Privacy and Surveillance Surveyed

  • Ian Berle
Part of the Law, Governance and Technology Series book series (LGTS, volume 41)


This chapter considers how surveillance modalities affect privacy. The modalities include government sanctioned CCTV or social networks, each of which create tensions and concerns between the data subject-citizen and the data processor.

The chapter focuses on the wide uses of surveillance and considers the sociological and philosophical responses to the burgeoning levels of surveillance and its effect on personal liberty, especially, when the prevailing political view that increased surveillance and subsequent incursions of personal liberty is a societal good. The chapter also concentrates on autonomy and related privacy issues that are associated with the acquisition of images or audio recordings by selected agencies and how those images or recordings are used or disseminated.


  1. Agamben G (2005) State of exception (trans: Attell K). The University of Chicago Press, Chicago and LondonGoogle Scholar
  2. Brennan P, Berle I (2011) The ethical and medical aspects of photo-documenting genital injury. In: Gall J, Payne-James J (eds) Current practice in forensic medicine. Wiley-Blackwell, Chichester, p 146Google Scholar
  3. Brin D (1998) The transparent society: will technology force us to choose between privacy and freedom. Addison-Wesley, ReadingGoogle Scholar
  4. Bruggeman and Scheuten v Federal Republic of Germany [1981] EHRR 244 at paragraph 56. My italics. Accessed 8 Aug 2019
  5. Chesterman S (2011) One nation under surveillance: a new social contract to defend freedom without sacrificing liberty. Oxford University Press, Oxford, p 12Google Scholar
  6. Douglas & Anor v Northern and Shell Plc & Anor [2001] QB 967, [2001] UKHRR 223, [2001] 1 FLR 982, [2001] EMLR 9, [2001] FSR 40, [2001] 2 All ER 289, [2001] HRLR 26, 9 BHRC 543, [2001] 2 WLR 992, [2002] 1 FCR 289, [2000] EWCA Civ 353, at 126. Accessed 8 Aug 2019
  7. Dworkin G (1988, reprinted 1997) The theory and practice of autonomy. Cambridge University Press, Cambridge, p 14Google Scholar
  8. Edgar TH (2017) Beyond Snowden: privacy, mass surveillance and the struggle to reform the NSA. Brookings Institution PressGoogle Scholar
  9. El-Abed M et al (2010) A study of users’ acceptance and satisfaction of biometric systems. IEEE International Carnahan Conference on Security Technology (ICCST), 2010, San Francisco, United States. Accessed 8 Aug 2019
  10. Garfinkel S (2000) Database nation: the death of privacy in the 21st century. O’Reilly & Associates Inc, SebastopolGoogle Scholar
  11. Gavison R (1980) Privacy and the limits of the law. Yale Law J 89:421, 423. Accessed 8 Aug 2019
  12. Gregory P, Simon MA (2008) Biometrics for dummies. Wiley Publishing Inc., IndianapolisGoogle Scholar
  13. Human Rights Act (HRA) 1998. Accessed 8 Aug 2019
  14. Lyon D (2003) (reprinted 2004 & 2008) Surveillance after September 11. Polity Press, CambridgeGoogle Scholar
  15. Lyon D (2007) (reprinted 2011) Surveillance studies: an overview. Polity Press, CambridgeGoogle Scholar
  16. Marx GT (1996) Ethics for the new surveillance. In: Bennett CJ, Grant R (eds) 1996 Visions of Privacy. University of Toronto Press, Toronto, p 40Google Scholar
  17. Mordini E, Petrini C (2007) Ethical and social implications of biometric identification technology. Ann Ist Super Santa 43(1):5–11. Accessed 8 Aug 2019
  18. Morrison K (2015) Survey: many users never read social networking terms of service agreements. Accessed 8 Aug 2019
  19. Nelson LS (2011) America identified: biometric technology and society. Massachusetts Institute of Technology, MassachusettsGoogle Scholar
  20. Nissenbaum H (2010) Privacy in context: technology, policy and the integrity of social life. Stanford University Press, Stanford, p 70Google Scholar
  21. R v Loveridge, EWCA Crim 1034, [2001] 2 Cr App R 29 (2002)Google Scholar
  22. Roddy (a minor); Torbay Borough Council v News Group Newspapers [2004] EMLR 127, [2004] 2 FLR 949, [2004] Fam Law 793, [2003] EWHC 2927 Fam), [2004] 1 FCR 481, at 36. Accessed 8 Aug 2019
  23. Schwartz PM, Solove DJ (2014) Reconciling personal information in the United States and European Union. Calif Law Rev 102:877. Accessed 8 Aug 2019Google Scholar
  24. Solove DJ (2011) Nothing to hide: the false trade off between privacy and security. Yale University Press, New Haven and LondonGoogle Scholar
  25. Solove DJ (2012) Privacy self-management and the consent dilemma. Harv Law Rev 126:1880 (2013); GWU Legal Studies Research Paper No. 2012-141; GWU Law School Public Law Research Paper No. 2012-141. Accessed 8 Aug 2019
  26. Sullivan A (2014) Mistaken identity. Accessed 8 Aug 2019
  27. Surveillance Camera Commissioner. Accessed 8 Aug 2019
  28. Tagg J (1988) The burden of representation: essays on photographies and histories. Palgrave-Macmillan, BasingstokeCrossRefGoogle Scholar
  29. van der Ploeg I (2005) Biometric identification technologies: ethical implications of the informatization of the body. Biometric Technology & Ethics, BITE Policy Paper no.1 (unpaginated draft paper). Accessed 8 Aug 2019
  30. Von Hannover v Germany Application no. 59320/00 Judgement 24 June 2004 at paragraph. 50. Accessed 8 Aug 2019
  31. Wacks R (1989) (revised 1993) Personal information: privacy and the law. Clarendon Press, Oxford, p 14Google Scholar
  32. Warren SD, Brandeis LD (1890) The right to privacy (the implicit made explicit). Harv Law Rev:193–220. Accessed 8 Aug 2019
  33. Welinder Y (2012) A face tells more than a thousand posts: developing face recognition privacy in social networks. Accessed 8 Aug 2019
  34. Westin AF (1967) Privacy and freedom. Bodley Head, LondonGoogle Scholar
  35. Whitehead JW (2013) A government of wolves: the emerging American police state. Select Books Inc, New YorkGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Ian Berle
    • 1
  1. 1.SuttonUK

Personalised recommendations