Professional Documents
Culture Documents
1
G. Negley, “Philosophical Views on the Value of Privacy” (1966) 31 Law & Contemporary Problems 319
at 319.
2
P. Laslett ed., Philosophy, Politics and Society (1st ed., Blackwell, 1956), quoted ibid. at 322.
3
See M. Foucault (A. Sheridan trans.), Discipline and Punish: The Birth of a Prison (Penguin, 1979). This
phrase refers back to Bentham‟s plan for the Panopticon – a prison in which inmates could be seen and
supervised by a single officer without being aware if they were being watched or not. See M. Bozovic ed.,
Jeremy Bentham: The Panopticon Writings (Verso, 1995).
4
Foucault, op. cit. at 20.
5
Sir Brian Neill, “Privacy: A Challenge for the Next Century” in B. Markesinis ed., Protecting Privacy
(OUP, 1999), at 27.
6
See, for example, the work of T. Hobbes, The Leviathan (1651), J. Locke, Two Treatises of Government
(1690); Montesquieu, L’esprit des lois (1748); and the work of J. Madison in I. Kramnick ed, Madison,
Hamilton & Jay: The Federalist Papers (Penguin, 1987).
If power were never anything but repressive, if it never did anything but to say no,
do you really think one would be brought to obey it? What makes power good,
what makes it accepted, is simply the fact that it doesn‟t only weigh on us as a
7
R. Stewart, “The Reformation of American Administrative Law” (1974-75) 88 Harv. L. Rev. 1667 at
1760.
8
Coercive power refers here to the power to shape individual conduct. It does not only denote punitive
sanctions.
Conceiving of power in this more expansive manner highlights the range of ways in
which an individual‟s liberty may potentially be undermined in modern society. It also
underlines the fact that freedom may be threatened by the behaviour of both state and
non-state actors.
These characteristics of modern society have cumulatively homogenising effects.
Through the individual‟s interactions with various coercive bodies and techniques, he is
programmed to engage in certain types of conduct. Particular modes of behaviour are
variously penalised or prioritised. Approved conduct is encouraged and rewarded. The
individual‟s actions are observed and recorded, which further encourages adherence to
the designated norms. This fosters homogeneity which in turn undermines individual
freedom.
“The man who is compelled to live every minute of his life among others and
whose every need, thought, desire, fancy or gratification is subject to public
scrutiny has been deprived of his individuality and human dignity. Such an
individual merges with the mass. His opinions, being public, tend never to be
different; his aspirations, being known, tend always to be conventionally accepted
ones; his feelings, being openly exhibited tend to lose their quality of unique
personal warmth and to become the feelings of every man. Such a being, although
sentient, is fungible; he is not an individual.”10
Privacy claims are an intuitive response to the threat of this sort of socially-directed
homogenisation. By securing scope for individual action, they strive to protect the
individual against this diverse range of conduct-shaping influences. On this analysis,
privacy can be seen as a repackaging of liberal concerns for contemporary times. 18th
century liberal democrats believed that the freedom of the individual was threatened by a
single entity. Therefore, they logically sought to protect it by dealing with that single
danger. Modern theorists, confronted with the threat of coercive power in all its insidious
contemporary forms, cannot do the same. They must therefore re-orient their focus away
from specific threats to individual freedom and towards the protection of that core
interest in itself. It is in that context that arguments for a right to privacy have been
advanced. The advantage of a privacy claim is that it offers potential protection against
all the world. It is not confined in its application to specific transgressors like the state.
“[T]he protection of privacy remains a continual process of negotiating limits … on a
broad front”.11 It accordingly holds out the possibility of protecting individual freedom in
a dynamically coercive environment.
It is important at this point to emphasise that this chapter is not concerned with the
elaboration of a legal right to privacy. That is the purpose of the remainder of this book.
9
M. Foucault, “Truth and Power” in James Faubion ed, Power: Essential Works of Foucault (Penguin,
2002) at 120.
10
E. J. Bloustein, “Privacy as an aspect of human dignity” (1964) 39 N.Y.U.L. Rev. 962 at 1003.
11
D. Lindsay, “An exploration of the conceptual basis of privacy and the implications for the future of
Australian privacy law” (2005) Melbourne U.L.R. 131 at 142.
3
This chapter instead seeks to clarify the concept of a privacy right. For the reasons
outlined above, privacy claims retain an intuitive appeal. Most people would agree that
privacy is important. Most people also, however, would disagree about what privacy
precisely entails. As Post remarked:
A legal model of privacy protection thus necessarily requires the articulation of a specific
conceptual account of privacy. In the absence of a clearly-identified analytical starting-
point, a legal privacy right would be incomplete, incoherent, and liable to cause
confusion. It is for that reason that this chapter is devoted to a consideration of the more
abstract aspects of the privacy concept.
Privacy is a notoriously elastic and equivocal notion. It has a “protean capacity to be all
things to all lawyers”.13 Its imprecision as a concept has given rise to extensive academic
discussion and debate. A significant proportion of the voluminous literature in this area
is dedicated to the preliminary task of defining what privacy is. These discussions have
generated heat and light but little unanimity. In fact, “the most notable feature of th[e]
literature has been an almost complete absence of agreement concerning both the
definition of privacy and the values said to be promoted by the legal protection of
privacy”.14 Privacy has been defined in different ways and invoked in support of varying,
sometimes even opposing outcomes.
A reductionist approach
Judith Jarvis Thomson was amongst the most influential members of the „strong‟
sceptical school. She advanced a reductionist view of privacy which posited that it is a
parasitic interest which derives its value from other more fundamental entitlements. She
argued that most privacy claims should be more properly characterised as assertions of
other interests; in particular, property rights and rights in respect of the person.
This is unconvincing. Thomson goes so far in her criticism of the concept of privacy
that she defies all conventional linguistic and cultural intuitions. It simply does not seem
right to say that privacy has no meaning. Thomson‟s argument necessarily implies, for
12
R. Post, “Three concepts of privacy” (2001) Geo. L.J. 2087.
13
T. Gerety, “Redefining Privacy” (1977) 12 Harv. C.R.C.L.L. Rev. 233 at 234.
14
D. Lindsay , loc. cit. at 135.
4
example, that claims of privacy share no conceptual kinship but are instead the offspring
of distinct and separate rights. This does not seem credible. Thomson‟s theory lacks
descriptive accuracy, and accordingly cannot provide a satisfactory account of the
interests engaged by a claim of privacy.
Her argument also obliges her to assert some peculiar personal rights. Because privacy
has no value in her view, an actionable claim to protection must rest on an entirely
independent entitlement. Some of her suggested interests do not seem sufficiently
weighty to support any such claim. Her assertion that bodily integrity encompasses a
right not to be looked at strains credibility. The same is true of her claim that property
rights give rise to a distinct but fortuitously similar right not to have one‟s possessions
looked at. Denying privacy any value forced Thomson to reformulate “[a] general desire,
an interest, or simply a feeling of unease”15 as a right. This, again, fails to convince.
A substitutive approach
Russell Brown has put forward a „weak‟ sceptical theory which has much in common
with Thomson‟s. He does not argue that privacy is a concept without value. He does,
however, feel that the right to privacy is too confused and unwieldy to be effectively
employed by the courts. For him, the various “undisciplined and peremptory competing
claims to privacy‟s meaning leave privacy in disrepute and serious discourse on privacy
in disrepair because no single version can possibly claim common assent”.16 He suggests
that the right to privacy should instead be understood as the product of the legal concept
of exclusivity. Rights to property and bodily integrity protect the individual‟s exclusive
ownership of a particular resource. A privacy claim, for Brown, rests upon the
individual‟s interest in maintaining exclusivity over their body or property.
Brown‟s theory, like Thomson‟s, regards the privacy right as a species of proprietary or
personal interest. He attempts to avoid the criticism of this aspect of her theory as
strained by arguing that the conceptual basis of the claim is unimportant. Exclusivity
supplies the means for identifying the protected interest and securing its vindication. It is
questionable, however, if exclusivity can adequately protect the full range of privacy
interests. It would not, for example, support a claim of privacy in relation to information
which was once disclosed but has now been generally forgotten.17 It is also unclear how it
would apply to claims in relation to the actions of individuals in quasi-public places.
Under Brown‟s theory, the unapproved representation of an individual is treated as an
infringement of his entitlement to preserve exclusivity. Where the representation relates
to information of which others were aware, or to a situation where other were present,
this seems more properly a question of control rather than of exclusivity. Exclusivity can
apply to these situations only if it is strained beyond recognition. This illustrates the fact
that, while exclusivity and privacy may overlap in many areas, they are not identical. An
entitlement to maintain exclusivity may protect privacy in many situations, but they
remain different ideas. Privacy has a specific conceptual value which exclusivity does not
share.
15
B. Rössler (R.D.V Glasgow trans.), The Value of Privacy (Polity, 2005), at 67.
16
Brown, “Rethinking Privacy” (2006) 43 Alberta L. Rev. 589, at 592.
17
See, for example, Sidis. v F-R Publishing Corporation (1940) 113 F. 2d 806; Ouellet v Pigeon (1997)
R.R.A. 1168.
5
The problem with the sceptical approach of excluding privacy from an account of a
situation which would typically be understood to engage a privacy interest is that it
removes a necessary element of the analytical calculus. We instinctively conceive of such
situations as involving privacy claims. To discount privacy entirely, or to replace it with a
different value, is to approach this type of issue in a way which cannot accord with the
widespread cultural, linguistic or conceptual understanding of it. For a legal regime to
function, it cannot work in this way.
(i) The right to be let alone – Although this definition was first expressed by Judge
Cooley,19 it is generally associated with the seminal American work of Warren and
Brandeis.20 Their article in the Harvard Law Review, which was reputedly written in
response to newspaper coverage of the wedding of Warren‟s sister, is often regarded as
the academic progenitor of American privacy law.21 This definition has been particularly
influential in the constitutional sphere, where it has been invoked in support of
individual‟s claims to freedom from governmental intervention. In this context, the right
to privacy preserved the freedom of the individual by securing scope for independent
decision-making. It operates to presumptively preclude the state from regulating
individual actions. The right to be let alone – for Harlan J. “the most comprehensive of
rights and the right most valued by civilised men”22 – was accordingly interpreted to
prohibit state interference with of a married couples‟ use of contraceptives23 or of a
woman‟s decision to undergo an abortion.24 The Supreme Court observed that:
18
R. A. Cass, “Privacy and Legal Rights” (1991) 41 Case W. Res. 867, at 868.
19
T. Cooley, A Treatise on the Law of Torts (2nd ed., 1888).
20
S. Warren & L. Brandeis, “The Right to Privacy” (1890) 4 Harv. L. Rev. 193.
21
The article has been extensively discussed. See, for example, H. Kalven, “ Privacy in Tort Law: Were
Warren and Brandeis Wrong?” (1966) 31 Law and Contemporary Problems 326; Kramer, “The Birth of
Privacy Law: A Century since Warren and Brandeis” (1990) 39 Cath. Univ. L. Rev. 703; R. Turkington,
“Legacy of the Warren and Brandeis Article” (1990) 10 N. Ill. U.L. Rev. 479.
22
Poe v Ullman 367 U.S. 497 (1961) at 550.
23
Griswold v Connecticut 381 U.S. 479 (1965).
24
Roe v Wade 410 U.S. 113 (1973).
6
“If the right to privacy means anything, it is the right of the individual … to be
free from unwarranted governmental intrusion into matters so fundamentally
affecting a person as the decision whether the bear or beget a child.”25
Privacy as the right to be let alone made an appearance in Ireland in cases like McGee v
Attorney General26 and Norris v Attorney General .27
As has already been noted in this chapter, a right to privacy which applies solely
against the state does not offer the individual adequate protection. It is too narrow to
capture the potential range of privacy infringement. Privacy interests may be undermined
by non-public actors. Yet the right to be let alone has typically been conceived as a
constraint on state behaviour. It is noticeable that Harlan J. described it as a right which is
“conferred, as against the government”.28 This is a significant weakness in this
conception of the right.
The right to be let alone need not, of course, be so confined. It is formulated in so broad
a fashion that it is capable, in its own terms, of applying against all the world. The
sweeping scope of this definition means, however, that it is “vacuous”29 and thus
functionally inadequate. It cannot be coherently employed in practice. An individual‟s
conduct always has the potential to impact on others. One person‟s exercise of his
freedom may impinge upon the freedom of others. For a socially-situated individual,
freedom tout court is an impossibly chimeric ideal. It is thus unrealistic (and socially
dysfunctional) to define privacy in terms of an absolute entitlement to be let alone.
In its phrasing, however, the right to be let alone makes just such an absolutist claim.
The definition supplies no criteria for distinguishing between competing claims in
situations where the actions of individuals or organisations come into conflict. “Being let
alone does not inform us about the matters in which we should be let alone”. 30 The
definition is too bald to be useful. It presents privacy as a licence to act in unspecified
ways. “Notwithstanding [its] characterisation as a privacy righ[t], these really are rights
to other sorts of liberty.”31 This definition is more correctly an assertion of liberty per se
than one of privacy. Its conception of liberty is, however, ill-defined and uninhibited. A
theory of liberty as licence is too vague and atomistic to be of any practical utility. It is an
“indiscriminate concept”.32 Instead of defining privacy, it describes an example of it. The
right to be let alone is thus inadequate as a basis for a privacy regime.
(ii) Inaccessibility – Commentators like Gavison,33 Allen34 and Moreham35 have defined
privacy in terms of individual‟s inaccessibility. This conception regards the state of
25
Eisenstadt v Baird 405 U.S. 438 (1972) at 453.
26
[1974] I.R. 284.
27
[1984] I.R. 36.
28
Poe v Ullman 367 U.S. 497 (1961) at 550
29
E. Barendt, “Privacy as a Constitutional Right and Value” in P. Birks ed., Privacy and Loyalty
(Clarendon, 1997).
30
Daniel Solove, “Conceptualising Privacy” (2002) 90 Cal. L. Rev. 1087 at 1102.
31
R. Post, “Privacy and Legal Rights” (1991) 41 Case W. Res. 867 at 876.
32
R. Dworkin, Taking Rights Seriously (Harv.ard University Press, 1971) at 262.
33
R. Gavison, “Privacy and the limits of law” (1980) 83 Yale L.J. 421.
34
A. Allen, Uneasy Access: Privacy for Women in a Free Society (Rowan &Littlefield, 1988).
35
N. Moreham, “Privacy in the Common Law: A Doctrinal and Theoretical Analysis” (2005) 121 L.Q.R.
628.
7
solitude as the central case of privacy protection. When an individual is out of reach of all
external actors, they are said to be enjoying “perfect privacy”. 36 There are echoes of this
approach in Peart J.‟s judgment in Atherton v Director of Public Prosecutions37 in which
he held that an applicant was unable to sustain a privacy claim in respect of video
surveillance of an area of his home and garden which was visible from the public street.
One difficulty with the notion of privacy as inaccessibility is that it may not
persuasively apply to all situations. Being stranded on a desert island or being detained in
solitary confinement are states of inaccessible solitude which would not normally be
described as private. It is for this reason that Moreham introduces the individual‟s
intention into her theory as a necessary ingredient of privacy. She advances the more
refined formulation of privacy as a state of “desired inaccess”.38
A more profound problem with this definition of privacy is that it treats a person‟s
privacy as an all-or-nothing interest. It envisages privacy as an original state of secret
inaccessibility. It can either be preserved in this pristine state or destroyed. Once access is
allowed, the privacy interest is lost. This sort of brightline approach cannot take account
of the nuances of social existence. “Our everyday lives are in reality a constant trade-off
between human interaction and social life on the one hand, and the maintenance of a
reasonable degree – not an absolute state – of privacy on the other.”39 To define privacy
in terms of secrecy or inaccessibility does not, for example, permit the possibility of
retaining a privacy claim in relation to information shared as part of an intimate
relationship. It would not support the notion that information which was once made
public may subsequently become private over time. It cannot distinguish between private
information being access on a familial, local, national or international level. It is simply
too blunt to adequately reflect the full range of possible privacy claims.
This can be attributed to the conception‟s focus on individual solitude. A person in a
state of solitude may also be enjoying a state of privacy but it does not follow that the two
states are the same. Privacy is, in fact, a relational rather than a solipsistic concept. To be
private, a matter must be private against another party. Solitude, on the other hand, is a
self-regarding and self-supporting concept. Whereas privacy presumes the existence of
others, no other is needed to be alone. As an idea which is defined by reference to others
rather than to the self, privacy therefore presupposes a basic sociability. Its objective is
the protection of the individual but the focus of its operations is that individual‟s social
acts. As a value, it has real meaning only in the context of an individual‟s social
intercourse. Feldman has commented that “privacy can usefully be considered to have
more to do with social … action and interaction than with the behaviour of hermetically
isolated individuals”.40 This reflects the fact that “privacy is a socially created need”.41
Without society, there would be no need for privacy.
Conceptions of privacy as inaccessibility are premised on the protection of the wrong
interest. Privacy and inaccessibility overlap but they are not the same. Inaccessibility
36
R. Gavison, loc. cit. at 428.
37
[2006]1 I.R. 245.
38
This is considered in greater detail below.
39
G. Phillipson & H. Fenwick, “Breach of Confidence as a Privacy Remedy in the Human Rights Era”
(2000) 63 M.L.R. 660 at 675.
40
D. Feldman, “Privacy-related rights: their social value” in P. Birks ed., Privacy and Loyalty (Clarendon,
1997), at 49.
41
B. Moore, Privacy: Studies in Social and Cultural History (Sharpe, 1984), at 73.
8
preserves the individual‟s entitlement to be alone. Privacy is concerned with far more
complex and multi-faceted questions of social existence. This explains why a theory of
privacy as inaccessibility is too narrow to properly assess the issues that may arise in the
penumbra between the fully secret and the openly public. A richer and more flexible
conception of privacy is required.
(iii) ‘Natural’ privacy – This understanding of privacy holds that there are specific
„natural‟ zones within which privacy interests arise and ought to be protected. These
natural areas are usually identified as the home and the body.
The difficulty with these spatial theories is that they are too narrow. They conceive of
privacy in a purely physical fashion. They neglect the individual‟s interest in preventing
the disclosure of information about him unless his property or person are at issue. They
would deny the possibility that conduct which occurs outside one of these zones might
give rise to a plausible privacy claim. Like the proponents of privacy as inaccessibility,
advocates of „natural‟ privacy are unable to satisfactorily deal with more nuanced
potential privacy infringements.
(iv) Pragmatic privacy – Unlike the other examples considered in this section, Solove‟s
so-called pragmatic theory does not attempt to provide a definition of privacy itself. 42 It
rather proceeds from the assumption that privacy cannot be comprehensively defined.
Unlike Thomson‟s theory, however, Solove does accept that privacy has value as a
distinct principle. He proposes therefore to concentrate on identifying and defining
possible privacy intrusions. His categories of activity that can potentially harm a person‟s
privacy are:
a. Information collection.
b. Information processing.
c. Information dissemination.
d. Invasions of people‟s private affairs via „intrusion‟ or „decisional interference‟.
Solove eschews the privacy grail of a comprehensive definition of the concept, preferring
instead to develop a workable model of privacy protection. His work usefully identifies
the various ways in which privacy can potentially be infringed. It encourages the
enunciation of more coherent privacy claims by concentrating attention on the
appropriate offending activity.
As an independent theory of privacy, however, Solove‟s model is logically circular.
Identifying instances of privacy harm requires some pre-existing idea of what privacy
entails. Privacy must be known if its infringement is to be recognised. Solove‟s pragmatic
model depends on an unarticulated conception of privacy. By failing to provide a
coherent account of privacy, it thus suffers from the same weaknesses as the theories
already discussed in this section.
Conclusion
It is clear that defining privacy is no easy task. The efforts considered above are either
too broad to be workable or too narrow to encapsulate the true richness of the right to
42
See D. Solove, “A taxonomy of privacy” (2006) 154 U. Pa. L. Rev. 477.
9
privacy. Privacy is intuitively coherent but definitionally elusive. Intuitionist efforts to
sum the concept up in a single sentence are unlikely to succeed. A fuller appreciation of
privacy in all its various forms is required. With that in mind, the next section of this
chapter will move away from an examination of these initial impressions of privacy
towards a consideration instead of the values which underlie the concept. An
understanding of the interests which the protection of privacy purports to serve is likely
to assist in clarifying and delimiting the appropriate scope of a privacy claim. If we can
understand the reasons why privacy is protected, we may be in a better position to devise
a legal regime which is capable of achieving this end.
The protection of privacy is justified in the literature as both an individual and a social
good. Craig identifies six reasons for the protection of privacy:43
(i) Refuge: It allows the individual to retreat from the pressures of public scrutiny
and social norms.44
(v) Mental health: Privacy has been linked to individual mental health.48
These rationales for the protection of privacy illustrate the concept‟s multi-dimensional
character. They are not all, however, convincing of themselves. Reiman and Fried‟s work
on intimacy is a good example of this. In its own terms, this justification identifies an
important and previously overlooked reason for protecting privacy. This rationale
43
J. Craig, “Invasion of Privacy and Charter Values” (1997) 42 McGill L.J. 355.
44
S. Warren & L. Brandeis, loc. cit.
45
Griswold v Connecticut 381 U.S. 479 (1965); Roe v Wade 410 U.S. 113 (1973); McGee v A.G. [1974]
I.R. 284.
46
B. Rössler, op. cit.; D. Feldman, loc. cit.
47
R. Gavison, loc. cit.
48
S. Jourard, “Some Psychological Aspects of Privacy” (1966) 31 Law and Contemporary Problems 307.
49
J. Rachels, “Why Privacy is Important” (1975) 4 Phil. & Pub. Aff. 323; J. H. Reiman, “Privacy,
Intimacy, and Personhood” (1976) 6 Phil. & Pub. Aff. 26; A. F. Westin, Privacy and Freedom (Atheneum,
1967).
10
usefully underlines the relational nature of the right to privacy and demonstrates its
benefit for both individuals and society. It does not, however, exhaust its scope. Privacy
does not only arise in intimate relationships. Nor is it only useful in that context. Privacy
may be important to the creation and maintenance of non-intimate relationships with
employers or distant acquaintances. These associations may not be as important to an
individual as those he shares with his closest friends or family but they are socially
significant nonetheless. A concept of privacy must involve more than mere intimacy.
Consequentialist theories
Consequentialist or instrumentalist theories of privacy run the risk of concentrating on a
single rationale to the detriment of other equally significant aspects of the right. More
fundamentally, they are also susceptible to the objection that, as instrumentalist accounts,
they will not offer adequate protection against countervailing considerations of collective
interest. An instrumentalist theory suffers from the familiar utilitarian flaw of failing to
accord sufficient weight to the interests of the individual. It protects privacy for what it
can achieve rather than as a value deserving of protection in its own right. As a result,
privacy will not be protected where it does not directly assist in the attainment of these
objectives, or where it comes into conflict with the pursuit of a greater social priority.
This has generally been the fate of privacy claims in the American courts where they
have had to defer to the constitutional alpha-value of 1st Amendment free speech. The
American understanding of privacy is “more welfare-consequentialist”.50 It thus tolerates
infringements of privacy where they may lead to an overall increase in welfare. Privacy
interests were insufficient, for example, to justify upholding a law that the evidence of
minors in relation to sex offences should always be heard in private.51 That law was
struck down on the basis of the court‟s reasoning that public scrutiny of court
proceedings was likely to be of general benefit. Given the assumption in American 1st
Amendment jurisprudence that freedom of expression is, in itself, a social good, privacy
claimants inevitable find it difficult to prevail. “Privacy law in the United States delivers
far less than it promises, because it resolves virtually all … conflicts in favour of
information, candour and free speech.”52
Deontological theories
On the contrary, deontological conceptions of privacy treat it as a value which is
inherently deserving of protection. This type of theory tends to characterise it as a
derivative of the innate human values of dignity and autonomy. They thus retain a
purposive element whilst avoiding the perils of instrumentalist balancing. Without
privacy, these fundamental human values would not be adequately respected. The
purpose of privacy protection is not, on this analysis, to assist in the achievement of a
specific outcome. It is rather the input-oriented purpose of securing for the individual
those values that are inherent to his existence as a human person. “[P]rivacy has the
function of permitting and protecting an autonomous life”.53
50
M. Lindsay, loc. cit. at 177.
51
Globe Newspaper Co. v Superior Court 457 U.S. 596 (1982).
52
D. A. Anderson, “The Failure of American Privacy Law” in B. Markesinis ed., Protecting Privacy (OUP,
1999), at 140.
53
B. Rössler, op. cit. at 1.
11
Autonomy
Autonomy is a fundamental notion in modern society. It denotes the entitlement of each
individual to live a life of their own choosing. For Rössler, the possibility for the
individual of “living their life in accordance with their own particular ideas of the
individual good …. is the spirit and origin of modern societies”. 54 It is the guiding notion
of Kantian and Millsian conceptions of social existence. As Mill explained it, “[t]he only
freedom that deserves the name, is that of pursuing our own good in our own way”.55
The autonomous individual is the antithesis of Bloustein‟s homogenised non-human.
He defines himself as a distinct and autonomous entity by his independent actions and
decisions. He is self-determining, self-governing and accordingly self-defining. This
concept of the autonomous individual is a cornerstone of both liberal democratic and
communitarian theories of the state. Liberal democracy aims to facilitate individual
freedom to the greatest extent compatible with an organised social structure. Its dignitary
concern to ensure equal respect for the individual manifests itself in a desire to secure
liberty for each individual to make their own decisions without outside interference. This
individual freedom in turn generates diversity and pluralism which benefits society as a
whole. The autonomy of the individual is thus an article of faith for liberal democracy.
Communitarian and republican theories for their part emphasise the importance of self-
government. In the Madisonian or Machiavellian republic, self-determined political
action was a civic duty. Participatory citizenship is a necessary feature of this sort of
system. Without individual self-determination, there cannot be communal self-
government.
Given the influence of both liberal democracy and communitarianism on the Irish
Constitution, it seems plausible to suggest, as Denham J. did in Re Ward of Court (No.
2),56 that autonomy is a value with particular resonance for Irish law.
54
B. Rössler, op. cit. at 43.
55
J.S. Mill, On Liberty (Penguin ed., 1982), at 72.
56
[1996] 2 I.R. 79.
12
capacity to question and evaluate that self-identity if it is to truly be said to be of their
own design. In a similar vein, the individual must, thirdly, have the ability and the
opportunity to choose between courses of action which affect that self-identity. Finally,
the individual must also have to ability to assess the consequences of the making of that
choice for his self-identity. Only through this process of rational self-evaluation and self-
determination can an individual be said to be truly self-governing, and thus autonomous.
57
D. Lindsay, loc. cit. at 149.
58
C. Taylor, The Ethics of Authenticity (Harvard University Press, 1992).
59
B. Murchison, “Revisiting the American Public Disclosure Tort” in A. T. Kenyon & M. Richardson eds.,
New Dimensions in Privacy Law: International and Comparative Perspectives (Cambridge University
Press, 2006), at 51.
13
Rössler illustrates this point by reference to Uwe Johnson‟s story „Sketch of a
Casualty‟. The story‟s protagonist discovers that his wife of 20 years has been cheating
on him with another man for all that time. Rössler discusses how this revelation impacts
upon the husband‟s sense of himself.
“[He] comes to see his life as devalued, his feelings as inauthentic, and his actions
as not his own … [H]is whole life strikes him as failed because in the most
private, most intimate of his relation he has been betrayed …. Everything about
his life in those twenty years has become untrue. „Like photos, the stocks of his
memory had been stamped with the words: Untrue. False. Poisoned. Devalued.
Invalid.‟ [His] sense of all his past experiences, his entire past life are devalued
and untrue comes not only from having led a different life to the one he believed
he was leading but also from thus being (or having been) a different person from
the one he believed he was.”60
60
B. Rössler, op. cit. at 137-138, quoting U. Johnson, Skizze eines Verunglückten (1981).
61
F. S. Chlapowski, “The Constitutional Protection of Informational Privacy” (1991) 71 Boston University
Law Review 133 at 153-154.
14
This explains why the exposure of the individual to social embarrassment is understood
as an unwelcome and possibly actionable intrusion on his self-identity. It affects the
perception of others and undermines the individual‟s power to create his own identity.
There would be no detriment if the individual was defined solely by reference to his
solitary sense of self. That we understand the disclosure of private information as an
intrusive act underlines the relationship between social identity and individual autonomy.
(i) Internal authenticity – The provision of private place supports the authenticity of an
individual‟s self-determination. It allows the individual a space away from prying eyes in
which he can be „himself‟. This naturally prompts the individual to reflect on what he is
like when removed from all others. This suggests the existence of a sense of self. The
absence of external pressures encourages the individual to develop and maintain a „true‟
sense of himself. It fosters a sense of being alone in a place where one can be oneself.
One can be authentic. By promoting these notions of an authentic self, privacy (in the
form of a private space) supports the development of a self-identity.
(ii) Individual experimentation – The availability of a place of refuge also allows for
individual experimentation. This facilitates the self-evaluative process. It permits the
individual to engage in activities which he would not undertake in public. This provides
an opportunity to test self-identity by questioning an individual‟s prevailing self-image
and trying out new potential attributes of the self. The individual is able to explore and
evaluate his internal self without imperilling his social identity. A private space thus
supports the individual‟s capacity for self-evaluation and self-presentation.
(iii) Access to the self – By regulating access to the individual, privacy permits the
creation of a social identity. The individual retains a power of self-presentation. This is an
important attribute of autonomy in a social world. It allows the individual to mark
himself out as a separate, self-governed entity. This also supports self-government by
allowing the individual to develop a diverse range of social relationships. Maintaining a
variety of relationships requires reflection on the social identity which the individual
62
E. Carolan, “Stars of Citizen CCTV: Video Surveillance and the Right to Privacy in Public Places”
(2006) 28 D.U.L.J. 326 at 338.
15
wants to present to different people. This again encourages both self-identity and self-
determination.
(iv) Intimacy – This chapter has already considered the argument that privacy supports
the creation of intimate relationships. This type of relationship plays an important role in
an individual‟s self-determination. It is to his intimates that a person will usually turn for
direction on the most difficult aspects of his self-evaluative process. An individual will
look to others for guidance as to the veracity or otherwise of his choices and intentions.
The views of those closest to him will often have the most significant influence. It is in
the context of these closest, most intimate relationships that many of an individual‟s most
important self-determined acts may be suggested, debated and assessed. By creating the
conditions for such intimacy, privacy further supports the autonomy of the individual.
“[P]rotec[t] a right to personal development, and the right to establish and develop
relationships with other human beings and the outside world …. [T]he Court
considers that the notion of personal autonomy is an important principle
underlying the interpretation of [Article 8‟s] guarantees.”63
63
(2002) 35 EHRR 1 at para. 61.
64
Aristotle, The Politics, I. ii. 9. Politikon zoon is often translated as political animal. However, Aristotle
was making the argument that man has an inherent need for social interaction, not political discussion. The
less common translation is used here to avoid confusion.
16
those which facilitate constructive social action and intercourse”.65 It is a right which,
when conceived of in this way, does not properly belong to the Anglo-American tradition
of negative civil liberties. It is not an immunity which guarantees freedom of action in a
limited sphere. Autonomy, on this view, is not secured by the absence of government or
external intervention. It is instead supported by the state‟s active involvement in the
protection of privacy. This creates the conditions for autonomy. In its emphasis on state
action, this understanding of privacy owes more to traditional European conceptions of
rights.
This echoes the theories of those like Raz67 and Rawls68 who see social co-ordination as a
necessary condition for individual freedom. Liberty depends upon the actions of others. It
is accordingly better protected in a regulated and socialised existence than in a Hobbesian
state of nature.
For this reason, the socialised conception of privacy is preferable. It more accurately
encapsulates the reality of contemporary life. It encourages social cohesion by treating
individual freedom and social regulation as complementary rather than opposing
interests. In so doing, it ensures greater scope for the exercise of individual freedom than
a system based on the immunity from government action of limited areas of activity. It
supports the processes of self-identification, self-evaluation and self-determination and,
in so doing, allows for self-governed “individuation”69 in the social sphere. This avoids
the dehumanised homogeneity of Bloustein‟s vision and secures instead the individual‟s
position as the autonomous entity of Kantian theory. Privacy is thus a necessary condition
for individual autonomy. This is the reason for its protection. As Rössler has explained:
“[T]he concept of privacy demarcates for the individual realms or dimensions that
he needs in order to be able to enjoy the individual freedom exacted and legally
safeguarded in modern societies …. [S]uch realms or dimensions of privacy
substantialize the liberties that are secured because the mere securing of freedom
… does not in itself necessarily entail that the conditions are secured for us to be
able to enjoy these liberties as we really want to.”70
65
D. Feldman, loc. cit. at 40.
66
J. Reidenberg, “Resolving conflicting international data privacy rules in cyberspace” (2000) 52 Stanford
L. Rev. 1315 at 1347.
67
J. Raz, The Morality of Freedom (Clarendon, 1986).
68
See, for example, J. Rawls, A Theory of Justice (revised ed., Oxford University Press, 1999); Justice as
Fairness: A Restatement (Belknap, 2001).
69
J. Kahn, “Privacy as a Legal Principle of Identity Maintenance” (2003) 33 Seton Hall L. Rev. 371 at 378.
70
B. Rössler, loc. cit. at 72.
17
With the protection of privacy, the conditions for the autonomous enjoyment of these
freedoms are secured. It thus “derives its weight and importance from its capacity to
foster the conditions for a wide range of other aspects of human flourishing”.71
Liberal, democratic and communitarian theories of the state all emphasise the importance
of individual autonomy. It encourages diversity, creativity, rationality and choice A right
to privacy accordingly benefits both the individual and the society in which he lives.
It was for this reason that Lords Rodger and Brown recently asserted in R (Countryside
Alliance) v Attorney General73 that the concept of private life should include social
activities as part of Article 8‟s protection of an individual‟s personal development.
DIMENSIONS OF PRIVACY
71
D. Feldman, loc. cit. at 21.
72
J. Craig, loc. cit. at 361.
73
[2007] UKHL 52.
74
ibid. at para. 139
18
supports the development of a workable regime by allowing judges and jurists to
effectively engage with the concept of privacy. It simplifies the concept by concretising it
but advances the system‟s treatment of it by facilitating the adoption of an appropriately
multi-dimensional approach. This allows privacy claims to be properly contextualised.
For the purposes of this book, the different dimensions of privacy will be classified
according to the subject-matter of the claim. This is a user-friendly approach because the
subject-matter is usually relatively easy to identify. A claimant will typically assert a
right of control over something. By identifying that something, the claimant will also
thereby determine the character of their claim.
(i) Decisional privacy – This relates to the individual‟s entitlement to make their own
decisions. This is clearly an aspect of individual self-determination. In terms of its
efficacy as an operational principle, however, it suffers from the same over-broad
character as the right to be let alone. In its traditional form, it restricts the actions of the
state. In any stronger form, its assertion of uninhibited autonomy is socially destructive.
To be workable, it requires the incorporation into it of additional criteria which would
equip the court to distinguish between competing liberty claims. In the U.S., for example,
the Supreme Court has upheld decisional privacy where it relates to a fundamental
interest. This obviously requires, however, the articulation of a distinct theory of what
constitutes a fundamental interest. This book will therefore not deal with claims of
decisional privacy. It is questionable if these are in fact species of privacy interest at all.
Even if they are, however, this dimension of privacy is internally incomplete. It is
unusable in the absence of a broader political theory about social organisation and
individual autonomy. Devising such a wide-ranging doctrine is outside the scope of this
work.
75
The categories used here are similar to Rössler‟s suggested treatment of privacy as comprised of
decisional privacy, local privacy and informational privacy and La Forest J.‟s proposal in R. v Dyment
(1988) 55 D.L.R. (4th) 503 that privacy claims attached to zones of territorial, personal and informational
privacy. They are also similar to Gallagher‟s discussion of the right to privacy in terms of territory,
confidentiality and decision making. See P. Gallagher, “Tribunals and the Erosion of the Right to Privacy”
(1999) 4 Bar Review 406.
19
(iii) Informational privacy – This category is regarded by many authors as the archetypal
privacy claim. It protects the individual‟s entitlement to control the disclosure of
information about his self. This dimension of privacy is engaged in any situation in which
an individual claims that others, be they specified or otherwise, have accessed
information about him which they ought not to have had.
76
N. Moreham, “Privacy in the Common Law: A Doctrinal and Theoretical Analysis” (2005) 121 L.Q.R.
628 at 638.
20
This criticism would be particularly problematic given the emphasis attached in this
chapter to privacy‟s utility as a facilitative principle of social interaction. A definition of
privacy which precluded the possibility of sociably exercising the right would not fit with
this chapter‟s conception of privacy.
77
ibid. at 636.
78
This is discussed further below.
79
L. J. Strahilevitz, “A Social Networks Theory of Privacy” (2005) 72 U. Chi. L. Rev. 919.
21
a wide audience, regardless of the defendant‟s acts. This theory again assumes that
privacy is a factual state of controlled inaccess. The focus of the court‟s enquiry on a
“social networks” approach would be on whether privacy could factually be said still to
exist. Privacy is, however, an entitlement to exercise control which is protected by the
courts as a normative corollary of individual autonomy. The correct approach, therefore,
is to consider whether the claimant, as an autonomous individual, ought to be entitled to
exercise control over the act in question.
22
the defendant was free to do as he pleased with the photograph. This does not vindicate
the right to privacy. Milton illustrates how, in articulating a privacy case, “it is essential
to characterise the invasion of privacy carefully” so that the court is not led into error.
Defining privacy as all-or-nothing inaccessibility encourages this sort of analytical mis-
step by concentrating attention on the way in which access was initially obtained. To
adequately protect privacy, a system must be capable of enforcing an individual‟s desire
not to allow himself to be accessed in unwelcome ways by unwelcome others. This can
only be done if privacy is conceived of as the power to control not access per se, but the
access of particular others (be they identifiable or otherwise) to particular material.
Privacy is not the factual state of being inaccessible. It is the normative entitlement to
regulate one‟s own social existence through the flexibly multi-faceted control of other‟s
access to the self. A court faced with a properly-formulated privacy claim is required to
ask itself whether the plaintiff ought to be entitled to exercise control over the
defendant‟s threatened acts (or ought to have been entitled where the case concerns
damages in relation to a past act).
23
The Relationship between Privacy, Autonomy and Expression
Privacy and freedom of expression are often portrayed as opposing interests. This is a
result of the fact that the archetypal privacy action seeks to restrain, or to recover
damages in respect of, the dissemination of allegedly private information by a media
outlet. In that scenario, there is a clear conflict between the individual‟s asserted right to
preserve their privacy and the media‟s constitutional entitlement to publish information.
That is not always the case, however. As this section will show, there may be
circumstances in which privacy and freedom of expression operate as complementary
rather than conflicting values.
The latent compatibility of privacy and free expression interests derives from their
shared concern for individual autonomy. This chapter has argued at some length that the
protection of privacy is justified because it supports the autonomy of the individual
citizen. Similarly, the right of an individual to speak freely is protected in part because
expression is one of the primary ways in which an individual can assert their autonomy.
As Richards explained it:
Protecting an individual‟s privacy creates the conditions necessary for him to fully
exercise his free speech rights. It assures him of a sphere in which his expression of his
ideas can be as robust and uninhibited as he likes, unencumbered by the prospect of
external regulation or reproach.
A logical corollary of this is that a failure to adequately protect privacy may hamper an
individual‟s exercise of his entitlement to freedom of expression. Surveillance of the
individual might, for example, discourage him from giving voice to an opinion which he
would have expressed in private. A threat of media disclosure might similarly lead an
individual to withhold his views on various matters. This is especially so where the
opinion held is an unpopular one which, if publicly exposed, would be likely to attract
condemnation. Yet the articulation of such unorthodox views is the essence of freedom of
expression. The absence of an enforceable right to privacy can lead to the sort of
individual self-censorship which has a profoundly chilling effect upon that person‟s
freedom of speech.
This may be illustrated by reference to a number of concrete examples. In the decision
in Mahon v Keena,82 a Divisional High Court recognised the existence in Irish law of the
81
D. A. J. Richards, “Free Speech and Obscenity Laws: Towards a Moral Theory of the First Amendment”
(1974) 123 U. Pa. L. Rev. 45 at 62. Other autonomy-based defences of freedom of expression can be found
in R. Dworkin, A Matter of Principle (Harvard University Press, 1985); M. Redish, Freedom of
Expression: A Critical Analysis (Michie, 1984). D. Strauss, “Persuasion, Autonomy and Freedom of
Expression” (1991) 91 Columbia L. Rev. 334; T. Nagel, “Persona Rights and Public Space” (1995) 24
Philosophy and Public Affairs 83.
82
[2007] IEHC 348.
24
concept of journalistic privilege. This means that Irish journalists are generally immune
from any obligation to disclose the identity of their sources. The court was clear that this
privilege will most strongly protect the identity of sources with whom journalists have
cultivated a relationship. This reflects the fact that “without sources of information,
journalists will be unable to keep society informed on matters which are … of public
interest”. The court accepted that it would be more difficult to convince people to inform
journalists about such matters if there was a risk that the journalist might be obliged to
reveal their identity. By protecting the privacy of the source, the law makes it more likely
that they will speak about issues of public importance.
83
Fn. 3 above.
84
(2001) 532 U.S. 514.
25
fear of public disclosure of private conversations might well have a chilling effect on
private speech”,85 citing with approval a Presidential Commission‟s statement that:
Breyer J.‟s concurring opinion (with which O‟Connor J. agreed) advanced a similar view.
He held that the federal prohibition on wire-tapping aimed to protect personal privacy.
He also noted that the intrusive impact of the initial interception may be exacerbated if
subsequent media disclosure of it is permitted.
Breyer and O‟Connor JJ. thus expressly envisaged the possibility that the media could be
prohibited from broadcasting intercepted conversation in cases where it was accepted that
they had acted lawfully. The two judges (who were the „swing‟ members of the majority)
were at pains to emphasise that dissemination was constitutionally protected only in the
unusual circumstances of this case. The individuals here were public figures who had no
legitimate interest in protecting the privacy of a conversation in which physical threats
were made. On the facts before the court, “the speakers‟ legitimate privacy expectations
are unusually low and the public interest in defeating those expectations is unusually
high”.89 In general, however, the importance of the right to privacy would permit the
legislative restriction of media dissemination even where the media had not acted
unlawfully.
For the minority, Rehnquist C.J. also agreed that privacy and freedom of speech were
connected, commenting that the Congress‟ “concern for privacy was inseparably bound
85
(2001) 532 U.S. 514 at 533.
86
President‟s Commission on Law Enforcement and Administration of Justice, The Challenge of Crime in
a Free Society (1967), cited at 533.
87
(2001) 532 U.S. 514, at 537.
88
ibid. at 537.
89
ibid. at 540.
26
up with the desire that personal conversations be frank and uninhibited, not cramped by
clandestine surveillance and purposeful disclosure”.90 Permitting the broadcast of the
intercepted conversation, in the minority‟s view, “diminishe[d] rather than enhance[d] the
purpose of the First Amendment”.91
“From the perspective of privacy, disclosure to, and by the press, is much more
damaging than conversation between family and friends. Media gossip is quite
different in its impact from village gossip.”93
90
ibid. at 543.
91
ibid. at 542.
92
E.Barendt, “Privacy and Freedom of Speech” in A. T. Kenyon & M. Richardson eds., New Dimensions
In Privacy Law: International and Comparative Perspectives (2006, Cambridge University Press), at 30.
93
ibid. at 23.
94
Valentine v Chrestensen (1942) 316 U.S. 52. The American courts have subsequently moved away from
this stark view of commercial speech as falling outside the First Amendment. See A. O‟Neill, “Corporate
Freedom of Expression” (2005) 26 DULJ 184.
95
[1991] 8 C.C.L.T. (2d) 302.
27
entirely driven by commercial considerations. As Viau J. observed, “[o]ne could not find
a better example of a case where commercial interest took precedence over the interest of
the public and the right to private life”.96
This leads on to the third and most significant distinction between individual and media
defendants – that the law‟s protection of their interest in expression is premised on the
protection of very different values. This means that different interests are engaged in a
privacy claim. Conducting a balancing exercise between the right to privacy of an
individual and another individual‟s freedom of expression is an analytically different
matter to that involved in weighing an individual‟s privacy rights against a media outlet‟s
freedom of expression.
96
ibid. at 310. Translation.
97
See, for example, K. Greenawalt, “Free Speech Justifications” (1989) 89 Columbia L. Rev. 119.
98
E. Barendt, loc. cit. at 23.
99
The Supreme Court held in State (Lynch) v Cooney [1982] 1 I.R. 337 that an individual does not enjoy
any legal entitlement to make a broadcast or otherwise have access to the airwaves, per O‟Higgins C.J. at
362 and Henchy J. at 382.
100
A. O‟Neill, The Constitutional Rights of Companies (2007, Thomson Round Hall), at 200.
28
The media‟s contribution to society is usually explained in terms of its fostering of a free
market of ideas,101 and its provision of information to the voting public about issues of
national or governmental concern.102
There is considerable support for the consequentialist analysis of media freedom in
Irish law. Article 40. 6. 1. (i) evinces this view of the media by connecting the protection
of the press with the education of public opinion. The Irish courts too have demonstrated
an increasingly sophisticated awareness of this important distinction between individual
and media expression. Judicial discussions of media freedom over the last decade have
generally been framed in consequentialist terms.103
On this analysis, the protection of the media‟s freedom of expression is justified for
what it does, rather than for what it is. Media expression is not valued for its own sake. It
is protected because of a belief that this protection will produce positive social benefits.
This logically implies that it is permissible to regulate or restrict non-beneficial media
expression. “The force of a consequentialist reason is dependent on the factual
connection between a practice and the supposed results of the practice”.104 If media
expression (or, more specifically, certain forms of media expression) does not produce
positive effects, arguments in favour of its protection accordingly lose their force. That is
not to say, of course, that media expression does not deserve strong legal and
constitutional protection. It does, however, mean that it may be justifiable to hold in an
appropriate case that media expression does not serve any social benefit, or that its
benefit is outweighed by a competing social value or by a fundamental individual right.
For example, the Canadian Supreme Court has refused to extend constitutional
protection to false publications about political figures on the grounds that they would
have detrimental rather than beneficial consequences. Cory J. found that “the
dissemination of falsehoods … exact a major social cost by deprecating truth in public
discourse”105, reasoning that “[f]alse reports are „inimical to the search for truth” and
“harmful to the interests of a free and democratic society”.106
101
See, for example, J. Milton, Areopagitica (1819); J. S. Mill, On Liberty (1859); Abrams v U.S. (1919)
250 U.S. 616, per Holmes J. dissenting.
102
The provision of information to the public is secured by the separate but related media functions of
communicating information and investigating and exposing abuses of power. See, for example, V Blasi,
“The Checking Value in First Amendment Theory (1977) 2 American Bar Foundation Research Journal
521; A. Meikeljohn, Political Freedom (Harper, 1960); E. Barendt, Freedom of Speech (2nd ed., Oxford
University Press, 2007). For a discussion of the differences between these theories of media freedom, see
E. Carolan, “Defamation and Privacy Reform: A Democratic Model of Media Freedom?” (2006) 11 (5) Bar
Rev.iew 147.
103
See, for example, Irish Times v Ireland [1998] 1 I.R. 359; Murphy v IRTC [1998] 2 I.L.R.M. 360; Kelly
v O’Neill [2000] 1 I.R. 354; Hunter v Duckworth [2003] IEHC 81; Cogley v R.T.E. [2005] 4 I.R. 79; Leech
v Independent Newspapers (Ireland) Ltd [2007] IEHC 223.
104
K. Greenawalt, “Free Speech Justifications” (1989) 89 Columbia L. Rev. 119 at 128.
105
Hill v Church of Scientology [1995] 2 S.C.R. 1130 at 1183, per Cory J.
106
[1995] 2 S.C.R. 1130 at 1174.
29
whether the media‟s conduct in uncovering and/or disseminating the „private‟
information in question is a socially beneficial act which thereby deserves protection.
This is a balancing exercise which is not automatically weighted towards one interest or
another but which must be carried out on a careful examination of the facts of a case. A
consequentialist conception of media freedom means that the interests of the media will
not automatically trump the privacy rights of the individual. A court is instead obliged to
conduct a more subtle and sophisticated analysis of a competing social policy and
individual right.
30