Conc e p ti on s of P riva c y a nd
the Values of Privacy
Living in the IT Era
Presented by GROUP 1
THE TEAM
Cj Vincent
Lien Jenny
James
Jonh Paul Lady Lee Kyla Alyssa
PRIVACY
Privacy is a value that people in the world today hold in high
esteem. Traditionally, the value of privacy was based on the
strong belief that each individual deserves the right to be left
alone and the right to choose what he/she wants to disclose to
other people. The concept of privacy has become significantly
complicated in the digital age.
LADY LEE
PRIVACY
“Privacy is a value so complex, so entangled in competing and
contradictory dimensions, so engorged with various and distinct
meanings, that I sometimes despair whether it can be usefully
addressed at all.”
Robert C. Post, Three Concepts of Privacy, 89 Geo. L.J. 2087
(2001)
PRIVACY AS CONCEPT
What is it
How and why is it Valued
PRIVACY AS RIGHT
How it is (or should be) protected
OTHER DEF. OF PRIVACY
• PERSONHOOD By Law
• INTIMACY
• SECRECY
• CONTEXTUAL INTEGRITY By Policy
• LIMITED ACCESS TO THE SELF
• CONTROL OVER By Technology
INFORMATION
Control over information “Privacy is the claim of individuals, groups or
institutions to determine for themselves when, how, and to what extent
information about them is communicated to others.” “…each individual is
continually engaged in a personal adjustment process in which he balances
the desire for privacy with the desire for disclosure and communication….”
Alan Westin, Privacy and Freedom, 1967
KYLA MAE
Realizing limited access and control
• Limited access – Laws to prohibit or limit collection, disclosure, contact –
Technology to facilitate anonymous transactions, minimize disclosure
• Control – Laws to mandate choice (opt-in/opt-out) – Technology to
facilitate informed consent, keep track of and enforce privacy preferences
WESTIN’S FOUR STATES OF PRIVACY
SOLITUDE - Individual separated form the group and freed
form the observation of other persons
INTIMACY - Individual is part of a small unit
ANONYMITY- Individual in public but still seeks and finds freedom from
identification and surveillance
RESERVE - The creation of a psychological barrier against unwanted intrusion –
holding back communication
JAMES
WESTIN’S FOUR FUNCTIONS OF PRIVACY
PERSONAL AUTONOMY
Control when you go public about info
EMOTIONAL RELEASE
- Be yourself
- Permissible deviations to social or institutional norms
SELF – EVALUATION
LIMITED AND PROTECTED COMMUNICATION
Information vs. decisional privacy
• Information privacy concerns the collection, use, and
disclosure of personal information
• Decisional privacy concerns the freedom to make decisions
about one's body and family
VINCENT
Privacy is a well-known subject for quite a few years and yet
very few have a better understanding fully. Privacy is an
essential element for maintaining humanity and social
responsibilities and relationships. Humans value their privacy
and protection of personal data.
Recent technological advances and corporate giants'
competition to expand the market threaten individual privacy
more than ever. The 21st century brought Big Data and
sophisticated information technology, which made data
access and processing easier.
Many researchers said the worries that threaten privacy and
security are now real because we can access, collect, and
analyze large amounts of data from internet searches,
telephone calls, electronic payments, and personal
information breached by various government agencies, and
business firms can use this data to expand their market.
LIEN MAR
Privacy is still a major issue to discuss and rewrite
regulations, agreements, and ethics for a better world
(Santanen, 2019).
THE VALUE OF PRIVACY
Privacy and cutting-edge technology like genetics, biometrics,
social media, smart phones, cybersecurity, Big Data, and search
engines go hand in hand. Technology's impact on privacy and
personal information has two reactions. The first is that the IT
industry holds all our data, implying that we have no privacy in
the digital era and no way to defend it.
JENNY
THE VALUE OF PRIVACY
Second, privacy and personal data are more vital than ever
(Hoven,2014). Technology is ingrained in our lives. Privacy
helps us develop relationships with family and friends by letting
us keep aspects of ourselves private. 91% of adults own a
smartphone or laptop, and the amount of personal data saved in
them is growing.
legal conceptions of privacy
Prosser Four Torts
Intrusion – Intruding (physically or otherwise) upon the solitude of
another in a highly offensive manner.
Ex. A woman sick in the hospital with a rare disease refuses a
reporter’s request for a photograph and interview. Then the reporter
photographs her anyway, over her objection.
CEEJAY
Private Facts – publicizing highly offensive private information about
someone which is not of legitimate concern to the public
Ex. Photographs of an undistinguished and wholly private hardware merchant
carrying on an adulterous affair in a hotel room are published in a magazine.
ion.
False light - publicizing a highly offensive and false impression of
another.
For example: a taxi driver’s photograph is used to illustrate a
newspaper article on cabdrivers who cheat the public when the driver
in the photo is not, in fact, a cheat.
Appropriation – using another’s name or likeness for some
advantage without the other’s consent.
For example: a photograph of a famous actress is used without her
consent to advertise a product.
Thus the concept of privacy is best understood as a concern for
limited accessibility and one has perfect privacy when one is
completely inaccessible to others. Privacy can be gained in three
independent but interrelated ways: through secrecy, when no one
has information about one, through anonymity, when no one
pays attention to one, and through solitude, when no one has
physical access to one.
ALYSSA
The desire for personal space predates modern humanity. Despite the
difficulty in providing definitive proof for this claim, anthropological,
biological, and sociological research all point to a consistent theme:
people have always wanted some degree of privacy, from the first
human communities to the wildest animals (Westin 1984, p. 56-74).
Methods of establishing physical boundaries and avoiding unnecessary
interaction between members of different social groups exist in nearly
every society, ancient and modern alike (Wagner DeCew 1997, p. 12).
Understanding the motivations behind the use of these strategies and the
interests they are designed to safeguard requires an examination of the
social context in which they are being employed.
JOHN PAUL
Someone who never leaves their home has no need for personal space.
Taking this into account, we can determine that privacy has value only
when there are more than two people involved. Thus, the meaning of
privacy varies greatly from one group and culture to the next. We each have
our own unique cultural, philosophical, and political perspectives that shape
how we understand and value privacy. Privacy serves a number of important
purposes in contemporary life, and this has prompted a wide range of
different ways of thinking about privacy.
Alan
Westin’sPrivacy and
Freedom
• PRIVACY AS PRE-REQUISITE
FOR PERSONA AUTONOMY
• EMOTIONAL RELEASE
• LIMITED AND PROTECTED
COMMUNICATION
• SELF EVALUATION
• PRIVACY TO MINIMIZE
BURDEN
In today's interconnected society, many people would give anything for a little
privacy. Historically, the importance of privacy was grounded in the idea that
everyone should be allowed some alone time and the freedom to decide what
information about themselves to share with others. In today's highly connected
world, the very idea of privacy has become convoluted.
JENNY
• PRIVACY AS PRE REQUISITE FOR PERSONAL AUTONOMY
Some believe that freedom of choice requires privacy. Privacy begins with this
individualist philosophy. Democratic cultures emphasize individuality, dignity, and
worth, and they safeguard these principles (Westin 1967, p. 33). The protection of
one's independence and identity requires the provision of a personal refuge from
the prying eyes of others.
An individual's "inner sanctum of the self" is where they can be alone with their
thoughts and feelings. A person is subject to criticism and judgment from others
without the psychological shield of privacy. Unwarranted (internal) body searches,
public presentation of private conduct or abnormalities, and home invasions violate
our sense of human dignity (Bloustein 1984, p. 156). Privacy protects from prying
eyes. Invasion of your privacy degrades your humanity (Marx 2001, p. 157).
Autonomy defines a person. Understanding is power. Thus, more information
about a person gives me more control over them. Privacy limits government and
other access to our data by creating a secure private space. The right to privacy
limits the power of others, especially the state. Thus, personal space opposes
central authority.
2. EMOTIONAL RELEASE
Privacy also facilitates emotional discharge. Most people have private and public
selves. Because public self-representation differs from private self-representation.
. Depending on audience and situation, we all play different characters and show
different sides of ourselves (Goffman 1959, p. 55-57). For instance, our behavior with
family and friends may differ from our professional behavior.
CEEJAY
As vital as these "masks" are for social interaction, it is essential for our mental health
to be able to let them down occasionally and be entirely ourselves, including all the
ill-mannered parts we generally hide from the outer world. Privacy allows emotional
discharge (Westin 1967, p. 36), giving us a break from social interaction. This privacy
idea also allows social limits. Rosen (2000, p. 20) defines privacy as a social border
that prevents us from being simplified, objectified, and assessed out of context.
Without our consent, private information might be taken out of context and used to
assess our character. Rosen (2004, p. 161) emphasizes privacy when appraising a
person:
“It is impossible to know someone based on snatches of information, real
knowledge is something that can be attained only slowly, over time, behind a
shield of seclusion, with the handful of people to whom we've chosen to disclose
ourselves whole. Even those who know us best may not understand all our
complexities.”
Recording text, sound, and image makes selective (mis)interpretation worse.
Searchable digital records can easily manipulated.
3. LIMITED AND PROTECTED COMMUNICATION
Third, privacy limits and protects communication. If we always said what we
thought or felt, polite social interaction would be impossible. This is not a call for
structural dishonesty sanctioned by privacy. We rely on discretion when
interacting with others. If we always said what we thought about someone, we
would hurt or upset many individuals. This also applies to discussing people when
they are absent.
ALYSSA
We sometimes talk about someone to express our anger or irritation, which they
may not enjoy. Privacy lets us express our feelings without worrying about
offending others.
Since outside parties, including government agencies, cannot monitor our
communication, limited and shielded communication limits power. Without
communication protection, we could not express our opinions on the government
without fear of being prosecuted for libel.
4. SELF EVALUATION
Every person must make sense of his experiences and express his originality
(Westin 1967, p. 36). We need time alone to consider things out. Self-reflection
requires privacy. We can only template (1) our behavior and that of others, (2)
events, and (3) thoughts when we are genuinely alone. We couldn't process all the
information without privacy. Privacy also gives us time to establish, formulate,
and assess our thoughts and arguments. Without privacy, ideas, arguments, and
creativity cannot mature.
KYLA
5. PRIVACY TO MINIIZE BURDEN
Last, privacy is a tool to reduce strain. Outside forces disrupt our privacy.
Frequently occurring disturbances can be a nuisance and even a hardship. Thus,
privacy should be respected. The right to privacy protects us from these
burdensome intrusions. Legitimate disturbances should not burden the individual.
Spam illustrates this privacy principle. Privacy laws in the Netherlands and the
US protect individuals from spam since it burdens them.
LADY
There are two major findings regarding one's privacy that have been agreed
upon by many researchers. First, privacy is essential for people to feel good
about themselves, and second, it helps people keep the relationships that are
the foundation of a flourishing society.
There would be less of a distinction between relationships if there was no
such thing as privacy, which would have a negative impact on people's
ability to be social and loving with one another.
LIEN MAR
Humanity's long-term survival depends on recognizing the importance of
people' right to privacy and security and taking measures to ensure that
such rights are respected. Once private information is shared publicly, it can
never be recovered.
There have always been dangers to personal privacy, but the exponential
development of the technologies that are now ubiquitous poses the greatest
risk to humankind.
Rapid expansion of data-related marketing can be attributed to the ever-
increasing capabilities and processing capacity of devices that monitor our
every move and process and record most of the data specifics of our life.
This data is processed, analyzed for trends, and then shared with anyone
willing to pay for the data. This is the greatest threat that has the capacity to
ruin society and the human experience forever. There hasn't been much
work done to address the void in privacy-related policy. The possibility is
certainly there, and we need to give careful thought to how our society
closes the policy gaps that technology has exposed so that we can all live in
peace (Santanen, 2019).
Data protection is critical and complicated. Data protection has become
crucial as technology has advanced over the past two decades. Technology
and information dominate the corporate world. The upside is market
openness, which informs customers about business models and trade
opportunities and allows everyone to stay informed.
The downside of this technology is socio-techno risk, which has grown
with technology and users (e.g., cyberterrorism, identity theft, warfare
on information, online frauds) and organized social crime to exploit
personal information. Data protection is crucial now.
The requirement to secure personal data is a key aspect in developing
and implementing data privacy policies, guidelines, and standards that
operate well with advanced technology to prevent data privacy threats.
Policies and laws must be efficient, ethical, economically sound, and
universally accepted. This is crucial because difficulties arise after these
policies or regulations are implemented.
With current socio-techno advances to process and store vast amounts of
data through internet usage, data privacy protection is complex and vital.
Figure 1 depicts information privacy for diverse environments in three
dimensions, including time, where data is computed for analysis and
market processing. Privacy and data security for web browsing and
social media. Space deals with data privacy.