Abstract
Until now, privacy protections have focused on guaranteeing individuals a measure of control over information relating to themselves. However, in the digital age, this protection has become less effective since data is constantly collected and stored in ways that make it difficult for the individual to have control over each piece of information. Furthermore, the information communicated by an individual, when processed in conjunction with other data points, may allow potentially harmful inferences to be drawn about other individuals and the groups to which they may belong. The potential of Big Data to harm groups, particularly in fragile contexts or areas of weak statehood, therefore raises a number of questions which this chapter seeks to explore: is there such a thing as group privacy, distinct from individual privacy? Is group privacy a workable concept? If so, should it be a legally enforceable right and how can it be protected? We begin by exploring various concepts of privacy and group; then discuss how to affirm and protect group privacy through a combination of traditional levers of power and better data management, security, and literacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
We use the notion of group in the ordinary meaning of the term. It must be noted that related notions exist in specific disciplines. Logic, linguistics, and computer programming all refer to the type-token relationship to distinguish between a class or concept (the type) and the objects that instantiate it (the tokens). Similarly, mathematics refers to the set-element relationship; in this framework, it is possible for a set to have only one element, in which case the set is called a singleton. We use the notions of group and members, or group and individuals, in order to connote the cross-disciplinary nature and human focus of our inquiry, and to enable us to formulate recommendations with a policy-making and legal reach. In the ordinary meaning of these terms, a group is usually made up of more than one member, and we will focus on these situations.
- 2.
See, e.g. International Covenant on Civil and Political Rights, Art. 26.
- 3.
Convention Relating to the Status of Refugees, Arts. 1A, 33.
- 4.
Art. 23.1.
- 5.
Art. II.
- 6.
E.g., ICCPR, Art. 1.
- 7.
For instance, article 27 of the ICCPR prohibits states with ethnic, religious or linguistic minorities from denying members of these minorities the right, “in community with the other members of their group, to enjoy their own culture, to profess and practise their own religion, or to use their own language” (emphasis added).
- 8.
E.g. International Covenant on Economic, Social and Cultural Rights, Art. 8.1(b)–(c).
- 9.
Principles 8, 22(g).
- 10.
See generally Friedrich Rosenfeld, “Collective reparation for victims of armed conflict,” 92 International Review of the Red Cross 731 (2010).
- 11.
See, e.g., Bowker and Star’s work on the devastating impact of classifying humans by race under South Africa’s Apartheid regime. Geoffrey C. Bowker and Susan Star, Sorting Things Out, Cambridge, MA, The MIT Press, 1999.
- 12.
- 13.
- 14.
See UN Resolution A/HRC/RES/28/16, to be found here: http://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/RES/28/16.
- 15.
Solove 2008.
- 16.
Daniel Solove, “Conceptualizing Privacy”, 90 California Law Review 1087, 2002, at 1089–1089.
- 17.
Samuel D. Warren and Louis D. Brandeis, « The Right to Privacy », Harvard Law Review, Volume IV, No 5, December 1890.. See also Solove 2008; vom Lehn 2014.
- 18.
Daniel Solove, “Conceptualizing Privacy”, 90 California Law Review 1087, 2002, at 1094.
- 19.
James Q. Whitman, “Two Western Cultures of Privacy: Dignity Versus Liberty,” 113 Yale Law Journal 1153, 2004. See also Bloustein 1964.
- 20.
‘Anonymity and Reason’, Privacy in the Modern Age [ed. Rotenberg, Horwitz and Scott, The New Press, 2015].
- 21.
Samuel D. Warren and Louis D. Brandeis, « The Right to Privacy », Harvard Law Review, Volume IV, No 5, December 1890.
- 22.
Yael Onn et al. 2012.
- 23.
See Privacy International, “Lebanon: It’s Time to You’re your International Position on Privacy Into Action at the National Level,” 2016. https://www.privacyinternational.org/node/586
- 24.
Akinsuyi, F. Franklin. “Data Protection and Privacy Laws Nigeria, a Trillion Dollar Opportunity!!” Social Science Research Network. April 24, 2015. http://ssrn.com/abstract=2598603
- 25.
Solove 2008; Smith, Dinev and Xu 2011; Mayer-Schönberger & Cukier 2013.
- 26.
Westin 1968.
- 27.
See also Paul Ohm, “Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization”, UCLE Law Review, Vol 57, p. 1701, 2010.
- 28.
de Montjoye, Yves-Alexandre, Samuel S. Wang and Alex Pentland, “On the Trusted Use of Large-Scale Personal Data,” IEEE Data Engineering Bulletin, 35–4 (2012).
- 29.
Whong, Chris “Foiling NYC’S Taxi Trip Data” Chriswhong.Com. (2016) http://chriswhong.com/open-data/foil_nyc_taxi/
- 30.
“Riding With the Stars: Passenger Privacy in the NYC Taxicab Dataset.” Neustar Research, September 15, 2014. http://research.neustar.biz/2014/09/15/riding-with-the-stars-passenger-privacy-in-the-nyc-taxicab-dataset/
- 31.
Berlee, Anna. “Using NYC Taxi Data to Identify Muslim Taxi Drivers.” The Interdisciplinary Internet Institute. January 21, 2015. http://www.theiii.org/index.php/997/using-nyc-taxi-data-to-identify-muslim-taxi-drivers/
- 32.
Raymond, Nathaniel. “Beyond ‘Do No Harm’ and Individual Consent: Reckoning with the Emerging Ethical Challenges of Civil Society’s Use of Data.” (forthcoming)
- 33.
Bengtsson, Linus, et al. “Improved response to disasters and outbreaks by tracking population movements with mobile phone network data: a post-earthquake geospatial study in Haiti.” PLoS Med 8.8 (2011): e1001083.
- 34.
“Using Cell Phone Data to Curb the Spread of Malaria.” Harvard T.H. Chan School of Public Health News. October 11, 2012. http://www.hsph.harvard.edu/news/press-releases/cell-phone-data-malaria/
- 35.
Tatem, Andrew J., et al. “Integrating rapid risk mapping and mobile phone call record data for strategic malaria elimination planning.” Malaria journal13.1 (2014): 1–16.
- 36.
Blumenstock, Joshua, et al. “Neighborhood and Network Segregation: Ethnic Homophily in a Silently Separate Society.” Proc. NetMob (2015).
- 37.
See Decuyper, Adeline, et al. “Estimating food consumption and poverty indices with mobile phone data.” arXiv preprint arXiv:1412.2595 (2014); Smith, Christopher, Afra Mashhadi, and Licia Capra. “Ubiquitous sensing for mapping poverty in developing countries.” Paper submitted to the Orange D4D Challenge (2013); Mao, Huina, et al. “Mobile communications reveal the regional economy in Côte d’Ivoire.” Proc. of NetMob (2013).
- 38.
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, http://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:31995L0046
- 39.
- 40.
Van Den Hoven, Jeroen. Information technology, privacy and the protection of personal data. Cambridge University Press, 2008.
- 41.
Nissenbaum, Helen. “Privacy as contextual integrity.” Wash. L. Rev. 79 (2004): 119.
- 42.
For the analogy of information as product, see also Posner, Richard A. “The economics of privacy.” The American economic review 71, no. 2 (1981): 405–409.
- 43.
Directive 95/46/EC, supra note 31, article 8.
- 44.
Antonio Cassese, Self-Determination of Peoples : A Legal Reappraisal, Cambridge, Cambridge University Press, 1995, p. 11.
- 45.
Jonathan I. Charney, Self-Determination : Chechnya, Kosovo, and East Timor, Vanderilt Journal of Transnational Law, volume 34, p. 455.
- 46.
Id.
- 47.
G.A. Resolution 1803, U.N. GAOR, 17th session, Supp. No. 17, at 15, U.N. Doc A/5217 (1962).
- 48.
George Whitecross Paton, A Textbook of Jurisprudence 393 (G. W. Paton & David P. Derhamd eds., 4th ed., 1972), cited in Black’s Law Dictionary, 9th edition, 2009.
- 49.
See Sprenger, Polly. “Sun on Privacy : ‘Get Over It.’” Wired, January 26, 1999. http://archive.wired.com/politics/law/news/1999/01/17538; Preston, Alex. “The Death of Privacy.” The Guardian, August 3, 2014. http://www.theguardian.com/world/2014/aug/03/internet-death-privacy-google-facebook-alex-preston
- 50.
Singer, Natasha, 2016. “Why A Push For Online Privacy Is Bogged Down In Washington”. New York Times. http://www.nytimes.com/2016/02/29/technology/obamas-effort-on-consumer-privacy-falls-short-critics-say.html?_r=0.
- 51.
See Omer Tene and Jules Polonetsky, Big Data for All: Privacy and User Control in the Age of Analytics, 11 Nw. J. Tech. & Intell. Prop. 239 (2013). http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1, pp. 260–263. See also Ohm, “Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization”, UCLE Law Review, Vol 57, p. 1763, 2010.
- 52.
On the predictive nature of Big Data analysis, see Kate Crawford and Jason Schultz, Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms, 55 B.C.L. Rev. 93 (2014), http://lawdigitalcommons.bc.edu/bclr/vol55/iss1/4 and Ian Kerr and Jessica Earle, “Prediction, Preemption, Presumption: How Big Data Threatens Big Picture Privacy”, 66 Stan. L. Rev. Online 65, 2013, http://www.stanfordlawreview.org/online/privacy-and-big-data/prediction-preemption-presumption.
- 53.
While privacy and data protection laws are generally strong in developed countries, the United Nations Conference on Trade and Development underlines that it remains “inadequate” in other parts of the world. UNCTAD, Information Economy Report, 24 March 2015, http://unctad.org/en/PublicationsLibrary/ier2015_en.pdf, pp. 64–65. E.g., at the moment only 14 African 14 countries have or are planning to enact privacy regulations. However, the African Union recently developed a convention on cyber security and personal data protection that would commit member states to establish legal frameworks for e-transactions, protection of data, and punishment of violations. http://www.internetsociety.org/sites/default/files/Internet%20development%20and%20Internet%20governance%20in%20Africa.pdf
- 54.
The right to privacy in the digital age, 30 June 2014, Report of the Office of the United Nations High Commissioner for Human Rights, http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf
- 55.
- 56.
The regulation of algorithms has already been applied successfully in other areas, such as in the gambling industry.
- 57.
- 58.
- 59.
Daniel Greenwood, Arkadiusz Stopczynski, Brian Sweatt, Thomas Hardjono, and Alex Pentland, “Institutional Controls : the New Deal on Data”
- 60.
See Google and the right to be forgotten: Silver, Joe. 2014. “Google Must Erase “Inadequate” Links, Court Says”. Ars Technica. Accessed April 1 2016. http://arstechnica.com/tech-policy/2014/05/google-must-erase-inadequate-links-court-says/.
- 61.
Daniel Greenwood, Arkadiusz Stopczynski, Brian Sweatt, Thomas Hardjono, and Alex Pentland, “Institutional Controls : the New Deal on Data”
- 62.
On the difficulties of “privacy self-management” in the current situation, see Daniel J. Solove, “Privacy Self-Management and the Consent Dilemma”, 126 Harvard Law Review 1880 (2013), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2171018.
- 63.
Yves-Alexandre de Montjoye, Samuel S. Wang, Alex Pentland, “On the Trusted Use of Large-Scale Personal Data”, 2012.
- 64.
Palantir Gotham Overview, https://www.palantir.com/palantir-gotham/.
- 65.
Palantir Intelligence, https://www.palantir.com/solutions/intelligence/.
- 66.
Quentin Hardy, “Unlocking Secrets, If Not Its Own Values”, The New York Times, May 31, 2014, http://www.nytimes.com/2014/06/01/business/unlocking-secrets-if-not-its-own-value.html?
- 67.
Bibliography
“Guiding Principles on Business and Human Rights.” United Nations Human Rights Office of the High Commissioner. HR/PUB/11/04 (2011). http://www.ohchr.org/Documents/Publications/GuidingPrinciplesBusinessHR_EN.pdf.
“Intelligence.” Palantir Technologies. 2016. https://www.palantir.com/solutions/intelligence/.
“Internet & Jurisdiction Project—A Global Muti-Stakeholder Dialogue Process.” Internetjurisdiction.net http://www.internetjurisdiction.net/.
“Non-Financial Reporting- European Commission.” Ec.Europa.Eu January 15, 2016. http://ec.europa.eu/finance/accounting/non-financial_reporting/index_en.htm.
“Palantir Gotham.” Palantir Technologies 2016. https://www.palantir.com/palantir-gotham/.
“Riding With the Stars: Passenger Privacy in the NYC Taxicab Dataset.” Neustar Research, September 15, 2014. http://research.neustar.biz/2014/09/15/riding-with-the-stars-passenger-privacy-in-the-nyc-taxicab-dataset/.
“Using Cell Phone Data to Curb the Spread of Malaria.” Harvard T.H. Chan School of Public Health News, October 11, 2012, http://www.hsph.harvard.edu/news/press-releases/cell-phone-data-malaria/.
Akinsuyi, F. Franklin. 2015. “Data protection and privacy laws Nigeria, a trillion dollar opportunity!!” Social Science Research Network. April 24, 2015. http://ssrn.com/abstract=2598603.
Bengtsson, Linus, et al. 2011. Improved response to disasters and outbreaks by tracking population movements with mobile phone network data: A post-earthquake geospatial study in Haiti. PLoS Med 8(8).
Berlee, Anna. 2015 “Using NYC taxi data to identify muslim taxi drivers.” The Interdisciplinary Internet Institute. January 21, 2015. http://www.theiii.org/index.php/997/using-nyc-taxi-data-to-identify-muslim-taxi-drivers/.
Bloustein, Edward J. 1964. Privacy as an aspect of human dignity: An answer to Dean Prosser. New York University Law Review, 962–1007.
Blumenstock, Joshua, et al. 2015. Neighborhood and network segregation: Ethnic homophily in a silently separate society. Proc. NetMob.
Cassese, Antonio. 1995. Self-determination of peoples: A legal reappraisal. Cambridge: Cambridge University Press, p. 11.
Charney, Jonathan I. 2001. Self-determination: Chechnya, Kosovo, and East Timor. Vanderbilt Journal of Transnational Law 34: 455.
Crawford, Kate, and Jason Schultz. 2014. Big data and due process: Toward a framework to redress predictive privacy harms. 55 B.C.L. Rev. 93, http://lawdigitalcommons.bc.edu/bclr/vol55/iss1/4.
de Corbion, Alexandrine Pirlot. Lebanon: It’s time to you’re your international position on privacy into action at the national level. Privacy International, May 26. 2015, https://www.privacyinternational.org/node/586.
de Montjoye, Yves-Alexandre, Samuel S. Wang and Alex Pentland. 2012. On the trusted use of large-scale personal data. IEEE Data Engineering Bulletin, 35–4.
Decuyper, Adeline, et al. 2014 Estimating food consumption and poverty indices with mobile phone data. arXiv preprint arXiv:1412.2595.
European Parliament and Council. Directive on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data. (95/46/EC) October 24, 1995. http://ec.europa.eu/justice/policies/privacy/docs/95-46-ce/dir1995-46_part1_en.pdf.
G.A. Resolution 1803, U.N. GAOR, 17th session, Supp. No. 17, at 15, U.N. Doc A/5217 1962.
Greenwood, Daniel, et al. 2014. The new deal on data: A framework for institutional controls. In Privacy, big data, and the pubic good, ed. Julia Lane, Victoria Stodden, Stefan Bender, and Helen Nissenbaum, 192–210. Cambridge: Cambridge University Press.
Hardy, Quentin. 2014. “Unlocking secrets, if not its own values,” The New York Times, May 31, 2014, http://www.nytimes.com/2014/06/01/business/unlocking-secrets-if-not-its-own-value.html?.
Kerr, Ian, and Jessica Earle. 2013. Prediction, preemption, presumption: How big data threatens big picture privacy. 66 Stan. L. Rev. 65, http://www.stanfordlawreview.org/online/privacy-and-big-data/prediction-preemption-presumption.
Livingston, Steven, and Gregor Walter-Drop (eds.). 2013. Bits and atoms: Information and communication technology in areas of limited statehood. New York: Oxford University Press.
Mao, Huina, et al. 2013. Mobile communications reveal the regional economy in Côte d’Ivoire. Proc. of NetMob.
Mayer-Schönberger, Viktor, and Kenneth Cukier. 2013. Big data: A revolution that will transform how we live, work, and think. London: John Murray.
Nissenbaum, H., and F. Brunton. 2015. Obfuscation: A user’s guide for privacy and protest. Cambridge: MIT Press.
Nissenbaum, Helen. 2010. Privacy in context: Technology, policy, and the integrity of social life. Palo Alto, CA: Stanford University Press. Spanish Translation Privacidad Amenazada: Tecnología, Política y la Integridad de la Vida Social. Mexico City: Océano, 2011.
Nissenbaum, H., and M. Price (eds.). 2004. Academy and the internet. New York: Peter Lang Publishing Company.
Nyirenda-Jere, Towela, and Tesfaye Biru. “Internet Development and Internet Governance in Africa.” Internet Society. May 22, 2015. http://www.internetsociety.org/sites/default/files/Internet%20development%20and%20Internet%20governance%20in%20Africa.pdf.
Ohm, Paul. 2010. Broken promises of privacy: Responding to the surprising failure of anonymization. UCLE Law Review 57: 1763.
Omer, Tene, and Jules Polonetsky.2013. Big data for all: Privacy and user control in the age of analytics. 11 Nw. J. Tech. & Intell. Prop. 239: 260–263. http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1.
Paton, George Whitecross. 1972. A textbook of jurisprudence 393 (G. W. Paton & David P. Derhamd eds., 4th ed., cited in Black’s law dictionary, 9th edition, 2009.
Posner, Richard A. The economics of privacy. The American Economic Review, 71(2): 505–409. http://www.jstor.org/stable/1815754.
Preston, Alex. 2014. “The Death of Privacy.” The Guardian, August 3, 2014. http://www.theguardian.com/world/2014/aug/03/internet-death-privacy-google-facebook-alex-preston.
Raymond, Nathaniel. “Beyond ‘Do no harm’ and individual consent: Reckoning with the emerging ethical challenges of civil society’s use of data.” (forthcoming)
Rosenfeld, Friedrich. 2010. “Collective reparation for victims of armed conflict,” 92 International Review of the Red Cross 731.
Rotenberg, Mark, Julia Horwitz, and Jeremie Scott (eds.). 2015. Privacy in the modern age: The search for solutions. New York: The New Press.
Smith, Christopher, Afra Mashhadi, and Licia Capra. 2013. “Ubiquitous sensing for mapping poverty in developing countries.” Paper submitted to the Orange D4D Challenge.
Singer, Natasha. 2016. Why a push for online privacy is bogged down in Washington. New York Times. http://www.nytimes.com/2016/02/29/technology/obamas-effort-on-consumer-privacy-falls-short-critics-say.html?_r=0.
Solove, Daniel J. 2013. Privacy self-management and the consent dilemma. 126 Harvard Law Review 1880. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2171018.
Solove, Daniel J. 2008. “Understanding Privacy.” GWU Law School Public Law Research Paper No.420. Harvard University Press. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1127888.
Solove, Daniel. 2002. Conceptualizing privacy. 90 California Law Review 1087: 1089.
Sprenger, Polly.1999. Sun on privacy: ‘Get over it.’ Wired, January 26, 1999. http://archive.wired.com/politics/law/news/1999/01/17538.
Tatem, Andrew J., et al. 2014. Integrating rapid risk mapping and mobile phone call record data for strategic malaria elimination planning. Malaria Journal 13(1): 1–16.
Theriault, Denis C. 2015. Black lives matter: Oregon justice department searched social media hashtags. Oregonlive.Com, November 10, 2015. http://www.oregonlive.com/politics/index.ssf/2015/11/black_lives_matter_oregon_just.html.
U.N. General Assembly, Convention Relating to the Status of Refugees. July 28, 1951. http://www.unhcr.org/3b66c2aa10.html.
U.N. General Assembly, International Covenant on Civil and Political Rights, G.A. res. 2200A (XXI), December 16, 1966, 21 U.N. GAOR Supp. (No.16) at 52, U.N. Doc. A/6316 (1966), 999 U.N.T.S. 171, entered into force March 23, 1976. http://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx.
U.N. Human Rights Council, 28th Session. Resolution. The Right to Privacy in the Digital Age. (A/HRC/RES/28/16) April 1, 2015. http://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/RES/28/16.
U.N. Human Rights Council. 27th Session. Report of the Office of the United Nations High Commissioner for Human Rights. The Right to Privacy in the Digital Age. (A/HRC/27/37). June 30, 2014. http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf.
United Nations Conference on Trade and Development (UNCTAD), Information Economy Report, 24 March 2015, http://unctad.org/en/PublicationsLibrary/ier2015_en.pdf, pp. 64–65.E.g.
Van den Hoven, Jeroen. 1997. Computer ethics and moral methodology. Metaphilosophy 28(3): 234–248.
Vance, Ashlee, and Brad Stone. 2011. “Palantir, the War on Terror’s Secret Weapon.” Bloomberg.com, December 22, 2011. http://www.bloomberg.com/bw/magazine/palantir-the-vanguard-of-cyberterror-security-11222011.html.
Warren, Samuel D., and Louis D. Brandeis. 1890. The right to privacy. Harvard Law Review, IV(5).
Westin, Alan F. 1968. Privacy and freedom. 25 Washington and Lee Law Review. 166. http://scholarlycommons.law.wlu.edu/wlulr/vol25/iss1/20.
Whitman, James Q. 2004. Two western cultures of privacy: Dignity versus liberty. 113 Yale Law Journal 1153.
Whong, Chris “Foiling NYC’S Taxi Trip Data” Chriswhong.Com. 2016. http://chriswhong.com/open-data/foil_nyc_taxi/.
Williams, Apryl, and Doris Domoszlai. “#Blacktwitter: A Networked Cultural Identity | Harmony Institute”. Harmony-Institute.Org, August 6, 2016. http://harmony-institute.org/latest/2013/08/06/blacktwitter-a-networked-cultural-identity/.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Kammourieh, L. et al. (2017). Group Privacy in the Age of Big Data. In: Taylor, L., Floridi, L., van der Sloot, B. (eds) Group Privacy. Philosophical Studies Series, vol 126. Springer, Cham. https://doi.org/10.1007/978-3-319-46608-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-46608-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-46606-4
Online ISBN: 978-3-319-46608-8
eBook Packages: Religion and PhilosophyPhilosophy and Religion (R0)