Skip to main content
Log in

Internet privacy, technology, and personal information

  • Original Paper
  • Published:
Ethics and Information Technology Aims and scope Submit manuscript

Abstract

Computer programs are used to obtain and store information about the online activities of users of the web. Many people are concerned about this practice because they believe that it can violate users' rights to privacy or result in violations of them. This belief is based on the assumption that the information obtained and stored with the use of the programs includes personal information. My main aim in this paper is to argue that this assumption is false. I discuss the import of this result for computer ethics. If my thesis is correct, using the programs cannot violate a person's right to privacy and cannot result in violations of a right to privacy. Nevertheless it is prima facie morally wrong because, as I explain, it encourages people to perform actions that diminish the well-being of others. I discuss the implications of my thesis for the obligations of online businesses with regard to the relevant information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. I assume that obtaining information can violate a person’s right to privacy only if the information is personal information–information about a particular person. Judith Jarvis Thomson contends that this assumption is false (1975, p. 307). In support of her position, she describes a case in which a man a is making puff pastry in his kitchen at midnight and another person b spies on a to find out how to make puff pastry. b violates a’s right to privacy.

    How is this case supposed to show that personal information is not required for a violation of the right to privacy? Thomson’s reasoning is presumably this: how to make puff pastry is not personal information. It is not about a particular person. It is impersonal information. If b’s obtaining this information or b’s obtaining it by spying on a violates a’s right to privacy, then the violation does not require that the information be personal information.

    Thomson’s reasoning is mistaken. She does not consider the possibility that how to make puff pastry is not the only information b obtains when he spies on a. b also obtains certain personal information. The personal information is how a makes puff pastry. It could be that b’s obtaining the personal information is what violates a’s right to privacy. Moreover, it could be held that in this case, b’s acquiring information about how a makes puff pastry is necessary for his acquiring the information about how to make puff pastry. For the way in which b obtains the impersonal information—how to make puff pastry—is by obtaining personal information about a—how a makes puff pastry. b obtains this personal information by seeing a and a’s actions. b obtains information about how to make puff pastry by abstracting a’s actions from a—by thinking of them as actions that anyone could perform.

  2. Whenever I say that a singular term refers to or denotes an object, I mean that it refers to or denotes an object relative to a context of use. If the relativization to a context is not explicitly mentioned, it should be understood.

    ‘Denoting’ applies to a relation between a definite description and an object. A definite description denotes an object relative to a context of use if and only if the object is the only one that has the property or properties specified in the description. ‘Referring’ applies to a relation between a singular term and an object. A singular term refers to an object relative to a context of use if and only if it simply designates the object.

    A singular term just is an expression that can be used to denote or refer to an object. Some examples of singular terms are proper names, indexicals, and definite descriptions.

  3. My explanation of the visual identification of an object was suggested by Dretske’s definition of ‘nonepistemic seeing’ in 1969 (p. 20).

  4. By ‘a signal’, Dretske means an event, condition, or state of affairs (p. 43).

  5. By ‘the user’, I mean the person who uses the website, the person who engages in the online activity. I do not mean the entity that uses the computer program. I will refer to that entity as ‘the business’ even though it does not have to be a business. It can be an organization or an institution.

  6. This example is the result of modifying one that Donnellan gives in (1966).

  7. Social Security is a US government program that pays benefits to retirees, survivors of deceased workers, and disabled persons. A Social Security number is a number that the government assigns to each US citizen and to some others. The Social Security number that is assigned to a person is supposed to be unique to him. The government uses the number to identify him in collecting Social Security taxes and paying benefits. The fact that it uses the number in this way does not, of course, mean that the account record contains personal information.

  8. Some laws of nature, for example, Kepler’s laws of planetary motion, do not look like generalized conditionals. But they can be construed as such. Take Kepler’s laws, which ostensibly refer to the sun. They can be re-expressed as generalized conditionals and interpreted as being about any object that has a certain property, the property being one that the sun has.

  9. ‘/’ here has the same use as a corner in Cohen and Meskin’s definition.

  10. Staples is a business that sells office supplies.

  11. Target is business that sells a wide variety of items at low prices.

  12. (B1) is latent in the privacy policies of many businesses, organizations, and institutions.

  13. There are good reasons to think that (B2) is widely held. Article 13 of the GDPR (2016) implies (B2). Privacy policies of businesses typically make a point of telling users how the information will be used. In addition, the laws of some states require that businesses fulfill the (B2) obligation. See “State Laws Related to Internet Privacy” (2018).

  14. This belief is implied by Article 6 of the GDPR (2016). The GDPR allows for certain exceptions to its consent requirement. This is consistent with the fact that the obligations in (B1)–(B5) are prima facie obligations.

  15. This belief is expressed in the GDPR (2016), recital 39.

  16. This belief is expressed in the GDPR (2016), recital 39.

  17. The point just made in the text is about a business, not the owner of the business. Everyone agrees that the owner of a business does not have to tell the business’s customers how he will use their payments because he has a right to privacy. What is at issue is the business’s obligation to its customers. The business does not have a right to privacy.

    The garage might be owned by a big corporation that sells shares to the public. Such an entity has an obligation to make known to the public how it uses its revenue. This does not show that it has an obligation to make known to its customers how it uses its revenue. The information about use of its revenue should be made known to the public so that people contemplating investing in the company can make an informed decision. They must have the information because if they buy shares, they will become part owners of the company, who by virtue of that relation to it will have a say in how it is run.

  18. A PAC is a political action committee. It is an organization that collects contributed money and uses it to support a candidate or a particular position on a political issue.

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marjorie S. Price.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Price, M.S. Internet privacy, technology, and personal information. Ethics Inf Technol 22, 163–173 (2020). https://doi.org/10.1007/s10676-019-09525-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10676-019-09525-y

Keywords

Navigation