Skip to main content

Law-Technology Lag or Law as Technology in the Big Data Age

  • Chapter
  • First Online:
Portuguese Philosophy of Technology

Part of the book series: Philosophy of Engineering and Technology ((POET,volume 43))

  • 165 Accesses

Abstract

In an data-driven world, people increasingly value the protection and security of their personal data. Many states have adopted or are in the process of adopting data protection laws based on principles similar to those of the General Data Protection Regulation (GDPR) of the European Union, resulting in a global convergence of data protection rules. Yet doubts may arise regarding the ability of the GDPR to effectively safeguard data protection principles and rights in the age of big data and related algorithmic decision-making. Against this background, the choice of the risk-based approach as the key law enforcement mode under the GDPR might be interpreted to be a result of the recognition of a law/technology lag in this instance, in the sense of an intrinsic difficulty of the law in dealing with the pervasiveness and automation involved in present-day collection, circulation and use of the data. The risk-based approach leaves data protection decisions mainly to the data controllers. A better explanation for the GDPR’s novel enforcement mode may be found in the “law as technology” proposition, meaning a law intended to liberate the use of digital technologies. In the context of its strategy for a data-driven economy, the EU had shown its concern with European lateness in embracing the data revolution. Accordingly, EU data protection reform has been meant to reduce the administrative burden on the data controllers and processors so as to further the competitiveness of the digital single market. As a consequence, data protection will ultimately depend on how the data controllers will meet their greater responsibilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    By February 2020, the Commission had recognised 13 countries as providing adequate level of protection for personal data (European Commission, 2020).

  2. 2.

    The Article 29 Data Protection Working Party defined the data controller as the natural or legal person, public authority, agency or any other body, which alone or jointly with others determines the purposes and means of the processing of personal data, and the data processor as a natural or legal person, public authority, agency or any other body, which processes personal data on behalf of the controller. See Opinion 1/2010 on the concepts of “controller” and “processor”, adopted on 16 February 2010, https://ec.europa.eu/justice/article-29/documentation/opinion-recommendation/files/2010/wp169_en.pdf

  3. 3.

    According to the International Organization for Standardization (ISO), data is “a reinterpretable representation of information in a formalized manner, suitable for communication, interpretation or processing”. Data can either be created/authored by people or generated by machines/sensors, often as a “by-product”. Examples are geospatial information, statistics, weather data, research data, etc.”, https://www.iso.org/obp/ui/#iso:std:iso-iec:11179:-4:ed-2:en. Big Data is a data set(s) with characteristics (e.g. volume, velocity, variety, variability, veracity, etc.) that for a particular problem domain at a given point in time cannot be efficiently processed using current/existing/established/traditional technologies and techniques in order to extract value, https://www.iso.org/files/live/sites/isoorg/files/developing_standards/docs/en/big_data_report-jtc1.pdf

  4. 4.

    See “Les assureurs demandent à leurs clients de se mettre à nu. Generali lance une assurance ‘comportementale’ dans la santé. Une première en France”, and “Assurance: votre vie privée vaut bien une ristourne”, Le Monde 7 September 2016. The case of the reuse by Cambridge Analytica of thousands of profiles provided by Facebook, rendered public in 2018, also illustrates this point (Gibney, 2018).

  5. 5.

    Note that the term “risk” appears 76 times in the text of the GDPR, whereas it appeared 8 times in the text of Directive 95/46/EC (including the whereases).

  6. 6.

    A somewhat similar trend towards reliance on the self-regulation and responsibility of operators may be found in Directive (EU) 2019/790 on copyright and neighbouring rights in the digital single market, which has been regarded as “favouring private ordering over public policy” (Quintais, 2020).

  7. 7.

    Self-defence by the data subjects is given more strength through the novel right to be forgotten (Article 17 GDPR), empowering data subjects to obtain from the controller the erasure of personal data concerning him or her without undue delay where one of a series of grounds enumerated in the article concerned applies. Also here, it is up to the data controller to evaluate whether the values or interests underlying the right to be forgotten are surpassed by other values, namely the right of freedom of expression and information, or specific duties by the data controller such as to comply with a legal obligation which requires processing or to perform a task carried out in the public interest or in the exercise of official authority vested in the controller, etc.

  8. 8.

    Both the EDPS and the Article 29 DPWP demanded that the data subjects be given access to their profiles, as well as to the logic used in algorithms to determine the profiles (Article 29 DPWP, 2013b). Some everyday examples where the logic of decision-making should be disclosed include a personalised car insurance scheme (using car sensor data to judge driving habits); credit scoring services; a pricing and marketing system that determines how much discount an individual will receive or what media content to recommend to an individual. Transparency could include, for example, informing people about re-identification risks stemming from data collected about them (Narayanan et al., 2016).

  9. 9.

    In the USA, an initiative by the Federal Trade Commission named “Reclaim Your Name” is meant to empower the consumer to find out how brokers are collecting and using data; give her access to information that data brokers have amassed about her; allow her to opt-out if she learns a data broker is selling her information for marketing purposes; and provide her the opportunity to correct errors in information used for substantive decisions like credit, insurance, employment, and other benefits, https://www.ftc.gov/sites/default/files/documents/public_statements/reclaim-your-name/130626computersfreedom.pdf

  10. 10.

    Recital 71 states the data subject’s right to obtain an explanation on how the decision was reached.

  11. 11.

    The World Economic Forum emphasised the importance of ensuring understanding beyond transparency, in the following terms: “People need to understand how data is being collected, whether with their consent or without – through observations and tracking mechanisms, given the low cost of gathering and analysing data”, and added, “From Passive consent to engaged Individuals: Too often the organizations collecting and using data see their role as a yes-no/on-off degree of consent. New ways are needed to allow individuals to exercise more choice and control over this data that affects their lives”; “From Black to White to Shades of Gray: the context by which data is collected and used matters significantly”, World Economic Forum, Unlocking the Value of Personal Data: From Collection to Usage, http://www3.weforum.org/docs/WEF_IT_UnlockingValuePersonalData_CollectionUsage_Report_2013.pdf

  12. 12.

    Comparison with theory and practice of risk regulation in other fields may indeed help us to figure out the drawbacks of the risk-based approach to data protection as it is presently designed (Beck, 2009; Wiener et al., 2011).

References

Official Documents

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maria Eduarda Gonçalves .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gonçalves, M.E. (2023). Law-Technology Lag or Law as Technology in the Big Data Age. In: Jerónimo, H.M. (eds) Portuguese Philosophy of Technology. Philosophy of Engineering and Technology, vol 43. Springer, Cham. https://doi.org/10.1007/978-3-031-14630-5_15

Download citation

Publish with us

Policies and ethics