-
1
-
-
0003530541
-
-
(New York: Random House, 2000). As far as I can tell, these writers, and many others, regard the underlying interests protected by privacy as multifarious and loosely connected to ideas of intimacy, unwanted contact, protection of personal reputation (Rosen), some proprietary interests, and others
-
J. Rosen, The Unwanted Gaze: The Destruction of Privacy in America (New York: Random House, 2000). As far as I can tell, these writers, and many others, regard the underlying interests protected by privacy as multifarious and loosely connected to ideas of intimacy, unwanted contact, protection of personal reputation (Rosen), some proprietary interests, and others.
-
The Unwanted Gaze: The Destruction of Privacy in America
-
-
Rosen, J.1
-
3
-
-
85138203845
-
-
(New York: Routledge, 2012). A. Allen and J. Rosen have argued for the view that the right to privacy should protect people from unwanted sexual advances, slurs, and even some forms of physical contact (particularly of a sexual nature)
-
A. Lever, Privacy (New York: Routledge, 2012). A. Allen and J. Rosen have argued for the view that the right to privacy should protect people from unwanted sexual advances, slurs, and even some forms of physical contact (particularly of a sexual nature).
-
Privacy
-
-
Lever, A.1
-
4
-
-
0003615959
-
-
(Ithaca, N.Y.: Cornell University Press, 1997). Some see the right to privacy as a right that protects anything that concerns concealment of some sort, even such things as voting in a ballot booth
-
J. DeCew, In Pursuit of Privacy (Ithaca, N.Y.: Cornell University Press, 1997). Some see the right to privacy as a right that protects anything that concerns concealment of some sort, even such things as voting in a ballot booth.
-
In Pursuit of Privacy
-
-
Decew, J.1
-
5
-
-
84923486508
-
Privacy and the Limits of Law
-
R. Gavison, “Privacy and the Limits of Law,” Yale Law Journal 89 (1980): 421;
-
(1980)
Yale Law Journal
, vol.89
, pp. 421
-
-
Gavison, R.1
-
7
-
-
85138211548
-
-
Suppose that it is not a photo but a document, say, a diary you wrote, that you happened to send to Janet by mistake, and she read the whole thing. Of course, we might think that it was not very nice of her to read the stuff; it is a temptation that Janet should have resisted. But I doubt that she violated any right of yours. However, I have come to learn that people have very different intuitions about this. My own sense is that people can do wrong even if the wrong does not consist in the violation of another’s right. The photo example, suggested to me by one of the reviewers, nicely avoids these complications
-
Suppose that it is not a photo but a document, say, a diary you wrote, that you happened to send to Janet by mistake, and she read the whole thing. Of course, we might think that it was not very nice of her to read the stuff; it is a temptation that Janet should have resisted. But I doubt that she violated any right of yours. However, I have come to learn that people have very different intuitions about this. My own sense is that people can do wrong even if the wrong does not consist in the violation of another’s right. The photo example, suggested to me by one of the reviewers, nicely avoids these complications.
-
-
-
-
8
-
-
85138203101
-
-
It is important to bear in mind that we have many property interests in information that are not based on privacy concerns. Lawyers call them intellectual property, which includes copyright in creative work, trademarks and trade secrets, many kinds of patents, and others explicitly created by contracts. In short, not every property right in information is grounded in the kind of concerns we aim to protect by the right to privacy
-
It is important to bear in mind that we have many property interests in information that are not based on privacy concerns. Lawyers call them intellectual property, which includes copyright in creative work, trademarks and trade secrets, many kinds of patents, and others explicitly created by contracts. In short, not every property right in information is grounded in the kind of concerns we aim to protect by the right to privacy.
-
-
-
-
10
-
-
85138188166
-
-
for one, doubted that Thomson’s intuitions can be generalized to the extent that she thought. But I cannot say that he came up with convincing counterexamples in his response
-
T. Scanlon, for one, doubted that Thomson’s intuitions can be generalized to the extent that she thought. But I cannot say that he came up with convincing counterexamples in his response.
-
-
-
Scanlon, T.1
-
15
-
-
85005945195
-
An Ethical Duty to Protect One’s Own Information Privacy?
-
A. Allen, “An Ethical Duty to Protect One’s Own Information Privacy?” Alabama Law Review 64 (2013): 845.
-
(2013)
Alabama Law Review
, vol.64
, pp. 845
-
-
Allen, A.1
-
18
-
-
84877991268
-
The Dangers of Surveillance
-
Following the disclosures of Edward Snowden, the concern about government surveillance and the many possibilities of its abuse has gained a lot of attention. It turns out that the laws regulating government surveillance, at least in the United States, leave a lot to be desired. See, for example, N. Richards, “The Dangers of Surveillance,” Harvard Law Review 126 (2013): 1934.
-
(2013)
Harvard Law Review
, vol.126
, pp. 1934
-
-
-
20
-
-
85138188407
-
An actual example of something similar came up with the full-body scans the Transportation Security Administration started using for security screening at airports, effectively allowing the TSA agents to see through people’s clothes, almost as if naked. Many people found it very disturbing and in violation of their right to privacy. Perhaps it was (the machines, we are told, have been slightly modified since, blurring the image to some extent); but in this case, unlike in the example I mention in the text, there is some level of individuation or identification, at least de re; initially, the TSA agents could see who the person they were screening was, even if they were very unlikely to have any de dicto individuation
-
An actual example of something similar came up with the full-body scans the Transportation Security Administration started using for security screening at airports, effectively allowing the TSA agents to see through people’s clothes, almost as if naked. Many people found it very disturbing and in violation of their right to privacy. Perhaps it was (the machines, we are told, have been slightly modified since, blurring the image to some extent); but in this case, unlike in the example I mention in the text, there is some level of individuation or identification, at least de re; initially, the TSA agents could see who the person they were screening was, even if they were very unlikely to have any de dicto individuation. I find it interesting that many people were reassured by the modification introduced later by the TSA in which the screening agents can no longer see or know anything about the person they screen. If that is true, I do not see how the practice violates our right to privacy.
-
I Find It Interesting that Many People were Reassured by the Modification Introduced Later by the TSA in Which the Screening Agents Can No Longer See Or Know Anything about the Person they Screen. If that is True, I Do Not See How the Practice Violates Our Right to Privacy.
-
-
-
21
-
-
85138153620
-
-
I would not want to claim that making fun of someone in public, without their consent, is always wrong. Comedians and late-night talk show hosts do that all the time, and mostly it is not objectionable. But they usually make fun of people who deliberately expose themselves to public attention, like politicians and celebrities, and thus they can hardly complain about becoming objects of public entertainment
-
I would not want to claim that making fun of someone in public, without their consent, is always wrong. Comedians and late-night talk show hosts do that all the time, and mostly it is not objectionable. But they usually make fun of people who deliberately expose themselves to public attention, like politicians and celebrities, and thus they can hardly complain about becoming objects of public entertainment.
-
-
-
-
22
-
-
85138144217
-
-
It is, of course, a separate question of who gets to monitor the CCTV, and, if it is the government or, say, a private corporation, then, as discussed above, additional concerns about potential abuse might come into the picture as well
-
It is, of course, a separate question of who gets to monitor the CCTV, and, if it is the government or, say, a private corporation, then, as discussed above, additional concerns about potential abuse might come into the picture as well.
-
-
-
-
23
-
-
85138165435
-
-
Perhaps an argument can be made that respect for a person’s dignity requires a recognition that people act for reasons they see fit, and, thus, asking them to provide their reasons, without adequate justification, is disrespectful of their dignity or personhood. Needless to say, developing such an argument is beyond the scope of this article
-
Perhaps an argument can be made that respect for a person’s dignity requires a recognition that people act for reasons they see fit, and, thus, asking them to provide their reasons, without adequate justification, is disrespectful of their dignity or personhood. Needless to say, developing such an argument is beyond the scope of this article.
-
-
-
-
24
-
-
85138197466
-
-
Here is another example: some voting procedures are conducted by a secret ballot, and others are not; either way, we normally do not expect people to disclose the reasons for voting the way they did. I suspect that the protection of nondisclosure of reasons for voting often has nothing to do with concerns about privacy; it derives from the nature of the public choice in question and the reasons for having a voting procedure in place. Voting usually counts choices, not reasons
-
Here is another example: some voting procedures are conducted by a secret ballot, and others are not; either way, we normally do not expect people to disclose the reasons for voting the way they did. I suspect that the protection of nondisclosure of reasons for voting often has nothing to do with concerns about privacy; it derives from the nature of the public choice in question and the reasons for having a voting procedure in place. Voting usually counts choices, not reasons.
-
-
-
-
25
-
-
84933492558
-
Cambridge University Press, 1989), p. 191; S. Moller Okin, Justice, Gender and the Family (New York: Basic Books, 1989), p. 174. But cf. R. Gavison, “Feminism and the Public/Private Distinction
-
See, for example, C. McKinnon, Toward a Feminist Theory of the State (Cambridge: Cambridge University Press, 1989), p. 191; S. Moller Okin, Justice, Gender and the Family (New York: Basic Books, 1989), p. 174. But cf. R. Gavison, “Feminism and the Public/Private Distinction,” Stanford Law Review 45 (1992): 1.
-
(1992)
Stanford Law Review
, vol.45
, pp. 1
-
-
-
26
-
-
85138146614
-
I am not denying that the very nature of an act may depend on it being done in public; I cannot humiliate or praise someone, for example, by just talking to myself in private
-
I am not denying that the very nature of an act may depend on it being done in public; I cannot humiliate or praise someone, for example, by just talking to myself in private. But I do not see how this would undermine the point about permissibility that I make in the text.
-
But I Do Not See How This Would Undermine the Point about Permissibility that I Make in the Text.
-
-
-
27
-
-
85138131772
-
Quite clearly, the various legal prohibitions on public nudity and similar restrictions on the kind of things people may do at home but not in public are justified (when they are) by the protection of public spaces, not by the protection of privacy
-
Quite clearly, the various legal prohibitions on public nudity and similar restrictions on the kind of things people may do at home but not in public are justified (when they are) by the protection of public spaces, not by the protection of privacy. Laws in these areas operate like zoning regulations, creating different public spaces for different types of activities.
-
Laws in These Areas Operate like Zoning Regulations, Creating Different Public Spaces for Different Types of Activities.
-
-
|