Big Data and the Future for Privacy
Big Data and the Future for Privacy
Louis
Washington University Open Scholarship
2016
Jonathan H. King
Part of the Legal Ethics and Professional Responsibility Commons, Legal Studies Commons, Privacy
Law Commons, and the Science and Technology Law Commons
Repository Citation
Richards, Neil M. and King, Jonathan H., "Big Data and the Future for Privacy" (2016).
Scholarship@WashULaw. 500.
https://openscholarship.wustl.edu/law_scholarship/500
This Book Section is brought to you for free and open access by the Law School at Washington University Open
Scholarship. It has been accepted for inclusion in Scholarship@WashULaw by an authorized administrator of
Washington University Open Scholarship. For more information, please contact digital@wumail.wustl.edu.
Big Data and the Future For Privacy
Neil M. Richards
Jonathan H. King
Abstract
In our inevitable big data future, critics and skeptics argue that
privacy will have no place. We disagree. When properly
understood, privacy rules will be an essential and valuable part of
our digital future, especially if we wish to retain the human values
on which our political, social, and economic institutions have been
built. In this paper, we make three simple points. First, we need to
think differently about “privacy.” Privacy is not merely about
keeping secrets, but about the rules we use to regulate
information, which is and always has been in intermediate states
between totally secret and known to all. Privacy rules are
information rules, and in an information society, information
rules are inevitable. Second, human values rather than privacy
for privacy’s sake should animate our information rules. These
must include protections for identity, equality, security, and trust.
Third, we argue that privacy in our big data future can and must
be secured in a variety of ways. Formal legal regulation will be
necessary, but so too will “soft” regulation by entities like the
Federal Trade Commission, and by the development of richer
notions of big data ethics.
Neil M. Richards*
Jonathan H. King**
Big data is our future, but what place will privacy have in
that future? Many technologists and futurists predict a digital
future in which privacy has no place (Barnett, 2010; Ferenstein,
2013). Others argue that the benefits of open data and data science
mean that certain kinds of privacy rules (like limitations on
collection or deletion requirements) make privacy either an obstacle
to progress or something highly impractical to enforce in our
ubiquitous digital future (Mundie, 2014; Toobin, 2014). Data
scientists consider privacy to be an obstacle to the kind of
innovative work they want to do, while the leading manuals for data
warehouse engineers largely ignore considerations of privacy
altogether (Birnhack et al., 2015). At the level of theory, then,
privacy is an anachronism hostile to progress, while at the level of
practice, it is just impractical and gets in the way of doing things.
Such accounts are common, but their dismissal of privacy as
a foolish anachronism is belied by both common sense and a small
but growing scholarly and public literature about the importance of
privacy for the kind of sustainable, humanist society we should
want to build. In this paper, we attempt to lay out some of the legal
and ethical principles we should build into that future society.
B. “Soft Regulation”
We are pragmatic enough to realize that formal regulation
along the lines of statutes or agency rulemaking will not be able to
18 Big Data and the Future for Privacy [2016
References
Barocas, S., & Nissenbaum, H. (2014). Big Data’s End Run Around Anonymity and
Consent. In J. Lane et al. (Eds.), Privacy, Big Data, and the Public Good: Frameworks
for Engagement (pp. 44-74). Cambridge, GB: Cambridge University Press. Barocas &
Nissenbaum, 2014a.
Barocas, S., & Nissenbaum, H. (2014). Big Data’s End Run Around Procedural Privacy
Protection. Communications of the ACM, 57,31-33. Barocas & Nissenbaum, 2014a.
Barrett, P.M. (2014). Forget the Gossip, These Are the Lessons of the Sony Hack.
Bloomberg Businessweek. Retrieved from http://www.bloomberg.com/bw/articles/2014-
12-16/forget-the-gossip-these-are-the-lessons-of-the-sony-hack#p1.
Birnhack, M., et al. (2015). Privacy Mindset, Technological Mindset. Jurimetrics, 55.
Retrieved from http://papers.srn.com/sol3/papers.cfm?abstract_id=2471415.
Calo, M. R. (2011). The Boundaries of Privacy Harm, Indiana Law Journal, 68(1).
Calo, M. R. (2013). Consumer Subject Review Boards: A Thought Experiment. Stanford
Law Review Online, 66, 97.
Calo, M. R. (2014). Digital Market Manipulation. George Washington Law Review, 82,
995.
Cao, Y., & Forrest, E. (2009). Hard vs. Soft Regulation and the Paradoxes of Internet
Privacy. Journal of Global Business Management, 5(2).
Cate, F. H., et al. (2013). Data Protection Principles for the 21st Century: Revising the
1980 OECD Guidelines. Microsoft Corporation. Retrieved from
http://www.oii.ox.ac.uk/publications/Data_Protection_Principles_for_the_21st_Century.p
df
Cohen, J. E. (2013). What Privacy is For. Harvard Law Review, 126, 1904.
Crawford, K., & Schultz, J. (2014). Big Data and Due Process: Toward a Framework to
Redress Predictive Privacy Harms. Boston College Law Review, 55, 93-99.
Drozdiak, N., & Schechner, S., (2015). EU Court Says Data-Transfer Pact With U.S.
Violates Privacy. The Wall Street Journal. Retrieved from
http://www.wsj.com/articles/eu-court-strikes-down-trans-atlantic-safe-harbor-data-
transfer-pact-1444121361.
Dwork, C., & Mulligan, D. (2013). It’s Not Privacy, and It’s Not Fair. Stanford Law
Review Online, 66, 35.
Ewing, A. (2014). Ericsson Teams With Guardtime in $69 Billion Data-Safety Market.
Bloomberg. Retrieved from http://www.bloomberg.com/news/2014-09-03/ericsson-
teams-with-guardtime-in-69-billion-data-safety-market.html.
2016] Big Data and the Future for Privacy 23
Gillion, J. (2006). Overseers of the Poor: Surveillance, Resistance and the Limits of
Privacy. Chicago, IL: University of Chicago Press.
Google Spain Case (2014). Case C-131/12, Google Spain SL and Google Inc. v. Agencia
Española de Protección de Datos and Mario Costeja González ECJ.
Haggerty, K., & Ericson, R. V. (2006). The New Politics of Surveillance And Visibility.
Buffalo, NY: University of Toronto Press.
Hartzog, W. (2015). The Public Information Problem. Unpublished manuscript on file
with authors.
Hill, K. (2014). Stolen Nude Images Reveal Celebs’ Location Information. Forbes.
Retrieved from http://www.forbes.com/sites/kashmirhill/2014/09/02/leaked-nude-images-
reveal-celebs-location-information/.
Hirsch, D, & King, J. (2015). Big Data Sustainability, An Environmental Systems
Analogy. Unpublished manuscript on file with authors.
Kulk, S., & Borgesius, F. Z. (2014). Google Spain v. González: Did the Court Forget
about Freedom of Expression? European Journal of Risk Regulation. Retrieved from
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2491486.
Leonard, A. (2013). How Netflix Is Turning Viewers into Puppets. Salon. Retrieved from
http://www.salon.com/2013/02/01/how_netflix_is_turning_viewers_into_puppets.
Lyon, D. (2003). Surveillance After September 11. Malden, MA: Polity Press in
association with Blackwell Pub. Inc.
Lyon, D. (2003). Surveillance As A Social Sorting. London, NY: Routlede. Lyon 2003a.
Macklem, T. (2008). Independence of Mind. Oxford, NY: Oxford University Press.
O’Connor, N. (2014). Encryption Makes Us All Safer. Center For Democracy &
Technology Blog. Retrieved from https://cdt.org/blog/encryption-makes-us-all-safer/.
Pentland, S. (2014). Social Physics. New York, NY: The Penguin Press.
Peppet, S. (2011) Unraveling privacy: The personal prospectus and the threat of a full-
disclosure future, Northwestern University Law Review, 105: 1153-
1204. https://www.law.northwestern.edu/lawreview/v105/n3/1153/LR105n3Peppet.pdf
Podesta, J. (2014). Findings of the Big Data and Privacy Working Group Review. The
White House Blog. Retrieved from http://www.whitehouse.gov/blog/2014/05/01/findings-
big-data-and-privacy-working-group-review.
Polonetsky, J., & Wolf, C. (2014). Big Data: A Tool for Fighting Discrimination and
Empowering Groups. Future of Privacy Forum. Retrieved from
http://www.futureofprivacy.org/wp-content/uploads/Big-Data-A-Tool-for-Fighting-
Discrimination-and-Empowering-Groups-Report1.pdf.
Reidenberg, J. R., et al. (2014). Privacy Harms and the Effectiveness of the Notice and
Choice Framework. Retrieved from
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2418247.
Richards, N. M. (2006). The Information Privacy Law Project, Georgetown Law Journal,
94, 1087.
Richards, N. M. (2015). Intellectual Privacy. New York, NY: Oxford University Press.
Richards, N. M. (2015). Why Data Privacy Law is (Mostly) Constitutional. William &
Mary Law Review, 56, 1501. Richards 2015a.
Richards, N. M. (2015). Four Privacy Myths: In a world without privacy? Cambridge,
MA: Austin Sarat. Richards 2015b.
Richards, N. M., & Hartzog, W. (2015). A Theory of Privacy and Trust. Working paper
on file with authors.
Richards, N. M., & King, J. H. (2013), Three Paradoxes of Big Data. Stanford Law
Review Online, 66, 41-44.
Richards, N. M., & King, J. H. (2014). Big Data Ethics, Wake Forest Law Review, 49,
393 (2014).
Rosenbush, S., & Boulton, C. (2014). Data Encryption Will strengthen Privacy Over
Long Run, Former CIA Official Says. The Wall Street Journal. Retrieved from
http://blogs.wsj.com/cio/2014/10/01/data-encryption-will-strengthen-privacy-over-long-
run-former-cia-official-says/.
Rubinstein, I. (2014). Voter Privacy in the Age of Big Data. Wisconsin Law Review 2014,
861.
2016] Big Data and the Future for Privacy 25
Salmon, F. (2013). Why the Internet is Perfect for Price Discrimination. Reuters.
Retrieved from http://blogs.reuters.com/felix-salmon/2013/09/03/why-the-internet-is-
perfect-for-price-discrimination/.
Schneier, B. (2014). Stop the Hysteria over Apple Encryption. Schneier On Security
Blog. Retrieved from
https://www.schneier.com/essays/archives/2014/10/stop_the_hysteria_ov.html.
Schrems Case (2015). Case C-362/14, Maximillian Schrems v. Data Protection
Commissioner ECJ.
Schneider, K. F. et al. (2015). Framing the Big Data Ethics Debate for the Military.
National Defense University Press. Retrieved from
http://ndupress.ndu.edu/Media/News/NewsArticleView/tabid/7849/Article/581865/jfq-
77-framing-the-big-data-ethics-debate-for-the-military.aspx.
Sidel, R. (2014). Home Depot’s 56 Million Card Breach Bigger Than Target’s. The Wall
Street Journal. Retrieved from http://online.wsj.com/articles/home-depot-breach-bigger-
than-targets-1411073571.
Solove, D.J. (2004). The Digital Person. New York, NY: New York University Press.
Solove, D. J. (2008). Understanding Privacy. Cambridge, MA: Harvard University Press.
Solove, D.J., & Richards, N. M. (2007). Privacy’s Other Path: Recovering the Law of
Confidentiality. Georgetown Law Journal 96, 123.
Solove, D. J. (2013). Privacy Self-Management and the Consent Dilemma. Harvard Law
Review, 126, 1880.
Solove, D. J., & Hartzog, W. (2014). The FTC and the New Common Law of Privacy.
Columbia Law Review, 114, 583.
White, A., & Benoit, A. (2014). ‘Google It’ Becomes ‘Hide It’ After Right To Be
Forgotten. Bloomberg. Retrieved from http://www.bloomberg.com/news/2014-07-09/-
google-it-becomes-hide-it-after-right-to-be-forgotten.html.
Wingfeld, N. (2014). Microsoft’s Top Lawyer Is The Tech World’s Envoy. The New
York Times. Retrieved from http://www.nytimes.com/2014/07/21/technology/microsofts-
top-lawyer-is-the-tech-worlds-envoy.html?_r=0.
Wohlsen, Marcus Facebook Won’t Stop Experimenting on Your. It’s Just Too Lucartive,
WIRED, Jan. 2, 2014, available at http://www.wired.com/2014/10/facebook-wont-stop-
experimenting-just-lucrative/?mbid=social_twitter.
World Economic Forum. (2013). Unlocking the Value of Personal Data: From
Collection to Usage. Geneva, CH: World Economic Forum.
Zuckerman, E. (2014). The Internet’s Original Sin. The Atlantic. Retrieved from
http://m.theatlantic.com/technology/archive/2014/08/advertising-is-the-internets-original-
sin/376041/?curator=MediaREDEF#.
i
Technically, free speech is a regulation of the regulation of information flows, since it
restricts governments from restricting information flows that are “free speech.”
(Richards 2015a)
ii
E.g., Electronic Communications Privacy Act, 18 U.S.C. § 2501 et seq.; Fair Credit
Reporting Act, 15 U.S.C. § 1681 et seq.