SlideShare a Scribd company logo
PRIVACY AND TECHNOLOGY
IN THE TWENTY-FIRST CENTURY
Mark A. Rothstein
We live in a society increasingly dependent on and enamored by
technology, including communications, surveillance, forensic,
health care,
and other forms of technology. Yet, we also purport to value
privacy. Is it
possible to have both technology and privacy—to realize the
benefits of
technology without compromising privacy? Do current laws
provide
adequate protections in light of new technologies? These are
difficult
questions and, to start, we need to define what we mean by
privacy.
Privacy has different aspects or dimensions,' including
informational,'
physical,^ decisional," proprietary,^ and relational or
associational* privacy.
This talk will focus primarily on informational privacy, which
fits well
within the general definition of privacy as a condition of limited
access to
an individual or information about an individual.' The related
concept,
confidentiality, is defined as a condition under which
information obtained
or disclosed within a confidential relationship is not redisclosed
without the
permission of the individual.^ Security is defined as personal,
physical, and
electronic measures granting access to certain information to
persons or
entities authorized to receive it and denying access to others.'
Any discussion of the law of privacy, especially in this
building, should
start with Justice Brandeis. As many of you know, Brandeis
coauthored a
famous law review article in 1890 with his law partner, Samuel
D. Warren,
* Herbert F. Boehl Chair of Law and Medicine, University of
Louisville School of Medicine.
Nicholas Craddock, J.D. 2014, provided excellent research
assistance. Annotated and expanded version
of remarks for Constitution Day, September 17, 2013, at the
Brandeis School of Law, University of
Louisville.
' TOM L. BEAUCHAMP & JAMES F . CHILDRESS,
PRINCIPLES OF BIOMÉDICAL ETHICS 312 (7th ed.
2013) (principally relying on the work of Anita Allen).
^ Id
^ Physical privacy focuses on persons and their personal spaces.
Id.
* Decisional privacy concerns personal choices. Id.
Proprietary privacy involves property interests in the person,
such as a person's image. Id.
' Relational or associational privacy includes the family and
similarly intimate relations. Id.
' NAT'L COMM. ON VITAL & HEALTH STATISTICS ( N C V
H S ) , PRIVACY AND CONFIDENTIALITY IN
THE NATIONWIDE HEALTH INFORMATION NETWORK
(2006), available at www.ncvhs.hhs.gov/060622
/t.htm.
' See id
' See id
333
334 UNIVERSITY OF LOUISVILLE LAW REVIEW [Vol.
52:333
called "The Right to Privacy."'" What was their motivation for
writing it?
Warren was married to the former Mabel Bayard, the daughter
of Senator
Thomas F. Bayard of Delaware, a leading Democrat who
unsuccessfully
sought his party's presidential nomination three times." As a
society
couple, Samuel and Mabel Warren were featured frequently in
the press. In
fact, according to one study, between 1882, when they were
first engaged,
and 1890, when the Harvard Law Review article was published,
sixty
stories about their personal lives appeared in the newspapers of
Boston,
New York, and Washington.'^ Warren resented the press
intruding into his
private life,'^ and he asked Brandeis to help develop a legal
theory to
redress "the more fiagrant breaches of decency and
propriety."''*
Technology also played a role. The first easily portable cameras
were
developed at the end of the nineteenth century, which allowed
photographers to invade "the sacred precincts of private and
domestic
life."''
The article by Warren and Brandeis, in which they brilliantly
argued for
the creation of a tort of invasion of privacy, received glowing
reviews from
legal scholars, such as Dean Roscoe Pound of the Harvard Law
School,'^
but it did not immediately translate into widespread judicial
acceptance.
That was the role of another giant in the law with a local
connection. In
1960, William L. Prosser, who was bom in New Albany,
Indiana, published
an article in the California Law Review simply called
"Privacy."'^ Prosser
proposed that the common law should recognize four types of
invasion of
privacy: (1) intrusion upon the plaintiffs seclusion or solitude;
(2) public
disclosure of embarrassing private facts about the plaintiff; (3)
publicity
that places the plaintiff in a false light; and (4) appropriation of
the
plaintiffs name or likeness.'^ These four categories appeared in
the
Restatement (Second) of Torts" and they were widely adopted
by the
'" Samuel D. Warren & Louis D. Brandeis, The Right to
Privacy, 4 HARV. L. REV. 193 ( 1890).
" Amy Gajda, What if Samuel D. Warren Hadn 't Married a
Senator's Daughter?: Uncovering the
Press Coverage That Led to "The Right to Privacy, " 2008
MICH. ST. L. REV. 35, 41. Thomas F. Bayard
(1885-1889): Secretary of State, Miller Center,
htlp://millercenter.org/president/cleveland/essays/cabinet/372
(last visited Jan. 21,2014).
'̂ Gajda, supra note 11, at 44.
" MELVIN I. UROFSKY, LOUIS D . BRANDEIS: A LIFE 98
(2009).
''' Id. See also Warren & Brandeis, supra note 10, at 215-16.
" Warren & Brandeis, supra note 10, at 195.
"• UROFSKY, supra note 13, at 101.
" William L. Prosser, Privacy, 48 CALIF. L. REV. 383 (1960).
" Id at 389.
" RESTATEMENT (SECOND) OF TORTS §§ 652A-652E
(1977). Prosser was the reporter.
2014] Privacy and Technology in the Twenty-First Century 335
courts.^" Tort actions for invasion of privacy, of course, only
apply to
private actors.
Constitutional law, applicable to governmental action, also has
been
asserted to be a source for protecting informational privacy. In
Whalen v.
Roe^^ the plaintiffs challenged the constitutionality of a New
York state
law requiring the collection in a centralized database of the
names and
addresses of all persons who obtain, pursuant to a doctor's
prescription,
certain controlled drugs, including powerful analgesics.^^ The
Supreme
Court stopped short of recognizing a constitutionally protected
interest in
informational privacy, holding that even assuming there were
such a right,
the statute was a reasonable measure to prevent the unlawful
diversion of
controlled substances.^^
The Court also recognized the growing threat to privacy posed
by
governmental data collection. In his lead opinion. Justice
Stevens wrote:
"We are not unaware of the threat to privacy implicit in the
accumulation of
vast amounts of personal information in computerized data
banks or other
massive government files . . . ." '̂' In a concurring opinion.
Justice Brennan
added: "I am not prepared to say that future developments will
not
demonstrate the necessity of some curb on such technology."^^
Future developments certainly brought ever-greater computer
capabilities and government utilization of data collection and
analysis.
Thus far, however, there have yet to be any meaningful curbs on
the
technology. After Whalen, the lower courts assumed there was a
constitutional right to informational privacy, but the courts
overwhelmingly
found the government had a compelling interest in accessing
and using
various types of personal information and therefore they upheld
a wide
range of challenged government actions.^* The Supreme Court
revisited the
issue in 2011 in NASA v. Nelsonf a challenge to allegedly
intrusive
background questionnaires and interviews of references
mandated for
employees of NASA contractors. The Supreme Court, in an
opinion by
Justice Alito, again assumed without deciding there is a
constitutional right
™ DAN B . DOBBS, THE LAW OF TORTS 1197-98 (2000); W.
PAGE KEETON ET AL., PROSSER AND
KEETON ON TORTS 849-51 (5th ed. 1984).
'̂ Whalen v. Roe, 429 U.S. 589 (1977).
' ' / ¿ a t 591-93.
'^ /d at 600,603-06.
" Id. at 605.
' ' Id. at 607 (Brennan, J., concurring).
' ' See Mark A. Rothstein, Constitutional Right to Informational
Health Privacy in Critical
Condition, 39 J.L. MED. & ETHICS 280, 281 (2011).
' ' NASA V. Nelson, 131 S. Ct. 746 (2011).
336 UNIVERSITY OF LOUISVILLE LAW REVIEW [Vol.
52:333
to informational privacy and again held the government interest
justified the
infi-ingement on privacy.^^
The final type of privacy law is statutory. During the 1970s
Congress
considered, but failed to enact, comprehensive privacy
legislation.^' In
1974, however. Congress enacted the federal Privacy Act,^°
which
established a code of fair information practices for government
agencies
that collect, use, or disseminate information. Importantly, the
law only
applies to information held by federal government agencies.^'
There are
also a number of subject-specific privacy laws at both the
federal and state
levels, such as the Family Educational Rights and Privacy Act
(FERPA)
(dealing with student records)^^ and the Health Insurance
Portability and
Accountability Act (HIPAA)" and its notorious Privacy Rule
(dealing with
health information). '̂* Although much of my research involves
health
privacy, you will, no doubt, be pleased to learn that I will not
be addressing
HIPAA and other arcane statutes and regulations today.
What I want to talk about are some other current issues
involving
technology and privacy, beginning with surveillance and then
moving to
genetic testing.
During the last few months there has been a flood of
information
disclosed about government surveillance programs. Some of the
disclosures resulted from Edward Snowden's leaks about the
existence of
the National Security Agency (NSA) program of telephone-
based metadata
analysis.^^ Other disclosures resulted from voluntary
governmental releases
of information, judicial opinions, and investigative
journalism.^* These
'̂ /¿at751.
^' See Daniel J. Solove, Privacy and Power: Computer
Databases and Metcfihorsfor Information Privacy,
53 STAN. L. REV. 1393,1440 (2001).
" 5 U.S.C. § 552a (2012).
" 5 U.S.C. § 552a(a) (2012); 5 U.S.C. § 552(f) (2012) (defining
covered "agencies" as government
entities only).
" 20 U.S.C. § 1232g(2012).
" 42 U.S.C. §§ 300gg-300gg-2 (2012).
'" Standards for Privacy of Individually Identifiable Health
Information, 45 C.F.R. pts. 160, 164
(2012).
" See, e.g., Jennifer Stisa Grannick & Christopher Jon
Sprigman, Op-Ed., The Criminal N.S.A.,
N.Y. TIMES, June 27,2013,
http://www.nytimes.com/2013/06/28/opinion/tiie-criminal-
nsa.htinl?_i=0.
'^ See, e.g., Glenn Greenwald, XKeyscore: NSA Tool Collects
'Nearly Everything a User Does on the
Internet,' THE GUARDIAN, July 3 1 , 2013,
http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-
program-online-data (revealing investigative findings about a
government program tracking individuals' intemet
activity); Ellen Nakashima, FISA Court Releases Opinion
Upholding NSA Phone Program, WASH. POST, Sept.
17, 2013, http://articles.washingtonpost.com/2013-09-
17/world/421465161 all-call-detai 1-records-phone-
records-opinion (discussing the release of a FISA court opinion
upholding the constitutionality of the N S A ' s
"bulk records" collection of phone data); Ron Nixon, Postal
Service Confirms Photographing All U.S. Mail,
N.Y. T I M E S , Aug. 2, 2013,
http://www.nytimes.com/2013/08/03/us/postal-service-confirms-
photographing-all-
us-mail.html (discussing Postal Service's Mail Isolation and
Tracking System).
2014] Privacy and Technology in the Twenty-First Century 337
disclosures raise fundamental issues of privacy protection in the
age of
technology.
At the end of July of this year, the Fifth Circuit decided a case
in which
it held that the federal government does not need a warrant to
obtain cell
phone location data from a cellular service provider. " Cell
phone location
(or cell site) data indicate the location of a particular cell phone
at various
times in the past.̂ ^ In addition, triangulating cell signal data
from more
than one cell tower or signal receiver can reveal movement of
the cell
phone and thereby the travel of the individual possessor of the
phone.^'
According to the Fifth Circuit, cell phone usage is a voluntary
activity and
therefore a user "voluntarily conveys his cell site data each time
he makes a
call."^" The court also emphasized the government is not
collecting the
information; it is merely getting access to information collected
by the
service provider.'*'
Unsurprisingly, federal legislation to require a warrant before
disclosing
cell site information has been stalled in Congress.'*^
Meanwhile, Maine'*^
and Montana'*'* have enacted laws requiring a warrant for
access to cell site
location data and additional state legislation is likely. The
effect of this
state legislation, however, is not entirely clear because of the
possibility of
federal preemption of telecommunications regulation. A case
pending in
Oregon illustrates an important preemption issue in a slightly
different
context.
In 2009, the Oregon Legislature established the Oregon
Prescription
Drug Monitoring Program, an electronic database maintained by
the
Oregon Health Authority that records information about all
"prescription
drugs dispensed by pharmacies in Oregon that are classified in
schedules II
through rV under the federal Controlled Substances Act . . . ."'*̂
The
Oregon law provides that after filling a prescription for a
controlled
" In re Application of the U.S. for Historical Cell Site Data, 724
F.3d 600, 615 (5th Cir. 2013)
[hereinafter Cell Site Data].
*̂ M at 602.
^' See L. Scott Harrell, Locating Mobile Phones Through
fínging and Triangulation, PURSUrr MAGAZINE,
July 1, 2008, http://pursuitmag.com/locating-mobile-phones-
through-pinging-and-triangulation/ (discussing
triangulating cell phone data to show phone's location).
"" Cell Site Data, 724 F.3d at 614.
"' M at 611-12.
*^ Online Communications and Geolocation Protection Act,
H.R. 983,113th Cong. (2013).
"' 2013 Me. Laws 402.
•'•' 2013 Mont. Laws 394.
"' OR. REV. STAT. § 431.962(l)(a) (2011). As of 2013, every
state except Missouri had enacted
similar legislation. Jason Hancock, Drug Czar Will Push
Missouri to Track Prescription Medicines,
KAN. CITY STAR (Aug. 15, 2012),
http://www.kansascity.com/2012/08/14/3762592/dmg-czar-to-
push-
for-prescription.html.
338 UNIVERSITY OF LOUISVILLE LAW REVIEW [Vol.
52:333
substance, Oregon pharmacies are required to report
electronically the
name, address, and date of birth of the patient, as well as
information about
the prescribing physician."* The law prohibits the state fi"om
disclosing
prescription records to law enforcement agencies unless
presented with a
"valid court order based on probable cause and issued at the
request of a
federal, state or local law enforcement agency engaged in an
authorized,
drug-related investigation involving a person to whom the
requested
information pertains.""^
Notwithstanding this language, the federal Drug Enforcement
Administration (DEA) has attempted to obtain prescription drug
information for federal law enforcement purposes by using an
administrative subpoena, as authorized by the Controlled
Substances Act."^
The DEA's position is that the state requirement of a court order
is
preempted by federal law."' The State of Oregon disagrees, and
it sued the
DEA in United States District Court seeking a declaratory
judgment that the
Oregon statute is valid and not preempted by federal law.^" The
American
Civil Liberties Union (ACLU) intervened to assert that,
notwithstanding the
preemption issue, individuals have a reasonable expectation of
privacy in
their prescription drug records, as evidenced by Fourth
Amendment case
law and the traditional precepts of the physician-patient
relationship.^' The
ACLU's motion for summary judgment is currently pending
before the
district court. In the interest of full disclosure, I am working
with the ACLU
on this case as an unpaid expert witness.
A link between the NSA metadata telephone record program and
the
pending Oregon DEA case was disclosed in a New York Times
story on
September 2, 2013.^' The Hemisphere Project, which started in
2007 but
was previously unknown, involves DEA again using
administrative
subpoenas, but this time to gain access to and data mine
comprehensive
telephone records from AT&T in combating drug trafficking.'^
DEA agents
are actually embedded at the telecommunications company,
where they
^ OR. REV. STAT. §431.964(1) (2011).
"' OR. REV. STAT. § 431.966(2)(a)(C) (2011).
"' 21 U.S.C. §876(2012).
"" Complaint for Declaratory Judgment, Or. Prescription Drug
Monitoring Program v. U.S. Drug
Enforcement Admin., No, 12CVO2023,2012 WL 5898554, at H
5 (D. Or. Nov. 9,2012).
' ' See generally Plaintiffs-lntervenors' Combined Response to
Defendant DEA's Cross-Motion for
Summary Judgment and Reply in Support of Plaintiffs-
lntervenors' Motion for Summary Judgment, No.: 3:12-
CV-02023-HA (D. Or. Sept. 23, 2013), available at
htlps://www.aclu.org/sites/default/files/assets /48._aclu_
response-reply brief.pdf
'̂ Scott Shane & Colin Moynihan, Drug Agents Use Vast Phone
Trove, Eclipsing N.S.A. 's, N.Y.
TIMES, Sept. 2,2013, at A l .
2014] Privacy and Technology in the Twenty-First Century 339
have access to the phone records of literally billions of
telephone calls
dating back to 1987.̂ '*
With each new disclosure the public has become increasingly
concerned about intrusive surveillance. Attempting to allay
public
apprehension, James Clapper, Director of National Security,
reported to
Congress that the agency has no current plans to collect cell
location data as
part of its surveillance program." Unfortunately, surveillance
programs do
not have a good track record of staying within the bounds of
their mandate.
On August 21, 2013, a previously classified decision of the
Foreign
Intelligence Surveillance Court was released, and it strongly
criticized the
NSA for failing to limit the nature of its activities.
The Court is troubled that the government's revelations
regarding NSA's
acquisition of Internet transactions mark the third instance in
less than
three years in which the government has disclosed a substantial
misrepresentation regarding the scope of a major collection
program. . . .
Contrary to the government's repeated assurances, NSA had
been
routinely running queries of the metadata using querying terms
that did
not meet the standard for querying. The Court concluded that
this
requirement had been "so frequently and systematically violated
that it can
be fairly said that this critical element of the overall. . . regime
has never
iunctioned effectively."^^
These latest revelations raise many questions. If one reluctantly
concedes that the importance of preventing terrorism justifies
some
intrusive surveillance activities, should the cloak of
constitutionality also
extend to the legitimate, but less exigent, need to monitor
billions of
personal phone calls as part of a countemarcotics law
enforcement
program? Is there a difference between one's reasonable
expectation of
privacy in prescription drug records and phone call metadata?
What
" Id. In another controversial revelation in September 2013, it
was established that the United
States has been engaged in a massive program of cryptography.
According to a story in the New York
Times, the government now has virtually unfettered access to
messages encrypted with the most
common encryption technology. Nicole Perlroth et al., N.S.A.
Able to Foil Basic Safeguards of Privacy
on Web, N.Y. TIMES, Sept. 6, 2013,
http://www.nytimes.com/2013/09/06/us/nsa-foils-much-intemet-
encryption.html?pagewanted=l&r=0&hp.
" Letter from James Clapper, Dir. of Nat'I Intelligence, Office
of the Dir. of Central Intelligence, to
Senator Ron Wyden (July 26, 2013), available at
http://www.wyden.senate.gov/download
/?id=285dc9e7-195a-4467-b0fe-caa857fc4e0d.
" Memorandum Opinion of Judge John D. Bates, 2011 WL
10945618, at '*5 n.l4 (Foreign Intelligence
Surveillance Court Oct. 3, 2011) (case name redacted). A
second highly critical judicial opinion, issued in
2009, was released by the government in September 2013. Scott
Shane, Court Upbraided N.S.A. on its
Use of Call-Log Data, N.Y. TIMES (Sept. 10, 2013),
http://www.nytimes.com/2013/09/ll/us/court-
upbraided-nsa-on-its-use-of-call-log-
data.html?pagewanted=all& r=0.
340 UNIVERSITY OF LOUISVILLE LAW REVIEW [Vol.
52:333
constitutional or other boundaries are essential to protect
unreasonable
intrusions of what Warren and Brandeis called individuals'
"inviolate
personality"?" Finally, how can we protect against the
expansion of
surveillance through "function creep"?
Perhaps the best example of function creep involves a wholly
different
type of technology—DNA forensics. The technology for
uniquely
identifying individuals from a DNA sample was developed in
the United
Kingdom by Alec Jeffreys in the mid-1980s,'^ and it was soon
adopted in
the United States for law enforcement.^' At first, state laws
limited the use
of mandatory DNA collection and forensic database creation to
individuals
convicted of murder or rape.^° These crimes were chosen
because of their
severity and the likelihood of DNA being left at a crime scene.
It was not
long, however, before a steady stream of federal and state
legislation was
enacted to expand the categories for DNA collection to all
felons, all
misdemeanants, all juvenile offenders, and finally, all
arrestees.*' The
expansion occurred without any peer-reviewed evidence of the
efficacy of
wider-scope DNA collection in solving crimes*^ and despite
substantial
backlogs in processing samples from existing categories.^^
In June 2013, the Supreme Court decided Maryland v. King.^'^
The
Court, five-to-four, in an opinion by Justice Kennedy, upheld
Maryland's
warrantless DNA collection from all arrestees charged with a
serious
crime.̂ ^ According to the majority opinion, the search was
lawful because
it was used to identify the individual and because the Court
considered
DNA testing using a buccal swab for obtaining a DNA sample
no more
intrusive than a fingerprint.** In dissent. Justice Scalia said the
purpose of
the search was not identification, but to discover evidence of
criminal
wrongdoing, and therefore a warrant was required.*^ He also
expressed his
strong belief that the majority's position of upholding DNA
testing of
" Warren & Brandeis, supra note 10, at 205.
'* See Alec Jeffreys et a l , Individual-Specific 'Fingerprints' of
Human DNA, 316 NATURE 76
(1985).
^' See Andrews v. State, 533 So. 2d 841 (Fla. Dist. Ct. App.
1988) (affirming conviction of first
reported U.S. case to admit DNA identification evidence).
'° See Mark A. Rothstein & Sandra Camahan, Legal and Policy
Issues in Expanding the Scope of
Law Enforcement DNA Data Banks, 67 BROOK. L. REV. 127,
128 (2001 ).
" See Mark A. Rothstein & Meghan K. Talbott, 7?!e Expanding
Use of DNA in Law Enforcement:
What Role for Privacy?, 34 J.L. MED. & ETHICS 153, 153
(2006).
" Id at 154.
"Id
" Maryland v. King, 133 S. Ct. 1958 (2013).
' ' Id at 1980.
"" Id
" See id at 1985-86 (Scalia, J., dissenting).
2014] Privacy and Technology in the Twenty-First Century 341
arrestees will be extended beyond the "serious crimes" of the
Maryland
law.*^ Justice Scalia wrote, "Make no mistake about it: As an
entirely
predictable consequence of today's decision, your DNA can be
taken and
entered into a national DNA database if you are ever arrested,
rightly or
wrongly, and for whatever reason."*'
Today, besides "direct" DNA searches, law enforcement
agencies use
indirect searches,^" low stringency searches,''' dragnet
searches,^^ surname
searches," health care biobank searches,̂ '* and phenotypic
profiling."
There are also calls for a DNA sample to be taken from every
individual in
the country.^* The expansion of DNA forensic analysis has
taken place
with very little objection fi-om the public or elected officials
because of the
unproven assumption that each expansion of testing reduces
crime and
therefore additional incursions on privacy are justified. In the
realm of
DNA forensics, we have lost our privacy rights through a series
of
incremental incursions, but this should offer little consolation.
As Justice
Douglas wrote in Osbom v. United States:
[T]he privacy and dignity of our citizens is heing whittled away
by
sometimes imperceptible steps. Taken individually, each step
may be of
little consequence. But when viewed as a whole, there begins to
emerge a
society quite unlike any we have seen - a society in which
government
'* Id. at 1989 (Scalia, J., dissenting).
" Id. (Scalia, J. dissenting).
™ Indirect searches involve obtaining the DNA of a family
member of a suspect, often
surreptitiously, to get genetic information from which an
inference may be made about the genetic
makeup of the suspect. See Rothstein & Talbott, supra note 61,
at 156.
" Low stringency searches occur when DNA testing results in
short tandem repeat matches with
crime scene or other DNA insufficient to establish a match, but
greater than a random amount and
therefore suggestive that the test subject is related to the
individual being sought. See id. at 156-57.
" Dragnet searches entail the collection of DNA from
individuals who fit tiie general description of
a perpetrator, usually residing or working in the same
geographic area where a crime occurred. See id.
at 155-56.
" Surname searches involve matching crime scene evidence
against a data bank of surname
haplotypes. See id. at 157.
'* Health care biobank searches involve obtaining physical
specimens of suspects from health care
facilities for DNA analysis. See id. at 157-58.
" Phenotypic profiling involves using the resuhs of DNA
analysis on an unknown sample to
construct a profile of the phenotypic characteristics (e.g.,
gender, illnesses) of the individual. See id. at
158. See genera/^y National Institute of Justice, Forensic DNA:
Alternative Genetic Markers, Research
Projects List, available at
http://www.nij.gov/topics/forensics/evidence/dna/research/altem
ative-
markers.htm (reporting that DNA analysis can indicate
ethnicity, physical characteristics, and skin, hair,
or eye color).
'^ See Rothstein & Talbott, supra note 61, at 154.
342 UNIVERSITY OF LOUISVILLE UW REVIEW [Vol.
52:333
may intrude into the secret regions of a man's life at will.^^
Genetic testing raises many other fascinating privacy issues,
including
surreptitious testing. Suppose, after my talk, I leave my empty
water bottle
here on the lectern. Would it be lawful for you to pick up the
bottle, send it
to a commercial laboratory, and have whole genome sequencing
performed?^^ The answer is that nonconsensual genetic testing
is probably
lawful in virtually every state, including the twelve states with
laws
requiring consent for certain kinds of genetic testing.^' Would it
matter if
the bottle were picked up and tested by the FBI or some law
enforcement
agency? No. As a matter of constitutional law and property law,
if I
"abandon" an item, I have relinquished any property or other
interest I have
in it and finders of the item can do with it whatever they
want.^"
In my view, when individuals inadvertently leave behind or
intentionally discard an object, such as an empty water bottle,
used chewing
gum, or cigarette butt, they are not impliedly consenting to have
any
dumpster diver retrieve the object and have whole genome
sequencing
performed. These new technologies can reveal a wealth of
information
about an individual's current and future health as well as
familial risk
factors, parentage, ancestral origin, and other information.
Although I
doubt there is much interest in my DNA, one can assume there
is a
substantial market for the DNA of entertainers, sports figures,
politicians,
and other celebrities.^' In 2012, the Presidential Commission
for the Study
of Bioethical Issues identified nonconsensual DNA testing as a
key policy
issue that should be addressed.^^
In the United Kingdom, section 45 of the Human Tissue Act of
2004
makes it unlawful for any individual, without proper consent, to
possess any
" Osbom V. United States, 385 U.S. 323, 343 (1966) (Douglas,
J., dissenting).
" Today, whole genome sequencing costs $3,000-$4,000, but the
cost keeps dropping and soon it
will be under $1,000. DNA Sequencing Costs, N A T ' L
HUMAN GENOME RESEARCH INST.,
http://www.genome.gov/sequencingcosts (last updated Oct. 29,
2013). See also Ivan Karabaliev, The
$1,000 Genome Is Almost Here—Are We Ready?, Sei. Am.
(Oct. 15, 2012),
http://blogs.scientificamerican.com/guest-blog/2012/10/15/the-
1000-genome-is-here-are-we-ready/
(guest commentary).
" These states are Alaska, Arizona, Florida, Georgia,
Massachusetts, Michigan, Nebraska, New
Mexico, New York, South Carolina, South Dakota, and
Vermont. See Mark A. Rothstein, Genetic
Stalking and Voyeurism: A New Challenge to Privacy, 57 U.
KAN. L. REV. 539, 560 n.l52 (2009).
*° See Califomia v. Greenwood, 486 U.S. 35, 39-43 (1988).
*' See Rothstein, supra note 79, at 539-43.
*̂ PRESIDENTIAL COMM'N FOR THE STUDY OF
BIOETHICAL ISSUES, PRIVACY AND PROGRESS IN
WHOLE GENOME SEQUENCING 2-3 (2012), available at
http://bioethics.gov/sites/default/files/Privacy
Progress508_l .pdf
2014] Privacy and Technology in the Twenty-First Century 343
"bodily material" with the intent to have DNA testing
performed.*^ There
are exceptions for medical treatment, law enforcement,
research, and other
uses.^" The reason for the law is that in 2002 there were press
reports about
an alleged plot to steal hair from Prince Harry and perform
genetic testing.^'
The purpose was to determine if IVIajor James Hewitt, with
whom Princess
Diana had an affair, was the father of Prince Harry, rather than
Prince
Charles.^'' Section 45 makes any unauthorized DNA testing a
crime
punishable by up to three years in prison.^^ Fortunately, we
have no royal
family in the United States; unfortunately, we have no law
comparable to
the statute that the British royal family inspired.
Finally, I want to comment briefiy on the following argument I
often
hear. It goes something like this: "Times have changed. The
younger
generation does not care about privacy the way their parents
did. Look at
all of the highly personal information and photos they post on
social media
sites. Besides, it is impossible to protect privacy in an age of
technology,
and attempting to do so is a waste of time and effort." Or, as
Scott
McNealy, co-founder of Sun Microsystems, famously told
reporters in
1999, "You have zero privacy anyway. Get over it."^^
I agree it is difficult and costly to protect privacy—and the cost
is not
just money. It includes constraints on law enforcement and
national
security agencies; limitations on commercial entities and
financial
institutions; inconvenience for educators; extra burdens for
employers;
additional administrative steps for medical researchers; and a
more time-
consuming consent process for health care providers. I agree
that some of
the burdens could be reduced and that efforts are needed to
streamline and
minimize procedures. Despite these costs, I strongly believe
that privacy is
worth the cost. It is the price we pay for living in a civil society
that
respects the dignity, autonomy, and personal space of every
individual. It is
disconcerting to contemplate a society that would abandon
privacy in favor
of technology and expediency.
*' Human Tissue Act, 2004, c. 30, § 45(1) (Eng.).
'•* Rothstein, supra note 79, at 566.
''Id
*' Prince Harry 'Honey Trap' Allegations, BBC NEWS (Dec. 15,
2002), http://news.bbc.co.Uk/l/hi/
uk/2577539.stm.
" Human Tissue Act, § 45(3)(b)(l).
" Private Lives? Not Ours!, PC WORLD (Apr. 18, 2000),
http://www.pcworld.com/article/16331
/article.html.
344 UNIVERSITY OF LOUISVILLE LAW REVIEW [Vol.
52:333
Let me end by quoting from Brandeis's majestic dissent in
Olmstead v.
United States:
The makers of our Constitution undertook to secure conditions
favorable
to the pursuit of happiness. They recognized the significance of
man's
spiritual nature, of his feelings and of his intellect. They knew
that only
part of the pain, pleasure and satisfactions of life are to be
found in
material things. They sought to protect Americans in their
beliefs, their
thoughts, their emotions, and their sensations. They conferred
as against
the Government, the right to be let alone - the most
comprehensive of
rights and the right most valued by civilized men.
' Olmstead v. United States, 277 U.S. 438,478 (1928) (Brandeis,
J., dissenting).
Copyright of University of Louisville Law Review is the
property of University of Louisville
School of Law and its content may not be copied or emailed to
multiple sites or posted to a
listserv without the copyright holder's express written
permission. However, users may print,
download, or email articles for individual use.
4/17/2017 Warren and Brandeis, "The Right to Privacy"
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr2.html 1/9
T
“The Right to Privacy”
Warren and Brandeis
Harvard Law Review.
Vol. IV December 15, 1890 No. 5
THE RIGHT TO PRIVACY[*] .
"It could be done only on principles of private justice, moral
fitness, and public convenience, which, when
applied to a new subject, make common law without a
precedent; much more when received and approved
by usage." — Willes, J., in Millar v. Taylor, 4 Burr. 2303, 2312
hat the individual shall have full protection in person and in
property is a principle as old as the common
law; but it has been found necessary from time to time to define
anew the exact nature and extent of such
protection. Political, social, and economic changes entail the
recognition of new rights, and the common
law, in its eternal youth, grows to meet the new demands of
society. Thus, in very early times, the law gave
a remedy only for physical interference with life and property,
for trespasses vi et armis. Then the "right to life"
served only to protect the subject from battery in its various
forms; liberty meant freedom from actual restraint;
and the right to property secured to the individual his lands and
his cattle. Later, there came a recognition of
man's spiritual nature, of his feelings and his intellect.
Gradually the scope of these legal rights broadened; and
now the right to life has come to mean the right to enjoy life, --
the right to be let alone; the right to liberty
secures the exercise of extensive civil privileges; and the term
"property" has grown to comprise every form of
possession -- intangible, as well as tangible.
Thus, with the recognition of the legal value of sensations, the
protection against actual bodily injury was
extended to prohibit mere attempts to do such injury; that is, the
putting another in fear of such injury. From the
action of battery grew that of assault.[1] Much later there came
a qualified protection of the individual against
offensive noises and odors, against dust and smoke, and
excessive vibration. The law of nuisance was developed.
[2] So regard for human emotions soon extended the scope of
personal immunity beyond the body of the
individual. His reputation, the standing among his fellow-men,
was considered, and the law of slander and libel
arose.[3] Man's family relations became a part of the legal
conception of his life, and the alienation of a wife's
affections was held remediable.[4] Occasionally the law halted,
as in its refusal to recognize the intrusion by
seduction upon the honor of the family. But even here the
demands of society were met. A mean fiction, the
action per quod servitium amisit, was resorted to, and by
allowing damages for injury to the parents' feelings, an
adequate remedy was ordinarily afforded.[5] Similar to the
expansion of the right to life was the growth of the
legal conception of property. From corporeal property arose the
incorporeal rights issuing out of it; and then
there opened the wide realm of intangible property, in the
products and processes of the mind,[6] as works of
literature and art, [7] goodwill,[8] trade secrets, and
trademarks.[9]
This development of the law was inevitable. The intense
intellectual and emotional life, and the heightening of
sensations which came with the advance of civilization, made it
clear to men that only a part of the pain,
pleasure, and profit of life lay in physical things. Thoughts,
emotions, and sensations demanded legal
recognition, and the beautiful capacity for growth which
characterizes the common law enabled the judges to
afford the requisite protection, without the interposition of the
legislature.
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn0
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn1
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn2
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn3
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn4
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn5
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn6
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn7
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn8
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn9
4/17/2017 Warren and Brandeis, "The Right to Privacy"
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr2.html 2/9
Recent inventions and business methods call attention to the
next step which must be taken for the protection of
the person, and for securing to the individual what Judge
Cooley calls the right "to be let alone" [10]
Instantaneous photographs and newspaper enterprise have
invaded the sacred precincts of private and domestic
life; and numerous mechanical devices threaten to make good
the prediction that "what is whispered in the closet
shall be proclaimed from the house-tops." For years there has
been a feeling that the law must afford some
remedy for the unauthorized circulation of portraits of private
persons;[11] and the evil of invasion of privacy by
the newspapers, long keenly felt, has been but recently
discussed by an able writer.[12] The alleged facts of a
somewhat notorious case brought before an inferior tribunal in
New York a few months ago,[13] directly
involved the consideration of the right of circulating portraits;
and the question whether our law will recognize
and protect the right to privacy in this and in other respects
must soon come before our courts for consideration.
Of the desirability -- indeed of the necessity -- of some such
protection, there can, it is believed, be no doubt.
The press is overstepping in every direction the obvious bounds
of propriety and of decency. Gossip is no longer
the resource of the idle and of the vicious, but has become a
trade, which is pursued with industry as well as
effrontery. To satisfy a prurient taste the details of sexual
relations are spread broadcast in the columns of the
daily papers. To occupy the indolent, column upon column is
filled with idle gossip, which can only be procured
by intrusion upon the domestic circle. The intensity and
complexity of life, attendant upon advancing
civilization, have rendered necessary some retreat from the
world, and man, under the refining influence of
culture, has become more sensitive to publicity, so that solitude
and privacy have become more essential to the
individual; but modern enterprise and invention have, through
invasions upon his privacy, subjected him to
mental pain and distress, far greater than could be inflicted by
mere bodily injury. Nor is the harm wrought by
such invasions confined to the suffering of those who may be
the subjects of journalistic or other enterprise. In
this, as in other branches of commerce, the supply creates the
demand. Each crop of unseemly gossip, thus
harvested, becomes the seed of more, and, in direct proportion
to its circulation, results in the lowering of social
standards and of morality. Even gossip apparently harmless,
when widely and persistently circulated, is potent
for evil. It both belittles and perverts. It belittles by inverting
the relative importance of things, thus dwarfing the
thoughts and aspirations of a people. When personal gossip
attains the dignity of print, and crowds the space
available for matters of real interest to the community, what
wonder that the ignorant and thoughtless mistake its
relative importance. Easy of comprehension, appealing to that
weak side of human nature which is never wholly
cast down by the misfortunes and frailties of our neighbors, no
one can be surprised that it usurps the place of
interest in brains capable of other things. Triviality destroys at
once robustness of thought and delicacy of
feeling. No enthusiasm can flourish, no generous impulse can
survive under its blighting influence.
It is our purpose to consider whether the existing law affords a
principle which can properly be invoked to
protect the privacy of the individual; and, if it does, what the
nature and extent of such protection is.
Owing to the nature of the instruments by which privacy is
invaded, the injury inflicted bears a superficial
resemblance to the wrongs dealt with by the law of slander and
of libel, while a legal remedy for such injury
seems to involve the treatment of mere wounded feelings, as a
substantive cause of action. The principle on
which the law of defamation rests, covers, however, a radically
different class of effects from those for which
attention is now asked. It deals only with damage to reputation,
with the injury done to the individual in his
external relations to the community, by lowering him in the
estimation of his fellows. The matter published of
him, however widely circulated, and however unsuited to
publicity, must, in order to be actionable, have a direct
tendency to injure him in his intercourse with others, and even
if in writing or in print, must subject him to the
hatred, ridicule, or contempt of his fellowmen, -- the effect of
the publication upon his estimate of himself and
upon his own feelings nor forming an essential element in the
cause of action. In short, the wrongs and
correlative rights recognized by the law of slander and libel are
in their nature material rather than spiritual. That
branch of the law simply extends the protection surrounding
physical property to certain of the conditions
necessary or helpful to worldly prosperity. On the other hand,
our law recognizes no principle upon which
compensation can be granted for mere injury to the feelings.
However painful the mental effects upon another of
an act, though purely wanton or even malicious, yet if the act
itself is otherwise lawful, the suffering inflicted is
dannum absque injuria. Injury of feelings may indeed be taken
account of in ascertaining the amount of damages
when attending what is recognized as a legal injury;[14] but our
system, unlike the Roman law, does not afford a
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn10
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn11
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn12
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn13
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn14
4/17/2017 Warren and Brandeis, "The Right to Privacy"
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr2.html 3/9
remedy even for mental suffering which results from mere
contumely and insult, but from an intentional and
unwarranted violation of the "honor" of another.[15]
It is not however necessary, in order to sustain the view that
the common law recognizes and upholds a
principle applicable to cases of invasion of privacy, to invoke
the analogy, which is but superficial, to injuries
sustained, either by an attack upon reputation or by what the
civilians called a violation of honor; for the legal
doctrines relating to infractions of what is ordinarily termed the
common-law right to intellectual and artistic
property are, it is believed, but instances and applications of a
general right to privacy, which properly
understood afford a remedy for the evils under consideration.
The common law secures to each individual the right of
determining, ordinarily, to what extent his thoughts,
sentiments, and emotions shall be communicated to others.[16]
Under our system of government, he can never
be compelled to express them (except when upon the witness
stand); and even if he has chosen to give them
expression, he generally retains the power to fix the limits of
the publicity which shall be given them. The
existence of this right does not depend upon the particular
method of expression adopted. It is immaterial
whether it be by word[17] or by signs,[18] in painting,[19] by
sculpture, or in music.[20] Neither does the
existence of the right depend upon the nature or value of the
thought or emotions, nor upon the excellence of the
means of expression.[21] The same protection is accorded to a
casual letter or an entry in a diary and to the most
valuable poem or essay, to a botch or daub and to a masterpiece.
In every such case the individual is entitled to
decide whether that which is his shall be given to the
public.[22] No other has the right to publish his
productions in any form, without his consent. This right is
wholly independent of the material on which, the
thought, sentiment, or emotions is expressed. It may exist
independently of any corporeal being, as in words
spoken, a song sung, a drama acted. Or if expressed on any
material, as in a poem in writing, the author may
have parted with the paper, without forfeiting any proprietary
right in the composition itself. The right is lost
only when the author himself communicates his production to
the public, -- in other words, publishes it.[23] It is
entirely independent of the copyright laws, and their extension
into the domain of art. The aim of those statutes is
to secure to the author, composer, or artist the entire profits
arising from publication; but the common-law
protection enables him to control absolutely the act of
publication, and in the exercise of his own discretion, to
decide whether there shall be any publication at all.[24] The
statutory right is of no value, unless there is a
publication; the common-law right is lost as soon as there is a
publication.
What is the nature, the basis, of this right to prevent the
publication of manuscripts or works of art? It is stated
to be the enforcement of a right of property;[25] and no
difficulty arises in accepting this view, so long as we
have only to deal with the reproduction of literary and artistic
compositions. They certainly possess many of the
attributes of ordinary property; they are transferable; they have
a value; and publication or reproduction is a use
by which that value is realized. But where the value of the
production is found not in the right to take the profits
arising from publication, but in the peace of mind or the relief
afforded by the ability to prevent any publication
at all, it is difficult to regard the right as one of property, in the
common acceptation of that term. A man records
in a letter to his son, or in his diary, that he did not dine with
his wife on a certain day. No one into whose hands
those papers fall could publish them to the world, even if
possession of the documents had been obtained
rightfully; and the prohibition would not be confined to the
publication of a copy of the letter itself, or of the
diary entry; the restraint extends also to a publication of the
contents. What is the thing which is protected?
Surely, not the intellectual act of recording the fact that the
husband did not dine with his wife, but that fact itself.
It is not the intellectual product, but the domestic occurrence. A
man writes a dozen letters to different people.
No person would be permitted to publish a list of the letters
written. If the letters or the contents of the diary
were protected as literary compositions, the scope of the
protection afforded should be the same secured to a
published writing under the copyright law. But the copyright
law would not prevent an enumeration of the
letters, or the publication of some of the facts contained therein.
The copyright of a series of paintings or
etchings would prevent a reproduction of the paintings as
pictures; but it would not prevent a publication of list
or even a description of them.[26] Yet in the famous case of
Prince Albert v. Strange, the court held that the
common-law rule prohibited not merely the reproduction of the
etchings which the plaintiff and Queen Victoria
had made for their own pleasure, but also "the publishing (at
least by printing or writing), though not by copy or
resemblance, a description of them, whether more or less
limited or summary, whether in the form of a catalogue
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn15
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn16
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn17
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn18
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn19
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn20
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn21
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn22
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn23
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn24
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn25
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn26
4/17/2017 Warren and Brandeis, "The Right to Privacy"
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr2.html 4/9
or otherwise."[27] Likewise, an unpublished collection of news
possessing no element of a literary nature is
protected from privacy.[28]
That this protection cannot rest upon the right to literary or
artistic property in any exact sense, appears the
more clearly when the subject-matter for which protection is
invoked is not even in the form of intellectual
property, but has the attributes of ordinary tangible property.
Suppose a man has a collection of gems or
curiosities which he keeps private : it would hardly be
contended that any person could publish a catalogue of
them, and yet the articles enumerated are certainly not
intellectual property in the legal sense, any more than a
collection of stoves or of chairs.[29]
The belief that the idea of property in its narrow sense was the
basis of the protection of unpublished
manuscripts led an able court to refuse, in several cases,
injunctions against the publication of private letters, on
the ground that "letters not possessing the attributes of literary
compositions are not property entitled to
protection;" and that it was "evident the plaintiff could not have
considered the letters as of any value whatever
as literary productions, for a letter cannot be considered of
value to the author which he never would consent to
have published."[30] But those decisions have not been
followed,[31] and it may not be considered settled that
the protection afforded by the common law to the author of any
writing is entirely independent of its pecuniary
value, its intrinsic merits, or of any intention to publish the
same and, of course, also, wholly independent of the
material, if any, upon which, or the mode in which, the thought
or sentiment was expressed.
Although the courts have asserted that they rested their
decisions on the narrow grounds of protection to
property, yet there are recognitions of a more liberal doctrine.
Thus in the case of Prince Albert v. Strange,
already referred to, the opinions of both the Vice-Chancellor
and of the Lord Chancellor, on appeal, show a more
or less clearly defined perception of a principle broader than
those which were mainly discussed, and on which
they both place their chief reliance. Vice-Chancellor Knight
Bruce referred to publishing of a man that he had
"written to particular persons or on particular subjects" as an
instance of possibly injurious disclosures as to
private matters, that the courts would in a proper case prevent;
yet it is difficult to perceive how, in such a case,
any right of privacy, in the narrow sense, would be drawn in
question, or why, if such a publication would be
restrained when it threatened to expose the victim not merely to
sarcasm, but to ruin, it should not equally be
enjoined, if it threatened to embitter his life. To deprive a man
of the potential profits to be realized by publishing
a catalogue of his gems cannot per se be a wrong to him. The
possibility of future profits is not a right of
property which the law ordinarily recognizes; it must, therefore,
be an infraction of other rights which constitutes
the wrongful act, and that infraction is equally wrongful,
whether its results are to forestall the profits that the
individual himself might secure by giving the matter a publicity
obnoxious to him, or to gain an advantage at the
expense of his mental pain and suffering. If the fiction of
property in a narrow sense must be preserved, it is still
true that the end accomplished by the gossip-monger is attained
by the use of that which is another's, the facts
relating to his private life, which he has seen fit to keep private.
Lord Cottenham stated that a man "is that which
is exclusively his," and cited with approval the opinion of Lord
Eldon, as reported in a manuscript note of the
case of Wyatt v. Wilson, in 1820, respecting an engraving of
George the Third during his illness, to the effect that
"if one of the late king's physicians had kept a diary of what he
heard and saw, the court would not, in the king's
lifetime, have permitted him to print and publish it; "and Lord
Cottenham declared, in respect to the acts of the
defendants in the case before him, that "privacy is the right
invaded." But if privacy is once recognized as a right
entitled to legal protection, the interposition of the courts
cannot depend on the particular nature of the injuries
resulting.
These considerations lead to the conclusion that the protection
afforded to thoughts, sentiments, and emotions,
expressed through the medium of writing or of the arts, so far as
it consists in preventing publication, is merely
an instance of the enforcement of the more general right of the
individual to be let alone. It is like the right not be
assaulted or beaten, the right not be imprisoned, the right not to
be maliciously prosecuted, the right not to be
defamed. In each of these rights, as indeed in all other rights
recognized by the law, there inheres the quality of
being owned or possessed -- and (as that is the distinguishing
attribute of property) there may some propriety in
speaking of those rights as property. But, obviously, they bear
little resemblance to what is ordinarily
comprehended under that term. The principle which protects
personal writings and all other personal
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn27
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn28
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn29
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn30
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn31
4/17/2017 Warren and Brandeis, "The Right to Privacy"
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr2.html 5/9
productions, not against theft and physical appropriation, but
against publication in any form, is in reality not the
principle of private property, but that of an inviolate
personality.[32]
If we are correct in this conclusion, the existing law affords a
principle from which may be invoked to protect
the privacy of the individual from invasion either by the too
enterprising press, the photographer, or the
possessor of any other modern device for rewording or
reproducing scenes or sounds. For the protection afforded
is not confined by the authorities to those cases where any
particular medium or form of expression has been
adopted, not to products of the intellect. The same protection is
afforded to emotions and sensations expressed in
a musical composition or other work of art as to a literary
composition; and words spoken, a pantomime acted, a
sonata performed, is no less entitled to protection than if each
had been reduced to writing. The circumstance that
a thought or emotion has been recorded in a permanent form
renders its identification easier, and hence may be
important from the point of view of evidence, but it has no
significance as a matter of substantive right. If, then,
the decisions indicate a general right to privacy for thoughts,
emotions, and sensations, these should receive the
same protection, whether expressed in writing, or in conduct, in
conversation, in attitudes, or in facial
expression.
It may be urged that a distinction should be taken between the
deliberate expression of thoughts and emotions
in literary or artistic compositions and the casual and often
involuntary expression given to them in the ordinary
conduct of life. In other words, it may be contended that the
protection afforded is granted to the conscious
products of labor, perhaps as an encouragement to effort.[33]
This contention, however plausible, has, in fact,
little to recommend it. If the amount of labor involved be
adopted as the test, we might well find that the effort to
conduct one's self properly in business and in domestic relations
had been far greater than that involved in
painting a picture or writing a book; one would find that it was
far easier to express lofty sentiments in a diary
than in the conduct of a noble life. If the test of deliberateness
of the act be adopted, much casual correspondence
which is now accorded full protection would be excluded from
the beneficent operation of existing rules. After
the decisions denying the distinction attempted to be made
between those literary productions which it was
intended to publish and those which it was not, all
considerations of the amount of labor involved, the degree of
deliberation, the value of the product, and the intention of
publishing must be abandoned, and no basis is
discerned upon which the right to restrain publication and
reproduction of such so-called literary and artistic
works can be rested, except the right to privacy, as a part of the
more general right to the immunity of the person,
-- the right to one's personality.
It should be stated that, in some instances where protection
has been afforded against wrongful publication, the
jurisdiction has been asserted, not on the ground of property, or
at least not wholly on that ground, but upon the
ground of an alleged breach of an implied contract or of a trust
or confidence.
Thus, in Abernethy v. Hutchinson, 3 L. J. Ch. 209 (1825),
where the plaintiff, a distinguished surgeon, sought to
restrain the publication in the "Lancet" of unpublished lectures
which he had delivered as St. Bartholomew's
Hospital in London, Lord Eldon doubted whether there could be
property in lectures which had not been reduced
to writing, but granted the injunction on the ground of breach of
confidence, holding "that when persons were
admitted as pupils or otherwise, to hear these lectures, although
they were orally delivered, and although the
parties might go to the extent, if they were able to do so, of
putting down the whole by means of short-hand, yet
they could do that only for the purposes of their own
information, and could not publish, for profit, that which
they had not obtained the right of selling."
In Prince Albert v. Strange, I McN. & G. 25 (1849), Lord
Cottenham, on appeal, while recognizing a right of
property in the etchings which of itself would justify the
issuance of the injunction, stated, after discussing the
evidence, that he was bound to assume that the possession of
the etching by the defendant had "its foundation in
a breach of trust, confidence, or contract," and that upon such
ground also the plaintiff's title to the injunction
was fully sustained.
In Tuck v. Priester, 19 Q.B.D. 639 (1887), the plaintiffs were
owners of a picture, and employed the defendant
to make a certain number of copies. He did so, and made also a
number of other copies for himself, and offered
them for sale in England at a lower price. Subsequently, the
plaintiffs registered their copyright in the picture,
and then brought suit for an injunction and damages. The Lords
Justices differed as to the application of the
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn32
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn33
4/17/2017 Warren and Brandeis, "The Right to Privacy"
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr2.html 6/9
copyright acts to the case, but held unanimously that
independently of those acts, the plaintiffs were entitled to
an injunction and damages for breach of contract.
In Pollard v. Photographic Co., 40 Ch. Div. 345 (1888), a
photographer who had taken a lady's photograph
under the ordinary circumstances was restrained from exhibiting
it, and also from selling copies of it, on the
ground that it was a breach of an implied term in the contract,
and also that it was a breach of confidence. Mr.
Justice North interjected in the argument of the plaintiff's
counsel the inquiry: "Do you dispute that if the
negative likeness were taken on the sly, the person who took it
might exhibit copies?" and counsel for the
plaintiff answered: "In that case there would be no trust or
consideration to support a contract." Later, the
defendant's counsel argued that "a person has no property in his
own features; short of doing what is libellous or
otherwise illegal, there is no restriction on the photographer's
using his negative." But the court, while expressly
finding a breach of contract and of trust sufficient to justify its
interposition, still seems to have felt the necessity
of resting the decision also upon a right of property,[34] in
order to bring it within the line of those cases which
were relied upon as precedents.[35]
This process of implying a term in a contract, or of implying a
trust (particularly where a contract is written,
and where these is no established usage or custom), is nothing
more nor less than a judicial declaration that
public morality, private justice, and general convenience
demand the recognition of such a rule, and that the
publication under similar circumstances would be considered an
intolerable abuse. So long as these
circumstances happen to present a contract upon which such a
term can be engrafted by the judicial mind, or to
supply relations upon which a trust or confidence can be
erected, there may be no objection to working out the
desired protection though the doctrines of contract or of trust.
But the court can hardly stop there. The narrower
doctrine may have satisfied the demands of society at a time
when the abuse to be guarded against could rarely
have arisen without violating a contract or a special confidence;
but now that modern devices afford abundant
opportunities for the perpetration of such wrongs without any
participation by the injured party, the protection
granted by the law must be placed upon a broader foundation.
While, for instance, the state of the photographic
art was such that one's picture could seldom be taken without
his consciously "sitting" for the purpose, the law of
contract or of trust might afford the prudent man sufficient
safeguards against the improper circulation of his
portrait; but since the latest advances in photographic art have
rendered it possible to take pictures
surreptitiously, the doctrines of contract and of trust are
inadequate to support the required protection, and the
law of tort must be resorted to. The right of property in its
widest sense, including all possession, including all
rights and privileges, and hence embracing the right to an
inviolate personality, affords alone that broad basis
upon which the protection which the individual demands can be
rested.
Thus, the courts, in searching for some principle upon which
the publication of private letters could be
enjoined, naturally came upon the ideas of a breach of
confidence, and of an implied contract; but it required
little consideration to discern that this doctrine could not afford
all the protection required, since it would not
support the court in granting a remedy against a stranger; and so
the theory of property in the contents of letters
was adopted.[36] Indeed, it is difficult to conceive on what
theory of the law the casual recipient of a letter, who
proceeds to publish it, is guilty of a breach of contract, express
or implied, or of any breach of trust, in the
ordinary acceptation of that term. Suppose a letter has been
addressed to him without his solicitation. He opens
it, and reads. Surely, he has not made any contract; he has not
accepted any trust. He cannot, by opening and
reading the letter, have come under any obligation save what the
law declares; and, however expressed, that
obligation is simply to observe the legal right of the sender,
whatever it may be, and whether it be called his right
or property in the contents of the letter, or his right to
privacy.[37]
A similar groping for the principle upon which a wrongful
publication can be enjoined is found in the law of
trade secrets. There, injunctions have generally been granted on
the theory of a breach of contract, or of an abuse
of confidence.[38] It would, of course, rarely happen that any
one would be in possession of a secret unless
confidence had been reposed in him. But can it be supposed that
the court would hesitate to grant relief against
one who had obtained his knowledge by an ordinary trespass, --
for instance, by wrongfully looking into a book
in which the secret was recorded, or by eavesdropping? Indeed,
in Yovatt v. Winyard, I J.&W. 394 (1820), where
an injunction was granted against making any use or of
communicating certain recipes for veterinary medicine, it
appeared that the defendant while in the plaintiff's employ, had
surreptitiously got access to his book of recipes,
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn34
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn35
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn36
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn37
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn38
4/17/2017 Warren and Brandeis, "The Right to Privacy"
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr2.html 7/9
and copied them. Lord Eldon "granted the injunction, upon the
ground of there having been a breach of trust and
confidence;" but it would seem difficult to draw any sound legal
distinction between such a case and one where a
mere stranger wrongfully obtained access to the book.[39]
We must therefore conclude that the rights, so protected,
whatever their exact nature, are not rights arising from
contract or from special trust, but are rights as against the
world; and, as above stated, the principle which has
been applied to protect these rights is in reality not the principle
of private property, unless that word be used in
an extended and unusual sense. The principle which protects
personal writings and any other productions of the
intellect of or the emotions, is the right to privacy, and the law
has no new principle to formulate when it extends
this protection to the personal appearance, sayings, acts, and to
personal relation, domestic or otherwise.[40]
If the invasion of privacy constitutes a legal injuria, the
elements for demanding redress exist, since already the
value of mental suffering, caused by an act wrongful in itself, is
recognized as a basis for compensation.
The right of one who has remained a private individual, to
prevent his public portraiture, presents the simplest
case for such extension; the right to protect one's self from pen
portraiture, from a discussion by the press of
one's private affairs, would be a more important and far-
reaching one. If casual and unimportant statements in a
letter, if handiwork, however inartistic and valueless, if
possessions of all sorts are protected not only against
reproduction, but also against description and enumeration, how
much more should the acts and sayings of a man
in his social and domestic relations be guarded from ruthless
publicity. If you may not reproduce a woman's face
photographically without her consent, how much less should be
tolerated the reproduction of her face, her form,
and her actions, by graphic descriptions colored to suit a gross
and depraved imagination.
The right to privacy, limited as such right must necessarily be,
has already found expression in the law of
France.[41]
It remains to consider what are the limitations of this right to
privacy, and what remedies may be granted for the
enforcement of the right. To determine in advance of experience
the exact line at which the dignity and
convenience of the individual must yield to the demands of the
public welfare or of private justice would be a
difficult task; but the more general rules are furnished by the
legal analogies already developed in the law of
slander and libel, and in the law of literary and artistic property.
1. The right to privacy does not prohibit any publication of
matter which is of public or general interest. In
determining the scope of this rule, aid would be afforded by the
analogy, in the law of libel and slander, of cases
which deal with the qualified privilege of comment and
criticism on matters of public and general interest.[42]
There are of course difficulties in applying such a rule; but they
are inherent in the subject-matter, and are
certainly no greater than those which exist in many other
branches of the law, -- for instance, in that large class of
cases in which the reasonableness or unreasonableness of an act
is made the test of liability. The design of the
law must be to protect those persons with whose affairs the
community has no legitimate concern, from being
dragged into an undesirable and undesired publicity and to
protect all persons, whatsoever; their position or
station, from having matters which they may properly prefer to
keep private, made public against their will. It is
the unwarranted invasion of individual privacy which is
reprehended, and to be, so far as possible, prevented.
The distinction, however, noted in the above statement is
obvious and fundamental. There are persons who may
reasonably claim as a right, protection from the notoriety
entailed by being made the victims of journalistic
enterprise. There are others who, in varying degrees, have
renounced the right to live their lives screened from
public observation. Matters which men of the first class may
justly contend, concern themselves alone, may in
those of the second be the subject of legitimate interest to their
fellow-citizens. Peculiarities of manner and
person, which in the ordinary individual should be free from
comment, may acquire a public importance, if
found in a candidate for public office. Some further
discrimination is necessary, therefore, than to class facts or
deeds as public or private according to a standard to be applied
to the fact or deed per se. To publish of a modest
and retiring individual that he suffers from an impediment in his
speech or that he cannot spell correctly, is an
unwarranted, if not an unexampled, infringement of his rights,
while to state and comment on the same
characteristics found in a would-be congressman could not be
regarded as beyond the pale of propriety.
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn39
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn40
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn41
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn42
4/17/2017 Warren and Brandeis, "The Right to Privacy"
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr2.html 8/9
The general object in view is to protect the privacy of private
life, and to whatever degree and in whatever
connection a man's life has ceased to be private, before the
publication under consideration has been made, to
that extent the protection is likely to be withdrawn.[43] Since,
then, the propriety of publishing the very same
facts may depend wholly upon the person concerning whom they
are published, no fixed formula can be used to
prohibit obnoxious publications. Any rule of liability adopted
must have in it an elasticity which shall take
account of the varying circumstances of each case, -- a
necessity which unfortunately renders such a doctrine not
only more difficult of application, but also to a certain extent
uncertain in its operation and easily rendered
abortive. Besides, it is only the more flagrant breaches of
decency and propriety that could in practice be
reached, and it is not perhaps desirable even to attempt to
repress everything which the nicest taste and keenest
sense of the respect due to private life would condemn.
In general, then, the matters of which the publication should
be repressed may be described as those which
concern the private life, habits, acts, and relations of an
individual, and have no legitimate connection with his
fitness for a public office which he seeks or for which he is
suggested, or for any public or quasi public position
which he seeks or for which he is suggested, and have no
legitimate relation to or bearing upon any act done by
him in a public or quasi public capacity. The foregoing is not
designed as a wholly accurate or exhaustive
definition, since that which must ultimately in a vast number of
cases become a question of individual judgment
and opinion is incapable of such definition; but it is an attempt
to indicate broadly the class of matters referred to.
Some things all men alike are entitled to keep from popular
curiosity, whether in public life or not, while others
are only private because the persons concerned have not
assumed a position which makes their doings legitimate
matters of public investigation.[44]
2. The right to privacy does not prohibit the communication of
any matter, though in its nature private, when
the publication is made under circumstances which would
render it a privileged communication according to the
law of slander and libel. Under this rule, the right to privacy is
not invaded by any publication made in a court of
justice, in legislative bodies, or the committees of those bodies;
in municipal assemblies, or the committees of
such assemblies, or practically by any communication in any
other public body, municipal or parochial, or in any
body quasi public, like the large voluntary associations formed
for almost every purpose of benevolence,
business, or other general interest; and (at least in many
jurisdictions) reports of any such proceedings would in
some measure be accorded a like privilege.[45] Nor would the
rule prohibit any publication made by one in the
discharge of some public or private duty, whether legal or
moral, or in conduct of one's own affairs, in matters
where his own interest is concerned.[46]
3. The law would probably not grant any redress for the
invasion of privacy by oral publication in the absence
of special damage. The same reasons exist for distinguishing
between oral and written publications of private
matters, as is afforded in the law of defamation by the restricted
liability for slander as compared with the
liability for libel.[47] The injury resulting from such oral
communications would ordinarily be so trifling that the
law might well, in the interest of free speech, disregard it
altogether.[48]
4. The right to privacy ceases upon the publication of the facts
by the individual, or with his consent.
This is but another application of the rule which has become
familiar in the law of literary and artistic property.
The cases there decided establish also what should be deemed a
publication, -- the important principle in this
connection being that a private communication of circulation
for a restricted purpose is not a publication within
the meaning of the law.[49]
5. The truth of the matter published does not afford a defence.
Obviously this branch of the law should have no
concern with the truth or falsehood of the matters published. It
is not for injury to the individual's character that
redress or prevention is sought, but for injury to the right of
privacy. For the former, the law of slander and libel
provides perhaps a sufficient safeguard. The latter implies the
right not merely to prevent inaccurate portrayal of
private life, but to prevent its being depicted at all.[50]
6. The absence of "malice" in the publisher does not afford a
defence. Personal ill-will is not an ingredient of
the offence, any more than in an ordinary case of trespass to
person or to property. Such malice is never
necessary to be shown in an action for libel or slander at
common law, except in rebuttal of some defence, e.g.,
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn43
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn44
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn45
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn46
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn47
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn48
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn49
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn50
4/17/2017 Warren and Brandeis, "The Right to Privacy"
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr2.html 9/9
that the occasion rendered the communication privileged, or,
under the statutes in this State and elsewhere, that
the statement complained of was true. The invasion of the
privacy that is to be protected is equally complete and
equally injurious, whether the motives by which the speaker or
writer was actuated are taken by themselves,
culpable or not; just as the damage to character, and to some
extent the tendency to provoke a breach of the
peace, is equally the result of defamation without regard to
motives leading to its publication. Viewed as a wrong
to the individual, this rule is the same pervading the whole law
of torts, by which one is held responsible for his
intentional acts, even thought they care committed with no
sinister intent; and viewed as a wrong to society, it is
the same principle adopted in a large category of statutory
offences.
The remedies for an invasion of the right of privacy are also
suggested by those administered in the law of
defamation, and in the law of literary and artistic property,
namely: --
1. An action of tort for damages in all cases.[51] Even in the
absence of special damages, substantial
compensation could be allowed for injury to feelings as in the
action of slander and libel.
2. An injunction, in perhaps a very limited class of cases.[52]
It would doubtless be desirable that the privacy of the
individual should receive the added protection of the
criminal law, but for this, legislation would be required.[53]
Perhaps it would be deemed proper to bring the
criminal liability for such publication within narrower limits;
but that the community has an interest in
preventing such invasions of privacy, sufficiently strong to
justify the introduction of such a remedy, cannot be
doubted. Still, the protection of society must come mainly
through a recognition of the rights of the individual.
Each man is responsible for his own acts and omissions only. If
he condones what he reprobates, with a weapon
at hand equal to his defence, he is responsible for the results. If
he resists, public opinion will rally to his support.
Has he then such a weapon? It is believed that the common law
provides him with one, forged in the slow fire of
the centuries, and to-day fitly tempered to his hand. The
common law has always recognized a man's house as his
castle, impregnable, often, even to his own officers engaged in
the execution of its command. Shall the courts
thus close the front entrance to constituted authority, and open
wide the back door to idle or prurient curiosity?
Samuel D. Warren,
Louis D. Brandeis.
BOSTON, December, 1890.
[downloaded 18 May 1996 from an internet site hosted by
Stephen R. Laniel; and reformatted from a site
hosted by Lawrence University, 1999]
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn51
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn52
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
ivacy_brand_warr_fn.html#fn53
Paper 1
Freedom, Privacy, and Technology
This assignment asks you to practice making and supporting
scholarly arguments. In order to do that, please answer the
question:
If they were alive today, how would Warren and Brandeis read
our chapter from Dark Surveillance by Browne and “Privacy and
Technology in the Twenty-First Century” by Rothstein?
To put this more bluntly, your paper must use Warren and
Brandeis, “The Right to Privacy,” Browne’s chapter from Dark
Surveillance and either one of the other two texts underlined
above.
· Identify and understand 1-2 key concepts, ideas, or examples
from those texts. Understand and articulate Warren and
Brandeis’s concerns about and conceptions of privacy.
This assignment is surveilling you to see if:
You can create a series of arguments, supported by textual
evidence, linking the concepts, concerns, laws, etc in Warren
and Brandeis to those of the other texts. In other words, I am
asking you to hypothesize how Warren and Brandeis might have
responded to these texts. Note that you cannot actually know
this since Warren and Brandeis are conveniently dead, which
means that any assertion you make will be your own argument.
Ask yourself: what would they have recognized, been surprised
by, agreed or disagreed with in these texts? How would they
have responded?
Specifically, I am looking for evidence of three skills:
* Ability to make plausible arguments
* Ability to use short quotes as evidence for arguments. Quotes
must be shorter than 40 words. Remember that you can use parts
of sentences and even change word endings as long as the
grammar of your sentence fits the grammar of the quote. Further
I am looking for evidence that you can integrate quotes into
your discussion, thus avoiding what Graff and Birkenstein call
“hit and run quotations” in They Say / I Say: The Moves That
Matter in Academic Writing.
· The sophistication of your understanding of the concepts and
concerns expressed in the texts. This is where your careful
annotation will serve you well.
· Things To Do
Please begin your paper with an introductory paragraph
explaining what the paper will do and which text you will be
using. Use the author’s name and text title. Please use an
advanced organizer that says something like “this paper
will___” or “In this paper I ____” (I am fine with the use of
first person voice to structure your introduction or arguments).
Use signal phrases with the author’s name to introduce quotes.
All quotes from the text must be thoroughly integrated (no “hit
and run” quotations).
Do not begin or end of paragraph with a quote or with the words
“this” or “that.” Any time you begin a sentence with these
words, make sure the word clearly refers back to something in
the previous sentence.
Start most paragraphs with an argument connecting the text to
your issue. Then give evidence to support your assertion.
You will want to use the conditional “would,” “might,” and
“could” since we cannot really know how Warren and Brandeis
would read these texts.
PRIVACY AND TECHNOLOGYIN THE TWENTY-FIRST CENTURYMark A..docx

More Related Content

Similar to PRIVACY AND TECHNOLOGYIN THE TWENTY-FIRST CENTURYMark A..docx

Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
toltonkendal
 
Freedoms Forsaken
Freedoms ForsakenFreedoms Forsaken
Freedoms forsaken
Freedoms forsakenFreedoms forsaken
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
smile790243
 
Running Head THE PATRIOT ACT OF THE USTHE PATRIOT ACT OF THE .docx
Running Head THE PATRIOT ACT OF THE USTHE PATRIOT ACT OF THE .docxRunning Head THE PATRIOT ACT OF THE USTHE PATRIOT ACT OF THE .docx
Running Head THE PATRIOT ACT OF THE USTHE PATRIOT ACT OF THE .docx
todd521
 
Mea#4 1.1
Mea#4 1.1Mea#4 1.1
Mea#4 1.1
denzenbacher
 
Privacy , defamation; sting operation Under Media Law
Privacy , defamation; sting operation Under Media Law Privacy , defamation; sting operation Under Media Law
Privacy , defamation; sting operation Under Media Law
Ashutosh Kumar Srivastava
 
New york times v. sullivan supreme court decision freedom of speech or a lice...
New york times v. sullivan supreme court decision freedom of speech or a lice...New york times v. sullivan supreme court decision freedom of speech or a lice...
New york times v. sullivan supreme court decision freedom of speech or a lice...
Alexander Decker
 
How does the right to privacy protect a women’s right to have an abo
How does the right to privacy protect a women’s right to have an aboHow does the right to privacy protect a women’s right to have an abo
How does the right to privacy protect a women’s right to have an abo
meagantobias
 

Similar to PRIVACY AND TECHNOLOGYIN THE TWENTY-FIRST CENTURYMark A..docx (9)

Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
 
Freedoms Forsaken
Freedoms ForsakenFreedoms Forsaken
Freedoms Forsaken
 
Freedoms forsaken
Freedoms forsakenFreedoms forsaken
Freedoms forsaken
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
 
Running Head THE PATRIOT ACT OF THE USTHE PATRIOT ACT OF THE .docx
Running Head THE PATRIOT ACT OF THE USTHE PATRIOT ACT OF THE .docxRunning Head THE PATRIOT ACT OF THE USTHE PATRIOT ACT OF THE .docx
Running Head THE PATRIOT ACT OF THE USTHE PATRIOT ACT OF THE .docx
 
Mea#4 1.1
Mea#4 1.1Mea#4 1.1
Mea#4 1.1
 
Privacy , defamation; sting operation Under Media Law
Privacy , defamation; sting operation Under Media Law Privacy , defamation; sting operation Under Media Law
Privacy , defamation; sting operation Under Media Law
 
New york times v. sullivan supreme court decision freedom of speech or a lice...
New york times v. sullivan supreme court decision freedom of speech or a lice...New york times v. sullivan supreme court decision freedom of speech or a lice...
New york times v. sullivan supreme court decision freedom of speech or a lice...
 
How does the right to privacy protect a women’s right to have an abo
How does the right to privacy protect a women’s right to have an aboHow does the right to privacy protect a women’s right to have an abo
How does the right to privacy protect a women’s right to have an abo
 

More from sleeperharwell

For this assignment, review the articleAbomhara, M., & Koie.docx
For this assignment, review the articleAbomhara, M., & Koie.docxFor this assignment, review the articleAbomhara, M., & Koie.docx
For this assignment, review the articleAbomhara, M., & Koie.docx
sleeperharwell
 
For this assignment, provide your perspective about Privacy versus N.docx
For this assignment, provide your perspective about Privacy versus N.docxFor this assignment, provide your perspective about Privacy versus N.docx
For this assignment, provide your perspective about Privacy versus N.docx
sleeperharwell
 
For this assignment, provide your perspective about Privacy vers.docx
For this assignment, provide your perspective about Privacy vers.docxFor this assignment, provide your perspective about Privacy vers.docx
For this assignment, provide your perspective about Privacy vers.docx
sleeperharwell
 
For this Assignment, read the case study for Claudia and find two to.docx
For this Assignment, read the case study for Claudia and find two to.docxFor this Assignment, read the case study for Claudia and find two to.docx
For this Assignment, read the case study for Claudia and find two to.docx
sleeperharwell
 
For this assignment, please start by doing research regarding the se.docx
For this assignment, please start by doing research regarding the se.docxFor this assignment, please start by doing research regarding the se.docx
For this assignment, please start by doing research regarding the se.docx
sleeperharwell
 
For this assignment, please discuss the following questionsWh.docx
For this assignment, please discuss the following questionsWh.docxFor this assignment, please discuss the following questionsWh.docx
For this assignment, please discuss the following questionsWh.docx
sleeperharwell
 
For this assignment, locate a news article about an organization.docx
For this assignment, locate a news article about an organization.docxFor this assignment, locate a news article about an organization.docx
For this assignment, locate a news article about an organization.docx
sleeperharwell
 
For this assignment, it requires you Identifies the historic conte.docx
For this assignment, it requires you Identifies the historic conte.docxFor this assignment, it requires you Identifies the historic conte.docx
For this assignment, it requires you Identifies the historic conte.docx
sleeperharwell
 
For this assignment, create a framework from which an international .docx
For this assignment, create a framework from which an international .docxFor this assignment, create a framework from which an international .docx
For this assignment, create a framework from which an international .docx
sleeperharwell
 
For this assignment, create a 15-20 slide digital presentation in tw.docx
For this assignment, create a 15-20 slide digital presentation in tw.docxFor this assignment, create a 15-20 slide digital presentation in tw.docx
For this assignment, create a 15-20 slide digital presentation in tw.docx
sleeperharwell
 
For this assignment, you are to complete aclinical case - narrat.docx
For this assignment, you are to complete aclinical case - narrat.docxFor this assignment, you are to complete aclinical case - narrat.docx
For this assignment, you are to complete aclinical case - narrat.docx
sleeperharwell
 
For this assignment, you are to complete aclinical case - narr.docx
For this assignment, you are to complete aclinical case - narr.docxFor this assignment, you are to complete aclinical case - narr.docx
For this assignment, you are to complete aclinical case - narr.docx
sleeperharwell
 
For this assignment, you are provided with four video case studies (.docx
For this assignment, you are provided with four video case studies (.docxFor this assignment, you are provided with four video case studies (.docx
For this assignment, you are provided with four video case studies (.docx
sleeperharwell
 
For this assignment, you are going to tell a story, but not just.docx
For this assignment, you are going to tell a story, but not just.docxFor this assignment, you are going to tell a story, but not just.docx
For this assignment, you are going to tell a story, but not just.docx
sleeperharwell
 
For this assignment, you are asked to prepare a Reflection Paper. Af.docx
For this assignment, you are asked to prepare a Reflection Paper. Af.docxFor this assignment, you are asked to prepare a Reflection Paper. Af.docx
For this assignment, you are asked to prepare a Reflection Paper. Af.docx
sleeperharwell
 
For this assignment, you are asked to prepare a Reflection Paper. .docx
For this assignment, you are asked to prepare a Reflection Paper. .docxFor this assignment, you are asked to prepare a Reflection Paper. .docx
For this assignment, you are asked to prepare a Reflection Paper. .docx
sleeperharwell
 
For this assignment, you are asked to conduct some Internet research.docx
For this assignment, you are asked to conduct some Internet research.docxFor this assignment, you are asked to conduct some Internet research.docx
For this assignment, you are asked to conduct some Internet research.docx
sleeperharwell
 
For this assignment, you are a professor teaching a graduate-level p.docx
For this assignment, you are a professor teaching a graduate-level p.docxFor this assignment, you are a professor teaching a graduate-level p.docx
For this assignment, you are a professor teaching a graduate-level p.docx
sleeperharwell
 
For this assignment, we will be visiting the PBS website,Race  .docx
For this assignment, we will be visiting the PBS website,Race  .docxFor this assignment, we will be visiting the PBS website,Race  .docx
For this assignment, we will be visiting the PBS website,Race  .docx
sleeperharwell
 
For this assignment, the student starts the project by identifying a.docx
For this assignment, the student starts the project by identifying a.docxFor this assignment, the student starts the project by identifying a.docx
For this assignment, the student starts the project by identifying a.docx
sleeperharwell
 

More from sleeperharwell (20)

For this assignment, review the articleAbomhara, M., & Koie.docx
For this assignment, review the articleAbomhara, M., & Koie.docxFor this assignment, review the articleAbomhara, M., & Koie.docx
For this assignment, review the articleAbomhara, M., & Koie.docx
 
For this assignment, provide your perspective about Privacy versus N.docx
For this assignment, provide your perspective about Privacy versus N.docxFor this assignment, provide your perspective about Privacy versus N.docx
For this assignment, provide your perspective about Privacy versus N.docx
 
For this assignment, provide your perspective about Privacy vers.docx
For this assignment, provide your perspective about Privacy vers.docxFor this assignment, provide your perspective about Privacy vers.docx
For this assignment, provide your perspective about Privacy vers.docx
 
For this Assignment, read the case study for Claudia and find two to.docx
For this Assignment, read the case study for Claudia and find two to.docxFor this Assignment, read the case study for Claudia and find two to.docx
For this Assignment, read the case study for Claudia and find two to.docx
 
For this assignment, please start by doing research regarding the se.docx
For this assignment, please start by doing research regarding the se.docxFor this assignment, please start by doing research regarding the se.docx
For this assignment, please start by doing research regarding the se.docx
 
For this assignment, please discuss the following questionsWh.docx
For this assignment, please discuss the following questionsWh.docxFor this assignment, please discuss the following questionsWh.docx
For this assignment, please discuss the following questionsWh.docx
 
For this assignment, locate a news article about an organization.docx
For this assignment, locate a news article about an organization.docxFor this assignment, locate a news article about an organization.docx
For this assignment, locate a news article about an organization.docx
 
For this assignment, it requires you Identifies the historic conte.docx
For this assignment, it requires you Identifies the historic conte.docxFor this assignment, it requires you Identifies the historic conte.docx
For this assignment, it requires you Identifies the historic conte.docx
 
For this assignment, create a framework from which an international .docx
For this assignment, create a framework from which an international .docxFor this assignment, create a framework from which an international .docx
For this assignment, create a framework from which an international .docx
 
For this assignment, create a 15-20 slide digital presentation in tw.docx
For this assignment, create a 15-20 slide digital presentation in tw.docxFor this assignment, create a 15-20 slide digital presentation in tw.docx
For this assignment, create a 15-20 slide digital presentation in tw.docx
 
For this assignment, you are to complete aclinical case - narrat.docx
For this assignment, you are to complete aclinical case - narrat.docxFor this assignment, you are to complete aclinical case - narrat.docx
For this assignment, you are to complete aclinical case - narrat.docx
 
For this assignment, you are to complete aclinical case - narr.docx
For this assignment, you are to complete aclinical case - narr.docxFor this assignment, you are to complete aclinical case - narr.docx
For this assignment, you are to complete aclinical case - narr.docx
 
For this assignment, you are provided with four video case studies (.docx
For this assignment, you are provided with four video case studies (.docxFor this assignment, you are provided with four video case studies (.docx
For this assignment, you are provided with four video case studies (.docx
 
For this assignment, you are going to tell a story, but not just.docx
For this assignment, you are going to tell a story, but not just.docxFor this assignment, you are going to tell a story, but not just.docx
For this assignment, you are going to tell a story, but not just.docx
 
For this assignment, you are asked to prepare a Reflection Paper. Af.docx
For this assignment, you are asked to prepare a Reflection Paper. Af.docxFor this assignment, you are asked to prepare a Reflection Paper. Af.docx
For this assignment, you are asked to prepare a Reflection Paper. Af.docx
 
For this assignment, you are asked to prepare a Reflection Paper. .docx
For this assignment, you are asked to prepare a Reflection Paper. .docxFor this assignment, you are asked to prepare a Reflection Paper. .docx
For this assignment, you are asked to prepare a Reflection Paper. .docx
 
For this assignment, you are asked to conduct some Internet research.docx
For this assignment, you are asked to conduct some Internet research.docxFor this assignment, you are asked to conduct some Internet research.docx
For this assignment, you are asked to conduct some Internet research.docx
 
For this assignment, you are a professor teaching a graduate-level p.docx
For this assignment, you are a professor teaching a graduate-level p.docxFor this assignment, you are a professor teaching a graduate-level p.docx
For this assignment, you are a professor teaching a graduate-level p.docx
 
For this assignment, we will be visiting the PBS website,Race  .docx
For this assignment, we will be visiting the PBS website,Race  .docxFor this assignment, we will be visiting the PBS website,Race  .docx
For this assignment, we will be visiting the PBS website,Race  .docx
 
For this assignment, the student starts the project by identifying a.docx
For this assignment, the student starts the project by identifying a.docxFor this assignment, the student starts the project by identifying a.docx
For this assignment, the student starts the project by identifying a.docx
 

Recently uploaded

Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 

Recently uploaded (20)

Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 

PRIVACY AND TECHNOLOGYIN THE TWENTY-FIRST CENTURYMark A..docx

  • 1. PRIVACY AND TECHNOLOGY IN THE TWENTY-FIRST CENTURY Mark A. Rothstein We live in a society increasingly dependent on and enamored by technology, including communications, surveillance, forensic, health care, and other forms of technology. Yet, we also purport to value privacy. Is it possible to have both technology and privacy—to realize the benefits of technology without compromising privacy? Do current laws provide adequate protections in light of new technologies? These are difficult questions and, to start, we need to define what we mean by privacy. Privacy has different aspects or dimensions,' including informational,' physical,^ decisional," proprietary,^ and relational or associational* privacy. This talk will focus primarily on informational privacy, which fits well within the general definition of privacy as a condition of limited access to an individual or information about an individual.' The related concept, confidentiality, is defined as a condition under which information obtained or disclosed within a confidential relationship is not redisclosed
  • 2. without the permission of the individual.^ Security is defined as personal, physical, and electronic measures granting access to certain information to persons or entities authorized to receive it and denying access to others.' Any discussion of the law of privacy, especially in this building, should start with Justice Brandeis. As many of you know, Brandeis coauthored a famous law review article in 1890 with his law partner, Samuel D. Warren, * Herbert F. Boehl Chair of Law and Medicine, University of Louisville School of Medicine. Nicholas Craddock, J.D. 2014, provided excellent research assistance. Annotated and expanded version of remarks for Constitution Day, September 17, 2013, at the Brandeis School of Law, University of Louisville. ' TOM L. BEAUCHAMP & JAMES F . CHILDRESS, PRINCIPLES OF BIOMÉDICAL ETHICS 312 (7th ed. 2013) (principally relying on the work of Anita Allen). ^ Id ^ Physical privacy focuses on persons and their personal spaces. Id. * Decisional privacy concerns personal choices. Id. Proprietary privacy involves property interests in the person, such as a person's image. Id. ' Relational or associational privacy includes the family and similarly intimate relations. Id. ' NAT'L COMM. ON VITAL & HEALTH STATISTICS ( N C V
  • 3. H S ) , PRIVACY AND CONFIDENTIALITY IN THE NATIONWIDE HEALTH INFORMATION NETWORK (2006), available at www.ncvhs.hhs.gov/060622 /t.htm. ' See id ' See id 333 334 UNIVERSITY OF LOUISVILLE LAW REVIEW [Vol. 52:333 called "The Right to Privacy."'" What was their motivation for writing it? Warren was married to the former Mabel Bayard, the daughter of Senator Thomas F. Bayard of Delaware, a leading Democrat who unsuccessfully sought his party's presidential nomination three times." As a society couple, Samuel and Mabel Warren were featured frequently in the press. In fact, according to one study, between 1882, when they were first engaged, and 1890, when the Harvard Law Review article was published, sixty stories about their personal lives appeared in the newspapers of Boston, New York, and Washington.'^ Warren resented the press intruding into his private life,'^ and he asked Brandeis to help develop a legal theory to
  • 4. redress "the more fiagrant breaches of decency and propriety."''* Technology also played a role. The first easily portable cameras were developed at the end of the nineteenth century, which allowed photographers to invade "the sacred precincts of private and domestic life."'' The article by Warren and Brandeis, in which they brilliantly argued for the creation of a tort of invasion of privacy, received glowing reviews from legal scholars, such as Dean Roscoe Pound of the Harvard Law School,'^ but it did not immediately translate into widespread judicial acceptance. That was the role of another giant in the law with a local connection. In 1960, William L. Prosser, who was bom in New Albany, Indiana, published an article in the California Law Review simply called "Privacy."'^ Prosser proposed that the common law should recognize four types of invasion of privacy: (1) intrusion upon the plaintiffs seclusion or solitude; (2) public disclosure of embarrassing private facts about the plaintiff; (3) publicity that places the plaintiff in a false light; and (4) appropriation of the plaintiffs name or likeness.'^ These four categories appeared in the Restatement (Second) of Torts" and they were widely adopted by the
  • 5. '" Samuel D. Warren & Louis D. Brandeis, The Right to Privacy, 4 HARV. L. REV. 193 ( 1890). " Amy Gajda, What if Samuel D. Warren Hadn 't Married a Senator's Daughter?: Uncovering the Press Coverage That Led to "The Right to Privacy, " 2008 MICH. ST. L. REV. 35, 41. Thomas F. Bayard (1885-1889): Secretary of State, Miller Center, htlp://millercenter.org/president/cleveland/essays/cabinet/372 (last visited Jan. 21,2014). '̂ Gajda, supra note 11, at 44. " MELVIN I. UROFSKY, LOUIS D . BRANDEIS: A LIFE 98 (2009). ''' Id. See also Warren & Brandeis, supra note 10, at 215-16. " Warren & Brandeis, supra note 10, at 195. "• UROFSKY, supra note 13, at 101. " William L. Prosser, Privacy, 48 CALIF. L. REV. 383 (1960). " Id at 389. " RESTATEMENT (SECOND) OF TORTS §§ 652A-652E (1977). Prosser was the reporter. 2014] Privacy and Technology in the Twenty-First Century 335 courts.^" Tort actions for invasion of privacy, of course, only apply to private actors. Constitutional law, applicable to governmental action, also has been asserted to be a source for protecting informational privacy. In Whalen v. Roe^^ the plaintiffs challenged the constitutionality of a New
  • 6. York state law requiring the collection in a centralized database of the names and addresses of all persons who obtain, pursuant to a doctor's prescription, certain controlled drugs, including powerful analgesics.^^ The Supreme Court stopped short of recognizing a constitutionally protected interest in informational privacy, holding that even assuming there were such a right, the statute was a reasonable measure to prevent the unlawful diversion of controlled substances.^^ The Court also recognized the growing threat to privacy posed by governmental data collection. In his lead opinion. Justice Stevens wrote: "We are not unaware of the threat to privacy implicit in the accumulation of vast amounts of personal information in computerized data banks or other massive government files . . . ." '̂' In a concurring opinion. Justice Brennan added: "I am not prepared to say that future developments will not demonstrate the necessity of some curb on such technology."^^ Future developments certainly brought ever-greater computer capabilities and government utilization of data collection and analysis. Thus far, however, there have yet to be any meaningful curbs on the technology. After Whalen, the lower courts assumed there was a constitutional right to informational privacy, but the courts
  • 7. overwhelmingly found the government had a compelling interest in accessing and using various types of personal information and therefore they upheld a wide range of challenged government actions.^* The Supreme Court revisited the issue in 2011 in NASA v. Nelsonf a challenge to allegedly intrusive background questionnaires and interviews of references mandated for employees of NASA contractors. The Supreme Court, in an opinion by Justice Alito, again assumed without deciding there is a constitutional right ™ DAN B . DOBBS, THE LAW OF TORTS 1197-98 (2000); W. PAGE KEETON ET AL., PROSSER AND KEETON ON TORTS 849-51 (5th ed. 1984). '̂ Whalen v. Roe, 429 U.S. 589 (1977). ' ' / ¿ a t 591-93. '^ /d at 600,603-06. " Id. at 605. ' ' Id. at 607 (Brennan, J., concurring). ' ' See Mark A. Rothstein, Constitutional Right to Informational Health Privacy in Critical Condition, 39 J.L. MED. & ETHICS 280, 281 (2011). ' ' NASA V. Nelson, 131 S. Ct. 746 (2011). 336 UNIVERSITY OF LOUISVILLE LAW REVIEW [Vol. 52:333
  • 8. to informational privacy and again held the government interest justified the infi-ingement on privacy.^^ The final type of privacy law is statutory. During the 1970s Congress considered, but failed to enact, comprehensive privacy legislation.^' In 1974, however. Congress enacted the federal Privacy Act,^° which established a code of fair information practices for government agencies that collect, use, or disseminate information. Importantly, the law only applies to information held by federal government agencies.^' There are also a number of subject-specific privacy laws at both the federal and state levels, such as the Family Educational Rights and Privacy Act (FERPA) (dealing with student records)^^ and the Health Insurance Portability and Accountability Act (HIPAA)" and its notorious Privacy Rule (dealing with health information). '̂* Although much of my research involves health privacy, you will, no doubt, be pleased to learn that I will not be addressing HIPAA and other arcane statutes and regulations today. What I want to talk about are some other current issues involving technology and privacy, beginning with surveillance and then moving to genetic testing.
  • 9. During the last few months there has been a flood of information disclosed about government surveillance programs. Some of the disclosures resulted from Edward Snowden's leaks about the existence of the National Security Agency (NSA) program of telephone- based metadata analysis.^^ Other disclosures resulted from voluntary governmental releases of information, judicial opinions, and investigative journalism.^* These '̂ /¿at751. ^' See Daniel J. Solove, Privacy and Power: Computer Databases and Metcfihorsfor Information Privacy, 53 STAN. L. REV. 1393,1440 (2001). " 5 U.S.C. § 552a (2012). " 5 U.S.C. § 552a(a) (2012); 5 U.S.C. § 552(f) (2012) (defining covered "agencies" as government entities only). " 20 U.S.C. § 1232g(2012). " 42 U.S.C. §§ 300gg-300gg-2 (2012). '" Standards for Privacy of Individually Identifiable Health Information, 45 C.F.R. pts. 160, 164 (2012). " See, e.g., Jennifer Stisa Grannick & Christopher Jon
  • 10. Sprigman, Op-Ed., The Criminal N.S.A., N.Y. TIMES, June 27,2013, http://www.nytimes.com/2013/06/28/opinion/tiie-criminal- nsa.htinl?_i=0. '^ See, e.g., Glenn Greenwald, XKeyscore: NSA Tool Collects 'Nearly Everything a User Does on the Internet,' THE GUARDIAN, July 3 1 , 2013, http://www.theguardian.com/world/2013/jul/31/nsa-top-secret- program-online-data (revealing investigative findings about a government program tracking individuals' intemet activity); Ellen Nakashima, FISA Court Releases Opinion Upholding NSA Phone Program, WASH. POST, Sept. 17, 2013, http://articles.washingtonpost.com/2013-09- 17/world/421465161 all-call-detai 1-records-phone- records-opinion (discussing the release of a FISA court opinion upholding the constitutionality of the N S A ' s "bulk records" collection of phone data); Ron Nixon, Postal Service Confirms Photographing All U.S. Mail, N.Y. T I M E S , Aug. 2, 2013, http://www.nytimes.com/2013/08/03/us/postal-service-confirms- photographing-all- us-mail.html (discussing Postal Service's Mail Isolation and Tracking System). 2014] Privacy and Technology in the Twenty-First Century 337 disclosures raise fundamental issues of privacy protection in the age of technology. At the end of July of this year, the Fifth Circuit decided a case in which
  • 11. it held that the federal government does not need a warrant to obtain cell phone location data from a cellular service provider. " Cell phone location (or cell site) data indicate the location of a particular cell phone at various times in the past.̂ ^ In addition, triangulating cell signal data from more than one cell tower or signal receiver can reveal movement of the cell phone and thereby the travel of the individual possessor of the phone.^' According to the Fifth Circuit, cell phone usage is a voluntary activity and therefore a user "voluntarily conveys his cell site data each time he makes a call."^" The court also emphasized the government is not collecting the information; it is merely getting access to information collected by the service provider.'*' Unsurprisingly, federal legislation to require a warrant before disclosing cell site information has been stalled in Congress.'*^ Meanwhile, Maine'*^ and Montana'*'* have enacted laws requiring a warrant for access to cell site location data and additional state legislation is likely. The effect of this state legislation, however, is not entirely clear because of the possibility of federal preemption of telecommunications regulation. A case pending in Oregon illustrates an important preemption issue in a slightly different
  • 12. context. In 2009, the Oregon Legislature established the Oregon Prescription Drug Monitoring Program, an electronic database maintained by the Oregon Health Authority that records information about all "prescription drugs dispensed by pharmacies in Oregon that are classified in schedules II through rV under the federal Controlled Substances Act . . . ."'*̂ The Oregon law provides that after filling a prescription for a controlled " In re Application of the U.S. for Historical Cell Site Data, 724 F.3d 600, 615 (5th Cir. 2013) [hereinafter Cell Site Data]. *̂ M at 602. ^' See L. Scott Harrell, Locating Mobile Phones Through fínging and Triangulation, PURSUrr MAGAZINE, July 1, 2008, http://pursuitmag.com/locating-mobile-phones- through-pinging-and-triangulation/ (discussing triangulating cell phone data to show phone's location). "" Cell Site Data, 724 F.3d at 614. "' M at 611-12. *^ Online Communications and Geolocation Protection Act, H.R. 983,113th Cong. (2013). "' 2013 Me. Laws 402. •'•' 2013 Mont. Laws 394. "' OR. REV. STAT. § 431.962(l)(a) (2011). As of 2013, every state except Missouri had enacted
  • 13. similar legislation. Jason Hancock, Drug Czar Will Push Missouri to Track Prescription Medicines, KAN. CITY STAR (Aug. 15, 2012), http://www.kansascity.com/2012/08/14/3762592/dmg-czar-to- push- for-prescription.html. 338 UNIVERSITY OF LOUISVILLE LAW REVIEW [Vol. 52:333 substance, Oregon pharmacies are required to report electronically the name, address, and date of birth of the patient, as well as information about the prescribing physician."* The law prohibits the state fi"om disclosing prescription records to law enforcement agencies unless presented with a "valid court order based on probable cause and issued at the request of a federal, state or local law enforcement agency engaged in an authorized, drug-related investigation involving a person to whom the requested information pertains.""^ Notwithstanding this language, the federal Drug Enforcement Administration (DEA) has attempted to obtain prescription drug information for federal law enforcement purposes by using an administrative subpoena, as authorized by the Controlled Substances Act."^ The DEA's position is that the state requirement of a court order is preempted by federal law."' The State of Oregon disagrees, and
  • 14. it sued the DEA in United States District Court seeking a declaratory judgment that the Oregon statute is valid and not preempted by federal law.^" The American Civil Liberties Union (ACLU) intervened to assert that, notwithstanding the preemption issue, individuals have a reasonable expectation of privacy in their prescription drug records, as evidenced by Fourth Amendment case law and the traditional precepts of the physician-patient relationship.^' The ACLU's motion for summary judgment is currently pending before the district court. In the interest of full disclosure, I am working with the ACLU on this case as an unpaid expert witness. A link between the NSA metadata telephone record program and the pending Oregon DEA case was disclosed in a New York Times story on September 2, 2013.^' The Hemisphere Project, which started in 2007 but was previously unknown, involves DEA again using administrative subpoenas, but this time to gain access to and data mine comprehensive telephone records from AT&T in combating drug trafficking.'^ DEA agents are actually embedded at the telecommunications company, where they ^ OR. REV. STAT. §431.964(1) (2011). "' OR. REV. STAT. § 431.966(2)(a)(C) (2011).
  • 15. "' 21 U.S.C. §876(2012). "" Complaint for Declaratory Judgment, Or. Prescription Drug Monitoring Program v. U.S. Drug Enforcement Admin., No, 12CVO2023,2012 WL 5898554, at H 5 (D. Or. Nov. 9,2012). ' ' See generally Plaintiffs-lntervenors' Combined Response to Defendant DEA's Cross-Motion for Summary Judgment and Reply in Support of Plaintiffs- lntervenors' Motion for Summary Judgment, No.: 3:12- CV-02023-HA (D. Or. Sept. 23, 2013), available at htlps://www.aclu.org/sites/default/files/assets /48._aclu_ response-reply brief.pdf '̂ Scott Shane & Colin Moynihan, Drug Agents Use Vast Phone Trove, Eclipsing N.S.A. 's, N.Y. TIMES, Sept. 2,2013, at A l . 2014] Privacy and Technology in the Twenty-First Century 339 have access to the phone records of literally billions of telephone calls dating back to 1987.̂ '* With each new disclosure the public has become increasingly concerned about intrusive surveillance. Attempting to allay public apprehension, James Clapper, Director of National Security, reported to Congress that the agency has no current plans to collect cell location data as part of its surveillance program." Unfortunately, surveillance programs do
  • 16. not have a good track record of staying within the bounds of their mandate. On August 21, 2013, a previously classified decision of the Foreign Intelligence Surveillance Court was released, and it strongly criticized the NSA for failing to limit the nature of its activities. The Court is troubled that the government's revelations regarding NSA's acquisition of Internet transactions mark the third instance in less than three years in which the government has disclosed a substantial misrepresentation regarding the scope of a major collection program. . . . Contrary to the government's repeated assurances, NSA had been routinely running queries of the metadata using querying terms that did not meet the standard for querying. The Court concluded that this requirement had been "so frequently and systematically violated that it can be fairly said that this critical element of the overall. . . regime has never iunctioned effectively."^^ These latest revelations raise many questions. If one reluctantly concedes that the importance of preventing terrorism justifies some intrusive surveillance activities, should the cloak of constitutionality also extend to the legitimate, but less exigent, need to monitor billions of personal phone calls as part of a countemarcotics law enforcement
  • 17. program? Is there a difference between one's reasonable expectation of privacy in prescription drug records and phone call metadata? What " Id. In another controversial revelation in September 2013, it was established that the United States has been engaged in a massive program of cryptography. According to a story in the New York Times, the government now has virtually unfettered access to messages encrypted with the most common encryption technology. Nicole Perlroth et al., N.S.A. Able to Foil Basic Safeguards of Privacy on Web, N.Y. TIMES, Sept. 6, 2013, http://www.nytimes.com/2013/09/06/us/nsa-foils-much-intemet- encryption.html?pagewanted=l&r=0&hp. " Letter from James Clapper, Dir. of Nat'I Intelligence, Office of the Dir. of Central Intelligence, to Senator Ron Wyden (July 26, 2013), available at http://www.wyden.senate.gov/download /?id=285dc9e7-195a-4467-b0fe-caa857fc4e0d. " Memorandum Opinion of Judge John D. Bates, 2011 WL 10945618, at '*5 n.l4 (Foreign Intelligence Surveillance Court Oct. 3, 2011) (case name redacted). A second highly critical judicial opinion, issued in 2009, was released by the government in September 2013. Scott Shane, Court Upbraided N.S.A. on its Use of Call-Log Data, N.Y. TIMES (Sept. 10, 2013), http://www.nytimes.com/2013/09/ll/us/court- upbraided-nsa-on-its-use-of-call-log- data.html?pagewanted=all& r=0.
  • 18. 340 UNIVERSITY OF LOUISVILLE LAW REVIEW [Vol. 52:333 constitutional or other boundaries are essential to protect unreasonable intrusions of what Warren and Brandeis called individuals' "inviolate personality"?" Finally, how can we protect against the expansion of surveillance through "function creep"? Perhaps the best example of function creep involves a wholly different type of technology—DNA forensics. The technology for uniquely identifying individuals from a DNA sample was developed in the United Kingdom by Alec Jeffreys in the mid-1980s,'^ and it was soon adopted in the United States for law enforcement.^' At first, state laws limited the use of mandatory DNA collection and forensic database creation to individuals convicted of murder or rape.^° These crimes were chosen because of their severity and the likelihood of DNA being left at a crime scene. It was not long, however, before a steady stream of federal and state legislation was enacted to expand the categories for DNA collection to all felons, all misdemeanants, all juvenile offenders, and finally, all arrestees.*' The expansion occurred without any peer-reviewed evidence of the efficacy of wider-scope DNA collection in solving crimes*^ and despite
  • 19. substantial backlogs in processing samples from existing categories.^^ In June 2013, the Supreme Court decided Maryland v. King.^'^ The Court, five-to-four, in an opinion by Justice Kennedy, upheld Maryland's warrantless DNA collection from all arrestees charged with a serious crime.̂ ^ According to the majority opinion, the search was lawful because it was used to identify the individual and because the Court considered DNA testing using a buccal swab for obtaining a DNA sample no more intrusive than a fingerprint.** In dissent. Justice Scalia said the purpose of the search was not identification, but to discover evidence of criminal wrongdoing, and therefore a warrant was required.*^ He also expressed his strong belief that the majority's position of upholding DNA testing of " Warren & Brandeis, supra note 10, at 205. '* See Alec Jeffreys et a l , Individual-Specific 'Fingerprints' of Human DNA, 316 NATURE 76 (1985). ^' See Andrews v. State, 533 So. 2d 841 (Fla. Dist. Ct. App. 1988) (affirming conviction of first reported U.S. case to admit DNA identification evidence). '° See Mark A. Rothstein & Sandra Camahan, Legal and Policy Issues in Expanding the Scope of
  • 20. Law Enforcement DNA Data Banks, 67 BROOK. L. REV. 127, 128 (2001 ). " See Mark A. Rothstein & Meghan K. Talbott, 7?!e Expanding Use of DNA in Law Enforcement: What Role for Privacy?, 34 J.L. MED. & ETHICS 153, 153 (2006). " Id at 154. "Id " Maryland v. King, 133 S. Ct. 1958 (2013). ' ' Id at 1980. "" Id " See id at 1985-86 (Scalia, J., dissenting). 2014] Privacy and Technology in the Twenty-First Century 341 arrestees will be extended beyond the "serious crimes" of the Maryland law.*^ Justice Scalia wrote, "Make no mistake about it: As an entirely predictable consequence of today's decision, your DNA can be taken and entered into a national DNA database if you are ever arrested, rightly or wrongly, and for whatever reason."*' Today, besides "direct" DNA searches, law enforcement agencies use indirect searches,^" low stringency searches,''' dragnet searches,^^ surname searches," health care biobank searches,̂ '* and phenotypic profiling." There are also calls for a DNA sample to be taken from every individual in
  • 21. the country.^* The expansion of DNA forensic analysis has taken place with very little objection fi-om the public or elected officials because of the unproven assumption that each expansion of testing reduces crime and therefore additional incursions on privacy are justified. In the realm of DNA forensics, we have lost our privacy rights through a series of incremental incursions, but this should offer little consolation. As Justice Douglas wrote in Osbom v. United States: [T]he privacy and dignity of our citizens is heing whittled away by sometimes imperceptible steps. Taken individually, each step may be of little consequence. But when viewed as a whole, there begins to emerge a society quite unlike any we have seen - a society in which government '* Id. at 1989 (Scalia, J., dissenting). " Id. (Scalia, J. dissenting). ™ Indirect searches involve obtaining the DNA of a family member of a suspect, often surreptitiously, to get genetic information from which an inference may be made about the genetic makeup of the suspect. See Rothstein & Talbott, supra note 61, at 156. " Low stringency searches occur when DNA testing results in short tandem repeat matches with crime scene or other DNA insufficient to establish a match, but
  • 22. greater than a random amount and therefore suggestive that the test subject is related to the individual being sought. See id. at 156-57. " Dragnet searches entail the collection of DNA from individuals who fit tiie general description of a perpetrator, usually residing or working in the same geographic area where a crime occurred. See id. at 155-56. " Surname searches involve matching crime scene evidence against a data bank of surname haplotypes. See id. at 157. '* Health care biobank searches involve obtaining physical specimens of suspects from health care facilities for DNA analysis. See id. at 157-58. " Phenotypic profiling involves using the resuhs of DNA analysis on an unknown sample to construct a profile of the phenotypic characteristics (e.g., gender, illnesses) of the individual. See id. at 158. See genera/^y National Institute of Justice, Forensic DNA: Alternative Genetic Markers, Research Projects List, available at http://www.nij.gov/topics/forensics/evidence/dna/research/altem ative- markers.htm (reporting that DNA analysis can indicate ethnicity, physical characteristics, and skin, hair, or eye color). '^ See Rothstein & Talbott, supra note 61, at 154. 342 UNIVERSITY OF LOUISVILLE UW REVIEW [Vol.
  • 23. 52:333 may intrude into the secret regions of a man's life at will.^^ Genetic testing raises many other fascinating privacy issues, including surreptitious testing. Suppose, after my talk, I leave my empty water bottle here on the lectern. Would it be lawful for you to pick up the bottle, send it to a commercial laboratory, and have whole genome sequencing performed?^^ The answer is that nonconsensual genetic testing is probably lawful in virtually every state, including the twelve states with laws requiring consent for certain kinds of genetic testing.^' Would it matter if the bottle were picked up and tested by the FBI or some law enforcement agency? No. As a matter of constitutional law and property law, if I "abandon" an item, I have relinquished any property or other interest I have in it and finders of the item can do with it whatever they want.^" In my view, when individuals inadvertently leave behind or intentionally discard an object, such as an empty water bottle, used chewing gum, or cigarette butt, they are not impliedly consenting to have any dumpster diver retrieve the object and have whole genome sequencing performed. These new technologies can reveal a wealth of information about an individual's current and future health as well as
  • 24. familial risk factors, parentage, ancestral origin, and other information. Although I doubt there is much interest in my DNA, one can assume there is a substantial market for the DNA of entertainers, sports figures, politicians, and other celebrities.^' In 2012, the Presidential Commission for the Study of Bioethical Issues identified nonconsensual DNA testing as a key policy issue that should be addressed.^^ In the United Kingdom, section 45 of the Human Tissue Act of 2004 makes it unlawful for any individual, without proper consent, to possess any " Osbom V. United States, 385 U.S. 323, 343 (1966) (Douglas, J., dissenting). " Today, whole genome sequencing costs $3,000-$4,000, but the cost keeps dropping and soon it will be under $1,000. DNA Sequencing Costs, N A T ' L HUMAN GENOME RESEARCH INST., http://www.genome.gov/sequencingcosts (last updated Oct. 29, 2013). See also Ivan Karabaliev, The $1,000 Genome Is Almost Here—Are We Ready?, Sei. Am. (Oct. 15, 2012), http://blogs.scientificamerican.com/guest-blog/2012/10/15/the- 1000-genome-is-here-are-we-ready/ (guest commentary). " These states are Alaska, Arizona, Florida, Georgia, Massachusetts, Michigan, Nebraska, New Mexico, New York, South Carolina, South Dakota, and
  • 25. Vermont. See Mark A. Rothstein, Genetic Stalking and Voyeurism: A New Challenge to Privacy, 57 U. KAN. L. REV. 539, 560 n.l52 (2009). *° See Califomia v. Greenwood, 486 U.S. 35, 39-43 (1988). *' See Rothstein, supra note 79, at 539-43. *̂ PRESIDENTIAL COMM'N FOR THE STUDY OF BIOETHICAL ISSUES, PRIVACY AND PROGRESS IN WHOLE GENOME SEQUENCING 2-3 (2012), available at http://bioethics.gov/sites/default/files/Privacy Progress508_l .pdf 2014] Privacy and Technology in the Twenty-First Century 343 "bodily material" with the intent to have DNA testing performed.*^ There are exceptions for medical treatment, law enforcement, research, and other uses.^" The reason for the law is that in 2002 there were press reports about an alleged plot to steal hair from Prince Harry and perform genetic testing.^' The purpose was to determine if IVIajor James Hewitt, with whom Princess Diana had an affair, was the father of Prince Harry, rather than Prince Charles.^'' Section 45 makes any unauthorized DNA testing a crime punishable by up to three years in prison.^^ Fortunately, we have no royal family in the United States; unfortunately, we have no law comparable to the statute that the British royal family inspired.
  • 26. Finally, I want to comment briefiy on the following argument I often hear. It goes something like this: "Times have changed. The younger generation does not care about privacy the way their parents did. Look at all of the highly personal information and photos they post on social media sites. Besides, it is impossible to protect privacy in an age of technology, and attempting to do so is a waste of time and effort." Or, as Scott McNealy, co-founder of Sun Microsystems, famously told reporters in 1999, "You have zero privacy anyway. Get over it."^^ I agree it is difficult and costly to protect privacy—and the cost is not just money. It includes constraints on law enforcement and national security agencies; limitations on commercial entities and financial institutions; inconvenience for educators; extra burdens for employers; additional administrative steps for medical researchers; and a more time- consuming consent process for health care providers. I agree that some of the burdens could be reduced and that efforts are needed to streamline and minimize procedures. Despite these costs, I strongly believe that privacy is worth the cost. It is the price we pay for living in a civil society that respects the dignity, autonomy, and personal space of every
  • 27. individual. It is disconcerting to contemplate a society that would abandon privacy in favor of technology and expediency. *' Human Tissue Act, 2004, c. 30, § 45(1) (Eng.). '•* Rothstein, supra note 79, at 566. ''Id *' Prince Harry 'Honey Trap' Allegations, BBC NEWS (Dec. 15, 2002), http://news.bbc.co.Uk/l/hi/ uk/2577539.stm. " Human Tissue Act, § 45(3)(b)(l). " Private Lives? Not Ours!, PC WORLD (Apr. 18, 2000), http://www.pcworld.com/article/16331 /article.html. 344 UNIVERSITY OF LOUISVILLE LAW REVIEW [Vol. 52:333 Let me end by quoting from Brandeis's majestic dissent in Olmstead v. United States: The makers of our Constitution undertook to secure conditions favorable to the pursuit of happiness. They recognized the significance of man's spiritual nature, of his feelings and of his intellect. They knew that only part of the pain, pleasure and satisfactions of life are to be found in
  • 28. material things. They sought to protect Americans in their beliefs, their thoughts, their emotions, and their sensations. They conferred as against the Government, the right to be let alone - the most comprehensive of rights and the right most valued by civilized men. ' Olmstead v. United States, 277 U.S. 438,478 (1928) (Brandeis, J., dissenting). Copyright of University of Louisville Law Review is the property of University of Louisville School of Law and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. 4/17/2017 Warren and Brandeis, "The Right to Privacy" http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr2.html 1/9 T “The Right to Privacy” Warren and Brandeis Harvard Law Review.
  • 29. Vol. IV December 15, 1890 No. 5 THE RIGHT TO PRIVACY[*] . "It could be done only on principles of private justice, moral fitness, and public convenience, which, when applied to a new subject, make common law without a precedent; much more when received and approved by usage." — Willes, J., in Millar v. Taylor, 4 Burr. 2303, 2312 hat the individual shall have full protection in person and in property is a principle as old as the common law; but it has been found necessary from time to time to define anew the exact nature and extent of such protection. Political, social, and economic changes entail the recognition of new rights, and the common law, in its eternal youth, grows to meet the new demands of society. Thus, in very early times, the law gave a remedy only for physical interference with life and property, for trespasses vi et armis. Then the "right to life" served only to protect the subject from battery in its various forms; liberty meant freedom from actual restraint; and the right to property secured to the individual his lands and his cattle. Later, there came a recognition of man's spiritual nature, of his feelings and his intellect. Gradually the scope of these legal rights broadened; and now the right to life has come to mean the right to enjoy life, -- the right to be let alone; the right to liberty secures the exercise of extensive civil privileges; and the term "property" has grown to comprise every form of possession -- intangible, as well as tangible.
  • 30. Thus, with the recognition of the legal value of sensations, the protection against actual bodily injury was extended to prohibit mere attempts to do such injury; that is, the putting another in fear of such injury. From the action of battery grew that of assault.[1] Much later there came a qualified protection of the individual against offensive noises and odors, against dust and smoke, and excessive vibration. The law of nuisance was developed. [2] So regard for human emotions soon extended the scope of personal immunity beyond the body of the individual. His reputation, the standing among his fellow-men, was considered, and the law of slander and libel arose.[3] Man's family relations became a part of the legal conception of his life, and the alienation of a wife's affections was held remediable.[4] Occasionally the law halted, as in its refusal to recognize the intrusion by seduction upon the honor of the family. But even here the demands of society were met. A mean fiction, the action per quod servitium amisit, was resorted to, and by allowing damages for injury to the parents' feelings, an adequate remedy was ordinarily afforded.[5] Similar to the expansion of the right to life was the growth of the legal conception of property. From corporeal property arose the incorporeal rights issuing out of it; and then there opened the wide realm of intangible property, in the products and processes of the mind,[6] as works of literature and art, [7] goodwill,[8] trade secrets, and trademarks.[9] This development of the law was inevitable. The intense intellectual and emotional life, and the heightening of sensations which came with the advance of civilization, made it clear to men that only a part of the pain, pleasure, and profit of life lay in physical things. Thoughts, emotions, and sensations demanded legal recognition, and the beautiful capacity for growth which
  • 31. characterizes the common law enabled the judges to afford the requisite protection, without the interposition of the legislature. http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn0 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn1 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn2 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn3 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn4 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn5 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn6 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn7 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn8 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn9 4/17/2017 Warren and Brandeis, "The Right to Privacy" http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr2.html 2/9 Recent inventions and business methods call attention to the next step which must be taken for the protection of the person, and for securing to the individual what Judge Cooley calls the right "to be let alone" [10] Instantaneous photographs and newspaper enterprise have
  • 32. invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that "what is whispered in the closet shall be proclaimed from the house-tops." For years there has been a feeling that the law must afford some remedy for the unauthorized circulation of portraits of private persons;[11] and the evil of invasion of privacy by the newspapers, long keenly felt, has been but recently discussed by an able writer.[12] The alleged facts of a somewhat notorious case brought before an inferior tribunal in New York a few months ago,[13] directly involved the consideration of the right of circulating portraits; and the question whether our law will recognize and protect the right to privacy in this and in other respects must soon come before our courts for consideration. Of the desirability -- indeed of the necessity -- of some such protection, there can, it is believed, be no doubt. The press is overstepping in every direction the obvious bounds of propriety and of decency. Gossip is no longer the resource of the idle and of the vicious, but has become a trade, which is pursued with industry as well as effrontery. To satisfy a prurient taste the details of sexual relations are spread broadcast in the columns of the daily papers. To occupy the indolent, column upon column is filled with idle gossip, which can only be procured by intrusion upon the domestic circle. The intensity and complexity of life, attendant upon advancing civilization, have rendered necessary some retreat from the world, and man, under the refining influence of culture, has become more sensitive to publicity, so that solitude and privacy have become more essential to the individual; but modern enterprise and invention have, through invasions upon his privacy, subjected him to mental pain and distress, far greater than could be inflicted by mere bodily injury. Nor is the harm wrought by
  • 33. such invasions confined to the suffering of those who may be the subjects of journalistic or other enterprise. In this, as in other branches of commerce, the supply creates the demand. Each crop of unseemly gossip, thus harvested, becomes the seed of more, and, in direct proportion to its circulation, results in the lowering of social standards and of morality. Even gossip apparently harmless, when widely and persistently circulated, is potent for evil. It both belittles and perverts. It belittles by inverting the relative importance of things, thus dwarfing the thoughts and aspirations of a people. When personal gossip attains the dignity of print, and crowds the space available for matters of real interest to the community, what wonder that the ignorant and thoughtless mistake its relative importance. Easy of comprehension, appealing to that weak side of human nature which is never wholly cast down by the misfortunes and frailties of our neighbors, no one can be surprised that it usurps the place of interest in brains capable of other things. Triviality destroys at once robustness of thought and delicacy of feeling. No enthusiasm can flourish, no generous impulse can survive under its blighting influence. It is our purpose to consider whether the existing law affords a principle which can properly be invoked to protect the privacy of the individual; and, if it does, what the nature and extent of such protection is. Owing to the nature of the instruments by which privacy is invaded, the injury inflicted bears a superficial resemblance to the wrongs dealt with by the law of slander and of libel, while a legal remedy for such injury seems to involve the treatment of mere wounded feelings, as a substantive cause of action. The principle on which the law of defamation rests, covers, however, a radically different class of effects from those for which
  • 34. attention is now asked. It deals only with damage to reputation, with the injury done to the individual in his external relations to the community, by lowering him in the estimation of his fellows. The matter published of him, however widely circulated, and however unsuited to publicity, must, in order to be actionable, have a direct tendency to injure him in his intercourse with others, and even if in writing or in print, must subject him to the hatred, ridicule, or contempt of his fellowmen, -- the effect of the publication upon his estimate of himself and upon his own feelings nor forming an essential element in the cause of action. In short, the wrongs and correlative rights recognized by the law of slander and libel are in their nature material rather than spiritual. That branch of the law simply extends the protection surrounding physical property to certain of the conditions necessary or helpful to worldly prosperity. On the other hand, our law recognizes no principle upon which compensation can be granted for mere injury to the feelings. However painful the mental effects upon another of an act, though purely wanton or even malicious, yet if the act itself is otherwise lawful, the suffering inflicted is dannum absque injuria. Injury of feelings may indeed be taken account of in ascertaining the amount of damages when attending what is recognized as a legal injury;[14] but our system, unlike the Roman law, does not afford a http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn10 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn11 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn12 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn13 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
  • 35. ivacy_brand_warr_fn.html#fn14 4/17/2017 Warren and Brandeis, "The Right to Privacy" http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr2.html 3/9 remedy even for mental suffering which results from mere contumely and insult, but from an intentional and unwarranted violation of the "honor" of another.[15] It is not however necessary, in order to sustain the view that the common law recognizes and upholds a principle applicable to cases of invasion of privacy, to invoke the analogy, which is but superficial, to injuries sustained, either by an attack upon reputation or by what the civilians called a violation of honor; for the legal doctrines relating to infractions of what is ordinarily termed the common-law right to intellectual and artistic property are, it is believed, but instances and applications of a general right to privacy, which properly understood afford a remedy for the evils under consideration. The common law secures to each individual the right of determining, ordinarily, to what extent his thoughts, sentiments, and emotions shall be communicated to others.[16] Under our system of government, he can never be compelled to express them (except when upon the witness stand); and even if he has chosen to give them expression, he generally retains the power to fix the limits of the publicity which shall be given them. The existence of this right does not depend upon the particular method of expression adopted. It is immaterial whether it be by word[17] or by signs,[18] in painting,[19] by sculpture, or in music.[20] Neither does the
  • 36. existence of the right depend upon the nature or value of the thought or emotions, nor upon the excellence of the means of expression.[21] The same protection is accorded to a casual letter or an entry in a diary and to the most valuable poem or essay, to a botch or daub and to a masterpiece. In every such case the individual is entitled to decide whether that which is his shall be given to the public.[22] No other has the right to publish his productions in any form, without his consent. This right is wholly independent of the material on which, the thought, sentiment, or emotions is expressed. It may exist independently of any corporeal being, as in words spoken, a song sung, a drama acted. Or if expressed on any material, as in a poem in writing, the author may have parted with the paper, without forfeiting any proprietary right in the composition itself. The right is lost only when the author himself communicates his production to the public, -- in other words, publishes it.[23] It is entirely independent of the copyright laws, and their extension into the domain of art. The aim of those statutes is to secure to the author, composer, or artist the entire profits arising from publication; but the common-law protection enables him to control absolutely the act of publication, and in the exercise of his own discretion, to decide whether there shall be any publication at all.[24] The statutory right is of no value, unless there is a publication; the common-law right is lost as soon as there is a publication. What is the nature, the basis, of this right to prevent the publication of manuscripts or works of art? It is stated to be the enforcement of a right of property;[25] and no difficulty arises in accepting this view, so long as we have only to deal with the reproduction of literary and artistic compositions. They certainly possess many of the attributes of ordinary property; they are transferable; they have
  • 37. a value; and publication or reproduction is a use by which that value is realized. But where the value of the production is found not in the right to take the profits arising from publication, but in the peace of mind or the relief afforded by the ability to prevent any publication at all, it is difficult to regard the right as one of property, in the common acceptation of that term. A man records in a letter to his son, or in his diary, that he did not dine with his wife on a certain day. No one into whose hands those papers fall could publish them to the world, even if possession of the documents had been obtained rightfully; and the prohibition would not be confined to the publication of a copy of the letter itself, or of the diary entry; the restraint extends also to a publication of the contents. What is the thing which is protected? Surely, not the intellectual act of recording the fact that the husband did not dine with his wife, but that fact itself. It is not the intellectual product, but the domestic occurrence. A man writes a dozen letters to different people. No person would be permitted to publish a list of the letters written. If the letters or the contents of the diary were protected as literary compositions, the scope of the protection afforded should be the same secured to a published writing under the copyright law. But the copyright law would not prevent an enumeration of the letters, or the publication of some of the facts contained therein. The copyright of a series of paintings or etchings would prevent a reproduction of the paintings as pictures; but it would not prevent a publication of list or even a description of them.[26] Yet in the famous case of Prince Albert v. Strange, the court held that the common-law rule prohibited not merely the reproduction of the etchings which the plaintiff and Queen Victoria had made for their own pleasure, but also "the publishing (at least by printing or writing), though not by copy or resemblance, a description of them, whether more or less
  • 38. limited or summary, whether in the form of a catalogue http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn15 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn16 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn17 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn18 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn19 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn20 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn21 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn22 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn23 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn24 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn25 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn26 4/17/2017 Warren and Brandeis, "The Right to Privacy" http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr2.html 4/9 or otherwise."[27] Likewise, an unpublished collection of news possessing no element of a literary nature is protected from privacy.[28]
  • 39. That this protection cannot rest upon the right to literary or artistic property in any exact sense, appears the more clearly when the subject-matter for which protection is invoked is not even in the form of intellectual property, but has the attributes of ordinary tangible property. Suppose a man has a collection of gems or curiosities which he keeps private : it would hardly be contended that any person could publish a catalogue of them, and yet the articles enumerated are certainly not intellectual property in the legal sense, any more than a collection of stoves or of chairs.[29] The belief that the idea of property in its narrow sense was the basis of the protection of unpublished manuscripts led an able court to refuse, in several cases, injunctions against the publication of private letters, on the ground that "letters not possessing the attributes of literary compositions are not property entitled to protection;" and that it was "evident the plaintiff could not have considered the letters as of any value whatever as literary productions, for a letter cannot be considered of value to the author which he never would consent to have published."[30] But those decisions have not been followed,[31] and it may not be considered settled that the protection afforded by the common law to the author of any writing is entirely independent of its pecuniary value, its intrinsic merits, or of any intention to publish the same and, of course, also, wholly independent of the material, if any, upon which, or the mode in which, the thought or sentiment was expressed. Although the courts have asserted that they rested their decisions on the narrow grounds of protection to property, yet there are recognitions of a more liberal doctrine. Thus in the case of Prince Albert v. Strange,
  • 40. already referred to, the opinions of both the Vice-Chancellor and of the Lord Chancellor, on appeal, show a more or less clearly defined perception of a principle broader than those which were mainly discussed, and on which they both place their chief reliance. Vice-Chancellor Knight Bruce referred to publishing of a man that he had "written to particular persons or on particular subjects" as an instance of possibly injurious disclosures as to private matters, that the courts would in a proper case prevent; yet it is difficult to perceive how, in such a case, any right of privacy, in the narrow sense, would be drawn in question, or why, if such a publication would be restrained when it threatened to expose the victim not merely to sarcasm, but to ruin, it should not equally be enjoined, if it threatened to embitter his life. To deprive a man of the potential profits to be realized by publishing a catalogue of his gems cannot per se be a wrong to him. The possibility of future profits is not a right of property which the law ordinarily recognizes; it must, therefore, be an infraction of other rights which constitutes the wrongful act, and that infraction is equally wrongful, whether its results are to forestall the profits that the individual himself might secure by giving the matter a publicity obnoxious to him, or to gain an advantage at the expense of his mental pain and suffering. If the fiction of property in a narrow sense must be preserved, it is still true that the end accomplished by the gossip-monger is attained by the use of that which is another's, the facts relating to his private life, which he has seen fit to keep private. Lord Cottenham stated that a man "is that which is exclusively his," and cited with approval the opinion of Lord Eldon, as reported in a manuscript note of the case of Wyatt v. Wilson, in 1820, respecting an engraving of George the Third during his illness, to the effect that "if one of the late king's physicians had kept a diary of what he heard and saw, the court would not, in the king's
  • 41. lifetime, have permitted him to print and publish it; "and Lord Cottenham declared, in respect to the acts of the defendants in the case before him, that "privacy is the right invaded." But if privacy is once recognized as a right entitled to legal protection, the interposition of the courts cannot depend on the particular nature of the injuries resulting. These considerations lead to the conclusion that the protection afforded to thoughts, sentiments, and emotions, expressed through the medium of writing or of the arts, so far as it consists in preventing publication, is merely an instance of the enforcement of the more general right of the individual to be let alone. It is like the right not be assaulted or beaten, the right not be imprisoned, the right not to be maliciously prosecuted, the right not to be defamed. In each of these rights, as indeed in all other rights recognized by the law, there inheres the quality of being owned or possessed -- and (as that is the distinguishing attribute of property) there may some propriety in speaking of those rights as property. But, obviously, they bear little resemblance to what is ordinarily comprehended under that term. The principle which protects personal writings and all other personal http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn27 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn28 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn29 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn30 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn31
  • 42. 4/17/2017 Warren and Brandeis, "The Right to Privacy" http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr2.html 5/9 productions, not against theft and physical appropriation, but against publication in any form, is in reality not the principle of private property, but that of an inviolate personality.[32] If we are correct in this conclusion, the existing law affords a principle from which may be invoked to protect the privacy of the individual from invasion either by the too enterprising press, the photographer, or the possessor of any other modern device for rewording or reproducing scenes or sounds. For the protection afforded is not confined by the authorities to those cases where any particular medium or form of expression has been adopted, not to products of the intellect. The same protection is afforded to emotions and sensations expressed in a musical composition or other work of art as to a literary composition; and words spoken, a pantomime acted, a sonata performed, is no less entitled to protection than if each had been reduced to writing. The circumstance that a thought or emotion has been recorded in a permanent form renders its identification easier, and hence may be important from the point of view of evidence, but it has no significance as a matter of substantive right. If, then, the decisions indicate a general right to privacy for thoughts, emotions, and sensations, these should receive the same protection, whether expressed in writing, or in conduct, in conversation, in attitudes, or in facial expression. It may be urged that a distinction should be taken between the
  • 43. deliberate expression of thoughts and emotions in literary or artistic compositions and the casual and often involuntary expression given to them in the ordinary conduct of life. In other words, it may be contended that the protection afforded is granted to the conscious products of labor, perhaps as an encouragement to effort.[33] This contention, however plausible, has, in fact, little to recommend it. If the amount of labor involved be adopted as the test, we might well find that the effort to conduct one's self properly in business and in domestic relations had been far greater than that involved in painting a picture or writing a book; one would find that it was far easier to express lofty sentiments in a diary than in the conduct of a noble life. If the test of deliberateness of the act be adopted, much casual correspondence which is now accorded full protection would be excluded from the beneficent operation of existing rules. After the decisions denying the distinction attempted to be made between those literary productions which it was intended to publish and those which it was not, all considerations of the amount of labor involved, the degree of deliberation, the value of the product, and the intention of publishing must be abandoned, and no basis is discerned upon which the right to restrain publication and reproduction of such so-called literary and artistic works can be rested, except the right to privacy, as a part of the more general right to the immunity of the person, -- the right to one's personality. It should be stated that, in some instances where protection has been afforded against wrongful publication, the jurisdiction has been asserted, not on the ground of property, or at least not wholly on that ground, but upon the ground of an alleged breach of an implied contract or of a trust or confidence.
  • 44. Thus, in Abernethy v. Hutchinson, 3 L. J. Ch. 209 (1825), where the plaintiff, a distinguished surgeon, sought to restrain the publication in the "Lancet" of unpublished lectures which he had delivered as St. Bartholomew's Hospital in London, Lord Eldon doubted whether there could be property in lectures which had not been reduced to writing, but granted the injunction on the ground of breach of confidence, holding "that when persons were admitted as pupils or otherwise, to hear these lectures, although they were orally delivered, and although the parties might go to the extent, if they were able to do so, of putting down the whole by means of short-hand, yet they could do that only for the purposes of their own information, and could not publish, for profit, that which they had not obtained the right of selling." In Prince Albert v. Strange, I McN. & G. 25 (1849), Lord Cottenham, on appeal, while recognizing a right of property in the etchings which of itself would justify the issuance of the injunction, stated, after discussing the evidence, that he was bound to assume that the possession of the etching by the defendant had "its foundation in a breach of trust, confidence, or contract," and that upon such ground also the plaintiff's title to the injunction was fully sustained. In Tuck v. Priester, 19 Q.B.D. 639 (1887), the plaintiffs were owners of a picture, and employed the defendant to make a certain number of copies. He did so, and made also a number of other copies for himself, and offered them for sale in England at a lower price. Subsequently, the plaintiffs registered their copyright in the picture, and then brought suit for an injunction and damages. The Lords Justices differed as to the application of the http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
  • 45. ivacy_brand_warr_fn.html#fn32 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn33 4/17/2017 Warren and Brandeis, "The Right to Privacy" http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr2.html 6/9 copyright acts to the case, but held unanimously that independently of those acts, the plaintiffs were entitled to an injunction and damages for breach of contract. In Pollard v. Photographic Co., 40 Ch. Div. 345 (1888), a photographer who had taken a lady's photograph under the ordinary circumstances was restrained from exhibiting it, and also from selling copies of it, on the ground that it was a breach of an implied term in the contract, and also that it was a breach of confidence. Mr. Justice North interjected in the argument of the plaintiff's counsel the inquiry: "Do you dispute that if the negative likeness were taken on the sly, the person who took it might exhibit copies?" and counsel for the plaintiff answered: "In that case there would be no trust or consideration to support a contract." Later, the defendant's counsel argued that "a person has no property in his own features; short of doing what is libellous or otherwise illegal, there is no restriction on the photographer's using his negative." But the court, while expressly finding a breach of contract and of trust sufficient to justify its interposition, still seems to have felt the necessity of resting the decision also upon a right of property,[34] in order to bring it within the line of those cases which were relied upon as precedents.[35]
  • 46. This process of implying a term in a contract, or of implying a trust (particularly where a contract is written, and where these is no established usage or custom), is nothing more nor less than a judicial declaration that public morality, private justice, and general convenience demand the recognition of such a rule, and that the publication under similar circumstances would be considered an intolerable abuse. So long as these circumstances happen to present a contract upon which such a term can be engrafted by the judicial mind, or to supply relations upon which a trust or confidence can be erected, there may be no objection to working out the desired protection though the doctrines of contract or of trust. But the court can hardly stop there. The narrower doctrine may have satisfied the demands of society at a time when the abuse to be guarded against could rarely have arisen without violating a contract or a special confidence; but now that modern devices afford abundant opportunities for the perpetration of such wrongs without any participation by the injured party, the protection granted by the law must be placed upon a broader foundation. While, for instance, the state of the photographic art was such that one's picture could seldom be taken without his consciously "sitting" for the purpose, the law of contract or of trust might afford the prudent man sufficient safeguards against the improper circulation of his portrait; but since the latest advances in photographic art have rendered it possible to take pictures surreptitiously, the doctrines of contract and of trust are inadequate to support the required protection, and the law of tort must be resorted to. The right of property in its widest sense, including all possession, including all rights and privileges, and hence embracing the right to an inviolate personality, affords alone that broad basis upon which the protection which the individual demands can be rested.
  • 47. Thus, the courts, in searching for some principle upon which the publication of private letters could be enjoined, naturally came upon the ideas of a breach of confidence, and of an implied contract; but it required little consideration to discern that this doctrine could not afford all the protection required, since it would not support the court in granting a remedy against a stranger; and so the theory of property in the contents of letters was adopted.[36] Indeed, it is difficult to conceive on what theory of the law the casual recipient of a letter, who proceeds to publish it, is guilty of a breach of contract, express or implied, or of any breach of trust, in the ordinary acceptation of that term. Suppose a letter has been addressed to him without his solicitation. He opens it, and reads. Surely, he has not made any contract; he has not accepted any trust. He cannot, by opening and reading the letter, have come under any obligation save what the law declares; and, however expressed, that obligation is simply to observe the legal right of the sender, whatever it may be, and whether it be called his right or property in the contents of the letter, or his right to privacy.[37] A similar groping for the principle upon which a wrongful publication can be enjoined is found in the law of trade secrets. There, injunctions have generally been granted on the theory of a breach of contract, or of an abuse of confidence.[38] It would, of course, rarely happen that any one would be in possession of a secret unless confidence had been reposed in him. But can it be supposed that the court would hesitate to grant relief against one who had obtained his knowledge by an ordinary trespass, -- for instance, by wrongfully looking into a book in which the secret was recorded, or by eavesdropping? Indeed, in Yovatt v. Winyard, I J.&W. 394 (1820), where
  • 48. an injunction was granted against making any use or of communicating certain recipes for veterinary medicine, it appeared that the defendant while in the plaintiff's employ, had surreptitiously got access to his book of recipes, http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn34 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn35 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn36 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn37 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn38 4/17/2017 Warren and Brandeis, "The Right to Privacy" http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr2.html 7/9 and copied them. Lord Eldon "granted the injunction, upon the ground of there having been a breach of trust and confidence;" but it would seem difficult to draw any sound legal distinction between such a case and one where a mere stranger wrongfully obtained access to the book.[39] We must therefore conclude that the rights, so protected, whatever their exact nature, are not rights arising from contract or from special trust, but are rights as against the world; and, as above stated, the principle which has been applied to protect these rights is in reality not the principle of private property, unless that word be used in an extended and unusual sense. The principle which protects personal writings and any other productions of the
  • 49. intellect of or the emotions, is the right to privacy, and the law has no new principle to formulate when it extends this protection to the personal appearance, sayings, acts, and to personal relation, domestic or otherwise.[40] If the invasion of privacy constitutes a legal injuria, the elements for demanding redress exist, since already the value of mental suffering, caused by an act wrongful in itself, is recognized as a basis for compensation. The right of one who has remained a private individual, to prevent his public portraiture, presents the simplest case for such extension; the right to protect one's self from pen portraiture, from a discussion by the press of one's private affairs, would be a more important and far- reaching one. If casual and unimportant statements in a letter, if handiwork, however inartistic and valueless, if possessions of all sorts are protected not only against reproduction, but also against description and enumeration, how much more should the acts and sayings of a man in his social and domestic relations be guarded from ruthless publicity. If you may not reproduce a woman's face photographically without her consent, how much less should be tolerated the reproduction of her face, her form, and her actions, by graphic descriptions colored to suit a gross and depraved imagination. The right to privacy, limited as such right must necessarily be, has already found expression in the law of France.[41] It remains to consider what are the limitations of this right to privacy, and what remedies may be granted for the enforcement of the right. To determine in advance of experience the exact line at which the dignity and convenience of the individual must yield to the demands of the
  • 50. public welfare or of private justice would be a difficult task; but the more general rules are furnished by the legal analogies already developed in the law of slander and libel, and in the law of literary and artistic property. 1. The right to privacy does not prohibit any publication of matter which is of public or general interest. In determining the scope of this rule, aid would be afforded by the analogy, in the law of libel and slander, of cases which deal with the qualified privilege of comment and criticism on matters of public and general interest.[42] There are of course difficulties in applying such a rule; but they are inherent in the subject-matter, and are certainly no greater than those which exist in many other branches of the law, -- for instance, in that large class of cases in which the reasonableness or unreasonableness of an act is made the test of liability. The design of the law must be to protect those persons with whose affairs the community has no legitimate concern, from being dragged into an undesirable and undesired publicity and to protect all persons, whatsoever; their position or station, from having matters which they may properly prefer to keep private, made public against their will. It is the unwarranted invasion of individual privacy which is reprehended, and to be, so far as possible, prevented. The distinction, however, noted in the above statement is obvious and fundamental. There are persons who may reasonably claim as a right, protection from the notoriety entailed by being made the victims of journalistic enterprise. There are others who, in varying degrees, have renounced the right to live their lives screened from public observation. Matters which men of the first class may justly contend, concern themselves alone, may in those of the second be the subject of legitimate interest to their fellow-citizens. Peculiarities of manner and person, which in the ordinary individual should be free from
  • 51. comment, may acquire a public importance, if found in a candidate for public office. Some further discrimination is necessary, therefore, than to class facts or deeds as public or private according to a standard to be applied to the fact or deed per se. To publish of a modest and retiring individual that he suffers from an impediment in his speech or that he cannot spell correctly, is an unwarranted, if not an unexampled, infringement of his rights, while to state and comment on the same characteristics found in a would-be congressman could not be regarded as beyond the pale of propriety. http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn39 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn40 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn41 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn42 4/17/2017 Warren and Brandeis, "The Right to Privacy" http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr2.html 8/9 The general object in view is to protect the privacy of private life, and to whatever degree and in whatever connection a man's life has ceased to be private, before the publication under consideration has been made, to that extent the protection is likely to be withdrawn.[43] Since, then, the propriety of publishing the very same facts may depend wholly upon the person concerning whom they are published, no fixed formula can be used to prohibit obnoxious publications. Any rule of liability adopted
  • 52. must have in it an elasticity which shall take account of the varying circumstances of each case, -- a necessity which unfortunately renders such a doctrine not only more difficult of application, but also to a certain extent uncertain in its operation and easily rendered abortive. Besides, it is only the more flagrant breaches of decency and propriety that could in practice be reached, and it is not perhaps desirable even to attempt to repress everything which the nicest taste and keenest sense of the respect due to private life would condemn. In general, then, the matters of which the publication should be repressed may be described as those which concern the private life, habits, acts, and relations of an individual, and have no legitimate connection with his fitness for a public office which he seeks or for which he is suggested, or for any public or quasi public position which he seeks or for which he is suggested, and have no legitimate relation to or bearing upon any act done by him in a public or quasi public capacity. The foregoing is not designed as a wholly accurate or exhaustive definition, since that which must ultimately in a vast number of cases become a question of individual judgment and opinion is incapable of such definition; but it is an attempt to indicate broadly the class of matters referred to. Some things all men alike are entitled to keep from popular curiosity, whether in public life or not, while others are only private because the persons concerned have not assumed a position which makes their doings legitimate matters of public investigation.[44] 2. The right to privacy does not prohibit the communication of any matter, though in its nature private, when the publication is made under circumstances which would render it a privileged communication according to the law of slander and libel. Under this rule, the right to privacy is
  • 53. not invaded by any publication made in a court of justice, in legislative bodies, or the committees of those bodies; in municipal assemblies, or the committees of such assemblies, or practically by any communication in any other public body, municipal or parochial, or in any body quasi public, like the large voluntary associations formed for almost every purpose of benevolence, business, or other general interest; and (at least in many jurisdictions) reports of any such proceedings would in some measure be accorded a like privilege.[45] Nor would the rule prohibit any publication made by one in the discharge of some public or private duty, whether legal or moral, or in conduct of one's own affairs, in matters where his own interest is concerned.[46] 3. The law would probably not grant any redress for the invasion of privacy by oral publication in the absence of special damage. The same reasons exist for distinguishing between oral and written publications of private matters, as is afforded in the law of defamation by the restricted liability for slander as compared with the liability for libel.[47] The injury resulting from such oral communications would ordinarily be so trifling that the law might well, in the interest of free speech, disregard it altogether.[48] 4. The right to privacy ceases upon the publication of the facts by the individual, or with his consent. This is but another application of the rule which has become familiar in the law of literary and artistic property. The cases there decided establish also what should be deemed a publication, -- the important principle in this connection being that a private communication of circulation for a restricted purpose is not a publication within the meaning of the law.[49]
  • 54. 5. The truth of the matter published does not afford a defence. Obviously this branch of the law should have no concern with the truth or falsehood of the matters published. It is not for injury to the individual's character that redress or prevention is sought, but for injury to the right of privacy. For the former, the law of slander and libel provides perhaps a sufficient safeguard. The latter implies the right not merely to prevent inaccurate portrayal of private life, but to prevent its being depicted at all.[50] 6. The absence of "malice" in the publisher does not afford a defence. Personal ill-will is not an ingredient of the offence, any more than in an ordinary case of trespass to person or to property. Such malice is never necessary to be shown in an action for libel or slander at common law, except in rebuttal of some defence, e.g., http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn43 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn44 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn45 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn46 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn47 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn48 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn49 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn50
  • 55. 4/17/2017 Warren and Brandeis, "The Right to Privacy" http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr2.html 9/9 that the occasion rendered the communication privileged, or, under the statutes in this State and elsewhere, that the statement complained of was true. The invasion of the privacy that is to be protected is equally complete and equally injurious, whether the motives by which the speaker or writer was actuated are taken by themselves, culpable or not; just as the damage to character, and to some extent the tendency to provoke a breach of the peace, is equally the result of defamation without regard to motives leading to its publication. Viewed as a wrong to the individual, this rule is the same pervading the whole law of torts, by which one is held responsible for his intentional acts, even thought they care committed with no sinister intent; and viewed as a wrong to society, it is the same principle adopted in a large category of statutory offences. The remedies for an invasion of the right of privacy are also suggested by those administered in the law of defamation, and in the law of literary and artistic property, namely: -- 1. An action of tort for damages in all cases.[51] Even in the absence of special damages, substantial compensation could be allowed for injury to feelings as in the action of slander and libel. 2. An injunction, in perhaps a very limited class of cases.[52] It would doubtless be desirable that the privacy of the individual should receive the added protection of the
  • 56. criminal law, but for this, legislation would be required.[53] Perhaps it would be deemed proper to bring the criminal liability for such publication within narrower limits; but that the community has an interest in preventing such invasions of privacy, sufficiently strong to justify the introduction of such a remedy, cannot be doubted. Still, the protection of society must come mainly through a recognition of the rights of the individual. Each man is responsible for his own acts and omissions only. If he condones what he reprobates, with a weapon at hand equal to his defence, he is responsible for the results. If he resists, public opinion will rally to his support. Has he then such a weapon? It is believed that the common law provides him with one, forged in the slow fire of the centuries, and to-day fitly tempered to his hand. The common law has always recognized a man's house as his castle, impregnable, often, even to his own officers engaged in the execution of its command. Shall the courts thus close the front entrance to constituted authority, and open wide the back door to idle or prurient curiosity? Samuel D. Warren, Louis D. Brandeis. BOSTON, December, 1890. [downloaded 18 May 1996 from an internet site hosted by Stephen R. Laniel; and reformatted from a site hosted by Lawrence University, 1999] http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr
  • 57. ivacy_brand_warr_fn.html#fn51 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn52 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Pr ivacy_brand_warr_fn.html#fn53 Paper 1 Freedom, Privacy, and Technology This assignment asks you to practice making and supporting scholarly arguments. In order to do that, please answer the question: If they were alive today, how would Warren and Brandeis read our chapter from Dark Surveillance by Browne and “Privacy and Technology in the Twenty-First Century” by Rothstein? To put this more bluntly, your paper must use Warren and Brandeis, “The Right to Privacy,” Browne’s chapter from Dark Surveillance and either one of the other two texts underlined above. · Identify and understand 1-2 key concepts, ideas, or examples from those texts. Understand and articulate Warren and Brandeis’s concerns about and conceptions of privacy. This assignment is surveilling you to see if: You can create a series of arguments, supported by textual evidence, linking the concepts, concerns, laws, etc in Warren and Brandeis to those of the other texts. In other words, I am asking you to hypothesize how Warren and Brandeis might have responded to these texts. Note that you cannot actually know this since Warren and Brandeis are conveniently dead, which means that any assertion you make will be your own argument. Ask yourself: what would they have recognized, been surprised by, agreed or disagreed with in these texts? How would they have responded? Specifically, I am looking for evidence of three skills: * Ability to make plausible arguments
  • 58. * Ability to use short quotes as evidence for arguments. Quotes must be shorter than 40 words. Remember that you can use parts of sentences and even change word endings as long as the grammar of your sentence fits the grammar of the quote. Further I am looking for evidence that you can integrate quotes into your discussion, thus avoiding what Graff and Birkenstein call “hit and run quotations” in They Say / I Say: The Moves That Matter in Academic Writing. · The sophistication of your understanding of the concepts and concerns expressed in the texts. This is where your careful annotation will serve you well. · Things To Do Please begin your paper with an introductory paragraph explaining what the paper will do and which text you will be using. Use the author’s name and text title. Please use an advanced organizer that says something like “this paper will___” or “In this paper I ____” (I am fine with the use of first person voice to structure your introduction or arguments). Use signal phrases with the author’s name to introduce quotes. All quotes from the text must be thoroughly integrated (no “hit and run” quotations). Do not begin or end of paragraph with a quote or with the words “this” or “that.” Any time you begin a sentence with these words, make sure the word clearly refers back to something in the previous sentence. Start most paragraphs with an argument connecting the text to your issue. Then give evidence to support your assertion. You will want to use the conditional “would,” “might,” and “could” since we cannot really know how Warren and Brandeis would read these texts.