Skip to main content Accessibility help
×
Hostname: page-component-cd9895bd7-gvvz8 Total loading time: 0 Render date: 2024-12-25T05:35:58.838Z Has data issue: false hasContentIssue false

12 - Harmful Online Personal Data Practices

Published online by Cambridge University Press:  05 June 2012

Steven A. Hetcher
Affiliation:
Vanderbilt University, Tennessee
Get access

Summary

[Nonconsensual website interactions are] particularly likely when incentives are asymmetrically distributed in the community, as when buyers and sellers have their own conflicting norms. The norm that results from this conflict may represent a variety of things besides consensus: superior bargaining power on the prevailing side, collective action problems on the other side, or the use of strategic behavior.

Mark Lemley

Introduction

There is a burgeoning privacy crisis caused in large part to the explosive growth of the Internet. In large measure, this crisis has emerged in a legal vacuum, as there is little positive lawthat directly regulates the private collection of personal data. Because of this legal vacuum, informal social norms have the potential to play an especially important role in the regulation of data collection online. This chapter begins an examination of the emergence of website norms pertaining to data collection that have emerged in the past decade. This examination will provide another occasion to test the pattern conception of norms developed in Part One and further explored in Part Two. This case study will also be instructive regarding the possibilities for more effective regulation of online privacy, on a going forward basis.

The vast majority of commercial websites use their interactions with consumers as the occasion to collect personal data about these consumers. The connection between the collection of personal data and personal privacy is straightforward; the more personal data that websites collect, store, and use, the less privacy that data subjects have. This reduction in privacy may be justified if the data subjects agree to exchange their personal information for something they prefer more.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2004

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×