Grappling with “Data Power”: Normative Nudges from Data Protection and Privacy

Theoretical Inquiries in Law 20 (1):189-220 (2019)
  Copy   BIBTEX

Abstract

The power exercised by technology companies is attracting the attention of policymakers, regulatory bodies and the general public. This power can be categorized in several ways, ranging from the “soft power” of technology companies to influence public policy agendas to the “market power” they may wield to exclude equally efficient competitors from the marketplace. This Article is concerned with the “data power” exercised by technology companies occupying strategic positions in the digital ecosystem. This data power is a multifaceted power that may overlap with economic (market) power but primarily entails the power to profile and the power to influence opinion formation. While the current legal framework for data protection and privacy in the EU imposes constraints on personal data processing by technology companies, it ostensibly does so without regard to whether or not they have “data power.” This Article probes this assumption. It argues that although this legal framework does not explicitly impose additional legal responsibilities on entities with “data power,” it provides a clear normative indication to do so. The volume and variety of data and the reach of data-processing operations seem to be relevant when assessing both the extent of obligations on technology companies and the impact of data processing on individual rights. The Article suggests that this finding provides the normative foundation for the imposition of a “special responsibility” on such firms, analogous to the “special responsibility” imposed by competition law on dominant companies with market power. What such a “special responsibility” might entail in practice will be briefly outlined and relevant questions for future research will be identified.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,438

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Inaccuracy as a privacy-enhancing tool.Gloria González Fuster - 2010 - Ethics and Information Technology 12 (1):87-95.
KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
Privacy in (mobile) telecommunications services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
Prescription Data Mining and the Protection of Patients' Interests.David Orentlicher - 2010 - Journal of Law, Medicine and Ethics 38 (1):74-84.
Data Science and Designing for Privacy.Michael Falgoust - 2016 - Techné: Research in Philosophy and Technology 20 (1):51-68.

Analytics

Added to PP
2019-03-30

Downloads
51 (#307,751)

6 months
11 (#227,278)

Historical graph of downloads
How can I increase my downloads?

References found in this work

No references found.

Add more references