Skip to main content
Erschienen in: Ethics and Information Technology 2/2014

01.06.2014 | Original Paper

The crisis of consent: how stronger legal protection may lead to weaker consent in data protection

verfasst von: Bart W. Schermer, Bart Custers, Simone van der Hof

Erschienen in: Ethics and Information Technology | Ausgabe 2/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this article we examine the effectiveness of consent in data protection legislation. We argue that the current legal framework for consent, which has its basis in the idea of autonomous authorisation, does not work in practice. In practice the legal requirements for consent lead to ‘consent desensitisation’, undermining privacy protection and trust in data processing. In particular we argue that stricter legal requirements for giving and obtaining consent (explicit consent) as proposed in the European Data protection regulation will further weaken the effectiveness of the consent mechanism. Building on Miller and Wertheimer’s ‘Fair Transaction’ model of consent we will examine alternatives to explicit consent.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
1
See article 7a of Directive 95/46/EC of the European Parliament and the European Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data.
 
2
By an effective consent we mean a consent that fulfills its moral and societal requirements.
 
3
See for instance: Pollach (2007), Acquisti (2009), Böhme and Köpsell (2010), Adjerid et al. (2013) and Solove (2013).
 
4
Privacy statement, privacy policy and privacy notice are used interchangeably in practice and in literature. We will use the term privacy policy when we mean the privacy principles and procedures of data controllers. We will use the term privacy notice to describe the document that explains these policies to data subjects.
 
5
Proposal for a Regulation of the European Parliament and the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), Brussels, 25.1.2012 (com)2012 final, article 4(8) jo article 7.
 
6
An element that is not included in the requirements set forth by Faden and Beauchamp is that of legal and moral authority. For a consent transaction to be morally transformative, the person who consents must have the moral and/or legal authority to give the consent. For instance: I may consent to one of my friends taking the crown of Her Majesty the Queen of England, but since I have no authority over her property, the consent will do little to change the act from a theft to a legitimate action.
 
7
Alice’s action can also be construed as an inaction (failing to close the door).
 
8
See for instance: Oregon Revised Statutes, Vol. 17, Chapter 813 §135.
 
9
See, for instance, article 8 of the European Convention of Human Rights.
 
10
The ethics of consent are discussed in far more depth in relation to bioethics and medicine. In these contexts the term informed consent is generally used.
 
11
Article 29 Working Party (2011), Opinion 15/2011 on the definition of consent p. 25.
 
12
Article 29 Working Party (2011), Opinion 15/2011 on the definition of consent.
 
13
The Article 29 Working Party is the body of national data protection authorities set up under article 29 of Directive 95/46/EC.
 
14
Article 29 Working Party (2011), Opinion 15/2011 on the definition of consent, p. 11.
 
15
Explanatory statement accompanying the Regulation proposal, p. 8.
 
16
For readability, we shall use the term ‘explicit consent’ when we mean both ‘unambiguous’ and/or ‘explicit’ consent.
 
17
There is also anecdotal evidence that data subjects seldom read terms and conditions and privacy notices. One entertaining example is the site Gamestation.co.uk that asked its users consent for the transfer of their immortal souls to Gamestation via its terms and conditions. 88 % consented to the transfer of their immortal souls. See: http://​www.​huffingtonpost.​com/​2010/​04/​17/​gamestation-grabs-souls-o_​n_​541549.​html. See also the related discussion in Nissenbaum (2011).
 
18
Directive 2009/136/EC of the European Parliament and of the Council of 25 November 2009 amending Directive 2002/22/EC on universal service and users’ rights relating to electronic communications networks and services, Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector and Regulation (EC) No 2006/2004 on cooperation between national authorities responsible for the enforcement of consumer protection laws.
 
19
See for instance: http://​www.​dutchnews.​nl/​news/​archives/​2013/​05/​dutch_​cookie_​law_​to_​be_​watered.​php Interestingly, actual consumer behaviour in this area seems to contradict the findings in many surveys that consumers do want to be informed about data processing (see e.g., McDonald and Lowenthal 2013, p. 345). It might well be that there is a difference between professed user attitude in surveys and their actual behaviour. Furthermore, most research on consumer attitudes in privacy do not actually ask how and when this information should be presented.
 
20
See for instance: Brockdorff, N., Appleby-Arnold, S. (2013), What consumers think, EU CONSENT Project, Workpackages 7 and 8.
 
21
For examples of how personal data may be processed (with or without consent) see, for instance, Nissembaum (2011), Solove (2011) and Zarsky (2003).
 
22
There is a growing trend towards free online services. In the app market for instance there are less and less paid apps. Instead, app developers rely on ad-support or in-app purchases. See: http://​blog.​flurry.​com/​bid/​99013/​The-History-of-App-Pricing-And-Why-Most-Apps-Are-Free.
 
23
Research indicates that already most users (between 70 and 80 %) don’t bother to read privacy policies. See for instance Internetsociety (2012).
 
24
Article 79 of The Commission proposal for the General Data Protection Regulation. The amended proposal of the European Parliament, that was voted on by the LIBE Committee in October 2013, contains even higher penalties of up to 5 % of the annual turnover.
 
25
For a good overview see, Solove (2013).
 
26
In those cases where consent is needed, privacy notions should be improved along the lines discussed in the literature described above (e.g., shorter notices, more visceral notices, more human readable).
 
27
For a good discussion on the fairness of the use of personal data for marketing purposes see: Calo 2013.
 
28
An example could be that a person would allow the processing of personal data for a credit check, but that this same data would be used later on for dynamic pricing (e.g., setting a higher price for someone with a high credit score).
 
Literatur
Zurück zum Zitat Acquisti, A. (2009), Nudging privacy: The behavioral economics of personal information. Security & Privacy Economics. November/December 2009. Acquisti, A. (2009), Nudging privacy: The behavioral economics of personal information. Security & Privacy Economics. November/December 2009.
Zurück zum Zitat Acquisti, A., Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security & Privacy. January–February, 24–30. Acquisti, A., Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security & Privacy. January–February, 24–30.
Zurück zum Zitat Adjerid, I., Acquisti, Brandimarte, L. & Loewenstein, G. (2013). Sleights of privacy: Framing, disclosures, and the limits of transparency. SOUPS ‘13 Proceedings of the ninth symposium on usable privacy and security, Article No. 9. Adjerid, I., Acquisti, Brandimarte, L. & Loewenstein, G. (2013). Sleights of privacy: Framing, disclosures, and the limits of transparency. SOUPS ‘13 Proceedings of the ninth symposium on usable privacy and security, Article No. 9.
Zurück zum Zitat Böhme, R. & Köpsell, S. (2010), Trained to accept?: A field experiment on consent dialogs. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2403–2406. Böhme, R. & Köpsell, S. (2010), Trained to accept?: A field experiment on consent dialogs. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2403–2406.
Zurück zum Zitat Brockdorff, N. & Appleby-Arnold, S. (2013). What consumers think, EU CONSENT Project, Workpackages 7 & 8. Brockdorff, N. & Appleby-Arnold, S. (2013). What consumers think, EU CONSENT Project, Workpackages 7 & 8.
Zurück zum Zitat Calo, M. R. (2012), Against notice skepticism in privacy (and Elsewhere), 87 Notre Dame Law Review 1027. Calo, M. R. (2012), Against notice skepticism in privacy (and Elsewhere), 87 Notre Dame Law Review 1027.
Zurück zum Zitat Calo, M. R. (2013), Digital market manipulation, University of Washington School of Law Research Paper No. 2013-27; 2013-08-15. Calo, M. R. (2013), Digital market manipulation, University of Washington School of Law Research Paper No. 2013-27; 2013-08-15.
Zurück zum Zitat Custers, B. H. M. (2001). Data mining and group profiling on the internet. In Anton. Vedder (Ed.), Ethics and the internet (pp. 87–104). Antwerpen: Intersentia. Custers, B. H. M. (2001). Data mining and group profiling on the internet. In Anton. Vedder (Ed.), Ethics and the internet (pp. 87–104). Antwerpen: Intersentia.
Zurück zum Zitat Custers, B. H. M. (2012). Predicting data that people refuse to disclose; how data mining predictions challenge informational self-determination, Privacy Observatory Magazine, Issue 3. Custers, B. H. M. (2012). Predicting data that people refuse to disclose; how data mining predictions challenge informational self-determination, Privacy Observatory Magazine, Issue 3.
Zurück zum Zitat Custers, B., Van der Hof, S., Schermer, B., Appleby-Arnold, S., & Brockdorff, N. (2013). Informed consent in social media use. The gap between user expectations and EU personal data protection law. Journal of Law and Technology, 10(4), 435–457. Custers, B., Van der Hof, S., Schermer, B., Appleby-Arnold, S., & Brockdorff, N. (2013). Informed consent in social media use. The gap between user expectations and EU personal data protection law. Journal of Law and Technology, 10(4), 435–457.
Zurück zum Zitat Faden, R., & Beauchamp, T. L. (1986). A history and theory of informed consent. New York: Oxford University Press. Faden, R., & Beauchamp, T. L. (1986). A history and theory of informed consent. New York: Oxford University Press.
Zurück zum Zitat Hurd, H. M. (1996). The moral magic of consent. Legal Theory, 2, 121.CrossRef Hurd, H. M. (1996). The moral magic of consent. Legal Theory, 2, 121.CrossRef
Zurück zum Zitat Jolls, C., & Sunstein, C. (2006). Debiasing through law. The Journal for Legal Studies, 35(1), 199.CrossRef Jolls, C., & Sunstein, C. (2006). Debiasing through law. The Journal for Legal Studies, 35(1), 199.CrossRef
Zurück zum Zitat Kleinig, J. (2010). The nature of consent. In The ethics of consent: Theory and practice (Miller & Wertheim, ed.), New York: Oxford University Press. Kleinig, J. (2010). The nature of consent. In The ethics of consent: Theory and practice (Miller & Wertheim, ed.), New York: Oxford University Press.
Zurück zum Zitat Kosinski, M., Stillwell, D. & Graepel T. (2013), Private traits and attributes are predictable from digital records of human behavior. PNAS Early Edition. Kosinski, M., Stillwell, D. & Graepel T. (2013), Private traits and attributes are predictable from digital records of human behavior. PNAS Early Edition.
Zurück zum Zitat McDonald, A. M. & Cranor, L. F. (2010). The cost of reading privacy policies. McDonald, A. M. & Cranor, L. F. (2010). The cost of reading privacy policies.
Zurück zum Zitat McDonald, M., & Lowenthal, T. (2013). Nano-notice: Privacy disclosure at a mobile scale. Journal of Information Policy, 3(2013), 331–354. McDonald, M., & Lowenthal, T. (2013). Nano-notice: Privacy disclosure at a mobile scale. Journal of Information Policy, 3(2013), 331–354.
Zurück zum Zitat Miller, F. G. & Wertheim, A. (2010). Preface to a theory of consent: beyond valid consent. In The ethics of consent: Theory and practice (Miller & Wertheim, ed.), New York: Oxford University Press. Miller, F. G. & Wertheim, A. (2010). Preface to a theory of consent: beyond valid consent. In The ethics of consent: Theory and practice (Miller & Wertheim, ed.), New York: Oxford University Press.
Zurück zum Zitat Miller, F. G., & Wertheim, A. (2011). The fair transaction model of informed consent: An alternative to autonomous authorization. Kennedy Institute of Ethics Journal, 21(3), 201.CrossRef Miller, F. G., & Wertheim, A. (2011). The fair transaction model of informed consent: An alternative to autonomous authorization. Kennedy Institute of Ethics Journal, 21(3), 201.CrossRef
Zurück zum Zitat Nissenbaum, H. (2011). A contextual approach to privacy online. Daedalus, 140(4), 32–48.CrossRef Nissenbaum, H. (2011). A contextual approach to privacy online. Daedalus, 140(4), 32–48.CrossRef
Zurück zum Zitat Pollach, I. (2007). What’s wrong with online privacy policies? Communications of the ACM, 50(9), 103–108.CrossRef Pollach, I. (2007). What’s wrong with online privacy policies? Communications of the ACM, 50(9), 103–108.CrossRef
Zurück zum Zitat Rawls, J. (1999). A theory of justice (revised edition). Oxford: Oxford University Press. Rawls, J. (1999). A theory of justice (revised edition). Oxford: Oxford University Press.
Zurück zum Zitat Solove, D. J. (2011). Nothing to hide; The false tradeoff between privacy and security. New Haven: Yale University Press. Solove, D. J. (2011). Nothing to hide; The false tradeoff between privacy and security. New Haven: Yale University Press.
Zurück zum Zitat Solove, D. J. (2013). Privacy self-management and the consent dilemma. Harvard Law Review, 126, 1880–1903. Solove, D. J. (2013). Privacy self-management and the consent dilemma. Harvard Law Review, 126, 1880–1903.
Zurück zum Zitat van den Berg, B., & van der Hof, S. (2012). What happens to my data? A novel approach to informing users of data processing practices. First Monday, 17(7), 2. van den Berg, B., & van der Hof, S. (2012). What happens to my data? A novel approach to informing users of data processing practices. First Monday, 17(7), 2.
Zurück zum Zitat Westin, A. F. (1967). Privacy and freedom. New York: Atheneum Press. Westin, A. F. (1967). Privacy and freedom. New York: Atheneum Press.
Zurück zum Zitat Zarsky, T.Z. (2003). Mine your own business. Yale Journal of Law & Technology,5(1), Article 1. Zarsky, T.Z. (2003). Mine your own business. Yale Journal of Law & Technology,5(1), Article 1.
Metadaten
Titel
The crisis of consent: how stronger legal protection may lead to weaker consent in data protection
verfasst von
Bart W. Schermer
Bart Custers
Simone van der Hof
Publikationsdatum
01.06.2014
Verlag
Springer Netherlands
Erschienen in
Ethics and Information Technology / Ausgabe 2/2014
Print ISSN: 1388-1957
Elektronische ISSN: 1572-8439
DOI
https://doi.org/10.1007/s10676-014-9343-8

Weitere Artikel der Ausgabe 2/2014

Ethics and Information Technology 2/2014 Zur Ausgabe

Premium Partner