Unpopular Privacy: What Must We Hide?

By Anita L. Allen | Go to book overview

7
THE ELECTRONIC DATA GIVE-AWAY

It is difficult scientifically to measure such a thing, but the taste for privacy seems to be dwindling. Or maybe, before electronic technology entered our lives, informational privacy was just a happenstance fact of life rather than a passion. Whatever the state of taste, I believe that mature adults, young adults, teens, and children, have privacy and data protection needs of which they may fail to be fully mindful or feel helpless to address on their own. With this in mind, consider the vast sweep of existing privacy and data protection statutes adopted by Congress, nearly all of which permits adults to waive or alienate their privacy rights. We have a great deal of privacy law aimed at regulating the flow of information, but only a small portion of it functions to protect the privacy people do not care or take care to protect. We are allowed to give privacy away.

Congress has enacted dozens of privacy protection statutes, resulting in a rich sectorby-sector patchwork quilt of special-purpose rules. (Congress has not followed the approach of the European Union, which has enacted several comprehensive multisector data-directives. In chapter 5, I described the Health Insurance Portability and Accountability Act (HIPAA), the federal health privacy statute. In chapter 8, I will assess the Children’s Online Privacy Protection Act (COPPA), a paternalistic statute designed to protect the informational privacy of young children and their households; and by way of comparison to COPPA, I will highlight features of other statutes—the Privacy Act of 1974, the Family Education and Right to Privacy Act of 1974, and the Video Privacy Act of 1988. Along with chapter 8, the present chapter explains why and how privacy laws matter, exploring the social and ethical significance of real and imagined technologies propelling the on-going phenomenon I call “the great privacy give-away.”


THE FEDERAL PRIVACY STATUTES

A complete list of major privacy protection laws enacted by Congress would include, chronologically: the Fair Credit Reporting Act (1970), regulating confidential credit reports; the Privacy Act (1974), regulating access to federal records; the Freedom of Information Act (FOIA, 1974), including privacy exemptions to a federal open records law; the Family Educational Rights and Privacy Act (FERPA, 1974), regulating access to school records; the Right to Financial Privacy Act (1978), regulating access to banking

-156-

Notes for this page

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this book

This book has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this book

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this page

Cited page

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited page

Bookmark this page
Unpopular Privacy: What Must We Hide?
Table of contents

Table of contents

  • Title Page iii
  • Contents v
  • Preface ix
  • Part One - Normative Foundations 1
  • 1- Privacies Not Wanted 3
  • Part Two - Physical Privacies- Seclusion and Concealment 27
  • 2- Seclusion 29
  • 3- Modesty 47
  • 4- Nudity 78
  • Part Three - Information Privacies- Confidentiality and Data Protection 97
  • 5- Confidentiality 99
  • 6- Racial Privacy 123
  • 7- The Electronic Data Give-Away 156
  • 8- Popular Paternalism 173
  • Afterword 195
  • Notes 199
  • Index 249
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this book

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen
/ 259

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

    Already a member? Log in now.