Book contents
- The Privacy Fallacy
- The Privacy Fallacy
- Copyright page
- Dedication
- Contents
- Acknowledgments
- Abbreviations
- Introduction
- 1 The Traditionalist Approach to Privacy
- 2 Privacy Myths
- 3 The Consent Illusion
- 4 Manipulation by Design
- 5 Traditionalist Data Protection Rules
- 6 Pervasive Data Harms
- 7 Privacy as Corporate Accountability
- Conclusion
- Notes
- Index
5 - Traditionalist Data Protection Rules
Published online by Cambridge University Press: 16 November 2023
- The Privacy Fallacy
- The Privacy Fallacy
- Copyright page
- Dedication
- Contents
- Acknowledgments
- Abbreviations
- Introduction
- 1 The Traditionalist Approach to Privacy
- 2 Privacy Myths
- 3 The Consent Illusion
- 4 Manipulation by Design
- 5 Traditionalist Data Protection Rules
- 6 Pervasive Data Harms
- 7 Privacy as Corporate Accountability
- Conclusion
- Notes
- Index
Summary
Chapter 5 examines traditional data protection law’s regulatory outcomes. It shows why data rights and rules, while desirable, don’t address the core problems of the contracts model and can’t work well without the liability model. Data rights unintendedly impose administrative burdens on those they protect. Mandatory rules better address power asymmetries and manipulation than defaults. But our procedural rules overregulate while they underprotect: they benefit large players by adversely affecting new players and they allow companies to comply merely by following box-ticking exercises. Against this backdrop, laws legitimize exploitation that can be executed while remaining compliant. A risk-reduction approach based on standards would reduce informational exploitation.
Keywords
- Type
- Chapter
- Information
- The Privacy FallacyHarm and Power in the Information Economy, pp. 88 - 109Publisher: Cambridge University PressPrint publication year: 2023