{"id":12384,"date":"2019-05-13T07:50:17","date_gmt":"2019-05-13T12:50:17","guid":{"rendered":"http:\/\/sites.law.duq.edu\/juris\/?p=12384"},"modified":"2019-12-02T07:55:49","modified_gmt":"2019-12-02T12:55:49","slug":"data-monetization-without-compensation","status":"publish","type":"post","link":"https:\/\/sites.law.duq.edu\/juris\/2019\/05\/13\/data-monetization-without-compensation\/","title":{"rendered":"Data Monetization Without Compensation"},"content":{"rendered":"<figure id=\"attachment_12385\" aria-describedby=\"caption-attachment-12385\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-12385\" src=\"http:\/\/sites.law.duq.edu\/juris\/wp-content\/uploads\/2019\/05\/kyle-1024x576.jpg\" alt=\"\" width=\"600\" height=\"338\" srcset=\"https:\/\/sites.law.duq.edu\/juris\/wp-content\/uploads\/2019\/05\/kyle-1024x576.jpg 1024w, https:\/\/sites.law.duq.edu\/juris\/wp-content\/uploads\/2019\/05\/kyle-300x169.jpg 300w, https:\/\/sites.law.duq.edu\/juris\/wp-content\/uploads\/2019\/05\/kyle-768x432.jpg 768w, https:\/\/sites.law.duq.edu\/juris\/wp-content\/uploads\/2019\/05\/kyle-98x55.jpg 98w, https:\/\/sites.law.duq.edu\/juris\/wp-content\/uploads\/2019\/05\/kyle-800x450.jpg 800w, https:\/\/sites.law.duq.edu\/juris\/wp-content\/uploads\/2019\/05\/kyle-270x152.jpg 270w, https:\/\/sites.law.duq.edu\/juris\/wp-content\/uploads\/2019\/05\/kyle-580x326.jpg 580w, https:\/\/sites.law.duq.edu\/juris\/wp-content\/uploads\/2019\/05\/kyle.jpg 1280w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption id=\"caption-attachment-12385\" class=\"wp-caption-text\"><em>Photo Credit: Pixabay.com<\/em><\/figcaption><\/figure>\n<p style=\"text-align: center;\"><strong>By Kyle Steenland, Feature Editor<\/strong><\/p>\n<p>The contemporary Wild West pans for its gold not through the streams of Mother Nature, but rather through the streams of internet connections created in the 1990s. This panning has yielded a New Age commodity: data. The value of this digital data rush rivals that of the 1800s gold rush but is now comprised of personal information linked to the veins themselves.<a href=\"#_ftn1\" name=\"_ftnref1\"><sup>[1]<\/sup><\/a> <a href=\"#_ftn2\" name=\"_ftnref2\"><sup>[2]<\/sup><\/a><\/p>\n<p>Permission to \u201cmine\u201d this consumer-created digital gold is often buried in the hundreds of pages of terms and conditions or privacy policies of service providers, revealed only to those few who wade through these documents.<a href=\"#_ftn3\" name=\"_ftnref3\"><sup>[3]<\/sup><\/a> Personal data reveals an individual\u2019s online activity, and the mining of such information exposes consumer\u2019s behavior to the highest bidder.<\/p>\n<p>\u201cData\u201d or \u201cconsumer data\u201d is information consumers create when they use internet services or otherwise engage with digital technologies.<a href=\"#_ftn4\" name=\"_ftnref4\"><sup>[4]<\/sup><\/a> Think of \u201cdata\u201d like trails of fingerprints left on the surfaces of the internet. These fingerprints can range from one\u2019s shopping habits to search queries to anything else individuals do while connected to the internet.<a href=\"#_ftn5\" name=\"_ftnref5\"><sup>[5]<\/sup><\/a> And just like a fingerprint, this form of information can be used to identify its owner.<a href=\"#_ftn6\" name=\"_ftnref6\"><sup>[6]<\/sup><\/a><\/p>\n<p>Companies dust for these digital fingerprints directly and indirectly.<a href=\"#_ftn7\" name=\"_ftnref7\"><sup>[7]<\/sup><\/a> Companies and service providers can indirectly collect this data by tracking consumer behavior through processes like evaluating sales records or similar data.<a href=\"#_ftn8\" name=\"_ftnref8\"><sup>[8]<\/sup><\/a> Direct collection occurs, often explicitly mentioned in the service provider\u2019s privacy policy, whenever an individual uses that company\u2019s services.<a href=\"#_ftn9\" name=\"_ftnref9\"><sup>[9]<\/sup><\/a><\/p>\n<p>The value of these digital fingerprints lies in the very essence of what the commodity is: information. Data presents another avenue for organization to access and connect with their consumer. It provides a window into the consumer\u2019s brain and can be used to predict everything from the consumer\u2019s desires to their next purchase.<a href=\"#_ftn10\" name=\"_ftnref10\"><sup>[10]<\/sup><\/a> This in turn creates an endless number of ways in which this data can provide value to its possessor.<\/p>\n<p>For instance, Google states that whenever an individual uses one of its products, it collects their data trail.<a href=\"#_ftn11\" name=\"_ftnref11\"><sup>[11]<\/sup><\/a> Google then ties the generated information to either an account the individual is signed in to, or, if no account is used, to a \u201cunique identifier.\u201d<a href=\"#_ftn12\" name=\"_ftnref12\"><sup>[12]<\/sup><\/a> Google then uses this data to \u201cprovider better services\u201d as well as to deliver more relevant advertisements.<a href=\"#_ftn13\" name=\"_ftnref13\"><sup>[13]<\/sup><\/a> Other companies use this data to develop products consumers are more likely to be interested in, to offer consulting services to companies,<a href=\"#_ftn14\" name=\"_ftnref14\"><sup>[14]<\/sup><\/a> achieve company goals, or even to refine political campaigns to better target specific demographics.<a href=\"#_ftn15\" name=\"_ftnref15\"><sup>[15]<\/sup><\/a> Data use has become an integral part of contemporary business so much that a 2018 PricewaterhouseCoopers study found that 86% of company executives believed their ability to compete in 2019 depended on \u201ctheir ability to exploit data.\u201d<a href=\"#_ftn16\" name=\"_ftnref16\"><sup>[16]<\/sup><\/a><\/p>\n<p>With such a range of uses, it becomes difficult to quantify the value of data collections or utilization as an industry. However, researchers at the University of Texas estimated that if Fortune 1000 businesses improved data use, it would translate to an increased $2 billion annually.<a href=\"#_ftn17\" name=\"_ftnref17\"><sup>[17]<\/sup><\/a> For reference, the entire valuation of the California gold rush is valued at $2 billion, and that spanned several years.<a href=\"#_ftn18\" name=\"_ftnref18\"><sup>[18]<\/sup><\/a><\/p>\n<p>This valuation begs the question: where is the compensation for gold-creators themselves? Consumers typically receive no compensation for their part in generating this commodity, and the commodity mirrors the consumer themselves.<\/p>\n<p>If a company paid an agent to follow around consumers and take notes on the consumer\u2019s behaviors, there would be societal outrage. The inconvenience would be too tangible to consent to. Digitally, however, that agent exists. We charge it every night before bed and use it for our alarms in the morning. We use to answer our most intimate health questions and to navigate streets to unfamiliar destinations. And in doing so, we share our lives with any party with enough financial interest to look.<\/p>\n<p>This form of data collection is an intangible invasion in our lives and done for the \u201cfree\u201d use of a company\u2019s service \u2013 a consumer\u2019s \u201ccompensation\u201d for the use of our data.<a href=\"#_ftn19\" name=\"_ftnref19\"><sup>[19]<\/sup><\/a> This exchange is the contemporary status quo, creating immense leverage for corporations and an unfair bargaining situation for consumers. With companies in every industry capitalizing on data \u2013 from car manufacturers,<a href=\"#_ftn20\" name=\"_ftnref20\"><sup>[20]<\/sup><\/a> to cell phone companies,<a href=\"#_ftn21\" name=\"_ftnref21\"><sup>[21]<\/sup><\/a> to online retailers,<a href=\"#_ftn22\" name=\"_ftnref22\"><sup>[22]<\/sup><\/a> to a near-infinite list of others \u2013 the collection of your data is inescapable if you want to participate in or avail yourself of the technology of modern society.<\/p>\n<p>The consequence is pressure on the individual to conform with current data practices or risk carrying a significant inconvenience to every societal interaction. Some scholars liken consumers to \u201cdata laborers\u201d that are ripe for exploitation when paired with the current lack of representation and protection.<a href=\"#_ftn23\" name=\"_ftnref23\"><sup>[23]<\/sup><\/a> So where can consumers turn to shelter their personal data from exploitative practices? Or to at least <em>control<\/em> the exploitation?<\/p>\n<p>Few protections exist for our digital identities. Whereas our medical identity receives protections under the Health Insurance Portability and Accountability Act (HIPAA)<a href=\"#_ftn24\" name=\"_ftnref24\"><sup>[24]<\/sup><\/a> and our physical fingerprints are safeguarded by the Fifth Amendment, our digital prints are left vulnerable.<a href=\"#_ftn25\" name=\"_ftnref25\"><sup>[25]<\/sup><\/a> The General Data Protection Regulation (GDPR) in the European Union established some control over an individual\u2019s data use; however the United States lacks any analogous regulation.<a href=\"#_ftn26\" name=\"_ftnref26\"><sup>[26]<\/sup><\/a> This leaves US citizens without any comprehensive federal regulations and forces them to rely on state legislation that often varies state to state.<a href=\"#_ftn27\" name=\"_ftnref27\"><sup>[27]<\/sup><\/a> The only single unifying theme amongst state legislation are mandatory notices for individuals if their information has been \u201ccompromised.\u201d<a href=\"#_ftn28\" name=\"_ftnref28\"><sup>[28]<\/sup><\/a><\/p>\n<p>Individuals now sacrifice what privacy expectations previous generations fought for as compensation for convenient services presenting themselves as without cost. But there is an intangible price affixed to these services \u2013 the erosion of privacy. In this era where the consumer has unwittingly become the product, is that a fair trade?<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Sources<\/strong><\/p>\n<hr \/>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> California Gold Rush, History Channel, https:\/\/www.history.com\/topics\/westward-expansion\/gold-rush-of-1849 (last visited April 8, 2019).<\/p>\n<p><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> Anitesh Barau, Deepa Mani, &amp; Rajiv Mukherjee, <em>Measuring Business Impacts of Effective Data<\/em>, University of Texas, <a href=\"http:\/\/www.datascienceassn.org\/sites\/default\/files\/Measuring%20Business%20Impacts%20of%20Effective%20Data%20I.pdf\">http:\/\/www.datascienceassn.org\/sites\/default\/files\/Measuring%20Business%20Impacts%20of%20Effective%20Data%20I.pdf<\/a> (last visited April 12, 2019).<\/p>\n<p><a href=\"#_ftnref3\" name=\"_ftn3\">[3]<\/a> Caroline Cakebread, <em>You\u2019re not alone, no one reads terms of service agreements<\/em>, Business Insider (Nov. 15, 2017), https:\/\/www.businessinsider.com\/deloitte-study-91-percent-agree-terms-of-service-without-reading-2017-11<\/p>\n<p><a href=\"#_ftnref4\" name=\"_ftn4\">[4]<\/a> <em>Consumer Data<\/em>, TechTarget, <a href=\"https:\/\/searchcio.techtarget.com\/definition\/consumer-data\">https:\/\/searchcio.techtarget.com\/definition\/consumer-data<\/a> (last visited April 12, 2019).<\/p>\n<p><a href=\"#_ftnref5\" name=\"_ftn5\">[5]<\/a> <em><a href=\"https:\/\/searchcio.techtarget.com\/definition\/consumer-data\">Id.<\/a><\/em><\/p>\n<p><a href=\"#_ftnref6\" name=\"_ftn6\">[6]<\/a> <em>Why your online privacy matters<\/em>, Norton by Symantec, <a href=\"https:\/\/us.norton.com\/internetsecurity-privacy-why-your-online-privacy-matters.html\">https:\/\/us.norton.com\/internetsecurity-privacy-why-your-online-privacy-matters.html<\/a> (last visited April 12, 2019).<\/p>\n<p><a href=\"#_ftnref7\" name=\"_ftn7\">[7]<\/a> Adam C. Uzialko, <em>How Businesses Are Collecting Data (And What They\u2019re Doing with It)<\/em>, Business News Daily (August 3, 2019, 2:25 PM), <a href=\"https:\/\/www.businessnewsdaily.com\/10625-businesses-collecting-data.html\">https:\/\/www.businessnewsdaily.com\/10625-businesses-collecting-data.html<\/a>.<\/p>\n<p><a href=\"#_ftnref8\" name=\"_ftn8\">[8]<\/a> <em><a href=\"https:\/\/searchcio.techtarget.com\/definition\/consumer-data\">Id.<\/a><\/em><\/p>\n<p><a href=\"#_ftnref9\" name=\"_ftn9\">[9]<\/a> <em><a href=\"https:\/\/searchcio.techtarget.com\/definition\/consumer-data\">Id.<\/a><\/em><\/p>\n<p><a href=\"#_ftnref10\" name=\"_ftn10\">[10]<\/a> <em>\u00a0Amazon: Using Big Data to understand customers<\/em>, Bernard Marr &amp; Co., <a href=\"https:\/\/www.bernardmarr.com\/default.asp?contentID=712\">https:\/\/www.bernardmarr.com\/default.asp?contentID=712<\/a> (last visited April 12, 2019)<\/p>\n<p><a href=\"#_ftnref11\" name=\"_ftn11\">[11]<\/a> <em>\u00a0Privacy and Terms<\/em>, Google, <a href=\"https:\/\/policies.google.com\/privacy\">https:\/\/policies.google.com\/privacy<\/a> (last visited April 12, 2019).<\/p>\n<p><a href=\"#_ftnref12\" name=\"_ftn12\">[12]<\/a> <em>Id.<\/em><\/p>\n<p><a href=\"#_ftnref13\" name=\"_ftn13\">[13]<\/a> <em>\u00a0Id.<\/em><\/p>\n<p><a href=\"#_ftnref14\" name=\"_ftn14\">[14]<\/a> <em>See<\/em> Capgemini, <em>Big &amp; Fast Data: The Rise of Insight-Driven Business<\/em>, <a href=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2017\/07\/big_fast_data_the_rise_of_insight-driven_business-report.pdf\">https:\/\/www.capgemini.com\/wp-content\/uploads\/2017\/07\/big_fast_data_the_rise_of_insight-driven_business-report.pdf<\/a> (last visited April 12, 2019).<\/p>\n<p><a href=\"#_ftnref15\" name=\"_ftn15\">[15]<\/a> Alex Hern, <em>Cambridge Analytica: how did it turn clicks into votes?<\/em>, The Guardian (May 6, 2018), <a href=\"https:\/\/www.theguardian.com\/news\/2018\/may\/06\/cambridge-analytica-how-turn-clicks-into-votes-christopher-wylie\">https:\/\/www.theguardian.com\/news\/2018\/may\/06\/cambridge-analytica-how-turn-clicks-into-votes-christopher-wylie<\/a>.<\/p>\n<p><a href=\"#_ftnref16\" name=\"_ftn16\">[16]<\/a> PricewaterhouseCoopers, <em>Why trusted data optimization is a priority in 2019<\/em>, PwC,\u00a0 <a href=\"https:\/\/www.pwc.com\/us\/en\/services\/consulting\/cybersecurity\/Trusted-data-optimazation-2019.pdf\">https:\/\/www.pwc.com\/us\/en\/services\/consulting\/cybersecurity\/Trusted-data-optimazation-2019.pdf<\/a> (last visited April 12, 2019).<\/p>\n<p><a href=\"#_ftnref17\" name=\"_ftn17\">[17]<\/a> Barau, Mani, &amp; Mukherjee <em>supra<\/em>, note 2 at 3.<\/p>\n<p><a href=\"#_ftnref18\" name=\"_ftn18\">[18]<\/a> <em>California Gold Rush<\/em>, History Channel, <a href=\"https:\/\/www.history.com\/topics\/westward-expansion\/gold-rush-of-1849\">https:\/\/www.history.com\/topics\/westward-expansion\/gold-rush-of-1849<\/a> (last visited April 12, 2019).<\/p>\n<p><a href=\"#_ftnref19\" name=\"_ftn19\">[19]<\/a> Google, <em>supra<\/em> note 11.<\/p>\n<p><a href=\"#_ftnref20\" name=\"_ftn20\">[20]<\/a> Jeff Plungis, <em>Who Owns the Data Your Car Collects<\/em>, Consumer Reports (May 2, 2018) <a href=\"https:\/\/www.consumerreports.org\/automotive-technology\/who-owns-the-data-your-car-collects\/\">https:\/\/www.consumerreports.org\/automotive-technology\/who-owns-the-data-your-car-collects\/<\/a><\/p>\n<p><a href=\"#_ftnref21\" name=\"_ftn21\">[21]<\/a> <em>See, e.g., <\/em>Jonathan Buckley<em>, How Apple is Using Big Data<\/em>, socPub, <a href=\"https:\/\/www.socpub.com\/articles\/how-apple-is-using-big-data-13719\">https:\/\/www.socpub.com\/articles\/how-apple-is-using-big-data-13719<\/a>; Bernard Marr, <em>The Amazing Ways Samsung Is Using Big Data, Artificial Intelligence And Robots To Drive Performance<\/em>, Forbes (May 30, 2018), <a href=\"https:\/\/www.forbes.com\/sites\/bernardmarr\/2018\/05\/30\/the-amazing-ways-samsung-is-using-big-data-artificial-intelligence-and-robots-to-drive-performance\/#727ab68e2b8d\">https:\/\/www.forbes.com\/sites\/bernardmarr\/2018\/05\/30\/the-amazing-ways-samsung-is-using-big-data-artificial-intelligence-and-robots-to-drive-performance\/#727ab68e2b8d<\/a> (last visited April 26, 2019).<\/p>\n<p><a href=\"#_ftnref22\" name=\"_ftn22\">[22]<\/a> <em>Amazon: Using Big Data to understand customers<\/em>, Bernard Marr &amp; Co., <a href=\"https:\/\/www.bernardmarr.com\/default.asp?contentID=712\">https:\/\/www.bernardmarr.com\/default.asp?contentID=712<\/a> (last visited April 12, 2019).<\/p>\n<p><a href=\"#_ftnref23\" name=\"_ftn23\">[23]<\/a> Imanol Arrieta Ibarra <em>et al<\/em>, <em>Should We Treat Data as Labor? Moving Beyond \u201cFree\u201d<\/em>, 108 American Economic Association 38, 41-42 (2018).<\/p>\n<p><a href=\"#_ftnref24\" name=\"_ftn24\">[24]<\/a> Cameron Kerry, <em>Why protecting privacy is a losing game today \u2013 and how to change the game<\/em>, Brookings (July 12, 2018) https:\/\/www.brookings.edu\/research\/why-protecting-privacy-is-a-losing-game-today-and-how-to-change-the-game.<\/p>\n<p><a href=\"#_ftnref25\" name=\"_ftn25\">[25]<\/a> Nowell D. Bamberger, Melissa Gohlke &amp; Sameer Jaywant, <em>Court Holds That 5th Amendment Self-Incrimination Privilege Precludes Compelling Fingerprint or Facial Recognition Access to Digital Devices<\/em>, Cleary Enforcement Watch (January 23, 2019), https:\/\/www.clearyenforcementwatch.com\/2019\/01\/court-holds-5th-amendment-self-incrimination-privilege-precludes-compelling-fingerprint-facial-recognition-access-digital-devices\/.<\/p>\n<p><a href=\"#_ftnref26\" name=\"_ftn26\">[26]<\/a> Margot Kaminski, <em>Toward defining privacy expectations in an age of oversharing<\/em>, The Economist (August 16, 2018) https:\/\/www.economist.com\/open-future\/2018\/08\/16\/toward-defining-privacy-expectations-in-an-age-of-oversharing.<\/p>\n<p><a href=\"#_ftnref27\" name=\"_ftn27\">[27]<\/a> Nuala O\u2019Connor, <em>Reforming the U.S. Approach to Data Protection and Privacy<\/em>, Council on Foreign Relations (January 30, 2018) <a href=\"https:\/\/www.cfr.org\/report\/reforming-us-approach-data-protection\">https:\/\/www.cfr.org\/report\/reforming-us-approach-data-protection<\/a><\/p>\n<p><a href=\"#_ftnref28\" name=\"_ftn28\">[28]<\/a> <em>Id.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Kyle Steenland, Feature Editor The contemporary Wild West pans for its gold not through the streams of Mother Nature, but rather through the streams of internet connections created in the 1990s. This panning has yielded a New Age commodity: data. The value of this digital data rush rivals that [\u2026] <\/p>\n<div class=\"clear\"><\/div>\n<p><a class=\"more_link clearfix\" href=\"https:\/\/sites.law.duq.edu\/juris\/2019\/05\/13\/data-monetization-without-compensation\/\" rel=\"nofollow\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":12385,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2092],"tags":[2920,2922,2919,2252,2921,2182,57,2925,2923,2924],"class_list":["post-12384","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-features-articles","tag-consumer-data","tag-data-mining","tag-data-monetization","tag-data-privacy","tag-digital-fingerprints","tag-kyle-steenland","tag-privacy","tag-privacy-expectations","tag-right-to-compensation","tag-right-to-privacy"],"_links":{"self":[{"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/posts\/12384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/comments?post=12384"}],"version-history":[{"count":1,"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/posts\/12384\/revisions"}],"predecessor-version":[{"id":12386,"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/posts\/12384\/revisions\/12386"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/media\/12385"}],"wp:attachment":[{"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/media?parent=12384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/categories?post=12384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/tags?post=12384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}