Privacy exchanges: restoring consent in privacy self-management

This article reviews the qualitative changes that big data technology introduced to society, particularly changes that affect how individuals control the access, use and retention of their personal data. In particular interest is whether the practice of privacy self-management in this new context could still ensure the informed consent of individuals to the privacy terms of big data companies. It is concluded that that accepting big data companies’ privacy policies falls short of the disclosure and understanding requirements for informed consent. The article argues that the practice of privacy self-management could remain viable if the review, understanding and acceptance of privacy agreements is streamlined, standardized and automated. Technology should be employed to counter the privacy problems created by big data technology. The creation of the privacy exchange authorities (PEA) is proposed as a solution to the failures of privacy self-management. The PEA are intermediaries that empower individuals to define their own privacy terms and express informed consent in their dealings with data companies. They will create the technological infrastructure for individuals to select their own privacy terms from a list of standard choices, potentially only once. The PEA will further mediate the delivery and authentication of the individual users’ privacy terms to data companies. A logical proof of concept is offered, illustrating the potential steps involved in the creation of the PEA.

[1]  P. Howard Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up , 2015 .

[2]  J. Rubenfeld The Right of Privacy , 1989 .

[3]  Brad Shaw a message to our customers , 2012 .

[4]  Helen Nissenbaum,et al.  Big Data’s End Run around Anonymity and Consent , 2014, Book of Anonymity.

[5]  Daniel J. Solove,et al.  Introduction: Privacy Self-Management and the Consent Dilemma , 2013 .

[6]  Michael P. Thompson Some Tools for Teaching Leadership/Leadership Without Easy Answers Ronald A. Heifetz/Catalytic Leadership Jeffrey S. Luke/How to be a Star at Work: Nine Breakthrough Strategies You Need to Succeed Robert E. Kelly , 1998 .

[7]  Finn Brunton,et al.  Political and ethical perspectives on data obfuscation , 2013 .

[8]  Jennifer Seberry,et al.  Public Key Cryptography , 2000, Lecture Notes in Computer Science.

[9]  Alecsandra Irimie-Ana,et al.  Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World , 2018 .

[10]  S. Athar Principles of Biomedical Ethics , 2011, The Journal of IMA.

[11]  Viktor Mayer-Schnberger,et al.  Big Data: A Revolution That Will Transform How We Live, Work, and Think , 2013 .

[12]  Eric Gossett,et al.  Big Data: A Revolution That Will Transform How We Live, Work, and Think , 2015 .

[13]  Jeremy Ginsberg,et al.  Detecting influenza epidemics using search engine query data , 2009, Nature.

[14]  Katie Chamberlain Kritikos,et al.  Intellectual Privacy: Rethinking Civil Liberties in the Digital Age , 2015 .

[15]  Paul Ohm Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .

[16]  Woodrow Hartzog,et al.  Chain-Link Confidentiality , 2012 .

[17]  Kord Davis Ethics of Big Data: Balancing Risk and Innovation , 2012 .

[18]  Mireille Hildebrandt,et al.  Privacy, Due Process and the Computational Turn : The Philosophy of Law Meets the Philosophy of Technology , 2013 .

[19]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[20]  Faith Boninger,et al.  Learning to be Watched: Surveillance Culture at School , 2016 .

[21]  Ryan Calo Digital Market Manipulation , 2013 .