A Brief History of Privacy

  • Daniel Marshall
  • Terry Thomas
Chapter

Abstract

Privacy has evolved over the years from that which existed in simple rural communities to that of today’s complex cities. This chapter looks at the Elizabethan age of spies and intrigue through to the Victorians and their forms of identification by fingerprints, photographs and the collection of criminal records. Today the protection of privacy in the digital age with large databases and other sophisticated technology raises questions of data protection and legal rights to privacy.

Bibliography

  1. Alford S (2012) The Watchers: A Secret History of the Reign of Elizabeth I, London: Allen Lane/Penguin Press.Google Scholar
  2. Anderson R, Brown I, Dowty T, Heath W, Inglesant P and Sasse A (2009) Database State: A Report Commissioned by the Joseph Rowntree Reform Trust Ltd Nation, York: Rowntree Trust.Google Scholar
  3. BBC News (2006) Britain Is ‘Surveillance Society,’ 2 November (available at http://news.bbc.co.uk/1/hi/uk/6108496.stm accessed 27 January 2017).
  4. BBC News (2015a) Dorset, Devon and Cornwall Police Forces to Trial Drones, 2 November (available at http://www.bbc.co.uk/news/uk-england-34700588 accessed 3 March 2017).
  5. BBC News (2017a) Is It OK to Watch Porn in Public? 14 January (available at http://www.bbc.co.uk/news/magazine-38611265 accessed 17 January).
  6. Beavan C (2001) Fingerprints: The Origins of Crime Detection and the Murder Case that Launched Forensic Science, New York: Hyperion.Google Scholar
  7. Bernstein C and Woodward B (1974) All the Presidents Men, New York: Simon and Schuster.Google Scholar
  8. Bichard Inquiry (2004) Report HC 653, June, London: TSO.Google Scholar
  9. Blair T (2002) Rebalancing the Criminal Justice System (Speech), 18 June (Reproduced in The Guardian available at https://www.theguardian.com/politics/2002/jun/18/immigrationpolicy.ukcrime1 accessed 28 January 2017).
  10. Bunyan T (1977) The History and Practice of the Political Police in Britain, London: Quartet Books.Google Scholar
  11. Calcutt Report (1990) Report of the Committee on Privacy and Related Matters, Cm1102, June, London: HMSO.Google Scholar
  12. Campbell D and Connor S (1986) On the Record: Surveillance, Computers, and Privacy, London: Michael Joseph.Google Scholar
  13. CoE (Council of Europe) (1950) European Convention on Human Rights, Strasbourg.Google Scholar
  14. CoE (Council of Europe) (1981) Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data, (Convention No. 108), Strasbourg.Google Scholar
  15. Dovey HO (1986) Why National Registration Had to Go. Public Administration, 64: 459.Google Scholar
  16. Dyer C (2000) Privacy Violated by Gay Sex Laws. The Guardian, 1 August.Google Scholar
  17. EU (European Union) (1995) Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, Official Journal L 281, 23/11/1995 P. 0031 – 0050, Brussels.Google Scholar
  18. EU (European Union) (2000) Charter of Fundamental Rights of the European Union, (2000/C 364/01), Brussels.Google Scholar
  19. Fido J (1977) The Charity Organisation Society and Social Casework in London 1869–1900, in Donajgrodski AP (ed.) Social Control in Nineteenth Century Britain, London: Croom Helm.Google Scholar
  20. Fitzgerald P and Leopold M (1987) Stranger on the Line, London: Bodley Head.Google Scholar
  21. Ford R (2004) Beware Rise of Big Brother State, Warns Data Watchdog. The Times, 16 August.Google Scholar
  22. Grey A (1992) Quest for Justice; Towards Homosexual Emancipation, London: Sinclair-Stevenson.Google Scholar
  23. HMG (HM Government) (2006b) Information Sharing Vision Statement, DCA 47/06, September, London.Google Scholar
  24. HMG (HM Government) (2010a) The Coalition: Our Programme for Government, May, London: Cabinet Office.Google Scholar
  25. Home Office (1995a) DNA Database Goes Live (Press Release) 10 April, London.Google Scholar
  26. House of Commons (2003) Privacy and Media Intrusion Culture, Media and Sport Select Committee (5th Report of Session 2002–3), Vol. 1 HC 458-1, May, London.Google Scholar
  27. House of Commons (2008) A Surveillance Society? Home Affairs Committee (5th Report of Session 2007–08), HC 58-I, May, London.Google Scholar
  28. House of Commons (2015a) Privacy and Security: A Modern and Transparent Legal Framework Intelligence and Security Committee, HC 1075, March, London.Google Scholar
  29. House of Lords (2009) Surveillance: Citizens and the State Select Committee on the Constitution (2nd Report of Session 2008–9), HL Paper 18–1, February, London: TSO.Google Scholar
  30. House of Lords/House of Commons (2012) Draft Communications Data Bill, Joint Committee on the Draft Communications Data Bill (Session 2012–13), HL Paper 79/HC 479, December, London.Google Scholar
  31. ICC (Interception of Communications Commissioner) (2015) Half-Yearly Report of the Interception of Communications Commissioner, HC 308, July, London.Google Scholar
  32. Ignatieff M (1978) A Just Measure of Pain, New York: Random House.Google Scholar
  33. Jeffreys-Jones R (2017) We Know All About You: The Story of Surveillance in Britain and America, Oxford: Oxford University Press.Google Scholar
  34. Justice (1970) Privacy and the Law, London.Google Scholar
  35. Kent J (1986) The English Village Constable 1580–1642, Oxford: Clarendon Press.Google Scholar
  36. Kimball P (1983) The File, London: George Allen & Unwin.Google Scholar
  37. Law Commission (2010) Simplification of Criminal Law: Public Nuisance and Outraging Public Decency – Consultation Paper No. 193, London: Law Commission.Google Scholar
  38. Leveson Report (2012) An Inquiry into the Culture, Practices and Ethics of the Press, HC 779, London: TSO.Google Scholar
  39. Lindop Report (1978) Report of the Committee on Data Protection, Cmnd. 7341, London: HMSO.Google Scholar
  40. Lyon D (2006) Theorizing Surveillance: The Panopticon and Beyond, Cullompton: Willan Publishing.Google Scholar
  41. Madgwick D and Smythe T (1974) The Invasion of Privacy, London: Pitman Publishing.Google Scholar
  42. McLynn F (1989) Crime and Punishment: Eighteenth Century, London, England: Routledge.Google Scholar
  43. Milne S (2004) The Enemy Within: The Secret War Against the Miners, 3rd ed., London: Verso Books.Google Scholar
  44. Orwell (1949) Nineteen Eighty Four, London: Secker and Warburg.Google Scholar
  45. Palmer SH (1988) Police and Protest in England and Ireland 1780–1850, Cambridge: Cambridge University Press.Google Scholar
  46. Porter B (1987) The Origins of the Vigilant State, London: Macmillan.Google Scholar
  47. Porter B (1989) Plots and Paranoia: A History of Political Espionage in Britain 1790–1988, London: Routledge.Google Scholar
  48. Rule J (1973) Private Lives and Public Surveillance, London: Allen Lane.Google Scholar
  49. Shepherd J (2010) Family Win School Catchment Spying Case. The Guardian, 2 August.Google Scholar
  50. Stephen JF (1973) A History of the Criminal Law of England, New York: Franklin.Google Scholar
  51. Thomas T (2007) Criminal Records: A Database for the Criminal Justice System and Beyond, Basingstoke: Palgrave Macmillan.Google Scholar
  52. Thompson E (1968), The Making of the English Working Class, Harmondsworth: Penguin.Google Scholar
  53. Thompson E (1977) Whigs and Hunters: The Origin of the Black Act, Harmondsworth: Penguin.Google Scholar
  54. Travis A (2009) Right to Privacy Broken by a Quarter of UK’s Public Databases, Says Report. The Guardian, 23 March.Google Scholar
  55. UN (United Nations) (1948) Universal Declaration of Human Rights, New York: United Nations.Google Scholar
  56. UN (United Nations) (1989) Convention on the Rights of the Child, New York: United Nations.Google Scholar
  57. Vincent D (2016) Privacy: A Short History, Cambridge: Polity Press.Google Scholar
  58. Warren S and L Brandeis (1890) The Right to Privacy. Harvard Law Review, 4(193) 15 December.Google Scholar
  59. Watt N (2000) 3m Face DNA Tests in Blair Crime Initiative. The Guardian, 1 September.Google Scholar
  60. Watts S (1991) Police Computer Could Be Threat to Civil Rights. The Independent, 18 December.Google Scholar
  61. Westin A (1967) Privacy and Freedom, London: Bodley Head.Google Scholar
  62. Wilson R and Adams I (2006) Special Branch: A History: 1883–2006, London: Biteback Publishing.Google Scholar
  63. Wolfenden Report (1957) Report of the Departmental Committee on Homosexual Offences and Prostitution in Great Britain, Cmnd. 247, London: HMSO.Google Scholar
  64. Wright P (1987) Spycatcher, New York: Viking.Google Scholar
  65. Younger Report (1972) Report of the Committee on Privacy, Cmnd. 5012, London: HMSO.Google Scholar
  66. Zamyatin Y (1993) We, Harmondsworth: Penguin.Google Scholar

Copyright information

© The Author(s) 2017

Authors and Affiliations

  • Daniel Marshall
    • 1
  • Terry Thomas
    • 2
  1. 1.School of LawLiverpool John Moores UniversityLiverpoolUK
  2. 2.School of Social SciencesLeeds Beckett UniversityLeedsUK

Personalised recommendations