The author of this work is Ellis Weinberger

This work was accepted towards a MSc. (Econ) in Information and Library Studies at the University College of Wales, Aberystwyth.

Privacy, Databases, and Jewish Law


Introduction


This paper will ask the following questions:

Does privacy have significance in Western liberal thought?

How is privacy being infringed by modern information technology in use by credit database and direct marketing firms?

What are the moral concepts which can be said to form the Jewish view of this form of privacy encroachment?

The questions addressed in this dissertation are important because professionals dealing in the collection, classification, and retrieval of information may find themselves dealing with records which contain information on human individuals. Infringing the privacy of individuals has many ethical implications, which need to be examined. In order to make reasoned judgments when deciding on policies for dealing with records on individuals, information professionals need a moral framework.

The author of this dissertation was drawn to this topic for two reasons. Firstly, grandparents on both sides of his family, in order to save their lives, have had to flee authoritarian regimes and seek refuge in societies operating under a Western, liberal, democratic code of morality. Secondly, the author, having been raised in the Jewish tradition, was interested to see how concepts from a Jewish view of morality could be applied to the problem of modern privacy invasion.

The author has also trained as a librarian, and sees the role of librarian as having special significance in a Western liberal democracy. By enabling and facilitating the education of an informed voting citizenry, the librarian can be seen to assist in the creation of a genuinely enfranchised population.

In this dissertation the functions which privacy serves in Western liberal society are examined by perusing texts from the middle and late twentieth century by writers who support privacy, human rights, and political debate in the Western liberal tradition.

The concepts behind Jewish religious law are introduced by examining the way it has been studied and set over the generations. Some readers may not be familiar with the process behind Jewish religious law, so basic texts are introduced, and the way the basic texts are used when ruling on Jewish law is explained. The concepts underlying the laws of privacy in Judaism are illustrated by referring to modern writers who explain the application of Jewish religious law to current questions about privacy. The references to Jewish religious law, which is not the law of the land in any country, and is only applied by consent of the judged, are introduced in order to clarify the concepts behind the morality of privacy in the Judaic way of life and thinking.

All actions, whether legislative or technical, need ethical frameworks to guide the people carrying out the actions. However, no matter what framework is devised, it will only be the individuals carrying out actions under that framework who can enable privacy to be maintained by their own commitment to the moral basis of the framework.

Examples of databases sited are those which are maintained by companies for commercial reasons. These were chosen because they are both widely available, and used by librarians when answering commercial queries. The effects of using these databases can intrude in to the privacy of everyone who participates in commercial activity in society, and this sort of intrusion can be carried out by any organisation with sufficient financial resources.

The dissertation is composed of four chapters. The first chapter examines the moral basis of privacy in our western, liberal, democratic, society. The second describes how computer databases and database search techniques impinge on privacy, while the third chapter examines what the Jewish point of view is on privacy. The fourth chapter suggests uses of the Jewish view of privacy as a basis, to provide guidelines for the ethics of database use.

The first chapter introduces the concept of privacy and illustrates how the right to privacy might be justified from a moral point of view in a Western, liberal, democracy. The chapter moves from the function of privacy in the political process, to the personal need for privacy, then to the function privacy plays in creativity, and finally to the social function of privacy.

The second chapter begins by describing some of the commercial databases which facilitate and track the financial transactions in our daily lives. The chapter continues by examining some techniques which enable the owners of these databases to discover a great deal about us by using the databases which they own. The chapter concludes by explaining how storage and analysis of information about us impinges on our privacy.

The third chapter elucidates the concepts behind the Jewish approach to privacy. The chapter starts by examining Jewish religious laws which are connected to privacy, by citing cases where these laws are applied in rabbinical courts, and concludes by explaining the basic concepts which underlie the Jewish approach to privacy for the individual.

The fourth, and final, chapter shows the contrast between the viewpoint on privacy as expressed in Jewish law and the tendency for information technology to impinge upon privacy. The chapter concludes by explaining how Jewish law can be used to judge situations where information on individuals is stored, manipulated, and sold. By proposing possible moral guidelines, the work may aid in the process of planning and executing information storage and retrieval policies.

Privacy, databases, and Jewish Law


Chapter One


Why is privacy important in a liberal, representative, democracy?

There are records which exist because a person lives and acts in this world. The concept of privacy this dissertation is considering is the right of the individual to privacy for these records. These records may, for example, contain information on the purchases she makes, the telephone calls she carries out, or the journeys she undertakes.

The form of liberal democracy assumed here, is the one currently common in very few countries in the world. It is practised, or an attempt is made to practise it, in countries such as Canada, the United States, and most members of the European Community. In a liberal democracy, the political system is meant to enlarge the liberty, in other words the freedom of choice, of the individual. The individual is constrained only by the needs of the community, as expressed by the voice of people in elections accessible to all those governed.

The very establishment of a liberal democracy depends upon the rights and autonomy of the individual. The basic essence of the totalitarian idea is the negation of the right for the individual, or the will of the individual, to have any significance, by itself. Any totalitarian political philosophy, whether calling itself communist, fascist, or religious, takes to itself sole arbitration of values and power, and thus must negate the significance of the individual as a bearer of values and maker of decisions.

Liberalism is based on the idea that the will of the individual is of significance quite apart from any public role. In order for a liberal democracy to function, each person needs to be an autonomous individual, free to act within broad limits.

"...The liberal...claims not merely a private capacity- an area of action in which he is not responsible to the state for what he does so long as he respects certain minimal rights of others; he claims further that this is the residual category, that the onus is on anyone who claims he is accountable." (Benn 1971, 239-240)

Democratic politics requires autonomous people, with the confidence to hold and argue opinions. With the aid of privacy for the individual or the group of individuals, opinions can be debated, compromises reached, and policies decided. Privacy reduces the vulnerability, and even more important, the feeling of vulnerability, of any group or individual attempting to think about change. Gavison declares that the basis of participatory politics is the privacy of an individual's private life. Without privacy, more is asked of the tolerance of society than can be borne by the society. Privacy thus injects flexibility into the body politic.

"...Privacy is crucial to democracy in providing the opportunity for parties to work out their political positions, and to compromise with opposing factions, before subjecting their positions to public scrutiny. Denying the privacy necessary for these interactions would undermine the democratic process." (Gavison 1980, 369)

Privacy of the individual is of the very fabric of a democratic society. One of the measures by which a democracy can be judged, is by the quality of privacy afforded to groups and individuals. By enabling privacy for the individual, a democratic society sets limits on the machinery of power. Indeed, by facilitating privacy, society is setting limits on the power of the ruler, since a limit is being set to the wish of the ruler to know all, and therefore control all.

"Just as a social balance favouring disclosure and surveillance over privacy is a functional necessity for totalitarian systems, so a balance that ensures strong citadels of individual and group privacy and limits both disclosure and surveillance is a prerequisite for liberal democratic societies. The democratic society relies on publicity as a control over government, and on privacy as a shield for group and individual life." (Westin 1967, 24)

The morality of privacy

It can be argued that there is a moral basis for the right to information privacy. Privacy is important so that we can be human at all. That is to say, that in order to be able to function as human beings, we must have privacy. Umberto Eco, linguist, semiologist, university professor, and distinguished novelist, introduces the idea that individuals have rights because they have bodies.

"Q. If there are only preferences and no truths, what basis can we find for a definition of what is universally intolerable: one that the whole world can support and that is independent of cultural, educational or religious differences?

A. On respect for the body. One could construct a whole ethic based on respect for the body and its functions: eating, drinking, pissing, shitting, sleeping, making love, talking, listening, and so on. To stop someone sleeping at night, to force them to hang upside down, is a form of intolerable torture. To forbid others to move or to speak is equally intolerable. Rape does not respect the body of someone else. All types of racism and exclusion are, in the end, ways of denying the body of another. One could reinterpret the entire history of ethics in the light of the rights of the body and the relationship of our body to the rest of the world..." (Eco 1994, 54)

The way of thinking which Eco utilises can be used to escape, to some extent, the claims that human rights have no basis in an objective reality. The concept which he endorses tends to give a cross cultural basis for judging the validity of human rights.

We might say, then, that by looking at the needs of people's bodies, we can judge which rights people can make a claim to. Since, for certain of the functions of the body of the person, such as excretion and sexual activity, privacy is highly preferable, and since the human race cannot exist without these functions being performed at some time, we can reasonably conclude that the right to privacy is based upon the right to continue to exist. Our bodies have functions, and therefore needs as an outcome of those functions. One of those needs is privacy.

One could argue that there is no need for privacy at all, and that we would all be much healthier and happier if everyone knew everything about us. But there is a vast difference between an "optional" privacy, which gives us the opportunity be as open as we like and to share all our secrets if we see fit, and total mandatory disclosure, which might easily cause information concerning our emotional, mental and physical health to be made public knowledge in ways injurious to us.

We are considering the confidentiality of records which contain information on the individual. If all privacy can be said to be a human right (because only privacy allows us to carry out essential bodily functions,) then, in order to be allowed to live properly according to Eco's criteria, we must have control over the confidentiality of personal data about us.

We need autonomy in order to become, and be, human

Therefore, we need privacy to perform the functions which keep us in existence as human beings. This free functioning of our bodies has been described as autonomy, and this autonomy is claimed as a right by Judith Squires, of the Department of Politics, University of Bristol.

"....For the body can be viewed as one of the core territories of the self: control over one's body is crucial to the maintenance of a sense of self and hence the ability to interact openly with others. To have control over one's own bodily integrity (to regulate access to it) and to have this integrity recognised, is a minimal precondition for free and equal social interaction. To ensure the possibility of such an embodied autonomy for all persons in contemporary society...we will need a political defence of privacy rights." (Squires 1994, 399)

Squires can be seen to be taking the argument which Eco started one step further, by implying that control over one's body, which is a need inherent in the ownership of a body, can only be attained by having privacy. Access to information about the activities of the body of the person can be seen as equivalent to access to the body of the person, because the opportunity for access to the body gives whoever has access the option to injure, and information about the body also gives this option. Persons planning to harm an individual gather information on the individual in order to facilitate an attack. (U.S. Army Military Police School n.d., 17)

Privacy can be seen as enabling the growth of autonomy. Only by allowing the individual time and space to experiment with her sense of judgment, I would argue, can moral judgment be fostered. By being able to practise taking autonomous decisions, an individual learns how to make moral decisions. In a liberal, representative, democracy, where we assume that decisions will be made by the will of the people, encouraging moral development in the individual must increase the likelihood of well thought-out moral decisions to achieve common ends. By giving the individual the privacy to develop moral judgment, we foster a moral society.

"We cannot learn to be autonomous save by practising independent judgment. It is important for the moral education of children that at a certain stage they should find the rules porous- that sometimes they should be left to decide with is best to do. Not many of us perhaps have gone so far along the road to moral maturity that we can bear unrelenting exposure to criticism without flinching." (Benn 1971, 242)

In order for any individual to become an individual, the person concerned must be allowed to think her own thoughts in her own time. When a person is always under scrutiny, and knows that she is always under scrutiny, she can only act in a manner which reduces the likelihood that she will attract hostile attention. Her behaviour and thoughts and speech will either tend to those of the crowd, or else she will refrain from all contribution to society, by hiding. If we, as a society, want to foster the development of individuals, and discourage the growth and power of mob rule, we must give individuals privacy.

"The man who is compelled to live every minute of his life among others and whose every need, thought, desire, fancy, or gratification is subject to public scrutiny, has been deprived of his individuality and human dignity. Such an individual merges with the mass." (Bloustein 1964, 188)

We need privacy in order to develop into creative humans

A liberal democracy can reach its highest potential when all of the citizens of the state can contribute to society in their own way, which cannot be predicted or commanded . A liberal democracy flourishes by encouraging creativity, which multiplies the options and opportunities available to society.

The individual needs privacy. Humans are more than ciphers with rigid roles in an economic system, and if humans are treated as ciphers, the system itself loses much of what the individual has to offer.

One of the most productive ways the individual can contribute to society is by creating and developing new ideas. Creativity flourishes when the individual has an opportunity to listen to herself and foster her talents. To do that, the person must have an environment which enables her to nurture her ideas.

(Of course, since people have within themselves the potential and the capability to be creative, and since we have based our argument for rights on the functions that a human body can carry out, we could say that restraining or otherwise preventing human creativity is also tantamount to denying a human right.)

Since the possibility of creativity is an outcome of autonomy, and since the development of autonomy necessitates privacy, therefore in order for humans to fulfil their creative function, they must have privacy.

Only with the time and space to be alone can true creativity flourish. When people are continually being watched and prodded to conform, they cannot pay attention to their inner selves. From a person's inner self comes the different and the new, which with proper encouragement become innovative ideas. If we allow the individual the time and opportunity to contemplate her own ideas, creative work can occur.

"Studies of creativity show that it is in reflective solitude and even daydreaming during moments of reserve that most creative non-verbal thought takes place. At such moments the individual runs ideas and impressions through his mind in a flow of associations; the active presence of others tends to inhibit this process." (Westin 1967, 37)

The possibility of making mistakes without sanctions enables learning, and thus creativity. Without the feeling that one can make mistakes quietly on the way to learning, and the opportunity to learn by making mistakes, neither learning nor creativity will occur, except, perhaps, among people brave enough, or foolish enough, to be willing to fail and be embarrassed in public.

"No one likes to fail, and learning requires trial and error, some practice of skills, some abortive first attempts before we are sufficiently pleased with our creation to subject it to public scrutiny. In the absence of privacy we would dare less, because all our early failures would be on record. We would only do what we thought we could do well. Public failures make us unlikely to try again." (Gavison 1980, 364)

We need privacy in order to become and be social humans

Humans need a social life. Social life is an aspect of autonomous human life, and building a social sphere means incorporating privacy for individuals, for without privacy, the individuals will not be able to act socially. Privacy seems to play a major role in enabling social interaction. The very existence of a spectator eliminates the possibility of certain relationships.

"...He [the observer] is making use of the outward appearance of those involved in intimacy. Whether it is used as a means to sensual satisfaction or as a means to learn about the experience, it is still being used. And this is an affront to the relationship of which it is an intrinsic part." (Gerstein 1978, 270)

By eliminating the possibility of a circumstance where friendship, love, or worship can happen the observer snatches away the fulfilment of a human need. Simply by observing, he destroys whatever relationship he observes. The observer, by forbidding these human functions, thus acts in an immoral manner, that is, denies the rights of the body, as defined by Eco.

The individual's freedom of action in the social sphere depends upon control over whether, and how, the relationship is observed. For example, if a courting couple is accompanied by a chaperone, then the behaviour of the couple might very well be different from the behaviour of a courting couple not accompanied by a chaperone! Information about the relationship is an integral part of the relationship. Only when individuals have control over the information about themselves that they are imparting to one another, can individuals have control over the kind of relation they will have with one another. Only then can we truly say that the individuals have control over their own behaviour.

As Rachels summed it up:

"We now have an explanation of the value of privacy in ordinary situations in which we have nothing to hide. The explanation is that, even in the most common and unremarkable circumstances, we regulate our behaviour according to the kinds of relationships we have with the people around us. If we cannot control who has access to us, sometimes including and sometimes excluding various people, then we cannot control the patterns of behaviour we need to adopt (this is one reason why privacy is an aspect of liberty) or the kinds of relations with other people that we will have." (Rachels 1975, 296)

Personal values must be chosen freely, if the values are truly to reflect the individual. Friendship implies shared values. Individuals are truly free to choose both values and friends only when they have privacy, and thus are free from outside pressure.


Distance from supervision gives a person time to choose between values. When the individual is continuously under surveillance, of whatever form, and however kindly meant, the ability of that individual to judge between differing sets of values is reduced. Without privacy, only an acceptance of values accepted by the mass of society will be seen as feasible by an individual. Values at odds with those which the mass finds comfortable will be untenable, since public scrutiny will be instant and implacable. Some values cherished by the mob are bad for individuals or for society, but privacy shelters the possibility of true personal choice.

"Privacy, I wish to suggest, insulates individual objectives from social scrutiny. Social scrutiny can generally be expected to move individuals in the direction of the socially useful. Privacy insulates people from this kind of accountability and thereby protects the realm of the personal." (Schoeman 1984, 415)

Social utility is not necessarily the highest value in liberal democratic society. Privacy, by sheltering the individual from the constant judgment of society, allows individuals to consider personal as well as social values. In this way, privacy affords to the individual the personal autonomy and freedom of choice which is demanded of an individual who has to participate in democratic politics.

We have seen in this chapter that, by enabling political activism, individual moral growth, creativity, and a social life, privacy gives to the individual the ability to fulfil her potential as a human. In order to foster her autonomy, the individual must have, and be seen to have, the privacy to act without the constant reminder of the will of society. I believe that any infringement on the right to information privacy is tantamount to questioning the right of a person to exist, since I see such infringement restricting the possibility of the person to carry out the functions her body needs.

Our next chapter will show how the growing number of databases containing information on individuals, and the growing sophistication of the tools available to combine and analyse these databases, greatly increase the threat to individual privacy and therefore to personal autonomy.

Privacy, Databases, and Jewish Law


Chapter Two


This second chapter describes how computer databases and database search techniques impinge on privacy.

"I saw her death coming. In the patterns you sometimes imagined you could detect in the dance of the street. Those patterns are real. I am complex enough, in my narrow way, to read those dances...I saw her death in her need for you, in the magnetic code of the lock on the door of your coffin in Cheap Hotel, in Julie Deane's account with a Hong Kong shirtmaker. As clear to me as the shadow of a tumour to a surgeon studying a patient's scan." (Gibson 1986, 305)

The purchases we make, the people we meet, and the places we frequent, when combined and analysed, contrive to produce a portrait of the individual which can supposedly predict patterns of behaviour. In the speech quoted above, the protagonist in a science fiction novel, an intelligent, self-aware computer, explains how analysis of transaction databases appears to the machine carrying out the analysis. This chapter explores the resources and tools which bring the fantasy, or perhaps the horror, of the novel, closer to our shared reality.

Commercial databases

Various commercial databases contain information which has been gathered in order to facilitate purchases of goods and services, and some of those databases will be described here.

These databases are being examined because librarians, especially librarians working in or for commercial enterprises, use these databases to answer queries put to them by their employers or customers. These databases are accessible to anyone with enough money to buy the necessary hardware and open an account with a credit rating or direct mail database provider.

What information on individuals do the commercial databases contain? A marketing database, used for mailing-list production in the United Kingdom, for example, contains the following information: Age, gender, income, occupation, age of children, birthdays, child's birthdays, daily newspaper, home ownership status, length of residence in current home, property type, mains gas/non-mains gas, reasons for choice (of store), stores shopped at, how much and where most of the grocery shopping is done, how much and where the rest of the grocery shopping is done, distance to store from home, mail order shopping companies used, local papers, Sunday paper, magazines, number of cars, main and second car make, names of charities to which donations have been made, names of hobbies, whether and what kind of health insurance is held, whether there is a telephone banking account, which credit cards are held, which durables are owned and which are planned to be purchased, which home improvements have been made and which are planned, which financial services are used, which insurance policies are held, and which types of investments are held. (Chorus lifestyles database (booklet), CCN Marketing, no date)

Data obtained from consumers for one stated purpose and included in one database of this company, is then used for many other ends, frequently without the knowledge by the consumer that the information she provided will be used by the company to add value to this database it holds. Since the company is involved in many aspects of data collection, including credit rating and marketing, the company neatly, and legally, evades data protection regulation. This can be seen as "talebearing" (a concept explained in the next chapter) and the strong likelihood of its happening enhances the need for a moral basis for information privacy, understood by all those who manipulate such files.

Another database, held by the same organisation, and designed to be used by firms wishing to extend credit to consumers, contains information on items bought using credit cards or with credit arrangements by an individual at a large number of retail firms:

"The CAIS file consists of the computerised monthly sales ledger files from 100 finance houses, building societies, credit card companies, retail stores and mail order companies. These files together provide a very accurate picture of a consumer's payment pattern, including the identification of accounts that have resulted in a bad debt." (CCN Marketing, Credit screening: reducing credit rejection rates from mailing respondents, August 1991)

Of course, it might be argued that similar records have always been kept on paper. However, the ability which the advance of database technology has given us, to collect and analyse these records and compare them to other records held anywhere (at infinitesimal cost per record,) produces an entirely novel level of privacy infringement.

Databases are maintained by bookstores, which list all the books an individual purchased, together with the address for the individual. Supermarkets are investing vast resources into customer databases, containing information obtained by the use of preference cards which provide various benefits for the customer. These databases are related to those used for stock control. However, tracking an individual human and tracking an individual product are morally different. The human may be assumed to have a right to privacy, which the box of soap powder cannot claim.

In former times, an individual may have been able to function without sharing information with outside bureaucracies. In our day and age, everyone needs credit references, whether they wish to open a bank account, take out a loan, rent a house, rent a car, or even buy a sofa on instalments.

A list of the social contacts made by an individual can be produced from telephone company call and billing records, as described by two employees of British Telecom, who are working to extract value from data:

"BT has huge volumes of data from 20 million customer accounts, call records, equipment records and fault logs. Potentially valuable information is hidden within these databases and is underexploited." (Shortland and Scarfe 1994, 17)

Our society is currently structured so that almost any action which an individual wants to take- whether one wishes to buy groceries- travel by bus or rail- read a current novel- or send a package to a friend- needs to be paid for. Since for many years the use of credit and debit cards has been encouraged, individuals paying for anything tend to produce records. The records produced by purchases can be imagined by the individual concerned to resemble the trails left by a person walking across snow or wet sand. We tend to view them as transient. Organisations, however, increasingly tend to treat such records as permanent, valuable, and of use to themselves. Credit rating and marketing databases are produced as a product to be sold, and the files are sold, to anyone with enough money. The public at large thus has access to these records.

We can use many measures to decide whether a society is a free society. One which can perhaps be used, is the extent to which the society preserves for the individual, the right to decide which of her private actions may be known to the public at large. Westin holds that this measure is the basic essence of individual privacy.

"...this is the core of the "right of individual privacy"- the right of the individual to decide for himself, with only extraordinary exceptions in the interests of society, when and on what terms his acts should be revealed to the general public." (Westin 1967, 42)

Database analysis techniques

This section of the chapter will look at the reasons and concepts behind database analysis, show the consequences of these ideas, examine various database analysis techniques, and explain how they do their job.

Databases all contain information which can be analysed in order to produce portraits of "individuals". These portraits are based upon calculations which claim to show that certain buying patterns, certain financial decision patterns, or certain social contact patterns, can be associated with identifiable groups, and can be used to predict reliably the behaviour of individual members of those groups.

In reality, however, what the database analysts have produced are profiles of a composite, hypothetical creature, by analysing large volumes of data. These profiles may then be used to make predictions about actual individuals, who have only a certain resemblance to the profiles, and possibly only a passing connection, if any, to the groups the analysts have identified.

Techniques for analysing databases are used both to reduce risks for organisations and to increase profits. Risk reduction is most commonly used when credit is extended or insurance sold. Profits are increased by changing the product or the product mix to better suit the consumer base. Changing the product can be used both in retail establishments and in the design of mailings.

Database analysis is used in order to make and save money. Organisations save money by having machines make decisions. Decisions can thus be made more quickly. Fewer people may need to be employed to make the decisions. The decision can always be blamed on the machine, since the assumptions which lead to the decision are buried within the system. When a human makes a decision, assumptions which the person uses in order to make a decision are much easier to question. By the time a mistake is made by the system, the people who caused the system to act in an erroneous fashion, the system analysts, interface designers, and programmers, have moved on to their next contract, and the users of the program can blame the mistake on the system, which tends to be regarded as infallible, as shown by a case, where a mistaken first name very nearly ended the career of a Prison Service employee before it started, as explained by Duncan Campbell in the Guardian:

"...it is a problem of getting people to understand that it [what is contained on the police national computer] is an Ôapparent' identity." (Campbell 1995, 11)

Identifying and classifying individuals who are likely to increase the profits of the organisation is becoming one of the key roles of commercial databases. Finding and tracking individuals who are likely to bring profit or cause loss to companies are actions which can be justified to accountants and therefore will probably be encouraged. However, if individuals have a moral right to privacy, which benefits both individuals and the society where they live, it is hard to justify the exercise whereby greater profit is obtained by infringing the privacy of the individual.

The answers which the systems give seem to improve mailing response rates. Most of the systems and much of the technology was produced for commercial purposes, wherein increasing accuracy and improving profits by a few percentage points is a reasonable goal. The data is analysed in order to find simple explanations for groups of variables. The explanations have to be simplistic enough to be used for designing a marketing campaign, because the groups described by the analysis have to be groups to whom products or services can be sold.

The analysis process spans many steps between the events being recorded, and the conclusion. The connection between the actions of the individual and the group wherein the individual is placed by the analysis can be very tenuous. The variables chosen to produce the groups, whether they are derived from purchases of food, periodicals, or services, are based upon hypotheses. The hypotheses which the designers of the systems use are hidden within the system and therefore difficult to question, simply because they are very rarely made explicit to the consumer. The reasoning behind the creation of the portraits of individuals produced by the database analysis techniques may have very little to do with the need to achieve reliability and accuracy, and a lot to do with the need to improve marketing efficiency. So long as the technique produces some improvement, the technique is perceived by the users to be accurate enough.

Since all the techniques are based upon statistical likelihoods, they can not actually show with certainty that a given individual will carry out a specific activity. What they claim to do is increase the accuracy of a prediction. Individuals will suffer if their portrait, as produced by analysis of their spending patterns, matches to some extent the profile of a group which is not favoured by the organisation carrying out the pattern matching.

Which tools can be used to analyse the information contained in these databases?

This section will explain how some of these tools do their work. We will look at cluster analysis, bloc modelling, profiling, and data mining.

Cluster analysis is a statistical tool, which looks at individuals and their behaviours, and sorts them into groups based upon shared behaviours. Products can then be targeted at these groups. An example are the "psychodynamic groups" used by a marketing company, which claims to sort the entire population into seven groups, based upon their calculated temperament types.

"The Psyche postcode directory allows every individual in the country to be classified on the basis of values and for customer, respondent or research files to be profiled and segmented on the basis of a values-driven segmentation.

The seven social values groups: Self explorer, Experimentalist, Conspicuous consumer, Belonger, Social resister, Survivor, Aimless." (Psyche values-driven segmentation, Synergy consulting and CCN marketing, no date)

Bloc modelling is a sociological research technique which looks at the roles and relationships of individuals. It looks at the role of an individual in an organisation, and the set of relationships which that individual has with other individuals in the organisation. People who hold similar positions in an organisation and have specific relationships with other individuals will be classed into similar groups. The individuals in the groups may not know each other or have any idea that they are seen as belonging to a group. The data on relationships may come from telephone company records, electronic mail records, or any other data which can be used to show relationships between pairs of individuals . (Hunter January 1985)

For example,

"Street-level drug suppliers, working for one particular distribution organization, could be seen as stochastically equivalent if they, as a group, (emphasis added) all knew roughly 70 percent of the group, did not mix with street level dealers from any other organizations, all received their supplies from one person, and delivered their cash to just one, randomly selected, of three collectors." (Sparrow 1991, 268).

In other words, if you know the wrong people, you stand a good chance of being suspected of crime. In the same fashion, credit ratings have been ruined for people living in the same building as someone with a bad credit rating.

Datamining is a concept which embraces a set of mathematical and artificial intelligence techniques used to extract meaning from large collections of records produced by commercial transactions. Datamining is used to make explicit the patterns with meaning which are implicit in these large databases. For example, if a large chain of supermarkets notices, that at the end of the working day, men are discovered to increase their purchases of diapers and beer, the organisation can place displays containing the two sets of items in close proximity, in order to encourage this purchasing pattern. The patterns with meaning are important when they can be used to make commercial decisions. For example, targeting of mailings to people who are most likely to respond can reduce the cost of a mailing marketing campaign. (Shortland and Scarfe October 1994)

In datamining the patterns found in the data might be caused by reasons not connected to the individuals concerned, but the individuals will nevertheless be grouped because the programme seems to find a connection. The assumptions behind the choice of variables will cause certain patterns to be found, and other patterns to be missed. For example, if the subject of interest is "humans who are interested in healthy living", the likelihood of the programme finding individuals who use supermarket membership cards and pay by credit or debit cards is significantly higher than of the programme finding individuals who frequent the neighbourhood greengrocer and pay cash, simply because the former information is easier to collect than the latter.

Profiling uses the information produced by cluster analysis, bloc modelling, or datamining, and takes the profile of a type of person produced by any of these techniques. The profile is then compared with data on an individual in order to sort the individuals into groups. The groups which the individuals fall into can be used in order to make decision about the type of products or services to be offered to the individual. (Clarke December 1993 )

Databases impinge on privacy

This section of the chapter will explain how the application of database analysis tools leads to invasion of individual privacy.

There is a great deal of media hyperbole, which tends to lead us to believe that technological progress in the field of database technology will inevitably work to the benefit of society, but no technology is inherently beneficial. In order for society to benefit from any technology, the assumptions behind the implementation of the technology, the implementation itself, and all the implications of the technology need to be beneficial for society.

"To ensure the possibility of such an embodied autonomy for all persons in contemporary society-with all its multifarious mechanisms of observation and control-we will need a political defence of privacy rights." (Squires 1994, 399)

Why does the nature of database technologies inevitably compromise individual privacy? The possibility of privacy and anonymity has diminished due to the rise of database analysis technology. Before database technology was affordable, and before such a large proportion of purchases were made by means which leave a trace, such as credit, debit, and affiliation cards, producing a picture of an individual by use of database analysis was not possible. The only way to get to know a person was by spending time and money with the person or with people close to the person.

Large computer databases, used with database analysis tools, are specifically designed to find information on individuals. Since machines can track individuals, machines will tend to be used to track individuals. The commercial databases, and especially the tools used to analyse the commercial databases, inevitably give to the owners of the databases the ability to identify individuals and classify those individuals.

Not only does database analysis impinge on privacy, but by the very nature of the beast, because of who sired it and why it was brought into the world, database technology is bound to be used to control individuals and attack privacy.

Computer technology development has been funded by two main sources, both of whose goals have been to increase their efficiency at controlling large organisations. The two main sources for funding in computer technology have been the military, and large business corporations. Both of these sources, in order to function, need to be able to keep track of large numbers of items, whether the items are people, cash transfers, or tanks. In order to keep track of large numbers of items, these two types of organisations have a need for large databases and tools to analyse these databases. Inevitably, the need to control the information has been a major driving force behind database development, and remains one of the chief themes within database technology. By using database technology to keep track of information connected to the daily lives of individuals, database managers are given control over this sort of information, and by doing this they inevitably infringe on individual privacy.

The managers of large databases are duty bound to attempt to increase profits for shareholders, and actions which infringe privacy, using popular software methodologies, tend to do so.

Theodore Roszak expressed how vital this corporate and military role was to the development of computer technology:

"If computer science had not promised a handsome payoff to the military and corporate buyers who could afford its costly research and development, there would have been no chess-playing programmes, no Pac-Man games, no NEXIS database, no Turtle Graphics." (Roszak 1994, 205)

Efficiency, and the ability given by information technology to track and control large numbers of individuals, tends to override any other set of values. Types of technology imply types of political systems. The internal operational management structures within the armed forces for example, where lethal technologies are employed, must be authoritarian, in order to keep these technologies under control. Some technologies, for example large scale database technologies, tend to encourage and facilitate central decisionmaking and control, and discourage individual thought and choice.

How do the tools used for database analysis compromise individual privacy? By breaking populations into groups, and finding populations which exhibit desired behaviour, and correlating desired behaviour with other attributes or behaviours of groups. When database analysts use these tools, they can identify individuals who fall into certain targeted classes.

"[This] element is present in data surveillance-the maintenance of such detailed daily and cumulative records of each individual's personal transactions that computerised systems can reconstruct his acts and use such data for social control even without direct physical surveillance." (Westin 1967, 59)

The design of the systems themselves causes power to flow from the weak to the powerful, just as a cup causes people to use the cup for drinking (rather than for digging ditches). That is to say, computers are suited to control many people, and cups are suited to drinking. Since large databases are specifically designed to track large numbers of records, and since market forces compel companies to improve marketing techniques, ways have been found to discover the individuals who are more likely to purchase certain products and services. By analysing transaction records, and determining from the analysis of the records that a given individual is more likely to purchase a given item, the system has effectively classed certain individuals as worthy of marketing attention, and other individuals as unworthy. Thus, a large portion of the population would effectively be written off. I would argue that the same techniques which are currently used to evaluate credit ratings could equally well be used to class individuals as worthy of police attention. Buying goods or services in locations where known criminals make their purchases would cause an individual to fall under suspicion. Unfortunately, the accuracy of the prediction will not increase even if the aims of the classification (from commercial to criminological) change, since the method only produces increased statistical probability of correlation, not positive proof of causation.

Two justifications are commonly used when introducing database technology. Either the database analysis tool saves money or it reduces crime, and sometimes both at the same time. Privacy is definitely being infringed. Benefits may possibly accrue. We must ask: does the uncertain benefit outweigh the certain evil?

Bad governments certainly can be in power, and even good governments do bad things. Facilitating mass surveillance will increase the likelihood of mass surveillance, and decrease the likelihood of political change. Political change will become easier for central government and large commercial organisations to repress, since the early signs of political dissidence, (or at least what are assumed to be the early signs of political dissidence) will be detected by mass data surveillance. Such techniques are already in use in order to detect people who are likely to commit violent crimes or likely to evade tax (Clarke 1994), and the rapidly falling cost of such techniques will enable widespread use.

If large and powerful organisations can truly know what an individual is doing, or even if organisations only believe that the techniques they use to analyse data can tell them about the actions, motives, and character of an individual, then the individual is no longer free to act. The only interests which the individual will be able to serve will be commercial or government interests. The individual will feel constrained to act all the time in a manner which reduces the risk of unfavourable judgment. That "unfavourable judgment" might influence the likelihood of getting a job, getting a credit card, getting a mortgage, receiving health care, or being placed under police surveillance.

To illustrate this point we may care to peruse the following quotation:

"Unless steps are taken to prevent it, we may develop systems capable of a perpetual, pervasive, apparently benign surveillance. Confronted with omnipresent, all-seeing data banks, the populace may find passivity and compliance the safest route, avoiding activities that once represented political liberty. As a badge of civic pride a citizen may announce, "I'm not involved in anything a computer would find the least bit interesting." " (Winner 1989, 115)

Proactive policing, by targeting and carrying out physical surveillance or preventive detention on individuals who have profiles which suggest that they are likely to commit crimes, could be used, and justified as a way to cut costs for the community. Instead of a suspicious person being investigated, data surveillance can be used to manufacture suspicious people. An innocent person will be seen as suspicious not because of criminal behaviour, but because of likelihood of criminal behaviour, based upon statistical probability of correlation judged to be reliable. In addition, the causes of crime do not need to be attended to. The crime is seen as exclusively due to the individual, and environmental factors are seen only as tools to find the individual likely to commit crime.

Preventive health care, which would base the likelihood of access to health care upon the participation of the individual in programmes to prevent illness, based upon profiles which predict likelihood of illness, could be used, and justified as a way to cut costs for the community. Some might argue that having to justify all lifestyle choices on a permanent basis, and to authorities beyond whom there is no appeal might not be seen as a totally acceptable way of life.

Powerful machines are designed for, and owned by, powerful organisations. Only large, rich organisations can afford to buy, run, and maintain them. These organisations will use these machines to increase power over individuals by knowing more about individuals. Database technology tends to give more power to people who have money and power, and take privacy and autonomy away from everybody else. Only people who can afford to maintain large databases, with staff trained to analyse the data, will be able to benefit from the technology. This means big business or government. Organisations with power will have its maintenance as their prime objective, or as Langdon Winner puts it:

"Those best situated to take advantage of the power of a new technology are often those previously well situated by dint of wealth, social standing, and institutional position. Thus, if there is to be a computer revolution, the best guess is that it will have a distinctly conservative character." (Winner 1989, 107)

Once the information has been collected and processed in order to assist in the commercial success of a company, the same information is then available, just as the contents of credit databases is available, to those willing to pay. Infringement of privacy by databases can threaten our security because the purchasers of the data may have malevolent intentions towards us. Mailing lists based upon profiles of individuals who possess or are likely to possess expensive consumer goods would be a boon for burglars, for example. Legislation is easily bypassed by commercial interests who move processes overseas or buy database files together with the companies who own the files, to exploit as part of a mix of marketing and credit interests.

Perhaps the greatest irony is that there is no need for vast databases containing information on individuals to be accessible to anyone. By the use of better database design, companies can guard against fraudulent customers without infringing the privacy of the individual, through the use of available cryptographic technology, already in use. (Chaum 1990)

We are observed by remote analysis of our commercial transactions. We are not asked whether information collected for one purpose, which may be legitimate (for example, in order to ensure payment) may be used for another (for example, in order to produce profits for mailing lists merchants). In other words:

"Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves." (Fried 1968, 209)

Perhaps only a divine being should be given the knowledge of all that resides in the heart of a human being:

Jeremiah chapter 17 verse 9, 10: "Most devious is the heart; it is perverse - who can fathom it? I the Lord probe the heart, search the mind - to repay every man according to his ways, with the proper fruit of his deeds."

Perhaps the motives of the database controllers and analysts, who strive to discover what is hidden in the human heart, are not quite as pure as the motives of God.

In the next chapter, we shall look at the Jewish approach to privacy.

Privacy, Databases, and Jewish law


Chapter Three


In the first chapter this paper looked at some ideas concerning the Western, liberal, view of privacy for the individual. This chapter will examine some concepts inherent in the Jewish, religious, view of privacy. In order to provide some background, the chapter will start by looking at the biblical verses from which the Jewish laws of privacy are derived, and the basic interpretations of these biblical verses which are used to produce the laws. The laws themselves will then be enumerated. Finally, the concepts underlying the laws will be analysed.

What are the biblical verses and their interpretation?

The Talmud is the basic text, from which all codifications of Jewish law are derived. In addition to references from the Talmud, scholars also use the centuries of codifications and case law written by Jewish judges. The Talmud bases its ruling on a biblical verse, the law relating to which is given in the section of the Talmud called the Mishnah. The reasoning behind the Mishnaic law is discussed and expanded upon in the section following each Mishnah, called the Gemara.

Jewish law exists in its present form due to a long process. Traditionally, the law, the collective term for which is the "Torah", was given to Moses by God on Mount Sinai, and Moses handed it down to Joshua, and so on down through the generations to the present day. Jewish law is based on biblical passages, which were interpreted in the Talmud, and codified by many scholars down through the generations. In this section the biblical verses upon which Jewish privacy law is based will be introduced.


The traditional view of the transmission of Jewish law is illustrated in the following quotation:

"Moses received Torah from Sinai, and transmitted it to Joshua, Joshua to the Elders, the Elders to the Prophets, and the prophets transmitted it to the Men of the Great Assembly." Kehati, a modern day commentator on the Mishnah, goes on to explain: "The mishnah begins with the history of the tradition and its transmission from Moshe Rabenu to the Men of the Great Assembly, the first of whom were the last of the prophets - Haggai, Zekhariah and Malakhi, and the last of whom were the first sages of the Talmud." (Chapters of the fathers: with a commentary by Rabbi Pinhas Kehati, Chapter 1, Mishnah 1)

Since there are very many translations of the Bible and the other works which will be cited here, and since the interpretations of the texts can vary with the translations, the specific books and editions of the translations of text and commentary will be provided in the bibliography.

One verse, from the Book of Numbers, reports an incident wherein Balaam, a prophet, has been hired by Balaq, the king of Mo'av, to curse the Children of Israel in order to stop their advance towards Mo'av (situated in what is now the Kingdom of Jordan). The interesting verse itself is the one wherein Balaam changes his mind and decides to bless the Children of Israel instead of cursing them. The reason for this change of mind seems to be the emphasis placed on privacy during the pitching of the tents in the camp. Balaam is standing on a height and viewing the entire camp.

"And Balaam lifted up his eyes, and he saw Israel dwelling in his tents according to their tribes; and the spirit of the eternal was upon him." (The Pentateuch, The Book of Numbers, chapter 24, verse 2)

Rashi, a mediaeval Jewish commentator on the Bible continues:

"Dwelling according to his tribes: he saw each tribe dwelling by itself not intermingled one with another; he saw that the entrances of their tents were not exactly facing each other so that one could not peer into the other's tent (Baba Batra 60a)"

Rashi tends to base a great deal of his commentary on Talmudic rulings, one of which is mentioned here, and this Talmudic ruling will be examined later.

There is stress laid in this verse on the importance of each family being able to carry out its own affairs in private, without having to consider the neighbours seeing what the family is doing. The autonomy of the family unit seems to receive emphasis and encouragement.

In another biblical verse, this time taken from the Book of Exodus, what seems to be implied, is that the very act of counting people, which is the most basic information which can be obtained about them, is, in itself, already a questionable undertaking. The act of counting the people had to be offset by an offering in order to counteract its offensiveness.

"When thou takest the sum of the Children of Israel according to their muster, then shall they give every man a ransom for his soul unto the eternal, when thou musterest them; that there be no calamity among them when thou musterest them." (The Pentateuch, The Book of Exodus, chapter 30, verse 12)

Rashi interprets as follows:

"That there be no calamity among them - for number (i.e. things that have been numbered) are subject to the influence of the "Evil Eye", and therefore if you count them by their polls (directly, by pointing at their heads) pestilence may befall them, as we find happened in the days of David (2 Samuel chapter 24 verse 10 and verse 15)"

There are many explanation for the unfortunate consequences of the census held by David. Many commentators feel that David was acting against the will of God, either because David counted the people without divine instruction, or because David counted the people in order to gauge the strength of the army, and in so doing, doubted the influence of God in the outcome of Israel's wars, or because David counted the people directly, and not in the form used in the Book of Exodus, for there the people each gave a shekel to the temple, and the coins were counted, and not the people directly.

Verse 10: "And David's heart smote him after he had numbered the people." Verse 15: "So the Lord sent a pestilence upon Yisra'el from the morning even to the time appointed: and there died of the people from Dan even to Be'er-sheva seventy thousand men." (The Holy Scriptures, The Second Book of Samuel, chapter 24)

"Abarbanel, after carefully evaluating the above stated views, favors Gersonides interpretation that David's sin was not in the act, but in the spirit with which he went about taking the census; since the census indicated that he had placed his faith in military might." (Samuel 2, chapter 24, verse 1, commentary digest)

David can be seen as infringing upon God's relationship to the Jewish people, or perhaps in seeing himself as of too great importance, in that only God needs to know exactly how many people there are. David is thus trusting in the bureaucracy which he established rather than in God. Perhaps we could say, that a human is not seen as justified in wishing to have such knowledge about other humans.

The following verses are the basis for many laws forbidding gossip and slander:

"Thou shalt not go about as a talebearer among thy people; neither shalt thou stand against the blood of thy fellow: I am the eternal." (The Pentateuch, The Book of Leviticus, chapter 19, verse 16)

"A talebearer reveals secrets: but he that is of a faithful spirit conceals the matter" (The Holy Scriptures, Proverbs, chapter 11, verse 13)

Telling stories about people we know, even true stories, is seen as damaging to the fabric of the community, by breaking down trust and fomenting strife. The talebearer is seen as an evil person.

What are the religious laws concerning privacy?

The two quotations from the Talmud which are brought below, both deal with the laws of privacy relating to gathering information about another individual. That section of the Talmud know as the Mishnah gives the ruling, and then the section known as the Gemara explains the reasoning behind the ruling, based on biblical verses.

"Mishnah. In a courtyard which he shares with others a man should not open a door facing another person's door nor a window facing another person's window. If it is small he should not enlarge it, and he should not turn one into two...

Gemara. Whence are these rules derived? - R. Johanan said: from the verse of the scripture, "and Balaam lifted up his eyes and he saw Israel dwelling according to their tribes" this indicates that he saw that the doors of their tents did not exactly face one another, whereupon he exclaimed: "worthy are these that the divine presence should rest upon them!" " (Hebrew English edition of the Babylonian Talmud, Tractate Baba Bathra, Volume 1, page 60, side a)

We can see from the quotation above that the act of preserving privacy is worthy of praise. Since Jewish religious law is not the law of the land anywhere, all we can use it for is inspiration. The moral significance of privacy is being examined, not the legislation, since without a deep understanding of the moral significance of privacy, laws and codes will be disregarded.

"Mishnah....If there are windows [in the neighbour's wall], he must leave a clear space whether above or below or opposite.

Gemara....We learnt: if there are windows [in the neighbour's wall] he must leave a clear space of four cubits whether above or below or opposite; and in a Baraitha commenting on this is stated that a space must be left Ôabove' so that he should not be able to peep in the other one's room, and Ôbelow' so that he should not stand on tiptoe and look in, and Ôopposite' so that he should not take away his light." (Hebrew English edition of the Babylonian Talmud, Tractate Baba Bathra, Volume 1, page 22, side a)

In both of the above quotations from the Talmud we can see the importance laid upon the privacy of an individual's behaviour in a private space. Not only is the intrusion upon privacy forbidden, the creation of circumstances wherein privacy intrusion can take place is forbidden.

The following decision was written by Maimonides, a most influential rabbinical authority, and codifier of Jewish law, who lived about eight hundred years ago. Maimonides was one of the first codifiers of Jewish law. Before his time, and for many years afterwards, many rabbis ruled on Jewish law directly from the Talmud and felt that codification distanced Jewish law from its source in the Talmud. Maimonides based himself upon the Talmudic ruling, used other rabbinic sources, and formulated the law in a more precise form, going into great length. Only a small section from his rulings on the subject is brought here.

"If one builds a wall at right angles to the window of the other he must build it a handbreadth away from the window, and he must either raise the wall four cubits higher than the window or build the top of the wall slanting so that one cannot sit on it and peep through the window" (The code of Maimonides, book twelve, the book of Acquisition, laws concerning Neighbours, chapter 7, verse 4)

This and other laws on the subject encourage Jews to believe that everyone has an obligation to ensure that privacy will not be infringed.

The following passages deal with a concept closer to information privacy of the individual, the laws of gossip and slander. Not only is falsehood about another forbidden, but any information about an individual must remain private.

"The Gemara (Yuma 4b) teaches us that when a person tells you something, do not think that you can repeat it to others unless you are warned - "don't tell, it's confidential". On the contrary, anything at all which someone tells you must be treated with strict confidentiality, unless or until he gives you permission to repeat it." (Cohen 1981, 81)

The Talmud pronounces that everyone has a moral obligation to assume that any information one receives from any individual is confidential.

"Unauthorized disclosure, whether the original information was received by complete consent or by illegal intrusion, whether ethically or unethically, remains prohibited by the Halachah." (Lamm 1967, 306)

"As formulated by Maimonides (1135-1204), Mishneh Torah, Hilkhot De'ot 7:2, "Who is a tale-bearer? One who carries reports and goes from one person to another and says, ÔSo-and-so said this' or ÔSuch and such have I heard about so-and-so'. Even if he tells the truth, [the tale-bearer] destroys the world." (Bleich 1980, page 131)

Truth does not excuse the violation of confidence. The acts of gathering and sharing information about individuals are seen as evil actions.

Maimonides clarifies the rules concerning gossip in the following quotation, where he seems to imply that gossip can cause bloodshed:

"One who slanders his friends violates a negative commandment, as the verse says: "Thou shalt not go up and down as a tale bearer among thy people" (Leviticus 19:16). Although flogging is not applied for this, it is a great sin which causes destruction of many souls in Israel. For this reason the next verse says: "Neither shalt thou stand against the blood of they neighbour". Learn what happened to Doeg the Edomite! (1 Samuel 22:9-19)" (The book of knowledge, Mishneh Torah of Maimonides, treatise 2: Discernment, chapter 7, verse 1: )

In addition, the act of obtaining information from the private communications of an individual has been forbidden, as is noted in the following quotation:

"...the well-known post-Talmudic ban of Rabenu Gershom (965-1023 or 1040) forbidding the reading of another person's mail without permission. This edict is cited by Be'er hagolah, Yoreh De'ah 334:123. Sefer haleket, I, number 173, declares that Rabenu Gershom's ban is based upon the admonition, "You shall not go as a talebearer among your people" (Leviticus 19:16)" (Bleich 1980, page 128)

Bleich refers to the ruling which specifically forbids the opening and reading of any form of messages which are intended to be private, and connects this ruling to a passage we have noted earlier, which reinforced the prohibition on gossip, whether true or false. We see again that there great importance placed upon the need to ensure privacy for the individual.

There are many laws concerning gossip, slander, and talebearing. Most of the time one is forbidden to pass on any information concerning a person to a third party, no matter how that information has been obtained. There are specific conditions which must apply in order for passing on information to be permitted:

a) The fact that not passing on the information will definitely cause financial damage or personal tragedy.

b) The information must be believed to be accurate.

c) The intent of the person passing the information must be to prevent financial damage or personal tragedy.

d) The fact that by passing on the information the damage will definitely be averted. (Bleich 1979)

"In Jewish law invasion of privacy was tantamount to trespass or theft, and similarly punishable. There are ample precedents through centuries of Jewish legal writings to indicate that the individual is entitled to prevent the public from intruding upon or sometimes even knowing about his private doings, correspondence, and other aspects of his private domain." (Cohen 1981, 61-62)

Invasion of privacy was seen as a very serious matter, and not only was the creation of the possibility for privacy intrusion ruled illegal in Jewish religious law, the act of invading privacy received heavy criminal sanctions. This reinforces the importance of individual privacy.

"Significant in these laws is the acceptance of the principle that interference with one's privacy constitutes legal damage for which one can sue in court. Since, as a rule, penalties for damages or injuries are exacted by the court only when a clear act of injury or damage has been committed, the law that interference with another's privacy in itself constitutes a damaging act is unique. It is another outgrowth of the rabbinic concept of individualism." (Belkin 1979, 126-127)

We can see that invasion of privacy was seen as a chargeable offence, even when no physical or financial damage was caused by the invasion of privacy. From all of the above we can see the significance and importance of privacy in Jewish law.

What are the concepts underlying the Jewish relationship to privacy?

"The fact that the neighbor knowingly suffered, for any length of time, other people to disturb his privacy, whether by peering into his premises or otherwise, does not prevent him from claiming the damage to be abated in the future. (B. Baba Batra 59b, Tur, Hoshen Mishpat 154:16); for it is not so much his own interest - which he may have waived - that is at stake, as rather a general interest in morality, decency, and public peace (Nachmanides and Alfassi, as quoted in Tur, loc. cit.)." (Cohn 1984, 66)


Cohn considers the various rulings, and proceeds to formulate a more general principle, which can be applied to privacy of the individual. Not only is there damage to the individual, but damage is foreseen to the community if privacy to the individual is infringed. Ensuring privacy for the individual helps to safeguard public morality.

"The protection of privacy in Jewish law goes beyond prohibiting the observation of another's activities. There is a legal duty to prevent the possibility of observation that would infringe another's privacy; the mere existence of such a possibility inhibits the freedom of an individual to act as he wishes in his home or courtyard." (Elon 1994, 1860)

Elon seems to be saying, that not only is the invasion of privacy forbidden, but the very creation of circumstances where privacy can be, or is likely to be invaded, is also forbidden. The underlying concept seems to be, that the individual must be allowed to carry out her affairs without the fear of surveillance.

"Thus, the Halachah insists upon the responsibility of each individual not to put himself into a position where he can pry into his neighbor's personal domain, and this responsibility can be enforced by the courts." (Lamm 1967, 303)

Jewish law seems to be saying, that every person is responsible for any invasion of privacy that they may be facilitating. The idea behind the law appears to be, that every person should be able to assume that everyone is helping to safeguard everyone else's privacy.

"Visual or aural invasion of privacy is thus primarily a moral offence, and the civil law and its requirements of monetary compensation is derivative from it." (Lamm 1967, 304)

Invading the privacy of another individual is evil. This evil acts to the detriment of:

a) the individual invading the privacy of the other

b) the individual whose privacy is being invaded

c) the community.

The Jewish laws are in place to prevent and stop the moral decline caused by privacy invasion.

When speaking of a national, central database for all vital information about a citizen Lamm says:

"What we are confronted with is an automated "evil tongue", institutionalized gossip computerized for instant character assassination....we may be sure that, by some as yet undiscovered law that issues from the depths of human and social perversity, all kinds of information will be forthcoming in an attempt to satisfy its insatiable appetite for more and more facts, regardless or their relevance, need, or accuracy." (Lamm 1967, 307)

"...the Halachah comprises more than civil law; it includes a sublime moral code. And its legal limit on voyeurism is matched by its ethical curb on the citizen's potential exhibitionism. It regards privacy not only as a legal right but also as a moral duty. We are bidden to protect our own privacy from the eyes and ears of our neighbours." (Lamm 1967, 308)

We also see, that the individual has a duty to ensure her own privacy. This seems to imply a moral duty to reduce the possibility of privacy intrusion into her own affairs.

"Man must tread the path of reverent privacy "with thy God" - for it is from Him that we learn this form of conduct and Whom we imitate in practicing it.

So sacred is this center of privacy in man that even God does not permit Himself to tamper with it; that is the meaning of the freedom of will, the moral autonomy of man." (Lamm 1967, 311)

Thus, privacy is part of what makes an individual liable for her actions. The individual knows that she has freedom of will, and that not even God enters into that part of her being. This perhaps is the basis for the morality of privacy, that in order to be moral, one both must have, and respect, privacy. Only because one has this moral autonomy is one responsible for one's actions. In order to ensure that one remains responsible for them, privacy for the individual must be maintained.

"...there never was surveillance by the state as to what one did in private or what opinions one held.

The very important biblical source for this liberal approach which is too often overlooked, is found in Leviticus (chapter 15, verses 13 and 28). Males and females become temaaim (ritually unclean) because of certain emissions from their genitals. To be relieved of such a state they must undergo immersion in water, but first they must count clean days. A man must count and a woman must count - there are separate commands for him and for her. And after each command to count there appears an added word meaning "for himself" and "for herself". No one else counts for them. There is no supervision to make sure that they do not cheat and thus accelerate the process of becoming tahor (ritually clean). They are on their honor. Thus the Talmud interprets the verses. And in this way it expanded the right to privacy some 2,000 years ago." (Rackmann 1982, 31)

God wants the Jewish people to serve God by choice. That means that they must be free to choose whether to serve God or not. Therefore surveillance, sanctions, and observance due to pressure exerted by the community are not encouraged by Jewish law. A holy people will carry out the wish of God without sanctions and out of free will.

"Judaism,... wants Jews to perform the commandments without coercion and without the presence of sanctions because the goal of the commandments is human perfection: the perfect man acts out of inner conviction and not because of threats from without.

It is in the light of the goal of human perfection that one can fathom more easily why Judaism places such importance on the privacy on one's religious opinions and performance. Anything comparable to a police state destroys or lessens the possibility of cultivating the voluntary aspect of one's religiosity" (Rackmann 1982, 32)

Religious observance is most meritorious when given freely. Privacy increases the likelihood of a holy people emerging, based upon the willing observance of God's commandments. The need for privacy is thus based upon the moral imperative to produce a righteous nation.

"Why is it that a person so desperately needs privacy? Surely it is to develop his own unique combinations of talents and abilities with which the Creator endowed him. Only by utilizing his inner abilities and talents can any individual attain fulfilment of his own self and approach an understanding of the personal relationship which exists between himself and G-d. This coming close to the G-dhead is what we term Kedusha - holiness, and it cannot be attained in a setting wherein the individual does not have the privacy of "inner space" ". (Cohen 1981, 57)

Judaism sees that there are two ways to achieve public morality. There is morality born of inspiration, and there is morality born of fear. Judaism values morality born of inspiration. Only with the space given by privacy can one come closer to God. Observance and prayer are both tools in this process, and they are enhanced by privacy. The next chapter will apply the moral concepts discussed here to the problems raised by data surveillance.

Privacy, Databases, and Jewish law


Chapter Four


The fourth chapter suggests the use of the Jewish view of privacy as a basis for guidelines when working with databases containing information on individuals. It compares the viewpoint on privacy as expressed in Jewish law with the tendency for information technology to impinge upon privacy. Jewish law can be used to judge situations where information on individuals is stored, manipulated, and sold. By proposing moral guidelines, this work may aid in the process of planning and executing information storage and retrieval policies.

In this chapter we briefly cover the main themes of the three previous chapters, and bring these main themes together. From the concepts outlined in chapter three this paper will attempt to provide a set of questions which may prove useful when dealing with information which can be connected to individuals.

What have we learnt?

In the first chapter we proposed that there is a moral basis to privacy since we need privacy in order for humans to carry out certain functions which make them human. Humans need to be autonomous, to learn to foster their individual moral growth, to have the possibility to be creative and learn, to develop a social life, and to feel able to engage in political activity. These functions were seen as necessary both for the individual and for the society which the individual is a member of. In the Western liberal approach to privacy proposed in these pages, the purpose of privacy is to foster the functioning of the individual and society.

In the second chapter we attempted to show that the information gathered in commercial databases, and the tools which have been produced in order to analyse these database (in order to enhance profit and control over consumers) inevitably created privacy infringement. We proposed that both the sources of the technology and the goals currently in place for the technology will lead to privacy infringement and increasing control over the individual. Data surveillance creates a situation, wherein any public action of any individual, must be weighed and measured by the individual. She must consider her action, in order to ensure that the action will not cause her to be judged adversely by the systems set up in order to analyse the data produced by her actions. Such a situation can be seen as much closer to one based upon fear than one based upon trust.

In the third chapter we looked at the Jewish religious law dealing with privacy and showed the basic underlying concepts which bring forth the laws. We saw that there are boundaries aiming to limit both the intrusion upon the privacy of individuals in order to retrieve information, and the dissemination of information dealing with individuals. The sanctity of human information privacy was seen as enhancing the moral and spiritual development of the individual and the society. In the Jewish approach shown here, privacy was perceived as fostering the holiness of the individual and the society. A set of rules of behaviour is proposed by Judaism for religious Jews, and one of the methods suggested as necessary in order to foster the observance of these rules is the consideration paid to privacy for the individual.

What is the basis of the argument between technologists and moralists?

There is a tension between the point of view which wants to do whatever is possible, and the point of view which asks whether an action is moral. Technologists want, and have been trained and socialised, to do whatever is possible. The possibility of action is seen as the justification for the action. Ethical constraints on the actions of the technologists are not built into the system, and ethical judgment is not one of the subjects of greatest importance when choosing a technologist. Ethical codes, no matter how lofty their aims, and how refined their language, have failed. They are no match for commercial pressures. We already live in a society in which database systems which infringe privacy are in use.

Technologists will propose technology which will inevitably infringe upon privacy, when the use of this technology is likely to increase profits, to increase efficiency, or simply because the technology is feasible. Little or no stress is laid upon the search for technologies which would be able to provide the same likelihood of profit or efficiency increase but would not infringe on privacy. The search for technologies which would enhance privacy is rarely seen as commercially attractive. Moral arguments are seen as lacking in weight, substance, or necessity. Systems which infringe privacy are in use, despite laws, codes, and outcry. Systems which could carry out some of the same commercial tasks without infringing privacy are available, but are usually rejected in favour of technology which eases privacy infringement. This does not have to be the case, it seems that only very determined opposition will produce alternatives. Only after a threatened boycott of the system by all doctors was the NHS national database allowed even a reduced level of encryption protection for personal files. The first proposals allowed anyone above a certain managerial level access to all personal medical files, anywhere in the country. The currently proposed system, which enhances the privacy of personal files by encrypting them, is to use an encryption method which has been proven to be breakable by academic research groups, and which is thus likely to be vulnerable to unhindered government access, without the need to gain permission from the individual or her doctor.

Why should we care?

Every action we take has consequences. The society we will live in is produced by the actions of all members of society in the present. Some members have more influence than others, and everyone must be aware that their decisions create our future.

Every person has her own path, upon which she seeks God. In order for her to explore her own path, she needs to feel reasonably sure that so long as she does not harm other human beings, she is free to find her own spiritual way. When a person must assess all her actions in case they might be seen as part of a pattern of actions which lead to censure or punishment, then that person is not free to seek God in her own way.

If a person is not free to seek God in her own way, then society is telling that person that there is only one way to be a good person. Since the type of person being chosen by society is actually being chosen by government and commercial functionaries, society is saying that people with money or power are more justified in choosing the type of person she is to be than she herself, the minister of her religion, or even her parents. Society is saying that money and power are the measure of morality.

The only type of person who will be able to flourish in such a world is the type of person who will bring most profit to commercial interests and cause least cost to governments. This type of person is not necessarily the type of person who will be most moral or the best neighbour. The type of person whose profile is not congruent with the profile most favoured by commercial and government interests is not necessarily an evil person or a bad neighbour. She might be more interested in making music, or serving others, than climbing tax brackets.


By creating a world where certain people are allowed to decide what kind of people are good, and the people deciding are able to watch everyone all the time, we are taking free will away from people. We are saying that only some of the people are worthy of making moral decisions, and most of the people are not.

Designing, maintaining, or using a data surveillance system as part of one's daily work can be seen as contributing to a society which values the use of fear and control, and disregards the value or possibility of individual morality, individual moral development, and individual responsibility.

If we could guarantee that there was only one truth, and that there is only one way to achieve a virtuous world, then there might be some justification in building a world where only one way of being were possible. Since the one true way to a virtuous society is not known, how dare we create a situation where individuals confessing varieties of belief will inevitably be oppressed?


The role of the information and library professional

I would claim that information privacy is a right, of great moral significance, and librarians, as custodians of information, must pay attention to this right. As librarians, we may believe that our role in protecting individual privacy is of no consequence. We may say to ourselves that our managers are paid to decide such things. However, managers are constrained by financial and personnel management considerations. When librarians make strong views on privacy clear to managers, managers must take these views into account, if only to cut down on the number of job advertisements placed, and job interviews suffered, because of employees who are fired or resign. Garoogian, a librarian associated with public libraries, believes in a strong moral case for individual privacy, whereby the confidentiality of records is guarded, because all aspects of information management are a librarian's business. The data spoken of here are circulation records, which directly reveal the interests of the individual concerned:

"A person's independence, dignity, and integrity are violated when one's right to privacy is infringed upon... Librarians are in a very powerful position since they have direct access to the private reading and subject interests of their users. They have been entrusted with this power. It is, therefore, their moral obligation to keep this information confidential." (Garoogian 1991, 219)

Librarians, as custodians of information, must consider all the implications of their actions. Whether the database covers borrowed books or credit ratings, all access to the database is an infringement on the privacy of the individual, since the database is the record of the actions of the individual in the world, and the actions of an individual reveal their very being. The librarian must ensure that the data is only used for the purpose the individual has sanctioned.

What questions should we ask?

When deciding upon the structure and use of databases containing information which can identify individuals, there are some thoughts which should be part of our deliberations:

a) Do we need to have information on individuals in the first place?

Since intrusion, and the very gathering of information, can be see as morally questionable, we might ask whether there is any need to have information on the individual in order for the task under consideration to be carried out. Could an equally valid database structure be used, which does not use personal identifiers? (The teaching of database structures has not emphasized individual privacy, and this is one reason that very few database systems which enable privacy exist.)

b) Do we need, in any way, to share the information we've received?

Sharing information with others is not always justified, so is there proof that keeping the information private will cause damage to others? Must the lack of profit from not selling the information be seen as a loss, or can it be seen as a investment in the community? Will the intrusion upon the privacy of the individual, produced by sharing the information, prevent her from living her life the way she has chosen? (The balance of power between the individual being asked for the information, and the organisation requesting the information is not even. Frequently, the individual will be refused service if she refuses to provide all requested information, no matter how irrelevant to the situation the request for information is.)

c) Is the information we have accurate?

Changing inaccurate information on multiple credit and marketing databases, all of which are used to produce profiles of individuals, is time consuming, difficult, and costly. Information must be proved to be incorrect in order for database providers even to think about changing it, and how many of us keep records accurate and reliable enough to disprove those held by financial service providers?

d) Can we, as information handlers, cope with the moral charge we are being given?

Are the personnel in contact with the database, who are being asked to guard the privacy of other individuals, being asked to be more moral and upright than a person can be, when faced with the temptation of power over the information on another individual? Are the management structures designed to enable or discourage moral choices?

e) More general questions we might ask ourselves are:

What kind of society will our actions lead to? Do we want to depend on surveillance or trust? Do we want to encourage a sense of belonging or a sense of fear?

In order to answer these questions, more work needs to be carried out on the extent and efficacy of privacy invasion through database surveillance, and the effects of such surveillance on personal activity and decisionmaking. In addition, the effects of the perception of surveillance on the moral structure of society need to be examined in greater depth.

Conclusion

Both from the Western liberal standpoint, and from the Jewish religious point of view, privacy occupies a very important position in ensuring the ability of the individual to function and prosper in society. Present and future trends in database technology seem to imply that cheaper and more pervasive surveillance is on the way. Do we want to produce a society where privacy is valued, and where people act in a moral fashion because they feel that they want to be a part of society, or do we want a society where privacy is disregarded, where people put their efforts into avoiding apprehension, and feel no connection to society? In order to produce a virtuous society, one wherein the individual can pursue her physical, mental, and spiritual goals to the benefit of all, our society needs to value privacy, and instil the importance of privacy, especially in the souls of those who store and manipulate information.

Privacy, Databases, and Jewish Law


Bibliography


Agre, Phil, The Network Observer [http://communication.ucsd.edu/pagre/agre.html]

Hebrew-English edition of the Babylonian Talmud, Tractate Baba Bathra, Volume 1, Soncino Press, London, 1976

Belkin, Samuel, Chapter 6, "The community" in his In his image: the Jewish philosophy of man as expressed in Rabbinic tradition, pages 117-133, Greenwood, Westport, CT, 1979

Benn, Stanley I., "Privacy, freedom, and respect for persons", Lieber-Atherton, Inc., 1971. In: Philosophical dimensions of privacy: an anthology, by Ferdinand David Schoeman, Cambridge, Cambridge University Press, 1984.

Bleich, J. David, "Privacy of Personal Correspondence", The Jewish Law Annual 3 (1980) pages 128-131

Bleich, J. David, "Survey of recent Halakhic periodical literature: professional secrecy", Tradition, volume 17, number 4, Spring, 1979, pages 90-94

Bleich, J. David, "Professional Secrecy", The Jewish Law Annual 3 (1980) pages 131-136

Bloustein, Edward J., "Privacy as an aspect of human dignity: an answer to Dean Prosser", New York University Law Review 39:962-1007, 1964.

Campbell, Duncan, "ID mistake put trainee's career at risk", The Guardian, 2 June 1995, page 11

Canter, David, Criminal Shadows, Harper Collins, London, 1995

CCN Marketing, (product description sheet), Credit screening: reducing credit rejection rates from mailing respondents, August 1991

CCN Marketing, Chorus lifestyles database (booklet), no date

Chapters of the fathers: with a commentary by Rabbi Pinhas Kehati, Department for Torah education and culture in the Diaspora of the World Zionist Organisation, Jerusalem, 1984

Chaum, David, Amos Fiat, Moni Naor, "Untraceable Electronic Cash", Lectures notes in computer science, issue 403: Advances in Cryptology - Crypto `88: proceedings, Springer-Verlag, (1990), pages 319-327

Clarke, Roger, "Profiling: A Hidden Challenge to the Regulation of Dataveillance", International Journal of Law and Information science, Volume 4 Number 2 (December 1993), pages 405-409

Clarke, Roger, "The Digital Persona and its Application to Data Surveillance", The Information Society, Volume 10 (March 1994), pages 77-92

Cohen, Alfred S., "On maintaining a professional confidence", Journal of Halacha and Contemporary Society, Number 7, Spring 1984, pages 73-87

Cohen, Alfred S., "Privacy: a Jewish perspective", Journal of Halacha and Contemporary Society, Volume 1, Number 1, Spring 1981, pages 53-102

Cohn, Haim H., "The right to privacy", in his Human rights in Jewish Law, pages 64-67, New York, Ktav, 1984

Eco, Umberto, "Tolerance and the intolerable", Index on censorship 1/2:46-55, 1994.

Elon, Menahem, "The right of privacy", in his Jewish law: history, sources, principles Volume 4, pages 1856-1860, Jewish Publication Society, Philadelphia, Penn., 1994

Forester, Tom and Perry Morrison, chapter 6, "The invasion of privacy" in Computer ethics: cautionary tales and ethical dilemmas in computing, 1994 Cambridge, Mass., pages 131-161

Foxman, Ellen R. and Paula Kilcoyne, "Information technology, marketing practice, and consumer privacy: ethical issues", Journal of public policy and marketing, Volume 12, Number 1, Spring 1993, pages 106-119

Fried, Charles, "Privacy: [a moral analysis]", Yale Law Journal , 77:475-93, 1968.

Frimer, Dov I., "Medical examinations by order of the court and the right to privacy: common law and Jewish law experiences", Israel Law review, Volume 17, Number 1, January 1982

Gandy, Jr., Oscar H., The panoptic sort: a political economy of personal information, Westview press, Boulder, Colorado, 1993

Garoogian, Rhoda, "Librarian/patron confidentiality: an ethical challenge", Library Trends 40, 2: 216-33, Fall 1991.

Gavison, Ruth, "Privacy and the limits of law", Yale Law Journal 89:421-71, 1980.

Gerstein, Robert S., "Intimacy and privacy" , Ethics 89: 76-81, 1978. In: Philosophical dimensions of privacy: an anthology, by Ferdinand David Schoeman, Cambridge, Cambridge University Press, 1984.

Gibson, William, Neuromancer, Grafton books, London, 1986

Goffman, Erving, The presentation of self in everyday life, Harmondsworth, Penguin, 1971.

Goss, Jon, " "We know who you are and we know where you live": the instrumental rationality of geodemographic systems", Economic Geography, volume 71, number 2, April 1995, pages 171-198

Hoffer, Eric, The True Believer, New York, Mentor, 1964.

Hunter, Larry, "Public image", Whole Earth Review, Number 44, January 1985, Pages 32-37

Johnson, Paul, "A world without leaders", Commentary: 19-22, July 1994.

Lamm, Norman, "The Fourth Amendment and it's equivalent in the Halachah", Judaism: a quarterly journal, Volume 16, Number 3, Summer 1967, pages 300-312

Larson, Erik, The naked consumer: how our private lives become public commodities, Penguin Books, New York, 1992

Lewinson, Lisa, "Data Mining: Intelligent technology gets down to business", PC AI, November/December 1993, Pages 16-23.

Maimonides, Mishneh Torah, Ktav Publishing House, New York, 1983

Maimonides, The code of Maimonides, Yale University press, New Haven, 1951

Marx, Gary T., Undercover: Police surveillance in America, Berkeley, California, University of California Press, 1988

Matthews, Robert, "Panning for data gold", New Scientist, Number 2031, 25 May 1996, Pages 30-33

Murphy, Robert F., "Social distance and the veil", American Anthropologist 66(6 pt.1):1257-74, 1964. In: Philosophical dimensions of privacy: an anthology, by Ferdinand David Schoeman, Cambridge, Cambridge University Press, 1984.


Pentateuch with Targum Onkelos, Haphtaroth, and Rashi's commentary, Jerusalem, The Silverman family, 1973

Rachels, James, "Why privacy is important", Philosophy&public affairs 4(4) (Summer):323-33, 1975. In: Philosophical dimensions of privacy: an anthology, by Ferdinand David Schoeman, Cambridge, Cambridge University Press, 1984.

Rackmann, Emanuel, "Privacy in Judaism", Midstream , 28, 1982, pages 31-34

Reiman, Jeffrey H., "Privacy, intimacy, and personhood", Philosophy&Public Affairs 6(1)(Fall):26-44, 1976. In: Philosophical dimensions of privacy: an anthology, by Ferdinand David Schoeman, Cambridge, Cambridge University Press, 1984.


Roszak, Theodore, The cult of information: a neo-luddite treatise on high-tech, artificial intelligence, and the true art of thinking, University of California, Berkeley, California, 1994

Rubin, Michael Rogers, "The computer and personal privacy, part 1: the individual under assault", Library Hi Tech, Issue 17, Volume 5, Number 1, pages 23-31

Samuel 2: a new English translation of the text and Rashi, with a commentary digest, The Judaica Press, New York, 1981

Schoeman, Ferdinand, "Privacy and intimate information" In: Philosophical dimensions of privacy: an anthology, by Ferdinand David Schoeman, Cambridge, Cambridge University Press, 1984.

Shortland, Richard and Richard Scarfe "Data mining applications in BT", BT Technology Journal, Volume 12, number 4, October 1994, pages 17-22

Sparrow, Malcolm K., Kennedy School of Government, Harvard University, "The application of network analysis to criminal intelligence: an assessment of the prospects", Social Networks, 13 (1991) Pages 251-274

Spero, Moshe HaLevi, "Halakhic definitions of confidentiality in the psychotherapeutic encounter: theory and practice", Tradition, Volume 20, Number 4, Winter, 1982

Squires, Judith, "Private lives, secluded places-privacy as political possibility", Environment and planning d-society & space 12, 4: 387-401, 1994.

The Holy Scriptures, Koren Publishers, Jerusalem, 1983

U.S. Army Military Police School, Protective Services, Field Circular 19-136, Fort McClellan, Alabama, n.d.

Westin, Alan F., Privacy and Freedom, New York, Atheneum, 1967.

Winner, Langdon, The Whale and the Reactor, The University of Chicago Press, Chicago, 1989

Return to my home page


© Ellis Weinberger; last revised February 2002