[ietf-privacy] Big Data Ethics (was: recent scholarship wrt privacy law, obligations, legal theories & frameworks

=JeffH <Jeff.Hodges@KingsMountain.com> Wed, 14 May 2014 22:59 UTC

Return-Path: <Jeff.Hodges@kingsmountain.com>
X-Original-To: ietf-privacy@ietfa.amsl.com
Delivered-To: ietf-privacy@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D64B61A0342 for <ietf-privacy@ietfa.amsl.com>; Wed, 14 May 2014 15:59:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.803
X-Spam-Level: *
X-Spam-Status: No, score=1.803 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, IP_NOT_FRIENDLY=0.334, RCVD_IN_SORBS_WEB=0.77, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i_t19pNRXenJ for <ietf-privacy@ietfa.amsl.com>; Wed, 14 May 2014 15:59:49 -0700 (PDT)
Received: from gproxy5-pub.mail.unifiedlayer.com (gproxy5-pub.mail.unifiedlayer.com [67.222.38.55]) by ietfa.amsl.com (Postfix) with SMTP id 7CE511A0302 for <ietf-privacy@ietf.org>; Wed, 14 May 2014 15:59:49 -0700 (PDT)
Received: (qmail 20185 invoked by uid 0); 14 May 2014 22:59:42 -0000
Received: from unknown (HELO cmgw2) (10.0.90.83) by gproxy5.mail.unifiedlayer.com with SMTP; 14 May 2014 22:59:42 -0000
Received: from box514.bluehost.com ([74.220.219.114]) by cmgw2 with id 1yzZ1o00G2UhLwi01yzcTf; Wed, 14 May 2014 16:59:41 -0600
X-Authority-Analysis: v=2.1 cv=Q9RBveGa c=1 sm=1 tr=0 a=9W6Fsu4pMcyimqnCr1W0/w==:117 a=9W6Fsu4pMcyimqnCr1W0/w==:17 a=cNaOj0WVAAAA:8 a=f5113yIGAAAA:8 a=4eyjf-e663kA:10 a=g05_jSYIghYA:10 a=3NT3xRclEPMA:10 a=8nJEP1OIZ-IA:10 a=ieNpE_y6AAAA:8 a=XYUc-DgfXtMA:10 a=vS7MmSmxvPQA:10 a=ZpWFGAF8AAAA:8 a=7H0t1Ps8JAV8s_0HJKIA:9 a=wPNLvfGTeEIA:10
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default; h=Content-Transfer-Encoding:Content-Type:Subject:To:MIME-Version:From:Date:Message-ID; bh=EKmp+i16fyv35QKb1G0lwweLqC9qTH1Hl29OyKsIz8U=; b=0ralRgTlrYTHXItAwz9Hi9HoXJvVE6nYVfXy+9pmxwvb9iusDiHxx8mh53Ebk7bZ9FFLMlkyo76q2L7ktewb4AFxtL8aPTZhzdb28k+90s1dUTKQU/Kmy89CwNv4pvUw;
Received: from [216.113.168.128] (port=43313 helo=[10.244.137.220]) by box514.bluehost.com with esmtpsa (TLSv1:DHE-RSA-CAMELLIA256-SHA:256) (Exim 4.82) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1Wki98-00074m-1m; Wed, 14 May 2014 16:59:34 -0600
Message-ID: <5373F553.2030602@KingsMountain.com>
Date: Wed, 14 May 2014 15:59:31 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130330 Thunderbird/17.0.5
MIME-Version: 1.0
To: IETF Privacy discussion list <ietf-privacy@ietf.org>, public-tracking@w3.org
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 216.113.168.128 authed with jeff.hodges+kingsmountain.com}
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf-privacy/rHYFx-ISo1Da7ABodI9r60bMTZM
Subject: [ietf-privacy] Big Data Ethics (was: recent scholarship wrt privacy law, obligations, legal theories & frameworks
X-BeenThere: ietf-privacy@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Internet Privacy Discussion List <ietf-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-privacy/>
List-Post: <mailto:ietf-privacy@ietf.org>
List-Help: <mailto:ietf-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 May 2014 22:59:51 -0000

And, building upon Solove's work, there's this...


Big Data Ethics
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2384174

Neil M. Richards
Jonathan H. King

January 23, 2014

Wake Forest Law Review, 2014

Abstract:

We are on the cusp of a "Big Data" Revolution, in which increasingly large 
datasets are mined for important predictions and often surprising insights. 
The predictions and decisions this revolution will enable will transform our 
society in ways comparable to the Industrial Revolution. We are now at a 
critical moment; big data uses today will be sticky and will settle both 
default norms and public notions of what is "no big deal" regarding big data 
predictions for years to come.

In this paper, we argue that big data, broadly defined, is producing 
increased powers of institutional awareness and power that require the 
development of a Big Data Ethics. We are building a new digital society, and 
the values we build or fail to build into our new digital structures will 
define us. Critically, if we fail to balance the human values that we care 
about, like privacy, confidentiality, transparency, identity and free choice 
with the compelling uses of big data, our Big Data Society risks abandoning 
these values for the sake of innovation and expediency.

In Part I, we trace the origins and rapid growth of the Information 
Revolution. In Part II, we call for the development of a "Big Data Ethics," 
a set of four related principles that should govern data flows in our 
information society, and inform the establishment of big data norms. First, 
we must recognize "privacy" as an inevitable system of information rules 
rather than merely secrecy. Second, we must recognize that shared private 
information can remain "confidential." Third, we must recognize that big 
data requires transparency. Fourth, we must recognize that big data can 
compromise identity. In Part III, we suggest how we might integrate big data 
ethics into our society. Law will be an important part of Big Data Ethics, 
but so too must the establishment of ethical principles and best practices 
that guide government, corporations, and users. We must all be part of the 
conversation, and part of the solution. Big Data Ethics are for everyone.