The Right of Privacy: A Reflection on Warren and Brandeis’ Interpretation and the Case of Ethiopia 1991-2018.
Received: 23-Jun-2022 / Manuscript No. JCLS-22-67785 / Editor assigned: 25-Jun-2022 / PreQC No. JCLS-22-67785(PQ) / Reviewed: 09-Jul-2022 / QC No. JCLS- 22-67785 / Revised: 14-Jul-2022 / Manuscript No. JCLS-22-67785(R) / Published Date: 21-Jul-2022 DOI: 10.4172/2169-0170.1000336
Abstract
The Right to Privacy is a form of negative liberty that ensures people to enjoy life without unlawful interference from the state or other agents. Samuel Warren and Louis Brandeis are the two forerunner activists on the Right to Privacy. Although some of their propositions are debatable, their insight in the Right to Privacy is still valid. This article tries to reflect on Warren and Brandeis’ contribution to concept of the “Right to Privacy” and its practical application in the contemporary world taking Ethiopia as a case study.
Keywords: Right of Privacy; Warren and Brandeis; Ethiopia; Constitutional dispensation; Support of the custom
Keywords
Right of Privacy; Warren and Brandeis; Ethiopia; Constitutional dispensation; Support of the custom
Introduction
Privacy, therefore, can be understood as a peaceful breathing space, an essential element to sustaining personal development and selfmanagement [1]. Privacy enables individuals to determine the depth and breadth of their relationships with their surroundings, including the state. Everyone has the right to life; it is one of the fundamental civil rights. The right to life means the right to enjoy life; and this may include the right to be left alone. At times, people may want to be forgotten. From this perspective, privacy compliments the right to life, more specifically, the right to enjoy life [2].
Everyone has the right to own property alone as well as in association with others. No one shall be arbitrarily deprived of his property. The right to property includes not only the tangibles but also intangible assets. A person’s dignity, reputation, goodwill, and private knowledge about himself are the person’s intangible properties. From this perspective, the right to privacy augments the property right.
Samuel Warren and Louis Brandeis are believed to be pioneers in writing on the Right to Privacy in Harvard Law Review in 1890 [3]. Warren and Brandeis (1890) argue a person’s reputation, his standing among his fellows, is an asset that can be trespassed by publicizing personal information without his knowledge and/or consent. A person’s family is also part of his life. Damaging an individual’s reputation may inflict damage on the whole family, and it is a trespass.
Discussion
The proposition that it is a right of humans “with whose affairs the community has no legitimate concern” to not be dragged into undesirable and undesired publicity” was provided in the article published in Harvard Law Review by Warren and Brandeis (1890). Warren and Brandeis listed five points to show the boundaries of the right of privacy [4]. According to them:
1. The right to privacy does not prohibit any publications of matter which is of public or general interest;
2. The right to privacy does not prohibit the communication of any matter that can be administered by the law of slander and libel;
3. The right to privacy would probably not grant any redress for invasion of privacy by oral publication in the absence of special damage;
4. The right to privacy would cease upon the individual himself published the content of the facts; or published by others with his consent;
5. Whether the published issue is true or false, (i.e., the truth of the matter) does afford a defence; and
6. The absence of “malice” in the publication does not afford a defence.
The first point “the right to privacy does not prohibit any publications of matter which is of public or general interest” raises several questions. What is “public interest”? What does “general interest” mean? Who is to decide whether a publication is of public or general interest? How it will be decided? Warren and Brandeis did not answer these and similar questions [5]. Rather, they give the following general principle:
The design of the law must be to protect those persons with whose affairs the community has no legitimate concern, from being dragged into an undesirable and undesired publicity and to protect all persons, whatsoever; their position or station, from having matters which they may properly prefer to keep private, made public against their will.
A community may have “legitimate concerns” about the “private” affairs of an individual. Warren and Brandeis mention a person who is running for a public office, as an example. The public may have “legitimate concern” to know more about this person than it does about other ordinary citizens [6]. Therefore, publicizing issues that may show the person is not fit for the office cannot be prohibited by the right to privacy, according to Warren and Brandeis. It is presumed, that the person has renounced some of his rights to privacy when he decided to run for a public office. There are others who, by virtue of their profession or popularity, are presumed to have renounced their right to privacy because they have to avail themselves to public comments, albeit to varying degrees. In contrast, to publish an ordinary individual who suffers from an impediment in his speech or who cannot spell correctly is unlawful; his right to privacy has trespassed if his impediments are published without his consent.
The general objective of the right to privacy, Warren and Brandeis argue is to “protect the privacy of private life” [7]. Here questions arise: What are the distinctions between “private life” and “public life”? Who is going to decide the boundary between the two? Warren and Brandeis acknowledge that there are no simple answers to such questions. For practical reasons, habits, actions, and relations that do have connections with the person’s official duties can be considered in the public domain. These habits, actions, and relations do not warrant the right to privacy. Habits, actions, and relations that do have direct connections with the person’s official duties are in the person’s private realm; these issues warrant the right to privacy. Warren and Brandeis acknowledge this description is not exhaustive and leaves room for subjective judgment. In such cases, the court of law or legitimate authorities will decide what is in the public domain and what is not.
The author of this article understands that Warren and Brandeis have taken a legitimate government for granted. However, this is not the case in reality. Does “legitimate concern” exist when there is no “legitimate government”? How do we understand the activities of authoritarian government to speak on behave of the public? Is there any distinction between the “public interest” and the “government interest”? Warren and Brandeis’ proposition will be more difficult to defend when we take the impacts of information communication technology (ICT) into consideration [8]. ICT has made legal boundaries indistinct. How can we explain “legitimate concern” about cross-border cyber espionage? Is it true that “privacy is no longer a social norm” as Max Zuckerberg is reportedly said?
Warren and Brandeis’ preposition to “protect those persons with whose affairs the community has no legitimate concern, from being dragged into an undesirable and undesired publicity” has the second caveat.
The right to privacy does not prohibit the communication of any matter, though in its nature private, when the publication made under circumstances which would render it a privileged communication according to the law of slander and libel [9].
What the above remarks mean is that the right to privacy is not trespassed by any publication made by authorities. Warren and Brandeis presented a list of authorities that do have this right. The list includes a court of justice, legislative bodies, or the committees of those bodies, municipal assemblies, or the committees of such assemblies, and practically any other public body or quasi-public like the voluntary association for almost every purpose of benevolence, business, or other general interest will be accorded this privilege.
This author finds it difficult to accept this caveat. Warren and Brandeis seem to have excessive trust in democratic governance, more specifically in the judiciary [10]. Even if we accept the argument that in countries where rule of law reigns, the principle will be unacceptable in the majority of the world countries in which the government is above the law. Furthermore, this argument gives ammunition to authoritarian governments who claim that they have a “legitimate right” to define the public interest. The case of Ethiopia will briefly be discussed below.
Warren and Brandeis’ third point that the law “would probably not grant any redress for invasion of privacy by oral publication in the absence of special damage” can also raise some concerns. Their argument highlights that there must be a distinction between oral and written publications [11]. They assume that the injury resulting from oral communication would ordinarily be so “trifling that the law might well, in the interest of free speech, disregard it altogether”. This also changed a lot after they have written the article in 1890 due to rapid development in ICT. Today, the distinction between oral and electronic publication is blurred. Any spoken statement can be broadcast to the whole world by uncontrolled social media.
Warren and Brandeis’ fourth point that “the right to privacy ceases upon the publication of the facts by the individual, or with his consent” is fully acceptable. Once the person has published or authorized to publish content, privacy issues cannot be raised [12].
Warren and Brandeis’ fifth remark is an important notice for human rights activists around the world. “The truth of the matter published does not afford a defence”. Authoritarian regimes around the world justify their intrusion in the affairs of political opposition figures on the basis that “they know the truth”. However, the law, “should have no concern with the truth or the falsehood of the matters published”. It is not the truthfulness of the issue that matters in this case but the person’s right to privacy.
Similarly, the sixth point “the absence of ‘malice’ in the publication does not afford a defence” is an acceptable argument. The intent of the offender should be immaterial to the law [13]. It is too common that “public interest and safety” have been used to justify human rights atrocities. “Intent” is not an excuse to trespass on a person’s property; the same principle should apply to the right to privacy. A person’s privacy should be protected whatever the motives might be.
The Federal Democratic Republic of Ethiopia (FDRE) can be a case study where the rule law is in short supply. This article focuses on the period 1991-2018. The FDRE Constitution (1995) has the following provision on Privacy.
1. Everyone has the right to privacy. This right shall include the right not to be subjected to searches of his home, person, or property, or the seizure of any property under his personal possession.
2. Everyone has the right to the inviolability of his notes and correspondence including postal letters, and communications made by means of telephone, telecommunications and electronic devices.
3. Public officials shall respect and protect these rights. No restrictions may be placed on the enjoyment of such rights except in compelling circumstances and in accordance with specific laws whose purposes shall be the safeguarding of national security or public peace, the prevention of crimes or the protection of health, public morality or the rights and freedoms of others.
On March 25, 2014, Human Rights Watch published a 145-page report entitled “’They Know Everything We Do’: Telecom and Internet Surveillance in Ethiopia”. In this report, HRW presents evidence that the Ethiopian government uses telecommunication infrastructure to crackdown on opposition groups and individuals, both in Ethiopia and Diaspora [14]. The report contained data on Unrestricted Access to Phone Call Recordings and Metadata; Targeting Foreign Communications; Live Interception of Phone Communication; Restricting Access to Phone Network; Geotracking of Individual Locations; Controlling the Internet; Internet Filtering; Email Monitoring and Voice Over IP (Skype, WhatsApp, Facebook, Viber … etc) monitoring and many other privacy intrusions. The report lists names of people, as evidence, who suffered due to these intrusions.
A year later, on March 8, 2015, HRW had another report entitled “Ethiopia: Digital Attacks Intensify: Spyware Firm Should Address Alleged Misuse” (HRW, 2015). This report starts with
The Ethiopian government has renewed efforts to silence independent voices abroad by using apparent foreign spyware. The Ethiopian authorities should immediately cease digital attacks on journalists, while foreign surveillance technology sellers should investigate alleged abuses linked to their products.
The “foreign surveillance technology sellers” mentioned in the report are European companies including British ones [15]. Ethiopia has been evading the privacy of individuals living in Ethiopia, Europe, and the USA, using the technology obtained rome Europe.
The author of this article is one of these victims. Clara Usiskin (2019) has remarked: “One victim I interviewed in London, Tadesse Kersmo, eloquently described his sense of violation when he learned that the government from which he had fled had commandeered his computer and had been using it to spy on him and his family in his new home in London”. Usiskin continues to describe that the “disturbing sense of intrusion did not compare to his sense of fear and guilt that his hacked communications may have been used to target vulnerable activists still in Ethiopia”.
Conclusion
Although there are several debatable propositions, the contributions of Warren and Brandeis on the Right to Privacy are still valid. It is true that “it is a right of humans ‘with whose affairs the community has no legitimate concern’ to not be ‘dragged into undesirable and undesired publicity”; although it leaves many questions unanswered. The above assertion seems to assume democratic governance and rule of law, which are scarce. The Right of Privacy hot been observed not only in Ethiopia but also in Europe; since Europe has allowed Ethiopia to use its technology to spy on decedents seeking asylum in their countries.
Acknowledgement
None
Conflict of Interest
None
References
- Allen AL (1999) Coercing Privacy. Faculty Scholarship US 40: 1-36.
- Cohen JE (2000) Examined Lives: Informational Privacy and the Subject as Object, Stan L Rev US 52: 1-66.
- Cohen JE (2013) What Privacy Is For. Harv Law Rev US 126: 1904-1933.
- Larry D (2013) A Rational Response To The Privacy Crisis, CIPA US 716: 26-31.
- https://www.ethioconstruction.net/sites/default/files/Law/Files/the%20Constitution%20of%20the%20Federal%20democratic%20of%20ethiopia%20proclamation%20no.1-1995.pdf
- https://heinonline.org/HOL/LandingPage?handle=hein.journals/amlr39&div=7&id=&page=.
- https://www.refworld.org/docid/533576fc4.html
- https://www.hrw.org/news/2015/03/09/ethiopia-digital-attacks-intensify
- https://www.theguardian.com/technology/2010/jan/11/facebook-privacy
- Schwartz PM (1999) Privacy and Democracy in Cyberspace. 52 Vand Law Rev US 52: 1656-1658.
- Thomson JJ (1984) The Right to Privacy. CUP UK 4: 295-314.
- https://www.ohchr.org/en/udhr/documents/udhr_translations/eng.pdf
- Usiskin C (2019) America’s Covert War in East Africa: Surveillance, Rendition, Assassination. OUP UK: 1-224.
- Warren SD, Brandeis LD (1890) The Right to Privacy. Harv L Rev UK 4: 193-220.
- https://louisville.edu/law/library/special-collections/the-louis-d.-brandeis-collection/the-right-to-privacy
Indexed at, Google Scholar, Crossref
Indexed at, Google Scholar, Crossref
Indexed at, Google Scholar, Crossref
Indexed at, Google Scholar, Crossref
Citation: Kersmo TB (2022) The Right of Privacy: A Reflection on Warren and Brandeis Interpretation and the Case of Ethiopia 1991-2018. J Civil Legal Sci 11: 336. DOI: 10.4172/2169-0170.1000336
Copyright: © 2022 Kersmo TB. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Share This Article
Recommended Journals
Open Access Journals
Article Tools
Article Usage
- Total views: 1216
- [From(publication date): 0-2022 - Nov 21, 2024]
- Breakdown by view type
- HTML page views: 1032
- PDF downloads: 184