Mensen aanwijzen maar niet bij naam noemen: behavioural targeting, persoonsgegevens, en de nieuwe Privacyverordening
- URL: http://arxiv.org/abs/2510.17710v1
- Date: Mon, 20 Oct 2025 16:26:00 GMT
- Title: Mensen aanwijzen maar niet bij naam noemen: behavioural targeting, persoonsgegevens, en de nieuwe Privacyverordening
- Authors: Frederik Zuiderveen Borgesius,
- Abstract summary: It is hotly debated whether data protection law applies to behavioural targeting.<n>Many behavioural targeting companies say that, as long as they do not tie names to data they hold about individuals, they do not process any personal data.<n>This paper argues that data protection law should indeed apply to behavioural targeting.
- Score: 0.2262632497140704
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Information about millions of people is collected for behavioural targeting, a type of marketing that involves tracking people's online behaviour for targeted advertising. It is hotly debated whether data protection law applies to behavioural targeting. Many behavioural targeting companies say that, as long as they do not tie names to data they hold about individuals, they do not process any personal data, and that, therefore, data protection law does not apply to them. European Data Protection Authorities, however, take the view that a company processes personal data if it uses data to single out a person, even if it cannot tie a name to these data. This paper argues that data protection law should indeed apply to behavioural targeting. Companies can often tie a name to nameless data about individuals. Furthermore, behavioural targeting relies on collecting information about individuals, singling out individuals, and targeting ads to individuals. Many privacy risks remain, regardless of whether companies tie a name to the information they hold about a person. A name is merely one of the identifiers that can be tied to data about a person, and it is not even the most practical identifier for behavioural targeting. Seeing data used to single out a person as personal data fits the rationale for data protection law: protecting fairness and privacy.
Related papers
- Invisible Trails? An Identity Alignment Scheme based on Online Tracking [13.473900795415679]
We propose an effective identity alignment scheme for accurately identifying targeted users.<n>We introduce, for the first time, a novel evaluation framework for online tracking-based identity alignment.
arXiv Detail & Related papers (2026-02-11T08:18:08Z) - How to DP-fy Your Data: A Practical Guide to Generating Synthetic Data With Differential Privacy [52.00934156883483]
Differential Privacy (DP) is a framework for reasoning about and limiting information leakage.<n>Differentially Private Synthetic data refers to synthetic data that preserves the overall trends of source data.
arXiv Detail & Related papers (2025-12-02T21:14:39Z) - Personal Data Processing for Behavioural Targeting: Which Legal Basis? [0.2262632497140704]
This paper argues that the cookie consent requirement from the ePrivacy Directive does not provide a legal basis for the processing of personal data.<n>Even if companies could use an opt-out system to comply with the e-Privacy Directive's consent requirement for using a tracking cookie, they would generally have to obtain the data subject's unambiguous consent if they process personal data for behavioural targeting.
arXiv Detail & Related papers (2025-11-25T18:55:53Z) - Behavioural Sciences and the Regulation of Privacy on the Internet [0.2262632497140704]
This chapter examines the policy implications of behavioural sciences insights for the regulation of privacy on the Internet.<n>I argue that, if society is better off when certain behavioural targeting practices do not happen, policymakers should consider banning them.
arXiv Detail & Related papers (2025-11-25T18:55:51Z) - Singling out people without knowing their names - Behavioural targeting, pseudonymous data, and the New Data Protection Regulation [1.0406659081400351]
It is hotly debated whether data protection law applies to behavioural targeting.<n>Many behavioural targeting companies say that, as long as they do not tie names to data they hold about individuals, they do not process any personal data.<n>This paper argues that data protection law should indeed apply to behavioural targeting.
arXiv Detail & Related papers (2025-11-10T17:09:31Z) - What's Privacy Good for? Measuring Privacy as a Shield from Harms due to Personal Data Use [6.662199530439544]
We operationalize this conceptualization in an online study with 400 college and university students.<n>Study participants indicated their perceptions of different harms that may arise when artificial intelligence-based algorithms infer personal data.<n> Comprehensive statistical analyses of the study data show that the 14 harms are internally consistent and collectively represent a general notion of privacy harms.
arXiv Detail & Related papers (2025-06-28T07:00:37Z) - Defending Our Privacy With Backdoors [29.722113621868978]
We propose an easy yet effective defense based on backdoor attacks to remove private information from vision-language models.
Specifically, by strategically inserting backdoors into text encoders, we align the embeddings of sensitive phrases with those of neutral terms-"a person" instead of the person's actual name.
Our approach provides a new "dual-use" perspective on backdoor attacks and presents a promising avenue to enhance the privacy of individuals within models trained on uncurated web-scraped data.
arXiv Detail & Related papers (2023-10-12T13:33:04Z) - Protecting User Privacy in Online Settings via Supervised Learning [69.38374877559423]
We design an intelligent approach to online privacy protection that leverages supervised learning.
By detecting and blocking data collection that might infringe on a user's privacy, we can restore a degree of digital privacy to the user.
arXiv Detail & Related papers (2023-04-06T05:20:16Z) - The Privacy Onion Effect: Memorization is Relative [76.46529413546725]
We show an Onion Effect of memorization: removing the "layer" of outlier points that are most vulnerable exposes a new layer of previously-safe points to the same attack.
It suggests that privacy-enhancing technologies such as machine unlearning could actually harm the privacy of other users.
arXiv Detail & Related papers (2022-06-21T15:25:56Z) - Personal Data Gentrification [5.127089848246933]
We live in an era in which the most valued services are not paid for in money, but in personal data.
We propose Personal Data Enfranchisement as a middle ground, empowering individuals to control the sharing of their personal information.
arXiv Detail & Related papers (2021-03-31T14:26:05Z) - FakeSafe: Human Level Data Protection by Disinformation Mapping using
Cycle-consistent Adversarial Network [4.987581730476023]
disinformation strategy can be adapted into data science to protect valuable private and sensitive data.
Huge amount of private data are being generated from personal devices such as smart phone and wearable.
Building a secure data transfer and storage infrastructure to preserving privacy is costly in most cases and there is always a concern of data security due to human errors.
We propose a method, named FakeSafe, to provide human level data protection using generative adversarial network with cycle consistency.
arXiv Detail & Related papers (2020-11-23T08:47:40Z) - Second layer data governance for permissioned blockchains: the privacy
management challenge [58.720142291102135]
In pandemic situations, such as the COVID-19 and Ebola outbreak, the action related to sharing health data is crucial to avoid the massive infection and decrease the number of deaths.
In this sense, permissioned blockchain technology emerges to empower users to get their rights providing data ownership, transparency, and security through an immutable, unified, and distributed database ruled by smart contracts.
arXiv Detail & Related papers (2020-10-22T13:19:38Z) - BeeTrace: A Unified Platform for Secure Contact Tracing that Breaks Data
Silos [73.84437456144994]
Contact tracing is an important method to control the spread of an infectious disease such as COVID-19.
Current solutions do not utilize the huge volume of data stored in business databases and individual digital devices.
We propose BeeTrace, a unified platform that breaks data silos and deploys state-of-the-art cryptographic protocols to guarantee privacy goals.
arXiv Detail & Related papers (2020-07-05T10:33:45Z) - A vision for global privacy bridges: Technical and legal measures for
international data markets [77.34726150561087]
Despite data protection laws and an acknowledged right to privacy, trading personal information has become a business equated with "trading oil"
An open conflict is arising between business demands for data and a desire for privacy.
We propose and test a vision of a personal information market with privacy.
arXiv Detail & Related papers (2020-05-13T13:55:50Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.