Professional Documents
Culture Documents
Helen Nissenbaum - A Contextual Approach To Privacy Online
Helen Nissenbaum - A Contextual Approach To Privacy Online
Dædalus
coming up in Dædalus:
On the American Denis Donoghue, Rolena Adorno, Gish Jen, E. L. Doctorow, David
Narrative Levering Lewis, Jay Parini, Michael Wood, William Chafe, Philip
Fisher, Craig Calhoun, Larry Tribe, Peter Brooks, David A. Hollinger,
William Ferris, Linda Kerber, and others Journal of the American Academy of Arts & Sciences
Fall 2011
The Alternative Robert Fri, Stephen Ansolabehere, Steven Koonin, Michael Graetz,
Energy Future Pamela Matson & Rosina Bierbaum, Mohamed El Ashry, James
Helen Nissenbaum
Abstract: Recent media revelations have demonstrated the extent of third-party tracking and monitor-
ing online, much of it spurred by data aggregation, pro½ling, and selective targeting. How to protect pri-
vacy online is a frequent question in public discourse and has reignited the interest of government actors.
In the United States, notice-and-consent remains the fallback approach in online privacy policies, despite
its weaknesses. This essay presents an alternative approach, rooted in the theory of contextual integrity.
Proposals to improve and fortify notice-and-consent, such as clearer privacy policies and fairer informa-
tion practices, will not overcome a fundamental flaw in the model, namely, its assumption that individ-
uals can understand all facts relevant to true choice at the moment of pair-wise contracting between indi-
viduals and data gatherers. Instead, we must articulate a backdrop of context-speci½c substantive norms
that constrain what information websites can collect, with whom they can share it, and under what con-
ditions it can be shared. In developing this approach, the paper warns that the current bias in conceiving
of the Net as a predominantly commercial enterprise seriously limits the privacy agenda.
32
spite their limited results; and why they ally, when the flow of information ad- Helen
should be challenged. Finally, the essay lays heres to entrenched norms, all is well; Nissenbaum
out an alternative approach to addressing violations of these norms, however, often
the problem of privacy online based on result in protest and complaint. In a
the theory of privacy as contextual integ- health care context, for example, patients
rity. This approach takes into considera- expect their physicians to keep personal
tion the formative ideals of the Internet medical information con½dential, yet they
as a public good.6 accept that it might be shared with spe-
cialists as needed. Patients’ expectations
Setting aside economic and institution- would be breached and they would likely
be shocked and dismayed if they learned
al factors, challenges to privacy associated
with the Net are similar to those raised in that their physicians had sold the informa-
the past by other information systems and tion to a marketing company. In this event,
digital media due to their vast capacities we would say that informational norms for
for capturing, stockpiling, retrieving, ana- the health care context had been violated.
lyzing, distributing, displaying, and dis- Information technologies and digital
seminating information. In a flourishing media have long been viewed as threat-
online ecology, where individuals, com- ening to privacy because they have radi-
munities, institutions, and corporations cally disrupted flows of personal infor-
generate content, experiences, interac- mation, from the corporate and govern-
tions, and services, the supreme currency mental databases of the 1960s to the sur-
is information, including information veillance cameras and social networks of
about people. As adoption of the Internet the present day. The Net, in particular, has
and Web has surged and as they have be- mediated disruptions of an unprecedent-
come the primary sources of information ed scale and variety. Those who imagined
and media for transaction, interaction, and online actions to be shrouded in secrecy
communication, particularly among well- have been disabused of that notion. As dif-
off people in technologically advanced so- ½cult as it has been to circumscribe a right
cieties, we have witnessed radical pertur- to privacy in general, it is even more com-
bations in flows of personal information. plex online because of shifting recipients,
Amid growing curiosity and concern over types of information, and constraints
these flows, policy-makers, public-interest under which information flows. We have
advocates, and the media have responded come to understand that even when we in-
with exposés and critiques of pervasive teract with known, familiar parties, third
surreptitious tracking, manipulative be- parties may be lurking on the sidelines, en-
havioral advertising, and ½ckle privacy gaged in business partnerships with our
commitments of major corporate actors. known parties. Information about us that
In Privacy in Context: Technology, Policy, once may have languished in dusty ½le cab-
and the Integrity of Social Life,7 I give an ac- inets is now pinpointed in an instant
count of privacy in terms of expected flows through search queries by anyone any-
of personal information, modeled with the where. In these highly informatized (that
construct of context-relative informational is, information-rich) environments, new
norms. The key parameters of information- types of information infuse our every ac-
al norms are actors (subject, sender, recip- tion and relationship.
ient), attributes (types of information), We are puzzled by the new and differ-
and transmission principles (constraints ent types of information generated online,
under which information flows). Gener- some of it the by-products of our activi-