Академический Документы
Профессиональный Документы
Культура Документы
2
An emeritus professor of public law and government at Columbia, Alan Westin is renowned for his
significant contributions to consumer data privacy and protection. He defined privacy as an individual’s
right “to control, edit, manage, and delete information about them (selves) and decide when, how, and to
what extent information is communicated to others.” His Privacy and Freedom (1967) and Databanks in a
Free Society (1972) were pioneering works that shaped privacy legislation in the US and helped launch
privacy movements in many other countries.
3
Though mobile phone was nonexistent at the time, the famous article of Samuel D. Warren and Louis D.
Brandeis was in response to technological developments (brought about by the invention of the printing
press) such as photography and sensationalist journalism which made it possible to be “shouted from the
rooftops” any information that was previously hidden and private. See 4 Harvard Law Review 193 (1890).
It is available at http://www.law.louisville.edu/library/collections/brandeis/node/225 (accessed on
December 9, 2010)
Limits of Privacy, Etzioni recommends a communitarian approach
to how society construes and handles the privacy paradox, insisting
that there is the other side to the privacy equation. As the world
increasingly grapples with significant public safety and public
health deficits, he enjoins “immoderate champions of privacy” to
drop their “rhetorical excesses” and embrace an approach that is
nourished by the social philosophy that seeks to strike a balance
between rights of individuals and social responsibilities, between
liberty and the common good so that society will not lean too far
towards one direction at the painful expense of the other. He crafts
it succinctly thus:4
6
Also a great book on the subject matter, David H. Holtzman’s Privacy Lost - How Technology is
Endangering Your Privacy frankly admits that privacy is imperiled with intrusive modern technologies. His
taxonomy of violations, seven sins against privacy and ethical commandments to deal with privacy issues
are highly informative. See Privacy Lost - How Technology is Endangering Your Privacy, 2006.
common sense and thoughtful methodology” for any society and to
fall back on legal permissibility only as a last resort, not as a state
policy. But this fails to strike the right chord among civil
libertarians who smell danger in the propositions of
communitarians. According to libertarians, any arrangement that
allows the state to rein in the right of citizenry on whatever
grounds is both deleterious and repugnant, reasoning that a tyrant
may come into government someday and abuse the system with
abandon. Zimmermann, a cyber libertarian, expresses the fear
thus:7
Conclusion
And since the law courts are yet to redraw the ground rules
over this important issue, enacting freedom of information act will
go a long way in dismantling the air of secrecy that pervades
African governments. Though it has to be acknowledged that
having this important piece of legislation is not a one-dose
inoculation, it is trite that the freedom of information act is capable
of restoring a semblance of people’s trust in official actions and
allaying fears that registering mobile telephones will make it
become a tool for oppressing political opponents and imaginary
enemies of the state. As for leaders who abuse the sacred trust
8
See Anne Wells Branscomb’s Who Owns Information?: From Privacy to Public Access, 1994.
9
Further readings in Kevin M. Keenan’s Invasion of Privacy, 2005.
reposed in them to suit for their own selfish interests, they should
be made to face the full wrath of the law.