Communication Privacy Management Theory

| T. Franklin Murphy

Communication Privacy Management Theory illustration showing privacy boundaries and disclosure in relationships

Our worlds are filled with others. While we occupy center stage in the theater of our own minds, we are only one actor in a much larger social drama. We connect through words, silence, gestures, glances, posts, omissions, and carefully chosen disclosures. Yet what we reveal is only a small portion of the thoughts, feelings, memories, wounds, ambitions, and fears that live inside us.

Somehow, we must decide what parts of our private world we will share and what parts we will protect. We cannot share everything, and we cannot keep everything hidden. Communication Privacy Management Theory explores this complex process of revealing and concealing.

Mahzarin R. Banaji and Anthony G. Greenwald wrote that โ€œhonesty may be an overrated virtue.โ€ They explain that if we reported every personal flaw to our friendsโ€”and applied the same relentless honesty to their shortcomingsโ€”we might soon find ourselves without friends. Daily social life requires โ€œa certain amount of untruthfulness,โ€ they suggest, to keep the gears of interaction moving smoothly (Banaji & Greenwald, 2016, pp. 28โ€“29).

The point is not that deception is ideal. Rather, human beings must manage private information in ways that allow relationships to survive. Every relationship requires a different balance of honesty, tact, vulnerability, discretion, and protection. Sandra Petronioโ€™s Communication Privacy Management Theory helps explain how we make these decisions, how we negotiate privacy with others, and why relationships become strained when private information is mishandled.

Key Definition:

Communication Privacy Management (CPM) Theory, developed by Sandra Petronio, explains how people manage, disclose, conceal, and coordinate private information within relationships. The theory proposes that individuals see themselves as owners of their private information and create privacy rules to regulate access. These rules are shaped by culture, gender, motivation, context, and risk-benefit assessments.

Table of Contents:


Introduction: Managing Private Information

In an increasingly overconnected world, sharing information is often as easy as tapping a screen. Yet the ease of disclosure does not eliminate the emotional, relational, and ethical complexity of sharing. We still must decide who deserves access to our personal lives, what they may do with that information, and how much vulnerability we are willing to tolerate.

Have you ever wondered why you reveal certain details to one person but carefully hide them from another? Why a family secret feels sacred in one context but burdensome in another? Why a harmless social media post can suddenly create conflict? Communication Privacy Management Theory provides a framework for understanding these everyday dilemmas (Petronio, 2002; Smith & Brunner, 2017).

CPM extends our understanding of privacy beyond simple self-disclosure. It does not treat privacy as a rigid wall or disclosure as a simple act of openness. Instead, it views privacy as a dynamic boundary system. We continuously open and close these boundaries depending on the relationship, situation, perceived risks, and expected benefits.

At its core, CPM emphasizes three important insights. First, people believe they own their private information. Second, they believe they have a right to control access to that information. Third, once information is shared, it often becomes co-owned, creating new responsibilities for everyone who now knows it (Petronio, 2002, 2010).

The Disclosure Dilemma

Disclosing personal information is one of the central ways people build relationships. Yet disclosure is never purely positive or purely negative. It is a calculated actโ€”sometimes conscious, sometimes intuitiveโ€”that involves vulnerability, hope, and risk.

Sharing private information can build trust, intimacy, emotional relief, validation, and mutual understanding. In close relationships, disclosure often communicates, โ€œI trust you with this part of me.โ€ In workplaces, it can build camaraderie, explain behavior, or help employees gain support (Smith & Brunner, 2017). In health contexts, disclosure may help individuals receive care, treatment, or emotional assistance.

However, self-disclosure also carries danger. Once private information is revealed, the owner becomes vulnerable. The information may be repeated, misinterpreted, weaponized, mocked, taken out of context, or shared with unintended audiences. Some people carefully guard private information. Others become โ€œLeaky Lucyโ€ types who pass along information without filtering the consequences (Katherine, 2013, p. 7).

Online disclosure intensifies these risks. Digital information can be copied, stored, searched, screenshot, forwarded, and resurfaced years later. Information that feels intimate in the moment may become public, permanent, and detached from its original context. When privacy expectations are violated, CPM refers to the disruption as boundary turbulence (Petronio, 2002).

Key Takeaways:

  • People believe they own their private information.
  • Disclosure creates vulnerability because private information moves into another personโ€™s hands.
  • Once information is shared, it often becomes co-owned.
  • Relationships require privacy rules to determine who may know, share, or protect private information.
  • Boundary turbulence occurs when these rules are unclear, violated, or misunderstood.

Core Principles of Communication Privacy Management Theory

According to Petronio (2002), Communication Privacy Management Theory rests on several foundational principles. These principles explain how private information is owned, controlled, shared, coordinated, and disrupted.

Private Information Ownership

At the heart of CPM is the idea that people perceive themselves as owners of their private information (Petronio, 2010). This information may include emotions, thoughts, memories, secrets, health concerns, finances, relationship problems, family history, trauma, goals, failures, desires, and identity-related experiences.

Because people feel they own this information, they usually believe they have the right to decide who may access it. A person may share grief with a close friend but conceal it from coworkers. A patient may reveal a diagnosis to a spouse while delaying disclosure to extended family.

Ownership becomes more complicated when information belongs to more than one person. A family secret, a coupleโ€™s infertility struggle, a workplace complaint, or a shared trauma may be collectively owned. In these cases, one personโ€™s decision to disclose may affect others who also feel ownership over the information.

Privacy Boundaries and Rules

CPM uses the metaphor of boundaries to explain how people regulate access to private information. These boundaries are invisible lines separating what is private from what is public.

Some boundaries are thick, restricting access and keeping information closely guarded. Others are thin, allowing more people to know and discuss the information. Boundaries also shift over time. A person may initially keep a divorce private, later tell close friends, and eventually discuss it openly.

Privacy boundaries are regulated by privacy rules. These rules guide when, how, why, and with whom private information may be shared. Some rules are explicit: โ€œPlease donโ€™t tell anyone.โ€ Others are implicit, based on relational expectations, cultural norms, or common sense.

Petronio identified several criteria that influence privacy rule development: culture, gender, motivation, context, and risk-benefit ratio (Petronio, 2002; Child & Petronio, 2011). Culture influences what is considered private or appropriate to discuss. Gender expectations may shape who is encouraged to disclose emotions or conceal vulnerability. Motivation matters because people disclose for different reasons, including support, intimacy, persuasion, protection, or impression management. Context also matters. What is appropriate in therapy may not be appropriate at work.

How Privacy Rules Are Formed

Privacy rules do not appear randomly. CPM theory proposes that people develop privacy rules based on several recurring criteria: culture, gender, motivation, context, and risk-benefit calculations. A personโ€™s cultural background may shape whether family conflict is discussed openly or kept private. Gender norms may influence whether emotional vulnerability is encouraged or discouraged. Motivation also matters. Motivation matters because people disclose for different reasons, including support, intimacy, persuasion, protection, or impression management.

We disclose for support, intimacy, relief, explanation, protection, or influence. Finally, people weigh the potential benefits of disclosure against possible costs, such as embarrassment, rejection, gossip, or loss of control (Petronio, 2002; Child & Petronio, 2011).

These rules may be explicit, as when someone says, โ€œPlease donโ€™t tell anyone.โ€ More often, they are implicit. We assume others understand what is private, only to discover later that our assumptions were not shared.

Co-Ownership of Private Information

One of CPMโ€™s most important contributions is the concept of co-ownership. When private information is disclosed, the recipient does not merely hear it. The recipient becomes a co-owner, confidant, shareholder, or guardian of that information (Petronio, 2010).

This shift creates responsibility. If I tell you something deeply private, I may still feel that the information belongs to me. However, you now possess it. Ideally, the original owner and the co-owner coordinate rules for managing that information.

In close relationships, this co-ownership can strengthen trust. A friend who protects a confidence demonstrates care and loyalty. A spouse who handles private information sensitively reinforces emotional safety. However, co-ownership can also become a source of strain. People may disagree about who else has a right to know or how carefully the information should be protected.

When information is collectively owned, co-owners must coordinate privacy rules. CPM describes three important features of this coordination: permeability, ownership, and linkage. Permeability refers to how open or closed the boundary is. Ownership refers to who has rights and responsibilities over the information. Linkage refers to who else is connected to the privacy boundary.

Boundary Turbulence in Relationships

Boundary turbulence occurs when privacy management breaks down. This may happen through accidental disclosure, betrayal, misunderstanding, gossip, digital sharing, vague rules, or competing assumptions about who has a right to know (Petronio, 2002). Boundary turbulence often requires difficult conversations about ownership, trust, and consent.

For example, a woman may tell her sister about a medical diagnosis but ask her not to tell their parents yet. The diagnosis now has a collective privacy boundary. The sister has become a co-owner of the information. If she tells the parents because she believes they โ€œhave a right to know,โ€ boundary turbulence occurs. The conflict is not merely about the diagnosis. It is about ownership, control, trust, and competing privacy rules.

Boundary turbulence exposes unmet expectations. It often requires renegotiation: Who owns this information? Who may know it? What should be removed, clarified, repaired, or protected in the future?

Privacy Management Is Dialectical

CPM views privacy and disclosure as opposing but coexisting forces. We are always balancing the pressure to reveal information with the need to protect it. The goal is not complete secrecy or total openness. The goal is competent coordination.

This dialectical tension mirrors a core human struggle: the desire for autonomy and the desire for belonging. We want to be known, but not exposed. We want connection, but not engulfment. We want honesty, but not reckless transparency.

Applications of Communication Privacy Management Theory

Communication Privacy Management Theory has been applied across many relational and social contexts, including families, workplaces, healthcare, online communication, and digital privacy.

Interpersonal Relationships

In close relationships, CPM helps explain the tension between intimacy and privacy. Intimacy often grows through self-disclosure, but disclosure alone does not create intimacy. What matters is how disclosure is received, protected, reciprocated, and integrated into the relationship.

Too little disclosure may create distance. Too much disclosure, especially too soon or in the wrong context, may overwhelm a relationship. Disclosure that is mishandled may reduce trust. CPM suggests that healthy relationships require not only openness but skillful privacy coordination.

John H. Harvey and Ann L. Weber explain that people get to know one another through self-disclosures that increase in depth over time and tend to be reciprocated by oneโ€™s partner (Harvey & Weber, 2001). CPM adds that these disclosures also require privacy rules. A relationship deepens not only through what is shared but through how carefully shared information is protected.

Social Media and Online Interactions

Social media platforms provide fertile ground for CPM. A post may begin as a casual disclosure to friends but quickly move beyond its intended audience. A private message may be screenshotted. A joke may be interpreted outside its relational context. A photo may reveal information about people who never consented to the disclosure. CPM has also been applied to location disclosure on social networking sites, where users weigh the benefits of connection and convenience against risks to privacy and control (Chen et al., 2020).

Digital spaces blur boundaries between friends, family, coworkers, acquaintances, strangers, and institutions. The same post may be seen by a childhood friend, supervisor, future employer, romantic partner, and distant relative.

Recent CPM research continues to show its usefulness in digital contexts, including social media, family communication, and online privacy practices (Petronio & Child, 2020). The theory remains especially relevant because modern disclosure is not only interpersonal. It is technological, searchable, replicable, and often permanent.

Sharenting and Childrenโ€™s Privacy

One modern application of CPM is โ€œsharenting,โ€ or parents sharing information, photos, and stories about their children online. Parents may post out of pride, connection, humor, documentation, or a desire for support. Yet children may later experience these disclosures as embarrassing, intrusive, or violating.

From a CPM perspective, sharenting raises questions of ownership and consent. Does a childโ€™s image belong to the parent, the child, or the family? Who has the right to decide whether a story is posted? At what age should children be asked for consent?

Research on mindful sharenting suggests that some parents try to balance the benefits of sharing with the need to protect childrenโ€™s privacy. They may avoid showing the childโ€™s face, limit identifying details, use private groups, or ask others not to repost images (Walrave et al., 2023). Other studies using CPM have found that adolescents often have their own privacy concerns about parental sharing, making negotiation between parents and children increasingly important (Walrave et al., 2022).

Privacy Across the Lifespan

Privacy management changes across development. Children gradually learn what information is considered private, while adolescents often seek greater control over personal disclosures as part of identity development. Adults negotiate privacy in friendships, romantic relationships, workplaces, and families. Later in life, privacy issues may emerge around health, caregiving, finances, and autonomy. CPM theory is useful because privacy is not a fixed skill mastered once; it is renegotiated throughout the lifespan as relationships, responsibilities, and vulnerabilities change (Petronio, 2010; Walrave et al., 2022).

Family Dynamics

CPM is particularly useful for understanding family privacy. Families manage sensitive topics such as sexuality, adoption, infertility, divorce, addiction, mental illness, finances, trauma, health conditions, and family conflict. These topics often involve collective ownership because one personโ€™s private information may also affect others in the family system.

Families create implicit and explicit rules about what may be discussed inside the family and what may be shared with outsiders. Some families operate with thick boundaries, keeping problems hidden from others. Other families have more permeable boundaries, allowing open discussion with extended kin, friends, or professionals.

Boundary turbulence can occur when one family member violates the groupโ€™s privacy rules. A parent may reveal a childโ€™s struggle to relatives. A sibling may discuss family conflict on social media. An adult child may write publicly about childhood experiences that parents believe should remain private.

Organizational Communication

Employees constantly make decisions about what to reveal and conceal at work. They may manage information about health, family responsibilities, political beliefs, mental health, job dissatisfaction, salary, career goals, or conflict with coworkers.

Organizational culture shapes disclosure. In some workplaces, personal disclosure builds connection and trust. In others, it may expose employees to judgment, stigma, or professional risk. Supervisors also become co-owners of sensitive information when employees disclose personal needs, accommodations, or conflicts.

Smith and Brunner (2017) applied CPM to workplace disclosure, showing how employees weigh whether to reveal or conceal private information. Disclosure may lead to support and understanding, but it may also change how others perceive competence, reliability, or professionalism.

Health Communication

Health communication is another important CPM context. Medical information often carries high emotional, relational, and practical stakes. Individuals must decide who should know about diagnoses, treatments, genetic risks, disabilities, mental health concerns, reproductive health, or end-of-life decisions.

CPM has been applied to medical mistakes, HIV disclosure, family health communication, patient-provider relationships, and online health support groups (Moor & Petronio, 2007; Petronio, 2010; Sanders & Amason, 2011). Health information often becomes collectively owned because it affects spouses, children, caregivers, healthcare providers, and sometimes extended family members.

CPM also has clinical relevance. In therapy, support groups, and intimate relationships, people often test whether private information can be safely disclosed. Emotional safety develops when disclosures are received without ridicule, coercion, or betrayal. Repeated boundary violations, by contrast, may lead people to become guarded, withdrawn, or reluctant to seek support.

For example, genetic testing may reveal information not only about the person tested but also about biological relatives. A diagnosis may create a need for support while also raising fears of stigma. CPM helps illuminate these tensions between autonomy, vulnerability, care, responsibility, and trust.

Challenges and Criticisms of CPM Theory

Despite its utility, Communication Privacy Management Theory has limitations. Privacy rules differ widely across cultures, relationships, institutions, and historical periods, making broad generalization difficult (Petronio, 2002). What counts as private in one family, workplace, or cultural setting may be openly discussed in another.

The theoryโ€™s emphasis on individual and relational agency may also understate the influence of power. Not everyone has equal ability to control private information. Children, employees, patients, marginalized groups, incarcerated individuals, and people dependent on institutions may have limited control over how their information is gathered, interpreted, stored, or shared.

Modern privacy also extends beyond interpersonal disclosure. Digital platforms, surveillance systems, employers, governments, advertisers, data brokers, and artificial intelligence systems complicate the meaning of privacy. Blatterer and colleagues (2010) argue that modern privacy must be understood within broader social, cultural, economic, and technological transformations.

CPM remains valuable, but it works best when integrated with awareness of power, technology, law, culture, and institutional control. The question is no longer only โ€œWhat should I tell you?โ€ It is also โ€œWho is collecting this information, where will it go, how long will it remain, and who may use it later?โ€


Associated Concepts

  • Linear Model of Communication: A one-way model of communication in which a sender transmits a message to a receiver. This model is useful but limited because it does not fully account for feedback, relational context, or negotiated meaning.
  • Social Penetration Theory: A theory developed by Altman and Taylor describing relationship development as a gradual process of increasing self-disclosure. CPM complements this theory by emphasizing privacy boundaries and co-ownership.
  • Social Exchange Theory: A theory suggesting that individuals evaluate relationships through perceived costs and benefits. CPM similarly recognizes risk-benefit calculations in disclosure decisions.
  • Communicate Bond, Belong Theory: A theory explaining how communication helps satisfy the human need to belong. CPM adds that belonging must be balanced with privacy and autonomy.
  • Self-Presentation Theory: The study of how people manage the impressions others form of them. Self-presentation influences what people choose to reveal or conceal.
  • Impression Management: The process of shaping how others perceive us. Privacy management often serves impression management goals.
  • Relational Dialectics Theory: A theory emphasizing opposing tensions in relationships, such as autonomy and connection. CPM shares this dialectical understanding of privacy and openness.
  • Boundaries: Psychological, relational, and communicative limits that regulate access to personal information, emotional space, and social roles.

A Few Words by Psychology Fanatic

Communication Privacy Management Theory reminds us that human connection requires both openness and restraint. We do not build intimacy by broadcasting every thought, nor do we protect ourselves by sealing every door. Healthy relating depends on a more delicate skill: knowing when to open the boundary, when to close it, and how to honor the trust created when another person lets us in.

Every disclosure is an invitation. It says, โ€œHere is something private. Please hold it carefully.โ€ When we receive another personโ€™s private information, we become more than listeners. We become guardians. Our response can strengthen the relationship or create turbulence that may take years to repair.

In our overconnected world, this task has grown more complicated. A secret once whispered in a kitchen could fade with memory. A disclosure posted online may travel, multiply, and remain searchable. Families, friends, coworkers, and partners must now negotiate privacy not only with each other but with platforms, audiences, archives, and algorithms.

Petronioโ€™s theory offers a practical wisdom beneath its academic structure. We need connection, but we also need boundaries. We need honesty, but we also need discretion. We need to be known, but we also need the dignity of choosing when, how, and with whom we share the private contents of our lives.

The art of communication is not merely saying what is true. It is managing truth with care.

Last Update: May 8, 2026

Discover more from Psychology Fanatic

Subscribe now to keep reading and get access to the full archive.

Continue reading