Overview
Lecture 1 introduces the origins and definitions of privacy in U.S. law and society, tracing constitutional inferences and foundational scholarship.
Constitutional Foundations of Privacy
- The Constitution lacks the word “privacy” but courts infer it from the Bill of Rights.
- First Amendment: protects anonymous speech and associational privacy.
- Third Amendment: safeguards home privacy against quartering soldiers in peacetime.
- Fourth Amendment: prohibits unreasonable searches and seizures by government.
- These provisions collectively ground modern privacy doctrines.
Historical Origins and Key Scholarship
- 1890 Harvard Law Review article by Samuel Warren and Louis Brandeis spotlighted privacy.
- Written amid sensationalist “yellow journalism” targeting social elites.
- Warren reportedly faced intrusive coverage of lavish dinner parties.
- Warren and Brandeis articulated privacy as “the right to be left alone.”
Core Privacy Rights and Formulations
- Right of solitude: insulation from others; protects physical, emotional, mental domains; harms can exceed bodily injuries.
- Right of intimacy: control access to intimate relationships and information; covers home life, loved ones, medical data.
- Right of secrecy: ability to conceal non-intimate information; value in nondisclosure (e.g., memberships, videos watched).
- Right to limit access to the self: shield against unwanted access; underlies concerns with geolocation tracking.
- Right to control information about oneself: decide what personal data is shared; central to data mining and internet tracking debates.
- Right of anonymity: speak and associate without identification; linked to First Amendment; relates to opaque usernames and fake profiles.
Contemporary Context and Debates
- Internet, mobile devices, and social media drive data sharing and surveillance.
- Consumer profiling, pervasive surveillance, big data, and biometrics enable large-scale data collection and sale.
- Competing narratives: “privacy is dead” vs. “privacy persists but is reshaped.”
- Anticipated battles between privacy and transparency across boardrooms, legislatures, and courts.
Summary Table of Privacy Formulations
| Formulation | Core Idea | Examples/Implications |
|---|
| Right of solitude | Be left alone; protect mental/emotional realm | Prevent trespass causing non-bodily harms |
| Right of intimacy | Limit access to intimate relations/info | Home activities, loved ones, medical information |
| Right of secrecy | Conceal certain non-intimate facts | Organizational membership, videos watched |
| Limit access to self | Shield against unwanted access | Geolocation tracking concerns |
| Control personal information | Decide what data is shared | Data mining, internet activity tracking |
| Right of anonymity | Speak/associate without identification | Opaque usernames, fake profile usage |
Legal Analytical Framework
- Central question: does a person have a “reasonable expectation of privacy” in the circumstances?
- This test anchors modern privacy analysis; further detail follows in the next lecture.
Key Terms & Definitions
- Right to be left alone: classic definition of privacy from Warren and Brandeis.
- Yellow journalism: sensationalist press focusing on lurid details about public figures.
- Reasonable expectation of privacy: legal standard assessing privacy claims under specific contexts.
Action Items / Next Steps
- Study the “reasonable expectation of privacy” test in upcoming video.
- Track evolving debates on privacy vs. transparency in legal and policy arenas.