Infocrime

Infocrime

Protecting Information Through Criminal Law

Eli Lederman

It has often been said that information is power. This is more true in the information age than ever. The book profiles the tools used by criminal law to protect confidential information. It deals with the essence of information, the varieties of confidential information, and the basic models for its protection within the context of the Internet and social networks.

Chapter 4b: The content model: information privacy

Eli Lederman

Subjects: law - academic, criminal law and justice, information and media law

Extract

Personal information and its protection are at the heart of the third part of the content model, an area rooted in the concept of privacy. The core of the right to privacy lies in individuals’ ability to create a buffer between themselves and their environment. “Privacy” is also a complex abstract term, broad and elusive, that depends on culture, location and context. It is possible to examine it from various angles and present it as defending a variety of values, but it may not be possible to define it unequivocally. At one end of the spectrum of opinions are scholars who have despaired of trying to organize and delimit the concept. Some have reached the conclusion that research of the topic is in “hopeless disarray” and that the endeavor is “ultimately futile.” Some scholars identify a solid intuitive basis for privacy. At the other end are researchers who attempt to organize and classify the abundance of opinions in the judicial literature regarding the essence of the concept, its various aspects and objectives. One of them organizes the areas of privacy under six subheadings: (a) the right to be alone; (b) limited access to the self; (c) secrecy; (d) control of personal information; (e) personhood; and (f) intimacy.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information