Privacy in Cyberspace: Constructing a Model of Privacy for the Electronic Communications Environment

By Byford, Katrin Schatz | Rutgers Computer & Technology Law Journal, Spring 1998 | Go to article overview

Privacy in Cyberspace: Constructing a Model of Privacy for the Electronic Communications Environment


Byford, Katrin Schatz, Rutgers Computer & Technology Law Journal


I. INTRODUCTION

Ever since Samuel D. Warren and Louis D. Brandeis published their seminal article on the fight to privacy more than a century ago,(1) the contours of privacy both as a moral-philosophical concept and as a legal fight have been subject to persistent scholarly scrutiny and debate. At no time have privacy issues taken on greater significance than in recent years, as technological developments have led to the emergence of an "information society" capable of gathering, storing, and disseminating increasing amounts of data about individual citizens. Whether the collection and subsequent use of this information should be regulated and controlled, and, if so, what regulatory mechanisms should be created, are hotly contested issues within the legal community, as well as in the public and media.

Despite the importance attributed to privacy by the general public and many legal scholars, a unified theory of privacy, whether legal or philosophical in nature, has yet to emerge. For Warren and Brandeis, the fight to privacy represented simply the "right to be left alone,"(2) which in 1890 translated into restrictions on the freedom of the press. Over the past century, the "right to be left alone" has developed into four separate common law privacy torts which provide individuals with certain limited protections.(3) Constitutional privacy law, by comparison, has come to focus on limiting the scope of governmental intrusion into a person's private life and personal decision-making.(4) Isolated pockets of privacy rights have also materialized as both state and federal lawmakers have placed various narrowly delimited restrictions on the ability of governmental and private organizations to gather, maintain, and distribute personal information.(5) Statutory and decisional privacy law alike have developed in an erratic and haphazard fashion; no single theory of privacy, nor even a consistent set of theories, has informed this process. Thus, Dean Prosser's remark more than thirty years ago that the rise of common law privacy has gone on "without any plan, without much realization of what is happening or its significance, and without any consideration of its dangers,"(6) continues to hold true today and aptly characterizes the evolution of privacy law as a whole.

Yet, the need for some measure of uniformity in legal privacy theory and privacy law has never been greater. Privacy issues arise with increasing frequency in such diverse areas as media coverage of personal or quasi-public matters,(7) electronic surveillance in the workplace, and data collection by banks, credit bureaus, and other institutions. One area in which such privacy debate is now beginning to take shape is the emergent world of electronic communications networks. This article focuses on privacy issues relating to electronic communication networks where the tension between individual privacy rights and commercial interests in free information access is coming sharply into focus.

The article rests on the premise that a body of privacy law which develops without the benefit of a unified theory of privacy will prove questionable at best. Only by deciding a priori what it is that matters about privacy, and by establishing a comprehensive set of policy guidelines will we be able to adapt our privacy laws to a rapidly changing socioeconomic context. This article draws on philosophy and social science research in an effort to develop a theory of privacy that may inform the development of a legal right to privacy in the newly emerging social order of electronic networks.

Part II of this article seeks to construct a theoretical model of privacy which incorporates privacy's moral value and its broader social function and meaning. That model conceives of privacy not merely as a means of enabling the individual to create and maintain a coherent self-construct, but also as a foundation for negotiating the content of social relationships and for distributing social and political power. …

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Privacy in Cyberspace: Constructing a Model of Privacy for the Electronic Communications Environment
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.