Responding to the Inevitable Outcomes of Profiling: Recent Lessons from Consumer Financial Markets, and Beyond

Chapter

Abstract

Data profiling practices in today’s information age take many shapes and have many faces. They generate both public intrigue and concern, which in many cases make their way to the media and from there to relevant regulators. These latter entities, in turn, struggle in search of a proper regulatory response to the complicated issues set before them. Profiling presents a policy challenge which is indeed frequently invoked and discussed. However, both the harms it presents and the way in which they should be resolved are extremely difficult to conceptualize. The challenge of regulators and scholars grappling with these issues is three-fold: they (a) must generate a helpful taxonomy for understanding and addressing the various practices and their potential problems. They must also (b) establish which issues could be resolved by internal and external market pressures, as well as indirect regulatory pressures, and which require direct regulatory scrutiny and intervention. Finally, and most importantly, they must (c) formulate (or recommend) regulatory responses at the distinct junctures they deem necessary. In this short chapter I attempt to draw out a brief strategic response to these questions, while relying on previous work. My analysis will focus on the first two elements, while providing merely initial intuitions towards overall solutions. In doing so, I will strive to account for the technological, market and legal developments of the most recent years.

Keywords

Information privacy Profiling Data mining Consumer protection Transparency Credit card regulation Price discrimination Direct marketing Secondary use 

References

  1. Baker, Stephen. 2008. The numerati. New York: Houghton Mifflin Harcourt.Google Scholar
  2. Cate, Fred H. 2001. Privacy in perspective. Washington, DC: AEI Press.Google Scholar
  3. Cate, Fred H. 2006. The failure of fair information practice principles. In Consumer Protection in the Age of the Information Economy, ed. J.K. Winn, 358. Williston: Ashgate.Google Scholar
  4. Chaum, David. 1992. Achieving electronic privacy. Scientific American 267: 96–101.CrossRefGoogle Scholar
  5. Duhigg, Charles. 2009. What does your credit-card company know about you? New York Times Magazine.Google Scholar
  6. Gurak, Laura J. 1999. Persuasion and privacy in cyberspace. New Haven, CT: Yale Univ. Press.Google Scholar
  7. Hirschman, Albert O. 1970. Exit, voice and loyalty. Cambridge, MA: Harvard Univ. Press.Google Scholar
  8. Korobkin, Russel B. 2003. Bounded rationality, standard form contracts, and unconscionability, University of Chicago Law Review 70: 1203–1295.CrossRefGoogle Scholar
  9. Lemos, Robert. 2007. Researchers reverse Netflix anonymization. Security Focus (December 4).Google Scholar
  10. Lieber, Ron. 2009. American Express kept a (very) watchful eye on charges. New York Times.Google Scholar
  11. Parisi, Francesco. 2004. The harmonization of legal warranties in european sales law: An economic analysis. American Journal of Comparative Law 52 (2): 403–431.CrossRefGoogle Scholar
  12. Staten, Michael E., and Fred H. Cate. 2003. The impact of opt-in privacy rules on retail credit markets: A case study of MBNA. Duke Law Journal 52: 745–786.Google Scholar
  13. Solove, Daniel J. 2008. Understanding privacy. Cambridge, MA: Harvard Univ. Press.Google Scholar
  14. Stone, Brad. 2008. Banks mine data and woo troubled borrowers. New York Times.Google Scholar
  15. Swire, Peter S., and Robert E. Litan, 1998. None of your business. Washington, DC: Brookings Institution Press.Google Scholar
  16. Thompson, Clive. 2008. If you liked this, you’re sure to love that. New York Times, November 23, 2008.Google Scholar
  17. Zarsky, Tal Z. 2002–2003. Mine your own business! Making the case for the implications of the data mining of personal information in the forum of public opinion. Yale Journal of Law and Technology 5: 1–57.Google Scholar
  18. Zarsky, Tal Z. 2004. Desperately seeking solutions: Using implementation-based solutions for the troubles of information privacy in the age of data mining and the internet society. Maine Law Review 56 (1): 22,28.Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2010

Authors and Affiliations

  1. 1.Faculty of LawUniversity of Haifa Mt. CarmelHaifaIsrael

Personalised recommendations