text
stringlengths 0
118
|
---|
by civilized men.”360
|
It is particularly interesting that the Court invoked “the right to be
|
let alone,” which was W arren and Brandeis’s principle justifying the
|
privacy torts. The criminalization of the private possession of obscene
|
material, the Court’s reasoning suggests, necessitates governmental in
|
trusion into one’s home. T he Supreme Court noted that people have
|
“the right to be free from state inquiry into the contents of [their] li
|
brary.” Linking decisional interference with intrusion, it stressed that
|
“a State has no business telling a man, sitting alone in his own house,
|
what books he may read or what films he may watch.”361 Further cap
|
turing the relationship between the two categories, Robert Post con
|
tends that the intrusion tort protects “territories of the self,” which are
|
critical to remaining “an independent and autonomous person.”362
|
In Lawrence v. Texas, the Court further demonstrated the frequent
|
overlap between decisional interference and intrusion in striking down
|
a law that prohibited consensual homosexual sodomy. T he Court rea
|
soned that “adults may choose to enter upon this relationship in the
|
confines of their homes and their own private lives and still retain their
|
dignity as free persons.” The statute was unconstitutional because of
|
“its [unjustified] intrusion into the personal and private life of the indi
|
vidual.” Moreover, the C ourt stated:
|
Liberty protects the person from unwarranted government intru
|
sions into a dwelling or other private places. In our tradition the
|
State is not omnipresent in the home. And there are other spheres
|
of our lives and existence, outside the home, where the State
|
should not be a dominant presence. Freedom extends beyond spa
|
tial bounds.363
|
The Court thus linked decisional interference to intrusion.
|
Decisional interference also bears an indirect resemblance to black
|
mail in that laws restricting consensual private sexual behavior often
|
170
|
A T a
|
x
|
o
|
n
|
o
|
m y o f P
|
r i v a c y
|
give rise to blackmail. The Lawrence Court noted that in 1955, when
|
crafting the Model Penal Code, the American Law Institute recom
|
mended against criminalizing “consensual sexual relations conducted
|
in private” in part because “the statutes regulated private conduct not
|
harmful to others,” and because “the laws were arbitrarily enforced and
|
thus invited the danger of blackmail.”364 Indeed, as Angus McLaren re
|
counts, blackmail historically occurred in the shadow of laws that pun
|
ished consensual sexual activities in private.365
|
Privacy: A New Understanding
|
For quite a long time, the concept of privacy has been a source of cha
|
grin. Despite the profound importance and increasing prevalence of pri
|
vacy issues, efforts to conceptualize privacy have been plagued by a curse
|
of difficulties. Attempts to locate a common denominator for the mani
|
fold things that constitute privacy have proven unsatisfying. Concep
|
tions that attempt to locate the core or essence of privacy have been too
|
broad or too narrow. Despite many good insights, the philosophical
|
discourse about privacy has left a sense of emptiness and dissatisfaction.
|
Yet we need to conceptualize privacy because it affects the way we
|
craft legal solutions to particular problems. Even if we eschew attempts
|
to conceptualize privacy, we are relying in part on implicit understand
|
ings of privacy whenever we discuss it. Judges, legislators, policy
|
makers, and commentators all have some notion of privacy in mind
|
when they address privacy issues. T he way we conceptualize privacy is
|
of paramount importance for the information age because we are beset
|
with a number of complex privacy problems that cause great disruption
|
to numerous important activities of high social value.
|
Therefore, I have proposed a new way to conceptualize privacy.
|
Under my conception, we should understand privacy as a set of protec
|
tions against a plurality of distinct but related problems. These problems
|
are not related by a common denominator or core element. Instead,
|
each problem has elements in common with others, yet not necessarily
|
172
|
P
|
r
|
i v
|
a
|
c
|
y : A N
|
e w U
|
n
|
d
|
e
|
r
|
s
|
t
|
a
|
n
|
d
|
i n
|
g
|
the same element—they share family resemblances with each other.
|
W e label the whole cluster “privacy,” but this term is useful primarily
|
as a shorthand way of describing the cluster. Beyond that, it is more
|
fruitful to discuss and analyze each type of problem specifically.
|
I am not arguing that we must always avoid referring to privacy in
|
the abstract; sometimes it is more efficient to do so. Rather, such ab
|
stract references to privacy often fail to be useful when we need to con
|
ceptualize privacy to solve legal and policy' problems. By shifting the
|
focus to a plurality of related problems, we can better understand what
|
is at stake in particular situations. We can better recognize each situa
|
tion for what it is rather than conflating it with other situations.
|
I proposed a framework of four general types of privacy problems
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.