What is Privacy?
The right to control access to your personal information and to be free from unwanted observation or surveillance. Privacy is not about having something to hide—it's about autonomy, dignity, and the ability to choose what you share and with whom.
Also known as: Data privacy, Information privacy, Personal privacy
Privacy is foundational. It's the space between you and the world—the ability to think, communicate, and act without constant observation.
Why Privacy Matters
Autonomy
- Make decisions without surveillance influencing your choices
- Develop ideas without premature judgment
- Form relationships without external scrutiny
Security
- Limit attack surface—less data means less to steal
- Protect against identity theft, stalking, doxxing
- Separate contexts—work, health, finance don't need to overlap
Democracy
- Vote without fear of retaliation
- Organize and protest
- Hold power accountable
- Whistleblowing requires privacy to survive
Dignity
- Your body, your home, your communications are yours
- Not everything is for sale or for the algorithm
- Consent matters—you choose what to share
Privacy vs. Secrecy
- Privacy: Controlling your information—you decide what's shared
- Secrecy: Hiding something specific—implies something wrong
- "I have nothing to hide" conflates the two. Privacy isn't about hiding; it's about choosing.
Privacy in the Digital Age
- Data exhaust: Every click, search, purchase creates a record
- Surveillance capitalism: Your attention and data are the product
- Government access: Mass surveillance, data requests, backdoors
- Default privacy: Systems should protect by default, not require opt-in
Related Terms
Data Minimization
A privacy principle that organizations should collect only the minimum amount of personal data necessary for a specific purpose, and retain it only as long as needed. This reduces privacy risks by limiting exposure in case of breaches or misuse.
Encryption
The process of converting information into a code to prevent unauthorized access. Encryption transforms readable data (plaintext) into an unreadable format (ciphertext) using a cryptographic algorithm and key. Only those with the correct key can decrypt and read the original data.
Threat Model
A systematic analysis of what you're trying to protect, from whom, the consequences of failure, and what resources you can apply. Threat modeling helps prioritize security efforts by focusing on realistic threats rather than theoretical ones.
Have more questions?
Use our guided flow to get the right next privacy step for Privacy.
Open Guided Flow