295
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Is it possible to define ‘privacies’ within the law? Reflections on the ‘securitisation’ debate and the interception of communications

Pages 25-34 | Published online: 18 Nov 2010
 

Abstract

This article originates from the author's ongoing research into whether common factors that define ‘privacy’ may be identified and theorised. The research focuses on privacy in relation to the interception of communications. The rapid development over the past three decades of new technologies of surveillance raises a number of important questions about what is perceived as the shifting relationship between the citizen and the state. With the Information Commissioner and others to claim that modern British society is a ‘surveillance society’, and that the privacy of citizens is being sacrificed on the altar of ‘security’. However, it is not the case that a commonly accepted definition of privacy exists. The paper outlines the methodology to identify the contingents that are present in debates over privacy. First, it considers the difficulties in trying to define privacy since Warren and Brandeis', ‘The Right to Privacy’, essay famous, and argues that the term ‘privacy’ does not convey a purposeful meaning in terms of the interception of communications. Second, it identifies factors which allow privacy to be understood as a form of personal power. These factors point not only to whether information itself should be private to an individual but to the contexts in which the information is obtained. It is not information per se that is the key factor but its context. Finally, it is argued that it may be possible to isolate the factors that will produce a definition of privacy in relation to the interception of communications by looking at each set of circumstances and asking certain key questions.

Notes

F. Donson, ‘Data Bases – Positive Policing or Civil Liberties Nightmare?’ in Invading the Private. State Accountability and New Investigative Methods in Europe, ed. S. Field and C. Pelner (Burlington, VT: Ashgate, 1998), 181.

M. Banner and J.E. Suk, ‘Genomics in the UK: Mapping the Social Science Landscape’, Genomics, Society and Policy, 2, no. 2 (2006): 1-27; Great Britain. Parliament (2007). Official Reports. Parliamentary Debates (Hansard) 23 July, http://www.parliament.the-stationery-office.com/pa/cm200607/cmhansrd/cm070723/debtext/70723-0018.htm (accessed January 12, 2008).

D. Bigo, ‘Globalized (in)Security: The Field and the Ban-opticon’, in Illiberal Practices of Liberal Regimes: the (in)Security Games, ed. D. Bigo and A. Tsoukala (Paris: l'Harmattan, 2006).

R. Higgott, ‘US Foreign Policy and the “Securitization” of Economic Globalization’, International Politics, 41 (2004): 148.

M.E. Beare, ‘Fear-based Security: The Political Economy of “Threat”’, Paper presented at the International Conference on ‘Global Enforcement Regimes, Transnational Organized Crime, International Terrorism and Money Laundering’,Transnational Institute (TNI), Amsterdam, 28–29 April 2005; Bigo, ‘Globalized (in)Security’.

Bigo, ‘Globalized (in)Security’, 8.

Information Commissioner, Memorandum to the Education and Skills Select Committee Enquiry into ‘Every Child Matters’. February 2005, ICO, Wilmslow, Cheshire. Available at http://www.informationcommissioner.gov.uk

House of Commons Home Affairs Committee, ‘A Surveillance Society?’, Fifth Report of Session 2007–2008, Volume I, HC 58-I, 19–21, 25–26, 32–38, et passim, 2008; Volume II, HC 58-II, Qs 6, 7, 15, 20, 24, 27, 31, et passim, 2008.

The term ‘unethically’ is used to surmise the situation of the state monitoring the communication of a citizens affairs' with disregard to a pressing need. Although not quite in line with George Orwell's 1984, this situation is where communications may be monitored by state agencies regardless of whether suspicion of an offence exists.

E. Martin (ed.), A Concise Dictionary of Law, 2nd ed. (Oxford: Oxford University Press, 1991).

W.L. Prosser, ‘Privacy’, California Law Review 48 (1960): 383, 389.

Roe v. Wade, 401 U.S. 113 (1973).

Malone v. Commissioner of Police of the Metropolis [1979] 344 Ch.

S. Warren and L. Brandeis, ‘The Right to Privacy’, Harvard Law Review 4 (1890): 193. Available at http://www.abolish-alimony.org/content/privacy/Right-to-Privacy-Brandeis-Warren-1980.pdf (accessed February 24, 2009).

E. Pizzey, Scream Quietly or the Neighbours Will Hear (London: Penguin Books, 1983); C. MacKinnon, Toward a Feminist Theory of the State (Cambridge, MA: Harvard University Press, 1989).

L. Walker, ‘Council Find Skeletal Remains in Flat’, Today's Chronical, 13 July 2007. Available at http://icnewcastle.icnetwork.co.uk/chroniclelive/eveningchronicle/tm_headline=council-find-skeletal-remains-in-flat&method=full&objectid=19450306&siteid=50081-name_page.html (accessed July 19, 2007).

See, for example, Entick v. Carrington (1765) 19 ST 1030).

Warren and Brandeis, ‘The Right to Privacy’, 193.

Ibid., 200.

Ibid., 197.

Hyman Gross, ‘Privacy and Autonomy’, in Nomos XIII: Privacy, ed. J. Pennock and J. Chapman (New York: Atherton Press, 1971), 169.

E.V. den Haag, ‘On Privacy’, in Nomos XIII: Privacy, ed. J. Pennock and J. Chapman (New York: Atherton Press, 1971).

Ibid.

See for examples: Entick v. Carrington, Howell's State Trials 19 (1765): 1030; Cooper v. Booth (1785) 2 ESP 135; Price v. Messenger (1800) 2 Bos. & P. 158. For dishonest appropriation, see Prince Albert v. Strange (1848) 2 De G. & Sm. 652.

Warren and Brandeis, ‘The Right to Privacy’.

In line with the views expressed by Warren and Brandeis, ‘The Right to Privacy’.

Malone v. Commissioner of Police of the Metropolis [1979] 344 Ch at 369.

C. Fried, An Anatomy of Values (Cambridge, MA: Harvard University Press, 1970), 140.

A. Westin, Privacy and Freedom (New York: Atheneum, 1968), 7.

G. Marx, ‘A Tack in the Shoe: Neutralizing and Resisting New Surveillance’, Journal of Social Issues 59, no. 2 (2003): 369–390. Available at http://web.mit.edu/gtmarx/www/tack.html (accessed January 3, 2007)

P. Fussy, ‘New Labour and New Surveillance: Theoretical and Political Ramifications of CCTV Implementation in the UK’, Surveillance and Society 2, no. 2/3 (2004): 251-269. Available at http://www.surveillance-and-society.org/articles2(2)/newlabour.pdf (accessed February 7, 2007).

This is taken on assumptions of both respondents to questions regarding perceptions of surveillance and of the 50% public acceptance of an identity card scheme undertaken by ICM Research: ID Cards Survey Fieldwork: 8–9 November 2006. Available at http://www.icmresearch.co.uk/pdfs/2006_july_no2id_id_card_survey.pdf (accessed February 11, 2007).

B. Welsh and D. Farrington, ‘Crime Prevention Effects of Closed Circuit Television: A Systematic Review’, Home Office Research, Development and Statistics Directorate, 2002. Available at http://www.homeoffice.gov.uk/rds/pdfs2/hors252.pdf (accessed February 7, 2007).

A. Miller, The Assault on Privacy (Ann Arbor: University of Michigan Press, 1971), 25.

For example the governments changes to the ‘Regulation of Investigatory Powers Bill’ in the face of strong public criticism in 2002. Guardian Leader, The Guardian, 19 June 2002.

G. Navarria, ‘E-government: who controls the controllers?’, 2006, http://www.opendemocracy.net/media-edemocracy/egovernment_3254.jsp (accessed August 20, 2008).

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 878.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.