Webster's Revised Unabridged Dictionary (1913)
The state of being in retirement from the company or observation of others; seclusion.
See Privity, 2.
Concealment of what is said or done.
A private matter; a secret.
A place of seclusion from company or observation; retreat; solitude; retirement.
Webster's Revised Unabridged Dictionary (1913), edited by Noah Porter. About
hEnglish - advanced version
you can click anywhere, but just don't click here.
\pri"va*cy\ (?), n.; pl. privacies (#). [see private.]
1. the state of being in retirement from the company or observation of others; seclusion.
2. a place of seclusion from company or observation; retreat; solitude; retirement. her sacred privacies all open lie.
3. concealment of what is said or done.
4. a private matter; a secret.
5. see privity, 2. [obs.]
privacy enhanced mail
right of privacy
riordan`s internet privacy enhanced mail
right to privacy
invasion of privacy
pretty good privacy
To dream that your privacy suffers intrusion, foretells you will have overbearing people to worry you. For a woman, this dream warns her to look carefully after private affairs. If she intrudes on the privacy of her husband or lover, she will disabuse some one's confidence, if not careful of her conversation.
Ten Thousand Dreams Interpreted, or "What's in a dream": a scientific and practical exposition; By Gustavus Hindman, 1910. For the open domain e-text see: Guttenberg Project
I dream of wayward gulls and all landless lovers, rare moments of winter sun, peace, privacy, for everyone.
Telecommunication Standard Terms
1. In a communications system or network, the protection given to information to conceal it from persons having access to the system or network. Synonym segregation. 2. In a communications system, protection given to unclassified information, such as radio transmissions of law enforcement personnel, that requires safeguarding from unauthorized persons. 3. In a communications system, the protection given to prevent unauthorized disclosure of the information in the system. (188 ) Note 1: The required protection may be accomplished by various means, such as by communications security measures and by directives to operating personnel. Note 2: The limited protection given certain voice and data transmissions by commercial crypto-equipment is sufficient to deter a casual listener, but cannot withstand a competent cryptanalytic attack.