•  •  Dark Mode

Your Interests & Preferences

I am a...

law firm lawyer
in-house company lawyer
litigation lawyer
law student
aspiring student
other

Website Look & Feel

 •  •  Dark Mode
Blog Layout

Save preferences
An estimated 13-minute read

Online Behavior Advertisments and Privacy

by
 Email  Facebook  Tweet  Linked-in

Introduction

Advertisement is a strategy employed by the business entity to create psyche within the target user groups, a kind of conformity to their product and services.

At present online advertising is an efficient and effective means for marketing due to its international prominence, low-cost and multi-dimensional prospects. With the quick growth of internet users and the fast advances of internet technology and e-commerce, more businesses and manufactures began to pay their devotion to online advertising. This method is now increasing as more media is consumed on the online world and is considered as a vital source of capital generation. Thus the use of online behavioral advertising is seen as a ‘commercial pot of gold’ in the advertising and marketing industry’.

In this essay I will be discussing the environments in which behavioural advertising has been encroaching on the outlines of the freedom which now even poses a threat to an individual’s privacy in multiple ways.

Life With Digital Parasites

Many website operators and establishment place ‘cookies’ in our computers during an internet browsing session, According to the ‘Recital-25’ of the directive on privacy and electronic communications 2002/58/EC hereafter referred as “ePrivacy Directive”, cookies are recognised as an important tool for internet browsing and should be allowed under the condition that users are provided with clear information about the purpose of cookies which are being installed’.

We also know that websites place ‘web bugs’ on their respective network to keep a track of the visitors and their internet browsing habits, the prime reason for performance of such an act is mainly associated to gain the understanding of the behaviour pattern of the internet user. These tiny 1x1 pixels can be used in a much more invasive way by netting the users Internet Protocol address hereafter referred as ‘IP address’ and also installing pernicious files into their system and is even capable of revealing the whole browsing history without even letting the individual know and without his or her prior consent’.

Introducing another digital contagion called ‘spyware’ which is again dangerously proficient in assaulting your privacy, it is a program that runs in your computer after raiding the terminal equipment and records your habits and makes patterns for advertisements. Spyware is more of a program rather than a bit of text in a cookie’.

These parasites are very similar to the ones in the offline world though unfair to the metamorphosis; they are not biological in nature.

The Online Advertising Industry

Advertisements are a part of commerce practice ever since the first commercial establishment has taken place in history. The business of advertisements grew rapidly during the twentieth century with the expansion in modes of mass communication. Online advertisements are mainly focussed on increasing the generation of revenue of the consortium by selling its goods and services to the individuals requiring it. Online advertisements grew rapidly since the flourishing of the internet and started from the United States since the technology associated to internet and leading search engines like Google and Yahoo were developed and incorporated there.

In today’s digital age where digital societies have developed the expanse of advertising has started to drift on the availability of spaces over the internet the empty spaces on the websites also known as the ‘dead space’ of website. The first ever online advertisement was in 1994 when a web magazine named HotWired sold an advertisement to ‘AT&T’ to display on their website’.

Online advertisements were sold on cost per mile basis depending upon how many people saw the advertisement which gradually seasoned to cost per click basis. The online advertisement has transformed from 2000 to 2008 and advertisements associated to internet search made have grown from 1 per cent to 44 per cent and display advertisements have dropped from 48 per cent to 21 per cent.

As we know that gathering data online is an easy job if kept a track of the user’s internet browsing behaviour which allows advertisers to deduce a lot of things about a person and his whereabouts. It could infer from a user’s browsing manner that the user is a man or a woman and their residential locality accessible from the users IP address, and even the age of the user can be judged from the browsing behaviour. The intermediary can identify potential sale targets by just using simple selection methods associated to the internet searches made and web sites visited.

The following figure shows the content used by web site to appeal viewers’.

Figure - 2

Advertising space is sold based on the basis of length and width of the space in pixels; typical types of advertisements include banner ads at the top, skyscraper ads on the sides, and rectangle ads in various locations. The value is associated to the viewer’s visiting the websites and some viewers are more valuable than others depending upon the age group they belong too. This is because targeted advertisements are mainly focussed on the younger group and that also varies from the content of every web site because the viewer’s visiting the particular web site might be inclined to purchase’.

Figure-3

If surplus advertisers join the behavioural advertising format, it may obtain enough viewers to make online behavioural advertising movement speedup and then tracing of individuals on the web network would increase swiftly which will eventually lead to invasion of privacy because the so performed retention of online activities is being done without an expressed consent from the end user and by placing cookies on their terminal equipment.

This has raised much concern over the diction of privacy and has gained considerable attention since its emergence.

The Gradual Maturing of Privacy

The term ‘privacy’ is broad and one size fits all commandment is meaningless to be applied. Privacy has undergone various renovations with the gradual progress in the field of science and with the enlargement of corporeal societies as well as culture. It has been found essential to frequently outline afresh nature since social, political and economic rights necessitate the recognition of new rights and common law grows to meet the new demands of the society’.

In this procedure of growth and expansion at the moment digital societies have emerged and the current establishing world members of the digital societies have interpreted the term privacy from a sheer revenue generating perspective.

As we know that the mounting concerns about online privacy have doubled within the past few years with the growth of internet and therefore the question about privacy is now under scanner. The top searches for the term ‘Online Privacy’ on Amazon.com from March 2004 to 2008 have increased rapidly from 45,751 items to a bewildering 184,398 items which calculates to be more than fourfold increase’. The world’s leading search – engine Google’s privacy page mentions in a decidedly ambiguous language that it uses the individual search for conducting research on spellings mistakes and to asses usefulness of the ad ranking.

How bankable are the wordings of the privacy page is truly beyond the reach of the end user’s as he or she is the subjected target for revenue generation. The term subjected target goes with privacy because privacy of an individual is crossed via means of digital parasites which was supposed to be personal. The information recorded by search engines is mainly associated to the end users browsing habits and an abundant volume of information is collected and stored from the ‘IP address’, way of online search made to the method opted to enter or exit a website, which internet browser was used and till the point it was last scrolled.

This browsing data is a virtual treasure to online advertising industry presumably because it provides better quality forecasts to the advertisers and in return providers may charge more for the advertising secrets they supply which are actually the well recorded, detailed and targeted end users with the help of complicated mathematical algorithms. Surprisingly the procedure of opting out from this circle is more of a boulder in the way to accessing the internet as it may hamper your quality of internet browsing leading to a less productive internet session as most of the reputed websites have the dogma of installing cookies in your terminal equipment in order to enhance your internet surfing experience as well as keeping a track on your browsing habits.

Privacy is interpreted differently depending upon the section of the society. Today’s youth has a different interpretation and is equally active in the online world as offline world and is rather keen in disclosing information on social networking sites like ‘Facebook’, it was also concluded that two third of the world users log in everyday for about an estimated twenty minutes’.

The availability of such large lucrative gullible audience was surely to be targeted in order to generate revenue and to protect the stagnation hit global economies therefore invasive strategies were used in order to gain better understandings of individual’s internet surfing behaviour.

Facebook in 2007 launched an advertising utility called ‘beacon’ which could provide the user’s activity on its partnering websites such as ebay, amazon and blockbusters’. A year earlier Facebook was blamed for installing a tool that could enable user’s information available to a user from a different network and thousands of Facebook users voiced that this function performed was exceedingly invasive’.

Facebook founder Mark Zuckerberg responded to the concerns explaining that none of the data collected is being broadcasted but instead is being shared with other people who can be called as friends’.

The bankability of the so called friends is not yet established as a concrete substance of confidence but is still ignored and assumed to be a safe harbour because of the unavailability of options for an everyday internet user.

The so called saved and contained information by Google and Facebook has raised various issues. In 2008 many Facebook users discovered that if they ever delete their Facebook account the user information is still maintained, though it is legal in US but not in the European Union’. Even Google had to limit its information storage from two years to nine months due to rise in privacy concerns’.

Data being used today for some intended purpose can tomorrow be used for unintended purposes. If the data is leaked or stolen and reaches a group of untrusted or corrupt hands therefore possibility of data leak has to be avoided because it may even lead to huge financial loss and a gross violation of privacy since the basis of privacy relies upon the individual’s precincts.

The recent breach of security system and theft of data from the famous ‘Sony’ PlayStation network resulted in loss of seventy seven million accounts and the data associated to them’, but this was not the end the very following week another data breach took within the Sony PlayStation networks resulting in loss of an additional twenty five million users and their personal information from age, gender, sex to credit card details’.

Any personal data of delicate nature should not be obtained without prior consent or appropriate fortification measures because information about gender, age, sex or even IP address are accounted as personal data’ and can lead to formation of opinion which is incorrect.

Regulations to control data practices do transpire; the ‘Data Protection Directive - 1995’ hereafter known as DPD is a very significant ordinance on informational privacy in the world, UK Data Protection Act implementing the DPD was extended to deal with technology privacy and aims to protect the fundamental right to privacy. Article – 6, lays down eight principals in schedule – 1 of the Act are;

As follows;

1. Personal Data to be processed fairly and lawfully.

2. Personal information to be taken and processed for the purpose and nothing beyond that      purpose.

3.  Information should be adequate, relevant, and not excessive in relation to that purpose.

4. Personal data should be accurate and up to date.

5. Date collected should not be kept for longer than the needed purpose.

6. Personal data to be processed as per DPD.

7. Proper technical and organisational measure to be taken against illegitimate processing.

8. Personal data shall not be transferred cross border unless the country ensures’.

The US code of ‘Fair Information Practices’ hereafter referred as FIP’s is also another example of significant principals which are:

As follows;

  1. There must be no personal data record-keeping systems which is secret.
  2. There must be a way available to the person to know what data of his is kept.
  3. There must be a way for a person to prevent information that was obtained for one purpose from being used or made available for other purposes without his consent.
  4. There must be a way to amend a record of identifiable information about that person.
  5. Any organization creating, maintaining or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and take precautions to prevent misuses of the data’.

 

The implementation of FIP’s depends upon multiple factors like the country, the data controller, the type of data and other ends though culpability can be met through different mechanisms varying from civil to criminal liabilities. Though FIP’s have been criticised for being too weak and having many exceptions and has not kept pace with the growth of information technology’.

Mr Justice Michael Kirby of the High Court of Australia distinguished that many changes fetched about by new computer and communication technologies and proposed that it may be time for a review of the guidelines. Among new rights that he mentioned as ripe for review are:

As follows;

  1. A right not to be indexed.

2.   A right to encrypt personal information effectively.

3.   A right to fair treatment in public infrastructures so that no person is unfairly excluded         that would prejudice that person's ability to protect their privacy.

4.   A right to human scrutiny of adverse automated decisions and understanding them.

5. A right beyond the aspiration of the 'openness principle', of disclosure of the collections to which others will have access and might affect the projection of the profile of the individual concerned’.

Bennet and Raab suggest that one of the crucial hallmarks of bureaucratic societies is that the information will be collected just because it serves as a valuable potential commodity for unknown causes and risk management’.

As survey conducted by Joseph Rowntree Trust, UK of all the EU states is known for strict function of data collection since the drive of joined governments initiated by then Prime Minister Tony Blair, which has created a culture of forming large and multiple access database to solve every issue, these database have been expensive, insecure and of questionable efficacy’.

Therefore it is our purpose to consider whether the existing law affords a principle which can properly be invoked to protect the privacy of the individual; and, if it does, what is the nature and extent of such protection’.

Conclusion

Accepting the fact that in today’s time laws are stressed to cope up with the growth of technology, therefore gridlocking the locus of law with growth of science is a very important aspect to be explored or we can see the concerns and the struggling flow of privacy laws in their immobile condition with the rapid growth of today’s digital societies and flow of information in the online world.

Data once collected and stored is not coming back, and even perhaps not going to be erased, or if erased then no intimation will be made, or if intimated then not assuring enough of data being erased, though it may or may not be erased. Assuring with a concrete proof will be hard possibly due to the convenience in today’s digital world to store and transfer data within fragments of seconds.

A feeling of breach of trust might prevail between end users and the web based organisation both commercial and administrative leading to unfamiliar consequences. To avoid this situation the collection of personal information should be dropped not only for behavioural advertising but also from administrative purpose at the earliest because the remains of the already disturbed privacy is at stake which needs to be redefined, controlled, strengthened and to be made secure for the coming generations though not regretfully possible for the present one as they have groomed in the developing environment of digital age unaware of the loop around their neck.

The feeling of enjoying a pleasant evening at home is treasurable, but terrifying when aware that there is someone observing you from your window. Why is it not the same in the digital world and why we are okay with it, is still a matter of misperception?

<<666>>


No comments yet: share your views

Latest comments