Professional Documents
Culture Documents
32
vol l no 22
EPW
INSIGHT
EPW
vol l no 22
under the laws of defamation and confidence, which they found inadequate.
Second, they argued intellectual property
law failed to address the mental distress
caused by unauthorised publication of
personal information. In other words,
they critiqued the failure of copyright
law to treat the peace of mind of a person
as a morally relevant quality, which is
what classical liberalism sought to protect
in the private sphere.
Warren and Brandeis said the essence
of the right to be let alone was not private
property but inviolate personality, but
they failed to offer a framework for
enforcing this claim. By virtue of the
principle of inviolate personality, was
information about a person under her
control? Yes, according to Alan Westin,
who claimed that privacy is the ability
of a person to control what information
about her should be known to others
(1967). This conception of privacy, as control over information, was shared by
Charles Fried who pointed out that love,
friendship and trust are conditional
upon privacy (1968), thereby introducing social utility to the control theory.
Julie Inness added nuance by stating
that the imperative of control attaches
with greater moral force to intimate information rather than impersonal information, bringing the privacyintimacy
distinction into focus once again (1991).
However, this conception fails to explain
what the control of information should
be predicated on. It is a defining characteristic of property that a person who
owns it may control it without encumbrance. But, is information about us our
property (Moore 1998)?
David M OBrien disagreed, and criticised the theoretical reduction of privacy
to the single value of information control.
Instead, he claimed privacy denoted
an existential condition of limited access
to an individuals life experiences and
engagements (1979). This conception
of privacy in terms of the inaccessibility
of a person is improved upon by Ruth
Gavison, who says privacy and accessibility are inversely proportional; hence,
the greatest degree of privacy is attained
when a person is completely inaccessible
(1980). But, inaccessibility-based conceptions of privacy must be interrogated to
33
INSIGHT
survive two questions: is the sole inhabitant of an inaccessible place really more
private than she is isolated (Schoeman
1984, Solove 2002); and, does a person
who is confined to an inaccessible place
against her will really enjoy more privacy than she suffers a loss of control
(Westin 1967; OBrien 1979)?
With regard to information privacy,
perhaps the most convincing conception
is proposed by Helen Nissenbaum who
argues that privacy is the expectation
that information about a person will be
treated appropriately. This theory of
contextual integrity believes people do
not want to control their information or
become inaccessible as much as they
want their information to be treated
in accordance with their expectations
(Nissenbaum 2004, 2010, 2011). Since
privacy suffers an embarrassment of
meanings, its epistemological diversity is
an asset, allowing different distillations
of the norm to inform dissimilar claims.
Privacy and Press Freedom
An analysis of the debate regarding
privacy in India reveals four types of
privacy claims. The first claim relates to
press freedom. According to Thomas
Emerson, while privacy and a free press
can coexist mostly in harmony, there are
two potential areas of conflict: the first
concerns the tort of privacy and the
second the right to know (1979). The tort
of privacy is an American creation; two of
its components clash with the right to
publish (Prosser 1960; Emerson 1979).
These are cases of (i) embarrassing disclosure of private facts, and (ii) the public
casting of a person in false light. Significant attention has been devoted to finding the balance between privacy and
press freedom in these cases.
With regard to embarrassing disclosures, some courts have tended to uphold invasive publications when deemed
newsworthy, such as a US federal
appeals court in Virgil vs Time, Inc (1975)
which contrasts with the English cases
of Campbell vs Mirror Group Newspapers
(2004) and Mosley vs News of the World
(2008) and the ECHR decision in Von
Hannover vs Germany. In false light
cases, courts have wavered between
permitting and disciplining sensationalist
34
vol l no 22
EPW
INSIGHT
EPW
vol l no 22
INSIGHT
EPW
INSIGHT
EPW
References
Allen, Anita (1988): Uneasy Access: Privacy for
Women in a Free Society, Totowa: Rowman &
Littlefield.
Alshech, Eli (2007): Out of Sight and Therefore
Out of Mind: Early Sunni Islamic Modesty
Regulations and the Creation of Spheres of
Privacy, Journal of Near Eastern Studies,
66(4): 26790.
Arun, Chinmayi (2014): Filtering Content on the
Internet, Hindu, 2 May.
Borges, Jorge Luis (1985): Dreamtigers, Austin:
University of Texas Press.
Clark, R H (1974): Constitutional Sources of the
Penumbral Right to Privacy, Villanova Law
Review, 19(6): 83384.
Cohen, Julie (2010): The Inverse Relationship
between Secrecy and Privacy, Social Research,
77(3): 88398.
Cooley, Thomas McIntyre (1888): A Treatise on the
Law of Torts, Chicago: Callaghan.
De Bruin, Boudewijn (2010): The Liberal Value of
Privacy, Law and Philosophy, 29(5): 50534.
Department of Personnel and Training (2010): Approach Paper for a Legislation on Privacy,
vol l no 22
37
INSIGHT
Nissenbaum, Helen (2004): Privacy as Contextual Integrity, Washington Law Review, 79(1):
11958.
(2010): Privacy in Context: Technology, Policy,
and the Integrity of Social Life, Palo Alto:
Stanford University Press.
(2011): A Contextual Approach to Privacy
Online, Daedalus, 140(4): 3248.
Noorani, A G (2011): A Case for Privacy, Frontline,
28(24), 19 November.
OBrien, David M (1979): Privacy, Law, and Public
Policy, New York: Praeger.
Posner, Richard (1979): Privacy, Secrecy, and
Reputation, Buffalo Law Review, 28: 155.
Post, Robert C (1989): The Social Foundations of
Privacy: Community and Self in Common Law
Tort, California Law Review, 77(5): 9571010.
Pow, Choon-Piew (2009): Gated Communities in
China: Class, Privilege and the Moral Politics of
the Good Life, Abingdon: Routledge.
Pratt, Walter F (1979): Privacy in Britain, London,
New Jersey: Associated University Presses.
Prosser, William (1960): Privacy, California Law
Review, 48 (3): 383423.
Rahman, M (1994): A Loaded Bill, India Today
(31 July 1994), viewed on 28 April 2015 (http://
indiatoday.intoday.in/story/another-attemptto-muzzle-the-press/1/293731.html).
Rawls, John (1971): A Theory of Justice, Cambridge:
Harvard University Press.
Rssler, Beate (2005): The Value of Privacy, Cambridge: Polity Press.
Schoeman, Ferdinand (1984): Privacy: Philosophical
Dimensions of the Literature, Philosophical
Dimensions of Privacy: An Anthology in Schoeman,
Ferdinand (ed), Cambridge: Cambridge University Press.
Seipp, David J (1983): English Judicial Recognition of a Right to Privacy, Oxford Journal of
Legal Studies, 3(3): 325370.
Shakespeare, William: As You Like It, Act II, Scene
VII: 139166.
Solove, Daniel (2002): Conceptualizing Privacy,
California Law Review, 90 (4): 10871155.
Solove, Daniel (2006): A Taxonomy of Privacy,
University of Pennsylvania Law Review, 154(3):
477560.
Walzer, Michael (1990): The Communitarian
Critique of Liberalism, Political Theory, 18(1):
623.
Warren, Samuel and Louis Brandeis (1890): The
Right to Privacy, Harvard Law Review, 4(5):
193220.
Westin, Alan (1967): Privacy and Freedom, New
York: Athenum.
Zarrow, Peter (2012): The Origins of Modern Chinese Concepts of Privacy: Notes on Social
Structure and Moral Discourse in McDougall,
Bonnie and Anders Hansson (eds), Chinese
Concepts of Privacy, Leiden, Boston, Kln: Brill.
Case Laws Referred
R Rajagopal vs State of Tamil Nadu (1994) 6 SCC 632.
S A S vs France (Application 43835/11) 2014.
Virgil vs Time, Inc 527 F.2d 1122 (1975).
Campbell vs Mirror Group Newspapers [2004]
UKHL 22.
Mosley vs News of the World [2008] EWHC 1777
(QB).
Von Hannover vs Germany (Application 59320/00).
Time, Inc vs Hill 385 US 374.
Welling vs Weinfeld 866 N E 2d 1051 (Ohio 2007).
Anderson vs Gannett Company 994 So2d 1048 (Fla
2008).
Salient Features
Time Series
Data
Userfriendly
Interactive
System
Enhancing
Research
SUBSCRIPTION
Attractive annual subscription rates are available for institutions and individuals.
Pay-per-use facility also available for downloading data from dierent modules as per specic requirements.
To subscribe, visit : www.epwrts.in
38
vol l no 22
EPW