Privacy as Trust: Sharing Personal Information in a Networked World
72 Pages Posted: 14 Aug 2013 Last revised: 9 Mar 2016
Date Written: March 1, 2014
This Article is the first in a series on the legal and sociological aspects of privacy, arguing that private contexts are defined by relationships of trust among individuals. The argument reorients privacy scholarship from an individual right to social relationships of disclosure. This has implications for a wide variety of vexing problems of modern privacy law, from limited disclosures to “revenge porn.” The common everyday understanding is that privacy is about choice, autonomy, and individual freedom. It encompasses the individual’s right to determine what he will keep hidden and what, how, and when he will disclose to the public. Privacy is his respite from the prying, conformist eyes of the rest of the world and his expectation that the things about himself that he wants to keep private will remain so. These ways of understanding privacy are variations on the same theme: that privacy is a tool of the individual “against the world.” None of them adequately protect personal privacy where sharing personal information with others is a precondition of modern life. This Article argues that privacy is really about trust. Rather than accept the traditional division between public and private, and rather than begin and end the discussion of privacy as an individual right, this Article bridges social science and the law to argue that disclosures in contexts of trust are private. Trusting relationships are determined by the presence of experience, strong overlapping networks, identity sharing, and other indicia derived from the totality of the circumstances. This conceptualization of privacy, and its related ways of defining when invasions of privacy occur, more effectively protects privacy in a modern digital world.
Keywords: Privacy, Internet, Liberalism, Sociology, Social Networks, Limited Privacy, Third Party Doctrine, Theory, Quantitative Evidence, Social Science, Torts, Intrusion
Suggested Citation: Suggested Citation