A Process-based Approach to Informational Privacy and the Case of Big Medical Data

Theoretical Inquiries in Law 20 (1):257-290 (2019)
  Copy   BIBTEX

Abstract

Data protection law has a linear logic, in that it purports to trace the lifecycle of personal data from creation to collection, processing, transfer, and ultimately its demise, and to regulate each step so as to promote the data subject’s control thereof. Big data defies this linear logic, in that it decontextualizes data from its original environment and conducts an algorithmic nonlinear mix, match, and mine analysis. Applying data protection law to the processing of big data does not work well, to say the least. This Article examines the case of big medical data. A survey of emerging research practices indicates that studies either ignore data protection law altogether or assume an ex post position, namely that because they are conducted after the data has already been created in the course of providing medical care, and they use de-identified data, they go under the radar of data protection law. These studies focus on the end-point of the lifecycle of big data: if sufficiently anonymous at publication, the previous steps are overlooked, on the claim that they enjoy immunity. I argue that this answer is too crude. To portray data protection law in its best light, we should view it as a process-based attempt to equip data subjects with some power to control personal data about them, in all phases of data processing. Such control reflects the underlying justification of data protection law as an implementation of human dignity. The process-based approach fits current legal practices and is justified by reflecting dignitarian conceptions of informational privacy.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,853

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Inaccuracy as a privacy-enhancing tool.Gloria González Fuster - 2010 - Ethics and Information Technology 12 (1):87-95.
Data Science and Designing for Privacy.Michael Falgoust - 2016 - Techné: Research in Philosophy and Technology 20 (1):51-68.
Privacy in (mobile) telecommunications services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
Privacy and Protection of Marginalized Social Groups.Stephen Kabera Karanja - 2009 - Studies in Ethics, Law, and Technology 2 (3).
Data fusion with probabilistic conditional logic.Jens Fisseler & Imre Fehér - 2010 - Logic Journal of the IGPL 18 (4):488-507.
Privacy in the clouds.Ann Cavoukian - 2008 - Identity in the Information Society 1 (1):89-108.
Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.

Analytics

Added to PP
2019-03-30

Downloads
17 (#868,559)

6 months
3 (#976,504)

Historical graph of downloads
How can I increase my downloads?

References found in this work

No references found.

Add more references