Computers, Privacy & the Constitution

What's Left of Privacy

-- By RickSchwartz - 07 Mar 2009

This paper is very loose update/adaptation of part of Warren and Brandeis' "The Right of Privacy," but with a more satirical approach to the development of privacy in history, given that I take the right's adoption as my starting point.


Living in a Material World

That the individual shall have full protection in privacy and personality is a principle as old as Griswold, but it has been found expedient from time to time to circumscribe the exact nature and extent of such protection. Political, social, and technological changes entail the recognition of new interests, and the Constitution, in its eternal death, has contracted to meet the new demands of government and industry. In early times, the law was fit to give protection against interference with property and communications, with places and pamphlets. The Fourth Amendment served only to secure the subject from unreasonable physical searches and seizures; privacy meant freedom from actual coercion and public exposure; the right of publicity secured to the individual the commercial exploitation of his name, image and likeness; and the right to speech only secured to the individual the the right to speak anonymously when there is no accusation of fraud. Later, there came recognition of the state's authoritarian nature, of its desire to prosecute with the most evidence available. Gradually, the scope of these rights contracted, and now the right to privacy has come to insufficiently protect only physical autonomy and seclusion only insofar as required by specific constitutional guarantees,(1) and only insofar as the government is culpable in its violation.

With the recognition of the legal value of seclusion, the protection against the invasion of the home was extended to prohibit intrusion into a physical place but still limited by the notion of "placiness". From the action of intrusion upon seclusion grew the right of privacy,(2) which barred the government's use of evidence obtained intrusively at trial.(3) Not much later, the "trespass" doctrine was replaced with the qualified "reasonable expectation of privacy." So regard for the state's "legitimate needs of law enforcement" soon extended the exception beyond the application of the rule. The reasonableness analysis, upon the assurance that the courts would "authorize the carefully limited use of electronic surveillance," prohibited physical intrusions into places where intimacy might be injured, but did not find a problem with intrusion into the intimacy itself. Occasionally the law halted, as in its refusal to exempt thermal-imaging devices from treatment as intrusions on the "curtilage" of the home. But even here, law enforcement needs were met with a mean fiction that privacy could no longer be expected once the tools of surveillance were in public use.

This development of the law was inevitable. The intensely interactive and scrutinized life, and the heightening of surveillance by private entities that came with the advance of networks, made it clear to men that only a part of a person's identity lay within physical seclusion. Observed thoughts, queries, and activity demanded economic exploitation, and the capacity for deference in the common law required judges to uphold a scheme requiring only a simple waiver of the protections against misappropriation of identity and disclosure of private facts enabled by the interposition of the legislature.(4)

Such technologies and business methods call attention to the last step that has been taken toward the unraveling of privacy. The private subpoena strategy of circumvention was developed, and corporate data miners became a part of the state’s legal strategy of surveillance and obtaining admissible evidence.


 

Notes

1 : Consistent with Robert Bork's critique of Griswold v. Connecticut, courts have begun withdrawing the extent of privacy protections absent a "reasonable expectation of privacy" which usually requires the independent invocation of some specifically enumerated constitutional right, such as the First, Third, Fourth, Fifth, or Ninth Amendment, upon which the "zone of privacy" was premised.

2 : Prosser refined Warren and Brandeis' thesis and argued that "the right to privacy" could be found from the recognition of four separate torts (appropriation of identity, casting a false light in the public eye, public disclosure of private facts, and intrusion upon solicitude), all unified by the underlying "right to be left alone."

3 : Frustrated by this limitation, a federalist exemption to privacy, known as the silver-platter rule, was forged to allow the federal government to use the fruits of forbidden intrusions by state actors until 1960.

4 : See, e.g., Nat'l Cable & Telecomms. Ass'n v. FCC, 2009 U.S. App. LEXIS 2828, at *14 (D.C. Cir. 2009) (noting that "It is widely accepted that privacy deals with determining for oneself when, how and to whom personal information will be disclosed to others," while upholding the FCC's opt-in scheme of customer information collection enacted under the authority 47 U.S.C. 222). Though the opt-in system may enable some subscribers to protect the disclosure of their private information to third parties, it seems likely that this scheme will not result in significantly greater privacy protection than the pre-existing scheme. See 22 F.C.C.R. 6927, *65 n.117 (2007) ("We do not believe that this minor change to our rules will have a major effect on carriers because many carriers already do not disclose CPNI to third parties."). Furthermore, assuming such rights against misappropriation of identity and public exposure of private facts may be voluntarily sold or waived by such a procedure, data collection often results in the violation of the rights belonging to parties who do not so waive these rights by process of elimination or inference (e.g., information about the person called is also collected by virtue of the caller).


Navigation

Webs Webs

r3 - 07 Mar 2009 - 23:00:50 - RickSchwartz
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM