Back
About RSIS
Introduction
Building the Foundations
Welcome Message
Board of Governors
Staff Profiles
Executive Deputy Chairman’s Office
Dean’s Office
Management
Distinguished Fellows
Faculty and Research
Associate Research Fellows, Senior Analysts and Research Analysts
Visiting Fellows
Adjunct Fellows
Administrative Staff
Honours and Awards for RSIS Staff and Students
RSIS Endowment Fund
Endowed Professorships
Career Opportunities
Getting to RSIS
Research
Research Centres
Centre for Multilateralism Studies (CMS)
Centre for Non-Traditional Security Studies (NTS Centre)
Centre of Excellence for National Security
Institute of Defence and Strategic Studies (IDSS)
International Centre for Political Violence and Terrorism Research (ICPVTR)
Research Programmes
National Security Studies Programme (NSSP)
Social Cohesion Research Programme (SCRP)
Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
Other Research
Future Issues and Technology Cluster
Research@RSIS
Science and Technology Studies Programme (STSP) (2017-2020)
Graduate Education
Graduate Programmes Office
Exchange Partners and Programmes
How to Apply
Financial Assistance
Meet the Admissions Team: Information Sessions and other events
RSIS Alumni
Outreach
Global Networks
About Global Networks
RSIS Alumni
Executive Education
About Executive Education
SRP Executive Programme
Terrorism Analyst Training Course (TATC)
International Programmes
About International Programmes
Asia-Pacific Programme for Senior Military Officers (APPSMO)
Asia-Pacific Programme for Senior National Security Officers (APPSNO)
International Conference on Cohesive Societies (ICCS)
International Strategy Forum-Asia (ISF-Asia)
Publications
RSIS Publications
Annual Reviews
Books
Bulletins and Newsletters
RSIS Commentary Series
Counter Terrorist Trends and Analyses
Commemorative / Event Reports
Future Issues
IDSS Papers
Interreligious Relations
Monographs
NTS Insight
Policy Reports
Working Papers
External Publications
Authored Books
Journal Articles
Edited Books
Chapters in Edited Books
Policy Reports
Working Papers
Op-Eds
Glossary of Abbreviations
Policy-relevant Articles Given RSIS Award
RSIS Publications for the Year
External Publications for the Year
Media
Cohesive Societies
Sustainable Security
Other Resource Pages
News Releases
Speeches
Video/Audio Channel
External Podcasts
Events
Contact Us
S. Rajaratnam School of International Studies Think Tank and Graduate School Ponder The Improbable Since 1966
Nanyang Technological University Nanyang Technological University
  • About RSIS
      IntroductionBuilding the FoundationsWelcome MessageBoard of GovernorsHonours and Awards for RSIS Staff and StudentsRSIS Endowment FundEndowed ProfessorshipsCareer OpportunitiesGetting to RSIS
      Staff ProfilesExecutive Deputy Chairman’s OfficeDean’s OfficeManagementDistinguished FellowsFaculty and ResearchAssociate Research Fellows, Senior Analysts and Research AnalystsVisiting FellowsAdjunct FellowsAdministrative Staff
  • Research
      Research CentresCentre for Multilateralism Studies (CMS)Centre for Non-Traditional Security Studies (NTS Centre)Centre of Excellence for National SecurityInstitute of Defence and Strategic Studies (IDSS)International Centre for Political Violence and Terrorism Research (ICPVTR)
      Research ProgrammesNational Security Studies Programme (NSSP)Social Cohesion Research Programme (SCRP)Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      Other ResearchFuture Issues and Technology ClusterResearch@RSISScience and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      Graduate Programmes OfficeExchange Partners and ProgrammesHow to ApplyFinancial AssistanceMeet the Admissions Team: Information Sessions and other eventsRSIS Alumni
  • Outreach
      Global NetworksAbout Global NetworksRSIS Alumni
      Executive EducationAbout Executive EducationSRP Executive ProgrammeTerrorism Analyst Training Course (TATC)
      International ProgrammesAbout International ProgrammesAsia-Pacific Programme for Senior Military Officers (APPSMO)Asia-Pacific Programme for Senior National Security Officers (APPSNO)International Conference on Cohesive Societies (ICCS)International Strategy Forum-Asia (ISF-Asia)
  • Publications
      RSIS PublicationsAnnual ReviewsBooksBulletins and NewslettersRSIS Commentary SeriesCounter Terrorist Trends and AnalysesCommemorative / Event ReportsFuture IssuesIDSS PapersInterreligious RelationsMonographsNTS InsightPolicy ReportsWorking Papers
      External PublicationsAuthored BooksJournal ArticlesEdited BooksChapters in Edited BooksPolicy ReportsWorking PapersOp-Eds
      Glossary of AbbreviationsPolicy-relevant Articles Given RSIS AwardRSIS Publications for the YearExternal Publications for the Year
  • Media
      Cohesive SocietiesSustainable SecurityOther Resource PagesNews ReleasesSpeechesVideo/Audio ChannelExternal Podcasts
  • Events
  • Contact Us
    • Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
      rsisvideocast
      school/rsis-ntu
      rsis.sg
      rsissg
      RSIS
      RSS
      Subscribe to RSIS Publications
      Subscribe to RSIS Events

      Getting to RSIS

      Nanyang Technological University
      Block S4, Level B3,
      50 Nanyang Avenue,
      Singapore 639798

      Click here for direction to RSIS

      Get in Touch

    Connect
    Search
    • RSIS
    • Publication
    • RSIS Publications
    • Personal Data: Its Value, Risks and Potential
    • Annual Reviews
    • Books
    • Bulletins and Newsletters
    • RSIS Commentary Series
    • Counter Terrorist Trends and Analyses
    • Commemorative / Event Reports
    • Future Issues
    • IDSS Papers
    • Interreligious Relations
    • Monographs
    • NTS Insight
    • Policy Reports
    • Working Papers

    CO20040 | Personal Data: Its Value, Risks and Potential
    Teo Yi-Ling

    17 March 2020

    download pdf

    SYNOPSIS

    Singapore, with its trusted data and analytics hub ambitions, may have lessons to learn from the slew of recent moves by the US. Federal agencies made some of the country’s largest telecommunications and technology companies accountable for mismanagement of US citizens’ personal data.

    COMMENTARY

    ON 28 FEBRUARY 2020, the United States Federal Communications Commission (FCC), the regulatory agency overseeing communications by television, satellite, radio, wire, and cable across the US, announced that it was going to propose some of its most substantial financial penalties against four of the largest US mobile networks carriers. 

    These proposed penalties, in excess of US$200 million, would be in respect of these carriers – Sprint, T-Mobile, AT & T, and Verizon  ̶  selling customers’ real-time location data. This would be the first instance of the FCC addressing this issue of location data transactions in terms of privacy invasion.

    Free Market Failures

    For some time now, there has been a thriving market in location data and the lack of regulation around it, as highlighted in an earlier commentary addressing the issue of data privacy erosion and security.

    Countries that have the business presence of some of these carriers, as well as countries that have data hub ambitions – like Singapore – will be watching this move by the FCC very carefully, as the outcomes of this will have accompanying ramifications for compliance and governance. 

    While carriers have been allowed under US federal law to use location data for providing services like medical emergency alerts, fraud prevention, roadside assistance, and monitoring human trafficking, a report last year disclosed that some carriers were selling data to private individuals like car salesmen, property managers, bail bondsmen and bounty hunters, even after undertaking publicly to curtail this activity. 

    The contracts that the carriers had entered into with their customers (who commonly ‘consent’ to the wide ‘standard terms’ of the contracts because they have no choice) had not been effective at preventing such unauthorised behaviour, as the carriers had reneged on their own contractual obligations. This essentially meant that millions of smartphones were being tracked for apparently illegal purposes. 

    The scale of the issue is considerable – data of hundreds of millions of individuals owning smartphones were being continuously aggregated and traded. If triangulated correctly (for example with purchasing data or locations visited), such data does reveal personal and intimate details. Further, it may be the case that such aggregated data is feeding the already-thriving black market for data operated by cyber criminals.

    Market Corrections

    Such data selling-on is widespread among app makers and other technology companies (e.g. Facebook, Google and Tik Tok), but the telecommunications sector is subject to more stringent laws concerning the protection of customers’ privacy, given that carriers have more access to their customers’ personal data.

    Given the existing regulatory framework, the fact that that a small group of the largest telecommunications players collectively failed in their legal obligations, makes the situation more egregious and concerning. Observers have noted that even if the fines are imposed, the quantum is manifestly inadequate, and would not meaningfully serve as a deterrent. 

    Notwithstanding issues of quantum, addressing deficiencies on the part of the telecommunications players is the next logical step, following from regulatory tightening taking place further upstream on the supply chain, nearer the sources of data, in order to properly manage accountability. 

    In the last 12 months, the United States Federal Trade Commission (FTC) has taken action in this respect against putative data collectors.: the $5 billion fine imposed on Facebook over the Cambridge Analytical scandal, the fine of $17 million on Google for violating the privacy of children on YouTube, and the fine of $5.7 million on the social media app Tik Tok over collecting data on underage children.

    Data as a Regulated Resource

    Could such enforcement be the impetus of rationalising data as a scarce resource? As has always been the case, useful resources are eventually subjected to regulatory action to prevent monopolistic or dominant market power abuse, impose transparency, and provide protection for consumers.

    Could a push for more comprehensive regulation then have a knock-on effect of crystallising the notion of personal data as property, capable of being owned and controlled? 

    Once given away, the value of data increases exponentially in the hands of those entities whose business models are predicated upon the collection and exploitation of data. To cast this situation in the cold light of day, this is an extremely one-sided and exploitative trade practice: large entities acquiring tangible value over the trade and monetising of volumes of data obtained all too easily. 

    The original source of the data – the individual – is left standing in a position that is worse off, having little or no control of how the data is used against him or her. Leaving the issue to market mechanics has so far proved ineffective in terms of protecting the value of data. 

    Policymakers need to consider whether real value must be given in return to the individuals, upon whose personal information and the transactions thereon, a gargantuan and insatiable demand for data has arisen.

    Looking Ahead, Staying Grounded

    The future posits shifting to more digital paradigms than less. Personal data utility will continue to be reshaped, redefined, and refocused, with the market naturally taking the lead. Singapore’s transition to a Smart Nation and its data hub ambitions are about sustainability and survival through capitalising data, with the challenges of calibrating this against protecting the interests of its people. 

    All policymakers whose work touches personal data, not just the Data Protection Officer or even Personal Data Protection Commission, must continue to be closely attuned to the ramifications of this current paradigm of digital data exploitation, as digitalisation reveals aspects of peoples’ lives that were once not so easily observed in an analogue world. 

    Personal data finding its way into the wrong hands is dangerous, and personal data taken out of context can be weaponised against individuals and those closest to them. The value of personal data is at once tangible and intangible – beyond notions of economic utility, the matter of data privacy strikes further and deeper: while personal data manifests our identities, more fundamentally it is about the natural right to be left alone. 

    This is the ability to decide the parameters of acceptable intrusions of informational, physical, and communicational privacy, which is priceless. Ultimately, it stands to reason that if the ability to control and deal in personal data is taken away from an individual, the ability for personal self-determination and free will – the power to decide one’s thoughts and actions – is also then threatened.

    About the Author

    Teo Yi-Ling is a Senior Fellow with the Centre of Excellence for National Security (CENS) at the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University (NTU), Singapore. She is part of the Cyber and Homeland Defence Programme of CENS.

    Categories: RSIS Commentary Series / Country and Region Studies / Cybersecurity, Biosecurity and Nuclear Safety / Non-Traditional Security / Americas / East Asia and Asia Pacific / South Asia / Southeast Asia and ASEAN / Global
    comments powered by Disqus

    SYNOPSIS

    Singapore, with its trusted data and analytics hub ambitions, may have lessons to learn from the slew of recent moves by the US. Federal agencies made some of the country’s largest telecommunications and technology companies accountable for mismanagement of US citizens’ personal data.

    COMMENTARY

    ON 28 FEBRUARY 2020, the United States Federal Communications Commission (FCC), the regulatory agency overseeing communications by television, satellite, radio, wire, and cable across the US, announced that it was going to propose some of its most substantial financial penalties against four of the largest US mobile networks carriers. 

    These proposed penalties, in excess of US$200 million, would be in respect of these carriers – Sprint, T-Mobile, AT & T, and Verizon  ̶  selling customers’ real-time location data. This would be the first instance of the FCC addressing this issue of location data transactions in terms of privacy invasion.

    Free Market Failures

    For some time now, there has been a thriving market in location data and the lack of regulation around it, as highlighted in an earlier commentary addressing the issue of data privacy erosion and security.

    Countries that have the business presence of some of these carriers, as well as countries that have data hub ambitions – like Singapore – will be watching this move by the FCC very carefully, as the outcomes of this will have accompanying ramifications for compliance and governance. 

    While carriers have been allowed under US federal law to use location data for providing services like medical emergency alerts, fraud prevention, roadside assistance, and monitoring human trafficking, a report last year disclosed that some carriers were selling data to private individuals like car salesmen, property managers, bail bondsmen and bounty hunters, even after undertaking publicly to curtail this activity. 

    The contracts that the carriers had entered into with their customers (who commonly ‘consent’ to the wide ‘standard terms’ of the contracts because they have no choice) had not been effective at preventing such unauthorised behaviour, as the carriers had reneged on their own contractual obligations. This essentially meant that millions of smartphones were being tracked for apparently illegal purposes. 

    The scale of the issue is considerable – data of hundreds of millions of individuals owning smartphones were being continuously aggregated and traded. If triangulated correctly (for example with purchasing data or locations visited), such data does reveal personal and intimate details. Further, it may be the case that such aggregated data is feeding the already-thriving black market for data operated by cyber criminals.

    Market Corrections

    Such data selling-on is widespread among app makers and other technology companies (e.g. Facebook, Google and Tik Tok), but the telecommunications sector is subject to more stringent laws concerning the protection of customers’ privacy, given that carriers have more access to their customers’ personal data.

    Given the existing regulatory framework, the fact that that a small group of the largest telecommunications players collectively failed in their legal obligations, makes the situation more egregious and concerning. Observers have noted that even if the fines are imposed, the quantum is manifestly inadequate, and would not meaningfully serve as a deterrent. 

    Notwithstanding issues of quantum, addressing deficiencies on the part of the telecommunications players is the next logical step, following from regulatory tightening taking place further upstream on the supply chain, nearer the sources of data, in order to properly manage accountability. 

    In the last 12 months, the United States Federal Trade Commission (FTC) has taken action in this respect against putative data collectors.: the $5 billion fine imposed on Facebook over the Cambridge Analytical scandal, the fine of $17 million on Google for violating the privacy of children on YouTube, and the fine of $5.7 million on the social media app Tik Tok over collecting data on underage children.

    Data as a Regulated Resource

    Could such enforcement be the impetus of rationalising data as a scarce resource? As has always been the case, useful resources are eventually subjected to regulatory action to prevent monopolistic or dominant market power abuse, impose transparency, and provide protection for consumers.

    Could a push for more comprehensive regulation then have a knock-on effect of crystallising the notion of personal data as property, capable of being owned and controlled? 

    Once given away, the value of data increases exponentially in the hands of those entities whose business models are predicated upon the collection and exploitation of data. To cast this situation in the cold light of day, this is an extremely one-sided and exploitative trade practice: large entities acquiring tangible value over the trade and monetising of volumes of data obtained all too easily. 

    The original source of the data – the individual – is left standing in a position that is worse off, having little or no control of how the data is used against him or her. Leaving the issue to market mechanics has so far proved ineffective in terms of protecting the value of data. 

    Policymakers need to consider whether real value must be given in return to the individuals, upon whose personal information and the transactions thereon, a gargantuan and insatiable demand for data has arisen.

    Looking Ahead, Staying Grounded

    The future posits shifting to more digital paradigms than less. Personal data utility will continue to be reshaped, redefined, and refocused, with the market naturally taking the lead. Singapore’s transition to a Smart Nation and its data hub ambitions are about sustainability and survival through capitalising data, with the challenges of calibrating this against protecting the interests of its people. 

    All policymakers whose work touches personal data, not just the Data Protection Officer or even Personal Data Protection Commission, must continue to be closely attuned to the ramifications of this current paradigm of digital data exploitation, as digitalisation reveals aspects of peoples’ lives that were once not so easily observed in an analogue world. 

    Personal data finding its way into the wrong hands is dangerous, and personal data taken out of context can be weaponised against individuals and those closest to them. The value of personal data is at once tangible and intangible – beyond notions of economic utility, the matter of data privacy strikes further and deeper: while personal data manifests our identities, more fundamentally it is about the natural right to be left alone. 

    This is the ability to decide the parameters of acceptable intrusions of informational, physical, and communicational privacy, which is priceless. Ultimately, it stands to reason that if the ability to control and deal in personal data is taken away from an individual, the ability for personal self-determination and free will – the power to decide one’s thoughts and actions – is also then threatened.

    About the Author

    Teo Yi-Ling is a Senior Fellow with the Centre of Excellence for National Security (CENS) at the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University (NTU), Singapore. She is part of the Cyber and Homeland Defence Programme of CENS.

    Categories: RSIS Commentary Series / Country and Region Studies / Cybersecurity, Biosecurity and Nuclear Safety / Non-Traditional Security

    Popular Links

    About RSISResearch ProgrammesGraduate EducationPublicationsEventsAdmissionsCareersVideo/Audio ChannelRSIS Intranet

    Connect with Us

    rsis.ntu
    rsis_ntu
    rsisntu
    rsisvideocast
    school/rsis-ntu
    rsis.sg
    rsissg
    RSIS
    RSS
    Subscribe to RSIS Publications
    Subscribe to RSIS Events

    Getting to RSIS

    Nanyang Technological University
    Block S4, Level B3,
    50 Nanyang Avenue,
    Singapore 639798

    Click here for direction to RSIS

    Get in Touch

      Copyright © S. Rajaratnam School of International Studies. All rights reserved.
      Privacy Statement / Terms of Use
      Help us improve

        Rate your experience with this website
        123456
        Not satisfiedVery satisfied
        What did you like?
        0/255 characters
        What can be improved?
        0/255 characters
        Your email
        Please enter a valid email.
        Thank you for your feedback.
        This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
        OK
        Latest Book
        more info