Skip to main content

Privacy Self-regulation Through Awareness?

A Critical Investigation into the Market Structure of the Security Field

  • Chapter
  • First Online:
European Data Protection: In Good Health?

Abstract

The security field can be used as a burning lens to focus particular problems when it comes to the self-regulation of privacy: while the industry certainly represents a particular case when it comes to actor relationships, our analysis shows which questions need to be asked in order to understand existing structures and obstacles to privacy protection. The chapter is based on outcomes of recent research of the PATS project (Privacy Awareness Through Security Organisation Branding), including analysis of literature, websites, brochures and expert interviews. We argue that powerful obstacles lie in market structures that are obscure rather than provide incentives for self-regulation. These findings inform further thought about an Accountability principle with regard to the governance of privacy in different industries dealing with (personal) data. It is not enough to look at legal provisions and privacy statements when we want to assess the state of “health” of privacy and data protection in the EU—we need a thorough examination of the patient.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The PATS project is funded from 2009 to 2012 and involves partners from Germany, the UK, the USA, Poland, Israel and Finland. The findings presented here are mainly based on the outcomes of the German team. The project website can be found at www.pats-project.eu.

  2. 2.

    This is what we also found in the analysis of security communication, see Sect. 11.4.

  3. 3.

    The interviews were semi-structured, qualitative interviews which lasted from 1 h up to 3 h. All but one interview were conducted face-to-face and recorded. They were then transcribed or paraphrased closely. The analysis was done using the qualitative analysis tool Atlas.ti with a Grounded Theory approach.

  4. 4.

    See interview 2, line 46.

  5. 5.

    We collected pictures from stands and brochures at the fair “Security Essen 2010”, material from website presentations and ten issues of a security related stakeholder journal between 2009 and 2010. For the analysis, we used Atlas.ti to find common narratives in the self-representations of the organisations, and coded the material using a Grounded Theory approach.

  6. 6.

    Quote from a poster of a company named Orfix at “Security Essen 2010”.

  7. 7.

    Quote from a Bosch poster at “Security Essen 2010”.

References

  • von Arnim, Andreas. 1999. Private security companies and internal security in Europe. In Recht und Organisation privater Sicherheitsdienste in Europa, ed. Reinhard Ottens, Harald Olschok, and Stephan Landrock, 61–112. Stuttgart: R. Boorberg.

    Google Scholar 

  • Article 29 Working Party. 2010. Opinion 3/2010 on the principle of accountability. Brussels: Article 29 Working Party. http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2010/wp173_en.pdf. Accessed 28 July 2011.

    Google Scholar 

  • Bennett, Colin J., and Charles D. Raab. 2006. The governance of privacy: Policy instruments in global perspective. 2nd and updated ed. Cambridge: MIT Press.

    Google Scholar 

  • Bukow, Sebastian. 2005a. Deutschland: Mit Sicherheit weniger Freiheit über den Umweg Europa. In Europäisierung der inneren Sicherheit, ed. Gert-Joachim Glaeßner and Astrid Lorenz, 43–62. Wiesbaden: VS Verlag.

    Chapter  Google Scholar 

  • Bukow, Sebastian. 2005b. Internal security and the fight against terrorism in Germany. Philosophische Fakultät III Institut für Sozialwissenschaften, Humboldt Universität Berlin. http://edoc.hu-berlin.de/oa/conferences/reZgVweZSLueU/PDF/27QEOto3iuZCs.pdf. Accessed 30 July 2011.

    Google Scholar 

  • Busch, Heiner. 2008. Kein Mangel an Sicherheitsgesetzen. FriedensForum. http://www.friedenskooperative.de/ff/ff08/6–61.htm. Accessed 30 July 2011.

    Google Scholar 

  • Buzan, Barry, Ole Waever, and Jaap de Wilde. 1998. Security: A new framework for analysis. Boulder: Lynne Rienner.

    Google Scholar 

  • Edwards, Paul. 1996. The closed world: Computers and the politics of discourse in Cold War America. Cambridge: MIT Press.

    Google Scholar 

  • European Commission. 2010. Communication from the Commission to the European Parliament, the Council, the Economic and Social committee and the Committee of the Regions—A comprehensive approach on personal data protection in the European Union. Brussels: European Commission. http://ec.europa.eu/health/data_collection/docs/com_2010_0609_en.pdf. Accessed 20 July 2011.

    Google Scholar 

  • Feltes, Thomas. 2009. Akteure der Inneren Sicherheit: Vom Öffentlichen zum Privaten. In Auf der Suche nach neuer Sicherheit: Fakten, Theorien und Folgen. 2nd ed., ed. Hans-Jürgen Lange, H. Peter Ohly, and Jo Reichertz, 101–109. Wiesbaden: VS Verlag.

    Google Scholar 

  • Heinrich, Stephan, und Hans-Jürgen Lange. 2009. Erweiterung des Sicherheitsbegriffs. In Auf der Suche nach neuer Sicherheit: Fakten, Theorien und Folgen, ed. Hans-Jürgen Lange, H. Peter Ohly, und Jo Reichertz, 253–268. Wiesbaden: VS Verlag.

    Google Scholar 

  • Isensee, Josef. 1983. Das Grundrecht auf Sicherheit. Zu den Schutzpflichten des freiheitlichen Verfassungsstaates. Berlin: Walter de Gruyter.

    Google Scholar 

  • Lange, Hans-Jürgen, H. Peter Ohly, and Jo Reichertz. 2009. Auf der Suche nach neuer Sicherheit: Fakten, Theorien und Folgen. 2nd ed. VS Verlag.

    Google Scholar 

  • Lange, Hans-Jürgen, und H. Peter Frevel. 2009. Innere Sicherheit im Bund, in den Ländern und inden Kommunen. In Auf der Suche nach neuer Sicherheit: Fakten, Theorien und Folgen, ed. Hans-Jürgen Lange, H. Peter Ohly, und Jo Reichertz, 116–148. Wiesbaden: VS Verlag.

    Google Scholar 

  • Lyon, David. 2006. 9/11, synopticon, and scopophilia: Watching and being watched. In The new politics of surveillance and visibility, ed. Haggerty, Kevin. D. and Ricard V. Ericson. Toronto: Univ. of Toronto Press.

    Google Scholar 

  • Morlok, Martin, and Julian Krüper. 2009. Sicherheitsgewährleistung im kooperativen Verfassungsstaat. In Auf der Suche nach neuer Sicherheit: Fakten, Theorien und Folgen, ed. Hans-Jürgen Lange, H. Peter Ohly, und Jo Reichertz, 331–342. Wiesbaden: VS Verlag.

    Google Scholar 

  • Newburn, Tim. 2001. The commodification of policing: Security networks in the late modern city. Urban Studies 38:829–848.

    Article  Google Scholar 

  • Singelnstein, Tobias, and Peer Stolle. 2006. Die Sicherheitsgesellschaft. Soziale Kontrolle im 21. Jahrhundert. VS Verlag.

    Google Scholar 

  • Zanini, Michele, and Sean J. A. Edwards. 2001. The networking of terror in the information age. In Networks and netwars: The future of terror, crime, and militancy, ed. John Arquilla and David Ronfeldt, 29–60. Santa Monica: Rand.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Carla Ilten .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media B.V.

About this chapter

Cite this chapter

Ilten, C., Guagnin, D., Hempel, L. (2012). Privacy Self-regulation Through Awareness?. In: Gutwirth, S., Leenes, R., De Hert, P., Poullet, Y. (eds) European Data Protection: In Good Health?. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2903-2_11

Download citation

Publish with us

Policies and ethics