Trojan Horse:
“A computer program that appears to have a useful function, but also has a hidden and potentially malicious function.”Footnote 1
“Privacy itself is in jeopardy.”Footnote 2 Before contextual integrity was first proposed, there was good reason to worry. In the pages of law journals and judicial opinions, privacy was fighting with one hand tied behind its back. Legal scholarship at the time had largely embraced a notice-and-choice paradigm that allowed corporate parties to collect and use personal data in any way so long as it was disclosed in their terms of service.Footnote 3 Since consumers do not read or understand these documents (in no small part because corporations make them difficult to read and understand),Footnote 4 corporate parties effectively had free rein.Footnote 5 Legal doctrine was saddled with a strict historical dichotomy between public and private data. The law’s position on public data—which included any personal information that an individual ever made available to a third party—was that just about “anything goes.”Footnote 6 In a society and economy increasingly intermediated by third-party social media platforms, online retailers, internet service providers, and apps, corporate parties unrelentingly hoovered up, packaged, and resold information that consumers made available to an ever-expanding data ecosystem.Footnote 7
Contextual integrity offered a new perspective on privacy to an eager audience. It promised nuance that simplistic dualities like consensual/coerced and private/public could not.Footnote 8 It shifted the focus from static data to dynamic flows of information. These latter were to be characterized not by singular on-off switches, but by five scalar parameters. Since the norms that govern information flows vary with social context, all the subtleties of social inquiry came to bear. With this sophisticated theoretical apparatus, contextual integrity could explain how, for example, one could retain privacy interests even while in public or even after revealing information to a trusted third party.
While the growing body of (mostly) state privacy law in the United States has continued to root itself by and large in the notice-and-choice framework,Footnote 9 contextual integrity has spread widely in academic circles. It is not unfair to say that contextual integrity has now become a (if not the) dominant theory of privacy among policy-oriented scholars in law and computer science.Footnote 10 A systematic study of computer scientists who discuss contextual integrity found various levels of comprehension, but no dissenters.Footnote 11 A review of law articles from the last five years that mention “contextual integrity” uncovers much the sameFootnote 12—occasional off-hand expressions of concern, but mostly various formulations of “[t]his Article adopts … contextual integrity theory to conceptualize privacy.”Footnote 13 If (as every law professor hopes) trends in legal scholarship foreshadow trends in law, anyone interested in where privacy policy is headed should take note of contextual integrity.
Last year, contextual integrity turned twenty.Footnote 14 Its fledgling days are long passed. The time has come to reckon not only with the view’s exciting possibilities, but also with the weaknesses that inevitably plague any ambitious theory. Contextual integrity has had scattered critics over the years, mostly among theorists.Footnote 15 Michael D. Birnhack, Alexandra Prégent, and James B. Rule separately argued on philosophical and sociological grounds that contextual integrity is an ambiguous theory that does not yield determinate results (I will return to this critique below).Footnote 16 Nora McDonald and Andrea Forte use critical studies to conclude that contextual integrity would further marginalize vulnerable populations.Footnote 17 And Neil Richards devotes five pages of his most recent book to characterizing contextual integrity as a manipulable “theory of creepy.”Footnote 18 Contextual integrity’s architects have yet to meaningfully these critiques.Footnote 19
This article turns from theory to practice, aspiring to provoke a hard look at how contextual integrity would affect privacy rights if it were adopted as a rule of legal decision. Below, I try to predict the sorts of conclusions human judges applying contextual integrity would reach in cases that pit data-hungry corporations against individuals whose privacy is at stake. The methodology I adopt aspires to realism rather than idealism, so the political economy of the modern world will play an important role. From this perspective, several new concerns about contextual integrity emerge. I argue we should expect neutral judges applying contextual integrity generally to favor corporate parties. The theory is not just ambiguous, marginalizing, and “creepy”—it threatens the very values it seeks to protect.
The goal of this article is to advance an internal critique of contextual integrity, not to advocate for any alternative theory. I do very little to compare contextual integrity to other views. The law desperately needs a workable theory of privacy. My only hope is to offer a note of caution to the wave of uncritical adoption of contextual integrity that I observe, mostly among law and computer science scholars.Footnote 20 If I can show that contextual integrity would hasten privacy’s demise, I will consider my job done. Every other available theory of privacy may, for all I have to say, be worse. But we should hardly invite a weasel into the privacy henhouse simply because it would kill fewer chickens than the proverbial fox. Perhaps all sides need to fundamentally rethink what privacy is and how to protect it.
The article begins (Section 1) by summarizing contextual integrity, the various parameters it considers, and the two-step process it prescribes for assessing privacy claims. It then adopts (Section 2) the perspective of a neutral judge who sincerely tries their hardest to faithfully apply contextual integrity. Legal realist dynamics predict (Section 3) that these uncertainties will, over the long run, allow corporate parties to systematically shrink the zone of protected privacy interests. Proponents of contextual integrity could mitigate some of its most concerning consequences (Section 4), but only by abandoning defining features of the theory.
1. DEFINING CONTEXTUAL INTEGRITY
Contextual integrity’s architects sought to remedy shortcomings of earlier privacy frameworks that surfaced as government and corporate surveillance became an increasingly ubiquitous feature of modern society.Footnote 21 The initial goal of contextual integrity was to account for the common intuition that, even in public and even after sharing information with trusted third parties, people can still retain nuanced privacy interests. There were two key moves. The first was to shift the focus of the privacy inquiry from types of information to flows of information. Flow is “movement or transfer of information from one party to another or others.”Footnote 22 This shift allowed contextual integrity to “recognize[] a richer, more comprehensive set of relevant parameters”:
-
• the sender of the information
-
• the recipient
-
• the subject (i.e., who the information is about)
-
• the type of information (e.g., the subject’s breakfast cereal preference or gender identity), and
-
• any applicable transmission principles (i.e., social norms governing the transfer of information).Footnote 23
These five parameters characterize every flow of information.
The second key move that contextual integrity’s architects made was to abandon binary evaluative metrics—such as public/private or consensual/coerced—in favor of nuanced metrics embedded in the social contexts in which information flows. “Contexts are structured social settings characterized by canonical activities, roles, relationships, power structures, norms (or rules), and internal values (goals, ends, purposes).”Footnote 24 Social contexts can be personal (like friendships) or transactional (like visiting a library). They can be intimate (like a marriage) or anonymous (like a chatroom). Each includes norms and expectations (i.e., transmission principles) about how information will flow within and out of a context. For example, in a marriage, reciprocal transparency is often a strong norm (free flow of information within the marriage), as is confidentiality (restricted flow of information out of the marriage). When these transmission principles are violated, contextual integrity tells us privacy may have been infringed.
The new technologies that give rise to most present-day concerns over privacy create novel social contexts that have yet to develop their own idiosyncratic norms. In such cases, contextual integrity prescribes a two-step procedure for evaluating a flow of information. First, one must identify a preexisting social context that is analogous to the novel one under consideration (i.e. one that involves similar actors and types of information).Footnote 25 For example, when assessing internet search engines several years ago, contextual integrity scholars compared them to public libraries, which people could also freely access to conduct research.Footnote 26 If the flow under consideration respects the transmission principles internal to the analogous preexisting social context, contextual integrity deems it appropriate in the novel context too.Footnote 27 If, however, a flow deviates in any way from the transmission principles, contextual integrity deems it suspect.Footnote 28
Once a flow of information is deemed suspect, it moves to the second step of contextual integrity’s analysis. While the first step is essentially an exercise in descriptive sociology, the second step incorporates a more prescriptive dimension.Footnote 29 It evaluates deemed-suspicious flows of information in light of two sets of values: 1) “general moral and political considerations”Footnote 30 and 2) the “ends and purposes” of the social context within which it occurs.Footnote 31 If a deemed-suspicious information flow meaningfully advances either set of values, contextual integrity may conclude that it does not infringe privacy after all.Footnote 32 For example, a public library that shared a patron’s book history with an outside party probably violates relevant transmission principles (subject to very narrow exceptions). It would follow in the first step of a contextual integrity analysis that, by sharing our search history with anyone, Google initiates a suspicious information flow. But contextual integrity might nonetheless greenlight this sharing if Google can persuasively argue that the flow advances our research goals—for example, because (contrary to fact) Google only shares our search history to connect us to relevant experts.
2. A LEGAL REALIST FRAMEWORK
Contextual integrity’s adherents offer many persuasive examples of the privacy-protective prescriptions the theory can generate for emerging current technologies. Google Street View should not show individuals’ faces.Footnote 33 Access to computerized public records should have limits.Footnote 34 And Facebook should not use correspondence between friends to serve manipulative ads.Footnote 35 These conclusions all accord with widely shared opinions among privacy scholars. Perhaps bolstered by this relative uniformity of opinion, adherents of contextual integrity often apply the theory with an air of finality and predetermination. The strong sense is that “the integrity of the contexts themselves [becomes] the arbiter of privacy practices.”Footnote 36
Of course, contexts cannot literally arbitrate anything. If contextual integrity were ever incorporated into law, a person would have to apply it.Footnote 37 Legal realism is an orientation toward the law that invites analysts to adopt a “predictive stance,” focusing on the actual decisions people applying the law would make, rather than on what the “right” answers are.Footnote 38 This is where the rubber hits the road for privacy rights. To predict how contextual integrity would affect real people’s privacy interests, we should consider whether a legal arbiter applying contextual integrity would reliably reach the same conclusions as contextual integrity’s proponents. Even if contextual integrity can generate pro-privacy results in important cases, it would be worrisome if the theory had enough wiggle room that it could equally justify privacy-compromising results in the same cases.
This article invites its readers to temporarily assume what, for most of us, will be an unfamiliar posture. Imagine you are a neutral judge deciding “cases or controversies”Footnote 39 that pit two antagonistic and very partisan litigants against each other—corporations that collect data and the individuals who claim their privacy has been violated. Your goal is not to favor one side or the other, but simply to reach the best outcome by applying a law that incorporates the framework of contextual integrity.
Your judicial task is not an easy one. The technology is complex. The information flows are vast. And the social contexts are nuanced. But if, as the adherents of contextual integrity claim, the framework “provides rigorous, substantive” guidance,Footnote 40 a “shorter and more systematic path,”Footnote 41 perhaps you can still be confident that, with enough effort, your answer will be the right answer.Footnote 42
3. CONTEXTUAL INTEGRITY WOULD ERODE PRIVACY
In the short term, a legal rule of contextual integrity may, as its proponents predict, favor David-the-consumer over Goliath-the-data-hungry-corporation. The framework has resources that, in today’s world, in the hands of a well-meaning judge, could justify restrictions on some egregious forms of data collection. But over the long term, contextual integrity favors Goliath over David. In the adversarial courtroom where privacy rights are ultimately decided, contextual integrity’s complexity and presuppositions favor whichever party is better resourced, more coordinated, and more persistent. The Davids of the world are individual consumers with disparate priorities and little more than their indignation or fear to fuel them. The Goliaths advance an unrelentingly united front backed by legal know-how, technological know-that, and billions of dollars from a data economy that they control. Contextual integrity makes matters worse because its defining sociality lends a permanence to Goliath’s victories that it withholds from David’s. Consumers’ courtroom wins last only until corporations regroup and reissue the same data practice in a modified form. When Goliath wins, things are different. Data abuses that survive court challenge (whether rightly or not) can eventually become ingrained, merging into an ever-evolving social backdrop. Once they do, contextual integrity has few tools to argue for unwinding the court’s precedent.
The remainder of this section applies a legal realist framework to predict how privacy would fare in courtrooms populated by neutral judges applying contextual integrity as a rule of decision. It anticipates privacy’s demise. The next several subsections each uncover a privacy-undermining courtroom dynamic that contextual integrity either enables or necessitates.
3.1. What If the Decisionmakers Aren’t Neutral?
As a quick aside, it bears noting that the present exercise stacks the legal realist deck in favor of contextual integrity by focusing on how neutral judges would decide cases. Many other parties, like legislators and regulators, also make decisions that affect individual privacy rights, but judges are a natural place to focus since the law’s effects will ultimately turn on judicial interpretations of it. Judges also are more politically insulated, and, hence, less vulnerable to industry capture.
However, a true realist would assume that even judges will generally favor corporate interests.Footnote 43 Familiar power dynamics select for and cultivate judges with pro-business dispositions.Footnote 44 To the extent that there is more wiggle room in contextual integrity’s framework than in alternatives, it would provide pro-corporate judges with cover to enact pro-corporate policies.Footnote 45 This would exacerbate all the privacy-undermining dynamics described in the sections that follow.Footnote 46
3.2. Errors Due to Value Indeterminacy
Contrary to the legal realist paradigm, this article assumes away any influence pro-corporate interests have on the judicial selection process. For purposes of the present exercise, our hypothetical judges applying contextual integrity are officially neutral between data-hungry corporate defendants and privacy-protective individual plaintiffs. But neutral judges are still human judges, and all humans have a rich array of conscious and unconscious biases, preferences, and priorities. The more determinate and concrete a decision process is, the more likely it is to filter out these distortions.
As I am far from the first to observe, contextual integrity is plagued by value indeterminacy.Footnote 47 Recall that the theory’s final step for assessing a purported violation asks judges to “evaluate [information] flows against norms based on general ethical and political principles.”Footnote 48 These general principles include an open-ended list of “moral, political, and social values,”Footnote 49 including “prevention of information-based harms,” “informational inequality,” “autonomy,” “freedom,” “preservation of important human relationships,” “democracy, “freedom of speech,” “pursuit of wealth,” “efficiency,” “security,” and “other social values.”Footnote 50 Proponents of contextual integrity hope that this impressive list of considerations will “allow for greater specificity—hence less ambiguity—in prescribing and prohibiting certain flows.”Footnote 51
But put yourself in a neutral judge’s shoes, tasked with deciding whether some flow of information is legitimate in some novel social context. You genuinely want to get the right answer. Is the task made any more concrete by introducing the interests of freedom, wealth, democracy, efficiency, and “other social values”? One might worry that such an open-ended values inquiry confuses privacy with other important interests.Footnote 52 If one thing is certain, though, it is that these values themselves do not have settled meanings.Footnote 53 Does freedom refer to positive or negative freedom? Is wealth measured in dollars or love? Is democracy best respected by the expressed will of the people or by their hypothetical will? Are there any distributional constraints on efficiency? A deliberative process can be no more determinate than the considerations that go into it.Footnote 54
Even if a neutral judge could confidently identify and define all implicated values, there is still the problem of how to sum them into a binary decision—that the information flow is legitimate or it is not. Contextual integrity offers no hierarchy of social and political values. It does not even say whether context relative goals matter more or less than other general social values. For a conscientious judge hoping to find the right answer, open-ended, multi-factor balancing tests like these are paralyzingly imprecise.Footnote 55
Of course, judges will always encounter value indeterminacies, even if they were applying a different theory of privacy.Footnote 56 But indeterminacy comes in degrees; the greater the degree of indeterminacy, the more dangerous the legal dynamics discussed throughout this section become.Footnote 57 As a purely mathematical matter, contextual integrity must be less determinate than more focused alternatives simply because it requires judges to balance a greater number of essentially contested values. Notions like “consensual” and “public” on which competitor theories rely are ambiguous enough on their own. Adding notions like “democracy,” “dignity,” and “wealth” to the mix exponentially increases the number of open questions.
It may not be an exaggeration to say that under contextual integrity, there are no clear-cut violations. According to consent-based theories of privacy, if a firm never discloses a data practice to consumers, that is a clear-cut violation. According to publicity-based theories of privacy, an unwarranted search of a person’s pillow-side diary is a clear-cut violation.Footnote 58 But, according to contextual integrity, judges must first consider how efficiency, security, and every other implicated social/moral/political value bear on deemed-suspicious information flows before reaching a final conclusion.Footnote 59 Perhaps efficiency favors nondisclosure of some corporate data practices, and security favors public access to secret diaries. For every flow of information, there will be values it promotes and values it hinders. Judges applying contextual integrity would be routinely forced to select between two conflicting results, both of which have colorable defenses. Even if, on balance, one result is usually more justifiable than the other, few if any cases will be easy.
It bears noting that many of contextual integrity’s proponents in computer science and law stop at the view’s first step (i.e., identifying the social context and surfacing its norms of transmission).Footnote 60 In the second step, these proponents often populate the otherwise open-ended normative inquiry with a more limited range of norms important to them or their discipline.Footnote 61 This approach may eliminate, or at least significantly circumscribe, the value indeterminacy that a judge applying contextual integrity would face. However, as discussed in the remainder of this section, indeterminacies arise in contextual integrity’s first step, too, and these could prove even more troublesome for a neutral judge.
3.3. Errors Due to Context Indeterminacy
Contextual integrity invites a second type of indeterminacy that penetrates more deeply to its conceptual core—indeterminacy of social context.Footnote 62 Recall that the first step for a neutral judge applying contextual integrity is to characterize the social context the parties inhabit. For this, the court must consider “who is gathering the information, who is analyzing it, who is disseminating it and to whom, the nature of the information, the relationships among the various parties, and even larger institutional and social circumstances.”Footnote 63 This social context fixes the transmission norms in light of which the judge should start evaluating the contested flow of information. Contextual integrity also instructs judges to identify “context-specific purposes and values”Footnote 64 that arise from “the objectives around which [the] context is oriented.”Footnote 65 Envisioning how contextual integrity would play out in an adversarial courtroom forces us to reckon with the ambiguities and ambivalences inherent to understanding social context.
Proponents of contextual integrity normally take social contexts as given, singularly characterizable in the way they offer. In their view, netizens on Google are researchers,Footnote 66 “friends” on Facebook are friends as classically understood,Footnote 67 and Web-based financial institutions are banks.Footnote 68 These social context characterizations uniformly favor the vantage of individuals whose personal data is at stake.Footnote 69 But contextual integrity has no internal resources to dictate this sort of pro-consumer bias. Social contexts are necessarily co-constructed by the interactions, expectations, and purposes of all sides to an exchange. That is what makes them social. If anything, the theory itself demands impartiality because neither side gets to be the “sole arbiter” of social context.Footnote 70 A neutral judge would strive to bear in mind the perspectives of all parties to the conflict.Footnote 71
Characterizing social context quickly becomes murky when there are conflicting perspectives among participants. This sort of conflict is exactly what we should expect a neutral judge to face in an adversarial courtroom. For example, Google is unlikely to accept the pro-consumer characterization according to which it is a public library and users of its search engine are researchers.Footnote 72 Rather, Google will probably say that its users are more like consumers (of its services) or products (for its advertisers).Footnote 73 The social context only becomes more intractable once we realize that Google and people running searches on its site are not the only participants. Content generators obviously interact with every Google search and display content on results pages. So do advertisers. Very likely, all four parties would characterize the social context differently. The worry is that all four perspectives are, in a sense, accurate but also irreconcilable. While other theories of privacy invite some differences of opinion—for example, on whether some data collection was consensual or some interaction occurred in public—the range of available perspectives is considerably narrower.
It might help if there were some external vantage point, an objective view from nowhere,Footnote 74 that could help judges decide between competing characterizations of social context. Indeed, proponents of contextual integrity suggest that the “work of reputable philosophers, social scientists, and social theorists” could offer something along those lines.Footnote 75 While drawing these disciplines into the inquiry would undoubtedly add nuance and flexibility, the worry is that they would also “compound[] indeterminacy.”Footnote 76 The views of philosophers working “in the analytic tradition, Raimo Tuemelo, John Searle, Margaret Gilbert, and Seumas Miller,”Footnote 77 whom contextual integrity’s proponents approvingly cite, conflict with each other and with the many other respected social ontologists not referenced by name.Footnote 78 Incorporating the complexities and internal debates of other disciplines would only further undermine the confidence that contextual integrity could give concrete guidance to neutral judges.
3.4. Indeterminacy and Complexity Favor the Powerful Litigants
All else equal, ambiguous standards tend to favor sophisticated parties.Footnote 79 Clear-cut rules give less role for creative (i.e., expensive) advocacy. In the uncertain space where framing, fact development, and careful selection of values matter, litigants with better lawyers will tend to win. This dynamic predictably favors parties with more resources to craft narrative and identify loopholes. In the battle over privacy, these parties will invariably be the corporate proponents of free-flowing data.
Even if the previous two sections overstated contextual integrity’s inherent indeterminacies, the framework would still favor corporate parties. Suppose that contextual integrity could—were it fully fleshed out, were all the facts known, and were all the relevant values fully understood—be rendered more determinate. It would still involve a massively “complex, delicate web of constraints”Footnote 80 implicating “a far more complex domain of social factors (fields, domains, contexts) than the one that typically grounds privacy theories.”Footnote 81 Applying contextual integrity is “a messy task,”Footnote 82 like trying to “juggl[e] balls in the air, moving in sync.”Footnote 83 Defenders of contextual integrity tout this complexity as a virtue that allows the theory to generate sensible results in a broad range of cases.Footnote 84 But, as with indeterminacy, complexity favors litigants who have the resources to pay for attorneys who can navigate it.Footnote 85 As proponents of contextual integrity acknowledge, “only a handful of deep experts would be able to piece together a full account” of some important information flows.Footnote 86 The economic reality is that most of these experts will work for the highest bidder.
Corporate litigants have other advantages when faced with indeterminacy and complexity that even well-funded individual plaintiffs do not. First, as a group, they have relatively well-defined, uniform, and aggressive positions about how they may collect and use personal data. In courtrooms across the country, they can present a consistent and coordinated attack on privacy that unorganized individuals with disparate interests cannot hope to muster. Second, firms have an outsized role in defining new social contexts even prior to litigation. As the architects of platforms and apps, they have much more power than individual consumers to set the terms of exchange (and influence how outside parties will later perceive them). Finally, although privacy policies don’t play the central role in contextual integrity that they do for consent-based models of privacy, these corporate documents still exist, and most users still click “I agree.”Footnote 87 Neutral judges faced with a novel and multiply characterizable social context will understandably delve into whatever textual evidence is available to them. Privacy policies will often be the closest point of contact and only record of possible expectations shared by information senders and recipients. While critics of consent-based theories often worry that privacy policies are a way for corporations to legally launder abusive data practices,Footnote 88 contextual integrity raises similar concerns.
3.5. Heads Google Wins, Tails You Lose
To see how sophisticated corporate parties could weaponize contextual integrity to their advantage in the courtroom, consider once again an example that looms large in the literature: Google search. As noted above, proponents of contextual integrity have argued that when people use Google, they are in a social context that resembles researchers visiting a public library.Footnote 89 Under the transmission norms of that latter context, patrons’ search/reading history is confidential. It follows under contextual integrity that Google presumptively violates privacy when it shares search history with third parties. That is the result that proponents of contextual integrity favor. That is where their analysis ends.
But public libraries are governed by a far richer set of informational norms. Coincidentally, I recently took my son to get a library card, a necessary first step to accessing our local library’s services. As part of the registration process, I had to hand over my driver’s license.Footnote 90 If I gave the clerk a false ID, I would have committed a felony.Footnote 91 In the terminology of contextual integrity, before research information flows from libraries to patrons (i.e. they check out books), transmission norms require identification information to flow from patrons to libraries. Patrons who acquire library books without providing truthful information about themselves violate contextual integrity.
Consider the implications of this contextual analysis for Google search.Footnote 92 If Google is like a public library, then it would be well within its rights to require each of us to provide verifiable personal identification information—photo, date of birth, ID number, home address, weight, height, eye color (all the information that is on a driver’s license)—before we run a search. Indeed, if Google really is like a public library, then the company may even have an argument under contextual integrity that any of us who use its services without truthfully identifying ourselves violate its privacy. Surely that is a result every friend of privacy wants to avoid.
The general point is this. A theory that grounds itself in the nuances of complex social contexts opens a lot of space for unintended consequences. Under an open-ended and heavily layered approach like contextual integrity, results that may initially seem like victories for individual privacy can quickly turn to losses once teams of high-paid corporate attorneys apply their legal judo.
3.6. A Frog in Hot Water
The analysis so far has focused on isolated judges making decisions in single cases. If contextual integrity were adopted as a general rule of decision, it would play out in many cases over many years. Over the long run, contextual integrity provides corporations with a reliable strategy to continuously chip away at privacy protections.
Contextual integrity recognizes that social contexts are “evolving structures and the activities, actors, norms, values, and attributes comprising them evolve simultaneously.”Footnote 93 When a change to information flow is abrupt, we notice, resist, and jump to action to oppose injustice.Footnote 94 In these situations, contextual integrity offers its most robust privacy protections. But change does not have to be abrupt. “Practices [may also] shift almost imperceptibly [and], over time … bring about shifts in conventional expectations.”Footnote 95 If change happens gradually and norms shift against privacy, contextual integrity offers no recourse. Without a noticeable departure between actual data flows and expected contextual information norms, no plaintiff will surface to register a problem. And once the norms have shifted, contextual integrity cements them as the new benchmark for privacy.
Corporations can leverage this aspect of contextual integrity into a winning legal strategy.Footnote 96 By incrementally shifting from presently acceptable data practices toward presently unacceptable practices that firms prefer, firms can assure themselves of contextual integrity’s endorsement at every step.Footnote 97 Proponents of contextual integrity are aware of this problem,Footnote 98 but have yet to provide a response.Footnote 99 They hope that “the robustness of the social structure of contexts and the efficacy of their respective informational norms will stop the slide down the slope and prevent a society from throwing away privacy in tiny bits.”Footnote 100 But “[e]ven entrenched norms can change over time.”Footnote 101 If firms implement changes to data flow patiently, gradually, and imperceptibly, contextual integrity will not stand in their way. Worse, contextual integrity would give a legal stamp of approval to the new normal they create. Some other privacy frameworks offer fixed standards, like whether data collection was consensual, that are less vulnerable to shifting social sentiment. As argued above, these alternative frameworks can identify at least some clear-cut violations for rooting their privacy jurisprudence. The nuances, complexities, and indeterminacies of contextual integrity leave it particularly vulnerable to corporate efforts at social engineering.
3.7. A One-Way Ratchet
Even judges doing their best to implement contextual integrity in an unbiased way will sometimes make errors. Errors that disfavor privacy will tend toward permanence under contextual integrity while, errors that favor privacy will not. Consider a series of norms for information flow, ranging from very restrictive to very permissive. Suppose the norm that reflects the status quo in a social context is somewhere in the middle. This is the norm that contextual integrity will tend to favor.
Suppose now that a firm has implemented a data flow that is more permissive than the status quo norm would ordinarily sanction. Some adversely affected individual brings suit.Footnote 102 There are two ways that a judge applying contextual integrity in the scenario could get things wrong:
-
1. The judge may prohibit the data flow, even though a correct application of contextual integrity would find that the information flow is legitimate (despite being more permissive than the status quo).
-
2. Or the judge may permit the data flow, even though a correct application of contextual integrity would determine that the information flow is illegitimate.
In the first scenario, the privacy status quo would be protected, but only temporarily. The same firm, or a similarly situated firm, could try again, perhaps with some slight variation to the flow parameters.Footnote 103 The burden would be on some future individual litigant to bring a new case, hoping the next judge will make the same mistake as the first.
In the second scenario, the scope of privacy protections would have shrunk with little chance of reversal. As victims, individuals are differently situated from offender firms. They cannot as easily force relitigation of the same issue since, unlike firms, they cannot tweak the nature of the violation in ways that demand a new hearing. Furthermore, once data flows receive legal sanction, social norms will slowly adapt to anticipate them.Footnote 104 Unlike other theories that offer a fixed normative baseline to which judges can always return, contextual integrity provides no pathway for rewinding information norms back to their earlier state.
3.8. Persistent ParticularismFootnote 105
Proponents of contextual approaches could argue that the above concerns just represent hypothetical growing pains of the sort that any new law would face. Perhaps, through repeated application in courts, a robust jurisprudence would eventually supplement the framework.Footnote 106 Precedential guidance might make a law premised on contextual integrity more predictable, thereby halting the parade of horribles described above.
Unfortunately, contextual integrity is quite clear that, unlike decisions in law interpreting whether someone consented to a privacy policyFootnote 107 or whether some exchange occurred in public, decisions about flows of information in one social context will have little precedential value for other social contexts. Judges applying contextual integrity would have to approach each context anew, rendering decisions “on a case-by-case basis.”Footnote 108 This is because social contexts are highly variable,Footnote 109 and so are the privacy norms embedded in them.Footnote 110 Because “contextual integrity … recognizes an indefinite array of possibilities,”Footnote 111 it “does not [even] support substantive prescriptions for general families of technologies … [T]he most fruitful assessments take place within particular contexts.”Footnote 112
Some proponents of contextual integrity have implied that the theory would not even support general substantive prescriptions across individuals within the same context. Empirical studies demonstrate “significant relationships between individual factors and contextual privacy expectations.”Footnote 113 These individual factors include people’s idiosyncratic histories and policy preferences,Footnote 114 as well as demographic characteristics like age and gender.Footnote 115 This has led some researchers to recommend “tak[ing] into account both contextual variables and individual-level attitudes, concerns, and beliefs.”Footnote 116 If that is right, not only would judicial decisions applying contextual integrity in one context have little precedential value for another context, the decisions may not even carry weight between different individuals in the same context.
4. CONCLUSION
They say it takes a theory to beat a theory.Footnote 117 While I have argued that a legal doctrine framed around contextual integrity would ultimately undermine privacy protections, I have not argued that any alternative theory would do a better job overall. Indeed, contextual integrity’s leading competitors already hold sway in the law, and their privacy-diminishing impact is playing out before our eyes. For all I have said, contextual integrity may still be the best theory available. Even if it would eventually undermine individual privacy when applied by real world judges, it may do so more slowly than rival theories of privacy.
There are possible refinements to contextual integrity that might mitigate some of its dangers. First, in characterizing social contexts and their purposes, contextual integrity might commit to prioritizing the perspective of one of the three involved parties: data subject, sender, or recipient. Contextual integrity’s advocates seem most concerned for consumers, who tend to be subjects and/or senders, so focusing on their point of view (e.g., that Facebook is a platform for friends to meet) would center their interests. This would not totally resolve indeterminacies in characterizing social contexts, since people visit Facebook for a range of reasons. Some visitors want to meet friends, but many want to buy/sell goods or organize for social/political causes.Footnote 118 Despite this natural variation in motive, favoring one of the three participants within contextual integrity’s framework would narrow the range of characterizations social contexts will bear.
A second refinement would be to pick which values to prioritize in contextual integrity’s evaluative step.Footnote 119 “General moral and political considerations”Footnote 120 encompass a lot. A willful, confused, or uncertain judge could reach any conclusion in any case just by choosing the values they bring to bear. It would help if contextual integrity’s advocates could circumscribe the values that matter, or at least come up with some hierarchy of values. They might say, for example, that individual dignity matters most, except when the stakes for efficiency or security are very high. As with the first refinement, this would still leave huge indeterminacies (what does dignity mean?; when does an efficiency become significant?), but it would narrow the range of possibilities that a conscientious judge must countenance (because maybe other important values like equality and democracy are best protected through regimes outside of privacy law).Footnote 121
Finally, contextual integrity might moderate its unwavering commitment to social context. “Whereas other accounts offer interpretations of privacy in terms of universal prescriptions, contextual integrity couches its prescriptions always within the bounds of a given context.”Footnote 122 But perhaps some universal prescriptions, or rather proscriptions, are not such a bad idea. Perhaps there are some data practices (e.g., deploying facial recognition systems in public spaces)Footnote 123 that, no matter how inured or complacent society becomes,Footnote 124 should be deemed beyond the pale. As to these practices, such a refinement would remove all indeterminacy. Federal regulators already seem to be tending in this direction.Footnote 125 Integrating some similarly universal and uncompromising basic information norms might assuage the most worrying arguments against contextual integrity by backstopping just how far privacy-corrosive evolution of contextual norms could go.
While any of these refinements would help, one might wonder whether the resulting view would still be recognizable as contextual integrity. The first refinement might be seen as removing contextual integrity’s core concern—social context—and replacing it with something meaningfully different—one party’s perception of social context. The second refinement risks converting contextual integrity’s evaluative angle—integrity to context—into some single moral or political consideration. And the third refinement would require contextual integrity to abandon some of its prized mercurial relativism. Only contextual integrity’s advocates can say whether the view would survive such reforms. It may also be that we all need to move beyond integrity to context if we aim to prevent privacy’s demise.
Acknowledgements
For helpful discussions and comments on earlier drafts, I am grateful to Biagio Andò, Ignacio Cofone, Andrew Jordan, Kirstin Martin, Rishab Nithyanand, participants at the Privacy Law Scholar’s Conference in 2024, and two insightful anonymous reviewers.
Mihailis E. Diamantis (mihailis-diamantis@uiowa.edu) is the Ben V. Willie Professor in Excellence at the University of Iowa College of Law, with courtesy appointments in the Department of Philosophy and the College of Business. He co-edits the Technology Section of the Journal of Business Ethics. He holds a JD from Yale Law School and a PhD in Philosophy from New York University.