidenberg, “Restoring
Americans’ Privacy in Electronic Commerce,” 14 B erkeley Technology L aw Jo u rn a l
771,773-81 (1999).
312. Arlette Farge, “The Honor and Secrecy of Families,” in A H istory o f P rivate
L ife , vol. 3, Passions o f th e Renaissance 571, 585 (Roger Chartier ed. & Arthur Gold-
hammer trans., 1989). Heinrich Boll’s novella T h e Lost H onor o f K atharina B lum is a
remarkable account of the harm of distortion. See Heinrich Boll, T he Lost H onor o f
K atharina B lu m (Leila Vennewitz trans., 1975) (featuring a character whose life is
ruined by the publication of misleading information).
313. Robert C. Post, “The Social Foundations of Defamation Law: Reputation
and the Constitution,” 74 C alifornia L a w R eview 691, 711 (1986).
314. William Shakespeare, T he Tragedy o f O thello, th e M oor o f Venice act 3, sc. 3,11.
158-64 (Edward Pechter ed., W. W. Norton 2004) (1623).
315. Emily Dickinson, Poems by E m ily D ickinson (1890), quoted in E m ily D ick
inson 17-18 (J.M. Brinnin ed., 1960).
Notes to Pages 161-164 241
316. The notion that the home was one’s “castle” was articulated as early as
1499. See Note, “The Right to Privacy in Nineteenth Century America,” 94 H ar
va rd L aw R eview 1892, 1894 (1981) (dating the first mention to a report written in
1499) (the note was published anonymously but written by historian David Seipp);
see also Semayne’s Case, 77 Eng. Rep. 194, 195 (K.B. 1605) (“[T]he house of every
one is to him as his ... castle and fortress”).
317. 4 William Blackstone, C om m entaries *223.
318. Nuisance involves “an invasion of another’s interest in the private use and
enjoyment of land.” Restatement (Second) of Torts §822 (1977). William Black-
stone defined private nuisance as “any thing done to the hurt or annoyance of the
lands, tenements, or hereditaments of another.” 3 William Blackstone, C om m en
taries *216.
319. Thomas M. Cooley, A Treatise on th e C onstitutional L im ita tio n s W hich Rest
upon the L egislative Power o f th e S ta tes o f th e A m erican U nion 306 (1868).
320. U.S. Const, amend. IV (“The right of the people to be secure in their per
sons, houses, papers, and effects, against unreasonable searches and seizures, shall
not be violated”).
321. Restatement (Second) of Torts §652B.
322. Craig M. Bradley, T h e Failure o f the C rim in a l Procedure R evolution 95-143
(1993).
323. Vargas, “Privacy Rights Under Mexican Law,” 105.
324. Canadian Charter of Rights and Freedoms, 1982, c. 11, §8.
325. Privacy a n d H utn a n R ights, 217.
326. Hoskingv. Runting, [2004] NZCA 34, at [106] (Mar. 25, 2004).
327. Warren & Brandeis, “Right to Privacy,” 193.
328. Galella v. Onassis, 487 F.2d 986, 994 (2d Cir. 1973) (quoting Galella v.
Onassis, 353 F. Supp. 196, 228 (S.D.N.Y. 1972)).
329. Dorothy J. Glancy, “The Invention of the Right to Privacy,” 21 A rizo n a
L aw R eview 1, 25 (1979).
330. See, e.g., Janette Dillon, Shakespeare a n d the S o lita ry M a n 3-13 (1981) (dis
cussing approaches to solitude before Shakespeare’s time, which viewed a solitary
life as running counter to the good of the community). Solitude, which became a
coveted aspect of existence by the end of the seventeenth century, was viewed by
many as dangerous and undesirable during the Middle Ages. See Michel Rouche,
“Private Life Conquers State and Society,” in A H istory o f P riva te L ife, vol. 1, From
Pagan R om e to B yza n tiu m 419, 434-35 (Paul Veyne ed. & Arthur Goldhammer
trans., 1987) (describing the concern a ninth-century abbot had for the hermit’s
solitary life).
331. Aristotle, E thica Nicomachea §1169b, 11. 18—19 (W. D. Ross trans., Clarendon
Press 1925) (n.d.).
332. See Michael A. Weinstein, “The Uses of Privacy in the Good Life,” in
N om os X III: Privacy, 88, 91-93 (discussing critiques of solitude).
333. Govind v. State of Madhya Pradesh & Anr, [1975] INSC 74; [1975] 3 SCR
946; [1975] 2 SCC 148; AIR 1975 SC 1378 (Mar. 18, 1975), available at http://
www.commonlii.org/in/cases/INSC/1975/75.htm1.
334. Hannah Arendt, T h e H u m a n C ondition 71 (1958).
335. According to philosopher Philip Koch, solitude “gives respite and restora
tion, a time and a place to lick the wounds of social strife.” Philip Koch, Solitude 5
242 Notes to Pages 164-166
(1994); see also Westin, Privacy and Freedom , 35 (“[N]o individual can play indefi
nitely, without relief, the variety of roles that life demands.... Privacy in this as
pect gives individuals, from factory workers to Presidents, a chance to lay their
masks aside for rest. To be always ‘on’ would destroy the human organism”).
336. For Thoreau, solitude fosters better social relationships because “we live
thick and are in each other’s way, and stumble over one another, and I think that we
thus lose some respect for one another.” Henry David Thoreau, Walden, in Walden
and O ther W ritings 113 (Barnes & Noble Books 1993) (1854).
337. Many social, political, and religious leaders began their influential public
work with preparations performed in private. See, e.g., Joseph Bensman & Robert
Lilienfeld, Between Public and Private: The Lost Boundaries o f the S e lf 37 (1979) (de
scribing howa “religious hero[’s]” retreat to privacywould inspire followers on his
return to the public life); Richard H. Weisberg, “It’s a Positivist, It’s a Pragmatist,
It’s a Codifier! Reflections on Nietzsche and Stendhal,” 18 Cardozo L aw Review 85,
92 (1996) (noting that for Nietzsche, “[t]he great legislator is himself (or herself)
conceived of as one whose act of social codification begins with a private program
of creative self-fulfillment”). Sixteenth-century French essayist Michel de Mon
taigne contended that solitude—even for public figures—is not self-indulgent, for
“(t]hey have only stepped back to make a better jump, to get a stronger impetus
wherewith to plunge deeper into the crowd.” Michel de Montaigne, “Of Soli
tude,” in The Complete Essays o f M ontaigne 174, 182 (Donald M. Frame trans.,
1958).
338. See, e.g ., Restatement (Second) of Torts §652B cmt. c (1977) (“The defen
dant is subject to liability_only when he has intruded into a private place, or has
otherwise invaded a private seclusion that the plaintiffhas thrown about his person
or affairs”).
339. Irwin Altman, The E nvironm ent a n d Social Behavior: Privacy, Personal Space,
Territory, Crowding 52-54, 96, 87-89 (Irvington 1981) (1975).
340. Robert C. Post, “The Social Foundations of Privacy: Community and Self
in the Common LawTort,” 77 C alifornia L aw Review 957, 966-68, 971-73 (1989).
341. See, e.g., Shulman v. Group W Prods., Inc., 955 P.2d 469, 491 (Cal. 1998)
(holding that a car-accident victim had a privacy interest in her conversation with
medical rescuers at the accident scene); Stressman v. Am. Black Hawk Broad. Co.,
416 N.W.2d 685, 687-88 (Iowa 1987) (holding that broadcasting video of the
plaintiff eating at a restaurant might have violated her privacy interest and noting
that “the mere fact a person can be seen by others does not mean that person
cannot legally be ‘secluded’” (quoting Huskey v. Nat’l Broad. Co., 632 F. Supp.
1282,1287-88 (N.D. HI. 1986)).
342. Sanders v. American Broad. Co., 978 P.2d 67, 72 (Cal. 1999).
343. Margaret Atwood, The H andm aid's Tale 63 (1986).
344. Griswold v. Connecticut, 381 U.S. 479,484 (1965).
345. Eisenstadt v. Baird, 405 U.S. 438,453 (1972) (emphasis omitted).
346. Roe v. Wade, 410 U.S. 113, 153 (1973).
347. See, e.g., Pierce v. Soc’y of Sisters, 268 U.S. 510, 534-35 (1925) (invali
dating an Oregon lawrequiring parents to send their children to public school be
cause it “unreasonably interfere[d] with the liberty of parents_to direct the up
bringing and education of children under their control”).
348. Laurence H. Tribe, A m erican C onstitutional Law 1352 (2d ed. 1988).
Notes to Pages 166-175 243
349. Louis Henldn, “Privacy and Autonomy,” 74 C olum bia L aw R eview 1410,
1410-11 (1974).
350. Neil M. Richards, “The Information Privacy Project,” 94 Georgetown L aw
Jo u rn a l 1087, 1095, 1108 (2006).
351. Whalen v. Roe, 429 U.S. 589, 599-600 (1977).
352. See, e.g., In re Crawford, 194 F.3d 954, 958 (9th Cir. 1999) (“We agree ...
that the indiscriminate public disclosure of [certain personal information! may
implicate the constitutional right to informational privacy”); Walls v. City of Pe
tersburg, 895 F.2d 188, 192 (4th Cir. 1990) (“Personal, private information in
which an individual has a reasonable expectation of confidentiality is protected by
one’s constitutional right to privacy”); Kimberlin v. U.S. Dep’t ofJustice, 788 F.2d
434, 438 (7th Cir. 1986) (“Whether or not Kimberlin has a privacy interest in the
information ... depends upon whether he has a reasonable expectation of privacy
in the information”); Barry v. City of New York, 712 F.2d 1554, 1559 (2d Cir.
1983) (“Most courts considering the question ... appear to agree that privacy' of
personal matters is a [constitutionally] protected interest”); J.P. v. DeSanti, 653
F.2d 1080, 1090 (6th Cir. 1981) (“Our opinion does not mean ... there is no con
stitutional right to non-disclosure of private information”); United States v.
Wesdnghouse Elec. Corp., 638 F.2d 570, 577 (3d Cir. 1980) (recognizing that
W halen protects “the right not to have an individual’s private affairs made public by
the government”); Plante v. Gonzalez, 575 F.2d 1119, 1132 (5th Cir. 1978) (“There
is another strand to the right to privacyproperly called the right to confidentiality”).
353. Whalen, 429 U.S. at 600.
354. Id. at 600-02.
355. John Stuart Mill, O n L ib erty 13 (David Spitz, ed. 1975).
356. SirJames Fitzjames Stephen, L iberty , E quality, F ra tern ity 161-62 (1967 ed.)
(1873).
357. Union Pac. Ry. Co. v. Botsford, 141 U.S. 250, 251-52 (1891).
358. Richards, “Information Privacy Project,” 1108.
359. Stanley v. Georgia, 394 U.S. 557, 564 (1969).
360. Olmstead v. United States, 277 U.S. 438, 478 (1928) (Brandeis, J., dis
senting), quoted in Stanely v. Georgia, 394 U.S. at 564.
361. Id. at 565.
362. Post, “Social Foundations of Privacy,” 973.
363. Lawrence v. Texas, 539 U.S. 558, 578, 567, 562 (2003).
364. Id. at 572 (quoting Model Penal Code §213.2 cmt. 2 (1980) and citing
Model Penal Code Commentary 277-78 (Tentative Draft No. 4, 1955)). For an in
teresting discussion of Law rence and public versus private places, see Lior Jacob
Strahilevitz, “Consent, Aesthetics, and the Boundaries of Sexual Privacy After
Law rence v. Texas,” 54 D eP aul L a w R eview 671 (2005).
365. McLaren, S exu a l B lackm ail, 6, 8.
24. Robert Gellman, “Does Privacy Law Work?” in Technology a n d Privacy: The
N ew Landscape (Philip E. Agre & Marc Rotenberg eds., 1997).
25. 306 F.3d 170, 180-82 (4th Cir. 2002), cert, g ra nted (June 27, 2003).
26. See Doe v. Chao, 540 U.S. 614 (2004).
27. U.S. West, Inc. v. Fed. Communications Comm’n, 182 F.3d 1224, 1235
(10th Cir. 1999).
28. Solove, D ig ita l Person, 93-101; Daniel J. Solove, “Identity Theft, Privacy,
and the Architecture ofVulnerability,” 54 H astings L aw J o u rn a l 1227 (2003).
29. Dyer v. Northwest Airlines Corp., 334 F Supp. 2d 1196, 1200 (D.N.D.
2004). Another court reached a similar conclusion. See In re Northwest Airlines
Privacy Litigation, 2004 WL 1278459 (D.Minn. 2004).
30. 293 A.D.2d 598, 599-600 (N.Y. App. Div. 2002).
31. John M. Roberts & Thomas Gregor, “Privacy: A Cultural View,” in Notnos
X III: P rivacy 199, 203-14 (J. Roland Pennock &J. W. Chapman eds., 1971).
32. Dan Rosen, “Private Lives and Public Eyes: Privacy in the United States and
Japan,” 6 F lorida J o u rn a l o f In tern a tio n a l Law 141, 172-73 (1990).
33. James Whitman, “The Two Western Cultures of Privacy: Dignity Versus
Liberty,” 113 Yale L aw J o u rn a l 1151, 1160, 1163, 1171, 1204, 1164, 1221 (2004).
34. Joel R. Reidenberg, “Setting Standards for Fair Information Practices in the
U.S. Private Sector,” 80 Iow a L aw R eview 497, 500 (1995).
35. Francesca Bignami, “European Versus American Liberty: A Comparative
Analysis of Anti-terrorism Data-Mining,” 48 Boston College L aw R eview 609,
682-86 (2007).
36. See Marc Rotenberg, “Fair Information Practices and the Architecture of
Privacy (What Larry Doesn’t Get),” 2001 S ta n fo rd Technology L a w R eview 1 (2001).
37. Bennett, R egulating P rivacy, 96.
38. Board of Education v. Earls, 536 U.S. 822, 828-29 (2002).
39. Id. at 832, 833.
40. Id. at 834.
41. Nat’l Fed’n of Fed. Employees v. Cheney, 884 F.2d 603 (D.C. Cir. 1989)
(sustaining U.S. Army’s drug-testing program).
42. Vemonia School District v. Acton, 515 U.S. 646, 682 (1995).
43. Earls, 536 U.S. at 848 (Ginsburg, J., dissenting).
44. See id. at 833 (majority opinion).
45. John M. Poindexter, “Finding the Face of Terror in Data,” N ew York Tim es,
Sept. 10, 2003, at A25.
46. Shane Harris, “TIA Lives On,” N a tio n a l Jo u rn a l, Feb. 23, 2006.
47. GAO Report, D a ta M in in g : F ederal E ffo rts C over a W ide Range o f Uses 2 (May
2004). --- "
48. Jacqueline KJosek, T h e W a r on Privacy 51 (2007).
49. Leslie Cauley, “NSA Has Massive Database of Americans’ Phone Calls,”
U SA Today, May 11, 2006, at Al; Susan Page, “Lawmakers: NSA Database Incom
plete,” U S A Today, June 30, 2006, at Al.
50. Cauley, “NSA Has Massive Database.”
51. Daniel J. Solove, Marc Rotenberg, & Paul M. Schwartz, In fo m ia tio n Privacy
L aw 603-04 (2d ed. 2006).
52. Richard A. Posner, “Our Domestic Intelligence Crisis,” W ashington Post,
Dec. 21, 2005, at A31.
246 Notes to Pages 193-196
Germany, 155, 158; privacy in, 3; Basic Law, House Un-American Activities Committee
200n15 (HUAC), 114
Germany Federal Supreme Court, 158 HUAC. See House Un-American Activities
Gerstein, Robert, 34, 79 Committee
Giiliom, John, 108 Humiliation, 160
Godkin, E. L., 19 Hungary, 159
Goldhili, Simon, 57 Huxley, Aldous, 75
Goldman, Eric, 5
Good name, 159 Ibsen, Henrik, 153
Gordon, Wendy, 152 Identification, 10, 121-26; defined, 104,
Gossip, 4, 16,144 122; ECHR on, 124; interrogation and,
“Gotcha,” 195 124; disclosure and, 125; social structure
Government records, 141 and, 125; Stevens on, 126. See also Social
Gramm-Leach Bililey Act, 128, 136 Security Numbers
Gray, John Clinton, 157 Identity, 36; “inalienable,” 86; theft, 126-27
G risw old v . C onnecticut, 22, 30—31, 57, Illin o is v . C aballes, 68
165-66, 168 Imagination, 98
Gross, Hyman, 2, 19 Immunity of person, 16, 18
Grossklags, Jens, 73 Inaccessibility: Allen on, 19; privacy and,
Group privacy, 23 19; as broad/narrow, 36-37
Gurstein, Rochelle, 82, 148 “Inalienable identity,” 86
Gutwirth, Serge, 47 Increased accessibility, 10, 149-51, 189;
defined, 105; benefits, 150
H am berger v . E astm an , 111 Independence, 98
Hamilton, Alexander, 62, 125 India: privacy' in, 3; Fourth Amendment
T he H andm aid's Tale (Attwood), 75, 165 and, 140; constitution, 200nl5
Harassment, 21, 162 Individualism, 51-52, 81; society and, 89;
Harassment Act-New Zealand (1977), common good and, 91; as countervalue, 91
162 Individuality, 30, 98; common good versus,
Hareven, Tamara, 59-60 90
Harlan, John Marshall, II, 71, 199nl 1 Individual preferences, 70-71
Harms. See Individual/societal harms Individual rights: privacy value and, 89;
Hawthorne, Nathaniel, 55 privacy as, 92
Haynes, Luther, 27-28 Individual/societal harms, 174; reputational,
H aynes v . A lfre d A . K nopf, Inc., 27 160, 175; physical injuries, 174-75;
Health Insurance Portability and financial losses, 175; property, 175;
Accountability Act (1996), 128, 130, emotional, 175-76; psychological,
234n201 175-76; relationship, 176-77;
Health records, 141. See also Medical vulnerability, 177-78; chilling effects,
information 178; power imbalances, 178-79
H edda G abler (Ibsen), 153 Information, 192; as property, 26; market
Henkin, Louis, 31, 166 value of, 27; sharing, as intimacy, 35;
HEW. See U.S. Department of Health, nature of, 67-70; medical, 70; privacy
Education, and Welfare restricting, 83; incriminating, 116; age, 171
H iib el v . S ix th J u d ic ia l D istrict, 126 Information collection, 21, 103—6, 172;
Hixson, Richard, 89, 90 interrogation, 1, 10, 104, 112—17, 124;
Holmes, Oliver Wendell, 64 surveillance, 1, 4, 10, 23, 30, 104, 106-12,
Home, 2 12n66; in Argentina, 58; U.S. 189, 193, 195-96, 225n38; defined, 106
Supreme Court on, 58; variability in, Information dissemination, 5,9, 103-6, 136,
58-61; Douglas on, 59; as retreat, 59, 172; blackmail, 10, 95,96,105,110,
2 13n94; solitude in, 60, 115, 214nll4; 151-54, 170, 237n259; breach of
expansion of, 60-61; Fourth Amendment confidentiality, 10, 105, 136-40, 138, 153;
on entering, 110 disclosure, 10,105, 125,140-47, 142, 160,
252 Index
Index 253
91-93; individual rights and, 89; social, Restatement of Torts, 54, 67, 89; on publicity,
89-98; communitarian critique, 90-91; 120-21; on public disclosure, 150
society and, 91, 173-74; pluralistic, T he R everberator {James), 140
98-100, 187-96; assessing, 99-100; as Richards, Neil, 166, 168
variable, 100; Regan on, 179 Right(s), 3, 4, 50, 72, 113, 124, 162, 200nl5;
Privacy violations, 6, 10; Allen on, 18 fundamental, 5; property, 26-27; privacy,
Private: information, 21; matters, 24; public 45, 50; personal, 58; wrongs versus, 75;
versus, 50; body as, 53 individual, 89, 92; balancing, 91. See also
Property: information as, 26; control over Bill of Rights; European Court of Human
personal information and, 26—27; rights, Rights; Family Educational Rights and
26-27; protection, 156; Privacy Act (1974)
individual/societal harms, 175 “T he Right to Privacy,” 15-18, 101,
Prosser, William, 156; on privacy problems, 141-42, 155, 159, 175-76
101 Right to be let alone, 12, 89; Brandeis on,
Protection, 33-34,69, 128, 130-31, 134-35, 15-18; Warren, Samuel on, 15-18; U.S.
234n201; from interrogation, 1; from Supreme Court on, 17; solitude and, 19
searches, 1; legal, 45; of privacy, 93; Right to privacy: Brandeis on, 1; U.S.
privacy, against plurality of problems, Supreme Court on, 22; as overlapping
98-100, 171-72, 174; against exclusion, rights, 37-38. See also Privacy rights
135; breach of confidentiality, 138; “Right to publicity,” 239n289
property, 156. See also EU Data Roberson, Abigail, 154
Protection Directive Roberson v . R ochester F olding B ox Co., 154-55,
Pseudonyms, 125 157
Psychological harms, 175-76 Roe v . W ade, 22, 30, 31, 166, 168
Psychological well-being, 98 “Romantic author,” 26
Public disclosure, 27, 137, 243n352; Roosevelt, Franklin, 122
Restatement of Torts on, 150 Rorty, Richard, 46
Public domain, 187-88 Rosen, Dan, 184
Publicity, 120-21, 239n289 Rosen, Jeffrey, 79, 108
Public life, 164 Rossler, Beate, 70, 84, 85
Public surveillance, 112 Rovce, Josiah, 46
Public versus private, 50 Rubenfeld,Jed, 31, 32-34
“Publius,” 125 R ussell v . G regoire, 121
P udd'nhead W ilson (Twain), 121 Russia, 159
Secrecy, 13, 20; conceptions of privacy, 13, Sodomy, 56, 95, 151-52; U.S. Supreme
21-24; of specific matters, 21; privacy-as- Court on, 57
secrecy, 22; selective, 23; as narrow, 24 Solitude, 1, 20, 164, 241n330, 242n337;
Secrecy paradigm, 111, 139, 150 concealment versus, 18-19; right to be let
Security, 7, 89, 192. See also Insecurity alone and, 19; in home, 60, 115, 2 14nl 14
Seipp, David, 62-63 Solove, Daniel J., 33
Selective secrecy, 2 3 Source, 137
Self-censorship, 108 South Africa, 3, 68
Self-creation, 34 South Korea, 131, 141
Self-definition, 33-34 Spam, 163
Self-development, 98; privacy in, 79; Spanish Inquisition, 114
appropriation and, 156 Spatial distance, 164
Selfhood, 31 Spatial incursions, 163
Self-incrimination, 113; Stuntz on, 117 Sri Lanka, 159
Self-revelation, 34 SSNs. See Social Security' Numbers
Sem ayne's Case, 58 S ta n ley v . G eorgia, 168
Sennett, Richard, 53 Statutory law, 16-17
September 11 terrorist attacks, 8, 182, 192 Stephen, James Fitzjames, 167
Sex: meaning of, 54; variability in, 54-58; Stevens, John Paul, 126
concealing, 55-56, 2 13n86; state Stigma, 160
regulation of, 57; offenders, 121 Stone, Lawrence, 54
Sexual conduct, 3 Strahilevitz, Lior, 72, 145
Sexual orientation, 54 Strip search, 236n241
Shaeffer, Rebecca, 69 Stuntz, William, 22,83; on Fifth Amendment,
S heets v . S a lt L a ke C ounty, 132-33 116; on self-incrimination, 117
Shelton v. Tucker, 115 Sunstein, Cass, 46
Shils, Edward, 23 Surveillance, 4, 10, 30, 104, 106-7, 189;
S h u lm a n v . G roup IV P ro d s., Inc., 242n341 freedom from, 1; Fourth Amendment
Siegel, Reva, 52 and, 23; defined, 104; Benn on, 108-9;
Simiris, Spiros, 92 U.S. Supreme Court on, 110-11; public,
Simmel, Arnold, 23, 79 112; Westin on, 112; creating chilling
Shnonsen v . Sw enson, 138 effects, 193; video, 195-96, 225n38
Singleton, Solveig, 83 Sweden, 122
Sipple v . C hronicle P ublishing Co., 145 S w eezy v . N ew H am pshire, 244n 12
Slander, 158
Slobogin, Christopher, 72, 193 T a ra so ffv. R egents o f th e U niversity o f
Smith, H. Jeff, 120 C alifornia, 138
S m ith v . Chase M a n h a tta n B ank, 182 Technology, 4—5
S m ith v . M aryland, 68, 139, 217nl89 Telegraph, 63
Snap cameras, 142 Telemarketing, 163
Social beings, 91 Telephone, 63-64
Social control, 94, 174 “Territories of the self,” 169
Social rebuffs, 175 Terrorism, 83
Social rewards, 94 Third Amendment, 58
Social Security Numbers (SSNs), 122, Third-party doctrine, 139; dissent from,
127-28, 180 139; reasoning of, 140
Social structure, 87; privacy in, 93; Thlinget Indians, 66
identification and, 125 Thomson, Judith Jarvis, 7, 37—38
Society: Chinese, 80—81; individualism Thoreau, Henry David, 163
and, 89; privacy value and, 91, 173-74; Tikopia, 66
norms and, 93-98; privacy and, 93-98; T im es M itr o r Co. v . S uperior C ourt, 145,
authoritarian, 95; distortion and, 235n228
160-61 Tocqueville, Alexis de, 177
Index 257
Tort law, 135, 148, 188. See also Privacy Variability, 41, 50-51; privacy theory’ and, 9;
torts; Restatement of Torts privacy reconstruction, 41, 50-67;
Total Information Awareness, 192 in family7, 51-52; in body7, 52-54; in
Transparency, 134, 194 sex, 54-58; in home, 58-61; in
T he T ria l (Kafka), 75, 133, 194 communications, 61-65; in dynamic
Tricot, Bernard, 118 world, 65-67
Tricot Commission, 118 Veronia School D istrict v . A cton, 191
Trust, 36, 81 “Victorian compromise,” 56-57
Truths, 50 Video Privacy Protection Act (1988),
Twain, Mark, 121,136 234n201
Video records, 141
V llm a n n v . U n ited States, 116 Video surveillance, 195-96, 225n38
Ulysses, 97-98 Video Voyeurism Prevention Act (2004), 71
168
U nion Pacific R aihray Co. v . Botsfiord, Volokh, Eugene, 83, 142
United Nations International Covenant on Von H annover v . G erm any, 155
Civil and Political Rights, 113
United Nations Universal Declaration of Wacks, Raymond, 45
Human Rights (1948), 3, 50 W alls v . C ity o f Petersburg, 151
United States (U.S.): appropriation in, 150, Warren, Earl, 115
156; defamation in, 158-59. See also U.S. Warren, Samuel, 12, 101,141-42, 155, 159,
Constitution; U.S. Department of 175-76,185; on right to be let alone,
Health, Education, and Welfare; U.S. 15-19, 89; inviolate personality and, 29;
Supreme Court privacy torts of, 137; tradition of, 163
U nited S ta tes D epartm ent o f Justice v . Reporters Washington, George, 62
C om m ittee fo r Freedom o f th e Press, 120, 151 Watching, 19
U nited S ta tes v . Karo, 110 Weinstein, Michael, 79
U n ited S ta te s v. K notts, 110 Weinstein, W. L., 37
U n ited S ta te s v . M iller, 139—40 West, Cornel, 46
Universality, contingency' versus, 66 Weste, Richard, 146
Universals, 43 Westin, Alan, 4, 66, 79, 82; privacy theory
Unreasonable searches, 162 of, 24; on surveillance, 112
Unwanted notoriety, 157-58. See also W halen v. Roe, 22, 128, 141, 166-67
Anonymity Whistleblowers, 23On 119
U.S. See United States Whitman, James, 185
U.S. Constitution, 2, 17, 112, 165, 168. See Wiretapping, 17, 64, 73, 107; of King,
also Bill of Rights; specific A m endm ents 109-10
U.S. Department of Health, Education, and Withdrawal, 20
Welfare (HEW), 130, 133, 186 Wittgenstein, Ludwig, 9,40, 49,
U.S. Judicial Conference Committee, 150 208nl-209nl; family resemblances of,
U.S. Supreme Court, 3, 177; on right to be 42-44
let alone, 17; on right to privacy, 22; on W'olfe, Alan, 99
personhood, 30-31, 52-53; on sodomy, Women: in family, 52; privacy impeding po
57; on home, 58; on mail, 62; on litical power of, 82-83; lack of privacy
reasonable expectation of privacy, 68; on and, 97
surveillance, 110-11; on personal matters, World Wide W'eb, 123
128; on family, 146; drug testing and,
189—91. See also specific cases Yale L a v Jo u rn a l, 155
U .S. W est Inc. v . Federal C om m unications Yao-Huai Lvi, 80
Com m ission, 181 Younger Committee on Privacy (England), 8
U topia (Moore), 81 Yuldo Mishima, 141-42