Data Exploitation Principles
The world is being rebuilt by companies and governments so that they can exploit data.
Increasingly the spaces and environments we inhabit and pass through perpetually generate and collect data from human behaviour, without asking us.
Public debate normally focusses on personal data that people knowingly disclose.
We urgently need to look beyond the data we provide knowingly to companies and government.
Companies and governments are relying less on data we provide and instead are looking at data they can observe, derive, and infer.
Without urgent change, data will be used in ways that people cannot now even imagine, to define and manipulate their lives without transparency or accountability.
To prevent this, we believe that the following changes are necessary:
- Increases in individuals’ control over their data, that will result in a different way of designing technologies that protect peoples’ autonomy.
- Increased emphasis on security, that may result in more rights and protections for individuals and constraints applied to powerful entities.
- Restraints on potential abuses arising from the vast accumulation of data.
- Limits on how data is used to construct profiles and to make decisions about people, groups, and societies.
The data that is observed, derived or predicted from our behaviour is increasingly used to automatically rank, score, and evaluate people. These derived or inferred data are increasingly used to make consequential decisions through ever more advanced processing techniques
The world is being rebuilt by companies and governments so that they can exploit data. In the future they may be able to define and manipulate our lives without transparency or accountability.
What we want
People must be able to know what data is being generated by devices, the networks and platforms we use, and the infrastructure within which devices become embedded. People should be able to know and ultimately determine the manner of processing.
People don’t know or control what data is on devices and how it is used by others, and how this can be used against them.