<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Cyber Solicitor: Data Rights]]></title><description><![CDATA[Everything data rights]]></description><link>https://www.thecybersolicitor.com/s/data-rights</link><image><url>https://substackcdn.com/image/fetch/$s_!T4HV!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276409e9-b16f-4458-aae2-f3c59c484ed3_1110x1110.png</url><title>The Cyber Solicitor: Data Rights</title><link>https://www.thecybersolicitor.com/s/data-rights</link></image><generator>Substack</generator><lastBuildDate>Thu, 30 Apr 2026 15:07:33 GMT</lastBuildDate><atom:link href="https://www.thecybersolicitor.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Mahdi Assan]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[thecybersolicitor@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[thecybersolicitor@substack.com]]></itunes:email><itunes:name><![CDATA[Mahdi Assan]]></itunes:name></itunes:owner><itunes:author><![CDATA[Mahdi Assan]]></itunes:author><googleplay:owner><![CDATA[thecybersolicitor@substack.com]]></googleplay:owner><googleplay:email><![CDATA[thecybersolicitor@substack.com]]></googleplay:email><googleplay:author><![CDATA[Mahdi Assan]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Fragmented surveillance at scale]]></title><description><![CDATA[How do data rights cope with doorbell cameras and recording glasses?]]></description><link>https://www.thecybersolicitor.com/p/fragmented-surveillance-at-scale</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/fragmented-surveillance-at-scale</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 03 Apr 2026 08:00:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!tqN7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3025de-ec14-42b8-95a7-b0a68ea27da4_2560x1707.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tqN7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3025de-ec14-42b8-95a7-b0a68ea27da4_2560x1707.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tqN7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3025de-ec14-42b8-95a7-b0a68ea27da4_2560x1707.png 424w, https://substackcdn.com/image/fetch/$s_!tqN7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3025de-ec14-42b8-95a7-b0a68ea27da4_2560x1707.png 848w, https://substackcdn.com/image/fetch/$s_!tqN7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3025de-ec14-42b8-95a7-b0a68ea27da4_2560x1707.png 1272w, https://substackcdn.com/image/fetch/$s_!tqN7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3025de-ec14-42b8-95a7-b0a68ea27da4_2560x1707.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tqN7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3025de-ec14-42b8-95a7-b0a68ea27da4_2560x1707.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/db3025de-ec14-42b8-95a7-b0a68ea27da4_2560x1707.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2831805,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.thecybersolicitor.com/i/192522991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3025de-ec14-42b8-95a7-b0a68ea27da4_2560x1707.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tqN7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3025de-ec14-42b8-95a7-b0a68ea27da4_2560x1707.png 424w, https://substackcdn.com/image/fetch/$s_!tqN7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3025de-ec14-42b8-95a7-b0a68ea27da4_2560x1707.png 848w, https://substackcdn.com/image/fetch/$s_!tqN7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3025de-ec14-42b8-95a7-b0a68ea27da4_2560x1707.png 1272w, https://substackcdn.com/image/fetch/$s_!tqN7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3025de-ec14-42b8-95a7-b0a68ea27da4_2560x1707.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Reihaneh Golpayegani / https://betterimagesofai.org / https://creativecommons.org/licenses/by/4.0/</figcaption></figure></div><p>It is becoming much easier for individuals to monitor each other at scale.</p><p>I remember a time when doorbell cameras were a rarity, and were even perhaps met with a natural reaction to mediums designed to capture data about you. Unnecessary, excessive, creepy.</p><p>But now as I walk through most neighbourhoods, doorbell cameras are everywhere. It is becoming rare to see a house that does not have one of these devices slapped onto or next to a front door, gawking at you as you walk past.</p><p>What has happened here? How have these devices, once frowned upon, now become almost an imperative for every household?</p><p>I think this trend reveals something interesting about how people view privacy.</p><p>Many people often acquiesce to convenience, despite the preferences, values or ethics that they might claim to hold. This is ultimately context-dependent, but it is fair to say that people&#8217;s boundaries are dynamic such that they may be willing to buy particular products or engage in certain activities which they may have previously disregarded.</p><p>We can observe across many different domains in our digital age. Social media is an obvious one, and AI chatbots are probably the next.</p><p>But there is something particularly intriguing that the rise of doorbell cameras reveal about the attitudes people have toward privacy, whether their own or that of others.</p><p>One norm that seems to be emerging is that if one places themselves in some sort of public realm or area, whether physical or digital, then the collection of their data is basically free game.</p><p>There is sometimes a perception that if a person has a public social media account, and posts content on that account that essentially anybody can view, the collection and use of that data is completely legitimate. If it is public, and anybody can see it, then surely anybody can use it? If you didn&#8217;t want people to use your content, then don&#8217;t post it in a public space.</p><p>But this misses an important point about data rights and their purpose. That data are public may mean that the level of privacy one can expect is reduced, but it is not zero and, in any case, the publicity of the data cannot be taken as some sort of implied consent for its endless use by others.</p><p>This applies in the physical domain too. Just because you record someone who happens to walk past your property does not mean you can do whatever you want with that recording.</p><p>The use of data ought to be dictated by the legitimacy and necessity of its use, as well as be used only for that purpose and accordingly limited in term of its nature and volume.</p><p>These principles I think are being respected by individuals less and less. We can talk about certain companies and the poor data practices that they follow. But at an individual level, I think the respect for privacy is getting weaker.</p><p>And maybe doorbell cameras are not the strongest example to demonstrate this with. There are some people who simply use them as a deterrent, and do not even bother to use the full range of their functionalities or might even admit if questioned that the damn thing doesn&#8217;t even work (or they don&#8217;t know how to work it).</p><p>So another perhaps more consequential piece of privacy-invasive hardware to cite here is recording glasses. A surveillance device dressed as a fashion accessory.</p><p>These are devices that enable a more ambient form of passive data collection. They can basically record anything you see in any location that you go.</p><p>The same emerging cultural dynamics are at play here: if you are in a public space where someone happens to be filming with their recording glasses, that is on you.</p><p>The thing about both doorbell cameras and recording glasses is that it takes away the agency of the surveilled in terms of whether their data are captured. They have no choice - if someone has one of these devices and you enter their periphery, then your data is collected. No opportunity to consent, to know what it might be used for or who it might be shared with. It is already in the hands of someone else.</p><p>And people may not even know that this is happening. The indicators that someone is wearing recording glasses are subtle and very difficult to spot at a distance.</p><p>Such devices contribute to a sort of fragmented surveillance at scale.</p><p>The question is whether data rights are built for this.</p><p>I think our legal frameworks were mostly built to deal with more centralised forms of surveillance, initially by states but then by companies. You regulated singular entities carrying out processing activities concerning lots of people; an easily identifiable bottleneck that can be addressed in one swoop.</p><p>But when the means of surveillance are fragmented across the population, giving individuals the ability to monitor lots of other people at scale, what recourse do those being surveilled have?</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecybersolicitor.com/p/fragmented-surveillance-at-scale?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecybersolicitor.com/p/fragmented-surveillance-at-scale?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/fragmented-surveillance-at-scale">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Privacy does not just mean you have something to hide. That's stupid.]]></title><description><![CDATA[This is what privacy is really about]]></description><link>https://www.thecybersolicitor.com/p/privacy-does-not-mean-you-have-nothing</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/privacy-does-not-mean-you-have-nothing</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 20 Feb 2026 09:01:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!F-KR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9a2c74-d5b7-458a-aa31-978f53cbe629_3840x4951.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!F-KR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9a2c74-d5b7-458a-aa31-978f53cbe629_3840x4951.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!F-KR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9a2c74-d5b7-458a-aa31-978f53cbe629_3840x4951.jpeg 424w, https://substackcdn.com/image/fetch/$s_!F-KR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9a2c74-d5b7-458a-aa31-978f53cbe629_3840x4951.jpeg 848w, https://substackcdn.com/image/fetch/$s_!F-KR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9a2c74-d5b7-458a-aa31-978f53cbe629_3840x4951.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!F-KR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9a2c74-d5b7-458a-aa31-978f53cbe629_3840x4951.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!F-KR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9a2c74-d5b7-458a-aa31-978f53cbe629_3840x4951.jpeg" width="1456" height="1877" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7a9a2c74-d5b7-458a-aa31-978f53cbe629_3840x4951.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1877,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2199385,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.thecybersolicitor.com/i/187961126?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9a2c74-d5b7-458a-aa31-978f53cbe629_3840x4951.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!F-KR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9a2c74-d5b7-458a-aa31-978f53cbe629_3840x4951.jpeg 424w, https://substackcdn.com/image/fetch/$s_!F-KR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9a2c74-d5b7-458a-aa31-978f53cbe629_3840x4951.jpeg 848w, https://substackcdn.com/image/fetch/$s_!F-KR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9a2c74-d5b7-458a-aa31-978f53cbe629_3840x4951.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!F-KR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9a2c74-d5b7-458a-aa31-978f53cbe629_3840x4951.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Bart Fish &amp; Power Tools of AI / https://betterimagesofai.org/ <a href="https://creativecommons.org/licenses/by/4.0/">https://creativecommons.org/licenses/by/4.0/</a></figcaption></figure></div><p>Most people simply do not realise the purpose of privacy.</p><p>And you are one of those people if you think that you don&#8217;t need to worry about privacy if you have nothing to hide.</p><p>This is a bad take. Ignorant in fact.</p><p>Here&#8217;s the truth.</p><p>Think about the social&#8230;</p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/privacy-does-not-mean-you-have-nothing">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Why Substack is asking for your age now]]></title><description><![CDATA[A primer on the UK Online Safety Act and age assurance]]></description><link>https://www.thecybersolicitor.com/p/why-substack-is-asking-for-your-age</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/why-substack-is-asking-for-your-age</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 06 Feb 2026 09:02:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!a7jd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24daed4f-8410-4b68-91b1-004e52b5636e_1170x2532.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Late last year, I received this email from Substack:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iT2B!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F924c2a3d-4640-4b6a-a785-7fcd0d470163_1172x1188.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iT2B!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F924c2a3d-4640-4b6a-a785-7fcd0d470163_1172x1188.png 424w, https://substackcdn.com/image/fetch/$s_!iT2B!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F924c2a3d-4640-4b6a-a785-7fcd0d470163_1172x1188.png 848w, https://substackcdn.com/image/fetch/$s_!iT2B!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F924c2a3d-4640-4b6a-a785-7fcd0d470163_1172x1188.png 1272w, https://substackcdn.com/image/fetch/$s_!iT2B!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F924c2a3d-4640-4b6a-a785-7fcd0d470163_1172x1188.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iT2B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F924c2a3d-4640-4b6a-a785-7fcd0d470163_1172x1188.png" width="1172" height="1188" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/924c2a3d-4640-4b6a-a785-7fcd0d470163_1172x1188.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1188,&quot;width&quot;:1172,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:332767,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.thecybersolicitor.com/i/185105000?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F924c2a3d-4640-4b6a-a785-7fcd0d470163_1172x1188.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iT2B!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F924c2a3d-4640-4b6a-a785-7fcd0d470163_1172x1188.png 424w, https://substackcdn.com/image/fetch/$s_!iT2B!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F924c2a3d-4640-4b6a-a785-7fcd0d470163_1172x1188.png 848w, https://substackcdn.com/image/fetch/$s_!iT2B!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F924c2a3d-4640-4b6a-a785-7fcd0d470163_1172x1188.png 1272w, https://substackcdn.com/image/fetch/$s_!iT2B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F924c2a3d-4640-4b6a-a785-7fcd0d470163_1172x1188.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>And then when trying to access the direct messaging feature on the Substack app, I was presented with this:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!a7jd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24daed4f-8410-4b68-91b1-004e52b5636e_1170x2532.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!a7jd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24daed4f-8410-4b68-91b1-004e52b5636e_1170x2532.png 424w, https://substackcdn.com/image/fetch/$s_!a7jd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24daed4f-8410-4b68-91b1-004e52b5636e_1170x2532.png 848w, https://substackcdn.com/image/fetch/$s_!a7jd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24daed4f-8410-4b68-91b1-004e52b5636e_1170x2532.png 1272w, https://substackcdn.com/image/fetch/$s_!a7jd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24daed4f-8410-4b68-91b1-004e52b5636e_1170x2532.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!a7jd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24daed4f-8410-4b68-91b1-004e52b5636e_1170x2532.png" width="1170" height="2532" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/24daed4f-8410-4b68-91b1-004e52b5636e_1170x2532.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2532,&quot;width&quot;:1170,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:232119,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thecybersolicitor.com/i/185105000?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24daed4f-8410-4b68-91b1-004e52b5636e_1170x2532.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!a7jd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24daed4f-8410-4b68-91b1-004e52b5636e_1170x2532.png 424w, https://substackcdn.com/image/fetch/$s_!a7jd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24daed4f-8410-4b68-91b1-004e52b5636e_1170x2532.png 848w, https://substackcdn.com/image/fetch/$s_!a7jd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24daed4f-8410-4b68-91b1-004e52b5636e_1170x2532.png 1272w, https://substackcdn.com/image/fetch/$s_!a7jd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24daed4f-8410-4b68-91b1-004e52b5636e_1170x2532.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In fact, if you are in the UK, you may have noticed a number of websites requiring your age to be verified before being able to access the site. Or you may have seen this in the news.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mali!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b803b0f-1a9e-4a5e-8840-ede2e79ccd40_1480x1302.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mali!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b803b0f-1a9e-4a5e-8840-ede2e79ccd40_1480x1302.png 424w, https://substackcdn.com/image/fetch/$s_!mali!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b803b0f-1a9e-4a5e-8840-ede2e79ccd40_1480x1302.png 848w, https://substackcdn.com/image/fetch/$s_!mali!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b803b0f-1a9e-4a5e-8840-ede2e79ccd40_1480x1302.png 1272w, https://substackcdn.com/image/fetch/$s_!mali!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b803b0f-1a9e-4a5e-8840-ede2e79ccd40_1480x1302.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mali!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b803b0f-1a9e-4a5e-8840-ede2e79ccd40_1480x1302.png" width="1456" height="1281" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b803b0f-1a9e-4a5e-8840-ede2e79ccd40_1480x1302.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1281,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1319200,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thecybersolicitor.com/i/185105000?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b803b0f-1a9e-4a5e-8840-ede2e79ccd40_1480x1302.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mali!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b803b0f-1a9e-4a5e-8840-ede2e79ccd40_1480x1302.png 424w, https://substackcdn.com/image/fetch/$s_!mali!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b803b0f-1a9e-4a5e-8840-ede2e79ccd40_1480x1302.png 848w, https://substackcdn.com/image/fetch/$s_!mali!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b803b0f-1a9e-4a5e-8840-ede2e79ccd40_1480x1302.png 1272w, https://substackcdn.com/image/fetch/$s_!mali!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b803b0f-1a9e-4a5e-8840-ede2e79ccd40_1480x1302.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Article from <em><a href="https://www.ft.com/content/dca34551-4828-4677-9a72-ac8966a380cd">The Financial Times</a></em></figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!o1vw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4412c46-f663-472e-853a-197d2c157824_1668x1306.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!o1vw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4412c46-f663-472e-853a-197d2c157824_1668x1306.png 424w, https://substackcdn.com/image/fetch/$s_!o1vw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4412c46-f663-472e-853a-197d2c157824_1668x1306.png 848w, https://substackcdn.com/image/fetch/$s_!o1vw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4412c46-f663-472e-853a-197d2c157824_1668x1306.png 1272w, https://substackcdn.com/image/fetch/$s_!o1vw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4412c46-f663-472e-853a-197d2c157824_1668x1306.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!o1vw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4412c46-f663-472e-853a-197d2c157824_1668x1306.png" width="1456" height="1140" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a4412c46-f663-472e-853a-197d2c157824_1668x1306.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1140,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1563892,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thecybersolicitor.com/i/185105000?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4412c46-f663-472e-853a-197d2c157824_1668x1306.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!o1vw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4412c46-f663-472e-853a-197d2c157824_1668x1306.png 424w, https://substackcdn.com/image/fetch/$s_!o1vw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4412c46-f663-472e-853a-197d2c157824_1668x1306.png 848w, https://substackcdn.com/image/fetch/$s_!o1vw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4412c46-f663-472e-853a-197d2c157824_1668x1306.png 1272w, https://substackcdn.com/image/fetch/$s_!o1vw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4412c46-f663-472e-853a-197d2c157824_1668x1306.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Article from <a href="https://www.bbc.co.uk/news/articles/c1k81lj8nvpo">BBC News</a></figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EPmm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F028719e6-6cca-4127-83df-b58cd166c47e_1730x718.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EPmm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F028719e6-6cca-4127-83df-b58cd166c47e_1730x718.png 424w, https://substackcdn.com/image/fetch/$s_!EPmm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F028719e6-6cca-4127-83df-b58cd166c47e_1730x718.png 848w, https://substackcdn.com/image/fetch/$s_!EPmm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F028719e6-6cca-4127-83df-b58cd166c47e_1730x718.png 1272w, https://substackcdn.com/image/fetch/$s_!EPmm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F028719e6-6cca-4127-83df-b58cd166c47e_1730x718.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EPmm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F028719e6-6cca-4127-83df-b58cd166c47e_1730x718.png" width="1456" height="604" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/028719e6-6cca-4127-83df-b58cd166c47e_1730x718.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:604,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:158143,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thecybersolicitor.com/i/185105000?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F028719e6-6cca-4127-83df-b58cd166c47e_1730x718.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EPmm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F028719e6-6cca-4127-83df-b58cd166c47e_1730x718.png 424w, https://substackcdn.com/image/fetch/$s_!EPmm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F028719e6-6cca-4127-83df-b58cd166c47e_1730x718.png 848w, https://substackcdn.com/image/fetch/$s_!EPmm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F028719e6-6cca-4127-83df-b58cd166c47e_1730x718.png 1272w, https://substackcdn.com/image/fetch/$s_!EPmm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F028719e6-6cca-4127-83df-b58cd166c47e_1730x718.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Article from <a href="https://news.sky.com/story/major-pornography-sites-to-introduce-robust-age-verification-for-uk-users-13388827">Sky News</a></figcaption></figure></div><p>Now this was not just limited to adult websites. Even platforms like X, Reddit and and TikTok have also been introducing some form of age checks. And lots of people have been wondering why.</p><p>The main reason is because of a law in the UK called the Online Safety Act 2023 (OSA). The main purpose of this legislation is to impose obligations on online platform operating in the UK to ensure that they are safe for UK users, especially children.</p><p>In this newsletter, I attempt to explain, in simple terms, why OSA has led to certain websites like Substack asking for your age. I will cover:</p><ul><li><p>What OSA is and what it requires</p></li><li><p>What are the specific requirements regarding age checks</p></li><li><p>The data protection issues with age checks</p></li><li><p>What this all really means</p></li></ul><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecybersolicitor.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecybersolicitor.com/subscribe?"><span>Subscribe now</span></a></p><p></p><h1>What is the Online Safety Act and what does it require of Substack?</h1><p>The main aim of OSA is to provide a regulatory framework for making the use of internet services safer for people in the UK. It does this by:</p><ul><li><p>Imposing duties on certain service providers to identify, mitigate and manage risks of harm from illegal content and activity and content and activity that is harmful to children</p></li><li><p>Conferring certain functions and powers to Ofcom, the UK regulator for broadcasting, internet and telecommunications</p></li></ul><p>Among the service providers caught within the scope of OSA are what are called &#8216;user-to-user services&#8217;, or U2U. Under the Act, a U2U service provider is an internet service that enables and hosts content generated, uploaded or shared by users that other users can also access.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p><p>In its <a href="https://www.ofcom.org.uk/online-safety/illegal-and-harmful-content/guide-for-services">guidance</a>, Ofcom states that a U2U service provider includes the following types of internet services:</p><ul><li><p>Social media sites or apps</p></li><li><p>Photo- or video-sharing services</p></li><li><p>Chat or instant messaging services, including dating apps</p></li><li><p>Online or mobile gaming services</p></li></ul><p>Substack <a href="https://substack.com/about">describes</a> itself in the following way:</p><blockquote><p>...a new media app that connects you with the creators, ideas, and communities you care about most. Here, you can discover world-class video, podcasts, and writing from a diverse set of creators who cover politics, pop culture, food, philosophy, tech, travel, and so much more.</p></blockquote><p>It is pretty clear then that Substack constitutes a U2U service under OSA, which is also implicit in the communications it has been sending out regarding compliance with this law.</p><p>If Substack is a U2U service provider under OSA, then what is it required to do?</p><p>The obligations falling on Substack can be found in Chapter 2 of the legislation, which in the main include the following:</p><ul><li><p>Carry out an assessment that evaluates how likely users are to encounter illegal content on the service<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p></li><li><p>Take measures to mitigate and manage the risk of illegal content existing on the service, including through, among other things, the design of certain functionalities or other features, drafting policies on terms of use, content moderation or other measures<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a></p></li><li><p>Enable users to report illegal content or content that is harmful to children<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a></p></li></ul><h1>What are the specific requirements regarding child safety and age checks?</h1><p>So how do the OSA requirements apply to Substack in such a way that it needs to check the ages of its users?</p><p>If you read Substack&#8217;s <a href="https://support.substack.com/hc/en-us/articles/42995419870100-Substack-18-Content-policy">18+ content policy</a> on its support page, we see the following:</p><blockquote><p>Substack supports a wide range of writing and creative expression, including material intended for adult audiences. In compliance with the <strong><a href="https://www.gov.uk/government/publications/online-safety-act-explainer/online-safety-act-explainer">UK Online Safety Act</a></strong> (&#8220;OSA&#8221;), we are required to provide UK users with a way to report potentially illegal or age-restricted content.</p></blockquote><p>Let&#8217;s unpack this a bit.</p><p>As suggested in Substack&#8217;s policy, the platform allows material to be published for adult audiences and therefore material that may not be suitable for children. Where this is the case, OSA imposes child safety duties on service providers where that service is &#8220;likely to be accessed by children.&#8221;<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a></p><p>The likelihood of a child accessing a service depends on the outcome of a children&#8217;s access assessment.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a> This is an assessment that determines whether it is possible for a child to access the service and whether either a significant number of children use the service or the service likely to attract a significant number of child users.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a> All U2U service providers, including Substack, are required to carry out this assessment.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-8" href="#footnote-8" target="_self">8</a> Interestingly, OSA explicitly states that if a service has not already implemented age checks for its service, it cannot conclude that its service is not likely to be accessed by children.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-9" href="#footnote-9" target="_self">9</a></p><p>If the service is likely to be accessed by children, then a U2U service provider like Substack will also need to carry out a child risk assessment for its service.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-10" href="#footnote-10" target="_self">10</a> This assessment needs to evaluate how likely child users are to encounter what OSA calls &#8216;primary priority content&#8217; that is harmful to children. In its <a href="https://www.ofcom.org.uk/siteassets/resources/documents/consultations/category-1-10-weeks/statement-protecting-children-from-harms-online/main-document/guidance-on-content-harmful-to-children.pdf?v=395445">guidance</a>, Ofcom has stated that content relating to the following falls in this category:<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-11" href="#footnote-11" target="_self">11</a></p><ul><li><p>Pornography</p></li><li><p>Suicide</p></li><li><p>Self-harm</p></li><li><p>Eating disorders</p></li><li><p>Abuse and hate speech</p></li><li><p>Bullying</p></li><li><p>Violence</p></li><li><p>Harmful substances</p></li><li><p>Dangerous stunts and challenges</p></li></ul><p>In carrying out these risk assessment, Ofcom has specified the characteristics of the service that should be taken into account. Among these characteristics include the ability to send direct messages on the service, on which Ofcom states the following in its <a href="https://www.ofcom.org.uk/siteassets/resources/documents/consultations/category-1-10-weeks/statement-protecting-children-from-harms-online/main-document/childrens-risk-assessment-guidance-and-childrens-risk-profiles.pdf?v=396653">guidance</a>:</p><blockquote><p>Direct messaging can allow users to share content harmful to children in a closed and more targeted manner. While direct messaging can enable users to protect their privacy, our evidence shows direct messaging can enable abuse and hate content, and bullying content behaviours, particularly between two users, that are more likely to go unnoticed by others. This risk may increase when users are able to message other users without the recipient&#8217;s permission. Children can also receive direct messages containing pornographic content, often in the form of hyperlinks and frequently by users they do not know or suspect to be &#8216;bots&#8217;.</p></blockquote><p>As part of the child safety duties under OSA, U2U service providers are required to prevent children from encountering primary priority content as well as protect children from the risk of harm of other content on the service.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-12" href="#footnote-12" target="_self">12</a></p><p>To comply with this duty, OSA requires U2U service providers to use age verification or age estimation (or both) to prevent children encountering harmful content.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-13" href="#footnote-13" target="_self">13</a> In doing so, the service provider must ensure that the age checks are &#8220;highly effective at correctly determining whether or not a particular user is a child.&#8221;<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-14" href="#footnote-14" target="_self">14</a></p><p>OSA is quite specific regarding what counts as age verification or age estimation:</p><ul><li><p>&#8216;Age verification&#8217; means &#8220;any measure designed to verify the exact age of users of a regulated service.&#8221;<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-15" href="#footnote-15" target="_self">15</a></p></li><li><p>&#8216;Age estimation&#8217; means &#8220;any measure designed to estimate the age or age-range of users of a regulated servic.&#8221;<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-16" href="#footnote-16" target="_self">16</a></p></li></ul><p>Accordingly, any measures where a user simply self-declares that they are of a certain age (for example by ticking a box which says that they are 18 or above) is neither considered age verification or estimation for the purposes of OSA.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-17" href="#footnote-17" target="_self">17</a> Such mechanisms are not enough to comply with the law.</p><p>So putting this altogether:</p><ul><li><p>Substack allows material suitable for adults and therefore not suitable for children</p></li><li><p>Substack has probably concluded that its service is likely to be accessed by children</p></li><li><p>Substack&#8217;s child risk assessment likely included the risks of having direct messaging features as part of its service</p></li><li><p>Substack considers itself to be subject to child safety duties under OSA</p></li><li><p>To comply with these duties, Substack has implemented age checks for its service, including for its direct messaging feature</p></li></ul><h1>Data protection and age checks</h1><p>If you have gone ahead and completed the age checks mandated by Substack, you may be wondering how your data is handled as part of this process.</p><p>There are different ways for an internet service to carry out age checks on users:</p><ul><li><p><strong>Verifying ID documents.</strong> This requires uploading a picture of an government-issued ID such as a driving licence or passport. The document is then checked for authenticity and to verify the age of the user presented in the documents.</p></li><li><p><strong>Computer-vision approach.</strong> This is where the service predicts the age of a given user based on an image of their face. With this, users are required to take a selfie using their device from which their age is estimated.</p></li><li><p><strong>Analysing account information.</strong> This involves using data from or generated about a user on the service to predict their age. For example, <a href="https://blog.youtube/news-and-events/extending-our-built-in-protections-to-more-teens-on-youtube/">YouTube</a> applies machine learning for age estimation of its users by relying various signals such as search history and how long an account has existed.</p></li></ul><p>Third party providers are usually preferred by internet services for carrying out the checks. Substack uses <a href="https://help.withpersona.com/articles/huT4RcIBnrAulAHamu6Gz/">Persona</a>, an online identity verification service based in San Francisco. Substack&#8217;s <a href="https://support.substack.com/hc/en-us/articles/42995315367572-Why-is-Substack-asking-to-verify-my-age?__cf_chl_tk=YHdEhv1igNo.Tgo2.f3k453R84aKUy3Xg0RCsGALv8E-1768571380-1.0.1.1-f0jIU84bezbGRTcxKsA3tVmCehVsaBKsitRh6EOio9U#h_01KARWFCKYX94QFYN75BT6PY4E">support page</a> describes how an age check is conducted based initially on a selfie or, failing this, a copy of a government-issued ID document.</p><p>The handling of user data for age checks is something that OSA does anticipate, as it states that the following duty applies to internet services subject to the legislation:<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-18" href="#footnote-18" target="_self">18</a></p><blockquote><p>When deciding on, and implementing, safety measures and policies, a duty to have particular regard to the importance of protecting users from a breach of any statutory provision or rule of law concerning <strong>privacy</strong> that is relevant to the use or operation of a user-to-user service (including, but not limited to, <strong>any such provision or rule concerning the processing of personal data</strong>). (Emphasis added)</p></blockquote><p>OSA does not contain much by way of specific data protection and privacy rules. For this, Ofcom relies on the enforcement activity of the Information Commissioner&#8217;s Office (ICO), as the UK&#8217;s data protection regulator, <a href="https://www.ofcom.org.uk/online-safety/protecting-children/age-checks-for-online-safety--what-you-need-to-know-as-a-user">stating</a>:</p><blockquote><p>We work closely with the ICO and where we have concerns that a provider has not complied with data protection law, we may refer the matter to the ICO.</p></blockquote><p>To that effect, the ICO has published <a href="https://ico.org.uk/about-the-ico/what-we-do/information-commissioners-opinions/age-assurance-for-the-children-s-code/">guidance</a> on the use of age checking technology whilst ensuring compliance with relevant data protection rules, including the UK GDPR. In that guidance, the ICO sets out their expectations for age assurance and compliance with each of the data protection principles.</p><p>There are a few issues here that I think are worth highlighting.</p><p>The first one concerns accuracy. U2U service providers that estimate a user&#8217;s age using computer-vision mechanisms or based on account information are relying on approaches where the likelihood of error is much higher. These errors either result in genuine adults being denied access to the service or part of the service or granting access to children when they should not.</p><p>Sometimes the source of this accuracy is the bias ingrained in the facial estimation systems themselves. These systems utilise machine learning classifiers trained on large datasets of facial images. However, these datasets are not always demographically diverse, resulting in varying performance levels when used for different types of people, including in terms of skin colour and gender.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WjWK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64cad97-2e0d-48ee-bb6f-fff1233e2b11_1276x482.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WjWK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64cad97-2e0d-48ee-bb6f-fff1233e2b11_1276x482.png 424w, https://substackcdn.com/image/fetch/$s_!WjWK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64cad97-2e0d-48ee-bb6f-fff1233e2b11_1276x482.png 848w, https://substackcdn.com/image/fetch/$s_!WjWK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64cad97-2e0d-48ee-bb6f-fff1233e2b11_1276x482.png 1272w, https://substackcdn.com/image/fetch/$s_!WjWK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64cad97-2e0d-48ee-bb6f-fff1233e2b11_1276x482.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WjWK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64cad97-2e0d-48ee-bb6f-fff1233e2b11_1276x482.png" width="1276" height="482" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e64cad97-2e0d-48ee-bb6f-fff1233e2b11_1276x482.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:482,&quot;width&quot;:1276,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:381173,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thecybersolicitor.com/i/185105000?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefe29c52-f7b0-4662-b417-2748301a9c23_1276x482.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WjWK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64cad97-2e0d-48ee-bb6f-fff1233e2b11_1276x482.png 424w, https://substackcdn.com/image/fetch/$s_!WjWK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64cad97-2e0d-48ee-bb6f-fff1233e2b11_1276x482.png 848w, https://substackcdn.com/image/fetch/$s_!WjWK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64cad97-2e0d-48ee-bb6f-fff1233e2b11_1276x482.png 1272w, https://substackcdn.com/image/fetch/$s_!WjWK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64cad97-2e0d-48ee-bb6f-fff1233e2b11_1276x482.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">From <a href="https://web.archive.org/web/20250416160357/https://www.yoti.com/wp-content/uploads/2023/10/Facial-age-estimation-fact-sheet.pdf">Yoti&#8217;s Facial Age Estimation Fact Sheet</a>. Mean absolute error (MAE) measures how far off an estimate is from the true age. For example, a MAE of 1.6 means an estimate of a person&#8217;s age is off by 1.6 years.</figcaption></figure></div><p>Additionally, as with any system, there are security risks. Back in July 2024, AU10TIX, an Israeli ID verification company, suffered a data <a href="https://trustcloud.tech/blog/au10tix-case-records-exposed-security-breach-major-apps/">breach</a> which exposed its logging platform containing images of identity documents like driving licences and passports. This provider was used by TikTok, Uber X and other well-known internet services at the time.</p><p>By relying on third party age checking systems, which has become the standard approach, another entity is added to the data processing chain which in turn increases the lack of control one has over their data. These providers may state that they only use the data to verify identity, but from a user perspective it is difficult to verify if this is really true. Once the ID documents or selfies have been sent to their servers, the fate of that sensitive information is essentially in the hands of the service provider. This is especially if those providers are based in another country where data protection laws may be weaker or basically non-existent.</p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/why-substack-is-asking-for-your-age">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[You are reading legal docs wrong]]></title><description><![CDATA[A guide for beginners]]></description><link>https://www.thecybersolicitor.com/p/how-to-read-legal-docs</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/how-to-read-legal-docs</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 23 Jan 2026 09:01:32 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/8ce0a3d9-a9dd-465a-8325-1bcec8bfae1d_500x333.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Let&#8217;s be honest, reading legal documents sucks.</p><p>When I say legal documents, I am referring to those documents you would have come across or at least heard about before. Think legislation or regulations, codes, contracts, policies and others.</p><p>Reading these documents is often a bit of a drag. I often find this to be the case, even as someone who reads such documents on a regular basis as part of my work. This struggle as three strands to it:</p><ol><li><p><strong>They are not always easy to read and understand.</strong> Legal documents often contain lots of legal jargon and technical terms. I have come to understand many of this, but there are certainly times where I will come across a provision that almost seems like it is written in a foreign language.</p></li><li><p><strong>They are too long.</strong> The length of document depends on the type of document. Legislation tends to be the longest, sometimes containing hundreds of provisions each of which could be several paragraphs long. Combined with the jargon, it can feel like it takes forever to get through a single piece of legislation.</p></li><li><p><strong>They are not always clear.</strong> The extended length combined with the extended jargon sometimes clouds the crux of the document. I will sometimes read provision after provision and lose sight of what the document is ultimately trying to convey and what is therefore important.</p></li></ol><p>That reading legal documents is often a pain is far from ideal.</p><p>These documents are important, as they describe the various rights and obligations that apply to you and others in a given situation. But when that crucial information is buried in a dense packaging of words entangled with alien concepts that take time to decipher, access to that information seems impossible. And this is even before thinking about the more difficult part, which is what actions you can take based on the obligations and rights that apply to you.</p><p>Even so, I think the ability to navigate the most tricky of legal documents is a skill that anybody can learn. There are certain principles you can follow and implement that help you to get through the task and identify the information that is most important for you. It may take a bit of time to get the hang of it, but I think investing the time is worth it given the importance of some of the legal documents you will need to read in your time, especially if you are a legal professional.</p><p>The principles and guidance that I share below are based on the time I have spent researching, writing and working on data rights over the past 10 years, and hopefully they prove valuable for you.</p><p>I should stress though that this newsletter does not constitute legal advice on which you should rely. You must obtain professional or specialist advice before taking, or refraining from, any action on the basis of the content in this newsletter.</p><h1>The big secret when reading legal docs</h1><p>Reading legal text is not the same as reading other types of text.</p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/how-to-read-legal-docs">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[6 truths about the chat control debate]]></title><description><![CDATA[The reality of child safety and encryption]]></description><link>https://www.thecybersolicitor.com/p/5-truths-about-the-chat-control-debate</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/5-truths-about-the-chat-control-debate</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 17 Oct 2025 08:00:22 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/cdd340aa-49bb-4066-b07e-0dfb6ecbfa6c_1200x675.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The infamous chat control proposal is back on the <a href="https://www.euronews.com/next/2025/10/11/chat-control-on-hold-europes-eastern-flank-remains-passive">EU agenda</a>. I have written about this legislation previously, which would require certain online platforms to detect and prevent instances of child sexual abuse activity taking place on their services.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;15286ea3-e6ee-42f7-bd62-42ef053885c7&quot;,&quot;caption&quot;:&quot;TL;DR This newsletter is about the EU's proposed Regulation laying down rules to prevent and combat online child sexual abuse, colloquially known as 'chat control' (May 2022 version). It looks at the scope of the legislation, the detection obligations it imposes on service providers and its potential incompatibility with end-to-end encryption.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Chat control and E2EE&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:112131599,&quot;name&quot;:&quot;Mahdi Assan&quot;,&quot;bio&quot;:&quot;Privacy pro working on AI and data rights &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/61582ad5-143e-4a5d-9e51-c20145b39d65_1167x1164.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-07-12T08:01:34.002Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ucwh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96c12a9f-4308-47c2-a8a6-6ec768a0626a_2157x1668.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.thecybersolicitor.com/p/chat-control-and-e2ee&quot;,&quot;section_name&quot;:&quot;&#128737;&#65039; Data Rights&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:146407960,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:2,&quot;publication_id&quot;:1200826,&quot;publication_name&quot;:&quot;The Cyber Solicitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!T4HV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276409e9-b16f-4458-aae2-f3c59c484ed3_1110x1110.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>There are clear dangers to E2EE and data protection with this proposal. But I think to navigate the debates entailed here, certain truths need to be acknowledged. I have thought of five pertinent ones.</p><p><em><strong>Truth #1: Messaging apps are used for offences against children online</strong></em><br>Research from the UK&#8217;s Centre of Expertise on Child Sexual Abuse demonstrates how perpetrators tend to move their interactions with children to private messaging platforms.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> Those platforms that protect messages with end-to-end encryption (E2EE) makes it much more difficult to detect instances of grooming or when child sexual abuse material (CSAM) is being generated or shared. The use of E2EE messaging platforms for criminal activity is <a href="https://www.europol.europa.eu/media-press/newsroom/news/international-operation-takes-down-another-encrypted-messaging-service-used-criminals">well-known</a> by law enforcement, and is certainly one part of the threat vector for online CSA.</p><p><em><strong>Truth #2: Messaging apps are one part of the threat vector</strong></em><br>The research on CSA offences shows that such activity comprises of several stages, and encrypted messaging apps play a role in some of those stages. Perpetrators may start in public spaces first before moving their interactions with children to private spaces.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p><p><em><strong>Truth #3: Messaging apps are not the only intervention point</strong></em><br>If messaging apps are only one part of the threat vector, then they are not the only point of intervention for detecting and preventing CSA offences. Other intervention points could be much more accessible, such as the more publicly available parts of social media platforms.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a></p><p><em><strong>Truth #4: It is hard to know the extent of the role messaging apps play in the threat vector</strong></em><br>While encrypted messaging apps form part of the lifecycle, it is difficult to know exactly how involved they are. In particular, with the limited visibility on these apps due to the lack of access to message content (except for the sender and recipient), it is difficult to understand the prevalence of CSA on the platform. This is a crucial missing piece of information.</p><p><em><strong>Truth #5: Targeted surveillance is not possible with E2EE</strong></em><br>As has been acknowledged in human rights case law, in the context of encrypted messaging apps, removing encryption for one user effectively removes it for all users. E2EE involves a set up in which the service provider does not have the cryptographic keys to read the encrypted messages exchanged on its service. Giving the provider the ability to generate its own copies of the cryptographic keys to decrypt messages removes protection for all users, even those who are not a threat.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a> It is essentially either encryption for all or encryption for none.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;b40459e6-6c7f-490d-bc35-d30190362e09&quot;,&quot;caption&quot;:&quot;On 13 February 2024, the European Court of Human Rights (ECtHR) handed down its judgment in a case concerning end-to-end encryption (E2EE). In short, it held that data acquisition orders requiring the decryption of communications protected by E2EE are unlawful.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;End-to-end encryption is a human right&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:112131599,&quot;name&quot;:&quot;Mahdi Assan&quot;,&quot;bio&quot;:&quot;Privacy pro working on AI and data rights &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/61582ad5-143e-4a5d-9e51-c20145b39d65_1167x1164.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-02-23T09:00:43.335Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2918e881-60a0-48e6-9e6b-18f276f49c4e_1280x720.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.thecybersolicitor.com/p/end-to-end-encryption-is-a-human&quot;,&quot;section_name&quot;:&quot;&#128737;&#65039; Data Rights&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:141937148,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1200826,&quot;publication_name&quot;:&quot;The Cyber Solicitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!T4HV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276409e9-b16f-4458-aae2-f3c59c484ed3_1110x1110.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><em><strong>Truth #6: The outcomes of this debate will have stark impacts on other areas</strong></em><br>Replace CSA with &#8216;terrorist content&#8217; or &#8216;misinformation&#8217; or any other online harm and the aforementioned truths and issues remain. If the law requires service providers to implement mechanisms detect and prevent one kind of harm, why just stop at one. Once the mechanism is there, the risk of function creep increases substantially.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecybersolicitor.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Solicitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Centre of expertise on child sexual abuse, &#8216;<a href="https://www.csacentre.org.uk/app/uploads/2023/10/New-typology-of-child-sexual-abuse-offending.pdf">A new typology of child sexual abuse offending</a>&#8217; (March 2020), pp.15-16.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Rachel O&#8217;Connell, &#8216;<a href="https://image.guardian.co.uk/sys-files/Society/documents/2003/07/17/Groomingreport.pdf">A typology of child cybersexploitation and online grooming practices</a>&#8217; p.8.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>See June 2023 report from the <a href="https://stacks.stanford.edu/file/druid:jd797tp7663/20230606-sio-sg-csam-report.pdf">Stanford Internet Observatory</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p><em><a href="https://hudoc.echr.coe.int/eng/#%7B%22itemid%22:%5B%22001-230854%22%5D%7D">Podchasov v Russia</a></em>, App no. 33696/19 (ECHR, 13 February 2024), para. 77.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Simple principles for good data protection]]></title><description><![CDATA[Some truths and some myths about protecting personal data]]></description><link>https://www.thecybersolicitor.com/p/simple-principles-for-good-data-protection</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/simple-principles-for-good-data-protection</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 26 Sep 2025 08:02:19 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a7332f20-5cbe-442e-bf6d-cbc8217f81be_2560x2560.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>1. Data has value <em>and</em> risk</h1><p>Data is the lifeblood of the digital world. If fuels many of the digital products and services that you use and the activities that support their development.</p><p>Without people's data, Big Tech cannot extract the behavioural surplus needed to fuel their surveillance capitalist machines that turn quantified experiences into revenue.</p><p>But data also comes with risk. Negative consequences can certainly follow from improper uses of data.</p><p>Data that is of poor quality or is biased and non-representative that are then fed into machine learning algorithms can produce models that are equally substandard. And if these models are incorporated into systems used in significantly consequential contexts, such as making medical diagnoses, then you've got serious problems.</p><p>So data is not just "the new oil" or "an asset." It is something that requires careful and considered use given its ability to be both a boon or a complication, depending on who is using it and how.</p><h1>2. Privacy and data protection are not the same thing</h1><p>Privacy regulates who gets access to your data. Data protection regulates how that data can be used once accessed.</p><p>The protection of your data does not stop once you had it over. Data protection is concerned with the whole data lifecycle, to ensure that its use is done fairly and responsibly.</p><p>Data protection can therefore be a means to ensure privacy. But data protection can also be a means to protect other rights and interests:</p><blockquote><p>For example, the GDPR protects people from being subject to decisions based solely on automated processing producing significant affects on them, with some exceptions. Even where those exceptions apply, individuals have the right to obtain meaningful information about the logic involved in the automated processing and to contest such a decision.</p><p>These rights become highly relevant when, for instance, a company algorithmically manages the shift of its gig economy workers. Such workers have the right to know exactly how this automated processing works, especially when it determines their job opportunities.</p><p>This is not really about privacy, since the employer would need to know the availability of its workers to assign shifts for the delivery of its service. But <em>how</em> this is done is important, for this still ought to be done in a manner that does not lead to unfair outcomes.</p></blockquote><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;1291641c-f138-43e1-8117-7203bd4be9f7&quot;,&quot;caption&quot;:&quot;Data protection and privacy are often used interchangeably, but they mean different things.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Data protection and privacy are not the same&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:112131599,&quot;name&quot;:&quot;Mahdi Assan&quot;,&quot;bio&quot;:&quot;Privacy pro working on AI and data rights &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/61582ad5-143e-4a5d-9e51-c20145b39d65_1167x1164.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-03-15T09:00:29.518Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Kerv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76cf0d0d-d012-43cf-9bbb-e5fb586af759_3000x3000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.thecybersolicitor.com/p/data-protection-and-privacy-are-not&quot;,&quot;section_name&quot;:&quot;&#128737;&#65039; Data Rights&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:142478020,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1200826,&quot;publication_name&quot;:&quot;The Cyber Solicitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!T4HV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276409e9-b16f-4458-aae2-f3c59c484ed3_1110x1110.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h1>3. Only take what you need</h1><p>Data minimisation requires that you only collect and use the data that are necessary for fulfilling the intended purpose.</p><p>This means that the type, nature and amount of data should be of relevance and utility to the processing purpose. If the processing purpose is not clearly articulated, data minimisation is not possible.</p><p>When you buy a product from an online retailer to be delivered to your home, you only need to provide them with your contact details, payment details and home address. Nothing more is required for that processing activity.</p><h1>4. Don&#8217;t keep it &#8220;just in case&#8221;</h1><p>Excess data can be messy and risky.</p><p>Maintaining multiple datasets across multiple systems is not easy. Plus, the more data one holds, the higher the possibility that it gets misused and the higher the severity of a breach if it is accessed by a malicious third-party attacking your systems.</p><p>So do not keep any more data than you actually need. Again, articulating the processing purpose is essential for this - once you know the purpose of its collection, you know whether you need to keep it and for how long for.</p><p>For example, why keep CVs of previously rejected job applicants. Those CVs are likely to get outdated over time, and in any case the data are from people who ended up not joining the organisation. What is the point of keeping such records?</p><p>If you do not need to keep the data, then do not keep that data.</p><h1>5. The use of data must be clear and justifiable to the data subject</h1><p>If you cannot justify the use of data to the person that it belongs to, then should you be using it at all?</p><p>This requires considering things from the perspective of the data subject. If you were a data subject, would you accept the justification for the proposed use of your data and is that justification clear to you?</p><p>The context of the data processing and the reasonable expectations of the data subject are therefore key factors here. If you post content on a social media platform for your connections to see, you may not reasonably expect that that content is also used to train an AI model developed by the platform provider. One use of data does not automatically justify another, even if it is remotely related.</p><p>And even if the use of data is justifiable, this needs to be made clear to the data subject. Stuffing the justification in a privacy policy which is linked at the bottom of a website is sometimes not enough. Information about how data is used ought to be delivered in a manner convenient for the data subject, namely at the time that the data are collected.</p><p>Collecting one's data through deceptive does not really suggest that its use is justifiable or fair.</p><h1>6. You don&#8217;t always need consent</h1><p>Consent is one way for obtaining someone's data, but it is not the only way.</p><p>Sometimes asking for consent may not actually be appropriate. This could be the case in a employer-employee relationship; the power imbalance is such that employees will feel pressured to accept the use of their data by their employer. They may often feel that there is not a genuine choice.</p><p>Other times, asking for consent simply does not make sense. If processing personal data is necessary to perform a contract with the data subject, asking for their consent to process their personal data is not needed. If the data subject does not give their consent, then performing the contract cannot be done. Consent is not needed in this case.</p>]]></content:encoded></item><item><title><![CDATA[Is pseudonymised data personal data? (Part 2)]]></title><description><![CDATA[An analysis of the Court's verdict in EDPS v SRB]]></description><link>https://www.thecybersolicitor.com/p/is-pseudonymised-data-personal-data-3af</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/is-pseudonymised-data-personal-data-3af</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 12 Sep 2025 08:02:37 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/863189fc-4a81-46dd-8a9c-a18264f0c20d_2560x1663.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>TL;DR</h1><p>This newsletter is about a decision by the Court of Justice of the European Union (CJEU) in <em>EDPS v SRB</em>. It looks at the Court's view on how the GDPR applies to pseudonymised data and the implications this has for certain data processing activities.</p><p>Here are the key takeaways:</p><ul><li><p>Pseudonymisation refers to techniques that reduce the identifiability of personal data. It consists of taking original data, applying a pseudonymisation technique to that data with the output consisting of pseudonymised data.</p></li><li><p><em>EDPS v SRB</em> is essentially a case about in what circumstances pseudonymised data may be regarded as personal data under the GDPR. It considers whether it is correct to apply a strict approach to this question, whereby pseudonymised data should always be considered personal data.</p></li><li><p>The CJEU upheld a relative approach to this issue. This means that, under the GDPR, pseudonymised data <em>is not always</em> personal data.</p></li><li><p>If an entity receives pseudonymised data from a controller without the additional information required to link the data to a data subject, and also does not have any other reasonable means to identify the data subject, then that entity has not received personal data. The position of the receiving entity in this case is therefore pertinent to the question of whether the information is indeed personal data.</p></li><li><p>The CJEU's decision in <em>EDPS v SRB</em> could have interesting implications for certain types of data processing activities. This includes on-device processing and encryption, as well as the personal data potentially stored in deployed LLMs.</p></li></ul><h1>The issues at play</h1><p>Back in February this year, I took a look at an Advocate General opinion in the case of <em><a href="https://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX:62023CJ0413">EDPS v SRB</a></em> before the Court of Justice of the European Union (CJEU). This case tests the presumption that pseudonymised data is <em>always</em> personal data under the GDPR.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d7f5afdb-4806-4c63-bfb7-55b75829fca2&quot;,&quot;caption&quot;:&quot;TL;DR This newsletter is about a pseudonymisation and personal data. It looks at a recent AG opinion on the matter and the implications this has for on-device processing and encryption.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Is pseudonymised data personal data?&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:112131599,&quot;name&quot;:&quot;Mahdi Assan&quot;,&quot;bio&quot;:&quot;Privacy pro working on AI and data rights &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/61582ad5-143e-4a5d-9e51-c20145b39d65_1167x1164.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-02-14T09:02:42.110Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Zf7i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba15688-2a77-44da-b9b4-2b97398a7b3e_2560x1270.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.thecybersolicitor.com/p/is-pseudonymised-data-personal-data&quot;,&quot;section_name&quot;:&quot;&#128737;&#65039; Data Rights&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:157088951,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:1,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Cyber Solicitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!T4HV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276409e9-b16f-4458-aae2-f3c59c484ed3_1110x1110.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Pseudonymisation refers to techniques that reduce the identifiability of personal data. It consists of taking original data, applying a pseudonymisation technique to that data with the output consisting of pseudonymised data. It therefore consists of three elements:</p><ol><li><p>The original data</p></li><li><p>The pseudonymisation technique applied</p></li><li><p>The pseudonymised data (which itself consists of the output pseudonym and the additional information that can be used to elucidate the original data)</p></li></ol><p>An example of a pseudonymisation technique is encryption:</p><ul><li><p>The original data is the plaintext that is being encrypted</p></li><li><p>Applied to this plaintext is the cryptographic protocol</p></li><li><p>The output of this application is the cipher text and the cryptographic keys to decrypt the cipher and turn it back to into the plaintext</p></li></ul><p>A full summary of the facts of the case can be found in my previous post, but to quickly recap:</p><ul><li><p>The Single Resolution Board (SRB) is the resolution authority for the European Bank union.</p></li><li><p>In June 2017, SRB hired Deloitte to carry out some analysis that involved comments that SRB had collected from shareholders of a bank.</p></li><li><p>SRB therefore shared with Deloitte copies of the comments along with alphanumeric codes generated for each comment.</p></li><li><p>SRB did not share with Deloitte any other data SRB had initially collected from the shareholders.</p></li><li><p>Those shareholders complained to the European Data Protection Supervisor (EDPS) that SRB had not informed them that their personal data would be shared with Deloitte.</p></li><li><p>SRB argued that the information it shared with Deloitte was not personal data since the comments and alphanumeric codes could not be used by Deloitte to identify individuals.</p></li><li><p>The EDPS disagreed with SRB's view and found that the information shared with Deloitte constituted personal data.</p></li><li><p>SRB brought proceedings against the EDPS before the General Court of the CJEU, which ended up ruling in SRB's favour holding that the information shared with Deloitte was not personal data.</p></li><li><p>The EDPS appealed this verdict by the General Court, which is the subject of this latest case.</p></li></ul><p>AG Spielmann's opinion on the matter was that the information shared with Deloitte was not personal data. The reasoning was threefold:</p><ul><li><p>As per Recital (16), the identifiability of a data subject could be achieved by a data controller 'or by another person.' The reasonable likelihood of identifiability needs to be considered, taking into account the cost and time required to do so and the technology available to achieve identifiability.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p></li><li><p>CJEU caselaw has previously set out the parameters for such identifiability. In particular, the Court has held that, in certain circumstances, information could still considered personal data even if "dissociated from the identification data held by someone else."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p></li><li><p>Pseudonymised data may not be considered personal data if "the risk of identification is non-existent or insignificant."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a></p></li></ul><p>Therefore:</p><blockquote><p>According to AG, this reasoning supports a relative, rather than a strict, approach to the concept of personal data and pseudonymisation. Taking a relative approach to the current case, the AG suggests that the key question for the Court to consider is whether "Deloitte had reasonable means to identify [the data subjects]."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a> If Deloitte did have such means, only then should the comments and alphanumeric codes it received from the SRB should be considered personal data.</p></blockquote><p>The case is ultimately about the following question:<br><em>If entity A collects personal data, pseudonymises it and shares only the pseudonymised with entity B, with only entity A possessing the additional information required to use the pseudonymised data to identify specific individuals, is the pseudonymised data shared with entity B personal data under the GPDR?</em></p><p></p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/is-pseudonymised-data-personal-data-3af">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[On data security and data breaches]]></title><description><![CDATA[What is required for data security under the GDPR]]></description><link>https://www.thecybersolicitor.com/p/on-data-security-and-data-breaches</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/on-data-security-and-data-breaches</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 29 Aug 2025 08:02:13 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/0abb7764-2c79-4ca1-b501-507e291659d7_1920x1200.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>TL;DR</h1><p>This newsletter is about a 2023 case on data security under the GDPR. It looks at what is required of data controllers in this regard, the extent of their liability for data breaches and what data subjects can claim compensation for in the context of a breach.</p><p>Here are the key takeaways:</p><ul><li><p>The case of <em><a href="https://curia.europa.eu/juris/document/document.jsf?docid=280623&amp;doclang=en">VB v Natsionalna agentsia za prihodite</a></em> involves the&#8230;</p></li></ul>
      <p>
          <a href="https://www.thecybersolicitor.com/p/on-data-security-and-data-breaches">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[What is a legitimate interest under the GDPR?]]></title><description><![CDATA[Some thoughts on a recent CJEU case on this legal basis for data processing]]></description><link>https://www.thecybersolicitor.com/p/what-is-a-legitimate-interest-under</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/what-is-a-legitimate-interest-under</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 08 Aug 2025 08:01:08 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/294bfceb-bfe0-48ae-9aa8-ba9f6daf561e_4000x3000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>TL;DR</h1><p>This newsletter is about a decision by the Court of Justice of the European Union (CJEU) on legitimate interests under the GDPR. It looks the conditions under which a commercial interest can justify the processing of personal data.</p><p>Here are the key takeaways:</p><ul><li><p>In <em><a href="https://curia.europa.eu/juris/document/document_print.jsf?pageIndex=0&amp;docid=290688&amp;doclang=EN&amp;text=&amp;cid=11032696">Koninklijke Nederlandse Lawn Tennisbond</a></em>, the CJEU sought to answer the following question: for an interest to qualify as a 'legitimate interest' under the GDPR as a legal basis for the use of personal data, does it need to be derived from a law or be a legal norm?</p></li><li><p>The short answer to this was in the negative. In other words, legitimate interests do not need to be derived from a law or be a legal norm.</p></li><li><p>However, the Court emphasised that whilst this means that a commercial interest can be a legitimate interest under the GDPR, such an interest still needs to satisfy a three-part test:</p><ol><li><p>It needs to be shown that the controller or a third party is pursuing a legitimate interest.</p></li><li><p>The processing of personal data must be necessary to pursue that legitimate interest</p></li><li><p>The legitimate interest being pursued, and the data processing it entails, must not take precedence over the interests or fundamental freedoms and rights of the data subjects</p></li></ol></li><li><p>Only if the controller can demonstrate that the this three-part test has been satisfied may it rely on a commercial interest to process personal data.</p></li></ul><p>A judgement from the Court of Justice of the European Union (CJEU) handed down in October 2024 answers this simple question:</p><blockquote><p>For an interest to qualify as a 'legitimate interest' under the GDPR as a legal basis for the use of personal data, does it need to be derived from a law or be a legal norm?</p></blockquote><p>In short, the CJEU's answer in <em><a href="https://curia.europa.eu/juris/document/document_print.jsf?pageIndex=0&amp;docid=290688&amp;doclang=EN&amp;text=&amp;cid=11032696">Koninklijke Nederlandse Lawn Tennisbond</a></em> to this was no - legitimate interests do not need to be derived from a law or be a legal norm. However, that still does not mean that any interest can be a legitimate interest and form as a legal basis for personal data processing.</p><p></p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/what-is-a-legitimate-interest-under">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[TikTok China transfers are unlawful]]></title><description><![CDATA[The state of international data transfers in 2025]]></description><link>https://www.thecybersolicitor.com/p/tiktok-china-transfers-are-unlawful</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/tiktok-china-transfers-are-unlawful</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 09 May 2025 08:00:35 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e5348ba7-48df-4be2-8bb0-9f4f765335e5_1600x900.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In May, the Irish Data Protection Commissioner (DPC) <a href="https://dataprotection.ie/en/news-media/latest-news/irish-data-protection-commission-fines-tiktok-eu530-million-and-orders-corrective-measures-following">announced</a> its decision regarding TikTok's transfer of its users' data from the EU to China.</p><p>It stated:</p><blockquote><p>The decision...finds that TikTok infringed the GDPR regarding its transfers of EEA User Data to China and its transparency requirements. The decision includes administrative fines totalling &#8364;530 millio&#8230;</p></blockquote>
      <p>
          <a href="https://www.thecybersolicitor.com/p/tiktok-china-transfers-are-unlawful">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Data adequacy decisions under the GDPR]]></title><description><![CDATA[A thorough look at the rules on the free flow of personal data from the EU to other countries]]></description><link>https://www.thecybersolicitor.com/p/data-adequacy-decisions-under-the</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/data-adequacy-decisions-under-the</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 28 Feb 2025 09:01:08 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/dc5c5f91-a386-4eb2-9738-23a939c95177_1920x1280.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>TL;DR</h1><p>This newsletter is about data adequacy decisions made by the European Commission under the GDPR. It looks the assessments and procedure that must be carried out by the Commission for these decisions, the form that these decisions can take and their legal status.</p><p>Here are the key takeaways:</p><ul><li><p>Under the GDPR, transfers of personal data to countries outsi&#8230;</p></li></ul>
      <p>
          <a href="https://www.thecybersolicitor.com/p/data-adequacy-decisions-under-the">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Is pseudonymised data personal data?]]></title><description><![CDATA[An analysis of the AG opinion on EDPS v SRB]]></description><link>https://www.thecybersolicitor.com/p/is-pseudonymised-data-personal-data</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/is-pseudonymised-data-personal-data</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 14 Feb 2025 09:02:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Zf7i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba15688-2a77-44da-b9b4-2b97398a7b3e_2560x1270.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zf7i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba15688-2a77-44da-b9b4-2b97398a7b3e_2560x1270.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zf7i!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba15688-2a77-44da-b9b4-2b97398a7b3e_2560x1270.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Zf7i!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba15688-2a77-44da-b9b4-2b97398a7b3e_2560x1270.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Zf7i!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba15688-2a77-44da-b9b4-2b97398a7b3e_2560x1270.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Zf7i!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba15688-2a77-44da-b9b4-2b97398a7b3e_2560x1270.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zf7i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba15688-2a77-44da-b9b4-2b97398a7b3e_2560x1270.jpeg" width="1456" height="722" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cba15688-2a77-44da-b9b4-2b97398a7b3e_2560x1270.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:722,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:715623,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Zf7i!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba15688-2a77-44da-b9b4-2b97398a7b3e_2560x1270.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Zf7i!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba15688-2a77-44da-b9b4-2b97398a7b3e_2560x1270.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Zf7i!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba15688-2a77-44da-b9b4-2b97398a7b3e_2560x1270.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Zf7i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba15688-2a77-44da-b9b4-2b97398a7b3e_2560x1270.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Elise Racine / Better Images of AI / Static / CC-BY 4.0</figcaption></figure></div><h1>TL;DR</h1><p>This newsletter is about a pseudonymisation and personal data. It looks at a recent AG opinion on the matter and the implications this has for on-device processing and encryption.</p><p>Here are the key takeaways:</p><ul><li><p>Pseudonymisation refers to techniques that reduce the identifiability of personal data. It consists of taking original data, applying a pseudonymisation technique to that data with the output consisting of pseudonymised data.</p></li><li><p>There are different ways to pseudonymise data. For example, if you have a database containing the dates of birth of customers, this can be pseudonymised by replacing the dates with age ranges.</p></li><li><p>Under the GDPR, pseudonymised data is still considered personal data. However, a recent case (<em>EDPS v SRB</em>) brought before the Court of Justice (CJEU) of the European Union tests this presumption.</p></li><li><p>The verdict of the Court is still forthcoming. In the meantime, the opinion of the Advocate General (AG) Spielmann was published on 6 February, providing his view on the matter in question:</p><ul><li><p>As per Recital (16) of Regulation 2018/1725, the identifiability of a data subject from pseudonymised data could be achieved by a data controller 'or by another person.' The reasonable likelihood of identifiability needs to be considered, taking into account the cost and time required to do so and the technology available to achieve identifiability. </p></li><li><p>CJEU caselaw has previously set out the parameters for such identifiability. In particular, the Court has held that, in certain circumstances, information could still considered personal data even if "dissociated from the identification data held by someone else."</p></li><li><p>Pseudonymised data may not be considered personal data if "the risk of identification is non-existent or insignificant."</p></li></ul></li><li><p>So according to the AG, for the pseudonymising controller, the data remains personal data. But for any recipient of the pseudonymised data with no reasonable means to use the data to identify a data subject, the data are effectively anonymised and therefore <em>not</em> personal data.</p></li><li><p>If this view is adopted by the Court, then this could have interesting implications for a range of different processing contexts. This includes on-device processing and encryption.</p></li></ul><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecybersolicitor.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Solicitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>What is pseudonymisation?</h1><p>The GDPR provides a definition of pseudonymisation under <a href="https://gdpr-info.eu/art-4-gdpr/">Article 4.5</a>:</p><blockquote><p>...the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organisational measures to ensure that the personal data are not attributed to an identified or identifiable natural person.</p></blockquote><p>In essence, pseudonymisation refers to techniques that reduce the identifiability of personal data. There are therefore different degrees of identifiability:</p><ul><li><p><strong>Identified individual.</strong> Identity is clear when we know exactly who the individual is, i.e., the data are linked to a single person.</p></li><li><p><strong>Pseudonymity.</strong> Different data points can be linked to someone, but we do not know who that someone is.</p></li><li><p><strong>Anonymity.</strong> We both do not know the identity of the individual that the data is about nor whether the data are about the same person</p></li></ul><p>There also various ways that data can be pseudonymised. Some of these include the following:</p><ul><li><p><strong>Summarisation.</strong> This is about reducing the granularity or particularity of the data. For example, if you have a database containing the dates of birth of customers, this can be pseudonymised by replacing the dates with age ranges.</p></li><li><p><strong>Perturbation.</strong> This is about obfuscating the data. For example, you can use a cryptographic hash function to transform personal data into a hash value.</p></li></ul><p>Pseudonymisation techniques consist of three key elements:<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p><ol><li><p>The original data</p></li><li><p>The pseudonymisation technique/transformation</p></li><li><p>The pseudonymised data (which itself consists of the output pseudonym and the additional information that can be used to elucidate the original data)</p></li></ol><p>Let's say you have a dataset of customers and you wanted to pseudonymise their names using a cryptographic hash function. In this case:</p><ul><li><p>The original data would be the customer name</p></li><li><p>The pseudonymisation technique/transformation would be the cryptographic hash function</p></li><li><p>The pseudonymised data would consist of the hash value outputted by the function as well as the cryptographic keys</p></li></ul><p>Under the GDPR, pseudonymisation is mentioned as a security measure. <a href="https://gdpr-info.eu/art-32-gdpr/">Article 32</a> lists examples of organisational and technical measures that can be used to secure personal data, including "the pseudonymisation and encryption of personal data."</p><p>This technical measure is also mentioned in <a href="https://gdpr-info.eu/art-25-gdpr/">Article 25.1</a> in the context of data protection by design and by default:</p><blockquote><p>Taking into account the state of the art, the cost of implementation and the nature, scope, context and purposes of processing as well as the risks of varying likelihood and severity for rights and freedoms of natural persons posed by the processing, the controller shall, both at the time of the determination of the means for processing and at the time of the processing itself, implement appropriate technical and organisational measures, <strong>such as pseudonymisation</strong>, which are designed to implement data-protection principles, such as data minimisation, in an effective manner and to integrate the necessary safeguards into the processing in order to meet the requirements of this Regulation and protect the rights of data subjects. (Emphasis added)</p></blockquote><p>Pseudonymised data has always been considered personal data under the GDPR. The output of a pseudonymisation technique may not easily be used to identify a data subject, but the data subject can still be identifiable if additional information is used.</p><p>Examples of such additional information can include cryptographic keys or tables of the original personal data matching pseudonyms that they have been replaced with.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> This additional information enables the pseudonymised data to be used to identify a data subject, hence the pseudonymised data ultimately remains personal data as it is still information relating to an identified or identifiable person.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a></p><p>But a case currently before the CJEU, <em><a href="https://curia.europa.eu/juris/document/document.jsf?text=&amp;docid=295078&amp;pageIndex=0&amp;doclang=EN&amp;mode=lst&amp;dir=&amp;occ=first&amp;part=1&amp;cid=28926841">EDPS vs SRB</a></em>, touches on when pseudonymised data is personal data.</p><h1><em>EDPS vs SRB</em></h1><h2>Summary of the Facts</h2><p>This case concerns a dispute between the European Data Protection Supervisor (EDPS) and the Single Resolution Board (SRB):</p><ul><li><p>The EDPS is the data protection regulator of the EU institutions. It ensures that these institutions process personal data in accordance with <a href="https://eur-lex.europa.eu/eli/reg/2018/1725/oj">Regulation (EU) 2018/1725</a>, which can be thought of as the GDPR for EU institutions.</p></li><li><p>The SRB is the resolution authority for the European Bank union. Its role is to ensure the orderly resolution of failing banks and help maintain market stability and confidence of participating EU countries.</p></li></ul><p>In June 2017, the SRB adopted a <a href="https://www.srb.europa.eu/en/content/banco-popular">resolution</a> under which Banco Popular Espa&#241;ol S.A. transferred all its shares and capital instruments to Banco Santander S.A (Santander). As part of this process, the SRB procured the services of Deloitte to determine whether shareholders and creditors affected by the resolution would have received better treatment had normal insolvency proceedings been used.</p><p>Deloitte provided the SRB with a 'valuation of different in treatment' to help the SRB decide whether compensation should be granted to the affected shareholders and creditors. To further help with its decision, the SRB also launched a right to be heard process to verify the eligibility and interest of the relevant parties and receive comments from affected shareholders and creditors.</p><p>During the registration phase, a range of data was collected. This included proof of the participants' identity and ownership of capital instruments of Banco Popular. These data were accessible to a limited number of SRB staff responsible for processing the data to determine eligibility.</p><p>During the consultation phase, eligible participants submitted their comments to SRB staff responsible for processing these comments. These SRB staff did not have visibility of the data processed during the registration phase. Additionally, each individual comment was allocated an alphanumeric code.</p><p>The comments and their codes were then shared with Deloitte, and not the data collected during the registration phase. The consultation data were categorised, filtered and aggregated before being shared:</p><blockquote><p>The comments transferred to Deloitte were solely those that were received during the consultation phase and that bore an alphanumeric code, developed for audit purposes to enable the SRB to verify, and if necessary to demonstrate subsequently, that each comment had been handled and duly considered. On account of that code, only the SRB could link the comments to the data received in the registration phase. Deloitte had, and still has, no access to the database of data collected during the registration phase.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a></p></blockquote><p>Upon learning of this data sharing with Deloitte, affected shareholders and creditors submitted complaints to the EDPS. They alleged that the SRB had failed to include in its privacy statement that data would be shared with Deloitte as per Article 15(1)(d) of <a href="https://eur-lex.europa.eu/eli/reg/2018/1725/oj">Regulation (EU) 2018/1725</a>.</p><p>The EDPS adopted its decision on the matter in which it stated that the data shared with Deloitee (the comments along with the codes) were personal data. It also stated that in the future the SRB should state in its data protection notices the entities with whom personal data may be shared.</p><p>The SRB brought proceedings against the EDPS before the General Court of the Court of Justice of the European Union (CJEU) in September 2020. In its claim, the SRB contended that the data transmitted to Deloitte did not constitute personal data.</p><p>The General Court sided with the SRB in its original judgment, holding that the data transferred to Deloitte was not personal data:</p><blockquote><p>...with regard to the condition laid down in Article 3(1) of Regulation 2018/1725 that the information must relate to an &#8216;identified or identifiable&#8217; natural person, the General Court held that, in the present case, it was for the EDPS to examine whether the comments transmitted to Deloitte constituted personal data for Deloitte. According to the judgment under appeal, <strong>the EDPS merely examined whether it was possible to re-identify the authors of the comments from the SRB&#8217;s perspective and not from Deloitte&#8217;s.</strong> Therefore, since the EDPS did not investigate whether Deloitte had legal means available to it which could in practice enable it to access the additional information necessary to re-identify the authors of the comments, the EDPS could not conclude that the information transmitted to Deloitte constituted information relating to an &#8216;identifiable natural person&#8217; within the meaning of Article 3(1) of Regulation 2018/1725.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a> (Emphasis added)</p></blockquote><p>The EDPS appealed against this decision in July 2023 on the grounds that the Court's interpretation of 'personal data' under Regulation 2018/1725 was incorrect. The appeal concerned two key matters:</p><ol><li><p>The meaning personal data</p></li><li><p>The concept of pseudonymisation</p></li></ol><p>These are the issues that the General Court will address in its decision on the appeal. In the meantime, the opinion of Advocate General Spielmann was published on 6 February, providing his view on the matter in question.</p><h2>AG Opinion</h2><h3>The meaning of personal data</h3><p>The view of the AG here is straightforward. The data collected during the consultation phase (namely the comments and their respective alphanumeric codes) did constitute personal data.</p><p>The AG reasoned that this was clear by looking at the context in which the information was collected and used:</p><blockquote><p>...it is clear from the applicable legal framework that the purpose of the right to be heard process, in the context of which the comments at issue were submitted, was to enable the affected shareholders and creditors to contribute to the process, in particular to enable the SRB to have all the information necessary to take a final decision on whether the shareholders and creditors affected by the resolution of Banco Popular should be granted compensation in accordance with the principle that no creditor should be worse off than in the event of liquidation under normal insolvency proceedings. Furthermore, those comments, once taken into account by the SRB, were liable to have an effect on the complainants&#8217; interests and rights regarding financial compensation.</p><p>I conclude on that basis that the comments at issue relate to the data subjects in the present case, including by reason of their purpose and effect.</p><p>I would add that it is true that the comments at issue, as transferred to Deloitte, were &#8216;filtered, categorised and aggregated&#8217;, with the result that, as is clear from the facts established by the General Court, individual comments could not be distinguished within a single theme; however, it may be accepted that, even when aggregated, those collective comments, in terms of their content, reflect personal views regarding Valuation 3. They constitute a sum of opinions which, as such, constitute information relating to the persons who expressed them. Their filtering, categorisation and aggregation do not alter that finding, otherwise it would be sufficient, in order to avoid the requirement of information &#8216;relating&#8217; to a natural person, to aggregate several points of view. The fact that it is not possible, within that sum of comments, to distinguish the various individual opinions seems to me to fall more within the scope of the second cumulative condition, relating to the identifiability of the data subjects, examined in the context of the second part of the present ground of appeal, than within the scope of the condition requiring the comment to be &#8216;linked&#8217; to a natural person.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a></p></blockquote><h3>The concept of pseudonymisation</h3><p>The argument put forward by the EDPS in this case is that pseudonymised data are still personal data because the data subject remains identifiable as the additional information that enables identification still exists. The AG disagrees with this argument.</p><p>The AG relies on the wording of Recital (16) of <a href="https://eur-lex.europa.eu/eli/reg/2018/1725/oj">Regulation 2018/1725</a>, which states the following:</p><blockquote><p>The principles of data protection should apply to any information concerning an identified or identifiable natural person. Personal data which have undergone pseudonymisation, which could be attributed to a natural person by the use of additional information, should be considered to be information on an identifiable natural person. To determine whether a natural person is identifiable, account should be taken of all the means reasonably likely to be used, such as singling out, either by the controller or by another person, to identify the natural person directly or indirectly. To ascertain whether means are reasonably likely to be used to identify the natural person, account should be taken of all objective factors, such as the costs of and the amount of time required for identification, taking into consideration the available technology at the time of the processing and technological developments. The principles of data protection should therefore not apply to anonymous information, namely information which does not relate to an identified or identifiable natural person or to personal data rendered anonymous in such a manner that the data subject is not or no longer identifiable. This Regulation does not therefore concern the processing of such anonymous information, including for statistical or research purposes.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a> </p></blockquote><p>It is argued by the AG that this Recital presents the possibility that pseudonymisation, in some circumstances, could result in data subjects not being identifiable from the pseudonymised data.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-8" href="#footnote-8" target="_self">8</a> This could be the case even if the additional data that could be used to make the data subject identifiable still exists but its access is sufficiently limited.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-9" href="#footnote-9" target="_self">9</a> Accordingly, there may be some forms of pseudonymised data that fall outside the scope of the concept of personal data.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-10" href="#footnote-10" target="_self">10</a></p><p>The exact reasoning of the AG is as follows:</p><ul><li><p>As per Recital (16), the identifiability of a data subject could be achieved by a data controller 'or by another person.' The reasonable likelihood of identifiability needs to be considered, taking into account the cost and time required to do so and the technology available to achieve identifiability.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-11" href="#footnote-11" target="_self">11</a></p></li><li><p>CJEU caselaw has previously set out the paramaters for such identifiability. In particular, the Court has held that, in certain circumstances, information could still considered personal data even if "dissociated from the identification data held by someone else."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-12" href="#footnote-12" target="_self">12</a></p></li><li><p>Pseudonymised data may not be considered personal data if "the risk of identification is non-existent or insignificant."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-13" href="#footnote-13" target="_self">13</a></p></li></ul><p>According to AG, this reasoning supports a relative, rather than a strict, approach to the concept of personal data and pseudonymisation. Taking a relative approach to the current case, the AG suggests that the key question for the Court to consider is whether "Deloitte had reasonable means to identify [the data subjects]."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-14" href="#footnote-14" target="_self">14</a> If Deloitte did have such means, only then should the comments and alphanumeric codes it received from the SRB should be considered personal data.</p><p>The AG states further:</p><blockquote><p>...it seems to me disproportionate to impose on an entity, which could not reasonably identify the data subjects, obligations arising from Regulation 2018/1725, obligations which that entity could not, in theory, comply with or which would specifically require it to attempt to identify the data subjects.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-15" href="#footnote-15" target="_self">15</a></p></blockquote><p></p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/is-pseudonymised-data-personal-data">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[My favourite books on data rights (#1)]]></title><description><![CDATA[As of February 2025]]></description><link>https://www.thecybersolicitor.com/p/my-favourite-books-on-data-rights</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/my-favourite-books-on-data-rights</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 07 Feb 2025 09:01:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!bWUU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc97bc-d987-4a98-91b7-4695bd4d8842_4032x3024.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bWUU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc97bc-d987-4a98-91b7-4695bd4d8842_4032x3024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bWUU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc97bc-d987-4a98-91b7-4695bd4d8842_4032x3024.heic 424w, https://substackcdn.com/image/fetch/$s_!bWUU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc97bc-d987-4a98-91b7-4695bd4d8842_4032x3024.heic 848w, https://substackcdn.com/image/fetch/$s_!bWUU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc97bc-d987-4a98-91b7-4695bd4d8842_4032x3024.heic 1272w, https://substackcdn.com/image/fetch/$s_!bWUU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc97bc-d987-4a98-91b7-4695bd4d8842_4032x3024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bWUU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc97bc-d987-4a98-91b7-4695bd4d8842_4032x3024.heic" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7dcc97bc-d987-4a98-91b7-4695bd4d8842_4032x3024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1377514,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bWUU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc97bc-d987-4a98-91b7-4695bd4d8842_4032x3024.heic 424w, https://substackcdn.com/image/fetch/$s_!bWUU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc97bc-d987-4a98-91b7-4695bd4d8842_4032x3024.heic 848w, https://substackcdn.com/image/fetch/$s_!bWUU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc97bc-d987-4a98-91b7-4695bd4d8842_4032x3024.heic 1272w, https://substackcdn.com/image/fetch/$s_!bWUU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dcc97bc-d987-4a98-91b7-4695bd4d8842_4032x3024.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This posts lists some of the best books on data rights that I have read (so far). The list is neither in any particular order nor exhaustive.</p><p>The list for this post includes the following:</p><ol><li><p><em>Future Politics: Living Together in a World Transformed by Tech</em> (OUP 2018) by Jamie Susskind</p></li><li><p><em>Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power</em> (Profile Books 2019) by Shoshana Zuboff</p></li><li><p><em>Privacy is Hard and Seven Other Myths: Achieving Privacy Through Careful Design</em> (MIT Press) by Jaap-Henk Hoepman</p></li></ol><p>Please leave comments on your thoughts on these books if you have read them, or if there other books on data rights that you like.</p><h1><em>Future Politics: Living Together in a World Transformed by Tech</em> (OUP 2018) by Jamie Susskind</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!onYn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F556c6279-0a29-4110-ac75-7f5ffff066d4_1600x2461.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!onYn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F556c6279-0a29-4110-ac75-7f5ffff066d4_1600x2461.jpeg 424w, https://substackcdn.com/image/fetch/$s_!onYn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F556c6279-0a29-4110-ac75-7f5ffff066d4_1600x2461.jpeg 848w, https://substackcdn.com/image/fetch/$s_!onYn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F556c6279-0a29-4110-ac75-7f5ffff066d4_1600x2461.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!onYn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F556c6279-0a29-4110-ac75-7f5ffff066d4_1600x2461.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!onYn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F556c6279-0a29-4110-ac75-7f5ffff066d4_1600x2461.jpeg" width="1456" height="2240" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/556c6279-0a29-4110-ac75-7f5ffff066d4_1600x2461.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2240,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:185770,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!onYn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F556c6279-0a29-4110-ac75-7f5ffff066d4_1600x2461.jpeg 424w, https://substackcdn.com/image/fetch/$s_!onYn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F556c6279-0a29-4110-ac75-7f5ffff066d4_1600x2461.jpeg 848w, https://substackcdn.com/image/fetch/$s_!onYn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F556c6279-0a29-4110-ac75-7f5ffff066d4_1600x2461.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!onYn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F556c6279-0a29-4110-ac75-7f5ffff066d4_1600x2461.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This Substack is about the intersection between law, technology and society. Susskind I think presents the best explanation for why this intersection is so important to our future.</p><p>As a practising barrister who has dealt with plenty of matters in this space, Susskind's <em>Future Politics</em> provides a well-explained conceptualisation of how technology shapes our lives and how we should respond to this. He proposes using political theory to analyse our future as impacted by technology in terms of power, liberty, democracy, justice and politics.</p><p>The introductory chapter of the book includes my favourite passage and I have quoted several times in my previous posts:</p><blockquote><p>Politics in the twentieth century was dominated by a central question: how much of our collective life should be determined by the state, and what should be left to the market and civil society? For the generation now approaching political maturity, the debate will be different: to what extent should our lives be directed and controlled by powerful digital systems - and on what terms? This question is at the heart of <em>Future Politics</em>.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p></blockquote><p>If you are not familiar at all with the data rights space, and want a text that introduces you to what it is all about, this is the book to start with.</p><h1><em>Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power</em> (Profile Books 2019) by Shoshana Zuboff</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mXRU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f259d7-931c-4f61-97d4-77089915050b_652x1000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mXRU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f259d7-931c-4f61-97d4-77089915050b_652x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mXRU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f259d7-931c-4f61-97d4-77089915050b_652x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mXRU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f259d7-931c-4f61-97d4-77089915050b_652x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mXRU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f259d7-931c-4f61-97d4-77089915050b_652x1000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mXRU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f259d7-931c-4f61-97d4-77089915050b_652x1000.jpeg" width="652" height="1000" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9f259d7-931c-4f61-97d4-77089915050b_652x1000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:652,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:55924,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mXRU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f259d7-931c-4f61-97d4-77089915050b_652x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mXRU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f259d7-931c-4f61-97d4-77089915050b_652x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mXRU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f259d7-931c-4f61-97d4-77089915050b_652x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mXRU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9f259d7-931c-4f61-97d4-77089915050b_652x1000.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>While <em>Future Politics</em> is a more introductory tome, the <em>Age of Surveillance Capitalism</em> is a more comprehensive look into the perils of the powerful digital systems that control our lives.</p><p>Zuboff's work is a heavy read. But if you want to intimately understand the risks posed by today's technology companies, the <em>Age of Surveillance Capitalism</em> is essential.</p><p>The book includes the story of how Google came to embrace surveillance capitalism, and how Facebook went on to master it. Such companies operate a system focused on profiting from the collection and analysis of behavioural data left behind when we interact with their services and platforms, resulting in a system that leaves one group powerful (Big Tech) and other rather powerless (users of Big Tech). You can read more about this in my previous looking at the surveillance capitalist model.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;ad829afc-4ca3-49ec-ab13-69f7b03e9ce6&quot;,&quot;caption&quot;:&quot;TL;DR This newsletter is about the powerful digital systems that data rights are designed to protect you from. It looks at the system that underpins Facebook, how it works and its negative externalities.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;What data rights are for (#2)&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:112131599,&quot;name&quot;:&quot;Mahdi Assan&quot;,&quot;bio&quot;:&quot;Privacy pro working on data rights&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/df64db5a-d707-496a-a5e8-65f00b8f0376_756x756.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-12-13T09:01:32.212Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5f708e0-846b-43d8-b1f1-6ae5f9566b04_2560x1810.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.thecybersolicitor.com/p/what-data-rights-are-for-2&quot;,&quot;section_name&quot;:&quot;&#128737;&#65039; Data Rights&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:153039070,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:1,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Cyber Solicitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276409e9-b16f-4458-aae2-f3c59c484ed3_1110x1110.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>In covering the story about Google's embracement of surveillance capitalism, Zuboff reminds us how this system, and the way it dominants much of modern technology today, was never an inevitability, but a choice made by tech companies:</p><blockquote><p>Key to our conversation is this fact: surveillance capitalism was invented by a specific group of human beings in a specific time and place. It is not an inherent result of digital technology, nor is it a necessary expression of information capitalism. It was intentionally constructed at a moment in history.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p></blockquote><h1><em>Privacy is Hard and Seven Other Myths: Achieving Privacy Through Careful Design</em> (MIT Press) by Jaap-Henk Hoepman</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1MN7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6920cb54-5b6a-4b18-96ce-32f11772023f_1536x2304.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1MN7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6920cb54-5b6a-4b18-96ce-32f11772023f_1536x2304.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1MN7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6920cb54-5b6a-4b18-96ce-32f11772023f_1536x2304.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1MN7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6920cb54-5b6a-4b18-96ce-32f11772023f_1536x2304.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1MN7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6920cb54-5b6a-4b18-96ce-32f11772023f_1536x2304.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1MN7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6920cb54-5b6a-4b18-96ce-32f11772023f_1536x2304.jpeg" width="1456" height="2184" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6920cb54-5b6a-4b18-96ce-32f11772023f_1536x2304.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2184,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:124061,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1MN7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6920cb54-5b6a-4b18-96ce-32f11772023f_1536x2304.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1MN7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6920cb54-5b6a-4b18-96ce-32f11772023f_1536x2304.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1MN7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6920cb54-5b6a-4b18-96ce-32f11772023f_1536x2304.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1MN7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6920cb54-5b6a-4b18-96ce-32f11772023f_1536x2304.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Future Politics</em> and <em>Age of Surveillance Capitalism</em> deal with the theories underlying data rights. <em>Privacy is Hard and Seven Other Myths</em> deals with the practical.</p><p>Hoepman tackles the common misconceptions regarding privacy in the modern digital age. This includes how easily seemingly 'anonymised' data can be used to identify a person, everything wrong with the argument against privacy in the form of 'you have nothing to hide', and why privacy does not need to come at the expense of security.</p><p>An important point that Hoepman makes regarding privacy is that its implementation, fundamentally, requires a cultural shift where privacy is valued more than just a regulatory tick-box:</p><blockquote><p>Even though proper privacy protection requires a fundamental shift in how systems are designed, it is really not as hard as people tend to think. Throughout this book, we have encountered many examples in which a simple shift in the underlying approach, a change of perspective, makes it much easier to cater for privacy. We have also seen that there are many privacy-enhancing technologies ready to be used for the implementation of more privacy-friendly systems.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a></p></blockquote><p>In addition to this though, ensuring sound privacy does also require a rewiring of the underlying systems that we have become so familiar with over the years:</p><blockquote><p>Significantly improving the privacy of the apps and services we use should be our first priority. But at some point, we need to dig deeper down into the technology stack and reconsider the designs for our computers and networks, both at the hardware and operating system levels. These designs are half a century old by now and never fundamentally changed, while the world in which they are used has changed beyond recognition. We are stretching the boundaries of their use beyond the breaking point - not only in terms of privacy, by the way, but also in terms of security and reliability. It's time to start redoing the plumbing, instead of applying Band-Aids to temporarily stop some leakage while we frantically mop the floor against all odds.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a></p></blockquote><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecybersolicitor.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Solicitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Jamie Susskind, <em>Future Politics: Living Together in a World Transformed by Tech</em> (OUP 2018), p.2.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Shoshana Zuboff,<em>Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power</em> (Profile Books 2019), p.85.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>Jaap-Henk Hoepman, <em>Privacy is Hard and Seven Other Myths: Achieving Privacy Through Careful Design</em> (MIT Press), p.189.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>Jaap-Henk Hoepman, <em>Privacy is Hard and Seven Other Myths: Achieving Privacy Through Careful Design</em> (MIT Press), p.215.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[What data rights are for (#3)]]></title><description><![CDATA[Why and how to help build machines of loving grace]]></description><link>https://www.thecybersolicitor.com/p/what-data-rights-are-for-3</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/what-data-rights-are-for-3</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 17 Jan 2025 09:02:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9oDE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53a194f2-d65f-4918-a1fb-75c0824d3872_828x466.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9oDE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53a194f2-d65f-4918-a1fb-75c0824d3872_828x466.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9oDE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53a194f2-d65f-4918-a1fb-75c0824d3872_828x466.png 424w, https://substackcdn.com/image/fetch/$s_!9oDE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53a194f2-d65f-4918-a1fb-75c0824d3872_828x466.png 848w, https://substackcdn.com/image/fetch/$s_!9oDE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53a194f2-d65f-4918-a1fb-75c0824d3872_828x466.png 1272w, https://substackcdn.com/image/fetch/$s_!9oDE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53a194f2-d65f-4918-a1fb-75c0824d3872_828x466.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9oDE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53a194f2-d65f-4918-a1fb-75c0824d3872_828x466.png" width="828" height="466" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/53a194f2-d65f-4918-a1fb-75c0824d3872_828x466.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:466,&quot;width&quot;:828,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:157533,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9oDE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53a194f2-d65f-4918-a1fb-75c0824d3872_828x466.png 424w, https://substackcdn.com/image/fetch/$s_!9oDE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53a194f2-d65f-4918-a1fb-75c0824d3872_828x466.png 848w, https://substackcdn.com/image/fetch/$s_!9oDE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53a194f2-d65f-4918-a1fb-75c0824d3872_828x466.png 1272w, https://substackcdn.com/image/fetch/$s_!9oDE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53a194f2-d65f-4918-a1fb-75c0824d3872_828x466.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Yasmin Dwiputri &amp; Data Hazards Project / Better Images of AI / Safety Precautions / CC-BY 4.0</figcaption></figure></div><h1>TL;DR</h1><p>This newsletter is about why organisations should care about data rights and how to comply with them in practice. It looks at the value of data rights compliance, how this can be done in a more integrated manner and what this looks like in the context of AI governance.</p><p>Here are the key takeaways:</p><ul><li><p>Data rights compliance is sometimes viewed as an annoying inconvenience that stifles innovation and progress. Those in the data rights space involved in the shaping, applying or enforcing of data rights may therefore be perceived as perpetuators of stagnation.</p></li><li><p>There is some evidence of this happening in Europe. Mario Draghi's report shows how the EU's complex web of regulations may be partly responsible for the lagging growth in the region as well as the lack of a thriving tech sector.</p></li><li><p>However, rather than stifling innovation and growth, data rights professionals can help organisations to better position themselves to improve their products or services or how they do things. This includes taking advantage of the opportunities presented by the latest AI wave.</p></li><li><p>To do this, organisations need to focus on moving data rights left. This means considering data rights compliance issues in a more integrated and efficient fashion so that they are not addressed at the last moment and become a bottleneck.</p></li><li><p>By moving data rights left, organisations can achieve three things:</p><ul><li><p>Be in a position to take advantage of new technologies</p></li><li><p>Avoid data rights disasters</p></li><li><p>Gain a valuable USP</p></li></ul></li><li><p>Moving data rights left in the context of AI development and adoption requires data rights professionals to be proactive in their compliance work and collaborate with different stakeholders. This is to ensure that there is a balance between the business goals of the organisation and data rights.</p></li><li><p>In the context of AI governance, moving data rights left means addressing three key questions:</p><ol><li><p>What is the AI landscape/how are companies currently using AI?</p></li><li><p>What are the problems/pain points of this journey?</p></li><li><p>How do we solve these problems/ease the pain (balancing data rights with business goals)?</p></li></ol></li></ul><h1>Intro</h1><p>In <em><a href="https://www.thecybersolicitor.com/p/what-data-rights-are-for">What data rights are for</a></em>, I put forward a concise case for why I think data rights in this modern digital age are so important and therefore why people should exercise them when they can.</p><p><em><a href="https://www.thecybersolicitor.com/p/what-data-rights-are-for-2">What data rights are for (#2)</a></em> expanded on these ideas by looking at the surveillance capitalist model and the negative externalities that data rights are designed to protect you from.</p><p>With these previous posts, I explored why data rights are important from the perspective of the users of powerful digital systems. But with this post, I take a slightly different approach by looking at why data rights are important for the builders of powerful digital systems.</p><p>In other words, in this post I attempt to answer the following question:</p><blockquote><p>To what extent should builders of powerful digital systems be concerned with data rights, and what does this look like in practice?</p></blockquote><p>Ultimately, data rights law is about protecting individuals. But to achieve this, organisations building and operating powerful digital systems need to implement various measures to ensure compliance with the law and in turn respect people's rights. These measures (whether they are legal, organisational or technical in nature) are designed to tackle some of the harms and risks that arise from the deployment or use of powerful digital systems. However, such compliance work is sometimes viewed as an annoying inconvenience or even a means of stagnation.</p><p>I briefly make reference to this in <em><a href="https://www.thecybersolicitor.com/p/what-data-rights-are-for-2">What data rights are for (#2)</a></em> in the context of the surveillance capitalist model and the nature of such a system:</p><blockquote><p>Data rights provide a means for confronting the surveillance capitalist machine.</p><p>But in the first place, as an individual, if you can help it, do not feed the machine!</p><p>Do not give your data to entities that are not incentivised to use it in your best interests. Do not give your data to those who are not incentivised to use it ethically or fairly.</p><p>Do not give your data to those who will not look after it.</p><p>If you understand the system at play, which is set out in this post, then you will understand why:</p><p>[...]</p><ul><li><p><strong>A system that is represented by mantras like 'move fast and break things' whereby the supposed beneficial ends </strong><em><strong>always</strong></em><strong>, somehow, justify the means and anyone who argues otherwise are simply luddites determined to stifle progress and growth.</strong> (Emphasis added)</p></li></ul></blockquote><p>I used 'luddites' ironically to essentially refer to those in the data rights space. This includes the legal/compliance/policy experts, practitioners, auditors, regulators and any others involved in the shaping, applying or enforcing of data rights.</p><p>(I say ironically because I too am in the data rights space.)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iGlC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F095a25f2-17df-46b9-a9ab-ee5337802cfd_640x845.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iGlC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F095a25f2-17df-46b9-a9ab-ee5337802cfd_640x845.png 424w, https://substackcdn.com/image/fetch/$s_!iGlC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F095a25f2-17df-46b9-a9ab-ee5337802cfd_640x845.png 848w, https://substackcdn.com/image/fetch/$s_!iGlC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F095a25f2-17df-46b9-a9ab-ee5337802cfd_640x845.png 1272w, https://substackcdn.com/image/fetch/$s_!iGlC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F095a25f2-17df-46b9-a9ab-ee5337802cfd_640x845.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iGlC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F095a25f2-17df-46b9-a9ab-ee5337802cfd_640x845.png" width="640" height="845" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/095a25f2-17df-46b9-a9ab-ee5337802cfd_640x845.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:845,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1181193,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iGlC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F095a25f2-17df-46b9-a9ab-ee5337802cfd_640x845.png 424w, https://substackcdn.com/image/fetch/$s_!iGlC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F095a25f2-17df-46b9-a9ab-ee5337802cfd_640x845.png 848w, https://substackcdn.com/image/fetch/$s_!iGlC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F095a25f2-17df-46b9-a9ab-ee5337802cfd_640x845.png 1272w, https://substackcdn.com/image/fetch/$s_!iGlC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F095a25f2-17df-46b9-a9ab-ee5337802cfd_640x845.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: <a href="https://en.wikipedia.org/wiki/Luddite">Wikipedia</a></figcaption></figure></div><p>But are these various people and entities in the data rights space actually luddites? Some definitely seem to think so.</p><p>One such person is Marc Andreessen, co-founder and general partner of the prominent Silicon Valley venture capital firm Andreessen Horowitz. In his <em><a href="https://pmarca.substack.com/p/the-techno-optimist-manifesto">Techno Optimist Manifesto</a></em>, Andreessen describes how technological development is essential for progress and improving the human condition:</p><blockquote><p><em><strong>Lies</strong></em></p><p>We are being lied to.</p><p>We are told that technology takes our jobs, reduces our wages, increases inequality, threatens our health, ruins the environment, degrades our society, corrupts our children, impairs our humanity, threatens our future, and is ever on the verge of ruining everything.</p><p>We are told to be angry, bitter, and resentful about technology.</p><p>We are told to be pessimistic.</p><p>The myth of Prometheus &#8211; in various updated forms like Frankenstein, Oppenheimer, and Terminator &#8211; haunts our nightmares.</p><p>We are told to denounce our birthright &#8211; our intelligence, our control over nature, our ability to build a better world.</p><p>We are told to be miserable about the future.</p><p><em><strong>Truth</strong></em></p><p>Our civilization was built on technology.</p><p>Our civilization <em>is</em> built on technology.</p><p>Technology is the glory of human ambition and achievement, the spearhead of progress, and the realization of our potential.</p><p>For hundreds of years, we properly glorified this &#8211; until recently.</p><p>I am here to bring the good news.</p><p>We can advance to a far superior way of living, and of being.</p><p>We have the tools, the systems, the ideas.</p><p>We have the will.</p><p>It is time, once again, to raise the technology flag.</p><p>It is time to be Techno-Optimists.</p></blockquote><p>Notice how Andreessen frames concerns about technology taking our jobs, reducing wages, increasing inequality, threatening health, ruining the environment, degrading our society, corrupting children, impairing our humanity, threatening the future and being on the verge of ruining everything as part of "the lie". This means that advocates of these concerns are opposing &#8216;the truth&#8217;, which is that technological development has been the key to the success of civilization and &#8216;the glory of human ambition and achievement&#8217;.</p><p>So who would be the advocates of "the lie"? Perhaps it would be &#8216;techno-pessimists&#8217;, the ones who raise concerns about data protection, online safety, influence operations, surveillance capitalism, algorithmic bias and the other various risks of modern technology. In fact, in his manifesto, Andreessen explicitly calls out such people:</p><blockquote><p><em><strong>The Enemy</strong></em></p><p>We have enemies.</p><p>Our enemies are not bad people &#8211; but rather bad ideas.</p><p>Our present society has been subjected to a mass demoralization campaign for six decades &#8211; against technology and against life &#8211; under varying names like &#8220;existential risk&#8221;, &#8220;sustainability&#8221;, &#8220;ESG&#8221;, &#8220;Sustainable Development Goals&#8221;, &#8220;social responsibility&#8221;, &#8220;stakeholder capitalism&#8221;, &#8220;Precautionary Principle&#8221;, &#8220;trust and safety&#8221;, &#8220;tech ethics&#8221;, &#8220;risk management&#8221;, &#8220;de-growth&#8221;, &#8220;the limits of growth&#8221;.</p><p>This demoralization campaign is based on bad ideas of the past &#8211; zombie ideas, many derived from Communism, disastrous then and now &#8211; that have refused to die.</p><p>Our enemy is stagnation.</p><p>Our enemy is anti-merit, anti-ambition, anti-striving, anti-achievement, anti-greatness.</p><p>Our enemy is statism, authoritarianism, collectivism, central planning, socialism.</p><p>Our enemy is bureaucracy, vetocracy, gerontocracy, blind deference to tradition.</p><p>Our enemy is corruption, regulatory capture, monopolies, cartels.</p><p>Our enemy is institutions that in their youth were vital and energetic and truth-seeking, but are now compromised and corroded and collapsing &#8211; blocking progress in increasingly desperate bids for continued relevance, frantically trying to justify their ongoing funding despite spiraling dysfunction and escalating ineptness.</p><p>Our enemy is the ivory tower, the know-it-all credentialed expert worldview, indulging in abstract theories, luxury beliefs, social engineering, disconnected from the real world, delusional, unelected, and unaccountable &#8211; playing God with everyone else&#8217;s lives, with total insulation from the consequences.</p><p>[&#8230;]</p><p>Our enemy is the Precautionary Principle, which would have prevented virtually all progress since man first harnessed fire. The Precautionary Principle was invented to prevent the large-scale deployment of civilian nuclear power, perhaps the most catastrophic mistake in Western society in my lifetime. The Precautionary Principle continues to inflict enormous unnecessary suffering on our world today. It is <em>deeply</em> immoral, and we must jettison it with extreme prejudice.</p><p>[&#8230;]</p><p>We will explain to people captured by these zombie ideas that their fears are unwarranted and the future is bright.</p><p>We believe these captured people are suffering from ressentiment &#8211; a witches&#8217; brew of resentment, bitterness, and rage that is causing them to hold mistaken values, values that are damaging to both themselves and the people they care about.</p><p>We believe we must help them find their way out of their self-imposed labyrinth of pain.</p><p>We invite everyone to join us in Techno-Optimism.</p></blockquote><p>With this worldview, Andreessen is attempting to illustrate a contrast between the so-called builders and so-called luddites.</p><p>The builders are concerned with building the future and improving the human condition. Luddites are more concerned with the risks of such activity.</p><p>However, according to Andreessen, the missions of both groups are fundamentally contradictory. There is no way to develop technology that progresses society if we are constantly critiquing such technology and placing limits on its very development based on its various risks.</p><p>Andreessen is very clearly against those placing such limits on technology. In his piece called <em><a href="https://pmarca.substack.com/p/why-ai-will-save-the-world">Why AI Will Save the World</a></em>, he characterises the luddites as Baptists, namely those who "legitimately feel &#8211; deeply and emotionally, if not rationally &#8211; that new restrictions, regulations, and laws are required to prevent societal disaster" (drawing parallels with the advocates of the prohibition of alcohol in the US during the 1920s). These Baptist, or 'doomers', include "AI safety experts", "AI ethicists", "AI risk researchers" and essentially all those in the data rights space. These people believe more in the risks of AI than the benefits of AI.</p><p>And if they believe more in the risks than the benefits of AI, then the precautionary principle suggests that more limits and controls must be placed on such a technology.</p><p>For Andreessen, given his strong belief in AI providing a way to "make everything we care about better", placing limits or controls on its development is akin to being anti-progress. It is akin to being a luddite.</p><p>In some ways, Andreessen <em>could</em> be right. But I ultimately believe that he <em>cannot</em> be right.</p><p>In fact, if data rights are implemented correctly, there is a way to balance the missions of the so-called builders and the so-called luddites. There is a way to help build machines of loving grace.</p><h1>Why Andreessen <em>could</em> be right</h1><p>It is important to clarify what data rights professionals like myself actually do.</p><p>We basically help solve legal/policy problems within an existing legal/policy framework.</p><p>Laws are the rules that govern our society in various ways. They dictate what we can and cannot do, and stipulate our rights and responsibilities.</p><p>However, these rules cover the many events, transactions and activities that feature in our societies. It makes understanding and following all these rules very difficult for the average person.</p><p>This is what makes the law a barrier for people as they try navigate their way through society. They struggle to find the laws that apply to their particular situations and the actions they are permitted to take based on those applicable laws.</p><p>These are the legal problems that data rights professionals solve. They provide solutions to these problems by helping to figure out three things:</p><ul><li><p>The <strong>objective</strong> that the client wants to pursue</p></li><li><p>The <strong>laws</strong> that apply to the pursuance of this objective</p></li><li><p>The <strong>actions</strong> that can be taken by the client as permitted by the applicable laws</p></li></ul><p>But herein lies the potential problem with data rights professionals that Andreessen hints at; they are essentially trained to be risk-averse pessimists by default.</p><p>When data rights professionals are developing their legal solutions, they are trying to eliminate or mitigate risks for the client. They are trying to ensure that the client does not fall on the wrong side of the law whilst achieving what they want to achieve.</p><p>But this means that data rights professionals are predominantly looking for how things can go wrong. And it is this kind of mindset that Andreessen is referring to in his depiction of "the enemy."</p><p>This includes his criticism of the 'precautionary principle', a concept codified in <a href="https://eur-lex.europa.eu/EN/legal-content/glossary/precautionary-principle.html">EU law</a>:</p><blockquote><p>The precautionary principle is an approach to risk management, where, if it is possible that a given policy or action might cause harm to the public or the environment and if there is still no scientific agreement on the issue, the policy or action in question should not be carried out. However, the policy or action may be reviewed when more scientific information becomes available. The principle is set out in Article 191 of the Treaty on the Functioning of the European Union (TFEU).</p></blockquote><p>The problem that people like Andreessen have with the precautionary principle and the mindset it embodies is that it promotes a crippling form of risk intolerance upheld by the "tyranny of bureaucratization."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> Such bureaucratization is evident across various different social domains, partly manifested in a massive bloating of legal codes and regulation.</p><p>Andreessen and other like-minded people view all of this as part of an ideology of stasis that stifles innovation and progress in society:</p><blockquote><p>...bureaucratic norms, organizations, and languages have become institutionalized, transferring more power to a managerial elite. This constant bureaucratization is paralleled by the desire for total quantification across government, business, and academia, wherein progress depends on meeting predefined metrics. Granted, risk management, which often requires quantification, has been critical for civilization's progress; some have even claimed that advances in probability theory, which helps control risk, ignited the scientific and industrial revolutions that separated the preindustrial era from modernity. But while quantification has contributed to increased managerial efficiency and scientific progress, our current desire to measure and control all risk has reduced our collective willingness to take any. Instead of mastering uncertainty and embracing ambiguity, we quantify risk in hopes of eliminating it. This zero-risk bias not only impedes innovation, it can backfire.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p></blockquote><p>A culture based on risk avoidance and intolerance is one that prefers the status quo over change. This inevitably makes great advances and innovation much more difficult, since such efforts are inherently risky and threaten the status quo. Less volatility may mean more stasis, but there is also less chance of improving things if they more-or-less stay the same.</p><p>Where does such a culture exist? One might point to the EU. Or you could even say the EU has pointed to itself.</p><p>Back in September 2024, Mario Draghi, former prime minister of Italy and president of the European Central Bank, released his report on European competitiveness. Below is an extract from the Foreword:</p><blockquote><p>Europe has been worrying about slowing growth since the start of this century. Various strategies to raise growth rates have come and gone, but the trend has remained unchanged.</p><p>Across different metrics, a wide gap in GDP has opened up between the EU and the US, driven mainly by a more pronounced slowdown in productivity growth in Europe. Europe&#8217;s households have paid the price in foregone living standards. On a per capita basis, real disposable income has grown almost twice as much in the US as in the EU since 2000.</p><p>[...]</p><p>Technological change is accelerating rapidly. Europe largely missed out on the digital revolution led by the internet and the productivity gains it brought: in fact, the productivity gap between the EU and the US is largely explained by the tech sector. The EU is weak in the emerging technologies that will drive future growth. Only four of the world&#8217;s top 50 tech companies are European.</p><p>[...]</p><p>This is an existential challenge.</p><p>The only way to meet this challenge is to grow and become more productive, preserving our values of equity and social inclusion. And the only way to become more productive is for Europe to radically change.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a></p></blockquote><p>But how has Europe managed to find itself confronted with this existential challenge? It could be at least partly to do with its vast and complex regulatory framework. Further on in the report it states:</p><blockquote><p>Europe is stuck in a static industrial structure with few new companies rising up to disrupt existing industries or develop new growth engines. In fact, there is no EU company with a market capitalisation over EUR 100 billion that has been set up from scratch in the last fifty years, while all six US companies with a valuation above EUR 1 trillion have been created in this period. This lack of dynamism is self-fulfilling.</p><p>The problem is not that Europe lacks ideas or ambition. We have many talented researchers and entrepreneurs filing patents. <strong>But innovation is blocked at the next stage: we are failing to translate innovation into commercialisation, and innovative companies that want to scale up in Europe are hindered at every stage by inconsistent and restrictive regulations.</strong> (Emphasis added)<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a></p></blockquote><p>In the area of tech law and policy, the EU has passed/brought into force plenty of legislation in recent years. The GDPR came into force in 2018, the Digital Services Act and the Digital Markets Act were passed in 2022, and the AI Act was passed in 2023. That is a lot of hefty and impactful regulation coming into existence over a 5-year period. The Draghi report suggests that such legislation forms as regulatory barriers that are particularly onerous on young companies in the tech sector.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a></p><p>And the EU prides itself as a 'world leader' in terms of regulation. Dubbed the 'Brussels effect', the EU is known for the extra-territorialisation of its laws that ends up influencing standards in other jurisdictions. When the EU passed the AI Act in late 2023, there was this tweet from the then Internal Markets Commissioner in the European Commission Thierry Breton:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://x.com/ThierryBreton/status/1733254586561888306" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GXhK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26e613c3-09cc-4141-a36f-d541b30dbae7_1006x1336.png 424w, https://substackcdn.com/image/fetch/$s_!GXhK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26e613c3-09cc-4141-a36f-d541b30dbae7_1006x1336.png 848w, https://substackcdn.com/image/fetch/$s_!GXhK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26e613c3-09cc-4141-a36f-d541b30dbae7_1006x1336.png 1272w, https://substackcdn.com/image/fetch/$s_!GXhK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26e613c3-09cc-4141-a36f-d541b30dbae7_1006x1336.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GXhK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26e613c3-09cc-4141-a36f-d541b30dbae7_1006x1336.png" width="1006" height="1336" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/26e613c3-09cc-4141-a36f-d541b30dbae7_1006x1336.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1336,&quot;width&quot;:1006,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:263731,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://x.com/ThierryBreton/status/1733254586561888306&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GXhK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26e613c3-09cc-4141-a36f-d541b30dbae7_1006x1336.png 424w, https://substackcdn.com/image/fetch/$s_!GXhK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26e613c3-09cc-4141-a36f-d541b30dbae7_1006x1336.png 848w, https://substackcdn.com/image/fetch/$s_!GXhK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26e613c3-09cc-4141-a36f-d541b30dbae7_1006x1336.png 1272w, https://substackcdn.com/image/fetch/$s_!GXhK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26e613c3-09cc-4141-a36f-d541b30dbae7_1006x1336.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It seems clear from the likes of Draghi and Breton that the EU is more focused on regulating AI than building it. As a consequence, Europe has experienced slow growth, a slacking tech sector relative to the US and very little innovation coming from the continent. Europe has suffered from an ideology of stasis.</p><p>For Andreessen et al, those in the data rights space perpetuate this ideology and its constituent problems. With a complex web of regulations in place, data rights professionals guide others on the actions they can and cannot take in pursuing their respective objectives. But in doing so, they perform their role as risk-averse pessimists who impose the various restrictions dictated by the bureaucracies above. 'No you cannot do x because provision y of law z says you cannot do x.' 'Before you do x you need to consult y stakeholders and carry out z impact assessment before doing x.' 'If you do x you will be exploiting a legal grey area and you are at a high risk of being sanctioned by regulators or being sued.' Party poopers, naysayers, killjoys, cynics. Data rights professionals are luddites.</p><h1>Why Andreessen <em>cannot</em> be right</h1><p>Abeba Birhane's thesis, <em><a href="https://arxiv.org/pdf/2206.04179.pdf">Automating Ambiguity: Challenges and Pitfalls of Artificial Intelligence</a></em>, (which I have written about <a href="https://www.thecybersolicitor.com/p/does-ai-just-lead-to-stagnation">previously</a>) is a brilliant antithesis of the current hype that exists around AI. But while her work contains heavy critiques of AI and the industry behind it, Birhane does admit this at the end:</p><blockquote><p>This thesis is first and foremost an endeavour to critically examine both the scientific basis and ethical dimensions of current ML/AI. Thus, it primarily lays bare the limitations, failings, and problems surrounding AI systems broadly construed. <strong>But this is not to imply that AI systems cannot be beneficial (to marginalized communities, AI is already beneficial to the wealthy and powerful), or cannot function in a way that serves the most disenfranchised or minoritized. Far from it. It is possible and important to envision such a future.</strong> (Emphasis added)<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a></p></blockquote><p>Technological development does encompass benefits <em>and</em> risks. This is especially when the development is driven by corporations with their motives and incentives (see <em><a href="https://www.thecybersolicitor.com/p/what-data-rights-are-for-2">What data rights are for #2</a></em>).</p><p>We therefore need data rights professionals. We need them in order to minimise the risks and maximise the benefits. We get criticised for focusing too much on the former and not enough of the latter. This is why we are seen as risk-averse pessimists.</p><p>But data rights professionals can be more than this.</p><p>Data rights professionals cannot just be part of a <a href="https://www.thepsmiths.com/p/review-scaling-people-by-claire-hughes">managerial class</a> merely concerned with "the organization and allocation of productive activity as opposed to the production of anything in particular." They cannot just be a conveyer belt for "orders flowing in from above."</p><p>Compliance with data rights provide a way for organisations to better position themselves to improve their products or services or how they do things.</p><p>Look at the current AI wave. More and more companies are using open models to either improve internal processes or to build/augment their products or services. Whilst there remains a lot of hype around exactly how capable these models are and what they can therefore be used for, lots of companies are experimenting or at least thinking about how to use them. But for any company to be able to take full advantage of these open models, there is no escaping the fundamental first-order issue of data rights.</p><p>Let's say a European retail company wants to fine-tune an open LLM to build a customer service chatbot. To do this, the company will need large datasets of conversational text, customer queries and customer responses. To pursue such a project, the company will need to know what they can use to make this chatbot a reality. It will need to know about its data lifecycle (including the data they collect, what its used for, where its stored, who it is shared with etc). This knowledge is not just needed for legal compliance purposes, such as identifying an appropriate legal basis under the GDPR to use the data for building a chatbot (to the extent that the dataset contains personal data). This type of knowledge is crucial for knowing whether building such a product is even feasible in the first place.</p><p>This is the value that data rights professionals can provide. They can help with the work required to get an organisations' data rights in order. They can help organisations better understand what data they hold, how it is used and what they can use it for. So if a company wanted to build a customer chatbot, data rights professionals could be relied on to provide the crucial guidance on the feasibility of such an endeavour, both from a compliance and a business perspective. They can help ensure that the right infrastructure and measures are in place to take advantage of open AI models.</p><p>Essentially, data rights professionals help companies avoid looking like this:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uV2f!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73c29499-511f-472c-8bfb-27133c2cd510_1079x1457.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uV2f!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73c29499-511f-472c-8bfb-27133c2cd510_1079x1457.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uV2f!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73c29499-511f-472c-8bfb-27133c2cd510_1079x1457.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uV2f!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73c29499-511f-472c-8bfb-27133c2cd510_1079x1457.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uV2f!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73c29499-511f-472c-8bfb-27133c2cd510_1079x1457.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uV2f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73c29499-511f-472c-8bfb-27133c2cd510_1079x1457.jpeg" width="1079" height="1457" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/73c29499-511f-472c-8bfb-27133c2cd510_1079x1457.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1457,&quot;width&quot;:1079,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:182877,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uV2f!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73c29499-511f-472c-8bfb-27133c2cd510_1079x1457.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uV2f!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73c29499-511f-472c-8bfb-27133c2cd510_1079x1457.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uV2f!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73c29499-511f-472c-8bfb-27133c2cd510_1079x1457.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uV2f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73c29499-511f-472c-8bfb-27133c2cd510_1079x1457.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The complex web of regulations that exist may indeed be complicated, but they are not completely unnavigable. You can think of legal frameworks like the rules of chess and the chess board. It is true that the rules and the board restrict the moves that one can make with the different pieces. However, even within these restrictions, there are many moves that can nevertheless be made and therefore many different strategies that can be used to ensure success. The job of data rights professionals is to study this chessboard and help come up with the right moves to win. Their job is to figure out the objective, identify the applicable law, and provide a set of actions to achieve the objective that also complies with the applicable law.</p><p>But in order to do this the right way, you need to move data rights left.</p><h2>What is moving data rights left?</h2><p>This meme does a good job at capturing how data rights professionals and legal teams are sometimes used or consulted:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ymqW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec141c9-ba9f-4943-a2e0-2d89f259ee5a_1170x1236.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ymqW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec141c9-ba9f-4943-a2e0-2d89f259ee5a_1170x1236.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ymqW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec141c9-ba9f-4943-a2e0-2d89f259ee5a_1170x1236.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ymqW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec141c9-ba9f-4943-a2e0-2d89f259ee5a_1170x1236.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ymqW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec141c9-ba9f-4943-a2e0-2d89f259ee5a_1170x1236.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ymqW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec141c9-ba9f-4943-a2e0-2d89f259ee5a_1170x1236.jpeg" width="1170" height="1236" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5ec141c9-ba9f-4943-a2e0-2d89f259ee5a_1170x1236.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1236,&quot;width&quot;:1170,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:534659,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ymqW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec141c9-ba9f-4943-a2e0-2d89f259ee5a_1170x1236.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ymqW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec141c9-ba9f-4943-a2e0-2d89f259ee5a_1170x1236.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ymqW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec141c9-ba9f-4943-a2e0-2d89f259ee5a_1170x1236.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ymqW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec141c9-ba9f-4943-a2e0-2d89f259ee5a_1170x1236.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Legal/compliance teams are sometimes consulted at the last moment. And then when legal/compliance look at the project and say 'sorry but you can't do this because of x, y and z law', they are seen as unreasonable bottlenecks.</p><p>But this is all wrong.</p><p>Moving data rights left means considering data rights in a more integrated and efficient fashion:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QMcd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323e2e51-fbf5-497c-9c55-c053073a73e2_2157x1668.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QMcd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323e2e51-fbf5-497c-9c55-c053073a73e2_2157x1668.jpeg 424w, https://substackcdn.com/image/fetch/$s_!QMcd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323e2e51-fbf5-497c-9c55-c053073a73e2_2157x1668.jpeg 848w, https://substackcdn.com/image/fetch/$s_!QMcd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323e2e51-fbf5-497c-9c55-c053073a73e2_2157x1668.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!QMcd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323e2e51-fbf5-497c-9c55-c053073a73e2_2157x1668.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QMcd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323e2e51-fbf5-497c-9c55-c053073a73e2_2157x1668.jpeg" width="1456" height="1126" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/323e2e51-fbf5-497c-9c55-c053073a73e2_2157x1668.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1126,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:435094,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QMcd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323e2e51-fbf5-497c-9c55-c053073a73e2_2157x1668.jpeg 424w, https://substackcdn.com/image/fetch/$s_!QMcd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323e2e51-fbf5-497c-9c55-c053073a73e2_2157x1668.jpeg 848w, https://substackcdn.com/image/fetch/$s_!QMcd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323e2e51-fbf5-497c-9c55-c053073a73e2_2157x1668.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!QMcd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323e2e51-fbf5-497c-9c55-c053073a73e2_2157x1668.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It is about considering data rights implications at the earliest possible moment of a project and shaping it accordingly. By doing this, you can navigate through the chessboard in a more effective way and avoid legal becoming bottlenecks and basically killing projects.</p><p>If you want to ride the latest AI wave, you need to move data rights left.</p><h2>Why move data rights left?</h2><p>Moving data rights left allows organisations to achieve three things:</p><ul><li><p><strong>Be in a position to take advantage of new technologies.</strong> For any AI project, having the right data and knowing how to use it is key. Data rights compliance helps organisations with this work as it requires organisations to have a good understanding of what data they hold and how it is used. Such compliance will in turn help implement the necessary processes, policies and procedures in place that will be essential for any AI project, including leveraging open models. Moving data rights left means doing this work earlier, and the earlier this is done the easier AI adoption becomes.</p></li><li><p><strong>Avoid data rights disasters.</strong> I mentioned several data rights disasters in <em><a href="https://www.thecybersolicitor.com/p/what-data-rights-are-for-2">What data rights are for (#2)</a></em> in relation to the development of Facebook. For example, with the news feed, the customer support team warned about the perceived invasion of privacy that the feature would invoke, but these concerns were just "brushed off" and seen as a "distraction" by Zuckerberg and others who went ahead with the launch regardless. Luckily for Facebook, the backlash it received after ignoring these warnings did not bring it down, as was the case with the introduction of its targeted advertising features and the Like button. But this may not always be the case for companies taking risks with data rights. <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Carey Lening&quot;,&quot;id&quot;:116041592,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d7def9c2-36f5-4f6c-bb3e-7905a3364bce_1024x1024.jpeg&quot;,&quot;uuid&quot;:&quot;72317357-3fc9-4542-aaad-68f9e728d932&quot;}" data-component-name="MentionToDOM"></span>provides some great coverage of various privacy disasters at companies that are more existentially threatening, such as the rather unbelievable (and slightly comical) <a href="https://insights.priva.cat/p/privacy-clusterfucks-a-depressingly">story of Calmera</a>. Moving data rights left means spotting the glaring issues earlier, and providing time to fix them before it is too late.</p></li><li><p><strong>Gain a valuable USP.</strong> Many will not see the value creation that data rights compliance brings. But doing this compliance in a more integrated fashion rather than as a late add-on not only ensures being on the right side of the law, but also signals to others that you take data rights seriously. Whether B2B or B2C, this can be an incredibly valuable USP or competitive advantage, especially in the midst of a sprawling regulatory framework where achieving effective compliance can be difficult.</p></li></ul><h2>How do you move data rights left?</h2><p>Moving data rights left requires data rights professionals to be collaborative enablers.</p><p>They need to be capable of working with various different teams. This requires professionals in the form of expert generalists (or T-shaped individuals); they ought to have a deep knowledge in at least one area combined with a good level of knowledge spread across a number of neighbouring areas. Such a skillset is what can enable data rights professionals to communicate legal and policy requirements to various stakeholders within an organisation and work towards practical solutions to achieve compliance.</p><p>This is the way to balance data rights with business goals, and will therefore be crucial for effective AI governance. And with more AI-related laws and policies being developed across the world, the need for effective governance will also increase. If this is done the right way by moving data rights left, and organisations can ride the AI wave whilst remaining compliant.</p><p>In the context of AI governance, moving data rights left means addressing three key questions:</p><ol><li><p>What is the AI landscape/how are companies currently using AI?</p></li><li><p>What are the problems/pain points of this journey?</p></li><li><p>How do we solve these problems/ease the pain (balancing data rights with business goals)?</p><p></p></li></ol>
      <p>
          <a href="https://www.thecybersolicitor.com/p/what-data-rights-are-for-3">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[What data rights are for (#2)]]></title><description><![CDATA[Systems, incentives and surveillance capitalism]]></description><link>https://www.thecybersolicitor.com/p/what-data-rights-are-for-2</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/what-data-rights-are-for-2</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 13 Dec 2024 09:01:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oSR2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5f708e0-846b-43d8-b1f1-6ae5f9566b04_2560x1810.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oSR2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5f708e0-846b-43d8-b1f1-6ae5f9566b04_2560x1810.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oSR2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5f708e0-846b-43d8-b1f1-6ae5f9566b04_2560x1810.png 424w, https://substackcdn.com/image/fetch/$s_!oSR2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5f708e0-846b-43d8-b1f1-6ae5f9566b04_2560x1810.png 848w, https://substackcdn.com/image/fetch/$s_!oSR2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5f708e0-846b-43d8-b1f1-6ae5f9566b04_2560x1810.png 1272w, https://substackcdn.com/image/fetch/$s_!oSR2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5f708e0-846b-43d8-b1f1-6ae5f9566b04_2560x1810.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oSR2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5f708e0-846b-43d8-b1f1-6ae5f9566b04_2560x1810.png" width="1456" height="1029" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e5f708e0-846b-43d8-b1f1-6ae5f9566b04_2560x1810.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1029,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1000451,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oSR2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5f708e0-846b-43d8-b1f1-6ae5f9566b04_2560x1810.png 424w, https://substackcdn.com/image/fetch/$s_!oSR2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5f708e0-846b-43d8-b1f1-6ae5f9566b04_2560x1810.png 848w, https://substackcdn.com/image/fetch/$s_!oSR2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5f708e0-846b-43d8-b1f1-6ae5f9566b04_2560x1810.png 1272w, https://substackcdn.com/image/fetch/$s_!oSR2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5f708e0-846b-43d8-b1f1-6ae5f9566b04_2560x1810.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Nadia Piet + AIxDESIGN &amp; Archival Images of AI / Better Images of AI / Infinite Scroll / CC-BY 4.0</figcaption></figure></div><h1>TL;DR</h1><p>This newsletter is about the powerful digital systems that data rights are designed to protect you from. It looks at the system that underpins Facebook, how it works and its negative externalities.</p><p>Here are the key takeaways:</p><ul><li><p>During the mid-to-late 2000s&#8230;</p></li></ul>
      <p>
          <a href="https://www.thecybersolicitor.com/p/what-data-rights-are-for-2">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[How to regulate something]]></title><description><![CDATA[A way to think about how rules are formed]]></description><link>https://www.thecybersolicitor.com/p/how-to-regulate-something</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/how-to-regulate-something</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 06 Dec 2024 09:02:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!r5m4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7f89330-69f6-4380-a07b-9b3d4e03ca09_2560x2193.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!r5m4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7f89330-69f6-4380-a07b-9b3d4e03ca09_2560x2193.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!r5m4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7f89330-69f6-4380-a07b-9b3d4e03ca09_2560x2193.jpeg 424w, https://substackcdn.com/image/fetch/$s_!r5m4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7f89330-69f6-4380-a07b-9b3d4e03ca09_2560x2193.jpeg 848w, https://substackcdn.com/image/fetch/$s_!r5m4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7f89330-69f6-4380-a07b-9b3d4e03ca09_2560x2193.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!r5m4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7f89330-69f6-4380-a07b-9b3d4e03ca09_2560x2193.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!r5m4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7f89330-69f6-4380-a07b-9b3d4e03ca09_2560x2193.jpeg" width="1456" height="1247" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c7f89330-69f6-4380-a07b-9b3d4e03ca09_2560x2193.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1247,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1647078,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!r5m4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7f89330-69f6-4380-a07b-9b3d4e03ca09_2560x2193.jpeg 424w, https://substackcdn.com/image/fetch/$s_!r5m4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7f89330-69f6-4380-a07b-9b3d4e03ca09_2560x2193.jpeg 848w, https://substackcdn.com/image/fetch/$s_!r5m4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7f89330-69f6-4380-a07b-9b3d4e03ca09_2560x2193.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!r5m4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7f89330-69f6-4380-a07b-9b3d4e03ca09_2560x2193.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Crist&#243;bal Ascencio + AIxDESIGN &amp; Archival Images of AI / Better Images of AI / Image to Audio Corruption 02 / CC-BY 4.0</figcaption></figure></div><p>Regulation is about establishing rules that maximise the benefits and minimise the risks of a particular thing.</p><p>These rules can take different forms to achieve this objective. In fact, various rule axes can shape the nature of regulation:</p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/how-to-regulate-something">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Is surveillance capitalism legal in the EU? (Part 3)]]></title><description><![CDATA[A look at the EDPB's ban on Meta's behavioural advertising]]></description><link>https://www.thecybersolicitor.com/p/is-surveillance-capitalism-legal-2e0</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/is-surveillance-capitalism-legal-2e0</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 01 Nov 2024 09:01:59 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/50a811af-3011-4706-a3ae-31df92d4f5c6_3000x3000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This series of posts looks at the legalities of surveillance capitalism in the context of EU data protection law, which has been covered in several important decisions in the EU in recent years.</p><p>The first post in this series looked at whether behavioural advertising can be carried out on the basis of contractual necessity (spoiler, it cannot!).</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;405a11c6-aba2-420b-a37d-116327ddb1b8&quot;,&quot;caption&quot;:&quot;TL;DR This newsletter is about the EDPB's decision regarding the processing of personal data for behavioural advertising on the basis of contractual necessity. It looks why the EDPB was required to make a decision on this issue, the analysis underpinning its conclusion, and the implications this has for the contractual necessity provision under the GDPR.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Is surveillance capitalism legal in the EU? (Part 1)&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:112131599,&quot;name&quot;:&quot;Mahdi Assan&quot;,&quot;bio&quot;:&quot;Privacy pro working on data rights&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/df64db5a-d707-496a-a5e8-65f00b8f0376_756x756.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-05-03T08:01:23.660Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12605e9b-e5a9-460e-8c8a-e750b5b790c4_3000x3000.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.thecybersolicitor.com/p/is-surveillance-capitalism-legal&quot;,&quot;section_name&quot;:&quot;&#128737;&#65039; Data Rights&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:144253750,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Cyber Solicitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a251ee3-b516-44f7-a127-1dc1dabc0e6f_866x866.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>The second&#8230;</p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/is-surveillance-capitalism-legal-2e0">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[🗃️ From the Archive: From East to West]]></title><description><![CDATA[How a 16th Century Firm Can Explain Today&#8217;s Digitised Society]]></description><link>https://www.thecybersolicitor.com/p/from-the-archive-from-east-to-west</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/from-the-archive-from-east-to-west</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 09 Aug 2024 08:00:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-UYy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b9da3e-1880-4a5d-b80c-4e18ceb0ee23_700x468.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-UYy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b9da3e-1880-4a5d-b80c-4e18ceb0ee23_700x468.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-UYy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b9da3e-1880-4a5d-b80c-4e18ceb0ee23_700x468.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-UYy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b9da3e-1880-4a5d-b80c-4e18ceb0ee23_700x468.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-UYy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b9da3e-1880-4a5d-b80c-4e18ceb0ee23_700x468.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-UYy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b9da3e-1880-4a5d-b80c-4e18ceb0ee23_700x468.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-UYy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b9da3e-1880-4a5d-b80c-4e18ceb0ee23_700x468.jpeg" width="700" height="468" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a2b9da3e-1880-4a5d-b80c-4e18ceb0ee23_700x468.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:468,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-UYy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b9da3e-1880-4a5d-b80c-4e18ceb0ee23_700x468.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-UYy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b9da3e-1880-4a5d-b80c-4e18ceb0ee23_700x468.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-UYy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b9da3e-1880-4a5d-b80c-4e18ceb0ee23_700x468.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-UYy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b9da3e-1880-4a5d-b80c-4e18ceb0ee23_700x468.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Originally published on Backbench UK</em> <em>on November 24, 2020.</em></p><p>In 1599, a group of 218 merchants in London led by Sir Thomas Smythe, put their investments together to form a joint stock company. Raising over &#163;3 million, the corporation was set up to obtain spices from the East Indies to then be sold in England for the &#8220;Honour of our Nation&#8221; and the &#8220;Wealth of our People&#8221;.</p><p>Back then a royal charter issued by the Crown was needed create a company, of which was not forthcoming until September 1600. That <a href="https://en.wikisource.org/wiki/Charter_Granted_by_Queen_Elizabeth_to_the_East_India_Company">charter</a> gave the company freedom from customs duties for its first six voyages, a monopoly over trade in the East Indies for 15 years and semi-sovereign privileges to rule territories and raise armies. Such sanctions were what created the East India Company, one of the most powerful companies the world has ever seen.</p><p>Fast forward to June 1945, around the end of World War II, the famous report entitled &#8220;<a href="https://www.nsf.gov/od/lpa/nsf50/vbush1945.htm">Science: the Endless Frontier</a>&#8221; was presented to President Harry Truman. Instead of science falling &#8220;flat on its face&#8221; after its great contribution to the war effort, it proposed the creation of a new national research system to spur the technological progress essential for economic growth, national security and fighting disease. This report would go on to inspire the creation of the GPS, personal computers, the internet and much more. It was thus a military industrial complex that was behind the growth of a certain high technology hub located on the West Coast; Silicon Valley, home to some of the most powerful companies the world has ever seen.</p><p>That the similarities between the East India Company and Silicon Valley go beyond their origin stories may not be apparent at first glance. The legacy of the East India Company is one of a trading corporation absent of any limits to its scope. Reigning over swaths of India, it controlled the law, raised taxes, and waged war. Today&#8217;s largest corporations are <a href="https://www.ft.com/content/0f1ec9da-c9a6-11e9-af46-b09e8bfe60c0">&#8220;tame beasts&#8221;</a> compared to what transpired several centuries before.</p><p>Yet, such a depiction may be mistaken. Silicon Valley has long outgrown its defence-centric roots, becoming a beacon for a new agile market economy and assuming a status eerily similar to the heights reached by its predecessor. As articulated by Jamie Susskind, the author of <em>Future Politics: Living Together in a World Transformed by Tech</em>, it has created a digital lifeworld comprising of &#8220;dense and teeming systems that link human beings, powerful machines, and abundant data in a web of great delicacy and complexity&#8221;. It is from this that numerous developments have emerged, from the advancements in artificial intelligence to the growth of surveillance capitalism.</p><p>Perhaps it is Silicon Valley that makes the East India Company the tame beast? The former may not be capable of controlling the law, raising taxes or waging wars, but it has produced companies capable of exercising great influence in their own way.</p><p>Through mass data extraction and analysis, Google has amassed a fortune with its targeted advertising model and cemented itself as the gatekeeper of the internet recording <a href="https://websitebuilder.org/blog/google-stats/%23:~:text=With%2520the%2520massive%2520number%2520of,2%2520trillion%2520searches%2520per%2520year.">billions</a> of searches per day. Facebook has followed a similar fate in becoming the biggest social media platform whilst demonstrating its potential to facilitate mass <a href="https://www.ft.com/content/ebbf9be3-307b-4fdd-a582-069099e3096c">manipulation</a> and herding on an unprecedented scale. Amazon boasts around 40% of <a href="https://www.bloomberg.com/news/articles/2019-06-13/emarketer-cuts-estimate-of-amazon-s-u-s-online-market-share">online retail sales</a> in the US and provides cloud-computing services supporting copious businesses around the world.</p><p>The common thread that runs through these tech companies and others is how they view their place in the world. These organisations are fuelled by a formidable desire to change society in profound ways for the better. They are ruthlessly focused on building the future through rapacious entrepreneurialism and groundbreaking technology. This spirit, stemming from the political impetus of 1940s America, is not too dissimilar to the grand ventures envisaged by the founders of the East India Company.</p><p>But also worryingly reminiscent is the cognitive dissonance. Ironically, tech firms have tasked themselves with building the future without considering all the consequences of their creations. The mantra of &#8216;move fast and break things&#8217; has long dominated the cultural backcloth of Silicon Valley, threatening to put <a href="https://www.ft.com/content/7fafec06-1ea2-11e9-b126-46fc3ad87c65">privacy</a>, <a href="https://www.economist.com/briefing/2020/10/22/social-medias-struggle-with-self-censorship">free speech</a> and <a href="https://www.ft.com/content/9adb3a15-d610-4bd6-bae0-a87dc4f315c6">democracy</a> among the pile of broken things left in its wake.</p><p>In its day, the East India Company was a monopoly, colonial proprietor and corporate State all in one. Yet for a long while, it existed without the checks and balances of a national government and was accountable only to its investors. It thus illustrates how corporations can inconspicuously usurp great power without the imposition of great responsibility. In this respect, it could be argued that Silicon Valley is home to a number of contemporary East India Companies.</p><p>Susskind outlines a question for the 21st century: to what extent should our lives be directed and controlled by powerful digital systems and on what terms? As the latest <a href="https://www.ft.com/content/435a193d-927e-4b4f-84e2-3e6686a1371d">anti-trust action</a> against Google in the US shows, this is the question, among others, that politicians of the future will need to grapple with.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecybersolicitor.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Cyber Solicitor! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Chat control and E2EE]]></title><description><![CDATA[The EU's proposed online CSA regulation leaves the future of E2EE uncertain]]></description><link>https://www.thecybersolicitor.com/p/chat-control-and-e2ee</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/chat-control-and-e2ee</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 12 Jul 2024 08:01:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ucwh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96c12a9f-4308-47c2-a8a6-6ec768a0626a_2157x1668.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>TL;DR</h1><p>This newsletter is about the EU's proposed Regulation laying down rules to prevent and combat online child sexual abuse, colloquially known as 'chat control' (May 2022 version). It looks at the scope of the legislation, the detection obligations it imposes on service providers and its potential incompatibility with end-to-end encryption.</p><p>Here are th&#8230;</p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/chat-control-and-e2ee">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[What is a data protection risk?]]></title><description><![CDATA[A simple primer on data protection risk management]]></description><link>https://www.thecybersolicitor.com/p/what-is-a-data-protection-risk</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/what-is-a-data-protection-risk</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 14 Jun 2024 08:00:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xLRW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70b1f19b-a59e-4c41-a4fa-43d24ed4f2be_2157x1668.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A <em>risk</em> generally refers to the exploitation of a vulnerability which leads to an event with some sort of negative impact and that has a certain likelihood of taking place.</p><p>Accordingly, a <em>data protection risk</em> refers to the exploitation of a vulnerability which leads to an event that negatively impacts the protection of a data subjects' personal data and h&#8230;</p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/what-is-a-data-protection-risk">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>