Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

DATE DOWNLOADED: Wed Mar 9 04:05:46 2022

SOURCE: Content Downloaded from HeinOnline

Citations:

Bluebook 21st ed.


Richard A. Posner, Economic Theory of Privacy, 2 REGULATION 19 (1978).

ALWD 7th ed.


Richard A. Posner, Economic Theory of Privacy, 2 Regulation 19 (1978).

APA 7th ed.


Posner, R. A. (1978). Economic Theory of Privacy. Regulation, 2(3), 19-26.

Chicago 17th ed.


Richard A. Posner, "Economic Theory of Privacy," Regulation 2, no. 3 (May/June 1978):
19-26

McGill Guide 9th ed.


Richard A. Posner, "Economic Theory of Privacy" (1978) 2:3 Regulation 19.

AGLC 4th ed.


Richard A. Posner, 'Economic Theory of Privacy' (1978) 2 Regulation 19.

MLA 8th ed.


Posner, Richard A. "Economic Theory of Privacy." Regulation, vol. 2, no. 3, May/June
1978, p. 19-26. HeinOnline.

OSCOLA 4th ed.


Richard A. Posner, 'Economic Theory of Privacy' (1978) 2 Regulation 19

-- Your use of this HeinOnline PDF indicates your acceptance of HeinOnline's Terms and
Conditions of the license agreement available at
https://heinonline.org/HOL/License
-- The search text of this PDF is generated from uncorrected OCR text.
-- To obtain permission to use this article beyond the scope of your license, please use:
Copyright Information
AN ECONOMIC THEORY
OF PRIVACY
Richard A Posner

MUCH
ganizational privacy (if one may judge by cur-
clarify the elusive and ill-defined con- rent legislative trends), a reverse ordering
cept INK has been spilled
of "privacy." I will sidestep to
in tryingthe would be more consistent with the economics
definitional problem by simply noting that of the problem.
one aspect of privacy is the withholding or
concealment of information. This aspect is of
particular interest to the economist now that Theory
the study of information has become an im-
portant field of economics. It is also of interest People invariably possess information, includ-
to the regulator, and those affected by him, be- ing the contents of communications and facts
cause both the right to privacy and the "right to about themselves, that they will incur costs to
know" are becoming more and more the sub- conceal. Sometimes such information is of
ject of regulation. value to other people-that is, other people will
Heretofore the economics of information incur costs to discover it. Thus we have two
has been limited to topics relating to the dis- economic goods, "privacy" and "prying." We
semination and, to a lesser extent, the conceal- could regard them as pure consumption goods,
ment of information in explicit (mainly labor the way turnips or beer are normally regarded
and consumer-good) markets-that is, to such in economic analysis, and we would then speak
topics as advertising, fraud, price dispersion, of a "taste" for privacy or for prying. But this
and job search. But it is possible to use eco- would bring the economic analysis to a grind-
nomic analysis to explore the dissemination and ing halt because tastes are unanalyzable from
withholding of information in personal as well an economic standpoint. An alternative is to
as business contexts, and thus to deal with such regard privacy and prying as intermediate rath-
matters as prying, eavesdropping, "self-adver- er than final goods-instrumental rather than
tising," and gossip. Moreover, the same analysis final values. Under this approach, people are as-
may illuminate questions of privacy within or- sumed not to desire or value privacy or prying
ganizations, both commercial and noncommer- in themselves but to use these goods as in-
cial. puts into the production of income or some
I shall first attempt to develop a simple other broad measure of utility or welfare. This
economic theory of privacy. I shall then argue is the approach that I take here; the reader will
from this theory that, while personal privacy have to decide whether it captures enough of
seems today to be valued more highly than or- the relevant reality to be enlightening.
Richard A. Posner is professor of law at The Law
School of the University of Chicago. A consider- Not So Idle Curiosity. Now the demand for pri-
ably fuller version of this paper appearsunder the vate information (viewed, as it is here, as an in-
title "The Right of Privacy" in the University of termediate good) is readily understandable
Georgia Law Review, May 1978. where the existence of an actual or potential

REGULATION, MAY/JUNE 1978 19


THE ECONOMICS OF PRIVACY

relationship, business or personal, creates op- making consumption, career, and other deci-
portunities for gain by the demander. These op- sions. The models are not always positive. The
portunities obviously exist in the case of infor- story of Howard Hughes, for example, is usual-
mation sought by the tax collector, fiance, part- ly told as a morality play, warning of the pit-
ner, creditor, competitor, and so on. Less ob- falls of success. That does not make it any less
viously, much of the casual prying (a term not educational. The fascination with the notorious
used here with any pejorative connotation) into and the criminal-with John Profumo and with
the private lives of friends and colleagues that Nathan Leopold-has a similar basis. Gossip
is so common a feature of social life is, I be- columns open people's eyes to opportunities
lieve, motivated-to a greater extent than we and dangers; they are genuinely informative.
usually think-by rational considerations of Moreover, the expression "idle curiosity"
self-interest. Prying enables one to form a more is misleading. People are not given to random
accurate picture of a friend or colleague, and undifferentiated curiosity. Why is there less cu-
the knowledge gained is useful in one's social riosity about the lives of the poor (as measured,
or professional dealings with that friend or col- for example, by the infrequency with which
league. For example, one wants to know in poor people figure as central characters in pop-
choosing a friend whether he will be discreet or ular novels) than about those of the rich? One
indiscreet, selfish or generous. These qualities reason is that the lives of the poor do not pro-
are not necessarily apparent on initial acquaint- vide as much useful information for the pat-
ance. Even a pure altruist needs to know the terning of our own lives. What interest there is
(approximate) wealth of any prospective bene- in the poor is focused on people who were
ficiary of his altruism in order to be able to like us but who became poor, rather than on
gauge the value of a gift or transfer to him. those who were always poor; again, the caution-
The other side of the coin is that social ary function of such information should be
dealings, like business dealings, present oppor- evident.
tunities for exploitation through misrepresen- Samuel Warren and Louis Brandeis once
tation. Psychologists and sociologists have attributed the rise of curiosity about peo-
pointed out that even in everyday life people ple's lives to the excesses of the press (in an
try to manipulate other people's opinion of article in the HarvardLaw Review, 1890). The
them, using misrepresentation. The strongest economist does not believe, however, that sup-
defenders of privacy usually define the indi- ply creates demand. A more persuasive explana-
vidual's right to privacy as the right to control tion for the rise of the gossip column is the in-
the flow of information about him. A seldom- crease in personal income over time. There is
remarked corollary to a right to misrepresent apparently very little privacy in poor societies,
one's character is that others have a legitimate where, consequently, people can readily observe
interest in unmasking the misrepresentation. at first hand the intimate lives of others. Per-
sonal surveillance is costlier in wealthier so-
cieties, both because people live in conditions
A seldom-remarked corollary to a right that give them greater privacy and because the
to misrepresent one's character is that value (and hence opportunity cost) of time is
others have a legitimate interest in greater-too great, in fact, to make the expendi-
unmasking the misrepresentation. ture of a lot of it in watching the neighbors a
worthwhile pursuit. An alternative method of
informing oneself about how others live was
Yet some of the demand for private infor- sought by the people and provided by the press.
mation about other people seems mysteriously A legitimate and important function of the
disinterested-for example, that of the readers press is to provide specialization in prying in so-
of newspaper gossip columns, whose "idle cieties where the costs of obtaining information
curiosity" has been deplored, groundlessly in have become too great for the Nosy Parker.
my opinion. Gossip columns recount the per-
sonal lives of wealthy and successful people Who Owns Secrets? The fact that disclosure of
whose tastes and habits offer models-that is, personal information is resisted by (is costly
yield information-to the ordinary person in to) the person to whom the information per-

20 AEI JOURNAL ON GOVERNMENT AND SOCIETY


THE ECONOMICS OF PRIVACY

tains, yet is valuable to others, may seem to owner costlessly (or nearly so), forcing him to
argue for giving people property rights in infor- disclose these defects will not reduce his incen-
mation about themselves and letting them sell tive to invest in discovering them.
those rights freely. The process of voluntary As examples of cases where transaction-
exchange would then ensure that the informa- cost considerations argue against assigning a
tion was put to its most valuable use. The at- property right to the possessor of a secret, con-
tractiveness of this solution depends, however, sider (1) whether the Bureau of the Census
on (1) the nature and source of the information should be required to buy information from the
and (2) transaction costs. firms or households that it interviews and (2)
whether a magazine should be allowed to sell
its subscriber list to another magazine without
The strongest case for property rights obtaining the subscribers' consent. Requiring
in secrets is presented where such rights the Bureau of the Census to pay (that is, as-
signing the property right in the information
are necessary in order to encourage
sought to the interviewee) would yield a skewed
investment in the production of socially sample: the poor would be overrepresented,
valuable information. unless the bureau used a differentiated price
schedule based on the different costs of disclo-
sure (and hence prices for cooperating) to the
The strongest case for property rights in people sampled. In the magazine case, the costs
secrets is presented where such rights are nec- of obtaining subscriber approval would be high
essary in order to encourage investment in the relative to the value of the list. If, therefore, we
production of socially valuable information. are confident that these lists are generally
This is the rationale for giving legal protection worth more to the purchasers than being
to the variety of commercial ideas, plans, and shielded from possible unwanted solicitations
information encompassed by the term "trade is worth to the subscribers, we should assign
secret." It also explains why the "shrewd bar- the property right to the magazine, and this is
gainer" is not required to tell the other party what the law does.
to the bargain his true opinion of the values The decision to assign the property right
involved. A shrewd bargainer is, in part, one away from the individual is further supported,
who invests resources in obtaining information in both the census and subscription-list cases,
about the true values of things. Were he forced by the fact that the costs of disclosure to the
to share this information with potential sellers, individual are low. They are low in the census
he would get no return on his investment and case because the government takes precautions
the process-basic to a market economy-by against disclosure of the information collected
which goods are transferred through voluntary to creditors, tax collectors, or others who might
exchange into successively more valuable uses have transactions with the individual in which
would be impaired. This is true even though they could use the information to gain an ad-
the lack of candor in the bargaining process vantage over him. They are low in the subscrip-
deprives it of some of its "voluntary" character. tion-list case because the information about the
At some point nondisclosure becomes subscribers that is disclosed to the list pur-
fraud. One consideration relevant to deciding chaser is trivial and cannot be used to impose
whether the line has been crossed is whether substantial costs on them.
the information sought to be concealed by one Even though the type of private informa-
of the transacting parties is a product of sig- tion discussed thus far is not in general dis-
nificant investment. If not, the social costs of creditable to the individual to whom it pertains,
nondisclosure are reduced. This may be deci- we have seen that there may still be strong
sive, for example, on the question whether the reasons for assigning the property right away
owner of a house should be required to disclose from that individual. Much of the demand for
latent (nonobvious) defects to a purchaser. The privacy, however, concerns discreditable infor-
ownership and maintenance of a house are cost- mation-often information concerning past or
ly and productive activities. But since knowl- present criminal activity or moral conduct at
edge of the house's defects is acquired by the variance with a person's professed moral stand-

REGULATION, MAY/JUNE 1978 21


THE ECONOMICS OF PRIVACY

nipulate the world around them by selective


Much of the demand for privacy, however, disclosure of facts about themselves. Why
concerns discreditable information ... should others be asked to take their self-
and often the motive for concealment serving claims at face value and prevented
from obtaining the information necessary to
is ... to mislead others. verify or disprove these claims?
Some private information that people de-
sire to conceal is not discreditable. In our cul-
ards-and often the motive for concealment is, ture, for example, most people do not like to be
as suggested earlier, to mislead others. People seen naked, quite apart from any discreditable
also wish to conceal private information that, fact that such observation might reveal. Since
while not strictly discreditable, would if re- this reticence, unlike concealment of discredit-
vealed correct misapprehensions that the indi- able information, is not a source of social costs
vidual is trying to exploit-as when a worker and since transaction costs are low, there is an
conceals a serious health problem from his economic case for assigning the property right
employer or a prospective husband conceals in this area of private information to the indi-
his sterility from his fiancie. It is not clear why vidual; and this is what the common law does.
society in these cases should assign the proper- I do not think, however, that many people have
ty right in information to the individual to a general reticence that makes them wish to
whom it pertains; and under the common law, conceal nondiscrediting personal information.
generally it does not. A separate question, Anyone who has sat next to a stranger on an
taken up a little later, is whether the decision airplane or a ski lift knows the delight that
to assign the property right away from the some people take in talking about themselves
possessor of guilty secrets implies that any and to complete strangers. Reticence appears when
all methods of uncovering those secrets should one is speaking to people-friends, family, ac-
be permitted. quaintances, business associates-who might
An analogy to the world of commerce may use information about him to gain an advan-
clarify why people should not-on economic tage in business or social transactions with
grounds in any event-have a right to conceal him. Reticence is generally a means rather than
material facts about themselves. We think it an end.
wrong (and inefficient) that a seller in hawk- The reluctance of many people to reveal
ing his wares should be permitted to make their income is sometimes offered as an exam-
false or incomplete representations as to their ple of a desire for privacy that cannot be ex-
quality. But people "sell" themselves as well plained in purely instrumental terms. But I
as their goods. A person professes high stand- suggest that people conceal an unexpectedly
ards of behavior in order to induce others to low income because being thought to have a
engage in social or business dealings with him high income has value in credit markets and
from which he derives an advantage, but at the elsewhere, and they conceal an unexpectedly
same time conceals some of the facts that the high income in order to (1) avoid the attention
people with whom he deals need in order to of tax collectors, kidnappers, and thieves, (2)
form an accurate picture of his character. fend off solicitations from charities and family
There are practical reasons for not imposing a members, and (3) preserve a reputation for
general legal duty of full and frank disclosure generosity that would be shattered if the pre-
of one's material personal shortcomings-a cise fraction of their income that was being
duty not to be a hypocrite. But each of us given away were known. Points (1) and (2)
should be allowed to protect ourselves from may explain anonymous gifts to charity.
disadvantageous transactions by ferreting out
concealed facts about other individuals that Prying, Eavesdropping, and Formality. To the
are material to their implicit or explicit self- extent that personal information is concealed
representations. in order to mislead, the case for giving it legal
It is no answer that, in Brandeis's phrase, protection is, I have argued, weak. Protection
people have "the right to be let alone." Few would simply increase transaction costs, much
people want to be let alone. They want to ma- as if we permitted fraud in the sale of goods.

22 AEI JOURNAL ON GOVERNMENT AND SOCIETY


THE ECONOMICS OF PRIVACY

However, it is also necessary to consider the Communication among criminal conspirators


means by which personal information is ob- is an example. In these cases-where limited
tained. Prying by means of casual interrogation eavesdropping is indeed permitted-the effect
of acquaintances of the object of the prying of eavesdropping in reducing communication
must be distinguished from eavesdropping is not an objection to, but an advantage of, the
(electronically or otherwise) on a person's eavesdropping.
conversations. A in conversation with B dis- The analysis here can readily be extended
parages C. If C has a right to hear this conver- to efforts to obtain people's notes, letters, and
sation, A, in choosing the words he uses to B, other private papers; communication would be
will have to consider the possible reactions of inhibited by such efforts. A more complex
C. Conversation will be more costly because of question is presented by photographic surveil-
the external effects and this will result in less lance-for example, of the interior of a per-
-and less effective-communication. After son's home. Privacy enables a person to dress
people adjust to this new world of public con- and otherwise disport himself in his home
versation, even the Cs of the world will cease without regard to the effect on third parties.
to derive much benefit in the way of greater This economizing property would be lost if the
information from conversational publicity: interior of the home were in the public do-
people will be more guarded in their speech. main. People dress not merely because of the
The principal effect of publicity will be to effect on others but also because of the reti-
make conversation more formal and communi- cence, noted earlier, concerning nudity and
cation less effective rather than to increase the other sensitive states. This is another reason
knowledge of interested third parties. for giving people a privacy right with regard
Stated differently, the costs of defamatory to the places in which these sensitive states
utterances and hence the cost-justified level of occur.
expenditures on avoiding defamation are
greater the more publicity given the utterance. Ends and Means. The two main strands of my
If every conversation were public, the time and argument-relating to personal facts and to
other resources devoted to ensuring that one's communications, respectively-can be joined
speech was free from false or unintended by remarking the difference in this context
slanders would rise. The additional costs are between ends and means. With regard to ends,
avoided by the simple and inexpensive expedi- there is a prima facie case for assigning the
ent of permitting conversations to be private. property right in a secret that is a by-product
It is relevant to observe that language be- of socially productive activity to the individual
comes less formal as society evolves. The lan- if its compelled disclosure would impair the
guages of primitive peoples are more elabo- incentives to engage in that activity; but there
rate, more ceremonious, and more courteous
than that of twentieth-century Americans. One
reason may be that primitive people have little ... there is a prima facie case for
privacy. There are relatively few private con- assigning the property right [in a secret]
versations because third parties are normally
away from the individual if secrecy would
present and the effects of the conversation on
them must be taken into account. Even today, reduce the social product by misleading
one observes that people speak more formally others.
the greater the number of people present. The
rise of privacy has facilitated private conversa-
tion and thereby enabled us to economize on is a prima facie case for assigning the property
communication-to speak with a brevity and right away from the individual if secrecy
informality apparently rare among primitive would reduce the social product by misleading
peoples. This valuable economy of communi- others. However, the fact that under this anal-
cation would be undermined by allowing eaves- ysis most facts about people belong in the pub-
dropping. lic domain does not imply that intrusion on
In some cases, to be sure, communication private communications should generally be
is not related to socially productive activity. permitted, given the effects of such intrusions

REGULATION, MAY/JUNE 1978 23


THE ECONOMICS OF PRIVACY

on the costs of legitimate communications. English and American appellate judges in the
Admittedly, the suggested dichotomy be- decision of private suits over a period of hun-
tween facts and communications is too stark. dreds of years. I believe, and have argued in
If you are allowed to interrogate my acquaint- greater detail elsewhere, that the common law
ances about my income, I may take steps to of privacy is strongly stamped by the economic
conceal it that are analogous to the increased principles (though nowhere explicitly recog-
formality of conversation that would ensue nized by the judges) developed in this article.
from abolition of the right to conversational That law contains the precise elements that
privacy, and the costs of these steps are a an economically based right of privacy would
social loss. The difference is one of degree. Be- include. Trade secrets and commercial privacy
cause eavesdropping and related modes of in- generally are well protected. It has been said
trusive surveillance are such effective ways of
eliciting private information and are at the
same time relatively easy to thwart, we can ex- ... the common law of privacy . . . .
pect that evasive maneuvers, costly in the ag- contains the precise elements that
gregate, would be undertaken if conversational an economically based right of privacy
privacy were compromised. It is more difficult
would include. Trade secrets and
to imagine people taking effective measures
against casual prying. An individual is unlikely commercial privacy generally are well
to alter his income or style of living drastically protected.
in order to better conceal his income or pri-
vate information from casual or journalistic
inquiry. (Howard Hughes was a notable excep- by one court: "almost any knowledge or infor-
tion to this generalization.) mation used in the conduct of one's business
We have now sketched the essential ele- may be held by its possessor secret." In an-
ments of an economically based legal right of other well-known case, aerial photography of
privacy: (1) Trade and business secrets by a competitor's plant under construction was
which businessmen exploit their superior held to be unlawful, and the court used the
knowledge or skills would be protected. (The term "commercial privacy" to describe the in-
same principle would be applied to the per- terest it was protecting.
sonal level and would thus, for example, entitle An analogy in the personal area is the
the social host or hostess to conceal the recipe common law principle that a person's name or
of a successful dinner.) (2) Facts about people photograph may not be used in advertising
would generally not be protected. My ill health, without his consent. The effect is to create a
evil temper, even my income would not be property right which ensures that a person's
facts over which I had property rights, though name or likeness (0. J. Simpson's, for exam-
I might be able to prevent their discovery by ple) will be allocated to the advertising use in
methods unduly intrusive under the third cate- which it is most valuable. Yet, consistent with
gory. (3) Eavesdropping and other forms of the economics of the problem, individuals have
intrusive surveillance would be limited (so far in general no right in common law to conceal
discrediting information about themselves.
as possible) to the discovery of illegal activities.
But, again consistent with the economics of
the problem, they do have a right to prevent
Application eavesdropping, photographic surveillance of
the interior of a home, the ransacking of pri-
To what extent is the economic theory de- vate records to discover information about an
veloped above reflected in public policy? To individual, and similarly intrusive methods of
answer this question, it is necessary to distin- penetrating the wall of privacy that people
guish sharply between common law and statu- build about themselves. The distinction is illus-
tory responses to the privacy question. trated by Ralph Nader's famous suit against
General Motors. The court affirmed General
The Common Law. The term common law re- Motors' right to have Nader followed about, to
fers to the body of legal principles evolved by question his acquaintances, and, in short, to

24 AEl JOURNAL ON GOVERNMENT AND SOCIETY


THE ECONOMICS OF PRIVACY

ferret out personal information about Nader ings to student observers). Increasingly, more-
that the company might have used to under- over, the facts about an individual-arrest rec-
mine his public credibility. Yet I would expect ord, health, credit-worthiness, marital status,
a court to enjoin any attempt through such sexual proclivities-are secured from involun-
methods to find out what Nader was about to tary disclosure, while the facts about business
say on some subject in order to be able to corporations are thrust into public view by the
plagiarize his ideas. expansive disclosure requirements of the fed-
eral securities laws (to the point where some
firms are "going private" in order to secure
When, however, we compare the greater confidentiality for their plans and op-
implications of the economic analysis ... erations), the civil rights laws, "line of busi-
ness" reporting, and other regulations. A re-
with recent legislation in the privacy area,
lated trend is the erosion of the privacy of
we are conscious not of broad government officials through increasingly strin-
concordance but of jarring incongruity. gent ethical standards requiring disclosure of
income.
The trend toward elevating personal and
When, however, we compare the implica- downgrading organizational privacy is myste-
tions of the economic analysis not with the rious to the economist (as are other recent
common law relating to privacy but with re- trends in public regulation). To repeat, the
cent legislation in the privacy area, we are con- economic case for privacy of communications
scious not of broad concordance but of jarring seems unrelated to the nature of the communi-
incongruity. As noted, from the economic cator, whether a private individual or the em-
standpoint, private business information ployee of a university, corporation, or govern-
should in general be accorded greater legal ment agency, while so far as facts about people
protection than personal information. Secrecy or organizations are concerned, the case for
is an important method of appropriating so- protecting business privacy is stronger, in gen-
cial benefits to the entrepreneur who creates eral, than that for protecting individual pri-
them, while in private life it is more likely vacy.
simply to conceal legitimately discrediting or Some of the differences in the protection
deceiving facts. Communications within orga- accorded governmental and personal privacy
nizations, whether public or private, should may, to be sure, simply reflect a desire to re-
receive the same protection as communications duce the power of government. Viewed in this
among individuals, for in either case the effect light, the Freedom of Information Act is per-
of publicity would be to encumber and retard haps supported by the same sorts of considera-
communication. tions that are believed by some to justify wire-
tapping in national security or organized crime
The Trend in Legislation. But in fact the legis- cases. But only a small part of the recent legis-
lative trend is toward giving individuals more lative output in the privacy area can be ex-
and more privacy protection with respect to plained in such terms.
facts and communications, and business firms A good example of legislative refusal to
and other organizations (including government respect the economics of the privacy problem
agencies, universities, and hospitals) less and is the Buckley Amendment, which gives stu-
less. The Freedom of Information Act, sun- dents (and their parents) access to their school
shine laws opening the deliberations of admin- records. The amendment permits students to
istrative agencies to the public, and the erosion waive, in writing, their right to see letters of
of effective sanctions against breach of govern- recommendation, and most students do so.
ment confidences have greatly reduced the pri- They do so because they know that letters of
vacy of communications within the govern- recommendation to which they have access
ment. Similar forces are at work in private convey no worthwhile information to the re-
institutions such as business firms and private cipient. The effect on the candor and value of
universities (note, for example, the Buckley communication is the same as would be that of
Amendment and the opening of faculty meet- a rule that allowed C to hear A and B's con-

REGULATION, MAY/JUNE 1978 25


THE ECONOMICS OF PRIVACY

versations about him. Throwing open faculty say that the latter is a matter of rights and that
meetings or congressional conferences to the the former is based merely on instrumental,
public has the identical effect of reducing the utilitarian considerations. The reasons they
value of communication without benefitting offer for recognizing a right of personal pri-
the public, for the presence of the public de- vacy are, however, utilitarian-that people
ters the very communication they want to hear. need an opportunity to "make a new start"
As another example of an economically (that is, to conceal embarrassing or discredit-
perverse legislative response to privacy issues, able facts about their past), that people can-
consider the different treatment of disclosures not preserve their sanity without privacy, and
of corporate and of personal crime. The cor- so on. Yet Greenawalt and Noam disregard the
poration that bribes foreign officials must utilitarian justification for secrecy as an in-
make public disclosure of the fact, even though centive to investment in productive activity-
the crime may benefit the corporation, its the strongest justification for secrecy and one
shareholders, the United States as a whole, and mainly relevant, as I have argued, in business
even the citizens of the foreign country in contexts.
question. Yet the convicted rapist, the recidi- The second distinction they suggest be-
vist con artist, and even the murderer "acquit- tween the business and personal claims to pri-
ted" by reason of insanity are not only under vacy is a strangely distorted mirror of my argu-
no duty to reveal to new acquaintances their ment for entrepreneurial or productive secrecy.
criminal activities but are often assisted by They argue that it is difficult to establish prop-
law in concealing these activities. erty rights in information and even remark
Through the Fair Credit Reporting Act, that secrecy is one way of doing so. But they
credit bureaus are forbidden to report to their do not draw the obvious conclusion that se-
customers a range of information concerning crecy can promote productive activity by creat-
applicants for credit-for instance, bankrupt- ing property rights in valuable information.
cies more than fourteen years old and all other Instead they use the existence of imperfections
adverse information (including criminal con- in the market for information as a justification
victions and civil judgments) more than seven for government regulation designed to extract
years old. These restrictions represent an ex- private information from business firms. They
traordinary intervention in the credit process do not explain, however, how the government
that could be justified only if credit bureaus could, let alone demonstrate that it would, use
systematically collected and reported informa- this information more productively than firms,
tion that, because of its staleness, had negli- and they do not consider the impact of this
gible value to its customers in deciding wheth- form of public prying on the incentive to pro-
er credit should be extended. No such assump- duce the information in the first place.
tion of economic irrationality is plausible.
These examples could be multiplied, but
the main point should be clear enough. Legis- Conclusion
latures are increasingly creating rights to con-
ceal information that is material to prospective Discussions of the privacy question have con-
creditors and employers, and at the same time tained a high degree of cant, sloganeering, emo-
forcing corporations and other organizations to tion, and loose thinking. A fresh perspective
publicize information whose confidentiality is on the question is offered by economic analy-
necessary to their legitimate operation. sis, and by a close examination of the common
law principles that have evolved under the
A Contrary View. I know of only one principled influence (perhaps unconsciously) of econom-
effort to show that individual privacy claims ic perceptions. In the perspective offered by
are stronger than those of businesses and economics and by the common law, the recent
other organizations. Professors Kent Greena- legislative emphasis on favoring individual and
walt and Eli Noam of Columbia, in an unpub- denigrating corporate and organizational pri-
lished paper, offer two distinctions between a vacy stands revealed as still another example
business's (or other organization's) interest in of perverse government regulation of social and
privacy and an individual's interest. First, they economic life. m

26 AEI JOURNAL ON GOVERNMENT AND SOCIETY

You might also like