Key Takeaways: Chapter 7 — What Is Privacy? Definitions and Debates
Core Takeaways
-
Privacy is not a single concept but a family of related concerns. The chapter traces privacy from Warren and Brandeis's "right to be let alone" (1890) through Westin's informational control framework (1967) to Nissenbaum's contextual integrity (2010). Each theory illuminates different dimensions of privacy — withdrawal, control, and contextual appropriateness — and no single theory captures the full picture. Understanding privacy requires drawing on multiple frameworks.
-
Warren and Brandeis captured something essential but insufficient. Their definition of privacy as "the right to be let alone" identified privacy as a right grounded in personality, not just property. But its passive framing, individual focus, and binary nature make it inadequate for the data age, where people simultaneously want to participate in digital life and maintain some degree of privacy. The insight endures; the framework does not.
-
Westin's four states of privacy map the territory of what privacy protects. Solitude (freedom from observation), intimacy (candor within chosen small groups), anonymity (being in public without identification), and reserve (the right to withhold aspects of oneself) describe the distinct dimensions of personal control over the boundary between self and world. In the digital age, all four states are under pressure — particularly reserve, which is undermined not by direct surveillance but by inference engines that deduce what you chose not to disclose.
-
Nissenbaum's contextual integrity is the most powerful framework for evaluating digital privacy. Privacy violations occur when information flows breach the established norms of the social context in which the information was shared — even when the data is not "secret" and even when formal consent was given. The framework's five parameters (type of information, subject, sender, recipient, transmission principle) provide a rigorous method for evaluating whether a data practice is appropriate. Its core insight — that the problem is the context breach, not the data collection per se — explains why so many data practices feel wrong even when they are technically legal.
-
The "nothing to hide" argument fails on seven counts. The argument's appeal rests on a narrow equation of privacy with concealment of wrongdoing. But privacy also protects autonomy, intellectual freedom, intimate relationships, political dissent, and personal development. Data collected today may be interpreted by future regimes with different values. Aggregation transforms individually innocuous data into intimate portraits. The argument ignores power dynamics, is self-refuting (as Snowden demonstrated by analogy to free speech), overlooks privacy's social value, and reverses the burden of proof. In a democratic society, the government justifies its intrusions — citizens do not justify their desire for privacy.
-
Privacy norms vary across cultures, and this variation matters for global governance. European, American, East Asian, Middle Eastern, African, and Indigenous traditions approach privacy differently — as a fundamental right, a balanced interest, a collective concern, a family matter, a communal resource, or a relational value. These differences are not random; they reflect distinct historical experiences and social structures. Global data governance cannot succeed by imposing any single tradition; it requires cross-cultural negotiation and flexible frameworks.
-
Privacy matters because it is structural, not merely personal. Privacy is essential for autonomy (free choice requires control over personal information), democracy (deliberation and dissent require spaces free from surveillance), social trust (functioning social contexts depend on appropriate informational norms), dignity (being reduced to a data profile violates moral personhood), and equity (privacy violations disproportionately harm marginalized communities). These are not individual preferences but conditions for a just society.
Key Concepts
| Term | Definition |
|---|---|
| Right to privacy | The legal and philosophical claim to protection against unwanted intrusion into personal life, first articulated as "the right to be let alone" by Warren and Brandeis (1890). |
| Informational privacy | The dimension of privacy concerned with the collection, use, storage, and dissemination of personal information. |
| Contextual integrity | Nissenbaum's framework holding that privacy is maintained when information flows conform to the established norms of the relevant social context, and violated when those norms are breached. |
| Informational norms | The socially established rules governing what information is appropriate to share, by whom, to whom, about whom, and under what conditions within a given social context. |
| Reasonable expectation of privacy | The legal standard (from Katz v. United States, 1967) that Fourth Amendment protection applies when a person has an expectation of privacy that society recognizes as reasonable. |
| Informational self-determination | The right, articulated by the German Constitutional Court (1983), of individuals to control how personal information about them is collected and used — a fundamental right grounding European data protection law. |
| Privacy as secrecy | The reductive framing of privacy as the concealment of information, which the chapter critiques as inadequate because privacy protects far more than secrets. |
| Privacy as control | Westin's framework defining privacy as the claim to determine when, how, and to what extent information about oneself is communicated to others. |
| Privacy as contextual norm | Nissenbaum's framing of privacy as appropriate information flow within social contexts, rather than secrecy or individual control. |
| Third-party doctrine | The legal doctrine (from Miller and Smith) holding that information voluntarily shared with a third party is not protected by the Fourth Amendment — challenged by Carpenter v. United States (2018). |
| Nothing to hide argument | The claim that individuals who are not engaged in wrongdoing have no reason to object to surveillance — critiqued in the chapter through seven substantive responses drawing on Solove. |
Key Debates
-
Is privacy a universal human right or a culturally contingent value? The chapter documents significant cross-cultural variation in privacy norms while arguing that this variation is not random. The tension between universalist claims (privacy as a human right) and pluralist recognition (privacy norms differ) defines the frontier of global data governance.
-
Does contextual integrity adequately address contexts that are themselves unjust? If informational norms are established within a context of discrimination or oppression, does conforming to those norms protect privacy — or does it protect injustice? This challenge pushes the framework toward a normative question it does not fully resolve.
-
Is the "nothing to hide" argument ever valid? The chapter provides seven responses, but the argument's persistence suggests it reflects a genuine intuition — perhaps that some degree of transparency is a social obligation. The strongest version of the counterargument may be: even if some surveillance is justified, the question is always how much, by whom, and with what safeguards.
-
How should privacy be balanced against public safety, free speech, and innovation? Privacy is not absolute — it exists in tension with other values. The challenge is not to eliminate the tension but to establish principled frameworks for navigating it, with clear burdens of proof and meaningful accountability.
Applied Framework: Evaluating a Data Practice
When evaluating whether a data practice respects or violates privacy, apply this five-step method (from Section 7.3.3):
| Step | Action | Key Question |
|---|---|---|
| 1 | Identify the context | What social domain is this data practice operating in? |
| 2 | Identify existing norms | What information flows are expected in this context? Who normally sends what to whom, under what conditions? |
| 3 | Describe the new practice | What information is flowing? From whom to whom? Under what conditions? |
| 4 | Compare | Does the new practice conform to established norms, or breach them? |
| 5 | Evaluate the breach | If norms are breached, is the breach justified by compelling values? Or does it undermine the social functions the original norms served? |
This method does not produce automatic answers — Step 5 requires judgment. But it ensures that the right questions are asked and that privacy claims are evaluated against specific contextual norms rather than abstract principles.
Looking Ahead
Chapter 7 established what privacy is and why it matters. Chapter 8, "Surveillance — From Panopticon to Platform," examines the mechanisms through which privacy is eroded — from Bentham's architectural design through CCTV networks, NSA mass surveillance programs, facial recognition, and the platform dataveillance that characterizes everyday digital life. The theoretical foundations laid in this chapter will become concrete as we trace the systems and technologies of watching, tracking, and recording in the modern world.
Use this summary as a study reference and a quick-access card for key vocabulary. The five-step contextual integrity method will recur throughout this textbook whenever data practices are evaluated.