“…For different versions of the control theory, see e.g. Moore 2003;Moore 2010;Inness 1992;Fried 1968;Parent 1983;Marmor 2015;Mainz &Uhrenfeldt 2020 andMenges 2020. So-called access theorists often add the extra necessary condition that someone must actually access the agent's personal matters in order for her right to privacy to be violated.…”