253
DANIEL J. SOLOVE is the John Marshall Harlan Research Professor of Law at the George Washington University Law School. In addition to writing numerous books and articles on issues of privacy and the Internet, Solove is the founder of a company that provides privacy and data security training to corporations and universities. Among his books are The Future of Reputation: Gossip, Rumor, and Privacy on the Internet (2007), which won Fordham University’s McGannon Award for Social and Ethical Relevance in Communications Policy Research; Nothing to Hide: The False Tradeoff between Privacy and Security (2011); and Privacy Law Fundamentals (with Paul M. Schwartz, 2013).
An earlier and longer version of this essay in a law review journal included citations that had to be eliminated for publication in the Chronicle of Higher Education in 2011, but we have restored them so that you can see how Solove uses a variety of sources to support his position.
As you read, consider the following:
How do the sources cited in the opening paragraphs contribute to your understanding of why many people think privacy is not something they should be concerned about?
Do you use Internet privacy settings? How concerned are you about protecting your privacy on social networking and other Web sites?
1
W hen the government gathers or analyzes personal information, many people say they’re not worried. “I’ve got nothing to hide,” they declare. “Only if you’re doing something wrong should you worry, and then you don’t deserve to keep it private.” The nothing-
2
The nothing-
3
On the surface, it seems easy to dismiss the nothing-
254
4
But such responses attack the nothing-
The problem with the nothing-
5
Most attempts to understand privacy do so by attempting to locate its essence — its core characteristics or the common denominator that links together the various things we classify under the rubric of “privacy.” Privacy, however, is too complex a concept to be reduced to a singular essence. It is a plurality of different things that do not share any one element but nevertheless bear a resemblance to one another. For example, privacy can be invaded by the disclosure of your deepest secrets. It might also be invaded if you’re watched by a peeping Tom, even if no secrets are ever revealed. With the disclosure of secrets, the harm is that your concealed information is spread to others. With the peeping Tom, the harm is that you’re being watched. You’d probably find that creepy regardless of whether the peeper finds out anything sensitive or discloses any information to others. There are many other forms of invasion of privacy, such as blackmail and the improper use of your personal data. Your privacy can also be invaded if the government compiles an extensive dossier about you. Privacy, in other words, involves so many things that it is impossible to reduce them all to one simple idea. And we need not do so. . . .
6
To describe the problems created by the collection and use of personal data, many commentators use a metaphor based on George Orwell’s Nineteen Eighty-
7
Another metaphor better captures the problems: Franz Kafka’s The Trial. Kafka’s novel centers around a man who is arrested but not informed why. He desperately tries to find out what triggered his arrest and what’s in store for him. He finds out that a mysterious court system has a dossier on him and is investigating him, but he’s unable to learn much more. The Trial depicts a bureaucracy with inscrutable purposes that uses people’s information to make important decisions about them, yet denies the people the ability to participate in how their information is used.
8
The problems portrayed by the Kafkaesque metaphor are of a different sort than the problems caused by surveillance. They often do not result in inhibition. Instead they are problems of information processing — the storage, use, or analysis of data — rather than of information collection. They affect the power relationships between people and the institutions of the modern state. They not only frustrate the individual by creating a sense of helplessness and powerlessness, but also affect social structure by altering the kind of relationships people have with the institutions that make important decisions about their lives.
9
Legal and policy solutions focus too much on the problems under the Orwellian metaphor — those of surveillance — and aren’t adequately addressing the Kafkaesque problems — those of information processing. The difficulty is that commentators are trying to conceive of the problems caused by databases in terms of surveillance when, in fact, those problems are different. Commentators often attempt to refute the nothing-
255
10
The deeper problem with the nothing-
11
One such harm, for example, which I call aggregation, emerges from the fusion of small bits of seemingly innocuous data. When combined, the information becomes much more telling. By joining pieces of information we might not take pains to guard, the government can glean information about us that we might indeed wish to conceal. For example, suppose you bought a book about cancer. This purchase isn’t very revealing on its own, for it indicates just an interest in the disease. Suppose you bought a wig. The purchase of a wig, by itself, could be for a number of reasons. But combine those two pieces of information, and now the inference can be made that you have cancer and are undergoing chemotherapy. That might be a fact you wouldn’t mind sharing, but you’d certainly want to have the choice.
12
Another potential problem with the government’s harvest of personal data is one I call exclusion. Exclusion occurs when people are prevented from having knowledge about how information about them is being used, and when they are barred from accessing and correcting errors in that data. Many government national-
13
A related problem involves secondary use. Secondary use is the exploitation of data obtained for one purpose for an unrelated purpose without the subject’s consent. How long will personal data be stored? How will the information be used? What could it be used for in the future? The potential uses of any piece of personal information are vast. Without limits on or accountability for how that information is used, it is hard for people to assess the dangers of the data’s being in the government’s control.
14
Yet another problem with government gathering and use of personal data is distortion. Although personal information can reveal quite a lot about people’s personalities and activities, it often fails to reflect the whole person. It can paint a distorted picture, especially since records are reductive — they often capture information in a standardized format with many details omitted. For example, suppose government officials learn that a person has bought a number of books on how to manufacture methamphetamine. That information makes them suspect that he’s building a meth lab. What is missing from the records is the full story: The person is writing a novel about a character who makes meth. When he bought the books, he didn’t consider how suspicious the purchase might appear to government officials, and his records didn’t reveal the reason for the purchases. Should he have to worry about government scrutiny of all his purchases and actions? Should he have to be concerned that he’ll wind up on a suspicious-
256
Privacy is rarely lost in one fell swoop. It is usually eroded over time, little bits dissolving almost imperceptibly until we finally begin to notice how much is gone.
15
Privacy is rarely lost in one fell swoop. It is usually eroded over time, little bits dissolving almost imperceptibly until we finally begin to notice how much is gone. When the government starts monitoring the phone numbers people call, many may shrug their shoulders and say, “Ah, it’s just numbers, that’s all.” Then the government might start monitoring some phone calls. “It’s just a few phone calls, nothing more.” The government might install more video cameras in public places. “So what? Some more cameras watching in a few more places. No big deal.” The increase in cameras might lead to a more elaborate network of video surveillance. Satellite surveillance might be added to help track people’s movements. The government might start analyzing people’s bank records. “It’s just my deposits and some of the bills I pay — no problem.” The government may then start combing through credit-
16
“My life’s an open book,” people might say. “I’ve got nothing to hide.” But now the government has large dossiers of everyone’s activities, interests, reading habits, finances, and health. What if the government leaks the information to the public? What if the government mistakenly determines that based on your pattern of activities, you’re likely to engage in a criminal act? What if it denies you the right to fly? What if the government thinks your financial transactions look odd — even if you’ve done nothing wrong — and freezes your accounts? What if the government doesn’t protect your information with adequate security, and an identity thief obtains it and uses it to defraud you? Even if you have nothing to hide, the government can cause you a lot of harm. . . .
Works Cited
Andrew. Comment on “Is There a Good Response to the ‘Nothing to Hide’ Argument?” by Daniel Solove. Concurring Opinions, 16 Oct. 2006, concurringopinions.com/
Oakey, Carrie. “Look All You Want! I’ve Got Nothing to Hide!” Reach for the Stars!, 14 May 2006, greatcarrieoakey.blogspot.com/
Rosen, Jeffrey. The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age. Random House, 2004.
Schneier, Bruce. “The Eternal Value of Privacy.” Wired, Condé Nast, 18 May 2006, archive.wired.com/
Solzhenitsyn, Aleksandr. Cancer Ward. Translated by Nicholas Bethell and David Burg, Farrar, Straus and Giroux, 1969.
Stone, Geoffrey R. “Freedom and Public Responsibility.” Chicago Tribune, 21 May 2006, p. 11.
[REFLECT]
Make connections: Privacy concerns on the Internet.
Whereas Solove’s position argument focuses on concerns about government collection and use of personal information, many people today are concerned as well about corporate collection and use of personal information. For example, potential employers review blogs and social media Web sites to gather information about job candidates and to check their résumés. Corporations also use data mining to personalize advertising, sending diaper coupons, for example, to women in their thirties who have recently bought diaper bags or baby monitors online.
257
Think about the implications of corporate data mining, and reflect on how this could affect your own sense of online privacy. Your instructor may ask you to post your thoughts on a class discussion board or to discuss them with other students in class. Use these questions to get started:
How, if at all, do you manage the privacy preferences or settings on sites you use? Do you ever de-
What are the advantages and disadvantages of corporate data mining? Have targeted advertisements been a boon to you, or are you distressed about a corporation’s knowing so much about you?
[ANALYZE]
Use the basic features.
A FOCUSED, WELL-
Writers sometimes have to remind their readers why an issue is controversial. Beginning with the title, Solove works to undermine the widely held assumption that the erosion of privacy should not be a concern. He does this primarily by contrasting two different ways of thinking about threats to privacy, which he calls Orwellian and Kafkaesque, based on the novels Nineteen Eighty-
Not_____, but_____.
_____ focus on_____, which is characterized by_____, and they don’t even notice_____, which is characterized by_____.
Here are a couple of examples from Solove’s position argument:
The problems are not just Orwellian but Kafkaesque. (par. 10)
Legal and policy solutions focus too much on the problems under the Orwellian metaphor — those of surveillance — and aren’t adequately addressing the Kafkaesque problems — those of information processing. (par. 9)
Write a paragraph analyzing and evaluating the effectiveness of Solove’s use of contrast to reframe the issue for readers in “Why Privacy Matters:
Reread paragraphs 6–7 to see how Solove explains the two contrasting metaphors.
Then skim paragraphs 8–10, highlighting any sentence patterns used to mark the contrast.
Has Solove’s reframing of the discussion affected your understanding of privacy and your concerns about its loss? Why or why not?
258
A WELL-
To learn more about using patterns of opposition to read critically, see Chapter 12.
Writers of position arguments often quote, paraphrase, and summarize sources. Usually, they use sources to support their positions, as Jessica Statsky does in her argument about children’s sports. Sometimes, however, they use sources to highlight opposing positions to which they will respond, as Solove does on occasion in this essay.
In the following example, Solove signals his opinion through the words he chooses to characterize the source:
As the computer-
Elsewhere, readers have to work a little harder to determine how Solove is using the source.
Solove also uses what we might call hypothetical quotations— sentences that quote not what someone actually said but what they might have said:
Signal phrase
Hypothetical quotation
Many people say they’re not worried. “I’ve got nothing to hide,” they declare. “Only if you’re doing something wrong should you worry, and then you don’t deserve to keep it private.” (par. 1)
“My life’s an open book,” people might say. “I’ve got nothing to hide.” (par. 16)
You can tell from a signal phrase like “people might say” or “many people say” that no actual person made the statement, but Solove does not always supply such cues.
Write a paragraph analyzing and evaluating Solove’s use of quotations in “Why Privacy Matters”:
Find and mark the quotations, noting which actually quote someone and which are hypothetical.
Identify the quotations—
How effective did you find Solove’s quoting strategy, given his purpose and audience? (Remember that this article appeared in the Chronicle of Higher Education, a weekly newspaper for college faculty and administrators.)
AN EFFECTIVE RESPONSE: REFUTING BY DEMONSTRATING THE EFFECTS
As his title suggests, Solove refutes the claim that privacy does not matter “if you have ‘nothing to hide.’” His primary way of refuting the nothing-
259
Write a paragraph or two analyzing and evaluating Solove’s use of cause and effect reasoning to refute the claim that privacy only matters if you have something to hide:
Reread paragraphs 6–14, noting where Solove discusses potential problems or harms that could result from the collection of personal data.
Choose one of these harms, and examine Solove’s argument more closely. How does he support this part of the argument — for example, what are his reasons, his evidence, the values and beliefs he uses to appeal to his audience?
How effective are Solove’s reasons and evidence for you? How effective might they have been for his original audience?
A CLEAR, LOGICAL ORGANIZATION: USING CUEING DEVICES
Solove uses a number of cueing devices to help readers keep track of his argument. Perhaps the most obvious and helpful cues are the topic sentences that begin each paragraph and the logical transitions (“One such harm . . . ,” “Another potential problem . . . ,” “A related problem . . . ,” “Yet another problem . . .” [pars. 11–14]) that signal connections between and within paragraphs. In addition, Solove uses rhetorical questions, such as the series of “What if” questions in the final paragraph.
Write a paragraph or two analyzing and evaluating the effectiveness of Solove’s use of cueing devices to help readers follow his argument:
Choose a couple of paragraphs that seem to you to use topic sentences and logical transitions effectively. Look closely at the way Solove uses these cueing devices, and determine what makes them so effective.
Highlight the rhetorical questions posed in paragraphs 12–14 and 16. Why do you imagine Solove uses so many of them, especially in the final paragraph? Given his purpose and audience, how effective do you think these rhetorical questions were likely to have been? How effective do you find them?
[RESPOND]
Consider possible topics: Issues concerning privacy.
Solove focuses on one concern about the erosion of privacy. You could write a similar type of essay, taking a position on issues such as state laws requiring women to have ultrasounds before terminating a pregnancy; airport security requiring passengers either to go through a full-