[ietf-privacy] Big Data Ethics (was: recent scholarship wrt privacy law, obligations, legal theories & frameworks
=JeffH <Jeff.Hodges@KingsMountain.com> Wed, 14 May 2014 22:59 UTC
Return-Path: <Jeff.Hodges@kingsmountain.com>
X-Original-To: ietf-privacy@ietfa.amsl.com
Delivered-To: ietf-privacy@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D64B61A0342 for <ietf-privacy@ietfa.amsl.com>; Wed, 14 May 2014 15:59:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.803
X-Spam-Level: *
X-Spam-Status: No, score=1.803 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, IP_NOT_FRIENDLY=0.334, RCVD_IN_SORBS_WEB=0.77, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i_t19pNRXenJ for <ietf-privacy@ietfa.amsl.com>; Wed, 14 May 2014 15:59:49 -0700 (PDT)
Received: from gproxy5-pub.mail.unifiedlayer.com (gproxy5-pub.mail.unifiedlayer.com [67.222.38.55]) by ietfa.amsl.com (Postfix) with SMTP id 7CE511A0302 for <ietf-privacy@ietf.org>; Wed, 14 May 2014 15:59:49 -0700 (PDT)
Received: (qmail 20185 invoked by uid 0); 14 May 2014 22:59:42 -0000
Received: from unknown (HELO cmgw2) (10.0.90.83) by gproxy5.mail.unifiedlayer.com with SMTP; 14 May 2014 22:59:42 -0000
Received: from box514.bluehost.com ([74.220.219.114]) by cmgw2 with id 1yzZ1o00G2UhLwi01yzcTf; Wed, 14 May 2014 16:59:41 -0600
X-Authority-Analysis: v=2.1 cv=Q9RBveGa c=1 sm=1 tr=0 a=9W6Fsu4pMcyimqnCr1W0/w==:117 a=9W6Fsu4pMcyimqnCr1W0/w==:17 a=cNaOj0WVAAAA:8 a=f5113yIGAAAA:8 a=4eyjf-e663kA:10 a=g05_jSYIghYA:10 a=3NT3xRclEPMA:10 a=8nJEP1OIZ-IA:10 a=ieNpE_y6AAAA:8 a=XYUc-DgfXtMA:10 a=vS7MmSmxvPQA:10 a=ZpWFGAF8AAAA:8 a=7H0t1Ps8JAV8s_0HJKIA:9 a=wPNLvfGTeEIA:10
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default; h=Content-Transfer-Encoding:Content-Type:Subject:To:MIME-Version:From:Date:Message-ID; bh=EKmp+i16fyv35QKb1G0lwweLqC9qTH1Hl29OyKsIz8U=; b=0ralRgTlrYTHXItAwz9Hi9HoXJvVE6nYVfXy+9pmxwvb9iusDiHxx8mh53Ebk7bZ9FFLMlkyo76q2L7ktewb4AFxtL8aPTZhzdb28k+90s1dUTKQU/Kmy89CwNv4pvUw;
Received: from [216.113.168.128] (port=43313 helo=[10.244.137.220]) by box514.bluehost.com with esmtpsa (TLSv1:DHE-RSA-CAMELLIA256-SHA:256) (Exim 4.82) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1Wki98-00074m-1m; Wed, 14 May 2014 16:59:34 -0600
Message-ID: <5373F553.2030602@KingsMountain.com>
Date: Wed, 14 May 2014 15:59:31 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130330 Thunderbird/17.0.5
MIME-Version: 1.0
To: IETF Privacy discussion list <ietf-privacy@ietf.org>, public-tracking@w3.org
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 216.113.168.128 authed with jeff.hodges+kingsmountain.com}
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf-privacy/rHYFx-ISo1Da7ABodI9r60bMTZM
Subject: [ietf-privacy] Big Data Ethics (was: recent scholarship wrt privacy law, obligations, legal theories & frameworks
X-BeenThere: ietf-privacy@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Internet Privacy Discussion List <ietf-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-privacy/>
List-Post: <mailto:ietf-privacy@ietf.org>
List-Help: <mailto:ietf-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 May 2014 22:59:51 -0000
And, building upon Solove's work, there's this... Big Data Ethics http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2384174 Neil M. Richards Jonathan H. King January 23, 2014 Wake Forest Law Review, 2014 Abstract: We are on the cusp of a "Big Data" Revolution, in which increasingly large datasets are mined for important predictions and often surprising insights. The predictions and decisions this revolution will enable will transform our society in ways comparable to the Industrial Revolution. We are now at a critical moment; big data uses today will be sticky and will settle both default norms and public notions of what is "no big deal" regarding big data predictions for years to come. In this paper, we argue that big data, broadly defined, is producing increased powers of institutional awareness and power that require the development of a Big Data Ethics. We are building a new digital society, and the values we build or fail to build into our new digital structures will define us. Critically, if we fail to balance the human values that we care about, like privacy, confidentiality, transparency, identity and free choice with the compelling uses of big data, our Big Data Society risks abandoning these values for the sake of innovation and expediency. In Part I, we trace the origins and rapid growth of the Information Revolution. In Part II, we call for the development of a "Big Data Ethics," a set of four related principles that should govern data flows in our information society, and inform the establishment of big data norms. First, we must recognize "privacy" as an inevitable system of information rules rather than merely secrecy. Second, we must recognize that shared private information can remain "confidential." Third, we must recognize that big data requires transparency. Fourth, we must recognize that big data can compromise identity. In Part III, we suggest how we might integrate big data ethics into our society. Law will be an important part of Big Data Ethics, but so too must the establishment of ethical principles and best practices that guide government, corporations, and users. We must all be part of the conversation, and part of the solution. Big Data Ethics are for everyone.