Skip to article frontmatterSkip to article content
Site not loading correctly?

This may be due to an incorrect BASE_URL configuration. See the MyST Documentation for reference.

Data Privacy 📝

Learning Goals

By the end of this section you will:

  • understand ethical issues around data and privacy

  • understand the value of data as a commodity

  • know the ethical issues in relation to handling personal data

  • understand the Australian Privacy Principles

  • know about Open Data and why it is important

  • understand the process of protecting privacy by de-identifying open data

If you are a member of a modern society, your personal data has been collected. Sometimes it is collected by governments, but mostly it is collected by corporations. It is that extensive that an entire industry has developed collate and on-sell personal data (data brokers) and sparking a counter industry aimed at removing personal data from these data brokers (personal data removal services).

But many of our day-to-day services run on this data, so why is it a concern? Check the video below for an explanation.

 

So you can see that Data privacy is fundamental because it safeguards individuals from harms associated with the exposure or misuse of their personal information. Personal data can reveal sensitive details about a person’s identity, habits, health, finances, and more. Unauthorized access or disclosure can lead to identity theft, financial loss, reputational damage, and emotional distress.

In this section we will explore what we need to take into consideration when handling data in Australia.

Data as a Commodity

Information as a commodity refers to the idea that information—like physical goods—can be bought, sold, and traded for economic value. In the digital age, information and data have become valuable resources, much like oil or gold, because they can be used to drive business decisions, predict consumer behaviour, and tailor products and services.

Characteristics of Information as a Commodity

Examples

This value of data can lead to exploitation which raises ethical and legal concern around it’s collection.


Handling Personal Data 📝

The collecting of personal data raises a range of ethical concerns.

Privacy Violations

Collecting data without proper authorization or consent can infringe on individuals’ privacy, exposing sensitive personal information and breaching confidentiality.

Even anonymized data can sometimes be re-identified, leading to unintended privacy breaches.

Ethical data collection requires clear, informed consent from individuals, ensuring they understand what data is being collected, how it will be used, and with whom it may be shared.

Many consent processes are inadequate, with users often agreeing to terms they do not fully understand.

 

Data Security

Organizations have an ethical obligation to protect collected data from unauthorized access, breaches, or leaks, which could result in identity theft, financial harm, or reputational damage.

High-profile breaches highlight the risks and the importance of robust security measures.

Bias and Discrimination

Data collection and analysis can perpetuate or amplify biases, especially if datasets are unrepresentative or algorithms are not carefully managed, leading to unfair or discriminatory outcomes.

Technologies like facial recognition have faced criticism for racial bias and inaccuracies.

 

Transparency and Accountability

Ethical data collection demands transparency about what data is collected, why, and how it will be used, enabling individuals to make informed choices.

Lack of transparency erodes trust and can lead to misuse or abuse of data.

 

Manipulative and Exploitative Practices

Data can be used unethically for manipulative marketing, psychological profiling, or social manipulation, undermining individual autonomy and democratic processes.

 

Data Ownership and Control

There are ongoing ethical debates about who owns personal data and who has the right to control its use, especially as data becomes a valuable asset.

 

Data Minimization and Purpose Limitation

Ethically, organizations should collect only the data necessary for a specific purpose and not retain it longer than needed, balancing commercial interests with individual rights.

 

Fairness in Use and Retention

The use of data for purposes beyond the original intent without explicit consent is unethical, even if the organization believes it is beneficial.

 

Navigating and adhering to diverse and evolving data protection laws is both an ethical and legal requirement, ensuring respect for individuals’ rights across jurisdictions.

Here are some examples data privacy laws in force around the world:

Due to the international nature of the internet, the influence of these laws can spread far beyond their legal jurisdiction. For example:


Open Data

Open data refers to data that is freely available for anyone to access, use, modify, and share, typically without restrictions or the need for special permissions. It is often published by governments, public institutions, or private organizations and is made available in accessible, machine-readable formats.

Key Features of Open Data:

Importance of Open Data

De-identification

Open data can easily conflict with privacy. A solution to this problem is the de-identitication of data.

De-identification is the process of removing or altering personal information from a dataset so that individuals cannot be readily identified. The goal is to protect privacy while still allowing the data to be used for analysis, research, or public release.

Key Steps in De-identification

  1. Removing Direct Identifiers: This includes deleting or masking information such as names, addresses, phone numbers, email addresses, Medicare numbers, and other unique identifiers.

  2. Modifying or Generalizing Indirect Identifiers: Indirect identifiers (also called quasi-identifiers) are data points like date of birth, postcode, or gender that, when combined, could identify someone. These may be generalized (e.g., using age ranges instead of exact birth dates) or partially removed.

  3. Data Masking and Perturbation: Techniques such as data swapping, adding random noise, or aggregating data can further reduce the risk of re-identification.

Why is De-identification Important?

Limitations and Risks


Australian Privacy Principles 📝

The Australian Privacy Principles (APPs) are a set of 13 key rules under the Privacy Act 1988 that govern how Australian organizations and government agencies handle personal information. These principles are designed to ensure privacy, transparency, and accountability in the collection, use, storage, and disclosure of personal data.

 

The 13 Australian Privacy Principles:

  1. Open and Transparent Management of Personal Information – Organizations must manage personal information in an open and transparent way, including having a clearly expressed and up-to-date privacy policy.

  2. Anonymity and Pseudonymity — Individuals must have the option to deal with organizations anonymously or using a pseudonym, unless it is impracticable or contrary to law.

  3. Collection of Solicited Personal Information – Organizations should only collect personal information that is necessary for their functions and do so by lawful and fair means

  4. Dealing with Unsolicited Personal Information – If unsolicited personal information is received, organizations must determine if it could have been collected under APP 3 and, if not, destroy or de-identify it.

  5. Notification of the Collection of Personal Information – Individuals must be informed when their personal information is collected, including the purpose and any third parties it may be shared with.

  6. Use or Disclosure of Personal Information – Personal information can only be used or disclosed for the purpose it was collected, unless an exception applies.

  7. Direct Marketing – Personal information must not be used for direct marketing unless specific conditions are met, including providing a simple way to opt out.

  8. Cross-border Disclosure of Personal Information – Organizations must take reasonable steps to ensure that overseas recipients do not breach the APPs when personal information is disclosed internationally.

  9. Adoption, Use, or Disclosure of Government Identifiers – Organizations must not adopt, use, or disclose government-related identifiers (like Medicare or passport numbers) except as permitted by law.

  10. Quality of Personal Information – Reasonable steps must be taken to ensure personal information collected is accurate, up-to-date, and complete.

  11. Security of Personal Information – Organizations must take reasonable steps to protect personal information from misuse, interference, loss, unauthorized access, modification, or disclosure.

  12. Access to Personal Information – Individuals have the right to access their personal information held by an organization, subject to some exceptions.

  13. Correction of Personal Information – Organizations must take reasonable steps to correct personal information to ensure it is accurate, up-to-date, complete, relevant, and not misleading.