Abstract
In this commentary I argue that the ethical issues surrounding online data privacy are not unique and instead involve timeless features of transactions in the market. I explain how we can turn to what justifies the market most generally in analysing such issues. The use of any truncated account of the justification of the market, I argue, will mislead us into coming to either the wrong conclusions or to no conclusions about the ethics of online data privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
To be more specific, in most cases, the ISPs cannot see a user’s PII (personally identifiable information), a user’s session identity and the data they are requesting or receiving from websites. This is because virtually all sites use SSL (Secure Socket Layer) encryption. What ISPs can see are the sites users visit. This is because the SSL certificate includes the site’s SSL registration (like Amazon, Facebook, Gmail etc.). It is in this way that they can collect data about what sites you visit at specific times of the day and sell that data to third parties.
- 3.
Cicero, Selected Works, ed. Michael Grant (London: Penguin 1971), 177–180.
- 4.
Joseph Heath has recently identified some of the norms that underlie appropriate market behavior. He describes four: (a) do not exploit market failure, (b) do not cheat, (c) do not game the rules, and (d) refuse to lobby against regulations designed to correct market imperfections (Heath 2014, 113). This is one step closer, but the generality of the justification I am seeking also offers an explanation of why following these norms brings value.
References
Material they disseminate? Richmond Journal of Law & Technology, 5, 7, Winter, at http://jolt.richmond.edu/v5i2/boehm.html
Cicero, M. 1971. Selected Works, (M. Grant, ed.). London: Penguin.
Downes, L. (2016). The Downside of the FCC's New Privacy Rules. Harvard Business Review.Retrieved November 4, 2016: https://hbr.org/2016/05/the-downside-of-the-fccs-new-internet-privacy-rules
Elia, J. (2009). Transparency rights, technology and trust. Ethics and Information Technology, 11(2), 145–153.
Federal Trade Commission. (2009). FTC shuts down notorious rogue internet service provider: 3FN service specializes in hosting spam-spewing botnets, phishing web sites, child pornography, and other illegal, malicious web content. Federal Trade Commission, http://www.ftc.gov/opa/2009/06/3fn.shtm
Federal Communications Commissions (2016a). Protecting the Privacy of Customers of Broadband and Other Telecommunications Services. Retrieved November 4, 2016: https://apps.fcc.gov/edocs_public/attachmatch/FCC-16-39A1.pdf
Federal Communications Commissions (2016b). Press Release, FCC Proposes to Give Broadband Consumers Increased Choice, Transparency and Security for their Personal Data. Retrieved November 4, 2016: https://apps.fcc.gov/edocs_public/attachmatch/DOC-338679A1.pdf.
Heath, J. (2014). Morality, competition, and the firm: The market failures approach to business ethics (p. 113). Oxford: Oxford University Press.
Holley, D. M. (1998). Information disclosure in sales. Journal of Business Ethics, 17(6), 631–641.
Martin, K. (2015). Understanding privacy online: Development of a social contract approach to privacy. Journal of Business Ethics.
Pollach, I. (2011). Online privacy as a corporate social responsibility: An empirical study. Business Ethics, 20(1), 88–102.
Uslaner, E. M. (2004). Trust, civic engagement, and the internet. Political Communication, 21(2), 223–242.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Baker, J. (2017). Online Data Privacy and the Justification of the Market. In: Taddeo, M., Floridi, L. (eds) The Responsibilities of Online Service Providers. Law, Governance and Technology Series, vol 31. Springer, Cham. https://doi.org/10.1007/978-3-319-47852-4_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-47852-4_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47851-7
Online ISBN: 978-3-319-47852-4
eBook Packages: Law and CriminologyLaw and Criminology (R0)