Defining Our Terms

Share this content:

I have never reviewed a law journal article before, but a recent one is of great value to anyone following privacy. Don't be put off by the reputation that law journal articles have for monumental footnotes. This one is readable and worth reading. You can skip the footnotes.

Dan Solove, associate professor of law at George Washington University, wrote A Taxonomy of Privacy to identify privacy problems in a comprehensive, concrete manner. He succeeded brilliantly. You can find the article at

Why am I so enthusiastic? One major problem in this arena is that "privacy" has no clear, universally recognized meaning. An invasion of privacy can be just about any activity that makes people feel uncomfortable. It's hard to have a conversation about privacy if we lack the terminology to discuss the topic.

Professor Solove broke down the concept of privacy into 16 elements, organized under four basic groups of activities: 1) information collection; 2) information processing; 3) information dissemination; and 4) invasion.

The 16 elements are: 1) surveillance; 2) interrogation; 3) aggregation: 4) identification; 5) insecurity; 6) secondary use; 7) exclusion; 8) breach of confidentiality; 9) disclosure; 10) exposure; 11) increased accessibility; 12) blackmail; 13) appropriation; 14) distortion; 15) intrusion; and 16) decisional interference.

Professor Solove defines each element and shows the similarities, differences and relationships among the terms. He also offers a sample of how case law and statutes address the interests identified by each term.

The purpose is to identify and give meaning to all the different aspects that fall under the broad rubric of privacy. Not every activity that affects privacy causes harm, and not every harm is worthy of a legal remedy. We can recognize a privacy effect and debate the suitability of a remedy separately.

Let's take an example. Professor Solove identifies aggregation as one element in the information processing category. This may be the term of most interest to marketers and database compilers. Aggregation is "the gathering together of information about a person." The professor's definition is stated neutrally. He observes that aggregation became a national issue with the advent of computers. Modern databases carry aggregation to a much greater extent than in the past. People disclose data about themselves in different settings. It's the consolidation of the data from multiple sources that gives rise to concern.

A good example of aggregation is credit reporting, which combines information about credit and credit transactions from many sources. Credit reports provide a useful service that benefits both credit grantors and data subjects.

However, negative consequences can occur when data are aggregated. Credit reports are at times incomplete, out of date or wrong. The reports nevertheless are used to make major decisions about credit, employment, insurance and other important aspects of living. The potential demand for credit reports and the potential mischief are so great that we have a law restricting the use of credit reports to specific purposes. That illustrates both the power of aggregated records and a classic type of legal response.

The taxonomy lets us readily discuss the pros and cons of personal information in clearer terms. We can identify aggregation as an activity with privacy consequences, and we can consider whether those consequences are good or bad and whether they are worthy of legal remedies. We can intelligently debate aggregation effects separately from, say, disclosure effects.

Let's try another term. Professor Solove defines insecurity as the injury of being placed in a weakened state, of being made more vulnerable to a range of future harms. If your personal information was exposed to the world through a security breach, how are you harmed? The professor's terminology lets us say that you have been made more insecure as a result of the breach. Whether we as a society want to respond to that insecurity is a question. Many states have answered that question in the affirmative for some types of data breaches through notification laws.

Victims of a security breach also may be harmed because of breach of confidentiality, by disclosure and through increased accessibility. These are other terms defined in the article. By talking more precisely about privacy, we can make more precise choices about remedies, if any, that we want to offer to individuals.

The taxonomy is a great advance over prior attempts to categorize privacy. The four classic privacy torts defined more than 40 years ago are virtually prehistoric. They are rarely relevant to modern information privacy violations.

Another classic definition says that privacy is the right to control information about yourself. This is another approach that bears little relationship to the world today. With the presence of so many third-party record keepers, Americans only occasionally have any rights regarding their information, let alone an element of control.

My guess is that Professor Solove's article eventually will be recognized as a milestone in privacy scholarship. It should change for the better how we talk about privacy and how we think about privacy.


Next Article in Marketing Strategy

Sign up to our newsletters

Company of the Week

Since 1985, Melissa has helped thousands of companies clean, correct and complete contact data to better target and communicate with their customers. We offer a full spectrum of data quality solutions, including global address, phone, email, and name validation, identify verification - available for batch or real-time processes, in the Cloud or on-premise. Our service bureau provides dedupe, email/phone append and geographic/demographic append services for better targeting and insight. For direct mailers, Melissa offers easy-to-use address management/postal software, list hygiene services and 100s of specialty mailing lists - all with competitive pricing and excellent customer service.

Find out more here »

Career Center

Check out hundreds of exciting professional opportunities available on DMN's Career Center.  
Explore careers in digital marketing, sales, eCommerce, marketing communications, IT, data strategies, and much more. And don't forget to update your resume so employers can contact you privately about job opportunities.

>>Click Here

Relive the 2017 Marketing Hall of Femme

Click the image above