Skip to main content

Advertisement

Log in

E-mail, terrorism, and the right to privacy

  • Published:
Ethics and Information Technology Aims and scope Submit manuscript

Abstract

This paper discusses privacy and the monitoring of e-mail in the context of the international nature of the modern world. Its three main aims are: (1) to highlight the problems involved in discussing an essentially philosophical question within a legal framework, and thus to show that providing purely legal answers to an ethical question is an inadequate approach to the problem of privacy on the Internet; (2) to discuss and define what privacy in the medium of the Internet actually is; and (3) to apply a globally acceptable ethical approach of international human rights to the problem of privacy on the Internet, and thus to answer the question of what is and is not morally permissible in this area, especially in light of recent heightened concerns about terrorist activities. It concludes that the monitoring of e-mail is, at least in the vast majority of cases, an unjustified infringement of the right to privacy, even if this monitoring is only aimed at preventing the commission of acts of terrorism.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Austin L. (2003). Privacy and the Question of Technology. Law and Philosophy 22(2):119–166

    Google Scholar 

  • L. Brown, (Ed). The New Shorter Oxford English Dictionary, 3rd edn. Clarendon Press, 1993

  • Charters D. (2002) Electronic Monitoring and Privacy Issues in Business-Marketing: The Ethics of the DoubleClick Experience. Journal of Business Ethics 35(4):243–254

    Article  Google Scholar 

  • McArthur R. (2001). Reasonable Expectations of Privacy. Ethics and Information Technology 3(2):123–128

    Article  Google Scholar 

  • McCloskey H.J. (1980) Privacy and the Right to Privacy. Philosophy 55(211): 17–38

    Article  Google Scholar 

  • Miller S., Weckert J. (2000) Privacy, the Workplace and the Internet. Journal of Business Ethics 28(3):255–265

    Article  Google Scholar 

  • M. Tunik, Practices and Principles. Princeton University Press, 1998

Download references

Acknowledgements

I would like to thank those who have given helpful comments on previous versions of this paper, especially John Weckert, Nikki Coleman, and an anonymous referee of this journal.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stephen Coleman.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Coleman, S. E-mail, terrorism, and the right to privacy. Ethics Inf Technol 8, 17–27 (2006). https://doi.org/10.1007/s10676-006-9103-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10676-006-9103-5

Keywords

Navigation