Abstract
Current trends in Open and Big Data have led certain scholars to suggest the idea of expanding the notion of the “data subject” to include the protection of data groups. Nothing precludes this expansion, however, there is a question as to the type of supra-individual right groups can be given, i.e. whether data group rights should be conceived of as rights of the group qua group or, alternatively, as complementary to the protection and enforcement of individual rights. The latter has materialized with the protection of intimate associations of large civic or business membership organizations in US law (corporate rights), and also vis-à-vis from the legal safeguards enshrined in Articles 7 and 8 of the EU Charter of Fundamental Rights (collective/procedural rights). This contrast entails a further distinction between the fields of privacy and data protection as in connection with the different kinds of interests, or goods, the legal systems are aiming to protect. By examining certain specific problems affecting current data protection, referred to here collectively as “data fetishism,” the goal is to offer a normative standpoint upon which sides can be taken in today’s debate as to any new level of data protection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
See the ruling of the EU Court of Justice issued 8 April 2014 (C-293/12 and 594/12), and the claims by certain Austrian and Irish organizations of being victims of a violation of their rights under Articles 7 and 8 of the Charter of Fundamental Rights. We return to this below in Sect. 9.4.
- 2.
See above note 1 in Sect. 9.3.
- 3.
It may be argued that once search engines are deemed data controllers, as the CoJ did in C-131/12, §§ 33–34, Google and any other search engine for that matter, should not be considered as a third party. Rather, ISP obligations would be those typically associated with the one-to-one legal interactions mentioned above in Sect. 9.4. Yet, in previous rulings, e.g. Google vs Louis Vuitton from 23 March 2010, it is noteworthy that the opinion of the Court was different, in that ISP obligations depended on “the actual terms in which the service is supplied” and “whether the role played by that service provider is neutral, in the sense that its conduct is merely technical, automatic and passive” (§ 114 of the decision). Admittedly, it would be interesting to examine why the CoJ Justices changed their mind. For the sake of concision when dealing with group rights as a new level of data protection, we will skip this level of analysis here.
References
Allen, A. 1988. Uneasy access: Privacy for women in a free society. Totowa: Rowman and Littlefield.
Arendt, H. 1958. The human condition. Chicago: University of Chicago Press.
Bloustein, E.J. 2003. Individual & group privacy, 2nd ed. New Brunswick: Transaction Publishers.
Floridi, L. 2006. Four challenges for a theory of informational privacy. Ethics and Information Technology 8(3): 109–119.
Floridi, L. 2014. Open data, data protection, and group privacy. Philosophy and Technology 27: 1–3.
Gavison, R. 1980. Privacy and the limits of the law. Yale Law Journal 89: 421–471.
Jones, P. (2014, Spring). Group rights. The Stanford Encyclopaedia of Philosophy, E.N. Zalta, ed. http://plato.stanford.edu/archives/spr2014/entries/rights-group.
Kymlicka, W. 1989. Liberalism, Community and Culture. Oxford: Clarendon.
Pagallo, U. 2011. ISPs & Rowdy web sites before the law: Should we change today’s safe harbour clauses? Philosophy and Technology 24(4): 419–436.
Pagallo, U. 2012. Cracking down on autonomy: Three challenges to design in IT law. Ethics and Information Technology 14(4): 319–328.
Pagallo, U. 2013. Online security and the protection of civil rights: A legal overview. Philosophy & Technology 26(4): 381–395.
Pagallo, U., and E. Bassi. 2013. Open data protection: Challenges, perspectives, and tools for the reuse of PSI. In Digital enlightenment yearbook 2013, ed. M. Hildebrand, K. O’Hara, and M. Waidner, 179–189. Amsterdam: Ios Press.
Pasquale, F. 2014. The Black Box Society: The secret algorithms that control money and information. Cambridge, MA: Harvard University Press.
Posner, R. 1988. The jurisprudence of skepticism. Michigan Law Review 86(5): 827–891.
Stuart Mill, J. (1859). On liberty. In Collected works of John Stuart Mill, ed. Robson, J. M. vol. 21, 259–340. Toronto: Toronto University Press (1963 ff.).
Taylor, L. (2016). No place to hide? The ethics and analytics of tracking mobility using mobile phone data. Environment and Planning D: Society and Space 34(2): 319–336.
van der Sloot, B. (2014). Privacy in the post-NSA Era: Time for a fundamental revision?, JIPITEC 5(2): para 1;
Westin, A.F. 1967. Privacy and freedom. New York: Atheneum.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Pagallo, U. (2017). The Group, the Private, and the Individual: A New Level of Data Protection?. In: Taylor, L., Floridi, L., van der Sloot, B. (eds) Group Privacy. Philosophical Studies Series, vol 126. Springer, Cham. https://doi.org/10.1007/978-3-319-46608-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-46608-8_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-46606-4
Online ISBN: 978-3-319-46608-8
eBook Packages: Religion and PhilosophyPhilosophy and Religion (R0)