Data Is the New Currency

Data is growing. We are all aware of this in the IT industry, it is a common mantra. The elephant in the room is the ownership of that data and the use of that data. As with many new technologies, its legal and personal implications are not well understood until the technology has matured. Data ownership has by default resided with organisations that hold the data; utility companies, websites, retailers and data aggregators and brokers. If data could be owned by the people it identifies, the data handlers would have to pay to use that data for sales and marketing purposes. We are not suggesting payment would be the mostly illusory free services and hidden discounts that are the current answer but real money or an asset that can be bartered or purchased. If even the poorest people can gain an income this would revolutionise personal finance for those who register on the web either for purchases or to make their name available for use. We propose such a revolution in data ownership and urge all data generators to establish their rights to a business asset that they frequently gift to already wealthy organisations. Don't be a mere generator of data, become a personal data aggregator, collecting and controlling all your data. Time to man the barricades against entities who are using your data for their profit and pleasure, not yours.

[1]  Karl D. Belgum Who Leads at Halftime?: Three Conflicting Visions of Internet Privacy Policy , 1999 .

[2]  J. Rubenfeld The Right of Privacy , 1989 .

[3]  Amit A. Levy,et al.  Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.

[4]  Jacqueline D. Lipton The Law of Unintended Consequences: The Digital Millennium Copyright Act and Interoperability , 2005 .

[5]  Vitaly Shmatikov,et al.  Myths and fallacies of "Personally Identifiable Information" , 2010, Commun. ACM.

[6]  Karen McCullagh Protecting ‘privacy’ through control of ‘personal’ data processing: A flawed approach , 2009 .

[7]  Chaim Zins,et al.  Conceptual approaches for defining data, information, and knowledge , 2007, J. Assoc. Inf. Sci. Technol..

[8]  Milton L. Mueller,et al.  Profiling the Profilers: Deep Packet Inspection and Behavioral Advertising in Europe and the United States , 2012 .

[9]  Charles Duhigg,et al.  How Companies Learn Your Secrets , 2012 .

[10]  Paul F. Syverson,et al.  Hiding Routing Information , 1996, Information Hiding.

[11]  H. C. Darby,et al.  THE DOMESDAY BOOK , 1972 .

[12]  Chaim Zins Conceptual approaches for defining data, information, and knowledge: Research Articles , 2007 .

[13]  H. Sangani,et al.  DO ANDROIDS DREAM OF ELECTRIC SHEEP? , 2020, Faculty Brat.

[14]  Arthur D. Fisk,et al.  Privacy and technology: folk definitions and perspectives , 2008, CHI Extended Abstracts.

[15]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[16]  Vitaly Shmatikov,et al.  Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).