Hostname: page-component-745bb68f8f-g4j75 Total loading time: 0 Render date: 2025-02-10T06:01:47.910Z Has data issue: false hasContentIssue false

FREE SPEECH, PRIVACY, AND AUTONOMY

Published online by Cambridge University Press:  04 May 2021

Adam D. Moore*
Affiliation:
Philosophy, University of Washington, USA
Rights & Permissions [Opens in a new window]

Abstract

While autonomy arguments provide a compelling foundation for free speech, they also support individual privacy rights. Considering how speech and privacy may be justified, I will argue that the speech necessary for self-government does not need to include details that would violate privacy rights. Additionally, I will argue that if viewed as a kind of intangible property right, informational privacy should limit speech and expression in a range of cases. In a world where we have an overabundance of content to consume, much of which could be called “information pollution,” and where there are numerous platforms to broadcast one’s expressions, it is increasingly difficult to maintain that speech should trump privacy.

Type
Research Article
Copyright
© Social Philosophy & Policy Foundation 2021

I. Introduction

Imagine there was a device that could record everyone’s thoughts, words, and activities, and post searchable, updated, databases to the web on a daily basis.Footnote 1 In addition to the two quintillion bytes of data created every day, we could add each thought, expression, feeling, and visual from every single person existing. Doing away with intellectual property laws, which restrict access to works of all types, would free up even more content to consume. Finally, we could require that all intangible works be backed up in forms that are not easily degradable. These works could be shared globally in various formats so that widespread access is possible. Free speech and content access maximalists may regard this as a welcome utopian vision.

Consider a different vision of the future, a world where technology promotes the protection of privacy and intellectual property. Suppose technological improvements, including advancements in cryptography and outerwear, have produced near perfect privacy protections. Each individual may wear an anti-monitoring suit that completely shields him or her from the prying eyes and ears of others. Court enforced contracts along with near unbreakable encryption algorithms protect informational privacy. In this world, algorithms search through all content verifying that any bit of personally identifiable information found has been justifiably shared. Legally binding deletion and “take-down” orders are sent to those who have shared personally identifiable information about others without explicit permission. Imagine that individuals and intellectual property owners had stronger versions of the EU’s data protection rights of notice, consent, control, and deletion.Footnote 2 For example, whether considering private information or a copyrighted poem, owners of this content could withdraw consent and require the possessor to delete or return the material. In this world of access minimalism, we may wonder if speech and expression would be impoverished.

Freedom of speech is necessary for individual autonomy and self-government, or so we are told. If so, restrictions on speech and expression must have compelling, weighty, and forceful justifications.Footnote 3 I will argue on grounds of autonomy, however, that privacy is equally important. As specific acts of speech and expression become less significant, because of the sheer amount of content now available coupled with numerous distribution platforms, individual privacy acquires relative strength in comparison. Additionally, autonomy arguments in favor of speech are not without limits. Even absolutists about free speech and expression rarely argue that speech should trump all rights.Footnote 4 Your speech rights don’t entail the liberty to paint your expression on my wall with my paint. Additionally, your speech rights don’t justify the copying and distribution of my copyrighted song (assuming, of course, that the moral and legal arguments for copyrights are justified). Things get tricky when considering public-facing businesses such as cake-baking shops or protests in shopping malls.Footnote 5 Nevertheless, when viewed as a kind of intangible property right, informational privacy provides a compelling foundation for further prohibitions or regulations on speech and expression. In most cases, however, such limits will not substantially affect the message being conveyed and thus will not overly impact the autonomy-producing or autonomy-protecting properties of free speech.

II. The Autonomy Argument for Speech and Expression

Free speech is typically taken to cover “the spoken word, but also the written word as well as conduct conveying a message and expression through symbols, demonstrations, and so on.”Footnote 6 There are almost no true free speech absolutists. Every theorist who characterizes herself as an absolutist removes specific kinds of speech or expression from protection. “Absolutism,” in this case, means “without exception given a list of exceptions” already built in to the definition of free speech some “absolutist” is advancing. I will be arguing that we should view privacy as one of these exceptions. Few would argue that instances of workplace quid pro quo sexual harassment, blackmail, slander/libel, or conspiracy to commit a crime should be protected speech or expression. Swinging a baseball bat at someone, no matter how expressive, is not something countenanced on free speech grounds. Sometimes regulations such as time and place restrictions will suffice.Footnote 7 Prohibiting someone from expressing themselves over a loud speaker at 2 a.m. in a residential neighborhood seems perfectly reasonable. Restrictions on nude dancing in a public park seem likewise agreeable, especially when noting that the ideas expressed could be voiced at another time or place.Footnote 8 Sometimes prohibiting speech based on the content of the expression is justifiable. Expressions that describe how to mass produce aerosolized smallpox is an example of expression that we may forbid.Footnote 9 While contentious and difficult to define, many free speech champions would agree that “sexual harassing speech” is justifiably prohibited.Footnote 10 Additionally, setting aside the exception of fair use, speech that violates intellectual property rights may be justifiably suppressed.Footnote 11

Nevertheless, we are told, freedom of speech is the lifeblood of democracy. The famous First Amendment scholar, Alexander Meiklejon, noted “self-government can exist only insofar as the voters acquire the intelligence, integrity, sensitivity, and generous devotion to the general welfare that, in theory, casting a ballot is assumed to express … [citizens] must understand the issues which … face the nation, … pass judgment upon the decisions our agents make upon those issues, … [and] we must share in devising methods …” to solve these problems.Footnote 12 Other free speech scholars offer different considerations. Consequentialists such as John Stuart Mill argue that free speech is essential for truth discovery, provides a check on the power of government, and promotes the virtue of toleration.Footnote 13 Deontological scholars such as Thomas Scanlon maintain that speech and expression are essential for individual autonomy, which in turn is necessary for the moral bindingness of contracts, including the social contract.Footnote 14

Wrapped together, these considerations fall nicely under Meiklejohn’s idea of self-government. To be a self-governor, individuals must have developed the required capacities to be rational project pursuers, capable of logical thought, planned actions, and considered judgments.Footnote 15 At its core, this aspect of self-government concerns the foundations of moral agency. Aside from the autonomy-building aspects of free speech and expression, there are also autonomy-protecting considerations. In order to make informed decisions and judgments about politicians, issues, and policy, individuals must be able to access and process the information needed. “Consent of the governed” must, in some sense, mean “informed consent.” If citizens are the source and ultimate arbiters of governmental power, then speech, expression, and access to the information necessary for self-government is important. First Amendment scholar Martin Redish largely agrees with Meiklejohn but substitutes the phrase “self-realization” for “self-government.”Footnote 16 Self-realization, according to Redish, includes the First Amendment values of truth seeking and power checking, as these are necessary for the development of an individual’s capacities, powers, and rational project pursuit. Additionally while the connections are less clear, autonomy arguments for free speech also include artistic expressions, such as works of fiction or paintings and sculptures, as important for self-realization and self-government.Footnote 17

III. Against the Autonomy Argument in Favor of Speech

But as noted in the opening, access to content is not a problem. There is more content available today than at any time in the past.Footnote 18 Obtaining a platform for expression is also not a problem. No longer wedded to the printed page or a narrow bandwidth of radio or television frequencies, individuals have a vast array of options for broadcasting their own expressions. Being heard beyond a fairly narrow group of family, friends, and acquaintances may be a worry, especially since the amount of content being produced and made available is staggering. But on the other hand, being heard by a larger group of people was not an issue in the 1950s, 1850s, or before. The autonomy-producing aspects of free speech do not seem to rely on reaching a mass audience unless we are considering a free press and government oversight.

Much has changed about content production and access over the past several decades. Speech, expression, and content used to be costly to produce and distribute. Those in production and distribution industries had to be fairly sure that what they were producing was worthy of the costs. Failure meant lost revenue, market share, and jobs. Quality controls and market analysis, including sales projections, served as gatekeeping mechanisms. Generally, content of all sorts was created by professionals. These individuals made a living, or attempted to make a living, by honing their craft and creating works that had commercial and artistic value.Footnote 19 These considerations, along with the fierce competition to secure production and distribution contracts, tended to ensure that the expressions created had some connection to quality.

Increasingly, anyone can instantiate and distribute virtually any kind of content. To instantiate an idea, set of ideas, feeling, theory, and so on, is to produce a physical copy—extended in space and time with a mass—external to the human mind. For example, without taking a stand on the metaphysics of ideas, when a recipe is instantiated it could be written down on paper or chiseled into stone. Managers, distributors, and other gatekeepers of quality are no longer needed, and in many areas of content production and distribution, they are irrelevant. As an example, consider the explosion of academic predatory publishing practices and “pay-to-play” journals and conferences.Footnote 20 Even in a domain focused on quality of research, a domain dedicated to the quest for truth and the advancement of knowledge, we have increasing amounts of what could be called information pollution. A similar point can be made in various areas of news production.Footnote 21

While most kinds of speech and expression could serve self-government, either autonomy-building or autonomy-protecting, it is also true that these expressions are almost entirely fungible or replaceable.Footnote 22 There are numerous instantiations of most content forms that could be traded for a different instantiation or different content altogether without loss. Consider, for example, all the different cartoon shows available where one series could be substituted for another with no loss in self-government. Here I am not imagining that the creators of cartoons were told they could no longer produce a specific series, as that would impact self-government. Rather, I am imagining a counterfactual world where these creators had simply created, of their own volition, a different series of content. No one’s life would be obviously disadvantaged if The Roadrunner show had never occurred. Our entertainment time could have easily been filled up with Bugs Bunny cartoons, comic books, or other activities.

The claim being advanced is that almost all physical instantiations of ideas are fungible. Aside from the rare physical item like the Mona Lisa, the ideas, emotions, and expressions could be instantiated in a different way. Sometimes even a mere copy of an original instantiation will suffice. The replaceability of specific copies with different ways of expressing what was originally physically codified is also true of entire classes of content. Just imagine if motion picture technology had never been invented or if no one ever created progressive rock music. So, we would read more books, attend more plays, and immerse ourselves in jazz music. Yes, progressive rock is expressive, but this entire category of content could be replaced by expressions that equally serve autonomy and self-government. To put the point another way, there are vast areas of expression that you and I don’t consume. Suppose all you listen to is classical music and I don’t own a television or attend movies. Even without accessing this content our lives could go perfectly fine in terms of self-government. So it would seem that almost all physical instantiations of various ideas and emotions are fungible with respect to self-government.

This is not true for certain categories of ideas. For example, while there might be many different ways to express or convey the germ theory of disease, there is no equal substitute for this theory or set of ideas. It is not fungible. It is not as if human life would have been, more or less, unaffected had this theory never been discovered or distributed. Or consider the various ways someone could instantiate how antibiotics work within the human body. There could be textbook-written explanations, plays, musicals, and even pantomimes that instantiate these ideas. While each instantiation is fungible, the set of ideas is not. Currently there is no equally efficient or effective alternative to using antibiotics.

Fungible expressions of non-fungible ideas, theories, or feelings are generally necessary for self-government. This latter class includes scientific discoveries, philosophical theories, math, logic, and the like. For example, there are lots of ways to present Locke’s theory of consent as a legitimate source of governmental power, but this theory is not fungible. It is not like we could substitute a consent theory of governmental legitimacy with a theory of “might makes right” without loss to self-government. At one extreme we have political, philosophical, and social arguments or information clearly important for self-government while at the other we have communication with little or no value related to self-government. Also note that this argument against autonomy-based justifications for speech is not dependent on there being clear and distinct categories of fungible and non-fungible. Canonical examples in each category may give way to disputed borderline cases.

To determine the worth or value of an expression or a category of expression we ask what is lost in terms of self-government or autonomy if the expression or category did not exist. Again, if progressive rock did not exist we would be just fine. This is not true when we consider numerous areas of scientific endeavor that directly and positively impact human health and well-being. For example, in Barns v. Glen Theater, Inc. a U.S. court noted that while nude dancing is expressive, it is “marginally and on the outer perimeters” of First Amendment protection.Footnote 23 On my view, the distinction between high-value, low-value, and no-value expression is similar to information that is important, less relevant, or irrelevant to democracy and self-government. Non-fungible ideas that promote or maintain human health and well-being would fall into high-value speech. Low-value and no-value speech would be fungible content that is irrelevant to the maintenance or promotion of human health and well-being. While entertainment, in general, might be important for health and well-being, any specific instantiation or area of entertainment could be replaced without loss.Footnote 24

We must also be on guard to not fall prey to packing an otherwise low-value expression or category with important information. Imagine a cartoon that includes a joke about how finding a workable form of communism is like attempting to square the circle. The practicality of communism is an important consideration and one that is relevant to self-government. This content does not, however, have to be instantiated in a cartoon. Similarly, the expressive content found in swinging a baseball bat, no matter how profound, does not need to be instantiated in a swing toward someone’s head.

So, in general, it is simply an overstatement to claim that free speech and expression is necessary for autonomy and self-government. Vast areas of content are either fungible or totally irrelevant in service of this goal. As I will argue in the next section, most private information will fall into this latter category. Additionally, the information necessary for individual autonomy building and autonomy maintenance could be instantiated in ways that do not impact individual privacy rights. For example, pictures may be modified so that specific individuals cannot be identified.

A critic might counter with the view that there are instances of speech that should be protected even though the content is clearly fungible—for example, passing out Bibles on the street or publishing cartoons of a deity.Footnote 25 First note that the fungibility argument being offered does not claim that those who wish to pass out bibles on the street or publish cartoons of a deity should be prohibited, unless these expressions violate privacy, property, or some other right. If the individual passing out bibles does not own the copyright and is distributing pirate copies, then this action can be prohibited. Artists who create depictions of a deity don’t necessarily violate any rights, and thus such expressions, while fungible, do reflect the autonomy of the artist.Footnote 26 Second, these cases strengthen, rather than undermine, my point about fungibility and how autonomy arguments fail to provide overly strong support for free speech. If there were no individuals willing to pass out bibles on the street, we would still have access to religious ideas. Thus, our autonomy cannot be undermined by this particular lack of access.

Free speech champions might also counter with the view that by insisting on robust protections for all speech and expression that falls within the “protected” class, we guarantee individual autonomy and self-government. On this view, broad protection for free speech is sufficient for self-government. But imagine a society with numerous media sources and no government restrictions on speech. Each source, however, decides to publish “fluff” stories and avoid political or philosophical issues. In this case we could have total freedom of speech and shoddy democratic institutions built upon false information or no information. Imagine a society without serious books, plays, music, a society dominated by the drama of social media flame wars, or a society awash in information pollution. Individuals who inhabit these societies may have lots of content to consume, but little real autonomy. Robust freedom of speech is not sufficient to guarantee a robust democracy or individual autonomy.

Near absolute freedom of speech—speech that trumps privacy considerations, for example—is also not necessary for self-government. Consider our counterparts in the EU who are constrained by privacy laws and the right to be forgotten. The EU’s General Data Protection Regulation (GDPR) requires consent, breach notification, information access, data erasure, portability, and privacy by design. Data subjects must explicitly consent to the use and purpose of how their information will be processed. Data subjects must be notified when a breach, or unauthorized access, has occurred. Data subjects have the right to know if personal information about them is being held, used, or processed by data controllers. Individuals, with various exceptions, have the right to be forgotten. Data subjects can have “… the data controller erase his/her personal data, cease further dissemination of the data, and potentially have third parties halt processing of the data.”Footnote 27 It would be difficult to demonstrate that the individuals living in the EU are impoverished in terms of autonomy and self-government by comparison to a superior American standard. Thus, the most a defender of speech can advance is that some areas of speech, expression, or content are important for autonomy and self-government while the vast majority of communication is largely irrelevant and replaceable.

IV. Privacy, Autonomy, and Contracts

While privacy has been defined in many ways over the last century, I favor what has been called a “control”-based definition of privacy. A right to privacy is a right to control access to, and uses of, places, bodies, and personal information.Footnote 28 A serviceable definition of “personal information” is “any information relating to an identified or identifiable natural person … one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity.”Footnote 29

Numerous privacy scholars have argued that there are close connections between privacy rights and human health and well-being.Footnote 30 Household overcrowding studies and prison overcrowding research demonstrate that limiting an individual’s ability to withdraw causes an increase in aggression, depression, stress levels, recidivism, and all while suppressing the immune system.Footnote 31 Monitoring your children too much increases the probability of early drug use, dropping out of school, teen-pregnancy, and violence.Footnote 32 Businesses that use various covert and overt surveillance techniques tend to have higher employee turnover. Employees view various forms of electronic monitoring as harmful intrusions of privacy, and this perception increases aggression, destructive behavior, and employee turnover.Footnote 33 Workplace drug testing deters highly qualified workers from applying, has a negative impact on workplace morale, and has been indicated in reduced productivity.Footnote 34 While the rituals of coming together and leave-taking or asserting privacy are largely culturally determined, it would seem the need is not.

Additionally, many privacy theorists argue that privacy is associated, in some central way, with autonomy and self-government.Footnote 35 To be sure, dealing with depression, aggression, and different sorts of risky behavior, has a negative impact on development and outlook. Or consider, for example, information-sharing practices that allow for the creation and maintenance of stable social relationships. What is shared with a lover is not shared with classmates or one’s children. These different relationships depend on norms of informational and physical access, and thus directly affect autonomy, self-creation, and identity. It is within these acts of control and maintenance that individuality forms. Moreover, being watched changes a given activity or behavior from one of private discovery, creation, or enjoyment and pushes it toward performance.Footnote 36 Engaging in self-reflection and criticism, which is not typically conducted while others are watching, allows for greater self-knowledge.Footnote 37 Thus, privacy also provides a check on political power and social pressure. Whereas free speech may provide sunlight on a politician’s behavior in the service of accountability and oversight, privacy rights mark out zones where access is left to the individual.

Privacy affords individuals the moral space to engage in autonomy-building practices. “Both animals and humans require, at critical stages of life, specific amounts of space in order to act out the dialogues that lead to the consummation of most of the important acts of life.”Footnote 38

Infants are without privacy. As infants grow into toddlers and begin to communicate with language, they express wishes for separation at times. This process continues as children grow into adults.Footnote 39 Toddlers and small children begin requesting privacy as they start the process of self-initiated development. More robust patterns of disassociation continue as children enter puberty. There is now fairly compelling evidence linking unstructured and unsupervised free time for kids with positive health outcomes.Footnote 40 Finally, as more-fully formed young adults emerge, the walls of privacy have hardened and access points are maintained vigorously.

Critics have challenged the connection between privacy and autonomy, noting that violating someone’s privacy does not necessarily undermine autonomy.Footnote 41 Consider a case of covert surveillance (the covert peeping Tom) where the individual being watched will never come to know of the surveillance. First, note that the presumed disconnect between privacy and autonomy does not seemingly hold true of kids. Covert surveillance is perceived as parental disinterest and is associated with various health problems already mentioned. More generally, even in a case of covert monitoring, it would be hard to maintain that the surveillance target is leading a fully autonomous and self-directed life. For example, the target would have the false belief that she was not under surveillance—a fact completely controlled by the whims of the watcher. Moreover, as defined above, privacy is the right to control access to and uses of places, locations, and personal information. To the extent that our rights, like property and liberty rights, promote autonomy, any violation of these rights would undermine the target’s autonomous choices. Finally, there is no need to claim that privacy is necessary for autonomy in every instance. As with free speech, we could simply highlight how privacy is important for, and contributes to, individual autonomy.

In the remainder of this section I will argue that regardless of a commitment to strong rights to speech and expression, informational privacy rights should trump speech rights in a range of cases. Supporting the contract arguments that follow are the connections between privacy, autonomy, and flourishing, along with the assumption that individuals have a general right to bind themselves with agreements and contracts. The argument offered is not a hypothetical contract argument where we should treat personal information as property because, hypothetically, we would do so in a range of cases. Rather, what the argument shows is that it is possible to construct cases where privacy and contracts justifiably limit speech.Footnote 42 These actual contracts, like doctor/patient information sharing agreements, ground further restrictions that even free speech maximalists should countenance.

As noted in the opening, individual property rights may justifiably limit freedom of speech. Assume that I own a can of paint and a garage wall. Your right to free speech does not trump my rights to control the can of paint or the garage wall. If you were to seize the paint and start painting your original expression on my garage wall, you could be justifiably stopped and the expression removed. You may even be liable for damages. Similarly, your rights to speech do not trump my copyrights to a poem. Imagine I own a poem and you decide to paint my poem on your wall with your paint.Footnote 43 Again, this activity could be justifiably stopped using appropriate levels of force if necessary.

Consider an even more extreme case. Suppose you wake up one morning to find yourself strapped down with me readying a tattoo gun. Struggling against your restraints you ask what is going on and I proclaim “I am exercising my rights to free speech. I am going to tattoo ‘Adam is God’ on your forehead.” Again, I think it is fairly clear that my rights to free expression do not trump your self-ownership or body rights. But rather than a case of compelled instantiation, where I force you to be a vehicle for my expression, imagine we contracted for this service. Suppose you freely agree that in exchange for allowing me to tattoo an expression on your forehead and your assurances that the expression would not be removed or altered, I would pay you one million dollars. With no other mitigating relevant factors, such as your being under duress, it would seem that the resulting contract would be morally and legally binding.

A sci-fi twist to this case reveals an important feature. Suppose that Smith has telepathically and temporarily seized control of your body. You are a helpless spectator as Smith controls his body and your body as well. Smith thinks the tattoo proposal for you is a great idea. Even better is when Smith has your body transfer the one million dollars to his bank account. While there might be numerous ethical aspects to this case, the one I am interested in has to do with the moral bindingness of the contract between you, as you are controlled by Smith, and me regarding the tattoo and the million dollars. Given that you did not agree to the terms of the contract—it was actually Smith—you are not morally bound to its terms.

Morally binding contracts presuppose prior entitlements or at least legitimate possession joined with rights to determine downstream uses. The difference between these cases, the difference that makes a difference in the moral bindingness of the relevant contracts, is that in the former case both parties had legitimate entitlements to the items in question. Assuming that individuals have a general right to make contracts and that contracts in certain conditions are morally binding, we may arrive at the view that in the first case your uncoerced agreement regarding an item you own or are entitled to control generates a morally binding contract. This is not true of the second case. One might be drawn to the view that mere legitimate possession could ground justified contracts or agreements. But, if I let you borrow my car you may legitimately possess it and yet lack the relevant rights to bind others with contracts that determine the downstream uses of the car. Similarly, if you legitimately possess something that is unowned—the ground you are standing on, suppose—it is not at all clear that your mere possession could ground contracts over downstream uses of the land you legitimately possess.

If private information is owned like your leg or a poem, then it would be possible to contract regarding access to, and downstream uses of, this information.Footnote 44 Sometimes we allow access and limited use of our own personal information, but retain various rights. Other times, we transfer all our rights to control our own personal information to other individuals, groups, or even corporations. If private information is not owned, but rather legitimately possessed, including the relevant rights of future control, then it would also be possible to contract over access to, and downstream uses of, this information. These contracts could provide justified limits on freedom of speech on both private and public actors.

Elsewhere I have argued that informational privacy is a kind of intangible property right where allowing access does not entail the forfeiture or waiving of rights to control downstream uses of the information in question.Footnote 45 Rather than repeating these arguments, I will consider a different justification. Imagine, once again, a world where individuals use anti-monitoring suits and completely sever the links between their real identity, both physical and informational, and their public-facing avatar. When I walk into a room, you don’t see me; you see a projection that I want you to see. You don’t hear my real voice, you hear an altered voice. You can’t tell my age, race, sex, gender, height, weight, or any personal information. All internet browsing patterns, phone GPS information, video surveillance records, and so on, are also de-linked from my real self. In fact, suppose that I could obfuscate all of this information with ever-changing avatars along with phone apps and browsers that broadcast misinformation. Perhaps upon giving you my de-encryption code you could see the real me while others nearby would see my avatar. Such secrecy may be odd, but it does not appear to be immoral. I could just as easily remain hidden on my thousand-acre estate, reject using any technology that could collect personal information, pay with cash, produce my own food, and limit interaction with outsiders to protect privacy. As long as I pay my taxes and obey the law, I would owe society no further access.

Now suppose that you have heard that someone with one of my avatars has had an interesting life and you would like to write a story. I agree to share some exploits but only on the conditions that you do not reveal my true identity and that I am paid a small fee. Being cautious, suppose I even insist on seeding my story with some irrelevant misinformation to defeat any re-identification algorithms that may be used to discover who I am. I sign, you sign, and it would seem that we have a binding contract. While there are many factors needed to generate contracts that are morally binding, including that no one is forced to participate, one important factor is that I own or have the relevant rights to the information I am sharing with you. The information is about me and it is not fictional or taken from someone else. Checking into some of the details I share, you conclude that there is, in fact, good reason to believe that I have shared authentic personal information. In this case, if you were to violate the terms of our agreement, use re-identification algorithms to determine my real identity, and publish my name and address along with my stories, you would have done something immoral and perhaps illegal.Footnote 46

Imagine that the information was truthful but not about me. Suppose after weeks of recording my stories and taking notes you come to realize that I am a fraud.Footnote 47 The stories I am recounting actually come from J. S. Mill’s autobiography. The moral bindingness of our contract would seem to be undermined and the fee need not be paid. Rather than being about Mill, imagine that the stories I recount were total fiction. Looking closely at the details you deduce that I am not just taking liberties with the story line, but that the events described could have never happened. Again, it seems that the moral bindingness of our contract will have been undermined. The contract, it would seem, would have explicitly stated or implicitly assumed that the stories shared were not fictional or about someone else.

The argument structure I have pursued is a kind of back-door argument for viewing informational privacy as a kind of property right. We start with a case where our moral intuitions lean the same way. For example, Fred shares his authentic medical history with Ginger, and she agrees to keep everything about the interaction private. What grounds the moral bindingness of this contract is that the bargaining situation is fair, there are no threats, coercive offers, fraud, and the like, and Fred owns or has the relevant rights over the information in question. Fred has the relevant rights that are needed for binding contracts over his personal information due to the connections between privacy, autonomy, and well-being. Note that in the typical case, the connections between privacy, autonomy, and well-being do not hold of Ginger and her control of Fred’s information.

Thus, in the typical case, when someone contracts to limit access to and uses of their own personal information, and when a second party agrees to various access and use limitations, we are drawn to conclude that a morally binding contract is created. One reason we might conclude this—perhaps an inference to the best explanation—is that both parties have the general right to make contracts, to bind themselves morally, and at least one party has the relevant moral entitlements over the object of negotiation needed to ground the contract. If so, then individuals negotiating over access to and uses of their personal information may ground a binding contract that limits downstream uses of this information. These limits could include limits on freedom of speech and expression. Thus, the law of confidentiality found in EU conceptions of privacy along with doctor/patient, lawyer/client, clergy/parishioner agreements are seemingly groundless without the assumption of prior entitlements.Footnote 48

Establishing that individuals own or have the needed rights over their own personal information and can legitimately contract over uses of this information, grounded in autonomy and self-government, is not to establish that individuals have exclusive possession claims. Unlike the case of someone trying to use your body, where there will be interference with your use in the vast majority of cases, this is not true of personal information. Information is intangible and can be instantiated in different physical substrates at the same time. Thus, Crusoe’s use of Friday’s personal information does not necessarily interfere with Friday’s use. Imagine that Crusoe knows Friday’s personal stories because he found Friday’s diary inadvertently left on a public bench. Nevertheless, as already noted, mere possession or access does not automatically grant future use and control rights. Allowing a doctor to examine your knee is not also to waive all access and use rights over your knee. If so, invitations to dinner or offers to have sex would be weighty decisions indeed. Allowing a friend to read your diary would be a momentous decision. Moreover, given that access to personal information is largely dependent on technology, the position that access entails rights to control, use, and broadcast personal information about others, is dubious. Advancements in technology could inexorably lead to the content maximalist case envisioned in the opening paragraph. But just because all zones of privacy may vanish and technology may provide access to our most sensitive thoughts, emotions, and behaviors, it does not follow that such access is justified or that sharing this information is automatically permitted.

There is also an autonomy related difference that occurs and this may provide a compelling reason for why mere legitimate possession of information is not enough to justify downstream uses of and control over personal information, bodies, and locations. Depending on who takes notice and the medium used, Friday may be thrust into the public sphere against his wishes. Prior to the access and dissemination, Friday had a certain level of control over his reputation and public standing. For example, when Friday publishes an article on why forced taxation is immoral or why “safe spaces” on campus are worrisome, he is taking a public stand and is, presumably, aware of how this might affect his future opportunities. It is Friday who bears the costs and benefits of his choice. When Crusoe, on the other hand, obtains access to Friday’s private views about taxation or safe spaces and then publishes these views, it is Friday, not Crusoe, who will shoulder the downstream burdens or collect the benefits. This future is foisted, or perhaps forced, upon Friday, and his reputation cannot be “fixed” or replaced like other kinds of property. Arguably this foisting could be viewed as a morally relevant worsening that directly impacts Friday’s autonomy and self-government.

Cases that highlight the censorial aspects of copyright are useful when considering the issues that surround compelled speech. Like finding and publishing a private diary or cases of revenge porn, courts have noted and protected authorial autonomy and dignity. Footnote 49 In these cases, an author keeps a diary or takes pictures of herself and in doing fixes an expression protected by copyright, which includes the rights of distribution and display.Footnote 50 Those who copy or distribute copies of these protected works are in violation of copyright law. These sorts of cases infringe what Immanuel Kant called the right of the author, the “innate right in his own person, … to prevent another from having him speak to the public without his consent …”Footnote 51 For Kant, to publish a book is to speak with the public. The unauthorized publisher goes against the will of the author and undermines authorial autonomy and dignity.

While U.S. courts have upheld censorial copyright claims in a range of cases, a crucial element is that the dignitary interest of authorship can only be protected if the subject fixes the expression herself. For example, in the revenge porn case of Doe v. Elam, had Elam taken the pictures, Doe could not have brought a copyright infringement claim. In fact, had Elam taken the pictures, he would have held the relevant copyrights. Given that the expressions may be exactly the same in either case, whether Doe or Elam snapped the pictures, the fact of who fixed the expressions seems to be arbitrary and irrelevant when considering the dignitary interests involved. To put the point another way, if the dignitary and autonomy-based interests in these cases is strong enough to allow censorship, sometimes in the name of promoting overall speech and expression, then it would seem that privacy-based censorship would be likewise compelling.

Equally interesting are cases that promote free speech and expression by upholding anonymous publication or the use of pseudonyms. For example, in McIntyre v. Ohio (1995) the court noted “Anonymity … provides a way for a writer who may be personally unpopular to ensure that readers will not prejudge her message simply because they do not like its proponent … protect unpopular individuals from retaliation … at the hand of an intolerant society … and shield [authors] from the tyranny of the majority.”Footnote 52 Again suppose that via predictive analytics, internet browsing analysis, audio/video capture in public areas, facial recognition technology, and the like, we are able to capture virtually every fact about your daily life. It would seem that by capturing this information and broadcasting it we would be compelling you to speak to the public, just as if someone had published your diary against your wishes. It would also become impossible to gather privately, publish anonymously, use pseudonyms, or conduct certain sorts of research—denial of these activities would suppress speech and expression.Footnote 53

V. What We Have No Business Knowing

Most privacy-intrusive information about individuals is irrelevant to speech-based autonomy and self-government and, thus, there would be no speech-based justification for overriding the property/autonomy-based contract argument presented above. Specific instantiations are fungible and generally not needed for the autonomy-building or autonomy-protecting aspects of self-government. For example, we may never know the medical or sexual histories of those living nearby and yet our lives will go perfectly well. Consider a case where your complete medical history has been made public and I possess a copy. Assume that in obtaining this copy I have violated no contracts, agreements, or rights. I, not illegitimately, possess a copy of your complete medical information. Or suppose I have the technological device mentioned earlier, one that could record everyone’s thoughts, words, and activities, and post searchable, updated, databases to the Web on a daily basis.

As with many of the cases already discussed, I think our intuitions lean the same way in this case as well. We don’t owe others access to, or control over, our medical information, sexual histories, private thoughts, and the like. Setting aside cases where the information target herself grants access and waives all downstream rights, there is something morally questionable about broadcasting this content independent of consent. First, individuals may have property rights in their personal information similar to copyrights. Second, such disclosures undermine the autonomy of the information target and are, in most cases, irrelevant to the self-government of content consumers.

A cased mentioned by Edwin Baker is instructive. “[O]ne person’s … autonomy might be enhanced by knowledge about her spouse, whom she thought loved her but who does not and who is actually having an affair …”Footnote 54 In this case, there is a tension between autonomy and privacy—one person’s autonomy against another’s privacy. While Baker distinguishes speech claims from information access claims, he concludes that free speech includes the freedom to “expose any private information that a person knows…”Footnote 55 If so, Baker may be driven to conclude that broadcasting medical or sexual histories, assuming they are not ill-gotten, is perfectly appropriate. I don’t think that not illegitimately possessing private information justifies downstream broadcasting any more than picking up a ball that rolls up to you makes it your ball, or being told a trade secret makes it yours to disclose. The cases already discussed support this view. Moreover, in the cheating spouse case, like examples of doctor/patient or lawyer/client nondisclosure rules, there is a prior explicit or implied contract in place governing access to and uses of private information. One would suppose that part of any spousal agreement there would be rules governing infidelity and information access.Footnote 56 Additionally, as already noted, such contracts presuppose prior justified entitlement.

When focusing on non-governmental actors, those not employed to serve the public in some sort of official capacity, much of the information about them, and especially all of the private information, is fungible and unnecessary for autonomy and self-government. Even the most important or “real life” lessons that could be learned by consuming information about the private lives of famous actors, for example, could be instantiated and consumed without violating privacy rights.

Similarly, those who work in the public sector may be thought to agree to specific domains of privacy and accountability based on the relevant job descriptions and the context. For example, the public has a right to know if a city official is taking bribes, but no right to know the sexual orientation or medical history of the official. Admittedly, the autonomy-protecting aspects of speech related to government officials is tricky and to my mind should be spelled out in detail, or negotiated, before privacy intrusions occur. Beyond the information-sharing practices delineated in an employment contract, perhaps a rule like probable cause could be used to determine when incursions into private domains are acceptable.Footnote 57 Engaging in criminal activity would seem, at first glance anyway, to sanction a closer look. Probable cause that an official is in violation of an employment contract could sanction the opening up of private areas as a condition of the contract itself.Footnote 58

Consider a different case where context and contract set the terms of information-sharing and free speech practices. In the typical university classroom there is a subject matter being investigated along with various rules regarding speech, expression, and privacy. Speech rules typically include prohibitions against blurting out content even if this content is relevant to the class. Prying into the personal lives of students, teaching assistants, or professors is not acceptable behavior unless there is probable cause that a student or instructor is violating the class contract. The class contract sets the terms of interaction, the subject matter, and grading policy. Thus, it may be perfectly appropriate for a professor to closely monitor students while they are taking a test, but this same behavior would be inappropriate outside of class tests or outside of class.

VI. Conclusion

On the one hand, speech may be important for autonomy and self-government. Nevertheless, autonomy arguments for speech are rather anemic in light of the content pollution that infects almost every area of production and distribution. Quality and relevance are the issue, and both are jeopardized by the trivial, banal, and false. The connections between privacy, autonomy, and flourishing, on the other hand, are strong and important. Here the right to control access to and uses of locations and personal information, and the right to control the arc of one’s life, are central to autonomy and agency. Additionally, in most cases, content that includes personal information that is important for self-government is either fungible or the personal information could be anonymized without loss. Only in a narrow range of cases will privacy come into conflict with speech and autonomy. Finally, the moral bindingness of contracts that determine the downstream uses of personal information is built upon the view that we each have a general right to make contracts and that what we are contracting about, our own personal information, is in some sense owned or justifiably controlled by us. Autonomy, privacy, the value of privacy, and the right to contract over personal information justifiably grounds restrictions on speech and expression.

Footnotes

I would like to thank the other contributors to this volume, along with an anonymous reviewer, for suggestions and criticisms. I am especially grateful to Ken Himma, Alan Rubel, and Julie Howe for providing comments on early drafts of this essay.

References

1 Science fiction writers have imagined this sort of technology applying to everyone who has ever lived. See Clarke, Arthur C. and Baxter, Stephen, The Light of Other Days (New York: Tor Books, 2000)Google Scholar, and Asimov, Isaac, “The Dead Past,” in The Best of Isaac Asimov (New York: Doubleday, 1973)Google Scholar.

2 “GDPR Key Changes,” accessed October 2019, https://www.eugdpr.org/the-regulation.html.

3 Legal scholar Alexander Lawrence has argued that there is no free speech principle that provides a unique and independent grounding for speech or expression. For Lawrence, free speech is grounded in a more basic principle like liberty or autonomy. If so, it is hard to understand why speech or expression should be presumptively weighty when in tension with other values based in liberty or autonomy. See Lawrence, Alexander, “The Impossibility of a Free Speech Principle,Northwestern Law Review 78 (1984): 1319–57Google Scholar.

4 For example, John Stuart Mill argued that expressions could be limited if they violate a “distinct and assignable obligation” such as a property right (something “society ought to protect you in the possession of …”). See John Stuart Mill, On Liberty, [1859], ed. Currin V. Shields (Indianapolis, IN: Bobbs-Merrill, 1985), chap. IV and Utilitarianism [1861], ed. Samuel Gorovitz (Indianapolis, IN: Bobbs-Merrill, 1971), chap. V. See also Daniel Jacobson, “Mill on Liberty, Speech, and the Free Society,” Philosophy and Public Affairs 29 (Summer, 2000): 276–309; Black, Hugo, “The Bill of Rights,New York University Law Review 35 (1960): 865–81Google Scholar; Meiklejohn, Alexander, “The First Amendment is an Absolute,The Supreme Court Review (1961): 245–66CrossRefGoogle Scholar; and Volokh, Eugene, “Freedom of Speech and Information Privacy: The Troubling Implications of a Right To Stop People from Speaking about You,Stanford Law Review 52 (2000): 10491124 CrossRefGoogle Scholar.

5 See, e.g., March v. Alabama, 326 U.S. 501 (1946); Amalgamated Food Employees Union Local 590 v. Logan Valley Plaza, 391 U.S. 308 (1968); Lloyd Corporation v. Tanner, 407 U.S. 551 (1972); Hudgens v. NLRB, 424 U.S. 507 (1976); Masterpiece Cakeshop, Ltd. v. Colorado Civil Rights Commission, 584 U.S. (2018); Janus v. AFCME, No. 16-1466, 585 U.S. (2018).

6 Judith Wagner DeCew, “Free Speech and Offensive Expression,” Social Philosophy and Policy 21, no. 2 (2004): 81.

7 See Grayned v. City of Rockford, 408 U.S. 104 (1972).

8 See Barnes v. Glen Theatre, Inc., 501 U.S. 560 (1991).

9 See 18 U.S. C. § 175.

10 See Meritor Savings Bank v. Vinson, 477 U.S. 57 (1986) and Robinson v. Jacksonville Shipyards, Inc., 760 F. Supp. 1486 (M.D. Fla. 1991).

11 See 17 U.S.C. § 106.

12 Meiklejohn, “The First Amendment is an Absolute.”

13 J. S. Mill, On Liberty, chaps I–IV. See also, Greenawalt, Kent, “Rationales for Freedom of Speech,” in Information Ethics: Privacy, Property, and Power, ed. Adam D. Moore (Seattle: University of Washington Press, 2005), 278–97Google Scholar; Strossen, Nadine, Hate: Why We Should Resist it with Free Speech, Not Censorship (Oxford: Oxford University Press, 2018)Google Scholar; and Baker, C. Edwin, Human Liberty and Freedom of Speech (Oxford: Oxford University Press, 1989)Google Scholar.

14 See Scanlon, Thomas, “A Theory of Freedom of Expression,Philosophy and Public Affairs 1 (1972): 216 Google Scholar; See also, Greenawalt, , “Rationales for Freedom of Speech”; Frederick Schauer, Free Speech: A Philosophical Enquiry (Cambridge: Cambridge University Press, 1982)Google Scholar; Dworkin, Ronald, A Matter of Principle (Cambridge, MA: Harvard University Press, 1985)Google Scholar; Strauss, David, “Persuasion, Autonomy, and Freedom of Expression,Columbia Law Review 91 (1991): 334–71CrossRefGoogle Scholar; and Nagel, Thomas, “Personal Rights and Public Space,Philosophy and Public Affairs 24 (1995): 83107 CrossRefGoogle Scholar.

15 Joel Feinberg has broken autonomy into four, perhaps, overlapping areas. Autonomy is “(i) the capacity to govern oneself … ; or (ii) the actual condition of self-government and its associated virtues; or (iii) an ideal of character derived from that conception; or (iv) (on the analogy to a political state) the sovereign authority to govern oneself, which is absolute within one’s own moral ‘boundaries’.” Joel Feinberg, “Autonomy, Sovereignty, and Privacy: Moral Ideals in the Constitution,” Notre Dame Law Review 58 (1983): 447. See also Robert Young, “The Value of Autonomy,” Philosophical Quarterly 32 (1982): 35–44 and Susan J. Brison, “The Autonomy Defense of Free Speech,” Ethics 108 (1998): 312–39.

16 Martin Redish, “The Value of Free Speech,” University of Pennsylvania Law Review 130 (1982): 591–645.

17 See Redish, “The Value of Free Speech,” 627 and Meiklejohn “The First Amendment is an Absolute,” 263.

18 In terms of media production, movies, television, and videos, it is estimated that each individual has 400 percent more choices now than ten years ago. Jeff Berman, “Avid CEO: ‘Massive Explosion’ of Content Has Created New Challenges for Media Companies,” M&E Daily, January 19, 2018, https://www.mesalliance.org/2018/01/19/avid-ceo-massive-explosion-content-created-new-challenges-media-companies/. In the last ten years, film production has doubled. There are now more than eight thousand films made each year. “The Numbers,” https://www.the-numbers.com/movies/year/2017. See Joel Waldfogel, “How Digitization Has Created a Golden Age of Music, Movies, Books, and Television,” Journal of Economic Perspectives 31 (2017):195–214. Perhaps consuming so much of this content is actually making us less productive and undermines autonomy. See Michael Cacciatore et al., “Is Facebook Making Us Dumber? Exploring Social Media Use as a Predictor of Political Knowledge,” Journalism and Mass Communication Quarterly 95 (2018): 404–24, and Newport, Cal, Deep Work: Rules for Focused Success in a Distracted World (Grand Central Publishing, 2016)Google Scholar and Cal Newport, “Is Email Making Professors Stupid?” The Chronicle of Higher Education, February 19, 2019.

19 See Barblan, Matthew, “Copyright as a Platform for Artistic and Creative Freedom,George Mason Law Review 23 (2016): 793809 Google Scholar.

20 There are over twenty-five thousand peer-reviewed journals publishing approximately two million articles per year globally. Mark Ware and Michael Mabe, “The STM Report: An Overview of Scientific and Scholarly Journal Publishing,” accessed October 30, 2019, http://www.stm-assoc.org/2015_02_20_STM_Report_2015.pdf. See also, Pyne, Derek, “The Rewards of Predatory Publications at a Small Business School,Journal of Scholarly Publishing 48 (2017): 137–60CrossRefGoogle Scholar and Liebowitz, Stan J., “Willful Blindness: The Inefficient Reward Structure in Academic Research,Economic Inquiry 52 (2014): 1267–83CrossRefGoogle Scholar. There are over eight thousand predatory journals and many with associated conferences and published conference proceedings. See Cenyu Shen and Bo-Christer Bjork, “‘Predatory’ Open Access: A Longitudinal Study of Article Volumes and Market Characteristics,” BMC Medicine 13 (2015), 1–15; Jennifer Ruark, “Anatomy of a Hoax,” Chronicle of Higher Education, January 1, 2017; Monya Baker, “1,500 Scientists Lift the Lid on Reproducibility: Survey Sheds Light on the ‘Crisis’ Rocking Research,” Nature 533, no. 7604 (2016); and Alexander C. Kafka, “‘Sokal Squared’: Is Huge Publishing Hoax ‘Hilarious and Delightful’ or an Ugly Example of Dishonesty and Bad Faith?” Chronicle of Higher Education, October 8, 2018.

21 See Allcott, Hunt and Gentzkow, Matthew, “Social Media and Fake News in the 2016 Election,Journal of Economic Perspectives 31 (2017): 211–36CrossRefGoogle Scholar; Kai Shu et al., “Fake News Detection on Social Media: A Data Mining Perspective,” http://www.kdd.org/exploration_files/19-1-Article2.pdf.

22 One might argue that my analysis assumes the content of an expression can be separated from its instantiation without loss of meaning, while this is not always the case. My view, however, is that most privacy invasive instantiations could be replaced with versions that to do not impact privacy or autonomy. If it can’t be done in a particular case, if there is no way to separate the autonomy enhancing and privacy violating instantiation without changing its meaning, then prohibitions or damages may be appropriate—similar to the remedies available for libel, slander, or intellectual property violations. The author would like to thank an anonymous reviewer for raising this objection.

23 See Barns v. Glen Theater, Inc., 501 U.S. 560 (1991); Larry Alexander, “Low Value Speech,” Legal Theory 83 (1989): 547–54; Cass Sunstein, “Low Value Speech Revisited,” Northwestern University Law Review 83 (1989): 555–61; Alex Kozinski and Stuart Banner, “Who’s Afraid of Commercial Speech?” Virginia Law Review 76 (1990): 627–53; George Wright, “A Rationale from J. S. Mill for the Free Speech Clause,” Supreme Court Review 149 (1985): 149–78. See also David A. J. Richard, “Toleration and Free Speech,” Philosophy and Public Affairs 17 (1988): 323–36. Richards argues protected speech is “the independent communication of willing speakers and audiences sincerely engaged in critical discussion central to the conscientious formation of values” … and “grounded in the communicative independence of our rational powers.” Richards, “Toleration and Free Speech,” 334. Protected speech is not coextensive with communication and, thus, governmental regulation of deceit, fraud, defemination, or informational privacy is not worrisome.

24 In general, see, Fredrickson, Barbara L., “The Role of Positive Emotions in Positive Psychology: The Broaden-and-Build Theory of Positive Emotions,American Psychologist 56 (2001): 218–26CrossRefGoogle Scholar; Kahneman, Daniel, Diener, Edward, and Schwarz, Norbert, Well-being: The Foundations of Hedonic Psychology (New York: Sage, 1999)Google Scholar; and Schueller, Stephen M and Seligman, Martin E, “Pursuit of Pleasure, Engagement, and Meaning: Relationships to Subjective and Objective Measures of Well-being,Journal of Positive Psychology 5 (2010): 253–63CrossRefGoogle Scholar.

25 I would like to thank Andrew Koppleman and Bas van der Vossen for this objection.

26 Critics who claim religious rights not to be offended sometimes fail to see that defending such a right would likely eliminate all religions expression.

27 “GDPR Key Changes,” accessed October 30, 2019, https://www.eugdpr.org/the-regulation.html. While many have warned that the right to be forgotten will undermine freedom of speech, there is reason to believe that these worries are overblown. See Paul J. Watanabe, “Note: An Ocean Apart: The Transatlantic Data Privacy Divide and the Right to Erasure,” Southern California Law Review 90 (2017): 1111; Giancarlo Frosio, “The Right To Be Forgotten: Much Ado About Nothing,” Colorado Technology Law Journal 15 (2017): 307–336. See FTC v. Wyndham Inc. 799 F.3d 236 (3d Cir. 2015) where a U.S. court held that keeping personal information about patrons on an insecure system and not correcting the security flaws after the first intrusion was deemed to be actionable behavior and California’s Consumer Privacy Act (CCPA), https://oag.ca.gov/privacy/ccpa accessed October 30, 2019.

28 See Adam D. Moore, Privacy Rights: Moral and Legal Foundations (University Park, PA: Penn State University Press, 2010), “Defining Privacy,” Journal of Social Philosophy 39 (2008): 411–28, and “Privacy: Its Meaning and Value” American Philosophical Quarterly 40 (2003): 215–27. See also, Alan Westin, Privacy and Freedom (Cambridge, MA: Atheneum Press, 1967), R. Parker, “A Definition of Privacy,” Rutgers Law Review 27 (1974): 275–96, and Ruth Gavison, “Information Control: Availability and Control,” in Public and Private in Social Life, ed. Stanley I. Benn and Gerald F. Gaus (New York: St. Martin’s Press, 1983), 113–34. How privacy rights are codified in the law and applied to everyday situations is a difficult practical matter. For example, we may agree that when walking in public individuals are waiving access rights to others who may notice certain facts like height, eye color, and so on. Nevertheless, few would maintain that allowing such access would also grant the video voyeur permission to capture your every move and word while in public or to upload these expressions to the web. Note the difference between allowing access and waiving all downstream uses of and control over some bit of personal information. Similarly, letting you read my copyrighted poem would not be to transfer joint ownership rights to you. See Moore, “Privacy, Interests, and Inalienable Rights.”

29 Directive 95/46/EC of the European Parliament and of the Council (1995) OJ L 281 0031–0050.

30 Further support for the empirical claims made in this section can be found in Moore, Chapters 2–4 in Privacy Rights; Moore, “Privacy: Its Meaning and Value,” and Bryce Newell, Cheryl Metoyer, and Adam D. Moore, “Privacy in the Family,” in The Social Dimensions of Privacy, ed. Beate Roessler and Dorota Mokrosinska (New York: Cambridge University Press, 2015), 104–21.

31 See Fuller, Theodore D et al., “Chronic Stress and Psychological Well-Being: Evidence from Thailand on Household Crowding,Social Science Medicine 42 (1996): 265–80CrossRefGoogle Scholar.

32 See Newell, generally, Metoyer, and Moore, “Privacy in the Family,” 106113 Google Scholar and M. Kerr and H. Stattin, “What Parents Know, How They Know It, and Several Forms of Adolescent Adjustment: Further Support for a Reinterpretation of Monitoring,” Journal of Developmental Psychology 36 (2000): 366–80.

33 John Chalykoff and Thomas Kochan, “Computer-Aided Monitoring: Its Influence on Employee Job Satisfaction and Turnover,” Personnel Psychology: A Journal of Applied Research 42 (1989): 826; Clay Posey, Rebecca Bennett, Tom Roberts, and Paul Lowry, “When Computer Monitoring Backfires: Invasion of Privacy and Organizational Injustice as Precursors to Computer Abuse,” Journal of Information System Security 7 (2011): 24–47.

34 Maltby, Lewis, Drug Testing: A Bad Investment (New York: American Civil Liberties Union, 1999), 1621 Google Scholar.

35 Benn, Stanley I., “Privacy, Freedom, and Respect for Persons,” in Privacy Nomos XIII, ed. J. Roland Pennock and John W. Chapman (New York: Atherton Press, 1971), 126 Google Scholar; Rachels, James, “Why Privacy is Important,Philosophy and Public Affairs 4 (1975): 323–33Google Scholar; Reiman, J., “Privacy, Intimacy, and Personhood,Philosophy and Public Affairs 6 (1976): 2644 Google Scholar; Kupfer, J., “Privacy, Autonomy, and Self-Concept,American Philosophical Quarterly 24 (1987): 8189 Google Scholar; Inness, Julie, Privacy, Intimacy, and Isolation (New York: Oxford University Press, 1992)Google Scholar; Beate Rössler, The Value of Privacy, trans. Rupert D. V. Glasgow (Cambridge, UK: Polity Press, 2005).

36 See Benn, , “Privacy, Freedom, and Respect for Persons,” 126 CrossRefGoogle Scholar; Kupfer, “Privacy, Autonomy, and Self-Concept,” 81–90; Rössler, , The Value of Privacy, 4276 Google Scholar; Goffman, Erving, The Presentation of Self in Everyday Life (New York: Doubleday, 1959)Google Scholar; and Schwartz, Barry, “The Social Psychology of Privacy,American Journal of Sociology 73 (1968): 741–52CrossRefGoogle Scholar.

37 See Kupfer, , “Privacy, Autonomy, and Self-Concept,” 81–90 and Alan Rubel, “Privacy and Positive Intellectual Freedom,” Journal of Social Philosophy 45 (2014): 390407 Google Scholar.

38 Spitz, René, “The Derailment of Dialogue,Journal of the American Psychoanalytic Association 12 (1964): 752–75CrossRefGoogle Scholar.

39 See Barry Schwartz, “The Social Psychology of Privacy,” 749.

40 See Brussoni, Mariana et al., “What is the Relationship between Risky Outdoor Play and Health in Children? A Systematic Review,International Journal of Environmental Research and Public Health 12 (2015): 6423–54CrossRefGoogle Scholar.

41 See Thomson, Judith Jarvis, “The Right to Privacy,Philosophy and Public Affairs 4 (1975): 295314 Google Scholar and Taylor, James Stacy, “Privacy and Autonomy: A Reappraisal,Southern Journal of Philosophy XL (2002): 578604 Google Scholar.

42 This structure is similar to Nozick’s argument in Anarchy, State, and Utopia against anarchists who claim that no state is justifiable. See Nozick, Robert, Anarchy, State, and Utopia (New York: Basic Books, 1974), 3120 Google Scholar.

43 For arguments defending moral rights to intellectual property, as opposed to mere legal rights, see Moore, Adam D., “A Lockean Theory of Intellectual Property Revisited,San Diego Law Review 50 (2012): 10701103 Google Scholar and Intellectual Property and Information Control: Philosophic Foundations and Contemporary Issues (London; New York: Routledge, 2004).

44 Warren and Brandeis note that common law safeguards “to each individual the right of determining … to what extent his thoughts, sentiments, and emotions shall be communicated to others.” Samuel Warren and Louis Brandeis, “The Right to Privacy,” Harvard Law Review 4 (1890): 198. Also consider the right of divulgation within the EU. The right of divulgation, when and if an intellectual work is placed before the public, is grounded in justified prior entitlements over the work in question and the wrongness of compelling speech. See M. Roeder, “The Doctrine of Moral Right: A Study in the Law of Artists, Authors and Creators,” Harvard Law Review 53 (1940): 554–78.

45 See Moore, Adam D., Privacy Rights: Moral and Legal Foundations (2010), 5799 Google Scholar; “Toward Informational Privacy Rights,” San Diego Law Review 44 (2007): 809–45; “Privacy, Interests, and Inalienable Rights,” Moral Philosophy and Politics 5 (2018): 327–55.

46 Violating a promise that was bargained for and relied upon may be part of the wrong-making features found in such cases. But as noted, the moral and legal force of this agreement depends upon a host of prior factors—and one of these factors is prior entitlement.

47 Part of our contract would likely include provisions regarding damages and disclosure rights if one, or both parties, are found to be out of compliance or have bargained in “bad faith.”

48 For an analysis of the EU conception of privacy and confidentiality law see Solove, Daniel and Richards, Neil, “Privacy’s Other Path: Recovering the Law of Confidentiality,Georgetown Law Review 96 (2007): 123882 Google Scholar.

49 See Doe v. Elam, Case 2: 14-cv-09788-PSG-SS (C.D. Cal., April 4, 2018).

50 Copyright Act of 1976, 17 U.S.C. § 106.

51 Kant, Immanuel, “On the Wrongfulness of Unauthorized Publication of Books,” in Practical Philosophy, ed. Mary Gregor (Cambridge: Cambridge University Press, 1999), 35 Google Scholar.

52 McIntyre v. Ohio, 514 U.S. 334, 357 (1995).

53 See NAACP v. Alabama 357 U.S. 449 (1958). In Urofsky v. Gilmore (2000) six professors employed by several public universities in Virginia challenged “the constitutionality of a Virginia law restricting state employees from accessing sexually explicit material on computers that are owned or leased by the state.” Urofsky v. Gilmore, 216 F.3d 401 (4th Cir. 2000). Denial of access and requiring permission, they argued, would have the effect of suppressing research and constituted an assault on academic freedom. Ultimately the Virginia law was upheld and the U.S. Supreme court refused to hear the case. See also, Seth F. Kreimer, “Sunlight, Secrets, and Scarlet Letters: The Tension between Privacy and Disclosure in Constitutional Law,” University of Pennsylvania Law Review 140 (1991): 1–147, and Helen Nissenbaum, “The Meaning of Anonymity in an Information Age,” The Information Society 15 (1999): 141–44.

54 C. Edwin Baker, “Autonomy and Informational Privacy, or Gossip: The Central Meaning of the First Amendment,” Social Philosophy and Policy 21, no. 2 (2004): 221.

55 Baker, “Autonomy and Informational Privacy, or Gossip,” 268. See Barrymore v. News Group Newspapers (1997) F.S.R. 600 (U.K.).

56 For arguments in support of spying on family members see Anita Allen, “The Virtuous Spy: Privacy as an Ethical Limit,” The Monist 91 (2008): 3–22. For arguments against spying on family members see Bruce Newell, Cheryl Metoyer, and Adam D. Moore, “Privacy in the Family,” 104–21.

57 See Brinegar v. United States, 338 U.S. 160 (1949). In Brinegar, probable cause is defined as “where the facts and circumstances within the officers’ knowledge, and of which they have reasonably trustworthy information, are sufficient in themselves to warrant a belief by a man of reasonable caution that a crime is being committed” (at 160).

58 Strengthening the torts of intrusion and private facts, in light of the motives, magnitude, and context of the privacy violation, would also be a welcome addition to limit the overreach of speech and expression. See Moore, Adam D., “Privacy, Speech, and Values: What We Have No Business Knowing,Journal of Ethics and Information Technology 18 (2016): 4149 CrossRefGoogle Scholar.