1 / 14

A Taxonomy of privacy

A Taxonomy of privacy. Privacy. A very slippery, abstract concept In your own words, give me a definition of privacy. Write this in your journal. Keizer’s definition. “A creaturely resistance to being used (or exploited) against one’s will” (Keizer 20).

ronat
Télécharger la présentation

A Taxonomy of privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Taxonomy of privacy

  2. Privacy • A very slippery, abstract concept • In your own words, give me a definition of privacy. Write this in your journal.

  3. Keizer’s definition • “A creaturely resistance to being used (or exploited) against one’s will” (Keizer 20). • What is he saying? Take a minute and put this definition into your own words. • What does this mean? What question would you ask Keizer about his definition? Write this question down. • Now, let’s work toward our own definition, but first let us clarify Keizer’s definition.

  4. Keizer offers two qualifications to clarify his definition: what are they? • First, how you are used doesn’t matter. The more intangible the use, the more likely we perceive the use as a breach as opposed to assault • -shortcuts at the doctor’s office, revenge, entertainment • Secondly, awareness of exploitation is irrelevant, but it hurts more if the victims do know. • What kind of examples can you think of? Do you agree or disagree with these?

  5. Privacy: a concept in disarray • Too complicated to be boiled down to a single essence • These attempts create overly broad and vague definitions. • Past definitions, including tort scholar William Prosser’s lacked several considerations. • Fourth Amendment law, constitutional right to information privacy, evidentiary privileges, dozens of federal privacy statutes, and hundreds of state statutes • Emergence of new technology

  6. Background of Solove’s definition • Solove works from a legal perspective • Focus: activities that create problems • Different, yet share many commonalities. • Concrete • Endeavors to guide the law toward a more coherent understanding of privacy and to serve as a framework for the future development of the field of privacy law.

  7. Daniel Solove’s Definition • Centered around the data subject • 1.) Information Collection • 2.) Information Processing • 3.) Information Dissemination • 4.) Invasions

  8. Information Collection • Surveillance • conveys “watching, listening to, or recording of an individual’s activities;” subject is not always aware • 1984, CCTV, wiretapping • Panopticon effect • Interrogation • conveys various forms of questioning or probing for information; subject is aware • Makes people uncomfortable by not answering • Impinge on freedom of association and belief, e.g. McCarthy, Middle Ages • BOTH involve involuntary collection; there is also voluntary collection.

  9. Information Processing • Use, storage, and manipulation of data that has been collected • Aggregation • conveys the combination of information about a person (Amazon.com) • Identification • conveys linking information to specific persons • Insecurity • conveys lack of due diligence protecting (stored) personal information from leaks and improper access • Secondary Use • conveys the re-use of information, without subject’s consent, for purposes different from the purpose for which it was originally collected • Exclusion • conveys not allowing the subject to know or influence how their information is being used.

  10. Information Dissemination • Reveal personal data or the threat of spreading infro • Breach of Confidentiality • conveys “breaking a promise to keep a person’s information confidential” • Disclosure • conveys revealing (truthful) information that “impacts the way others judge [the] character [of the person involved]” • Exposure • conveys revealing “another’s nudity, grief, or bodily functions” • Increased Accessibility • conveys “amplifying the accessibility of information”

  11. Information Dissemination (cont.) • Blackmail • conveys the threat to disclose personal information unless the blackmailers demands are met • Appropriation • conveys the use of the subject’s identity “to serve the aims and interests of another” • Distortion • conveys the dissemination of “false or misleading information about individuals”

  12. Invasions (Different from the others) • Don’t involve information • Intrusions • conveys acts that “disturb one’s tranquility or solitude” • Surveillance, interrogation • Decisional Interference • conveys “[governmental] incursion into the subject’s decisions regarding private affairs”

  13. Individual and Societal Harms • Physical Harms • Financial Losses and Property Harms • Reputational Harms • Emotional and Psychological Harms • Relationship Harms (think association) • Power Imbalances • Chilling Effects • Vulnerability Harms • lead to other harms, accumulate slowly like climate change

  14. Chapter 2 • What type of problematic activity is Keizer’s friend engaging in? • What type of problematic activity is related to the Tyler Clementi case? • What kind of harms are involved in each? • Are they different? Which one is worse?

More Related