How is Political Privacy Different from Personal Privacy? An Argument from Democratic Governance
Main Article Content
Abstract
In this paper I discuss the political value of the right to privacy. The classical accounts of privacy do not differentiate between privacy as the right of a citizen against other citizens vs. the right to privacy as the right against the state or the government. I shall argue that this distinction should be made, since the new context of the privacy debate has surpassed the historical frames in which the intelligence methods used by governments were comparable to those available to individuals. I also present cases in which political privacy serves as an instrument of protecting important collective agendas exceeding the context of personal privacy. I argue that due to its function, political privacy should be considered a necessary element of democratic governance with the rule of law, imposing legal bounds on governments’ discretionary actions.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
By submitting his/her work to the Editorial Board, the author accepts, upon having his/her text recommended for publication, that Diametros applies the Attribution 4.0 International (CC BY 4.0) license to the works we publish. Under this license, authors agree to make articles legally available for reuse, without permission or fees. Anyone may read, download, copy, print, distribute or reuse these articles without asking prior permission from the publisher or the author, as long as the author and original source are properly cited. The author holds the copyright without any other restrictions. Full information about CC-BY: https://creativecommons.org/licenses/by/4.0/legalcode.
References
Allen A.L. (1988), Uneasy Access: Privacy for Women in a Free Society, Rowman & Littlefield Publishers, Totowa.
Beardsley E. (1971), “Privacy: Autonomy and Selective Disclosure,” NOMOS. Yearbook of the American Society for Political and Legal Philosophy XIII: Privacy: 56–70.
DOI: https://doi.org/10.4324/9781315127439-3
Benn S.I., Gaus G.F. (eds.) (1983), Public and Private in Social Life, St. Martin’s Press, New York.
Carrera S., Fuster G.G., Guild E. et al. (2015), Access to Electronic Data by Third-Country Law Enforcement Authorities. Challenges to EU Rule of Law and Fundamental Rights, CEPS, Bruxelles.
Creemers R. (2018), “China’s Social Credit System: An Evolving Practice of Control,” URL = https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3175792 [Accessed 18.11.2021].
DOI: https://doi.org/10.2139/ssrn.3175792
Engelstein L. (1993), “Combined Underdevelopment: Discipline and the Law in Imperial and Soviet Russia,” The American Historical Review 98 (2): 338–353.
DOI: https://doi.org/10.2307/2166836
Gavison R. (1980), “Privacy and the Limits of Law,” The Yale Law Journal 89 (3): 421–471.
DOI: https://doi.org/10.2307/795891
Gillis A.R. (1989), “Crime and State Surveillance in Nineteenth-Century France,” American Journal of Sociology 95 (2): 307–341.
DOI: https://doi.org/10.1086/229271
Hassine W.B. (2016), “The Crime of Speech: How Arab Governments Use the Law to Silence Expression Online,” Electronic Frontier Foundation Report, URL = https://www.eff.org/fi les/2016/04/28/crime-of-speech.pdf [Accessed 12.12.2017].
Johnson D.G. (1985), Computer Ethics, [in:] L. Floridi, The Blackwell Guide to the Philosophy of Computing and Information, Blackwell Publishing, Malden.
Lazer D.M., Baum M.A., Benkler Y. et al. (2018), “The Science of Fake News,” Science 359 (6380): 1094–1096.
DOI: https://doi.org/10.1126/science.aao2998
Levy M.A. (1995), “Is the Environment a National Security Issue?,” International Security 20 (2): 35–62.
DOI: https://doi.org/10.2307/2539228
Meillassoux M. (2017), “Nothing to Hide,” a documentary film, URL = https://nothingtohidedoc.wordpress.com/ [Accessed 1.11.2017].
Moor J.H. (1990), “The Ethics of Privacy Protection,” Library Trends 39 (1 and 2): 69–82.
Moor J.H. (1997), “Towards a Theory of Privacy in the Information Age,” ACM SIGCAS Computers and Society 27 (3): 27–32.
DOI: https://doi.org/10.1145/270858.270866
Newman J. (2009), “Google’s Schmidt Roasted for Privacy Comments,” URL = https://www.pcworld.com/article/184446/googles_schmidt_roasted_for_privacy_comments.html [Accessed 15.11.2017].
O’Donnell G.A. (2004), “Why the Rule of Law Matters,” Journal of Democracy 15 (4): 32–46.
DOI: https://doi.org/10.1353/jod.2004.0076
OHCHR (2016), “UN Rights Experts Urge France to Protect Fundamental Freedoms while Countering Terrorism,” OHCHR Press Release, URL = https://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?LangID=E&NewsID=16966 [Accessed 18.11.2021].
Parent W.A. (1983), “Privacy, Morality, and the Law,” Philosophy & Public Affairs 12 (4): 269–288.
Porter A.J., Hellsten I. (2014), “Investigating Participatory Dynamics through Social Media Using a Multideterminant “Frame” Approach: The Case of Climategate on YouTube,” Journal of Computer-Mediated Communication 19 (4): 1024–1041.
DOI: https://doi.org/10.1111/jcc4.12065
Przeworski A., Maravall J.M. (eds.) (2003), Democracy and the Rule of Law, vol. 5, Cambridge University Press, Cambridge.
DOI: https://doi.org/10.1017/CBO9780511610066
Rachels J. (1975), “Why Privacy is Important,” Philosophy & Public Affairs 4 (4): 323–333.
Reingold D.A. (1999), “Social Networks and the Employment Problem of the Urban Poor,” Urban Studies 36 (11): 1907–1932.
DOI: https://doi.org/10.1080/0042098992674
Raz J. (1977), “The Rule of Law and its Virtue,” Law Quarterly Review 93 (2): 195–211.
Rindfleisch T. (1997), “Privacy, Information Technology, and Health Care,” Communications of the ACM 40 (8): 92–101.
DOI: https://doi.org/10.1145/257874.257896
Sauer N. (2019), “French Counter-Terrorism Targets Climate Activists,” URL = https://theecologist.org/2019/apr/04/french-counter-terrorism-targets-climate-activists [Accessed 12.12.2019].
Silverglate H. (2011), Three Felonies a Day: How the Feds Target the Innocent, Encounter Books, New York, London.
Scalia A. (1989), “The Rule of Law as a Law of Rules,” The University of Chicago Law Review 56 (4): 1175–1188.
DOI: https://doi.org/10.2307/1599672
Schoeman D.F. (ed.) (1984), Philosophical Dimensions of Privacy: An Anthology, Cambridge University Press, Cambridge.
DOI: https://doi.org/10.1017/CBO9780511625138
Sprenger P. (1999), “Sun on Privacy: ‘Get Over It’,” URL = https://www.wired.com/1999/01/sun-on-privacy-get-over-it/ [Accessed 22.12.2017].
Tamanaha B.Z. (2004), On the Rule of Law: History, Politics, Theory, Cambridge University Press, Cambridge.
DOI: https://doi.org/10.1017/CBO9780511812378
Tavani H.T., Moor J.H. (2001), “Privacy Protection, Control of Information, and Privacy-Enhancing Technologies,” ACM SIGCAS Computers and Society 31 (1): 6–11.
DOI: https://doi.org/10.1145/572277.572278
Taylor I. (2017), “Data Collection, Counterterrorism and the Right to Privacy,” Politics, Philosophy & Economics 16 (3): 326–346.
DOI: https://doi.org/10.1177/1470594X17715249
Tréguer, F. (2016), “From deep state illegality to law of the land: The case of internet surveillance in France,” URL = https://halshs.archives-ouvertes.fr/halshs-01306332/file/Tr%C3%A9guer%20-%20French%20Intelligence%20Reform%20%28draft%29.pdf [Accessed 25.11.2019].
Viseu A., Clement A., Aspinall J. (2004), “Situating Privacy Online: Complex Perceptions and Everyday Practices,” Information, Communication & Society 7 (1): 92–114.
DOI: https://doi.org/10.1080/1369118042000208924
Vogel E.A., Rose J.P., Roberts L.R. et al. (2014), “Social Comparison, Social Media, and Self-Esteem,” Psychology of Popular Media Culture 3 (4): 206–222.
DOI: https://doi.org/10.1037/ppm0000047
Warren S., Brandeis L. (1984), “The Right to Privacy,” [in:] F.D. Schoeman (ed.), Philosophical Dimensions of Privacy: An Anthology, Cambridge University Press, New York.
Westin A.F. (1968), “Privacy and Freedom,” Washington and Lee Law Review 25 (1): 166.
Westin A.F. (2003), “Social and Political Dimensions of Privacy,” Journal of Social Issues 59 (2): 431–453.
DOI: https://doi.org/10.1111/1540-4560.00072
Wolfers A. (1952), “’National Security’ as an Ambiguous Symbol,” Political Science Quarterly 67 (4): 481–502.
DOI: https://doi.org/10.2307/2145138
Zelikow P. (2003), “The Transformation of National Security: Five Redefinitions,” The National Interest 71: 17–28.
Zhang H., Shu Y., Cheng P. et al. (2016), “Privacy and Performance Trade-Off in Cyber-Physical Systems,” IEEE Network 30 (2): 62–66.
DOI: https://doi.org/10.1109/MNET.2016.7437026
Zuboff S. (2019), The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power, Pluto Press, New York.