You are on page 1of 18

Dædalus

Dædalus
coming up in Dædalus:

On the American Denis Donoghue, Rolena Adorno, Gish Jen, E. L. Doctorow, David
Narrative Levering Lewis, Jay Parini, Michael Wood, William Chafe, Philip
Fisher, Craig Calhoun, Larry Tribe, Peter Brooks, David A. Hollinger,
William Ferris, Linda Kerber, and others Journal of the American Academy of Arts & Sciences
Fall 2011
The Alternative Robert Fri, Stephen Ansolabehere, Steven Koonin, Michael Graetz,
Energy Future Pamela Matson & Rosina Bierbaum, Mohamed El Ashry, James

Fall 2011: Protecting the Internet as a Public Commons


Sweeney, Ernest Moniz, Daniel Schrag, Michael Greenstone, Jon
Krosnick, Naomi Oreskes, Kelly Sims Gallagher, Thomas Dietz, Protecting David D. Clark Introduction 5
Paul Stern & Elke Weber, Roger Kasperson & Bonnie Ram, Robert the Internet John B. Horrigan Being Disconnected in a Broadband-
Stavins, Michael Dworkin, Holly Doremus & Michael Hanemann, as a Public Connected World 17
Ann Carlson, Robert Keohane & David Victor, and others
Commons Helen Nissenbaum A Contextual Approach to Privacy Online 32
Coye Cheshire Online Trust, Trustworthiness,
Science in the 21st Jerrold Meinwald, May Berenbaum, Jim Bell, Shri Kulkarni, Paul or Assurance? 49
Century McEuen, Daniel Nocera, Terence Tao, M. Christina White, Bonnie Vinton G. Cerf Safety in Cyberspace 59
Bassler, Neil Shubin, Joseph DeRisi, Gregory Petsko, G. David Deirdre K. Mulligan Doctrine for Cybersecurity 70
Tilman, Chris Somerville, and others & Fred B. Schneider
L. Jean Camp Reconceptualizing the Role
Public Opinion Lee Epstein, Jamie Druckman, Robert Erikson, Linda Greenhouse, of Security User 93
Diana Mutz, Kevin Quinn & Jim Greiner, Gary Segura, Jim Stimson, R. Kelly Garrett Resisting Political Fragmentation
Kathy Cramer Walsh, and others & Paul Resnick on the Internet 108
Kay Lehman Schlozman, Who Speaks? Citizen Political Voice
Sidney Verba on the Internet Commons 121
plus The Common Good, Immigration & the Future of America &c.
& Henry E. Brady
Lee Sproull Prosocial Behavior on the Net 140
Yochai Benkler WikiLeaks and the protect-ip Act:
A New Public-Private Threat to the
e

Internet Commons 154


ur
ut
eF

poetry Michael Longley Puff-Ball, Notebook, Firewood


th
ng

& Tongue Orchid 165


pi
ha
·S
e
dg
le

Order this issue from MIT Press


ow
Kn
ng

Order this issue on Kindle


hi
is
er

U.S. $13; www.amacad.org


Ch
A Contextual Approach to Privacy Online

Helen Nissenbaum

Abstract: Recent media revelations have demonstrated the extent of third-party tracking and monitor-
ing online, much of it spurred by data aggregation, pro½ling, and selective targeting. How to protect pri-
vacy online is a frequent question in public discourse and has reignited the interest of government actors.
In the United States, notice-and-consent remains the fallback approach in online privacy policies, despite
its weaknesses. This essay presents an alternative approach, rooted in the theory of contextual integrity.
Proposals to improve and fortify notice-and-consent, such as clearer privacy policies and fairer informa-
tion practices, will not overcome a fundamental flaw in the model, namely, its assumption that individ-
uals can understand all facts relevant to true choice at the moment of pair-wise contracting between indi-
viduals and data gatherers. Instead, we must articulate a backdrop of context-speci½c substantive norms
that constrain what information websites can collect, with whom they can share it, and under what con-
ditions it can be shared. In developing this approach, the paper warns that the current bias in conceiving
of the Net as a predominantly commercial enterprise seriously limits the privacy agenda.

The year 2010 was big for online privacy.1 Reports


of privacy gaffes, such as those associated with
Google Buzz and Facebook’s ½ckle privacy policies,
graced front pages of prominent news media. In its
series “On What They Know,” The Wall Street Journal
aimed a spotlight at the rampant tracking of indi-
viduals for behavioral advertising and other rea-
sons.2 The U.S. government, via the Federal Trade
Commission (ftc)3 and the Department of Com-
merce,4 released two reports in December 2010
depicting the Net as a place where every step is
watched and every click recorded by data-hungry
HELEN NISSENBAUM is Profes- private and governmental entities, and where every
sor of Media, Culture, and Commu- response is coveted by attention-seekers and influ-
nication and Senior Fellow in the ence-peddlers.5
Information Law Institute at New This article explores present-day concerns about
York University. Her books include online privacy, but in order to understand and ex-
Privacy in Context: Technology, Policy,
plain on-the-ground activities and the anxieties they
and the Integrity of Social Life (2010),
Academy & the Internet (edited with stir, it identi½es the principles, forces, and values be-
Monroe E. Price, 2004), and Com- hind them. It considers why privacy online has been
puters, Ethics & Social Values (edited vexing, even beyond general concerns over privacy;
with Deborah G. Johnson, 1995). why predominant approaches have persisted de-

© 2011 by Helen Nissenbaum

32
spite their limited results; and why they ally, when the flow of information ad- Helen
should be challenged. Finally, the essay lays heres to entrenched norms, all is well; Nissenbaum
out an alternative approach to addressing violations of these norms, however, often
the problem of privacy online based on result in protest and complaint. In a
the theory of privacy as contextual integ- health care context, for example, patients
rity. This approach takes into considera- expect their physicians to keep personal
tion the formative ideals of the Internet medical information con½dential, yet they
as a public good.6 accept that it might be shared with spe-
cialists as needed. Patients’ expectations
Setting aside economic and institution- would be breached and they would likely
be shocked and dismayed if they learned
al factors, challenges to privacy associated
with the Net are similar to those raised in that their physicians had sold the informa-
the past by other information systems and tion to a marketing company. In this event,
digital media due to their vast capacities we would say that informational norms for
for capturing, stockpiling, retrieving, ana- the health care context had been violated.
lyzing, distributing, displaying, and dis- Information technologies and digital
seminating information. In a flourishing media have long been viewed as threat-
online ecology, where individuals, com- ening to privacy because they have radi-
munities, institutions, and corporations cally disrupted flows of personal infor-
generate content, experiences, interac- mation, from the corporate and govern-
tions, and services, the supreme currency mental databases of the 1960s to the sur-
is information, including information veillance cameras and social networks of
about people. As adoption of the Internet the present day. The Net, in particular, has
and Web has surged and as they have be- mediated disruptions of an unprecedent-
come the primary sources of information ed scale and variety. Those who imagined
and media for transaction, interaction, and online actions to be shrouded in secrecy
communication, particularly among well- have been disabused of that notion. As dif-
off people in technologically advanced so- ½cult as it has been to circumscribe a right
cieties, we have witnessed radical pertur- to privacy in general, it is even more com-
bations in flows of personal information. plex online because of shifting recipients,
Amid growing curiosity and concern over types of information, and constraints
these flows, policy-makers, public-interest under which information flows. We have
advocates, and the media have responded come to understand that even when we in-
with exposés and critiques of pervasive teract with known, familiar parties, third
surreptitious tracking, manipulative be- parties may be lurking on the sidelines, en-
havioral advertising, and ½ckle privacy gaged in business partnerships with our
commitments of major corporate actors. known parties. Information about us that
In Privacy in Context: Technology, Policy, once may have languished in dusty ½le cab-
and the Integrity of Social Life,7 I give an ac- inets is now pinpointed in an instant
count of privacy in terms of expected flows through search queries by anyone any-
of personal information, modeled with the where. In these highly informatized (that
construct of context-relative informational is, information-rich) environments, new
norms. The key parameters of information- types of information infuse our every ac-
al norms are actors (subject, sender, recip- tion and relationship.
ient), attributes (types of information), We are puzzled by the new and differ-
and transmission principles (constraints ent types of information generated online,
under which information flows). Gener- some of it the by-products of our activi-

140 (4) Fall 2011 33


A ties, including cookies, latencies, clicks, then decide freely whether to give or with-
Contextual ip addresses, rei½ed social graphs, and hold consent. How well it actually models
Approach to
Privacy browsing histories. New and different control is not a question I pursue here be-
Online principles govern the flow of informa- cause whatever the answer, there remains
tion: information we share as a condition a deeper problem in de½ning a right to
of receiving goods and services is sold to privacy as a right to control information
others; friends who would not violate con- about oneself, as discussed at length in
½dences repost our photographs on their Privacy in Context.8
home pages; people around the world, A second consideration is the compati-
with whom we share nonreciprocal rela- bility of notice-and-consent with the par-
tionships, can see our houses and cars; adigm of a competitive free market, which
providers from whom we purchase Inter- allows sellers and buyers to trade goods
net service sell access to our communica- at prices the market determines. Ideally,
tions streams to advertisers. Default con- buyers have access to the information nec-
straints on streams of information from essary to make free and rational purchas-
us and about us seem to respond not to ing decisions. Because personal informa-
social, ethical, and political logic but to tion may be conceived as part of the price
the logic of technical possibility: that is, of online exchange, all is deemed well if
whatever the Net allows. If photographs, buyers are informed of a seller’s practices
likes and dislikes, or listings of friends pass collecting and using personal informa-
through the servers of a Facebook appli- tion and are allowed freely to decide if
cation, there is no telling whether they the price is right. The ideal market as-
will be relinquished; if an imperceptible sumes free and rational agents who make
(to the ordinary user, at least) JavaScript decisions without interference from third
code, or “beacon,” is placed by a website parties, such as government regulators.
one visits and enables the capture of one’s Doing so not only demonstrates respect
browser state, so be it; if Flash cookies can for key actors, but also allows the mar-
cleverly work around the deletion of http ket to function ef½ciently, producing the
cookies, no harm done. greatest overall utility.
However, there is considerable agree-
The dominant approach to addressing ment that transparency-and-choice has
failed.9 Privacy advocates, popular media,
these concerns and achieving privacy on-
line is a combination of transparency and and individuals have become louder and
choice. Often called notice-and-consent, or more insistent in pointing out and pro-
informed consent, the gist of this ap- testing rampant practices of surrepti-
proach is to inform website visitors and tious as well as flagrant data gathering,
users of online goods and services of re- dissemination, aggregation, analysis, and
spective information-flow practices and pro½ling; even industry incumbents and
to provide a choice either to engage or dis- traditionally pro-business government
engage. Two substantive considerations regulators admit that existing regimes
explain the appeal of this approach to have not done enough to curb undesirable
stakeholders and regulators. One is the practices, such as the monitoring and
popular de½nition of a right to privacy as tracking associated with behavioral ad-
a right to control information about one- vertising and predatory harvesting of
self. Transparency-and-choice appears to information posted on social networking
model control because it allows individ- sites. Why exactly the existing transpar-
uals to evaluate options deliberately and ency-and-choice, or notice-and-consent,

34 Dædalus, the Journal of the American Academy of Arts & Sciences


approach has failed–and what to do about is not merely a matter of weakness of the Helen
it–remains hotly disputed. will. Nissenbaum
For many critics, whom I call critical ad- For critical adherents to transparency-
herents, the fault lies with the ubiquitous and-choice, these observations point to
regime of offering privacy to individuals the need for change, but not revolution.
on a “take it or leave it” basis. A range of Such critics have suggested correctives
thoughtful commentaries on the subject, including better mechanisms for choice,
including those in the ftc and Depart- such as reframing policies in terms of
ment of Commerce reports mentioned “opt in” rather than “opt out” and locat-
above, have drawn attention to weak in- ing moments of choice at times when
stantiations of choice, while others have users might be able to pause and think.
highlighted problems with notice.10 Be- They also advocate increasing transpar-
cause to choose means to deliberate and ency: for example, stipulating shorter pol-
decide freely, the near-universal practice icies that are easier to follow, along the
of modeling choice as “opt out” can lines of nutritional labels. Suggestions also
hardly be said to model the ideal con- apply to the content of policies. Whereas
sumer making purchasing decisions in the in the past, online actors were entreated
ideal competitive marketplace. A deeper simply to have policies, current correctives
ethical question is whether individuals in- would require adherence to fair informa-
deed freely choose to transact–accept an tion principles.14 The details of these sug-
offer, visit a website, make a purchase, par- gestions are beyond the scope of this essay,
ticipate in a social network–given how as are questions about how privacy pol-
these choices are framed as well as what icies and practices should be monitored
the costs are for choosing not to do so.11 and enforced. This is because (as I argue
While it may seem that individuals freely below) the consent model for respecting
choose to pay the informational price, the privacy online is plagued by deeper prob-
price of not engaging socially, commer- lems than the practical ones noted so far.
cially, and ½nancially may in fact be ex-
acting enough to call into question how
freely these choices are made.
I am not convinced that notice-and-con-
sent, however re½ned, will result in better
Privacy policies as enactments of no- privacy online as long as it remains a pro-
tice fare no better. That almost all priva- cedural mechanism divorced from the par-
cy policies are long, abstruse, and legal- ticularities of relevant online activity. Take
istic adds to the unrealistic burden of the example of online behavioral advertis-
checking the respective policies of the ing, which quickly reveals an inherent flaw
websites we visit, the services we consid- with the notice-and-consent approach.15
er and use, and the content we absorb. To begin, consider what might need to be
Compounding the burden is an entity’s conveyed to users to provide notice of
right to change its policy at will, giving what information is captured, where it is
due notice of such change, ironically, sent, and how it is used. The technical and
within the policy itself and therefore re- institutional story is so complicated that
quiring interested individuals to read it not probably only a handful of deep experts
once but repeatedly. Unsurprisingly, ample would be able to piece together a full ac-
evidence reveals that people do not read count; I would hazard that most of the
privacy policies, do not understand them website owners who contract with ad net-
when they do,12 and realistically could not works providing targeted advertising ser-
read them even if they wanted to.13 This vices are not among such experts. Even if,

140 (4) Fall 2011 35


A for a given moment, a snapshot of the other, yet both are essential for notice-and-
Contextual information flows could be grasped, the consent to work.
Approach to
Privacy realm is in constant flux, with new ½rms Adherents may persist, pointing to other
Online entering the picture, new analytics, and arenas, such as health care and human
new back-end contracts forged: in other subject research, in which a similar trans-
words, we are dealing with a recursive ca- parency paradox appears to have been
pacity that is inde½nitely extensible.16 As overcome. In health care, informed con-
a result of this complex and shifting land- sent protocols are commonly accepted
scape, users have been prone to conflate for conveying risks and bene½ts to pa-
(in a convenient but misleading way) tients undergoing surgery, for example, or
tracking with targeting. Further, the com- to subjects entering experimental treat-
plexity makes it not only dif½cult to con- ment programs, even though it is unlike-
vey what practices are followed and what ly they fully grasp the details. In my view,
constraints respected, but practically im- these protocols work not because they
possible.17 have found the right formulation of no-
For critical adherents to notice-and- tice and the authentic mechanism for con-
consent, these types of cases exemplify sent but because they exist within a frame-
the need for brief and clear policies that work of supporting assurances. Most of us
capture the essence of privacy practices are terrible at assessing probabilities and
in ways ordinary people can grasp. I view understanding risks of side effects and
this as a futile effort because of what I call failed procedures; we are extremely poor
the transparency paradox. Achieving trans- at visualizing the internal organs of our
parency means conveying information- bodies. It is not the consent form itself
handling practices in ways that are rele- that draws our signature and consigns us
vant and meaningful to the choices indi- to the operating table, but rather our faith
viduals must make. If notice (in the form in the system.20 We trust the long years of
of a privacy policy) ½nely details every study and apprenticeship that physicians
flow, condition, quali½cation, and excep- undergo, the state and board certi½ca-
tion, we know that it is unlikely to be tions, peer oversight, professional codes,
understood, let alone read. But summa- and above all, the system’s interest
rizing practices in the style of, say, nutri- (whatever the source) in our well-being.
tion labels is no more helpful because it We believe in the benevolence of institu-
drains away important details, ones that tions of higher learning and, in large part,
are likely to make a difference: who are their mission to promote human welfare.
the business associates and what infor- Far from perfect, and subject to high-vis-
mation is being shared with them; what ibility breaches, the systems that consti-
are their commitments; what steps are tute these safety nets have evolved over
taken to anonymize information; how will centuries; they undergird and warrant the
that information be processed and used. consent agreements that patients and sub-
An abbreviated, plain-language policy jects confront every day. In the online en-
would be quick and easy to read, but it is vironment, by contrast, individual consent
the hidden details that carry the sig- agreements must carry the entire weight
ni½cance.18 Thus the transparency par- of expectation.
adox: transparency of textual meaning
and transparency of practice conflict in
all but rare instances.19 We seem unable
P icking holes in the transparency-and-
choice (informed consent) approach,
to achieve one without giving up on the problematic as it is, is not the end point of

36 Dædalus, the Journal of the American Academy of Arts & Sciences


my argument. As it is, it may be the best vices and content, much of it generated by Helen
approach for this interim period while users themselves.25 Nissenbaum
the supporting assurances to shore it up Each of these ideations captured sa-
are developed. Such assurances are not lient aspects of the vast socio-technical
achieved by ½at, but may require decades system that I have been calling “the Net”
for relevant institutional forms and prac- as it developed through progressive phas-
tices to progress from trial and error to es, and as it continues to do so today.
a balanced settling point. The theory of Indeed, the Net is characterized by enor-
contextual integrity offers a shorter and mous malleability, both over time and
more systematic path to this point by in- across applications. Although the brute
voking learned wisdom from mature sys- technical substrate of digital media–
tems of informational norms that have architecture, design, protocol, feature
evolved to accommodate diverse legiti- sets–may constrain or afford certain
mate interests as well as general moral and activities, it does so no more than, say,
political principles and context-speci½c gravitational force, which similarly con-
purposes and values. The promise of this strains and affords human activity while
path is not merely that the equilibriums leaving plenty of room for variation. For
achieved in familiar contexts may pro- example, the Net may have seemed essen-
vide analogical guidance for online realms; tially ungovernable until China asserted
rather, the path acknowledges how on- control and territorial borders quietly re-
line realms are inextricably linked with emerged. Yet even that maneuver is in-
existing structures of social life. Online complete, leaving intact exhilarating pock-
activity is deeply integrated into social life ets of autonomy.26
in general and is radically heterogeneous in A snapshot of today’s Net, conceived
ways that reflect the heterogeneity of off- as an abstraction of technical layers and
line experience. social (economic and political) systems,
By now, the story is familiar: about the operates as infrastructure, bustling spaces,
advent of arpanet and, out of this, the and medium. Whether “online,” “in
Internet, email as the unanticipated “killer cyberspace,” “on the Internet,” or “on
app,” the handoff of management from the Web,” individuals engage in banal
government to private industry, and practices such as banking, booking trav-
emergence of the Web as the dominating el, and shopping, in many instances doing
platform for most ordinary people’s ex- so with the same institutions and compa-
perience of the Net. Along the way, the nies they could call on the telephone or
Internet has progressed from an esoteric visit at a physical location. Other activi-
utility for sharing computer resources and ties–viewing movies, listening to record-
data sets, intended for use by relatively ings, reading literature, talking on an ip
few specialists, to a ubiquitous, multifunc- phone, seeking information, communi-
tional medium used by millions world- cating via email, worshipping, and some
wide.21 As it has progressed through these forms of shopping–are transformed in
stages, it has been conceptualized through their migration to the Net. In many in-
a series of influential ideations:22 from stances, these transformations are not
information superhighway,23 enabling merely experiential but reflect institution-
swift flows of information and com- al innovations, such as online churches
merce;24 to cyberspace, a new frontier im- and dating services, virtual universities,
mune from the laws of any land; to Web websites such as Amazon, Netflix, Mayo
2.0, a meeting place overflowing with ser- Clinic, WebMD, eBay, and E*TRADE, and

140 (4) Fall 2011 37


A programs and services such as e-govern- ated by the Net (“on” the Web), are deeply
Contextual ment, e-zines, e-vites, e-readers, iTunes, integrated into social life: they may be
Approach to
Privacy and iShares. continuous with brick-and-mortar cor-
Online Even greater novelty and more funda- relates or, at the very least, have the pow-
mental transformations are found in the er to affect communications, transactions,
activities, practices, and institutional and interactions, and activities in those realms
business forms built on top of these offer- (and vice versa). Not only is life online
ings, including meta-engines that aggre- integrated into social life, and hence not
gate, index, organize, and locate sites, ser- productively conceived as a discrete con-
vices, goods, news, and information; ex- text, it is radically heterogeneous, compris-
amples include kayak.com, Google search, ing multiple social contexts, not just one,
Google news, and Yelp.com. Web 2.0 has and certainly is not just a commercial con-
wrought an additional layer of changes, text where protecting privacy amounts to
notably in production, creativity, and so- protecting consumer privacy and commer-
cial life. These changes include interact- cial information.27 To be sure, the con-
ing via social networks, networking on tours of technology (architecture, proto-
platforms, and facilitating peer-produc- col, design, and so on) shape what you
tion and user-generated content by way of can do, say, see, and hear online, but while
innumerable individual and small-group alterations, or disruptions due to particu-
blogs, wikis, and personal websites; re- lar characteristics of the Net, impose puz-
positories of global scale such as Wiki- zles and pose challenges for social con-
pedia, IMDb, Flickr, mmorgs (massively texts, they do not warrant sui generis,
multiplayer online role-playing games), uniform, cross-cutting rules determined
and YouTube; the online patient-support by the medium. Instead, the contexts in
community PatientsLikeMe; as well as which activities are grounded shape ex-
mash-ups, folksonomies, crowdsourcing, pectations that, when unmet, cause anxi-
and reputational systems. ety, fright, and resistance.28
Questions about protecting privacy on-
line, particularly when framed as ques-
tions about online privacy, suggest that “on-
A nswering questions about privacy on-
line, like those about privacy in general, re-
line” is a distinctive venue, sphere, place, quires us to prescribe suitable, or appro-
or space de½ned by the technological in- priate, constraints on the flow of person-
frastructures and protocols of the Net, al information. The challenge of privacy
for which a single set of privacy rules can, online is not that the venue is distinct and
or ought to, be crafted. I resist this no- different, or that privacy requirements are
tion. However exhilarating the vision of distinct and different, but that mediation
cyberspace as a new frontier, experience by the Net leads to disruptions in the cap-
reveals no insulated domain divorced from ture, analysis, and dissemination of infor-
“real life” and deserving distinctive regu- mation as we act, interact, and transact
lation. The Net does not constitute (draw- online. The decision heuristic derived from
ing on the terminology of contextual in- the theory of contextual integrity suggests
tegrity) a discrete context. It is not a sin- that we locate contexts, explicate en-
gle social realm, but the totality of experi- trenched informational norms, identify
ence conducted via the Net, from speci½c disruptive flows, and evaluate these flows
websites to search engines to platforms against norms based on general ethical
and on up into “the cloud,” crisscrossing and political principles as well as context-
multiple realms. Activities online, medi- speci½c purposes and values.

38 Dædalus, the Journal of the American Academy of Arts & Sciences


y To be sure, locating contexts online and that West Coast Video must adhere to the Helen
explicating the presiding norms is not Act. Whether laws applicable to brick-and- Nissenbaum
always straightforward (in the same way mortar video rental stores actually apply
that it is not when dealing with unmedi- to online video rental providers such as
ated social spaces). Some of the more fa- iTunes and Amazon seems uncertain;
miliar cases, however, may provide in- still, the requirements of contextual in-
sight into the task. Whether you transact tegrity, which anchors privacy rules in
t with your bank online, on the phone, or social contexts and social roles, would
person-to-person in a branch of½ce, it is imply that they should.
not unreasonable to expect that rules gov- These examples merely scratch the sur-
erning information will not vary accord- face of the Net’s remarkable heterogene-
ing to medium. In the United States, banks ity. Online offerings range from special-
and other ½nancial institutions are gov- ized information providers and distribu-
erned by privacy rules formulated by the tors, such as MayoClinic.com and Web-
ftc, which was given this authority by the MD; federal, state, and local government
Gramm-Leach-Bliley Act.29 Auxiliary in- portals, providing services and informa-
formation (for example ip address or tion directly to citizens; and structured re-
clickstream), the artifacts of online trans- positories of user-generated content, such
action, should not simply be deemed “up as Wikipedia, YouTube, Flickr, Craigslist,
for grabs” just because that information and social networks, including Facebook.
was not explicitly considered in rules for- Religious denominations around the globe
mulated before online banking became have online presences, ranging from The
d common. Instead, it should be held to the Holy See, claiming to be the “of½cial” Vat-
same standards that guided ½nancial pri- ican website,32 to online churches,33 of-
vacy in the ½rst place. fering in-home, Web-based religious en-
Similarly, while expectations of visitors gagement that replaces or supplements
to Bloomingdales.com, NYTimes.com, regular church attendance. This list does
and MOMA.org may be affected by corre- not capture the fluidity and modularity
sponding, preexisting brands, they are of existing offerings, which include com-
also shaped by the respective social con- binations and permutations (mash-ups)
texts that these entities inhabit, includ- constrained only by human creativity
ing the types of experiences and offerings and the technological limits of the mo-
y they promise. Accordingly, Amazon.com, ment. Many popular websites, for exam-
d which came on the scene as an online ple, combine modules of enterprise-gen-
bookstore with no brick-and-mortar pre- erated content with user-generated feed-
cursor, is nevertheless recognizable, akin back, or storefronts with varieties of social
to, say, the Moravian Book Shop in Beth- networks, political content with open
lehem, Pennsylvania, which was founded blogs, and more.
t in 1745 and is believed to be the oldest To the extent that the Net is deeply
continually operating bookstore in the embedded in social life, context-speci½c
United States.30 As Amazon.com expand- informational norms may be extended to
ed into other arenas, selling and renting corresponding online activities. Thus, pri-
y dvds, for example, one would assume per- vacy rules governing ½nancial institutions,
sonal information flows generated in for example, would extend to E*TRADE
these transactions to be regulated by con- even though it operates primarily via
straints expressed in the Video Privacy an online portal. Online offerings and ex-
Protection Act of 198831 in the same way periences may defy existing norms, how-

140 (4) Fall 2011 39


A ever, as they incorporate some of the faith of those reporting income, still in
Contextual novel forms mentioned above. In such the great majority of cases this reliance is
Approach to
Privacy circumstances, the theory of contextu- entirely justi½able, principally because
Online al integrity directs us beyond existing the taxpayer knows that in making a
norms to underlying standards, derived truthful disclosure of the sources of his
from general moral and political consid- income, information stops with the gov-
erations as well as the ends, purposes, and ernment. It is like con½ding in one’s law-
values of respective contexts.34 Novel yer.”37 A presumption of strict con½den-
activities and practices, which implicate tiality is derived from values and purpos-
different types of information, expand- es–public compliance, trust, con½dence
ed groups of recipients, and altered con- in government–that prohibit all sharing
straints on flow are evaluated against except as allowed, on a case-by-case basis,
these standards. by explicit law and regulation.
Applying this reasoning to online ½ling The more challenging cases confront-
of income tax returns is fairly straight- ing us include forms of content, service,
forward. In the United States, rigorous and interaction that are speci½c to the Net
con½dentiality requirements governing or that do not have obvious counterparts
individual tax records, impervious even elsewhere. Search engines such as Google
to certain types of law enforcement and Bing, essential for navigating the
needs, have developed over the past 150 Web, may constitute an important class
years.35 Although present-day code, for- of cases. And while sites such as Mayo
malized in the 1970s, may have little to Clinic and WebMD might seem similar
say about e-½ling speci½cally, we would enough to familiar reference resources,
not expect auxiliary information generat- health information sites are prodigious,38
ed through online interactions to be “up offering everything from personalized and
for grabs,” freely available to all comers. interactive services that allow users to sign
Even in the absence of explicit rules, in and pose questions about their partic-
guidance can be sought from the values ular problems, to personal health record
and purposes that have yielded existing repositories that provide space to store
con½dentiality rules for information in health records (for example, Microsoft
traditional paper-based tax records. In Health Vault), and to social networking
the Disclosure and Privacy Law Refer- sites devoted to communities of fellow
ence Guide, the irs asserts that “there sufferers (for example, PatientsLikeMe).
must be public con½dence with respect to Without denying that the Net has yield-
the con½dentiality of personal and ½nan- ed much that is novel and strange, includ-
cial information given to us for tax ad- ing new types of information and new in-
ministration purposes. . . . The con½den- stitutional forms, online activities them-
tial nature of these records requires that selves are strangely familiar: connecting
each request for information be evaluat- with a friend, collaborating on a political
ed in light of a considerable body of law mission, applying for a job, seeking reli-
and regulation which either authorize or gious or spiritual sustenance, pursuing ed-
prohibit disclosure.”36 This connection ucational opportunity, catching up on lo-
was acknowledged as far back as 1925, cal and world news, or choosing a book to
when Secretary of the Treasury Andrew read, music to enjoy, or movies to watch.
Mellon remarked, “While the government Although searching on Google is differ-
does not know every source of income of ent from looking up material in a library
a taxpayer and must rely upon the good catalog, in part because the contents of the

40 Dædalus, the Journal of the American Academy of Arts & Sciences


Web are quite different from the contents pro½t entities, from the underlying phys- Helen
of a library, there is similarity in these two ical infrastructure to network service pro- Nissenbaum
activities: both may include the pursuit viders, providers of utilities and applica-
of research, knowledge, and intellectual tions, and retailers of goods, content, and
enrichment. In all such activities, liberal services. Furthermore, commercial adver-
democratic societies allow great freedom, tising managed through the complex
unconstrained by the watchful gaze or ap- ecosystem of ad networks, ad exchanges,
probation of authorities, just as they allow and analytics and marketing companies
citizens to seek political or religious in- has emerged as a dominant business mod-
formation or af½liation. Just as with the el for supporting online content and ser-
offline environment, we would expect the vices. This model prevails in a variety of
same standards to prevail online, dictat- online locations, from large corporate
ing that online footprints should not be websites, to personal blogs such as Noob
recorded and registered in order to mini- Cook, a site with seventeen trackers, or
mize risk of interference, by either human Dictionary.com, with nine trackers from
or machine. advertising companies, such as Double-
The interest in privacy online that the click, Media Math, Microsoft Atlas, and
ftc and Commerce Department have others.40 Wikipedia remains a rather re-
recently shown is a positive develop- markable standout, supported by the non-
ment, particularly because it acknowl- pro½t Wikimedia Foundation and sport-
edges a growing concern over privacy ing no trackers.41
and ampli½es public discussion of the By this logic, the Commerce Depart-
wildly unrestrained collection of person- ment and the ftc would be precisely the
al information by nongovernmental ac- governing bodies to have oversight of
tors. Their interest has been limited, online activity, and norms of the compet-
though, by a focus on protecting privacy itive, free marketplace would make the
online as, predominantly, a matter of most sense for regulating it. Yet private
protecting consumers online and protect- payment, whether through direct charges
ing commercial information: that is, pro- for goods, services, access, or participa-
tecting personal information in commer- tion, or through income from advertis-
cial online transactions.39 Neither agen- ing, does not on its own signal complete
cy has explicitly acknowledged the vast surrender to marketplace norms. Accord-
landscape of activity lying outside the ing to political philosopher Elizabeth
commercial domain. As long as public Anderson, many functions in society
discourse about privacy online takes the straddle boundaries between the com-
marketplace and commerce as proxies for mercial and noncommercial. How they
the whole, conceptions of privacy will be are supported is not decisive but rather
inadequate. We need to take full account how they measure up to standards of
of the radical heterogeneity of online ac- quality or excellence. Private payment
tivity and practice. as a form of support does not require
total concession to marketplace norms;
One might argue that the Net is almost instead, we expect functions such as edu-
cation, health care, religion, telecommu-
completely commercial, pointing to the
prevalence of private payment as the nication, and transportation, whether
means supporting online activity. Aside privately paid for or not, to meet inde-
from government presences, the Net is pendent ideals. As Anderson warns,
almost wholly owned by private, for- “When professionals sell their services,

140 (4) Fall 2011 41


A they enter into market relations that The point is not to see Brin and Page
Contextual impose norms on their activities which or other developers as “sellouts.” Con-
Approach to
Privacy potentially conflict with the norms of founding sources of support with guiding
Online excellence internal to their professional norms obscures our recognition of the
roles.”42 But we expect more from pro- internal standards of excellence that we
fessionals–from doctors, lawyers, ath- can hold search companies to even as
letes, artists, church ministers, and teach- they seek commercial support, indepen-
ers–than the pursuit of pro½t. People dent of their performance in the market-
pay for medical care at private practices place.46 The same argument holds for
and hospitals, for instance, and for edu- content vendors and information ser-
cation at a variety of institutions. In these vices providing, in the private sector,
and other cases, in which complete sur- many services also provided by public
render to marketplace norms would re- libraries. I am not suggesting that there is
sult in corrupt and impoverished prac- consensus, or that questions about inter-
tice, Anderson advocates a proper balance nal norms of excellence are easily settled;
of market norms with internal standards endless struggles over what constitutes
of excellence. a good newspaper, school, or health care
This point might seem obvious, but system attest to this. But they also reveal
certain brands of free-market capitalism a strong belief that beyond pro½t, such
make it easy to confuse the quest for standards are at play and are socially im-
pro½t with the pursuit of internal stan- portant.
dards of excellence.43 When Sergey Brin
and Larry Page ½rst launched the Google
search engine, they regarded commercial
Recent attention given to the challenge
of protecting privacy online is a positive
influences as contrary to a search engine’s development. Although success is ham-
core mission as a performance-driven strung by the foot-dragging of those whose
tool serving individuals’ interests in lo- power and pro½t are served by unrestrict-
cating information on the Web. Eschew- ed flows of personal information, it is also
ing advertising, they wrote in the appen- limited by underdeveloped conceptions
dix of a 2007 paper, “The goals of the of privacy and the role it plays in sustain-
advertising business model do not always ing the Net as a public good, capable of
correspond to providing quality search to serving diverse interests. Early portrayals
users. . . . We believe the issue of advertis- of cyberspace as a new frontier, different,
ing causes enough mixed incentives that distinct, and out of the reach of tradition-
it is crucial to have a competitive search al law, have for the most part been aban-
engine that is transparent and in the aca- doned, yet no other single vision has cap-
demic realm.”44 In other, less visible cases, tured public imagination in quite the
similar concerns may be raised: for same way. This is unsurprising given the
example, Amazon’s purchase of IMDb, Net’s massive growth as a complex in-
a website of information about movies, frastructure, content delivery system, and
developed and initially maintained by media space. The lack of a reigning pub-
volunteers. Even in the case of the famil- lic vision has meant that controversial
iar lending library, originally conceived moral and political matters are settled
in the United States by Benjamin Frank- more often by technical affordances than
lin as publicly funded, many functions by clearly articulated public moral and
have been taken over by private, for- political principles. For privacy this has
pro½t companies online.45 been devastating, as the Net, constructed

42 Dædalus, the Journal of the American Academy of Arts & Sciences


through an amalgamation of the sciences sulting a search engine to locate material Helen
and technologies of information, compu- online, we should consider close analogues Nissenbaum
tation, and networking, affords radical based not so much on similarity of action
disruptions of information flows. With but on similarity of function or purpose.
economic and social incentives stacked Consulting a search engine, in this regard,
against constraints on flow, burdening is akin to conducting research, seeking
individuals with the full weight of pro- information and association, searching a
tecting their privacy online through library catalog, and pursuing intellectual
notice-and-choice is unlikely to yield enlightenment. Time spent on social net-
success. works, such as Facebook, is an amalgam
My preferred alternative builds from of engagement with personal, social, inti-
the vision of life online as heterogeneous mate and home life, political association,
and thickly integrated with social life. and professional or work life. As we lo-
Despite distinctive qualities of online cate correspondences, we bring into view
movement, transactions, activities, rela- the relevant governing norms. If I am
tions, and relationships, when abstracted right about how search engines are used
from particulars these retain ½delity with and for what purposes, then the govern-
the fundamental organizing principles of ing norms would be strict con½dentiality
human practice and social life. Drawing with regard to Web search histories and
on work from social theory and philoso- perhaps, as practiced by many public
phy, the framework of contextual integri- libraries, the prompt expunction of such
ty conceives of these spheres as partially records to minimize risks of leakage or
constituted by norms of behavior, among mandated handovers as well as the temp-
them norms governing the flow (sharing, tation of future sharing for ½nancial gain.
distributing) of personal information. At present, Google, unlike other search
We should not expect social norms, in- providers, has expressed a commitment
cluding informational norms, simply to to maintaining a barrier between identi-
melt away with the change of medium to ½able search records and other records it
digital electronic any more than from accumulates with user pro½les. Although
sound waves to light particles. Although this decision adheres to the spirit of the
the medium may affect what actions and conception of Web search I have urged,
practices are possible and likely, sensible questions remain about the ef½cacy of
policy-making focuses on the actions and their approaches to de-identifying search
practices themselves, with an eye to their logs and the fact that the commitment
function within social spheres and their can be revoked at any moment, as was
standing in relation to entrenched social Google’s commitment to forgo behav-
norms. ioral advertising.47
This view of online privacy also implies
Two broad recommendations follow that contexts, not political economy,
should determine constraints on the flow
from the argument thus far. First, in our
online activity we should look for the of information. Companies merge and ac-
contours of familiar social activities and quire other companies for many different
structures. For much that we do online reasons: for example, to strengthen and
–banking, shopping, communicating, expand their range of holdings, to gain
and enjoying culture and entertainment market dominance in a particular area, or
–this is not a dif½cult task. Where corre- to establish control over vertical chains
spondences are less obvious, such as con- of necessary resources. Among the valu-

140 (4) Fall 2011 43


A able assets that motivate acquisitions are to commit to partitioning information
Contextual databases of personal information, as holdings along contextual contours rath-
Approach to
Privacy demonstrated (presumably) by Google’s er than along lines of corporate owner-
Online acquisition of Doubleclick and Choice- ship.
point’s systematic acquisitions of small- There is no denying the transformative
er, special-purpose data holders.48 But effects of digital technologies, including
databases of personal information shared the rich and teeming online activity they
in one context, under constraints of the have spawned. Recommending that we
relevant informational norms, should not locate familiar social contexts online
be treated as just another asset, akin to and, where it makes sense, connect activ-
buildings, furniture, and supplies. The pri- ities and offerings with them is not to dis-
vacy policies of large diverse companies, pute this. Instead, the aim is to reveal rel-
such as Walt Disney, General Electric, evant standards of excellence. As social
Google, Citigroup, Viacom, and Micro- contexts, activities, roles, and rules mi-
soft, however, reveal porous boundaries grate online, respective context-speci½c
among subsidiaries, with little acknowl- values, ends, and purposes serve as stan-
edgment of a need to account for patterns dards against which information-sharing
of information flow within a single com- practices can be evaluated as legitimate
pany. Online conglomerates are no dif- or problematic. It is important to keep in
ferent as they strive to achieve vertical mind that privacy norms do not merely
integration by controlling the raw mate- protect individuals; they play a crucial
rials of their industry, namely, informa- role in sustaining social institutions.50
tion. Against these trends, we must es- Accordingly, restraints on search engines
tablish respect for the boundaries of con- or social networks are as much about sus-
text and associated informational norms. taining important social values of cre-
There is little doubt that when commu- ativity, intellectual growth, and lively
nicating with the public, corporations un- social and political engagement as about
derstand the importance of acknowledg- protecting individuals against harm. Ben-
ing the integrity of contexts. Even though jamin Franklin knew as much when he
to corporate investors a company might insisted on privacy protection for the
boast diverse informational assets, to the U.S. mail, not only to protect individuals
public it generally identi½es units that are but also to promote a meaningful social
socially meaningful. It may be that in these role for the service. We should expect no
acts of self-presentation, companies ac- less for email and ip telephony.
knowledge the contextual heterogeneity My second recommendation applies
of their offerings and therefore open the to online cases without straightforward
door to corresponding context-speci½c social precedents. As discussed earlier,
norms. By calling its online offering a uni- social forms online sometimes enable
versity, a shoe store, a church, a medical con½gurations of actors, information, ac-
center, a friendship network, or a bank, a tivities, and experiences that are unfamil-
company gives users a way to understand iar, at least prima facie. In these cases, I
the services or activities that take place suggest starting with ends, purposes, and
there, and it invites evaluation against re- values and working from there back to
spective norms, whether these are em- norms. A politician’s website that allows
bodied in law or simply arise from rea- citizens to “talk back” comprises an un-
sonable expectations.49 Staying true to usual platform for which no preexisting
these self-portrayals requires companies rules apply to, say, digital footprints left

44 Dædalus, the Journal of the American Academy of Arts & Sciences


by visitors to the site. Here, the right ap- ers, it is no wonder that over time intri- Helen
proach is not an opportunistic informa- cate systems of norms have developed to Nissenbaum
tion grab. Although this may serve imme- govern all domains of social life.
diate needs of an imminent political To adapt these systems to social rela-
campaign, it does not serve the purposes tions and contexts that have expanded
of encouraging frank political discussion, into digital media spaces, we must make
which is understood to flourish in envi- explicit much that has operated implicit-
ronments of great freedom.51 If people ly, and in the process reject entrenched
expect to be monitored, if they anticipate norms that no longer promote the achieve-
that their recorded views will be shared ment of moral and political values as well
with particular third parties for money as context-speci½c ends. To leave the pro-
or favors, they are likely to be more tection of privacy online to negotiations
watchful, circumspect, or uncooperative. of notice-and-consent is not only unfair,
The issue, however, is not how particular it is to pass up a critical public policy
practices affect individuals, but the im- opportunity that will have rami½cations
plications for particular purposes and for the shape and future of the Net. If
values. Circumspection and cooperative- pursued conscientiously, the process of
ness are productive of certain ends but articulating context-based rules and
not others. Working backward from these expectations and embedding some of
values, we develop rules for situations in them in law and other specialized codes
which there appear not to be any obvious will yield the safety nets that buttress
candidates. consent in ½elds such as health care and
research. With these precautions in place,
Growing momentum to confront the plenty of room would still remain to ex-
press personal preferences and to main-
problem of privacy online is a welcome
development. It would be a mistake, tain a robust role for informed consent.
however, to seek remedies that make pri-
vacy online something distinct. Protect-
ing privacy is a matter of assuring appro-
priate flows of personal information,
whether online or offline, and disrup-
tions in information flow, enabled by in-
formation technologies and digital media,
can be equally disturbing, whether online
or off. Because much of what happens
online is thickly integrated with social
life writ large (and vice versa), solving the
privacy problem online requires a fully
integrated approach. I have articulated
one step toward this goal, resisting the
suggestion that, with regard to privacy,
the Net is virgin territory where it falls to
the parties to construct terms of engage-
ment for each transaction. Given how
deeply rooted are our expectations of
right and wrong concerning the sharing
of information about ourselves and oth-

140 (4) Fall 2011 45


A endnotes
Contextual 1
Approach to This essay has bene½ted from opportunities to present at the Center for Law, Technology,
Privacy and Society, University of Ottawa; the Center for the Study of Law and Society, University
Online of California, Berkeley; and the Center for Internet and Society, Stanford University, where
questions and comments led to signi½cant improvements and re½nements of the argument.
I am grateful for valuable feedback from David Clark and nyu’s Privacy Research Group,
expert guidance from Cathy Dwyer and Foster Provost, and sterling research assistance from
Jacob Gaboury and Marianna Tishchenko. This work was supported by grants afsor: onr
baa 07-03 (muri) and nsf ct-m: Privacy, Compliance & Information Risk, cns-0831124.
2 Jennifer Valentino-Devries, “What They Know About You,” The Wall Street Journal, July 31,
2010, http://online.wsj.com/article/SB10001424052748703999304575399041849931612.html.
3 U.S. Federal Trade Commission, Preliminary ftc Staff Report, “Protecting Consumer Pri-
vacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers,”
December 2010, http://www.ftc.gov/os/2010/12/101201privacyreport.pdf.
4 U.S. Department of Commerce, “Commercial Data Privacy and Innovation in the Inter-
net Economy: A Dynamic Policy Framework,” December 2010, http://www.ntia.doc.gov/
reports/2010/IPTF_Privacy_GreenPaper_12162010.pdf.
5 Compare these depictions to earlier accounts of the Net as a new frontier of freedom and
autonomy: for example, David R. Johnson and David G. Post, “Law and Borders–The Rise
of Law in Cyberspace,” Stanford Law Review 48 (1996): 1367; John Perry Barlow, “Electronic
Frontier: Coming into the Country,” Communications of the ACM 34 (3) (March 1991).
6 In this essay, I draw most of my examples from the World Wide Web because almost all the
controversial privacy concerns that have captured public attention have stemmed from
Web-based activity and because the online experiences of ordinary people occur mostly on
the Web. I will use the term Net when observations made about the Web seem pertinent to
other Internet applications and services.
7 Helen Nissenbaum, Privacy in Context: Technology, Policy, and the Integrity of Social Life (Stan-
ford, Calif.: Stanford University Press, 2010).
8 Ibid., chap. 5.
9 Federal Trade Commission, “Protecting Consumer Privacy in an Era of Rapid Change” and
Department of Commerce, “Commercial Data Privacy and Innovation in the Internet Econ-
omy.”
10 Fred Cate, “The Failure of Fair Information Practice Principles,” in Consumer Protection in the
Age of the “Information Economy,” ed. Jane K. Winn (London: Ashgate Publishing, 2006).
11 Ian Kerr, “The Legal Relationship Between Online Service Providers and Users,” Canadian
Business Law Journal 35 (2001): 1–40.
12 Joseph Turow, Lauren Feldman, and Kimberly Meltzer, Open to Exploitation: American Shoppers
Online and Offline (Philadelphia: Annenberg Public Policy Center, University of Pennsylvania,
June 1, 2005), http://www.annenbergpublicpolicycenter.org/Downloads/Information_And
_Society/Turow_APPC_Report_WEB_FINAL.pdf.
13 Lorrie Faith Cranor and Joel Reidenberg, “Can User Agents Accurately Represent Privacy
Notices?” The 30th Research Conference on Communication, Information, and Internet Pol-
icy (tprc2002), Alexandria, Virginia, September 28–30, 2002.
14 U.S. Department of Health, Education, and Welfare, Records, Computers, and the Rights of Cit-
izens, Report of the Secretary’s Advisory Committee on Automated Personal Data Systems,
July 1973, http://aspe.hhs.gov/datacncl/1973privacy/tocprefacemembers.htm.
15 Solon Barocas and Helen Nissenbaum, “On Notice: The Trouble with Notice and Con-
sent,” Proceedings of the Engaging Data Forum: The First International Forum on the Application
and Management of Personal Electronic Information, Cambridge, Massachusetts, October 12–

46 Dædalus, the Journal of the American Academy of Arts & Sciences


13, 2009; Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, and Solon Helen
Barocas, “Adnostic: Privacy-Preserving Targeted Advertising,” Proceedings of the Network and Nissenbaum
Distributed System Symposium, San Diego, California, February 28–March 3, 2010.
16 Counting ad servers alone, a list current as of April 2011 shows 2,766 unique entries; see
http://pgl.yoyo.org/adservers/formats.php (accessed April 13, 2011).
17 Barocas and Nissenbaum, “On Notice,” and Toubiana, Narayanan, Boneh, Nissenbaum, and
Barocas, “Adnostic.”
18 Vincent Toubiana and Helen Nissenbaum, “An Analysis of Google Log Retention Policies,”
The Journal of Privacy and Con½dentiality (forthcoming).
19 For example, personal information is shared with no one and destroyed after each session.
20 Deborah Franklin, “Uninformed Consent,” Scienti½c American, March 2011, 24–25.
21 See Katie Hafner and Matthew Lyon, Where Wizards Stay Up Late: The Origins of the Internet
(New York: Simon and Schuster, 1999); Tim Berners-Lee, Weaving the Web: The Past, Present
and Future of the World Wide Web by Its Inventor (London: Texere Publishing, 2000); and Janet
Abbate, Inventing the Internet (Cambridge, Mass.: mit Press, 2000).
22 On this transformation of the Internet through the “tussle” of interested parties, see David
Clark, John Wroclawski, Karen Sollins, and Robert Braden, “Tussle in Cyberspace: De½ning
Tomorrow’s Internet,” Proceedings of the ACM SigComm 2002 Conference, Pittsburgh, Pennsyl-
vania, August 19–23, 2002, published in Computer Communications Review 32 (4) (October
2002).
23 Al Gore, “Infrastructure for the Global Village: Computers, Networks and Public Poli-
cy,” special issue, “Communications, Computers, and Networks,” Scienti½c American, Sep-
tember 1991, 150–153.
24 John Perry Barlow, “The Economy of Ideas,” Wired, March 1994, 84.
25 Clay Shirky, Here Comes Everybody: The Power of Organizing Without Organizations (New York:
Penguin, 2009).
26 Samantha Shapiro, “Revolution, Facebook-Style,” The New York Times, January 22, 2009,
http://www.nytimes.com/2009/01/25/magazine/25bloggers-t.html.
27 Federal Trade Commission, “Protecting Consumer Privacy in an Era of Rapid Change,” and
Department of Commerce, “Commercial Data Privacy and Innovation in the Internet Econ-
omy.”
28 Compare this notion to Mark Zuckerberg’s claim that norms change due to the contours of
Facebook’s privacy policies; see Bianca Bosker, “Facebook’s Zuckerberg Says Privacy No
Longer a ‘Social Norm,’” The Huf½ngton Post, January 11, 2010, http://www.huf½ngton
post.com/2010/01/11/facebooks-zuckerberg-the_n_417969.html.
29 U.S. Federal Trade Commission, Gramm-Leach-Bliley Act 15 U.S.C., Subchapter I, sec. 6801–
6809, November 12, 1999, http://www.ftc.gov/privacy/glbact/glbsub1.htm; Adam Barth,
Anupam Datta, John Mitchell, and Helen Nissenbaum, “Privacy and Contextual Integrity:
Framework and Applications,” Proceedings of the IEEE Symposium on Security and Privacy, Berke-
ley, California, May 21–24, 2006.
30 The Moravian Book Shop now has its own online portal, http://www.moravianbookshop
.com/ (accessed April 13, 2011).
31 The Video Privacy Protection Act 18 U.S.C. sec. 2710, 1988, http://www.law.cornell.edu/
uscode/html/uscode18/usc_sec_18_00002710----000-.html.
32 See http://www.vatican.va/phome_en.htm (accessed April 13, 2011).
33 See http://www.online-churches.net (accessed April 13, 2011).
34 Nissenbaum, Privacy in Context, esp. chap. 8.

140 (4) Fall 2011 47


A 35 David Kocieniewski, “irs Sits on Data Pointing to Missing Children,” The New York Times,
Contextual November 12, 2010, http://www.nytimes.com/2010/11/13/business/13missing.html.
Approach to
Privacy 36 Internal Revenue Service, “Disclosure and Privacy Law Reference Guide,” Publication 4639
Online (10-2007) Catalog Number 50891P, 1–7.
37 Hearings on Revenue Revision 1925 Before the House Ways and Means Committee, 69th
Cong., 1st sess. 8–9 (1925).
38 A Google search on “hiv status,” performed January 11, 2011, yielded more than 7.5 million
results.
39 Federal Trade Commission, “Protecting Consumer Privacy in an Era of Rapid Change,” and
Department of Commerce, “Commercial Data Privacy and Innovation in the Internet Econ-
omy.”
40 Noob Cook is presented as being written by “a girl who likes to cook”; see http://www
.noobcook.com/about/ (accessed February 25, 2011).
41 Establishing the number of trackers on a website is highly inexact. Various utilities offer this
service, for example, Ghostery; numbers vary depending on the approaches they adopt. Not
all approaches recognize all types of trackers. Further, these numbers also vary from time to
time because websites may frequently revise their underlying policies and business arrange-
ments. (I am indebted to Ashkan Soltani for clarifying this point.)
42 Elizabeth Anderson, Value in Ethics and Economics (Cambridge, Mass.: Harvard University
Press, 1995), 147.
43 Milton Friedman, “Can Business Afford to be Ethical?: Pro½ts before Ethics,” in Ethics for
Modern Life, ed. Raziel Abelson and Marie-Louise Friquegnon, 4th ed. (New York: St. Mar-
tin’s Press, 1991), 313–318.
44 Sergey Brin and Lawrence Page, “The Anatomy of a Large-Scale Hypertextual Web Search
Engine,” WWW7/Computer Networks 30 (1–7) (1998): 107–117; quotation taken from Web
version, http://infolab.stanford.edu/~backrub/google.html (accessed February 26, 2011).
See also Alex Diaz, “Through the Google Goggles: Sociopolitical Bias in Search Engine De-
sign,” in Web Searching: Interdisciplinary Perspectives, ed. Amanda Spink and Michael Zimmer
(Dordrecht, The Netherlands: Springer, 2008).
45 Robert Ellis Smith, “Ben Franklin’s Web Site: Privacy and Curiosity from Plymouth Rock to
the Internet,” Privacy Journal (2000): 34, 51.
46 Lucas Introna and Helen Nissenbaum, “Shaping the Web: Why the Politics of Search En-
gines Matters,” The Information Society 16 (3) (2000): 1–17; Frank Pasquale and Oren Bracha,
“Federal Search Commission? Access, Fairness, and Accountability in the Law of Search,”
Cornell Law Review 93 (2008): 1149; Toubiana, Narayanan, Boneh, Nissenbaum, and Barocas,
“Adnostic.”
47 Toubiana and Nissenbaum, “An Analysis of Google Log Retention Policies.”
48 See “Choicepoint,” epic-Electronic Privacy Information Center, http://epic.org/privacy/
choicepoint/ (accessed April 13, 2011).
49 As a practical matter, standards for communicating contexts will be needed through inter-
face design. See, for example, the work of Ryan Calo and Lorrie Cranor.
50 Nissenbaum, Privacy in Context, esp. chap. 8–9.
51 Danielle Citron, “Ful½lling Government 2.0’s Promise with Robust Privacy Protections,”
George Washington Law Review 78 (4) (June 2010): 822–845.

48 Dædalus, the Journal of the American Academy of Arts & Sciences

You might also like