Communcation Privacy Management theory explains how people make choices about their private information through communication with others (Petronio, 2002, 2007, 2013).
CPM is a well-used theory grounded in real-world evidence. Despite how we talk about privacy sometimes, there are both benefits and risks to opening up our private information to others. Privacy management helps us balance the need to be open and receive benefits like support from others, while enjoying the autonomy that comes from keeping our private information to ourselves.
People believe they own their private information. This ownership is marked by a line, a metaphorical boundary between public and private. When the metaphorical boundary is very thin and permeable, people are more likely to disclose private information. When a boundary is thick, the line between public and private is impermeable, or thick and the information is heavily guarded. When people open up a privacy boundary, allowing others access to the private information, they give authorized co-ownership of that information to others (Petronio, 2013).
When a person tells another private information, they expect to keep total control over their private information. Therefore, when another individual gains access private information, they assume co-ownership of information, and thus, the responsibility to control the information. To manage risks of private information, people use rules to regulate the flow of private information (Petronio, 2013).
Human communication is flawed, and these communication processes do not always unfold perfectly. At times, confidants may break rules about the management of private information. When these violations occur, boundary turbulence arises. This turbulence has the potential to disrupt relationships and guide future decisions about to whom to open a privacy boundary.
CPM processes can be witnessed in contexts including computer-mediated communication, health, family, organizations, and in interpersonal and intercultural relationships. To learn more about how CPM is studied in these contexts, visit the CPM Center Practice page.
Recalibration occurs when there is privacy turbulence. People change the privacy rules to deal with the breakdown, realigning their privacy management system.