856 BOSTON UNIVERSITY LAW REVIEW [Vol. 102:793
that can turn into permanent scars. It produces psychological harm of a distinct
and distinctly harmful type—knowing that one is viewed as less than human, as
not worthy of respect.
The misuse of personal data can be particularly costly to women, sexual and
gender minorities, and non-White people given the prevalence of destructive
stereotypes and the disproportionate surveillance of women and marginalized
communities in their intimate lives.
For example, employers and health
insurance companies can access information that women share with period-
tracking apps (including their moodiness and cramps), which could result in
raised premiums and denied promotions.
Women and minorities are often
disproportionately targeted for vicious online harassment, which often involves
doxing—the sharing of their personal data, such as home address and location—
in order to expose them to physical danger.
Harassers post victims’ nude
photos and embarrassing information about their sex lives or sexual health,
causing them substantial emotional and reputational harm.
Although these
types of harm are separate categories in our typology, there is a distinct and
additional dimension that they add: the entrenchment of existing patterns of
inequality.
In cases involving cyber mobs that inundate victims with crude, threatening,
and abusive comments, plaintiffs have sought to protect themselves by bringing
privacy tort cases.
But litigation is complicated by the fact that the harm is
often caused by the totality of the privacy-invasive comments and posts, making
it hard to allocate the harm among the multitude of commenters.
The members
of the mob are often anonymous, and it is difficult and expensive to identify
them.
Even when the perpetrators are tracked down, suing them is often
impractical because they often are unable to pay enough monetary damages to
Citron, New Compact, supra note 388, at 1770. One of us (Citron) has explored the
integral connection between privacy violations and discrimination throughout her scholarship.
See generally, e.g., CITRON, THE FIGHT FOR PRIVACY, supra note 198; CITRON, HATE CRIMES,
supra note 155; Citron, Sexual Privacy, supra note 155 ; Danielle Keats Citron, Spying Inc.,
72 WASH. & LEE L. REV. 1243 (2015); Citron, Cyber Civil Rights, supra note 278. That work
has been inspired by and built on the pathbreaking insights of privacy scholar Anita Allen.
See generally, e.g., ANITA L. ALLEN, UNPOPULAR PRIVACY: WHAT MUST WE HIDE? (2011);
ANITA L. ALLEN, UNEASY ACCESS: PRIVACY FOR WOMEN IN A FREE SOCIETY (1988).
Drew Harwell, Is Your Pregnancy App Sharing Your Intimate Data with Your Boss?,
WASH. POST (Apr. 10, 2019), https://www.washingtonpost.com/technology/2019
/04/10/tracking-your-pregnancy-an-app-may-be-more-public-than-you-think/.
CITRON, HATE CRIMES, supra note 155, at 53 (providing details of invasions of privacy
and harassment).
Id. at 54; Citron, Sexual Privacy, supra note 155, at 1914-15 (discussing up-skirt photos
taken and shared without victim’s consent).
CITRON, HATE CRIMES, supra note 155, at 133; Citron, Sexual Privacy, supra note 155,
at 1933.
CITRON, HATE CRIMES, supra note 155, at 136-37.
See, e.g., Doe I v. Individuals, 561 F. Supp. 2d 249, 251 (D. Conn. 2018).