Fiveable

✍️Writing for Communication Unit 11 Review

QR code for Writing for Communication practice questions

11.2 Privacy and confidentiality

11.2 Privacy and confidentiality

Written by the Fiveable Content Team • Last updated August 2025
Written by the Fiveable Content Team • Last updated August 2025
✍️Writing for Communication
Unit & Topic Study Guides

Defining Privacy and Confidentiality

Privacy and confidentiality both deal with protecting personal information, but they work in different ways. Getting clear on the distinction matters because mixing them up can lead to real ethical and legal mistakes in professional communication.

Privacy vs. Confidentiality

Privacy is your right to control access to your own personal information and to be free from unwanted intrusion. It belongs to the individual.

Confidentiality is a duty or obligation to protect information someone else has shared with you in a relationship of trust. It belongs to the person receiving the information.

Here's a simple way to remember the difference: privacy is about your right to keep things private, while confidentiality is about your responsibility to keep someone else's information private. A doctor-patient relationship illustrates both: the patient has a right to privacy over their medical history, and the doctor has a duty of confidentiality not to share it.

Many countries have laws protecting privacy rights. In the United States, the Fourth Amendment guards against unreasonable government searches and seizures. In the European Union, the General Data Protection Regulation (GDPR) regulates how organizations collect, use, and disclose personal data.

Privacy laws typically govern both government agencies and private organizations. When those laws are violated, remedies can include civil lawsuits, criminal penalties, or enforcement actions by regulatory bodies.

Ethical Considerations for Privacy

Even where no law requires it, respecting privacy is a fundamental ethical principle rooted in recognizing people's dignity and autonomy. Professionals in communication, healthcare, law, and research all carry an ethical obligation to protect the privacy of the people they work with.

That said, privacy sometimes conflicts with other values. A journalist might weigh an individual's privacy against the public's need to know. A researcher might weigh a subject's privacy against the pursuit of important knowledge. These dilemmas don't have easy answers, and they require careful, case-by-case judgment.

Privacy in Digital Communications

Digital technology has made privacy both harder to maintain and more important to think about. Every message, search, and account you create generates data that could be accessed, intercepted, or misused.

Securing Digital Information

A few practical steps go a long way toward protecting digital privacy:

  • Use strong, unique passwords for each account and enable two-factor authentication wherever possible.
  • Keep software updated, since updates often patch security vulnerabilities.
  • Use secure communication channels like encrypted messaging apps (Signal, for example) or virtual private networks (VPNs) when transmitting sensitive information.
  • Back up important data regularly and store it securely to prevent loss or theft.

Encryption Techniques for Privacy

Encryption encodes information so that only someone with the correct decryption key can read it.

  • End-to-end encryption means only the sender and intended recipient can read a message. Even the platform carrying the message can't access its contents. Apps like Signal and WhatsApp use this by default.
  • Homomorphic encryption is a more advanced technique that allows computations to be performed on encrypted data without ever decrypting it. This is mainly relevant in data analysis contexts where privacy must be preserved.

For a communication course, the key takeaway is this: if you're handling sensitive information digitally, encrypted channels are not optional.

Privacy Policies of Digital Platforms

Privacy policies are legal documents describing how a platform collects, uses, and shares your personal information. They matter because they tell you what you're agreeing to when you use a service.

  • Read them before signing up, especially the sections on data sharing with third parties.
  • Check back periodically, since companies can update their policies at any time.
  • Pay attention to what data the platform collects beyond what you actively post (location data, browsing behavior, contact lists).

Confidentiality in Professional Settings

Confidentiality is a core ethical obligation across many professions. Breaking it can result in loss of trust, legal liability, disciplinary action, and lasting reputational damage.

Doctor-Patient Confidentiality

Doctors are legally and ethically required to keep patients' medical information private. This obligation exists because patients need to feel safe sharing sensitive details in order to receive proper care.

There are narrow exceptions: a doctor may break confidentiality when a patient poses an imminent threat of harm to themselves or others, or during certain public health emergencies. Outside those exceptions, doctors must use secure communication methods and properly dispose of medical records.

Attorney-Client Privilege

Attorney-client privilege is a legal doctrine protecting the confidentiality of communications between lawyers and their clients. Its purpose is to allow clients to speak openly and honestly so their lawyers can provide effective representation.

This privilege means those communications generally cannot be used as evidence in court. Attorneys must safeguard client information through secure channels and proper document handling, just as doctors must with medical records.

Privacy vs confidentiality, Data confidentiality principles and methods report - data.govt.nz

Confidentiality in Business Dealings

Businesses frequently handle sensitive information: trade secrets, financial data, personal client details. Protecting this information is both an ethical duty and often a legal one.

Non-disclosure agreements (NDAs) are the most common tool for establishing confidentiality obligations in business relationships. They create a binding legal commitment to keep specified information private. Breaching an NDA can lead to lawsuits, financial penalties, and the collapse of business relationships.

Protecting Sources and Whistleblowers

Journalists and whistleblowers serve a vital function in democratic societies by exposing wrongdoing and holding institutions accountable. That function depends on people feeling safe enough to come forward with information.

Shield Laws for Journalists

Shield laws allow journalists to refuse to reveal their confidential sources in court or to government authorities. These laws vary significantly by jurisdiction:

  • Some provide near-absolute protection for source identity.
  • Others include exceptions for cases involving national security or imminent harm.

Without shield laws, sources may stay silent out of fear, and the public loses access to important information.

Whistleblower Protection Legislation

Whistleblower protection laws shield employees who report illegal or unethical conduct within their organizations from retaliation (firing, demotion, harassment). The strength of these protections varies widely. In the U.S., laws like the Whistleblower Protection Act cover federal employees, while other statutes cover specific industries like finance or healthcare.

Whistleblowers may also find protection under anti-discrimination or labor laws, depending on the circumstances.

Anonymity vs. Confidentiality for Sources

These two terms describe different levels of protection:

  • Anonymity means the source's identity is unknown to everyone, including the journalist. This offers the strongest protection but makes it harder for the journalist to verify the information.
  • Confidentiality means the journalist knows the source's identity but promises not to reveal it. This allows the journalist to assess credibility and build trust, but it carries the risk that the identity could be exposed, whether intentionally or by accident.

Journalists must be clear with sources about which type of protection they're offering and realistic about the limits of that protection.

Privacy and Public Figures

Public figures, including politicians, celebrities, and business leaders, generally have a reduced expectation of privacy compared to private individuals. But "reduced" does not mean "none."

Reasonable Expectation of Privacy

The reasonable expectation of privacy refers to how much privacy a person can expect given their situation. A politician's voting record is fair game; photos taken through their bedroom window are not.

Public figures have less privacy protection regarding matters connected to their public roles. But they retain protection over highly personal or intimate matters that have no bearing on the public interest.

Newsworthiness of Private Information

Newsworthiness is the degree to which information is relevant and of legitimate public interest. Private information about a public figure may be newsworthy if it:

  • Relates to their public duties or qualifications
  • Reveals misconduct or hypocrisy relevant to their public role
  • Exposes matters of genuine public concern

Publishing private details that don't meet these criteria can constitute an invasion of privacy, even when the subject is a public figure.

Balancing Privacy and Public Interest

This balancing act is subjective and context-dependent. Factors to weigh include:

  • How sensitive the information is
  • How relevant it is to the person's public role
  • What potential harm or benefit disclosure would bring

Journalists and media organizations bear the responsibility of making these calls carefully. The fact that something is interesting to the public doesn't automatically make it in the public interest.

Government Surveillance and Privacy

Government surveillance programs, whether run by intelligence agencies or law enforcement, raise some of the most significant privacy questions in modern communication.

Privacy vs confidentiality, Privacy Best Practices for Consumer Genetic Testing Services

Legality of Surveillance Programs

The legality of surveillance depends on each jurisdiction's laws and constitutional framework. In the U.S., key legal constraints include:

  • The Fourth Amendment, which prohibits unreasonable searches and seizures
  • The Foreign Intelligence Surveillance Act (FISA), which governs intelligence-related surveillance

The scope of these protections is frequently debated and litigated. Some programs, like those revealed by Edward Snowden in 2013, have been criticized as overreaching or unconstitutional.

Privacy Implications of Surveillance

Mass surveillance programs collect, store, and analyze enormous amounts of personal data and communications. Beyond the direct privacy intrusion, surveillance can produce a chilling effect: people may self-censor or avoid certain associations because they fear being monitored.

Technologies like facial recognition and location tracking amplify these concerns by making it possible to track individuals' movements and activities at scale.

Oversight of Government Surveillance

Effective oversight is essential to keep surveillance programs within legal and ethical bounds. Common oversight mechanisms include:

  • Judicial review (courts approving or rejecting surveillance requests)
  • Legislative oversight (congressional committees reviewing program activities)
  • Independent oversight bodies like privacy commissioners or inspectors general

Transparency and public reporting also promote accountability, though legitimate national security concerns may limit how much can be disclosed.

Privacy and Social Media

Social media platforms create unique privacy challenges because they encourage sharing while simultaneously collecting vast amounts of user data.

Privacy Settings on Social Platforms

Most platforms offer privacy settings that let you control who sees your content. These typically include options to:

  • Limit post visibility to friends or custom lists
  • Opt out of certain data collection or sharing practices
  • Control who can tag you, message you, or find your profile

These settings can be complex and change frequently. Review them regularly to make sure you're sharing only what you intend to share.

Risks of Oversharing Personal Information

Information posted on social media can reach far beyond your intended audience. Employers, advertisers, government agencies, and bad actors can all potentially access it. Once shared, it's often difficult or impossible to fully remove.

Specific risks include:

  • Identity theft from sharing personal details like birthdays, locations, or daily routines
  • Reputational damage from posts taken out of context or resurfaced years later
  • Harassment or bullying from exposing personal details to a wide audience

Social Media Data Mining and Privacy

Social media companies collect far more data than what you actively post. They track your interests, behaviors, social connections, browsing habits, and sometimes your location.

This data fuels targeted advertising, product development, and research. It may also be shared with third parties. The GDPR in the European Union has set a global benchmark for regulating these practices, requiring companies to be transparent about data collection and to give users meaningful control over their information.

The core issue for communicators: understand that anything you do on a social platform generates data, and that data has value to the company running it.

Confidentiality in Research and Academia

Research depends on trust. Participants share personal information with the expectation that it will be protected. When that trust is broken, it harms not just the individuals involved but the credibility of research as a whole.

Confidentiality of Research Subjects

Researchers have an ethical obligation to protect the identities and personal information of their subjects. Common safeguards include:

  • Anonymization: removing identifying details from data sets
  • Pseudonyms: using fake names in publications
  • Informed consent: clearly explaining to participants how their confidentiality will be protected and any limits to that protection (such as mandatory reporting laws or court orders)

Protecting Sensitive Research Data

Sensitive data like health records, personal information, or proprietary business data requires specific protections:

  1. Store data using secure, access-controlled systems.
  2. Restrict access to only those who need it for the research.
  3. Use secure methods for transmitting data between researchers or institutions.
  4. Properly dispose of data when it's no longer needed.

Researchers must also comply with applicable laws and institutional requirements, such as HIPAA (the Health Insurance Portability and Accountability Act) in the United States, which governs the handling of health information.

Academic Integrity and Confidentiality

Academic integrity rests on honesty, trust, fairness, respect, and responsibility. Confidentiality is woven into all of these values. Sharing a student's grades without permission, using confidential peer-review information, or publishing research data without authorization all constitute breaches.

The consequences can be severe: disciplinary action, legal liability, and lasting damage to professional reputation. Maintaining confidentiality in academic settings requires clear institutional policies, ongoing training, and a culture where these obligations are taken seriously.

2,589 studying →