You are on page 1of 7

With the advent of technology and the widespread use of the internet since

1948, when the Universal Declaration of Human Rights was signed, the idea
of privacy has become increasingly complicated. In particular, people's right to
privacy and other fundamental rights are threatened by the unchecked use of
technologies that might collect personal information about them without their
knowledge or consent. The right to privacy is also ensured by safeguarding
the gathering, storing, and transfer of users' personal data against data
breaches.

Tavani (2007a, 2008) lists four


views of privacy. Accessibility
privacy, also called physical priva-
cy, is freedom from intrusion into
one’s physical space. Decisional
privacy is freedom from inter-
ference with one’s choices.
Psychological privacy, also known
as mental privacy, is the freedom
of intrusion upon and interference
with one’s thoughts and personal
identity. Finally, informa-
tional privacy is having control
over and being able to limit access
to one’s personal information.
It is this view that is most relevant
in the context of this article and we
continue by examining
theories relevant to our discussion
Tavani (2007a, 2008) lists four
views of privacy. Accessibility
privacy, also called physical priva-
cy, is freedom from intrusion into
one’s physical space. Decisional
privacy is freedom from inter-
ference with one’s choices.
Psychological privacy, also known
as mental privacy, is the freedom
of intrusion upon and interference
with one’s thoughts and personal
identity. Finally, informa-
tional privacy is having control
over and being able to limit access
to one’s personal information.
It is this view that is most relevant
in the context of this article and we
continue by examining
theories relevant to our discussion
Tavani (2007a, 2008) lists four
views of privacy. Accessibility
privacy, also called physical priva-
cy, is freedom from intrusion into
one’s physical space. Decisional
privacy is freedom from inter-
ference with one’s choices.
Psychological privacy, also known
as mental privacy, is the freedom
of intrusion upon and interference
with one’s thoughts and personal
identity. Finally, informa-
tional privacy is having control
over and being able to limit access
to one’s personal information.
It is this view that is most relevant
in the context of this article and we
continue by examining
theories relevant to our discussion
Tavani (2007a, 2008) lists four
views of privacy. Accessibility
privacy, also called physical priva-
cy, is freedom from intrusion into
one’s physical space. Decisional
privacy is freedom from inter-
ference with one’s choices.
Psychological privacy, also known
as mental privacy, is the freedom
of intrusion upon and interference
with one’s thoughts and personal
identity. Finally, informa-
tional privacy is having control
over and being able to limit access
to one’s personal information.
It is this view that is most relevant
in the context of this article and we
continue by examining
theories relevant to our discussion.
Tavani (2007a, 2008) enumerates four privacy perspectives. Physical privacy, or accessibility privacy, is
the absence of interference in one's personal area. Freedom from interference with one's decisions is
known as decisional privacy. Psychological privacy, sometimes referred to as mental privacy, is the
absence of outside influence and intrusion into one's inner identity and ideas. Having control over and
the ability to restrict access to one's personal information is the final aspect of informational privacy. We
proceed by looking at theories that are pertinent to our discussion because this point of view is the most
pertinent in the context of this article.

FLoridi (2005) examines two theories of informational privacy: the ownership-based interpretation and
the reductionist interpretation. The reductionist approach holds that informational privacy is important
because it protects against unfavorable outcomes that could result from a privacy breach. According to
the ownership-based approach, every individual is the owner of their personal data.

The RALC theory stresses that privacy and control are separate concepts. According to Tavani and Moor
(2001), “Privacy is fundamentally about protection from intrusion and information gathering by others.

“Republic Act 1073 Data Privacy Act of 2012”.

The state's policy is to uphold the fundamental human rights of communication and privacy
while allowing unrestricted information flow to spur development and innovation. The State
acknowledges the intrinsic responsibility it has to guarantee the security and protection of
personal data in information and communications systems used by the public and commercial
sectors, as well as the critical role that technology plays in fostering national identity.

Sensitive personal information refers to personal information:

About an individual’s race, ethnic origin, marital status, age, color, and religious, philosophical
or political affiliations.

Republic Act 1073 Data Privacy 2012 aims to protect the privacy of personal
information in both the government and private sectors. It defines the rights of data
subjects, the obligations of data controllers and processors, and the penalties for
violations

Data protection laws for personal information (PII) are becoming more stringent, making it more difficult
to manage, especially as more countries adopt online privacy and data protection safeguards.

Top Ten Laws That Protect Personal Information – The BlackWell Firm

The right of privacy has evolved to protect the ability of individuals to determine
what sort of information about themselves is collected, and how that information is
used, as well as forms, to collect information from visitors such as name, address,
email, demographic info, social security number, IP address, and financial
information. The Privacy Act of 1974 (5 U.S.C. § 552a) protects personal
information held by the federal government by preventing unauthorized disclosures
of such information. Individuals also have the right to review such information,
request corrections, and be informed of any disclosures. The Freedom of
Information Act facilitates these processes.

The Gramm-Leach Bliley Act (also known as the Financial Modernization Act of
1999) establishes guidelines for the protection of personal financial information.
Financial institutions are required by law (15 U.S.C. § 6803) to provide a privacy
policy to customers, which explains what kinds of information are being collected
and how that information is used. Such institutions are further required to develop
safeguards in order to protect the information they collect from customers.

personal information | Wex | US Law | LII / Legal Information Institute (cornell.edu)

You might also like