2014
DOI: 10.1017/s0008197314000427
|View full text |Cite
|
Sign up to set email alerts
|

Beyond Information: Physical Privacy in English Law

Abstract: Although English privacy law has developed significantly over the past two decades, it continues to focus almost exclusively on the disclosure of private or confidential information. This article argues that if privacy is to be comprehensively protected, then the importance of physical privacy – which is breached when a person is looked at, listened to or recorded against his or her wishes – must also be recognised. After discussing what physical privacy is and why existing protections for it are inadequate, t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 6 publications
0
14
0
Order By: Relevance
“…While various typologies of privacy exist, the way that privacy was discussed by smart-home researchers can be seen to follow a division of privacy into ‘physical privacy’—avoiding unwanted sensory access—and ‘informational privacy’—avoiding the misuse of information [35, 36]. In support of such a division, NA Moreham [36] makes the plausible claim that watching or following a person breaches their privacy even if no information is obtained or circulated.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…While various typologies of privacy exist, the way that privacy was discussed by smart-home researchers can be seen to follow a division of privacy into ‘physical privacy’—avoiding unwanted sensory access—and ‘informational privacy’—avoiding the misuse of information [35, 36]. In support of such a division, NA Moreham [36] makes the plausible claim that watching or following a person breaches their privacy even if no information is obtained or circulated.…”
Section: Discussionmentioning
confidence: 99%
“…In support of such a division, NA Moreham [36] makes the plausible claim that watching or following a person breaches their privacy even if no information is obtained or circulated. Setting aside the philosophical debates that this claim invites, there is a clear practical implication for those working in this field.…”
Section: Discussionmentioning
confidence: 99%
“…These activities are concerned with disclosure of information and the main objection in these disclosure cases is that there is someone finding something about you against your wishes and thus losing control of retaining private information. These ‘information finders’ can discover information about you, retain such information and ultimately disclose it (Moreham, 2014: 350, 354). This fourth category of Solove’s taxonomy acutely shows the element of intrusion and lies at its heart the idea of unwanted access.…”
Section: Conceptualizing Privacymentioning
confidence: 99%
“…An overview of the Hong Kong Personal Data (Privacy) Ordinance (‘PDPO’) and local breach of confidence cases focus on usage and dissemination of information and it is submitted that privacy can also be breached irrespective of whether information is collected or disseminated. As noted by Moreham, privacy can be breached by unwanted watching, listening or recording, and a person’s physical privacy would still be intruded even though no information is being recorded or disseminated (Moreham, 2014: 350, 351). Examples include peering through a changing room using a telescope or surreptitiously taking a person’s photograph for one’s own enjoyment.…”
Section: Introductionmentioning
confidence: 99%
“…Physical or bodily privacy on the other hand, has been comparatively less clearly defined and researched. We understand it as a sensory interference [7]: the intruder senses you against your wishes by watching/video recording, listening to, or touching you, which potentially leads to discomfort or even harassment. For example, the user may be unaware of the privacy threat (e.g., Figure 1a and b), or the user (aware or otherwise) may be unable to take mitigating action due to fear, shock, physical and mental weakness, or embarrassment [2] (e.g., Figure 1 …”
Section: Introductionmentioning
confidence: 99%