How is Political Privacy Different from Personal Privacy? An Argument from Democratic Governance

Main Article Content

Aleksandra Samonek
https://orcid.org/0000-0002-5742-7190

Abstract

In this paper I discuss the political value of the right to privacy. The classical accounts of privacy do not differentiate between privacy as the right of a citizen against other citizens vs. the right to privacy as the right against the state or the government. I shall argue that this distinction should be made, since the new context of the privacy debate has surpassed the historical frames in which the intelligence methods used by governments were comparable to those available to individuals. I also present cases in which political privacy serves as an instrument of protecting important collective agendas exceeding the context of personal privacy. I argue that due to its function, political privacy should be considered a necessary element of democratic governance with the rule of law, imposing legal bounds on governments’ discretionary actions.

Downloads

Download data is not yet available.

Article Details

How to Cite
Samonek, Aleksandra. (2021) 2021. “How Is Political Privacy Different from Personal Privacy? An Argument from Democratic Governance”. Diametros 18 (70):64-77. https://doi.org/10.33392/diam.1544.
Section
Articles
Share |

References

Allen A.L. (1988), Uneasy Access: Privacy for Women in a Free Society, Rowman & Littlefield Publishers, Totowa.
View in Google Scholar

Beardsley E. (1971), “Privacy: Autonomy and Selective Disclosure,” NOMOS. Yearbook of the American Society for Political and Legal Philosophy XIII: Privacy: 56–70.
View in Google Scholar

Benn S.I., Gaus G.F. (eds.) (1983), Public and Private in Social Life, St. Martin’s Press, New York.
View in Google Scholar

Carrera S., Fuster G.G., Guild E. et al. (2015), Access to Electronic Data by Third-Country Law Enforcement Authorities. Challenges to EU Rule of Law and Fundamental Rights, CEPS, Bruxelles.
View in Google Scholar

Creemers R. (2018), “China’s Social Credit System: An Evolving Practice of Control,” URL = https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3175792 [Accessed 18.11.2021].
View in Google Scholar

Engelstein L. (1993), “Combined Underdevelopment: Discipline and the Law in Imperial and Soviet Russia,” The American Historical Review 98 (2): 338–353.
View in Google Scholar

Gavison R. (1980), “Privacy and the Limits of Law,” The Yale Law Journal 89 (3): 421–471.
View in Google Scholar

Gillis A.R. (1989), “Crime and State Surveillance in Nineteenth-Century France,” American Journal of Sociology 95 (2): 307–341.
View in Google Scholar

Hassine W.B. (2016), “The Crime of Speech: How Arab Governments Use the Law to Silence Expression Online,” Electronic Frontier Foundation Report, URL = https://www.eff.org/fi les/2016/04/28/crime-of-speech.pdf [Accessed 12.12.2017].
View in Google Scholar

Johnson D.G. (1985), Computer Ethics, [in:] L. Floridi, The Blackwell Guide to the Philosophy of Computing and Information, Blackwell Publishing, Malden.
View in Google Scholar

Lazer D.M., Baum M.A., Benkler Y. et al. (2018), “The Science of Fake News,” Science 359 (6380): 1094–1096.
View in Google Scholar

Levy M.A. (1995), “Is the Environment a National Security Issue?,” International Security 20 (2): 35–62.
View in Google Scholar

Meillassoux M. (2017), “Nothing to Hide,” a documentary film, URL = https://nothingtohidedoc.wordpress.com/ [Accessed 1.11.2017].
View in Google Scholar

Moor J.H. (1990), “The Ethics of Privacy Protection,” Library Trends 39 (1 and 2): 69–82.
View in Google Scholar

Moor J.H. (1997), “Towards a Theory of Privacy in the Information Age,” ACM SIGCAS Computers and Society 27 (3): 27–32.
View in Google Scholar

Newman J. (2009), “Google’s Schmidt Roasted for Privacy Comments,” URL = https://www.pcworld.com/article/184446/googles_schmidt_roasted_for_privacy_comments.html [Accessed 15.11.2017].
View in Google Scholar

O’Donnell G.A. (2004), “Why the Rule of Law Matters,” Journal of Democracy 15 (4): 32–46.
View in Google Scholar

OHCHR (2016), “UN Rights Experts Urge France to Protect Fundamental Freedoms while Countering Terrorism,” OHCHR Press Release, URL = https://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?LangID=E&NewsID=16966 [Accessed 18.11.2021].
View in Google Scholar

Parent W.A. (1983), “Privacy, Morality, and the Law,” Philosophy & Public Affairs 12 (4): 269–288.
View in Google Scholar

Porter A.J., Hellsten I. (2014), “Investigating Participatory Dynamics through Social Media Using a Multideterminant “Frame” Approach: The Case of Climategate on YouTube,” Journal of Computer-Mediated Communication 19 (4): 1024–1041.
View in Google Scholar

Przeworski A., Maravall J.M. (eds.) (2003), Democracy and the Rule of Law, vol. 5, Cambridge University Press, Cambridge.
View in Google Scholar

Rachels J. (1975), “Why Privacy is Important,” Philosophy & Public Affairs 4 (4): 323–333.
View in Google Scholar

Reingold D.A. (1999), “Social Networks and the Employment Problem of the Urban Poor,” Urban Studies 36 (11): 1907–1932.
View in Google Scholar

Raz J. (1977), “The Rule of Law and its Virtue,” Law Quarterly Review 93 (2): 195–211.
View in Google Scholar

Rindfleisch T. (1997), “Privacy, Information Technology, and Health Care,” Communications of the ACM 40 (8): 92–101.
View in Google Scholar

Sauer N. (2019), “French Counter-Terrorism Targets Climate Activists,” URL = https://theecologist.org/2019/apr/04/french-counter-terrorism-targets-climate-activists [Accessed 12.12.2019].
View in Google Scholar

Silverglate H. (2011), Three Felonies a Day: How the Feds Target the Innocent, Encounter Books, New York, London.
View in Google Scholar

Scalia A. (1989), “The Rule of Law as a Law of Rules,” The University of Chicago Law Review 56 (4): 1175–1188.
View in Google Scholar

Schoeman D.F. (ed.) (1984), Philosophical Dimensions of Privacy: An Anthology, Cambridge University Press, Cambridge.
View in Google Scholar

Sprenger P. (1999), “Sun on Privacy: ‘Get Over It’,” URL = https://www.wired.com/1999/01/sun-on-privacy-get-over-it/ [Accessed 22.12.2017].
View in Google Scholar

Tamanaha B.Z. (2004), On the Rule of Law: History, Politics, Theory, Cambridge University Press, Cambridge.
View in Google Scholar

Tavani H.T., Moor J.H. (2001), “Privacy Protection, Control of Information, and Privacy-Enhancing Technologies,” ACM SIGCAS Computers and Society 31 (1): 6–11.
View in Google Scholar

Taylor I. (2017), “Data Collection, Counterterrorism and the Right to Privacy,” Politics, Philosophy & Economics 16 (3): 326–346.
View in Google Scholar

Tréguer, F. (2016), “From deep state illegality to law of the land: The case of internet surveillance in France,” URL = https://halshs.archives-ouvertes.fr/halshs-01306332/file/Tr%C3%A9guer%20-%20French%20Intelligence%20Reform%20%28draft%29.pdf [Accessed 25.11.2019].
View in Google Scholar

Viseu A., Clement A., Aspinall J. (2004), “Situating Privacy Online: Complex Perceptions and Everyday Practices,” Information, Communication & Society 7 (1): 92–114.
View in Google Scholar

Vogel E.A., Rose J.P., Roberts L.R. et al. (2014), “Social Comparison, Social Media, and Self-Esteem,” Psychology of Popular Media Culture 3 (4): 206–222.
View in Google Scholar

Warren S., Brandeis L. (1984), “The Right to Privacy,” [in:] F.D. Schoeman (ed.), Philosophical Dimensions of Privacy: An Anthology, Cambridge University Press, New York.
View in Google Scholar

Westin A.F. (1968), “Privacy and Freedom,” Washington and Lee Law Review 25 (1): 166.
View in Google Scholar

Westin A.F. (2003), “Social and Political Dimensions of Privacy,” Journal of Social Issues 59 (2): 431–453.
View in Google Scholar

Wolfers A. (1952), “’National Security’ as an Ambiguous Symbol,” Political Science Quarterly 67 (4): 481–502.
View in Google Scholar

Zelikow P. (2003), “The Transformation of National Security: Five Redefinitions,” The National Interest 71: 17–28.
View in Google Scholar

Zhang H., Shu Y., Cheng P. et al. (2016), “Privacy and Performance Trade-Off in Cyber-Physical Systems,” IEEE Network 30 (2): 62–66.
View in Google Scholar

Zuboff S. (2019), The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power, Pluto Press, New York.
View in Google Scholar