Professional Documents
Culture Documents
Citation:
Donald N. Michael, Speculations on the Relation of the
Computer to Individual Freedom and the Right to Privacy
, 33 Geo. Wash. L. Rev. 270 (1964)
Copyright Information
Privacy
Consider that kind of privacy which exists by virtue of the ability
to restrict access to information about oneself and one's related
activities and records. By and large, the information thus restricted
concerns the historical self: not only one's outward conduct, but
also his inward evolution as a human being.
The availability of computers can alter seriously the degree to
which one can restrict such access. Several factors which have de-
termined degrees of privacy in the past are:
1) The ability of the privacy invader to bring together data which
has been available, but which has been uncollected and uncollated;
2) The ability of the privacy invader to record new data with
the precision and variety required to gain new or deeper insight into
the private person;
3) The ability of the invader to keep track of a particular person
in a large and highly mobile population;
4) The ability of the invader to get access to already filed data
about the private person; and
5) The ability of the invader to detect and interpret potentially
self-revealing private information within the data to which he has
access.
What is the interplay of these factors and what is their significance
for privacy in the light of the computer's capabilities? Much of
one's privacy remains undisturbed because no one has had the
ability to pull together available information-or because no one
has been sufficiently interested to go to the trouble of doing so.
To understand the private implications in available data might first
require both locating and integrating much widely dispersed -infor-
mation.
The meaning of the information may be unclear, and, therefore,
still private. More information may be needed, and the quality of it
may depend on updated surveillance of the person involved. Consider-
ing the size and mobility of our society, these problems have made
privacy invasion very difficult, but, as we shall see, the computer
makes it much more feasible.
Private information about a person may exist which is ethically or
legally restricted to those who have a legitimate right to it. Such in-
formation, about a great portion of our population, exists in business,
medical, government, and political files, and in the form of psycho-
logical tests, private and government job application histories, federal
and state income tax records, draft records, security and loyalty in-
vestigations, school records, bank records, credit histories, criminal
records, and diaries. Each day more of these records are translated
from paper to punchcards and magnetic tapes. In this way they are
made more compact, accessible, sometimes more private, and, very
importantly, more centralized, integrated, and articulated. The re-
sults are more complete records on each individual and a potential
for more complete cross-correlations. The would-be invader who
knows about these centralized or clustered inventories need not search
for sources, and therefore he may be much more inclined to examine
the records than if a major search for the sources of information were
necessary.
1964] COMPUTERS AND THE INDIVIDUAL
son. But there are trends which suggest that many people are likely
to cooperate in exposing their previously private selves. Systematic
exposure of the private self through questionnaires, interviews, and
test-taking is becoming steadily more widespread and probably more
acceptable. The pressures toward-indeed, the attractiveness of-this
kind of exposure are strong. In the first place, many Americans like to
believe that getting ahead is a matter of ability and personality rather
than luck or nepotism or some other kind of whimsey in those who
hire and fire them, or in those who acknowledge or ignore them when
opportunities arise. As the society grows more complex and the in-
dividual's sense of his ability to influence it in his own interest seems
smaller, the tendency to depend for placement and advancement on
what can be revealed about oneself which can be evidenced and acted
on "scientifically" may well increase. This would be a natural exten-
sion of our dependence on the expert, for it will be the expert who
will assess one's "true" value-at least one's economic value-by evalu-
ating the private information one makes available about oneself. This
response also will be a natural extension of our dependency on the
machine, which in this case will help the expert or make the decisions
itself about the value of the individual, impersonally but with great
precision, on the basis of what it knows. And the machine will do
so "privately"; it will not blabber secrets to other machines or other
people.
Complementary pressures from those who would use information
about the private person are likely to be great. The real or imagined
need to use people efficiently will increase as more organizations find
themselves in the throes of complicated and disrupting reorganization,
remodeling people and procedures to meet requirements imposed by
the use of automation and computers. Thus, executives and decision
makers, responding to emotional and practical pressures, will try to
squeeze the utmost from available personal information as clues to
efficient job assignments. Increasingly, executives seem to seek
security through technological intervention in the conduct of their
activities. This tendency will be reinforced as more executives be-
come the products of physical or social engineering backgrounds.
As the behavioral scientists' predictive capabilities are increasingly
recognized, and as business and government become more pro-
fessionalized and rationalized through the combined impact- of the
availability and capabilities of computers and the hyperrational orien-
tations of the personalities who tend these devices, management will
278 THE GEORGE WASHINGTON LAW REVIEW [Vol. 33:270
seek more and more to learn all it can about the people it uses and
about the people it serves, in order that its tasks may be more efficient-
ly conducted in the public interest or in its own. This is, of course,
simply a continuation of a well-rutted trend. For some years we have
assumed or accepted that efficient government, government subject
to as little internal disruption as possible, "requires" personnel selec-
tion on the basis of very private information about an applicant's sex
life, family affairs, and early ideological enthusiasms. Since most new
jobs in the past two decades have been government or government-
related jobs, we can expect this trend to continue, the result being
that more people than ever will be on file.
We have noted the likelihood that, as the years go on, the pres-
sures will increase substantially to collect and use available data about
the private individual, to enlarge the scope of that data, and to attempt
to correlate and expand its implications and meaning. To some ex-
tent, each user of information will gather his own, but, in keeping
with standards of efficiency, there will be efforts to gain access to data
accumulated by others. For example, we can expect pressures to com-
bine credit rating information with government job application in-
formation, with school psychological testing information, and so on.
In an enormously complex society, everyone may have something to
gain by this process as well as something to lose.
One thing is clear: for a long time indeed no correlation of data
will account fully for the personality being evaluated and interpreted.
Whatever the person providing the information believes, and what-
ever those using the information believe, there still will be a truly
private person left, undetected by the computer. This is not meant
in any mystical sense. It will take much longer than the twenty-year
period we are dealing with to gain enough understanding of human
beings truly to strip them of all the private self which they think
they volunteer to expose. Nevertheless, in many situations, that in-
formation which can be processed through punchcards or memory
tapes will be accepted as the important private profile of the indi-
vidual. This will be so because, limited as the data may be in some
abstract sense, this will be the information most conveniently available
to the users for the assessment of the individual. And it will not be
trivial or simple information. It will be impressive in its scope, and
the computer will be impressive in the processing of it. Thus the
users will choose to believe that this is the important part of the
private life of the individual, and from the economic standpoint it
1964] COMPUTERS AND THE INDIVIDUAL
may well be. Similarly, many of those supplying the information will
come to believe they are revealing their private selves. In other words,
that which will be valued and acted on as if it were the private in-
dividual will be that which can be tested and assessed in ways which
can be recorded and manipulated by computers. Of course, not
everyone will succumb to this bifurcation of self, but enough may
do so to make it an important factor in our society. The result may
be that many will feel they or others have no private lives. Others
-will feel that their "real" private lives are even more private because
they are relatively more ignored-the computer won't be able to do
anything with them. Thereby we shall have a new measure of
privacy: that part of one's life which is defined as unimportant (or
especially important) simply because the computers cannot deal with
it.
No one using the output from a computer needs to know as much
about the data fed into it as does the programmer. Without intimate
and extensive understanding of the data and the uses to be made of it,
the programs which determine how the computer operates, and hence
the quality of its output, will be crude. On the other hand, executive
decisions often depend less on knowledge of details than on overall
grasp of the situation. As a result, the programmer often will be the
person with potentially the most intimate knowledge of the private
lives of those whose data is processed. This potentiality need not re-
sult in his having specific knowledge about specific people, since a
programmer is unlikely ever to see the materials which are input to
the computer whose processes he has arranged. But given his deeper
understanding of how the data are being processed, what assumptions
are made about the relationships among the data, what constraints
must be put on the data in order for the computer to use it, it
is entirely possible that the programmer may be called upon in difficult
cases to enrich the executive's basis for decision making. In this way,
the programmer may become privy to very private information about
specific individuals. There may then arise a demand for program-
mers with ethical standards which now are not considered prerequisites
to their trade. Inevitably, of course, there will be corruptibles among
this group who will leak private information.
In another sense the programmer will become important for the
preservation of privacy and freedom. The way he arranges the re-
lationships in the information to be processed and the relative emphasis
he gives to different items could result in distortions in the "history"
280 THE GEORGE WASHINGTON LAW REVIEW [VoL 33:270
niques. Less crime means more freedom and privacy, at least for the
law abider. But the same techniques could be used against the law
abider if his government wanted to make, say, a routine security
check in the interests of social stability.
When the application of computers requires that people change
their behavior towards something familiar, they may well interpret
this as an imposition on their freedom. This interpretation is in
keeping with the belief long held by many that the machine is the
chief threat to the spontaneity (freedom) of man. The recent furor
over all-digit dialing demonstrates how seriously this threat is taken.5
In the abstract, at least, one's freedom to dial long distance numbers
direct may be increased by this new system, and certainly it is not
lessened compared to what it was when one used a mixture of letters
and numbers. But obviously many people feel their freedom has been
abridged because for them it seems easier to remember combinations
of letters and numbers, and because this change symbolizes more
mechanization and, thereby, a challenge to the free man. Undoubted-
ly, there will be further "invasions" of this sort.
An important variant of this state of mind is found in responses to
the nationwide computerized system which makes it possible for a
cashier to determine quickly whether an unfamiliar person seeking to
cash a check has a criminal record. Through this system (cashier-to-
computer-to-police) a number of criminals have been apprehended
while they waited for their check to be cashed. Abhorrence of the
system and sympathy for the bum-check passer is a common-al-
though, of course, not unanimous-response to descriptions of this
system in action.
Apparently, in many minds there is combined a sense of "There but
for the grace of God . . ." and a realization that the inclination to
violence and lawbreaking (which most of us harbor) will be throttled
more and more even in fantasy. For what is mere man against the
implacable, all-seeing machine?* The godlike omniscience of the
computer essentially destroys his hope, and hence his freedom to
fantasy, that he can get even unfairly with a society which he thinks
has been unfair to him. If the computerized world of tomorrow pro-
duces the kinds of rationalized standards which increase one's frus-
tration and inhibition, then certainly this invasion of one's right to
5
See, e.g, Time, July 13, 1962, p. 53; Washington Evening Star, Jan. 31, 1964,
p. A12, col. 2.
"For an anecdotal dscussion of the human tendency to deify the computer, see
Kayton, Can Jurimetrics be of Value to Jurisprudence? infra at 287, 289. [Ed.]
19641 COMPUTERS AND THE INDIVIDUAL