The collision between Big Data and privacy law

Main Article Content

Steve Wilson

Keywords

big data, privacy law

Abstract

We live in an age where billionaires are self-made on the back of the most intangible of assets ? the information they have about us. The digital economy is awash with data. It's a new and endlessly re-useable raw material, increasingly left behind by ordinary people going about their lives online. Many information businesses proceed on the basis that raw data is up for grabs; if an entrepreneur is clever enough to find a new vein of it, they can feel entitled to tap it in any way they like. However, some tacit assumptions underpinning today's digital business models are naive. Conventional data protection laws, older than the Internet, limit how Personal Information is allowed to flow. These laws turn out to be surprisingly powerful in the face of 'Big Data' and the 'Internet of Things'. On the other hand, orthodox privacy management was not framed for new Personal Information being synthesised tomorrow from raw data collected today. This paper seeks to bridge a conceptual gap between data analytics and privacy, and sets out extended Privacy Principles to better deal with Big Data.

Downloads

Download data is not yet available.
Abstract 263 | PDF Downloads 11

References

Blum, D. 2014. 'Update on Personal Clouds' at https://info.respectnetwork.com/update-on-personal-clouds/ retrieved August 19, 2014.
Boeth, R. 1970. 'The assault on privacy; Snoops, Bugs, Wiretaps, Dossiers, Data Banks ? and Specters of 1984'. Newsweek, July 27, 15-20.
Bohannon, J. 2013. 'Genealogy databases enable naming of anonymous DNA donors'. Science 339(6117): 262.
Cavoukian, A; Reed, D. 2013. 'Big Privacy: Bridging Big Data and the Personal Data Ecosystem Through Privacy by Design' at http://www.privacybydesign.ca/content/uploads/2013/12/pbd-big_privacy.pdf retrieved August 22, 2014.
Dewri, R; Annadata, P; Eltarjaman, W; Thurimella, R. 2013. 'Inferring Trip Destinations from Driving Habits Data'. 12th ACM Workshop on Privacy in the Electronic Society WPES, Berlin, 267-272.
Duhigg, C. 2012. 'How Companies Learn Your Secrets'. New York Times at www.nytimes.com/2012/02/19/magazine/shopping-habits.html retrieved August 22, 2014.
Facebook. 2014. 'Data Use Policy'. https://www.facebook.com/full_data_use_policy retrieved August 18, 2014.
Greenleaf, G. 2011. 'The influence of European data privacy standards outside Europe: implications for globalisation of Convention 108'. International Data Privacy Law. ips006.
GSA General Services Administration. 2014. 'Rules and Policies - Protecting PII - Privacy Act', at http://www.gsa.gov/portal/content/104256 retrieved August 18, 2014.
HmbBfDI Hamburg Commissioner for Data Protection and Freedom of Information. 2012. 'Proceedings against Facebook resumed' at https://www.datenschutz-hamburg.de/fileadmin/user_upload/documents/PressRelease-2012-08-15-Facebook_Proceedings.pdf retrieved August 22, 2014.
Johnston, A; Wilson, S. 2012 'Privacy Compliance Risks for Facebook'. IEEE Technology and Society Magazine. 31(2), 59-64.
Michael, K; Miller, K. 2013. 'Big data: new opportunities and new challenges'. IEEE Computer, 46(6), 22-24.
OAIC Office of the Australian Information Commissioner. 2012. 'Google Street View Wi-Fi Collection: Statement from Australian Privacy Commissioner, Timothy Pilgrim' at http://www.oaic.gov.au/news-and-events/statements/privacy-statements/google-street-view-wi-fi-collection/google-street-view-wi-fi-collection-statement-from-australian-privacy-commissioner-timothy-pilgrim retrieved August 23, 2014.
OAIC Office of the Australian Information Commissioner. 2013. 'Community Attitudes to Privacy survey' at http://www.oaic.gov.au/images/documents/privacy/privacy-resources/privacy-reports/Final_report_for_WEB.pdf
OECD Organisation of Economic Cooperation and Development. 1980. 'Guidelines on the Protection of Privacy and Transborder Flows of Personal Data' at http://www.oecd.org/internet/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm#guidelines retrieved August 29, 2014.
Privacy Act 1988, at http://www.austlii.edu.au/au/legis/cth/consol_act/pa1988108/.
Privacy Amendment (Enhancing Privacy Protection) Act 2012, at http://www.comlaw.gov.au/Details/C2012A00197.
Richards, N. 2014. 'Privacy is Not Dead?It's Inevitable' Boston Review. www.bostonreview.net/blog/neil-m-richards-privacy-not-dead retrieved August 23, 2014.
Sawant, N; Li, J; Wang, J. 2011. 'Automatic image semantic interpretation using social action and tagging data'. Multimedia Tools and Applications 51(1), 213-246.
Singh, A. 2013. 'Is Big Data the New Black Gold?'. 2013. Wired. http://www.wired.com/2013/02/is-big-data-the-new-black-gold/ retrieved August 18, 2014.
Solove, D. 2006. ‘A taxonomy of privacy’. University of Pennsylvania Law Review, 477-564.
Tene, O; Polonetsky. J. 2013. ‘A Theory of Creepy: Technology, Privacy and Shifting Social Norms’. Yale JL & Tech. 16: 59-134.
1000 Genomes Project. 2008. 'Consent to Participate' at http://www.1000genomes.org/sites/1000genomes.org/files/docs/Informed%20Consent%20Form%20Template.pdf retrieved August 23, 2014.
Wilson, S; Connolly, C; Denney-Wilson, E. 2005. 'Patient Privacy and Security - Not a Zero Sum Game! Australasian Epidemiologist. 12(1), 11-16.
Wilson, S. 2013. 'Legal Limits to Data Re-Identification'. Science 339(6120), 647.