Abstract
This chapter considers how surveillance modalities affect privacy. The modalities include government sanctioned CCTV or social networks, each of which create tensions and concerns between the data subject-citizen and the data processor.
The chapter focuses on the wide uses of surveillance and considers the sociological and philosophical responses to the burgeoning levels of surveillance and its effect on personal liberty, especially, when the prevailing political view that increased surveillance and subsequent incursions of personal liberty is a societal good. The chapter also concentrates on autonomy and related privacy issues that are associated with the acquisition of images or audio recordings by selected agencies and how those images or recordings are used or disseminated.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Garfinkel (2000), p. 65.
- 2.
Sullivan (2014).
- 3.
Chesterman (2011), p. 12.
- 4.
- 5.
Welinder (2012).
- 6.
- 7.
Ibid (2003).
- 8.
Brin (1998).
- 9.
Lyon (2003), p. 15 op cit.
- 10.
Agamben (2005).
- 11.
Lyon (2003), p. 34 op cit.
- 12.
Marx (1996), p. 40.
- 13.
Lyon (2003), p. 45 op cit.
- 14.
Tagg (1988).
- 15.
Ibid, pp. 85–87.
- 16.
Whitehead (2013).
- 17.
Solove (2012).
- 18.
Morrison (2015).
- 19.
See Sect. 5.3.
- 20.
Notting Hill Carnival; Football Supporters.
- 21.
See Solove (2011).
- 22.
Ibid.
- 23.
Ibid, p. 26.
- 24.
Chesterman (2011), p. 4.
- 25.
Ibid, p. 12.
- 26.
Cited by Chesterman (2011).
- 27.
USA PATRIOT Act: The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001. See Edgar (2017).
- 28.
Agamben (2005) op cit.
- 29.
Whitehead (2013) op cit.
- 30.
However, more precisely, public CCTV for surveillance purposes is regulated by the Surveillance Camera Commissioner, who encourages compliance to the surveillance camera code of practice; but does not have any powers of enforcement, and any breaches of the code would likely breach human rights law and not data protection law. Moreover, CCTV in shops and company premises needs to comply with data protection law. Whether public CCTV is affected by the Human Rights Act 1998 is another matter that need not be of concern here. Ideally, the Canadian approach would address any contentious use of CCTV in public.
- 31.
To be discussed.
- 32.
Chesterman (2011), pp. 151–153 op cit.
- 33.
Ibid, p. 242.
- 34.
Warren and Brandeis (1890).
- 35.
Chesterman (2011), p. 246 op cit.
- 36.
Similarly, Solove (2011), pp. 24–25 op cit [succinctly notes that] “privacy can be invaded by the disclosure of your deepest secrets. It might also be invaded if you’re watched by a Peeping Tom, even if no secrets are ever revealed to anyone”.
- 37.
Chesterman (2011), p. 250 op cit.
- 38.
- 39.
Westin (1967).
- 40.
Ibid, p. 31.
- 41.
Gavison (1980), p. 423.
- 42.
Nissenbaum (2010), p. 70.
- 43.
Wacks (1989, revised 1993), p. 14.
- 44.
See Dworkin (1988, reprinted 1997), p. 14.
- 45.
Nissenbaum (2010) op cit.
- 46.
Ibid, p. 231.
- 47.
Dworkin (1988, reprinted 1997), p. 12 op cit.
- 48.
Chesterman (2011), p. 251 op cit.
- 49.
Solove (2011) op cit.
- 50.
Ibid, pp. 100–101.
- 51.
Whitehead (2013), p. 107 op cit.
- 52.
Brin (1998), p. 334.
- 53.
Schwartz and Solove (2014).
- 54.
Brennan and Berle (2011), p. 146.
- 55.
R v Loveridge.
- 56.
Douglas & Anor v Northern and Shell Plc & Anor.
- 57.
Roddy (a minor); Torbay Borough Council v News Group Newspapers. This case centred on whether a 17 year old, who had a child at 13, had reached a level of maturity to decide what was private. My italics.
- 58.
Human Rights Act (HRA) 1998.
- 59.
Von Hannover v Germany. My italics.
- 60.
Bruggeman and Scheuten v Federal Republic of Germany.
- 61.
- 62.
van der Ploeg (2005).
- 63.
Solove (2011), pp. 157–161; pp. 167–170 op cit.
- 64.
The ‘politicisation of bodily integrity’ is usually gender specific and relates to the women’s rights discourse. I have used the term to broaden its scope and apply it to the biometric discourse in terms of consent and self-determination, which resonates within the women’s rights discourse.
- 65.
Mordini and Petrini (2007), p. 10.
- 66.
See Agamben (2005).
- 67.
Whitehead (2013) op cit, p. 125.
- 68.
See Sect. 2.2.
- 69.
Whitehead (2013), p. 4 op cit.
- 70.
Ibid, pp. 219–232.
- 71.
Nelson (2011).
- 72.
Ibid, p. 3.
- 73.
The term ‘confluence’ is used to convey a mixture that cannot easily be separated.
References
Agamben G (2005) State of exception (trans: Attell K). The University of Chicago Press, Chicago and London
Brennan P, Berle I (2011) The ethical and medical aspects of photo-documenting genital injury. In: Gall J, Payne-James J (eds) Current practice in forensic medicine. Wiley-Blackwell, Chichester, p 146
Brin D (1998) The transparent society: will technology force us to choose between privacy and freedom. Addison-Wesley, Reading
Bruggeman and Scheuten v Federal Republic of Germany [1981] EHRR 244 at paragraph 56. My italics. http://www.bailii.org/eu/cases/ECHR/1977/1.html. Accessed 8 Aug 2019
Chesterman S (2011) One nation under surveillance: a new social contract to defend freedom without sacrificing liberty. Oxford University Press, Oxford, p 12
Douglas & Anor v Northern and Shell Plc & Anor [2001] QB 967, [2001] UKHRR 223, [2001] 1 FLR 982, [2001] EMLR 9, [2001] FSR 40, [2001] 2 All ER 289, [2001] HRLR 26, 9 BHRC 543, [2001] 2 WLR 992, [2002] 1 FCR 289, [2000] EWCA Civ 353, at 126. http://www.bailii.org/ew/cases/EWCA/Civ/2000/353.html. Accessed 8 Aug 2019
Dworkin G (1988, reprinted 1997) The theory and practice of autonomy. Cambridge University Press, Cambridge, p 14
Edgar TH (2017) Beyond Snowden: privacy, mass surveillance and the struggle to reform the NSA. Brookings Institution Press
El-Abed M et al (2010) A study of users’ acceptance and satisfaction of biometric systems. IEEE International Carnahan Conference on Security Technology (ICCST), 2010, San Francisco, United States. https://hal.archives-ouvertes.fr/hal-00991086. Accessed 8 Aug 2019
Garfinkel S (2000) Database nation: the death of privacy in the 21st century. O’Reilly & Associates Inc, Sebastopol
Gavison R (1980) Privacy and the limits of the law. Yale Law J 89:421, 423. https://www.jstor.org/stable/795891?seq=1#page_scan_tab_contents. Accessed 8 Aug 2019
Gregory P, Simon MA (2008) Biometrics for dummies. Wiley Publishing Inc., Indianapolis
Human Rights Act (HRA) 1998. http://www.opsi.gov.uk/acts/acts1998/ukpga_19980042_en_1. Accessed 8 Aug 2019
Lyon D (2003) (reprinted 2004 & 2008) Surveillance after September 11. Polity Press, Cambridge
Lyon D (2007) (reprinted 2011) Surveillance studies: an overview. Polity Press, Cambridge
Marx GT (1996) Ethics for the new surveillance. In: Bennett CJ, Grant R (eds) 1996 Visions of Privacy. University of Toronto Press, Toronto, p 40
Mordini E, Petrini C (2007) Ethical and social implications of biometric identification technology. Ann Ist Super Santa 43(1):5–11. http://www.iss.it/binary/publ/cont/STAMPA%20ANN_07_02%20Mordini.1180428288.pdf. Accessed 8 Aug 2019
Morrison K (2015) Survey: many users never read social networking terms of service agreements. http://www.adweek.com/socialtimes/survey-many-users-never-read-social-networking-terms-of-service-agreements/620843. Accessed 8 Aug 2019
Nelson LS (2011) America identified: biometric technology and society. Massachusetts Institute of Technology, Massachusetts
Nissenbaum H (2010) Privacy in context: technology, policy and the integrity of social life. Stanford University Press, Stanford, p 70
R v Loveridge, EWCA Crim 1034, [2001] 2 Cr App R 29 (2002)
Roddy (a minor); Torbay Borough Council v News Group Newspapers [2004] EMLR 127, [2004] 2 FLR 949, [2004] Fam Law 793, [2003] EWHC 2927 Fam), [2004] 1 FCR 481, at 36. http://www.bailii.org/ew/cases/EWHC/Fam/2003/2927.html. Accessed 8 Aug 2019
Schwartz PM, Solove DJ (2014) Reconciling personal information in the United States and European Union. Calif Law Rev 102:877. http://scholarship.law.gwu.edu/faculty_publications/956. Accessed 8 Aug 2019
Solove DJ (2011) Nothing to hide: the false trade off between privacy and security. Yale University Press, New Haven and London
Solove DJ (2012) Privacy self-management and the consent dilemma. Harv Law Rev 126:1880 (2013); GWU Legal Studies Research Paper No. 2012-141; GWU Law School Public Law Research Paper No. 2012-141. http://ssrn.com/abstract=2171018. Accessed 8 Aug 2019
Sullivan A (2014) Mistaken identity. https://www.facebook.com/TheDishBlog/posts/837738439627490. Accessed 8 Aug 2019
Surveillance Camera Commissioner. https://www.gov.uk/government/organisations/surveillance-camera-commissioner. Accessed 8 Aug 2019
Tagg J (1988) The burden of representation: essays on photographies and histories. Palgrave-Macmillan, Basingstoke
van der Ploeg I (2005) Biometric identification technologies: ethical implications of the informatization of the body. Biometric Technology & Ethics, BITE Policy Paper no.1 (unpaginated draft paper). http://www.academia.edu/6039558/Biometric_Identification_Technologies_Ethical_Implications_of_the_Informatization_of_the_Body. Accessed 8 Aug 2019
Von Hannover v Germany Application no. 59320/00 Judgement 24 June 2004 at paragraph. 50. http://www.worldlii.org/eu/cases/ECHR/2004/294.html. Accessed 8 Aug 2019
Wacks R (1989) (revised 1993) Personal information: privacy and the law. Clarendon Press, Oxford, p 14
Warren SD, Brandeis LD (1890) The right to privacy (the implicit made explicit). Harv Law Rev:193–220. https://www.jstor.org/stable/i256795. Accessed 8 Aug 2019
Welinder Y (2012) A face tells more than a thousand posts: developing face recognition privacy in social networks. http://jolt.law.harvard.edu/articles/pdf/v26/26HarvJLTech165.pdf. Accessed 8 Aug 2019
Westin AF (1967) Privacy and freedom. Bodley Head, London
Whitehead JW (2013) A government of wolves: the emerging American police state. Select Books Inc, New York
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Berle, I. (2020). Privacy and Surveillance Surveyed. In: Face Recognition Technology. Law, Governance and Technology Series, vol 41. Springer, Cham. https://doi.org/10.1007/978-3-030-36887-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-36887-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-36886-9
Online ISBN: 978-3-030-36887-6
eBook Packages: Law and CriminologyLaw and Criminology (R0)