Cross-Border Transfer of Personal Information: evolving privacy regulation in Europe and Australia

Author(s):  
Margaret Allars
2021 ◽  
Author(s):  
Miguel Godinho de Matos ◽  
Idris Adjerid

The general data protection regulation (GDPR) represents a dramatic shift in global privacy regulation. We focus on GDPR’s enhanced consumer consent requirements that aim to provide transparent and active elicitation of data allowances. We evaluate the effect of enhanced consent on consumer opt-in behavior and on firm behavior and outcomes after consent is solicited. Utilizing an experiment at a large telecommunications provider with operations in Europe, we find that opt-in for different data types and uses increased once GDPR-compliant consent was elicited. However, consumers did not uniformly increase data allowances and continued to generally restrict permissions for more sensitive or tangential uses of their personal information. We also find that sales, the efficacy of marketing communications, and contractual lock-in increased after consumers provided new data allowances. Additional analysis suggests that these gains to the firm emerged because new data allowances enabled them to increase their use of targeted marketing for households that were amenable to these marketing efforts. These results have significant implications for firms and policymakers and suggest that enhanced consent provided via GDPR may be effective for increasing consumer privacy protection while also allowing firms reliant on consumers’ personal information to improve outcomes. This paper was accepted by Chris Forman, information systems.


Author(s):  
Jaakko T. Lehikoinen

Privacy is one of the most essential topics to be investigated when assessing user acceptance of new applications and services enabling disclosure of personal information. Mobility increases the demand on taking privacy into consideration when designing and developing these kinds of systems. This chapter presents a privacy management model, which facilitates evaluation of privacy aspects of communication technology. The applicability of the model is tested in a field trial that was carried out to assess user acceptance of a mobile social awareness system. Gathered evidence shows that the model helps researchers and designers to deal with privacy aspects of mobile technologies.


2021 ◽  
Author(s):  
Jie Huang

To better protect personal information and develop the digital economy, China is taking action to enact its Personal Information Protection Law. On 30 April 2021, the second deliberation draft of the Personal Information Protection Law (hereinafter ‘Proposed Chinese Personal Information Protection Law’) was published by the Standing Committee of the National People’s Congress for public opinion (official version and unofficial English translation available). Regulating cross-border information flow is a highlight of the Proposed Chinese Personal Information Protection Law. Five important issues deserve attention. This article seeks to raise those issues.


2019 ◽  
Vol 18 (S1) ◽  
pp. S63-S84 ◽  
Author(s):  
ROBERT WOLFE

AbstractIt is a truth universally acknowledged that every ambitious twenty-first century trade agreement is in want of a chapter on electronic commerce. One of the most politically sensitive and technically challenging issues is personal privacy, including cross-border transfer of information by electronic means, use and location of computing facilities, and personal information protection. States are learning to solve the problem of state responsibility for something that does not respect their borders while still allowing twenty-first century commerce to develop. A comparison of the Canada–European Union Comprehensive Economic and Trade Agreement (CETA) and the Trans-Pacific Partnership (TPP) allows us to see the evolution of the issues thought necessary for an e-commerce chapter, since both include Canada, and to see the differing priorities of the US and the EU, since they are each signatory to one of the agreements, but not of the other. I conclude by seeking generalizations about why we see a mix of aspirational and obligatory provisions in free trade agreements. I suggest that the reasons are that governments are learning how to work with each other in a new domain, and learning about the trade implications of these issues.


2020 ◽  
Vol 66 (11) ◽  
pp. 4958-4979 ◽  
Author(s):  
Florian Hoffmann ◽  
Roman Inderst ◽  
Marco Ottaviani

This paper models how firms or political campaigners (senders) persuade consumers and voters (receivers) by selectively disclosing information about their offering depending on individual receivers' preferences and orientations. We derive positive and normative implications depending on the extent of competition among senders, whether receivers are wary of senders collecting personalized data, and whether firms are able to personalize prices. We show how both senders and receivers can benefit from selective disclosure. Privacy laws requiring senders to obtain consent to acquire personal information that enables such selective disclosure increases receiver welfare if and only if there is little or asymmetric competition among senders, if receivers are unwary, and if firms can price discriminate. This paper has been accepted by Joshua Gans, business strategy.


2014 ◽  
Vol 7 (1) ◽  
Author(s):  
Jeannie Pridmore ◽  
John Overocker

Virtual Worlds (VW) are intricate 3-dimensional, vivid environments that are the digital equivalents of the physical world (Glibert, 2011). VWs offer new and engaging methods of Information and Communication Technologies (ICT) used for conducting many kinds of processes and functions, from education and training, to new product development and customer service. A vast amount of personal information can be recorded, stored, and analyzed in VW. This paper presents a rich account of what today’s VW consist of and the current state of privacy rights in VW in the United States.First the paper explains why VW should be considered separate from other ICT. Then privacy rights in the United States are discussed, and how these rights could, or should, apply to VW. Currently privacy rights of VW users are wholly created and defined by the Terms of Service (TOS) of the VW. The argument is put forth that privacy rights need to be approached in two ways, from the VW users working to improve their rights in the TOS and improved government privacy regulation as called for by the VW community. Privacy laws or the right to privacy is critical at this point in the development of VW. As in the days of the Wild West, the law has been slow to make its way into the realm of VW. In conclusion, critical issues are identified to be addressed in future research projects.


2020 ◽  
Author(s):  
Miriam Bartsch ◽  
Tobias Dienlin

For an effective and responsible communication on social network sites (SNSs) users must decide between withholding and disclosing personal information. For this so-called privacy regulation, users need to have the respective skills—in other words, they need to have online privacy literacy. In this study, we discuss factors that potentially contribute to and result from online privacy literacy. In an online questionnaire with 630 Facebook users, we found that people who spend more time on Facebook and who have changed their privacy settings more frequently reported to have more online privacy literacy. People with more online privacy literacy, in turn, felt more secure on Facebook and implemented more social privacy settings. A mediation analysis showed that time spend on Facebook and experience with privacy regulation did not per se increase safety and privacy behavior directly, stressing the importance of online privacy literacy as a mediator to a safe and privacy-enhancing online behavior. We conclude that Internet experience leads to more online privacy literacy, which fosters a more cautious privacy behavior on SNSs.


2020 ◽  
Vol 43 ◽  
Author(s):  
John Corbit ◽  
Chris Moore

Abstract The integration of first-, second-, and third-personal information within joint intentional collaboration provides the foundation for broad-based second-personal morality. We offer two additions to this framework: a description of the developmental process through which second-personal competence emerges from early triadic interactions, and empirical evidence that collaboration with a concrete goal may provide an essential focal point for this integrative process.


Sign in / Sign up

Export Citation Format

Share Document