From Group Privacy to Collective Privacy: Towards a New Dimension of Privacy and Data Protection in the Big Data Era
This chapter focuses on big data analytics and, in this context, investigates the opportunity to consider informational privacy and data protection as collective rights. From this perspective, privacy and data protection are not interpreted as referring to a given individual, but as common to the individuals that are grouped into various categories by data gatherers.
The peculiar nature of the groups generated by big data analytics requires an approach that cannot be exclusively based on individual rights. The new scale of data collection entails the recognition of a new layer, represented by groups’ need for the safeguard of their collective privacy and data protection rights.
This dimension requires a specific regulatory framework, which should be mainly focused on the legal representation of these collective interests, on the provision of a mandatory multiple-impact assessment of the use of big data analytics and on the role played by data protection authorities.
KeywordsBig data Right to privacy Data protection Group privacy Risk assessment
- Article 29 Data Protection Working Party. 2013. Letter to Mr. Larry Page, Chief Executive Officer. http://ec.europa.eu/justice/data-protection/article-29/documentation/other-document/files/2013/20130618_letter_to_google_glass_en.pdf. Accessed 27 Feb 2014.
- Article 29 Data Protection Working Party. 2013. Opinion 03/2013 on purpose limitation. http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp203_en.pdf. Accessed 27 Feb 2014.
- Article 29 Data Protection Working Party. 2014. Statement on the role of a risk-based approach in data protection legal frameworks. http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp218_en.pdf. Accessed 27 Feb 2014.
- Bennett, C.J. 1992. Regulating privacy: Data protection and public policy in Europe and the United States. Ithaca: Cornell University Press.Google Scholar
- Bloustein, E.J. 1977. Group privacy: The right to huddle. Rutgers School of Law 8: 219–283.Google Scholar
- Bloustein, E.J. 1978. Individual and group privacy. New Brunswick: Transaction Books.Google Scholar
- Bollier, D. 2010. The promise and perils of big data Washington, DC: Aspen Institute, Communications and Society Program http://www.aspeninstitute.org/sites/default/files/content/docs/pubs/The_Promise_and_Peril_of_Big_Data.pdf. Accessed 27 Feb 2014.
- Breckenridge, A.C. 1970. The right to privacy. Lincoln: University of Nebraska Press.Google Scholar
- Brenton, M. 1964. The privacy invaders. New York: Coward-McCann.Google Scholar
- Bygrave, L.A. 2002. Data protection law. Approaching its rationale, logic and limits. The Hague: Kluwer Law International.Google Scholar
- Bygrave, L. 2004. Privacy protection in a global context. A comparative overview. Scandinavian Studies in Law 7(319): 319–348.Google Scholar
- Calo, R.M. 2013. Consumer subject review boards: A thought experiment. Standford Law Review Online 66: 97–102.Google Scholar
- Cate, F.H., and Mayer-Schönberger, V. 2013. Data use and impact. Global Workshop The Center for Information Policy Research and The Center for Applied Cybersecurity Research, Indiana University, http://cacr.iu.edu/sites/cacr.iu.edu/files/Use_Workshop_Report.pdf. Accessed 27 Feb 2014.
- Chamoux, J. 1981. Data protection in Europe: The problem of the physical person and their legal person. Journal of Media Law & Practice 2: 70–83.Google Scholar
- Citron, D.K. 2008. Technological due process. Washington University Law Review 85(6): 1249–1313.Google Scholar
- Citron, D.K., and F. Pasquale. 2014. The scored society: Due process for automated predictions. Washington Law Review 89(1): 1–33.Google Scholar
- Cohen, J.E. 2013. What privacy is for. Harvard Law Review 126(1904): 1933.Google Scholar
- Dixon, P., and R. Gellman. 2014. The scoring of America: How secret consumer scores threaten your privacy and your future. 43–46, http://www.worldprivacyforum.org/wp-content/uploads/2014/04/WPF_Scoring_of_America_April2014_fs.pdf. Accessed 15 Apr 2015.
- Dwork, C., and D.K. Mulligan. 2013. It’s not privacy and it’s not fair. Standford Law Review Online 66: 35–40.Google Scholar
- Etzioni, A. 1999. The limits of privacy. New York: Basic Books.Google Scholar
- European Parliament. 2014. Resolution of 12 March 2014 on the US NSA surveillance programme, surveillance bodies in various Member States and their impact on EU citizens’ fundamental rights and on transatlantic cooperation in Justice and Home Affairs. http://www.europarl.europa.eu/sides/getDoc.do?type=TA&language=EN&reference=P7-TA-2014-0230. Accessed 26 Feb 2015.
- Federal Trade Commission. 2014. Data brokers: A call for transparency and accountability. Appendix B. https://www.ftc.gov/system/files/documents/reports/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014/140527databrokerreport.pdf. Accessed 14 May 2015.
- Finnis, J. 1984. The authority of law in the predicament of contemporary social theory. Journal of Law Ethics & Public Policy 1: 115–137.Google Scholar
- Flaherty, D. 2000. Privacy impact assessments: An essential tool for data protection. Privacy Law & Policy Reporter 7(5): 45 http://www.austlii.edu.au/cgi-bin/sinodisp/au/journals/PrivLawPRpr/2000/45.html?stem=0&synonyms=0&query=flaherty. Accessed 11 Nov 2014.
- Floridi, L. 2014. The 4TH revolution. How the infosphere is reshaping human reality. New York/Oxford: Oxford University Press.Google Scholar
- FRA – European Union Agency for Fundamental Rights. 2013. Access to data protection remedies in EU Member States. http://fra.europa.eu/sites/default/files/fra-2014-access-data-protection-remedies_en_0.pdf. Accessed 27 Feb 2014.
- Freedland, M. 1999. Data protection and employment in the European union. An analytical study of the law and practice of data protection and the employment relationship in the EU and its member. http://ec.europa.eu/social/main.jsp?catId=708. Accessed 25 Jan 2015.
- Giesker, H. 1905. Das Recht der Privaten an der eigenen Geheimsphäre. Ein Beitrag zu der Lehre von den Individualrechten. Zürich: Müller.Google Scholar
- Gillespie, T. 2014. The relevance of algorithms. In Media technologies. Essays on communication, materiality, and society, ed. T. Gillespie, P.J. Boczkowski, and K.A. Foot, 167–194. Cambridge, MA: MIT Press.Google Scholar
- Golle, P. 2006. Revisiting the uniqueness of simple demographics in the US population. In Proceedings of the 5th ACM workshop on privacy in electronic society, ed. A. Juels. New York: ACM 2006.Google Scholar
- Gorner, J. 2013. Chicago police use ‘heat list’ as strategy to prevent violence. Officials generate analysis to predict who will likely be involved in crime, as perpetrator or victim, and go door to door to issue warnings. Chicago Tribune, August 21. http://articles.chicagotribune.com/2013-08-21/news/ct-met-heat-list-20130821_1_chicago-police-commander-andrew-papachristos-heat-list. Accessed 25 Feb 2015.
- Hendrickx, F. Undated. Protection of workers’ personal data in the European union, 33–35, 98–101. http://ec.europa.eu/social/main.jsp?catId=708. Accessed 18 Jan 2015.
- Information Commissioner’s Office. 2011. Budget 2011–12. Spending plans 2012–13 to 2014–15. 2http://ico.org.uk/about_us/boards_committees_and_minutes/~/media/documents/library/Corporate/Detailed_specialist_guides/ico_budget_2011-12.ashx. Accessed 27 Feb 2014.
- Irish Data Protection Commissioner. 2012. Facebook Ireland Ltd. Report of Re-Audit. http://dataprotection.ie/documents/press/Facebook_Ireland_Audit_Review_Report_21_Sept_2012.pdf. Accessed 27 Feb 2014.
- Italian Data Protection Authority. 2013. Injunction and Order Issued Against Google Inc. http://www.garanteprivacy.it/web/guest/home/docweb/-/docweb-display/docweb/3133945. Accessed 27 Feb 2014.
- Kohler, J. 1907. Urheberrecht an schriftwerken und verlagsrecht. Stuttgart: F. Enke.Google Scholar
- Koss, K.K. 2015. Leveraging predictive policing algorithms to restore fourth amendment protections in high-crime areas in a post-wardlow world. Chicago Kent Law Review 90: 301–334.Google Scholar
- Kymlicka, W. 1995. Multicultural citizenship. New York: Oxford University Press.Google Scholar
- Leebron, D.W. 1991. The right to privacy’s place in the intellectual history of tort law. Case Western Reserve Law Review 41: 769–810.Google Scholar
- Mantelero, A., and G. Vaciago. 2014. Social media and big data. In Cyber crime & cyber terrorism. Investigators’ handbook, ed. B. Akhgar, A. Staniforth, and F.M. Bosco. Waltham: Elsevie.Google Scholar
- Mantelero, A. 2014a. Social control, transparency, and participation in the big data world. Journal of Internet Law April, 23–29.Google Scholar
- Mantelero, A. 2014b. The future of consumer data protection in the E.U. Rethinking the “notice and consent” paradigm in the new era of predictive analytics. Computer Law & Security Review 30: 643–660.Google Scholar
- Mayer-Schönberger, V., and K. Cukier. 2013. Big data. A revolution that will transform how we live, work and think. London: John Murray.Google Scholar
- Mayer-Schönberger, V. 1997. Generational development of data protection in Europe. In Technology and privacy: The new landscape, ed. P.E. Agre and M. Rotenberg. Cambridge, MA: MIT Press.Google Scholar
- Miller, A.R. 1971. The assault on privacy computers, data banks, dossiers, 54–67. Ann Arbor: University of Michigan Press.Google Scholar
- Nissenbaum, H. 2010. Privacy in context. technology, policy, and the integrity of social life. Stanford: Stanford University Press, 231.Google Scholar
- Ohm, P. 2010. Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review 57: 1701–1777.Google Scholar
- Packard, V. 1964. The naked society. New York: David McKay.Google Scholar
- Perry, W.L. et al. 2013. Predictive policing. The Role of Crime Forecasting in Law Enforcement Operations. http://www.rand.org/content/dam/rand/pubs/research_reports/RR200/RR233/RAND_RR233.pdf. Accessed 10 Mar 2015.
- Post, R.C. 1990. Rereading warren and brandeis: Privacy, property and appropriation. Case Western Reserve Law Review 41: 647–680.Google Scholar
- Richards, N.M., and J.H. King. 2013. Three paradoxes of big data. Stanford Law Review 66: 41–46.Google Scholar
- Schudson, M. 1978. Discovering the news. A social history of American newspaper. New York: Basic Books.Google Scholar
- Schütz, P. 2012. Comparing formal independence of data protection authorities in selected EU Member States. Conference Paper for the 4th Biennial ECPR Standing Group for Regulatory Governance Conference 2012. 17, fn. 73, and 18. http://regulation.upf.edu/exeter-12-papers/Paper%20265%20-%20Schuetz%202012%20-%20Comparing%20formal%20independence%20of%20data%20protection%20authorities%20in%20selected%20EU%20Member%20States.pdf. Accessed 27 Feb 2014.
- Schwartz, P.M. 2011. Data protection law and the ethical use of analytics. http://www.huntonfiles.com/files/webupload/CIPL_Ethical_Undperinnings_of_Analytics_Paper.pdf. Accessed 27 Feb 2014.
- Secretary’s Advisory Committee on Automated Personal Data Systems. 1973. Records, computers and the rights of citizens. http://epic.org/privacy/hew1973report/. Accessed 27 Feb 2014.
- Solove, D.J. 2008. Understanding privacy. Cambridge, MA/London: Harvard University Press.Google Scholar
- Stromhölm, S. 1967. Right of privacy and rights of personality. A comparative survey. Stockholm: Norstedt & Soners.Google Scholar
- Sweeney, L. 2000a. Foundations of privacy protection from a computer science perspective. In Proceedings Joint Statistical Meeting, AAAS, Indianapolis. http://dataprivacylab.org/projects/disclosurecontrol/paper1.pdf. Accessed 24 Jan 2015.
- Sweeney, L. 2000b. Simple demographics often identify people uniquely. Pittsburgh: Carnegie Mellon University. http://dataprivacylab.org/projects/identifiability/paper1.pdf. Accessed 24 Jan 2015.
- Vedder, A.H. 1997. Privatization, information technology and privacy: Reconsidering the social responsibilities of private organizations. In Business ethics: Principles and practice, ed. Geoff Moore, 215–226. Sunderland: Business Education Publishers.Google Scholar
- The White House, Executive Office of the President. 2014. Big data: Seizing opportunities, preserving values Washington, DC http://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf. Accessed 26 Dec 2014.
- Westin, A.F. 1970. Privacy and freedom. New York: Atheneum.Google Scholar
- Wright, D., and P. de Hert (eds.). 2012. Privacy impact assessment. Dordrecht: Springer.Google Scholar