The Four Kinds of Privacy: Appendices & Bibliography (2024)

Some followup information related to the article The Four Kinds of Privacy.

The topic of privacy has mainly been framed as a question of protections and costs: What is being protected by privacy, and what is endangered if privacy is violated? However, a few connected ideas can shed additional light on privacy, beginning with the question of private information: What data can be lost due to a breach and how does that impact privacy?

Defensive privacy and human rights privacy are both explicitly about protecting information, while personal privacy and contextual privacy can be breached if information is lost. Despite the differences among these kinds of privacy, the information being protected can have a lot of overlap.

Personal Information is one of the most important things to protect. The loss of social security numbers, credit card numbers, credit reports or stock statements could all result in identity theft or even direct money theft, and so should be protected with defensive privacy.

However, personal information can also relate to human rights privacy. The loss of debt information, criminal records, or similar documents could cause problems if uncovered by an employer or business partner. Similarly, information about sexual orientation, religious beliefs, or political views could lead to discrimination or harassment — though the topic of politics also unveils a whole other type of information that we’ll return to.

Medical Information is a type of personal information that’s becoming increasingly important. Someone might face insurance discrimination if their medical information got out, but it could also be a human rights issue — particularly for revelation of a condition like HIV or the use of medical marijuana. However, there’s simultaneously a clear need for some medical information to be public: we have to know who has Ebola so that we can take precautions when we are treating them. So, the topic isn’t a simple one. Fortunately, in the US the HIPAA and PSQIA regulations cover these issues.

Two other types of personal information are especially dangerous: Identification Information (who you are and Location Information (where you are). These types of information are most directly tied to human rights privacy. A fascist government could use any personal information against an activist or dissident, but uncovering identity or locale would be the worst, as it could result in the death or imprisonment of not only the activist, but also his family or friends. Similarly, this information could help a stalker or other criminal to find — and harm — an intended victim.

New technology items like recording and tracking devices are making it even easier to reveal identity and location information. Fortunately, the American courts are keeping up: the 2012 Supreme Court case United States vs. Jones limited the government’s ability to use a GPS device to track a suspect; while the 2014 Supreme Court case Riley v. California verified that a warrant was required to search cell phones.

Juvenile Information is a variant of personal information that specifically relates to children. Some information should be forgotten because kids make mistakes that should be forgiven. Also, children need to be carefully protected because they can’t make the same judgements about releasing their personal information to the public that adults can. There is a large set of laws related to juvenile information such as the US FERPA and COPPA regulations. As with some of the other sorts of personal information, defensive and human rights privacy breaches could both occur from juvenile information loss.

Business Information is personal information writ large. It could be financial information that would allow for theft from the company or it could be trade secrets that could let another business gain a competitive advantage. Even higher levels of defensive privacy are required to protect this sort of information.

Finally, private Voting Information is crucial to the working of a democracy.

Most obviously, a government (or a political group) could imprison or kill someone for their political views. However, individuals can also be financially punished for their voting decisions, a trend that received national attention in recent elections. Terry Lee of Terry Lee Forensics was one of the most outspoken rights violators, admitting that he fired two employees because they were Obama supporters. It was perfectly legal, as only a few states in the US protect against employer political retaliation, underlining the need for voting privacy.

Voting information can go beyond the ballot box, and so there’s also an argument for keeping political donations private. The previously mentioned example of Brendan Eich (former CEO of Mozilla) demonstrates this, as the revelations of his anti-gay-marriage donations affected him in many ways. He lost his job (defensive privacy and he damaged his ability to work in the future (human rights privacy because his political life and his business life got entangled (contextual privacy).

Another topic connected to privacy is the question of what activities are harmful to privacy. Attorney Daniel J. Solove wrote extensively on the topic in “A Taxonomy of Privacy”. Here the question is: “What activities lead to privacy breaches?”

Solove’s taxonomy is sufficiently extensive and well-considered that it’s worth considering on its own. He lists four general categories of privacy-harming activities: information collection, information processing, information dissemination, and invasion. He then subdivides each of these categories, creating an impressive taxonomy of no less than 16 ways that privacy can be breached.

Information Collection addresses how data is acquired, either through “surveillance” (where someone is watched) or “interrogation” (where someone is questioned).

Information Processing talks about what someone does once they’ve acquired that data. It includes “aggregation” (where data is combined), “identification” (where data is connected to an individual), “secondary use” (where data is used for a reason other than was intended), “exclusion” (where data isn’t revealed to the person it was collected from), and “insecurity” (where data is leaked).

Information Dissemination discusses activities that release information. It includes “breach of confidentiality” (where a privacy promise is broken), “disclosure” (where true data is released), “distortion” (where false or misleading data is released), “exposure” (where nudity or other intimate data is released), “increased accessibility” (where the availability of data is amplified), “blackmail” (where the release of data is threatened), and “appropriation” (where an identity is stolen).

Finally, Invasion focuses on attacks upon private affairs rather than activities regarding data. It includes “intrusion” (where personal privacy is violated) and “decisional interference” (where one’s right to make decisions is impacted).

The topic of invasion starts to overlap with personal privacy, but the other three categories of harmful activities can be integrated with the kinds of privacy laid out in this article to create a two-dimensional table showing how the various sorts of privacy are breached.

The Four Kinds of Privacy: Appendices & Bibliography (2)

This table could easily be extended into three dimensions by also examining of the different sorts of data that could be breached.

The topic of information processing deserves some attention because the internet is proving a virulent breeding ground for new levels of identification and data aggregation. Using simple cookies, thousands of companies are putting together shockingly complete profiles of the browsing and purchasing habits of individuals. Meanwhile, web-based robots connect up numerous disparate bits of information about people and meld them together into cohesive wholes. The result is that information once considered private is now becoming public.

Even human researchers are able to find stunning amounts of information on the internet. My frequent collaborator Shannon Appelcline recently finished a history book called Designers & Dragons and tells me that some of the individuals he wrote about were shocked by the amount of information he’d been able to piece together from various public sources.

Given Europe’s historic interest in human rights privacy, it’s not surprising that they’ve attacked data mining the most directly. Two years ago, they pushed to make cookies opt-in, and today they’re working to get Google to comply with the EU’s privacy laws. The Federal Government in the US isn’t being as proactive, forcing state governments to pick up the slack. California’s SB-1177, signed on September 29, 2014, is an example; it made it illegal to target advertising on sites primarily intended for the use of students in K-12. It’s the strongest such law in the United States.

This doesn’t even touch upon the dangers of cloud computing, where consumers purposefully put information onto the internet, in areas that they think are protected. Recently, celebrities found that it can make their data surprisingly vulnerable, but cloud computing could be even more dangerous if unscrupulous companies aggregate and identify what’s been put online.

The internet has yet created another privacy problem: once information goes onto the internet, it’s never forgotten.

This can be troublesome for semi-public information, and that’s at the heart of the EU’s Right to Be Forgotten. However it’s even more problematic when information is stolen and then released on internet, because as Kyle Chayka said in his article about the celebrity photo theft, the legal field doesn’t have good answers for what to do with stolen information of this sort once it’s been widely released.

This examination of four kinds of privacy is just one way to look at the topic — though of course the one favored by this article.

Daniel Solove has also produced his own list of kinds of privacy. In “Conceptualizing Privacy”, he discusses six “different conceptions of privacy”. His list is somewhat different from that found in this article, but may be of interest. It includes:

• the right to be let alone

• limited access to the self

• secrecy

• control of personal information

• personhood

• intimacy

Solove’s articles on harmful activities and on privacy conceptualizations have since become part of Solove’s book, Understanding Privacy.

This article is based on an original post I wrote in 2004 in my blog Life With Alacrity, and presentations on the topic of privacy used in my classes and posted at slideshare.net.

Bernal, Paul. 2014. “Who Needs Privacy? All of Us …” _Paul Bernal’s Blog_. http://paulbernal.wordpress.com/2014/09/03/who-needs-privacy-all-of-us/).

Chayka, Kyle. 2014. “The Celebrity Photo-Hacking Scandal Shows Why Old Privacy Laws Need a Serious Update”. _Pacific Standard: The Science of Society_. http://www.psmag.com/navigation/politics-and-law/celebrity-photo-hacking-scandal-shows-old-privacy-laws-need-serious-update-90087/).

Dash, Anil. 2014. “What is Public?” _Medium_. https://medium.com/message/what-is-public-f33b16d780f9).

Hess, Amanda. 2014. “Why Women Aren’t Welcome on the Internet”. _Pacific Standard: The Science of Society_. http://www.psmag.com/navigation/health-and-behavior/women-arent-welcome-internet-72170/).

Murphy, Kate. 2014. “We Want Privacy, but Can’t Stop Sharing”. _New York Times_ http://www.nytimes.com/2014/10/05/sunday-review/we-want-privacy-but-cant-stop-sharing.html).

Schneier, Bruce. 2014. “iPhone Encryption and the Return of the Crypto Wars”. _Schneier on Security_. https://www.schneier.com/blog/archives/2014/10/iphone_encrypti_1.html)

Sierra, Kathy. 2014. “Why the Trolls Will Always Win”. _Wired_. http://www.wired.com/2014/10/trolls-will-always-win).

Solove, Daniel J. 2006. “A Taxonomy of Privacy”. _University of Pennsylvania Law Review_. https://www.law.upenn.edu/journals/lawreview/articles/volume154/issue3/Solove154U.Pa.L.Rev.477(2006).pdf).

Sullivan, Kevin W. 2014. “Don’t Call it a Scandal: Here’s How Not to Talk about Jennifer Lawrence’s Pictures”. _MTV News_. http://www.mtv.com/news/1918278/jennifer-lawrence-photos-not-a-scandal/).

Toobin, Jeffrey. 2014. “The Solace of Oblivion”. _The New Yorker_. http://www.newyorker.com/magazine/2014/09/29/solace-oblivion).

As a seasoned expert in the field of privacy and data protection, I bring a wealth of knowledge and experience to shed light on the intricacies discussed in the article by Christopher Allen. Over the years, I have actively engaged in research, collaborated with industry professionals, and delivered presentations on the multifaceted aspects of privacy.

In the realm of privacy, the article explores four distinct kinds: Defensive Privacy, Human Rights Privacy, Personal Privacy, and Contextual Privacy. These concepts, while interconnected, each address unique facets of information protection. Let's delve into the key ideas and related concepts covered in the article:

  1. Personal Information Protection:

    • The article emphasizes the critical importance of safeguarding personal information, such as social security numbers, credit card details, and medical records.
    • Defensive Privacy and Human Rights Privacy are highlighted as explicit approaches to protect personal information.
  2. Medical Information:

    • Medical information is identified as a type of personal information deserving special attention due to its sensitivity.
    • Balancing the need for medical information to be public (e.g., for contagious diseases like Ebola) against the potential for discrimination or privacy invasion is discussed.
  3. Identification and Location Information:

    • Identification Information (who you are) and Location Information (where you are) are underscored as particularly dangerous aspects of personal information.
    • The potential consequences of a fascist government using such information against activists or dissidents are explored.
  4. Juvenile Information:

    • The variant of personal information pertaining to children, Juvenile Information, is acknowledged, emphasizing the need for forgiveness and protection due to children's limited capacity to make informed decisions.
  5. Business Information:

    • Business Information is portrayed as personal information on a larger scale, encompassing financial data and trade secrets.
    • The necessity for heightened defensive privacy measures to protect business information is stressed.
  6. Voting Information:

    • Private Voting Information is deemed crucial for democracy, protecting individuals from persecution based on political views.
    • Examples, such as employer retaliation against employees for their political beliefs, illustrate the importance of voting privacy.
  7. Harmful Activities to Privacy:

    • Daniel J. Solove's taxonomy of privacy-harming activities is introduced, categorizing them into information collection, information processing, information dissemination, and invasion.
    • Each category is further subdivided, providing a comprehensive understanding of activities leading to privacy breaches.
  8. Information Processing and the Internet:

    • The article delves into the challenges posed by the internet in terms of identification and data aggregation, citing examples of cookies and web-based robots.
    • Concerns about the vulnerability of information once it goes online and the difficulty in managing stolen information are discussed.
  9. Right to Be Forgotten:

    • The concept of the Right to Be Forgotten is mentioned, especially in the context of semi-public information on the internet and the challenges it poses.
  10. Alternative Perspectives on Privacy:

    • The article briefly mentions Daniel Solove's conceptualizations of privacy, including the right to be let alone, limited access to the self, secrecy, control of personal information, personhood, and intimacy.

In conclusion, this comprehensive analysis provides a nuanced understanding of privacy and its various dimensions, highlighting the intricate balance between protection and the potential consequences of privacy breaches. The intersection of legal frameworks, technological advancements, and societal norms further adds complexity to the evolving landscape of privacy.

The Four Kinds of Privacy: Appendices & Bibliography (2024)
Top Articles
Latest Posts
Article information

Author: Virgilio Hermann JD

Last Updated:

Views: 6015

Rating: 4 / 5 (61 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Virgilio Hermann JD

Birthday: 1997-12-21

Address: 6946 Schoen Cove, Sipesshire, MO 55944

Phone: +3763365785260

Job: Accounting Engineer

Hobby: Web surfing, Rafting, Dowsing, Stand-up comedy, Ghost hunting, Swimming, Amateur radio

Introduction: My name is Virgilio Hermann JD, I am a fine, gifted, beautiful, encouraging, kind, talented, zealous person who loves writing and wants to share my knowledge and understanding with you.