Introduction

In a recent paper published in this journal, Jakob Mainz and Rasmus Uhrenfeldt (2020) mount a defense of the so-called ‘control account’ of the right to privacy. Taking inspiration from the literatures on the concept of freedom, they persuasively show that the notion of ‘control’ can be disambiguated and that the control account comes out on top if the notion of control is conceptualized as what they term ‘negative’ control. This move, Mainz and Uhrenfeldt submit, enables proponents of the control account to reply successfully to Thomson’s famous objection to their favored account and, importantly, enables the control account to capture cases that intuitively involve violations of privacy but cannot be captured by the rival ‘access’ account. The rivalry between access and control accounts of the right to privacy is a long-standing one in the literature, and Mainz and Uhrenfeldt’s contribution is very welcome as it seeks to offer a novel argument that both fends off a number of prominent objections posed against the control account as well as gives us a strong reason to prefer it over access accounts.

In this reply, I aim to show that a loss of ‘negative control’ as Mainz and Uhrenfeldt define the term cannot provide a necessary condition for a violation of the right to privacy. Since a loss of negative control is not necessary for a violation of the right to privacy, the control theorists still owe us a compelling control-based normative account of privacy and an explanation of in what sense privacy violations involve a loss of control. By contrast, I suggest that access accounts appear well-positioned to steer clear of the objection I pose which gives us a new reason to favor access over control accounts. I end the reply by suggesting that privacy right violations might involve what I term ‘normative control’, but that this kind of control is unlikely to vindicate the claims that the control theorists seek to establish.

A counterexample’ section briefly restates Mainz and Uhrenfeldt’s position and provides my main objection. ‘Wider implications’ section lays out the upshots of my argument and ‘Conclusion’ section concludes briefly.

A Counterexample

According to any control account of privacy rights violations, such violations necessarily involve a loss of some sort of ‘control’. This sets such accounts apart from so-called ‘access’ accounts that maintain that what is essential to privacy violations is that they involve some form of ‘access’. Mainz and Uhrenfeldt’s (p. 12) favored version of the control account goes as follows:

The Control Account: For any agent A to have her right to privacy violated, there is a necessary and sufficient condition that must be satisfied: agent A has involuntarily lost Negative Control over the access to personal information P about agent A, due to action(s) of agent B, for which B is responsible.

The control account aims to provide the necessary and sufficient condition for a violation of a privacy right. The full definition is dense, but for current purposes we should focus our attention on the notion of ‘negative control’ and how it is invoked in their argument. Mainz and Uhrenfeldt define ‘negative control’ as follows (p. 7):

Negative Control: Agent A enjoys Negative Control over access to relevant information P, if, and only if, A is capable of preventing agent B, who attempts to access, from accessing P.

The notion of negative control is supposed to indicate the specific sense in which violations of privacy involve a loss of (some kind of) control (over information). Specifically, Mainz and Uhrenfeldt focus on a case in which some agent (B) attempts to access a piece of information and another agent, A, is unable to prevent B from successfully completing his endeavor. In such cases, there is a loss of negative control, the kind of loss that is necessary and sufficient for a violation of privacy according to Mainz and Uhrenfeldt.

One attractive feature of their view is that it seemingly avoids Thomson’s (1975) influential counterexample to the control account of privacy violations, which runs as follows:

If my neighbor invents an X-ray device which enables him to look through walls, then I should imagine I thereby lose control over who can look at me: going home and closing the doors no longer suffices to prevent others from doing so. But my right to privacy is not violated until my neighbor actually does train the device on the wall of my house. (p. 304)

Typically, Thomson’s example is taken as an unattractive implication of certain variants of the control account. The reason is that, as Thomson herself states, we would not want to say that somebody’s right to privacy has been violated before someone trains the device on somebody’s privacy-relevant object. Control accounts that measure out control (only) as a function of other people’s ability to access relevant information are vulnerable to this objection, and so the notion of control must be weakened in order not to have this implication.Footnote 1 The concept of negative control is supposed to provide this weaker notion of control and is also supposed to demonstrate in just what sense privacy right violations involve a loss of control. This is achieved by introducing a further necessary condition according to which negative control exists or can be lost only if some person actually attempts access.

Pace Mainz and Uhrenfeldt, I maintain that a loss of negative control is not a necessary condition for a violation of privacy rights.Footnote 2 Consider first the following case, meant to illustrate the attractiveness of Mainz and Uhrenfeldt’s control account—a case in which privacy is intuitively violated:

Wiretapping Smith and Jones are neighbors. Unbeknownst to Jones, Smith wiretaps Jones’s telephone, using a fancy device which allows Smith to listen in on Jones’s conversations without violating Jones’s property rights. As it happens, Jones is on vacation for several months, and therefore does not use the telephone in that time period. (p. 13)

Wiretapping is meant to showcase how their control account fares better in comparison to the rival access account of privacy violations. What sets these accounts apart according to Mainz and Uhrenfeldt is that the latter requires that information is actually accessed. Mainz and Uhrenfeldt claim that there is not ‘actual access’ to Jones’s personal information, and thus that the access account cannot identify a violation of the right to privacy. This speaks against the access account as it seems intuitively right that there is a violation of privacy in Wiretapping. However, as Mainz and Uhrenfeldt maintain, ‘Jones has lost negative control over the access, since Smith can now listen to Jones’s telephone conversations’ (p. 13). Hence, a control account based on the notion of negative control can identify the sense in which Wiretapping involves a loss of control and explain why Smith’s conduct is morally objectionable.

I now offer a counterexample purporting to show that a loss of negative control is not necessary for a violation of the right to privacy. Consider:

Wiretapping #2. Smith and Jones are neighbors. Smith wiretaps Jones’s telephone, using a fancy device which allows Smith to listen in on Jones’s conversations without violating Jones’s property rights. Unbeknownst to Smith, Jones has an even fancier device enabling him to both monitor the extent to which he is being subjected to wiretapping and shut down the tapping at the mere push of a button. Jones does not, however, deploy his device to prevent Smith’s plan.

In this case, it also seems intuitively right to say that Smith violates Jones’s right to privacy.Footnote 3 However, at no point is Smith rendered incapable of controlling Jones’s access via wiretapping. Smith just does not act in order to prevent it. If Wiretapping #2 involves a violation of privacy rights, then a loss of negative control is not a necessary condition for a privacy rights violation.

Mainz and Uhrenfeldt might respond by maintaining that Wiretapping #2 does not involve a violation of Jones’s right to privacy. However, I fail to see how this response could be rendered compelling. By analogous reasoning, we normally think that an assaulter violates an assaultee’s rights, even if the assaultee is perfectly able to fend off the assaulter. While it might be prudent of the assaultee (Jones might be likened to an assaultee) to defend himself, a failure to engage in self-defense when one has the ability to successfully do so does not make it the case that the assaulter does not violate the assaultee’s rights.Footnote 4

Instead, Mainz and Uhrenfeldt might retort that, since Jones does not push the button to fend off the wiretapping, this reveals that Jones actually wanted to be wiretapped and so Smith violates no rights as he acts in accordance with Jones’s will. If there is no violation of privacy in Wiretapping #2, in turn, there is no reason to think that Mainz and Uhrenfeldt fail in providing a necessary condition for a violation of privacy. This response might raise a much broader question about whether consent-based permissions are best understood as a form of communication or as an act of the will, which I cannot pursue presently.Footnote 5 However, for current purposes it seems enough to say that it strikes me as unpersuasive to infer from Jones’s inaction that he necessarily wanted the wiretapping to happen, as we can imagine several reasons why Jones did in fact not act even though he had the ability to do so.Footnote 6

Wider Implications

Where does this objection leave us? It leaves us with the result that the notion of negative control does not provide a necessary condition for a violation of a privacy right. More generally, my objection shows that the control account might still be in bad standing compared to the access account. The pro tanto reason that Mainz and Uhrenfeldt offer for favoring their version of the control account—to wit, that it succeeds in explaining their Wiretapping case and that it avoids Thomson’s objection—might very well be outweighed by the fact that it fails to capture other important cases such as Wiretapping #2. On this wider question, Mainz and Uhrenfeldt write that none of the examples or thought experiments provided by the access theorists in the literature so far seem to count decisively in favor of the AA [access account, red.] like Wiretapping counts decisively in favor of the CA [control account, red.]. We cannot think of an example, which stacks the deck of cards in favor of the AA, so we invite the access theorists to provide such an example (p. 14). As argued above, Wiretapping #2 casts doubt on the claim that Mainz and Uhrenfeldt have identified a necessary condition for a violation of privacy with their conception of negative control and thereby puts renewed pressure on the control account of privacy rights. However, is it plausible to think that the rival access account can accommodate cases such as Wiretapping #2? While a full answer to this question is beyond what can be achieved within this reply, the access account seems particularly well-suited to make sense of the idea that Wiretapping #2 involves a violation of privacy. The reason is that, although there is no loss of negative control in this case, there certainly is actual access to whatever information happens to be present on Jones’s telephone line in Wiretapping #2.Footnote 7 It seems, then, that access accounts are particularly well-equipped to deal with cases in which the negative control-based control account fails to align with intuitions.

If republican control identifies too strong a form of control, and negative control appears irrelevant, in what sense might it be true that privacy right violations involve ‘control’? Here is a possibility: violations of the right to privacy (as with, I suspect, any other waivable right) might involve what we can call normative control.Footnote 8 Normative control is not control over any property of the natural, physical world (call this ‘non-normative control’). Rather, it is a form of control that we have over the normative relations we have to other people. Specifically, the kind of control that is involved in cases such as Wiretapping and Wiretapping #2 might be the fact that Jones has the moral power to decide whether Smith’s conduct wrongs him.Footnote 9 Note that this kind of control is unaffected by Smith’s conduct or abilities. In turn, this normative control simply reflects our commitment to the thought that Smith’s conduct wrongs Jones unless Jones beforehand alters the moral landscape by giving Smith permission to tap the wire. While normative control is a type of ‘control’, normative control is unlikely to vindicate the claims that the control theorists want to make, since the kind of control that the control theorists are after seems to be a form of non-normative control that is present in cases that specifically involve violations of privacy rights. However, normative control is a perfectly general relation that is likely to be present in any rights-based relationship where the right in question is waivable.

Conclusion

Mainz and Uhrenfeldt have recently claimed that a violation of the right to privacy can be defined successfully by reliance on the notion of ‘negative control’. In this reply, I have shown that negative control is at best contingently related to privacy rights violations, as an involuntary loss of negative control is not a necessary condition for a violation of privacy. It follows that control theorists have yet to put forth a complete and successful normative account of privacy.