Computer Ethics

Privacy and Surveillance

Christopher L. Holland

Saint Louis University

November 7, 2024

Some Concerns

Big Data, Big Money

Location firm Near describes itself as “The World’s Largest Dataset of People’s Behavior in the Real-World,” with data representing “1.6B people across 44 countries.” Mobilewalla boasts “40+ Countries, 1.9B+ Devices, 50B Mobile Signals Daily, 5+ Years of Data.” X-Mode’s website claims its data covers “25%+ of the Adult U.S. population monthly”

   — Keegan and Ng (2021)

Political Power

Google sent political messages to small businesses registered on Google maps against Anti-trust legislation (Amadeo 2021).

*Privacy Not Included

Mozzilla’s Privacy Centered Product Review Blog
https://foundation.mozilla.org/en/privacynotincluded/

Privacy

Control and Access

Access alone

Privacy is the condition in which others are deprived of access to you.

   — Jeffery Reiman (1995, 30)

Control and Access

Access and control

Seen from the perspective of ethics, we should not focus on access per se, but on the question of how access is gained, and to what one is gaining access.

   — Marijn Sax (2018)

Three Dimensions of Privacy

 

Local
control over access to physical spaces or areas
Informational (tort)
control over what other people can know about you
Decisional (constitutional)
control over our personal decisional sphere

The Value of Privacy

  • Value for individuals
  • Value for society

Value for individuals

  • constitutive of personal liberty and autonomy
  • precondition for the possibility of friendship and love (Fried)
  • closely related to dignity—respect for privacy expresses respect for personhood
  • closely related to political freedom
    • “public/private distinction is central to liberalism, since it rules our private space (which can be defined somewhat differently by different authors) as off-limits to the state.”

Value for society

  • privacy norms regulate appropriate information disclosure (doctor, close friend, co-worker)
  • precondition for properly functioning democracy

Sources

Amadeo, Ron. 2021. “Google Sends Anti-Regulation Propaganda to Small Businesses Using Google Maps.” Ars Technica. November 9, 2021. https://arstechnica.com/gadgets/2021/11/google-sends-anti-regulation-propaganda-to-small-businesses-using-google-maps/.
Hoven, Jeroen van den, Martijn Blaauw, Wolter Pieters, and Martijn Warnier. 2024. “Privacy and Information Technology.” In The Stanford Encyclopedia of Philosophy, edited by Edward N. Zalta and Uri Nodelman, Winter 2024. Metaphysics Research Lab, Stanford University. https://plato.stanford.edu/archives/win2024/entries/it-privacy/.
Keegan, Jon, and Alfred Ng. 2021. “There’s a Multibillion-Dollar Market for Your Phone’s Location Data.” The Markup. September 30, 2021. https://themarkup.org/privacy/2021/09/30/theres-a-multibillion-dollar-market-for-your-phones-location-data.
Reiman, Jeffrey. 1995. “Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Highway Technology of the Future.” Santa Clara High Technology Law Journal 11 (1): 27. https://digitalcommons.law.scu.edu/chtlj/vol11/iss1/5.
Sax, Marijn. 2018. “Privacy from an Ethical Perspective.” In The Handbook of Privacy Studies: An Interdisciplinary Introduction, edited by B Van der Sloot and A De Groot, 143–73. Amsterdam: Amsterdam University Press.
Schuppe, Jon. 2022. “Cellphone Dragnet Used to Find Bank Robbery Suspect Was Unconstitutional, Judge Says.” NBC News. March 7, 2022. https://www.nbcnews.com/news/us-news/geofence-warrants-help-police-find-suspects-using-google-ruling-could-n1291098.