Abstract
This chapter provides an overview of the concept of privacy, liberty and security; outlines the merits of privacy; provides an overview of the international legal instruments that stipulate the right to privacy; and clarifies the interrelationship between privacy, liberty, and security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
Taylor 2002, p. 76.
- 3.
See, e.g., Solove 2006.
- 4.
Stephen 1873, p. 160.
- 5.
Feldman 2012.
- 6.
Schermer 2007.
- 7.
Warren and Brandeis 1890, p. 193.
- 8.
For the purposes of this book, “information privacy” is synonymous with “data protection”.
- 9.
Westin 1967, p. 7.
- 10.
Thompson 2008.
- 11.
For further discussion on the scope of privacy, see, e.g., Nissenbaum 2004.
- 12.
The “right to be left alone” is often associated with the freedom from unreasonable, unlawful or disproportionate surveillance and the right to be free from unnecessary or excessive disturbance.
- 13.
See, for further discussion, Nissenbaum 2004.
- 14.
See Article 2(a) of Directive 95/46/EC.
- 15.
- 16.
See, e.g., Feldman 1994.
- 17.
See also, for further discussion, e.g., Feldman 2002.
- 18.
Warner 2005.
- 19.
Taylor 2002, p. 82.
- 20.
Schermer 2007.
- 21.
Ibid.
- 22.
Ibid.
- 23.
Hence the reason, for example, why Section 222(a)(5)(A) of the Homeland Security Act requires the DHS Chief Privacy Officer to “coordinate with the Officer for Civil Rights and Civil Liberties to ensure that programs, policies and procedures involving civil rights, civil liberties and privacy considerations are addressed in an integrated and comprehensive manner”. (emphasis added).
- 24.
OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (1980), para 29.
- 25.
Holtzman 2006, p. 53.
- 26.
R. v. Dyment [1988] 2 S.C.R. 417, at 427–8.
- 27.
Westin 1967, p. 24.
- 28.
Global privacy standards for a global world 2009.
- 29.
Schermer 2007, p. 121.
- 30.
Ibid., p. 73.
- 31.
Ibid.
- 32.
For further discussion, see, e.g., Feldman 1994.
- 33.
See, e.g., Charter of Fundamental Rights of the European Union (2000), Article 6.
- 34.
Data security concerns the security of information technology/infrastructures and the information stored thereof.
- 35.
Cyber security has become absolutely essential for national security and the security of critical infrastructure.
- 36.
See, for further discussion, Etzioni 1999.
- 37.
Constitution Committee—Second Report, Surveillance: citizens and the state (Session 2008–2009), para. 45, available at: http://www.parliament.the-stationery-office.com/pa/ld200809/ldselect/ldconst/18/1802.htm. Accessed 12 February 2014.
- 38.
See, e.g., the Charter of Fundamental Rights of the European Union, Article 52(1).
- 39.
For example, during the post-i2010 Public Hearing on “Priorities for a new strategy for European Information Society” held 23 September 2009 in Brussels, which I attended, a representative from the Creative and Media Business Alliance (CMBA) made the following oral statement: “Some, such as cyber-squatters, spammers, identity thieves, virus disseminators, cyber-bullies and other illegal content providers call for more “data protection” and “safe harbours” on the Internet in the name of freedom of expression and hide behind these but do not respect them themselves”. CMBA’s full statement is available at: http://www.cmba-alliance.eu/papers/CMBA_Statement_23Sep09.pdf. Accessed 12 February 2014.
- 40.
For example, the recording and recent publication of detailed images of the perimeters of the headquarters of the SAS (British Special Forces) by Google on Street View, including its precise location, has been deemed a serious threat to security by UK military leaders and Members of Parliament. See “Fury as Google puts the SAS’s secret base on Street View in ‘very serious security breach’”. Daily Mail, 19 March 2010, available at: http://www.dailymail.co.uk/news/article-1259162/Google-Street-View-shows-secret-SAS-base-major-security-breach.html. Accessed 12 February 2014.
- 41.
Smith 1776.
- 42.
Paley 1785, pp. 444–445.
References
Berlin I (1958) Two concepts of liberty. Oxford University Press, Oxford
Constitution Committee—Second Report (2014) Surveillance: citizens and the state (Session 2008–2009), para 45. http://www.parliament.the-stationery-office.com/pa/ld200809/ldselect/ldconst/18/1802.htm. Accessed 12 February 2014
Etzioni A (1999) The limits of privacy. Basic Books, New York
Feldman D (2002) Civil liberties and human rights in England and Wales. Oxford University Press, Oxford
Feldman D (1994) Secrecy, dignity or autonomy? Views of privacy as a civil liberty. Current Legal Prob 47(2):41–71
Feldman N (2012) Strip-search case reflects death of American privacy (Bloomberg, 9 April 2012). http://www.bloomberg.com/news/2012-04-08/strip-search-case-reflects-death-of-american-privacy.html. Accessed 31 July 2013
Gavison R (1980) Privacy and the limits of law. Yale Law J 89(3):421–471
Global privacy standards for a global world (2009) The Civil Society Declaration, Madrid, Spain, 3 November 2009, (known as the Madrid Privacy Declaration). http://thepublicvoice.org/madrid-declaration/. Accessed 12 February 2014
Holtzman D (2006) Privacy lost: how technology is endangering your privacy. Jossey-Bass, San Francisco
McClurg AJ (1995) Bringing privacy law out of the closet: a tort theory of liability for intrusions in the public space. North Carolina Law Rev 73(3):989–1088
Neocleous M (2007) Security, liberty and the myth of balance: towards a critique of security politics. Contemp Polit Theor 6(2):131–149
Nissenbaum H (2004) Privacy as contextual integrity. Washington Law Rev 79(1):101–140
Paley W (1785) The principles of moral and political philosophy. R. Faulder, London
Schermer BW (2007) Software agents, surveillance, and the right to privacy: a legislative framework for agent-enabled surveillance. Leiden University Press, Leiden
Smith A (1776) An inquiry into the nature and causes of the wealth of nations
Solove D (2008) Understanding privacy. Harvard University Press, Cambridge
Solove D (2006) A taxonomy of privacy. Univ Pennsylvania Law Rev 154(3):477–560
Stephen JF (1873) Liberty, equality, fraternity. London
Taylor N (2002) State surveillance and the right to privacy. Surveill Soc 1(1):66–85
Thompson C (2008) Clive Thompson on why the next civil rights battle will be over the mind (Wired, 24 March, 2008). http://www.wired.com/techbiz/people/magazine/16-04/st_thompson. Accessed 31 July 2013
Wacks R (1980) The protection of privacy. Sweet & Maxwell, London
Waldron J (2003) Security and liberty: the image of balance. J Political Philos 11(2):191–210
Warner R (2005) Surveillance and the self: privacy, identity, and technology. DePaul Law Rev 54(3):847–871
Warren SD, Brandeis LD (1890) The right to privacy: the implicit made explicit. Harvard Law Rev IV(5):193–220
Westin A (1967) Privacy and freedom. Atheneum, New York
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 T.M.C. Asser Press and the author(s)
About this chapter
Cite this chapter
Klitou, D. (2014). Privacy, Liberty and Security. In: Privacy-Invading Technologies and Privacy by Design. Information Technology and Law Series, vol 25. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-026-8_2
Download citation
DOI: https://doi.org/10.1007/978-94-6265-026-8_2
Published:
Publisher Name: T.M.C. Asser Press, The Hague
Print ISBN: 978-94-6265-025-1
Online ISBN: 978-94-6265-026-8
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)