Big data and data reuse: a taxonomy of data reuse for balancing big data benefits and personal data protection

被引:55
作者
Custers, Bart [1 ]
Ursic, Helena [1 ]
机构
[1] Leiden Univ, Fac Law, ELaw Ctr Law & Digital Technol, Leiden, Netherlands
关键词
D O I
10.1093/idpl/ipv028
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
Current personal data protection requirements like data minimization and purpose specification are potentially inimical to Big Data as they limit the size and use of Big Data. Potential benefits of Big Data to discover novel trends, patterns, and relationships may not materialize. Substantial loss of economic and social benefits of Big Data may be the result. In order to realize Big Data benefits, the reuse of data could be encouraged. Data reuse, when done properly, may be both privacy preserving and economically and socially beneficial. In this article, we provide a taxonomy of data reuse from both the data controller's and the data subject's perspective that may be useful to determine the extent to which data reuse should be allowed and under which conditions. From the data controller's perspective, we distinguish data recycling, data repurposing, and data recontextualization. From the data subject's perspective, we distinguish data sharing and data portability. Forms of data reuse that stay close to the awareness and intentions of data subjects should be approached less restrictively (for instance, by assuming informed consent), whereas for forms of data reuse that are 'at a distance', ie, in which awareness and transparency may be lacking and data subject's rights may prove more difficult to exercise, more restrictions, and additional protection should be considered (for instance, by requiring explicit consent).
引用
收藏
页码:4 / 15
页数:12
相关论文
共 66 条
[1]  
Acquisti A, 2006, PET WORKSH
[2]  
[Anonymous], 2013, STANFORD LAW REV ONL
[3]  
[Anonymous], 2015, LEWIS CLARK L REV
[4]  
[Anonymous], 2013, OECD DIGITAL EC PAPE
[5]  
AUSLOOS J, 2012, CLSR, V28, P152
[6]   The 'Right to be Forgotten' - Worth remembering? [J].
Ausloos, Jef .
COMPUTER LAW & SECURITY REVIEW, 2012, 28 (02) :143-152
[7]  
Ayres I., 2007, SUPERCRUNCHERS
[8]  
BORGMAN CL, 2012, J ASS INF SCI TECHNO, V63, P1
[9]  
Borgman CL, 2012, J ASS INF SCI TECHNO, V63, P40
[10]  
Bygrave LA, 2002, DATA PROTECTION LAW, P338