The socio-legal context of privacy

tags
Privacy Law

Notes

NOTER_PAGE: (1 0.6276293348493461 . 0.24882629107981222)

environment has so radically changed with digitisation that many expectations of privacy are redundant;

NOTER_PAGE: (1 0.6623081296191017 . 0.6384976525821596)

legislation and judicial interpretation – when aimed at protecting privacy as, for example, in data protection law – usually misses its mark

NOTER_PAGE: (1 0.6958499147242752 . 0.25508607198748046)

ultimately, ‘Privacy cannot be the dominant value in any society. Man has to live in society, and social concerns have to take precedence’

NOTER_PAGE: (2 0.16827743035815804 . 0.38341158059467917)
NOTER_PAGE: (2 0.37748720864127344 . 0.23317683881064163)

Often the agency which is seen as the opponent of privacy is the state.

NOTER_PAGE: (2 0.7015349630471859 . 0.1588419405320814)

Privacy concerns interpersonal relationships (sometimes one-to-one, sometimes one-to-many) and how they combine into larger societal relationships.

NOTER_PAGE: (4 0.3325753268902785 . 0.17683881064162754)

Privacy is about the physical/psychological relationship between self and society

NOTER_PAGE: (4 0.3956793632745878 . 0.17762128325508608)

Privacy is about power, authority and role in society.

NOTER_PAGE: (4 0.45650938032973276 . 0.17605633802816903)

2. Privacy v. Goffman's dialectic

NOTER_PAGE: (4 0.6139852188743604 . 0.15492957746478875)

those against whom the claim to privacy is being made.

NOTER_PAGE: (5 0.13587265491756678 . 0.40688575899843504)

European law recognises privacy in a confused manner because a perspective has developed that privacy is ‘a good thing’ rather than we have a clear notion of what it is:

NOTER_PAGE: (5 0.37293916998294485 . 0.2605633802816901)

just as someone may have desire to hide information, others have similar desire to collect information – and these desires are frequently persuasive and reasonable.

NOTER_PAGE: (5 0.7060830017055144 . 0.37089201877934275)

communication is always a manoeuvre between parties where one or both are attempting to present a certain image of themselves (their ‘self’) and others are testing that image against other factors and information:

NOTER_PAGE: (5 0.7367822626492325 . 0.7206572769953051)

In a world where everyone had Bush’s suggested total control over their information, we could have no real trust.

NOTER_PAGE: (6 0.5366685616827743 . 0.18466353677621283)

Without trust – which is an outcome of information-seeking behaviour – all social relationships will be fractured and pathological. Yet trust-building, information-seeking behaviour is antithetical to privacy: privacy denies the right to seek information.

NOTER_PAGE: (7 0.2603752131893121 . 0.5039123630672927)

privacy advocates have found it extremely difficult to define informational privacy.

NOTER_PAGE: (7 0.5008527572484366 . 0.2856025039123631)

‘balance’ is a problematic concept and one which lawyers frequently tend to use to gloss over difficulties, suggesting that it will be alright in court on the day.

NOTER_PAGE: (8 0.24587546567323043 . 0.18681318681318682)

suggests that what is really need instead is ‘steering’ – ‘some combination of regulation and self-regulation, along with better public education and the avail- ability of privacy-enhancing technologies may succeed in steering towards privacy protection’.

NOTER_PAGE: (8 0.32676955827567855 . 0.4336996336996337)

whether privacy and data protection have actually been well served by the protection system to date.

NOTER_PAGE: (8 0.4216417910447761 . 0.4981658107116655)

3. The importance of the other

NOTER_PAGE: (8 0.46731097214326317 . 0.15023474178403756)

Durkheim was seeking an ordered non-chaotic society and his term indicated such a society: one which the sociologist should remedy wherever found.

NOTER_PAGE: (8 0.5804162724692526 . 0.361328125)

privacy advocates ignore the ‘informational dance’ between parties which relate to these aspects of conflict, power and unpredictability.

NOTER_PAGE: (8 0.6438032166508988 . 0.4329427083333333)

The approach which presumes that personal control of information is the ultimate goal to be achieved is ideological rather than academic,

NOTER_PAGE: (8 0.67360454115421 . 0.3626302083333333)

privacy is currently everywhere. Even in locations where surveil- lance is total, there is a hiding of information from others

NOTER_PAGE: (9 0.13859981078524125 . 0.396484375)

despite extensive and well-funded assault on the ‘privacy’ of terrorist groups, they managed to hold their informational cards close to their chests.

NOTER_PAGE: (9 0.293282876064333 . 0.34244791666666663)

be wary of assuming that surveillance necessarily leads to totalitarian systems of control.

NOTER_PAGE: (9 0.34058656575212864 . 0.48046875)

Obviously the limitations of this method are set only by the size of the filing cards, and, theoretically, a gigantic single sheet could show the relations and cross-relationships of the entire population. And this is the utopian goal of the totalitarian secret police.’

NOTER_PAGE: (9 0.5061494796594135 . 0.19270833333333331)

Data Visualization

Most governments wish order through technology – Arendt’s view of totalitarian states is the opposite: that they wish disorder via technology since without disorder their continued existence would be in doubt. This significantly changes how we must discuss their use of technology.

NOTER_PAGE: (9 0.6433301797540208 . 0.6126302083333333)

those wishing to keep their details from a cancer registry will have a substantial effect upon the epidemiological value of that information – it has been suggested that registration falling much below 95% would make these registries worthless.

NOTER_PAGE: (9 0.7379375591296121 . 0.26041666666666663)

to utilise e-Gov effectively, the same processing methodology which is used by Equifax, dunnhumby, etc. has to be adopted.

NOTER_PAGE: (10 0.2620624408703879 . 0.6555989583333333)

Yet this is a particularly government-centred approach to the use of information: the information is passed between citizen and government and held confidentially from other citizens: this, we are told, is good governance. It clearly is not: good governance means that we know what our neighbours are up to, just as much as we know what government is up to.

NOTER_PAGE: (10 0.4210028382213813 . 0.18815104166666666)

Many believe that DNA information is ‘personal’ and can thus be controlled and indeed should be controlled. Of course, the essence of DNA information is that it reflects a biological community and information on one member of that community will surely indicate biological aspects of others.

NOTER_PAGE: (10 0.5520340586565752 . 0.34244791666666663)

It may just be that whereas print produced a mind set which emphasised the detached observationalist view (McLuhan describes it as a Cartesian outlook49) that one of the major transitions from the new electronic world is that we simply grow used to living – not without ‘privacy’ – but with a different form of privacy to that which we have become accustomed.

NOTER_PAGE: (11 0.38741721854304634 . 0.4095052083333333)

4. The rise of privacy protection: perception v. success

NOTER_PAGE: (12 0.19063386944181646 . 0.15885416666666666)

Such perceptions are naı̈ve: it would not be possible to gain credit at all unless there was some means for the seller to check the trustworthiness of the potential purchaser.

NOTER_PAGE: (13 0.3273415326395459 . 0.28580729166666663)
NOTER_PAGE: (14 0.13434247871333965 . 0.16015625)

Consent as a Free Pass: Platform Power and the Limits of the Informational Turn

posit that customers are happy to sell their personal information while at the same time complaining – in opinion surveys – about losing control of it.

NOTER_PAGE: (15 0.5004730368968779 . 0.4700520833333333)

5. The House of Lords approaches privacy

NOTER_PAGE: (16 0.4219489120151372 . 0.15885416666666666)

(a) Privacy and breach of confidence

NOTER_PAGE: (17 0.30558183538315986 . 0.16276041666666666)

breach of confidence has been taken from the commercial field and applied to underscore chosen moralities,

NOTER_PAGE: (17 0.3415326395458846 . 0.203125)

(i) Diffused presentational control

NOTER_PAGE: (18 0.1348155156102176 . 0.154296875)

puts the responsibility upon the recipient of information to control it rather than upon the holder of that information to keep it secure.

NOTER_PAGE: (18 0.18495742667928097 . 0.23697916666666666)

(ii) The ‘Gleeson test’

NOTER_PAGE: (18 0.32213812677388837 . 0.16015625)

(iii) Knowing what is ‘public’

NOTER_PAGE: (18 0.5567644276253548 . 0.15690104166666666)

In traditional commercial secrecy law, the concept of reverse engineering is an allowable method of determining the nature of a secret process or such like. So long as the information has not been derived from a source which is under an obligation of confidentiality, anyone can reverse engineer the result without problem. In privacy, this is clearly not the case: one could know that a support group meets at a given location, one could see someone leave that location and, putting two and two together (presuming one arrives at four) still not be able to inform any other person of one’s conclusion.

NOTER_PAGE: (19 0.195837275307474 . 0.64453125)

(iv) Segmentation of personality

NOTER_PAGE: (19 0.32639545884578997 . 0.16796875)

(v) Less insight, more protection

NOTER_PAGE: (19 0.5600756859035004 . 0.16015625)

The emphasis upon individual perception through expectation results in unexpected conclusions.

NOTER_PAGE: (19 0.5813623462630085 . 0.16731770833333331)

This gives more protection to the naı̈ve (and perhaps the drunk) than it gives to those with reasonable common sense.

NOTER_PAGE: (19 0.6584673604541155 . 0.31510416666666663)

greater possibility of protection to those who prefer not to understand that technology.

NOTER_PAGE: (19 0.7384105960264901 . 0.5709635416666666)

(vi) Photographs

NOTER_PAGE: (20 0.13292336802270577 . 0.15494791666666666)

(b) The moral aspects of the judgment

NOTER_PAGE: (20 0.33964049195837276 . 0.14778645833333331)
NOTER_PAGE: (20 0.40491958372753073 . 0.16015625)

should make us consider whether we want to either encourage safer roads or support privacy for drunk drivers.

NOTER_PAGE: (21 0.16887417218543047 . 0.4765625)

The privacy/anonymity model offers only a partial solution to this problem,92 since it is based on an atomised self, separated from society and only able to fully enter society when the cure is effected.

NOTER_PAGE: (21 0.6972563859981078 . 0.310546875)

‘Anonymity is bad. Everybody should be as known with their addiction as they are with their diabetes,’

NOTER_PAGE: (22 0.1357615894039735 . 0.33203125)

We should also remember that very, very few people are ever touched by large scale press intrusion.

NOTER_PAGE: (23 0.6263008514664143 . 0.2669270833333333)

6. The data protection landscape

NOTER_PAGE: (24 0.445600756859035 . 0.15625)

(a) Ignoring journalistic/community tradition

NOTER_PAGE: (24 0.6702932828760644 . 0.15169270833333331)

the fact that an individual has injured her foot and is on half-time on medical grounds constitutes personal data concerning health within the meaning of Article 8(1) of Directive 95/46’.

NOTER_PAGE: (24 0.7298959318826869 . 0.734375)

information which would be normal and perhaps expected within a printed communication passed between members of a church would contain this kind of informal chat and, presumably, would be welcomed by members of that church group.

NOTER_PAGE: (25 0.1693472090823084 . 0.267578125)

(b) Favouring capital

NOTER_PAGE: (25 0.3358561967833491 . 0.15364583333333331)

(c) Replacing employment litigation?

NOTER_PAGE: (25 0.7199621570482497 . 0.16666666666666666)

There appears to have been no complaint from data subjects whose data was being ‘abused’ or whose ‘privacy was being invaded’ and indeed it may be that due to their personal relationship that they felt that they were also in a commercial relationship with Mr Soltysik and welcomed being approached with offers by his new company: the data subjects may well have received better and cheaper service from this company, so prosecution was not necessarily in the interests of customers.113 Instead, what appears to be happening here is that the complainant was the previous employer,

NOTER_PAGE: (26 0.33774834437086093 . 0.15625)

(d) Hiding debtors?

NOTER_PAGE: (26 0.5444654683065279 . 0.15755208333333331)

(e) Whats wrong with fiduciary relationships?

NOTER_PAGE: (27 0.4205298013245033 . 0.162109375)

(f) Chilling communications?

NOTER_PAGE: (27 0.793282876064333 . 0.16796875)

rather than stopping abuse of data processing, it acts as a bar on the valid communication of information.

NOTER_PAGE: (28 0.2786187322611164 . 0.33203125)

7. On balance?

NOTER_PAGE: (28 0.33301797540208133 . 0.150390625)
NOTER_PAGE: (28 0.5458845789971618 . 0.16080729166666666)

too often the UK courts have paid more attention to the needs of the hypersensitive than to any theoretical issues:

NOTER_PAGE: (29 0.1986754966887417 . 0.5143229166666666)

The sensitivity of ‘some’ seeming to provide all the theory required to overcome any practical or social benefit which may have arisen from the collection of anonymised prescription data.

NOTER_PAGE: (29 0.3079470198675497 . 0.16666666666666666)