Don't miss the special BONUS offer during our Beta-test period. The next 100 new Registered Users (from a unique IP address), to post at least five (5) piglix, will receive 1,000 extra sign-up points (eventually exchangeable for crypto-currency)!

* * * * *    Free Launch Promotions    * * * * *

  • $2,000 in free prizes! is giving away ten (10) Meccano Erector sets, retail at $200 each, that build a motorized Ferris Wheel (or one of 22 other models) ... see details

  • Free Ads! if you are a business with annual revenues of less than $1M - will place your ads free of charge for up to one year! ... read more


Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share common themes. When something is private to a person, it usually means that something is inherently special or sensitive to them. The domain of privacy partially overlaps security (confidentiality), which can include the concepts of appropriate use, as well as protection of information. Privacy may also take the form of bodily integrity.

The right not to be subjected to unsanctioned invasion of privacy by the government, corporations or individuals is part of many countries' privacy laws, and in some cases, constitutions. Almost all countries have laws which in some way limit privacy. An example of this would be law concerning taxation, which normally require the sharing of information about personal income or earnings. In some countries individual privacy may conflict with freedom of speech laws and some laws may require public disclosure of information which would be considered private in other countries and cultures.

Privacy may be voluntarily sacrificed, normally in exchange for perceived benefits and very often with specific dangers and losses, although this is a very strategic view of human relationships. Research shows that people are more willing to voluntarily sacrifice privacy if the data gatherer is seen to be transparent as to what information is gathered and how it is used. In the business world, a person may volunteer personal details (often for advertising purposes) in order to gamble on winning a prize. A person may also disclose personal information as part of being an executive for a publicly traded company in the USA pursuant to federal securities law. Personal information which is voluntarily shared but subsequently stolen or misused can lead to identity theft.

No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks.
Articles and interviews
  • Preventing intimate acts or hiding one's body from others for the purpose of modesty; apart from being dressed this can be achieved by walls, fences, privacy screens, cathedral glass, partitions between urinals, by being far away from others, on a bed by a bed sheet or a blanket, when changing clothes by a towel, etc.; to what extent these measures also prevent acts being heard varies
  • Video, of aptly named graphic, or intimate, acts, behaviors or body parts
  • Preventing searching of one's personal possessions
  • Preventing unauthorized access to one's home or vehicle
  • Medical privacy, the right to make fundamental medical decisions without governmental coercion or third-party review, most widely applied to questions of contraception
  • data aggregation, which is connecting many related but unconnected pieces of information
  • identification, which can mean breaking the de-identification of items of data by putting it through a de-anonymization process, thus making facts which were intended to not name particular people to become associated with those people
  • insecurity, such as lack of data security, which includes when an organization is supposed to be responsible for protecting data instead suffers a data breach which harms the people whose data it held
  • secondary use, which is when people agree to share their data for a certain purpose, but then the data is used in ways without the data donors’ informed consent
  • exclusion is the use of a person's data without any attempt to give the person an opportunity to manage the data or participate in its usage
  • Amitai Etzioni, 2000, The Limits of Privacy, New York: Basic Books.
  • Thomas Allmer, A Critical Contribution to Theoretical Foundations of Privacy Studies, "Journal of Information, Communication & Ethics in Society", Vol. 9, 2, pp. 83–101.
  • Ruth Gavison, "Privacy and the Limits of the Law," in Michael J. Gorr and Sterling Harwood, eds., Crime and Punishment: Philosophic Explorations (Belmont, CA: Wadsworth Publishing Co., 2000, formerly Jones and Bartlett Publishers, 1996), paperback, 552 pages, pp. 46–68.
  • Ulrike Hugl, "Approaching the value of Privacy: Review of theoretical privacy concepts and aspects of privacy management", Proceedings of the Sixteenth Americas Conference on Information Systems (AMCIS) 2010, paper no. 248.
  • Frederick S. Lane, American Privacy: The 400-Year History of Our Most Contested Right, (Boston, MA: Beacon Press, 2010).
  • Steve Lohr, "How Privacy Can Vanish Online, a Bit at a Time", The New York Times, Wednesday, March 17, 2010.
  • Andrew McStay, 2014, , New York Peter Lang.
  • Adam D. Moore, 2010, "Privacy Rights: Moral and Legal Foundations," Penn State University Press.
  • Yael Onn, et al. Privacy in the Digital Environment, Haifa Center of Law & Technology, (2005).
  • Bruce Schneier, Privacy in the Age of Persistence
  • Robert Ellis Smith, 2004, "Ben Franklin's Web Site, Privacy and Curiosity from Plymouth Rock to the Internet," Providence: Privacy Journal.
  • Daniel J. Solove, "'I've Got Nothing to Hide' and Other Misunderstandings of Privacy", San Diego Law Review, Vol. 44, 745–72.
  • Herman Tavani, "Informational Privacy: Concepts, Theories, and Controversies," in Kenneth Himma and Herman Tavani, eds., The Handbook of Information and Computer Ethics (Hoboken: Wiley, 2008), pp. 131–64.
  • Judith Jarvis Thomson, "The Right to Privacy," in Michael J. Gorr and Sterling Harwood, eds., Crime and Punishment: Philosophic Explorations (Belmont, CA: Wadsworth Publishing Co., 2000, formerly Jones and Bartlett Publishers, 1995), 552 pages, pp. 34–46.
  • Raymond Wacks, Privacy: A Very Short Introduction, Oxford: Oxford University Press, 2009.
  • Judith Wagner DeCew, 1997, In Pursuit of Privacy: Law, Ethics, and the Rise of Technology, Ithaca: Cornell University Press.
  • Rita Watson and Menahem Blondheim (eds.), The Toronto School of Communication Theory: Interpretations, Extensions and Applications (Toronto and Jerusalem: University of Toronto Press and Magnes Press, 2007)
  • A. Westin, 1967, Privacy and Freedom, New York: Atheneum.
  • of the , the host of


Don't forget! that as one of our early users, you are eligible to receive the 1,000 point bonus as soon as you have created five (5) acceptable piglix.