Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
D7.2: Descriptive analysis and inventory of profiling practices.
D7.3: Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence.
D7.4: Implications of profiling practices on democracy.
D7.6 Workshop on AmI, Profiling and RFID.
D7.7: RFID, Profiling, and AmI.
D7.8: Workshop on Ambient Law.
D7.9: A Vision of Ambient Law.
D7.10: Multidisciplinary literature selection, with Wiki discussion forum on Profiling, AmI, RFID, Biometrics and Identity.
D7.11: Kick-off Workshop on biometric behavioural profiling and Transparency Enhancing Technologies.
Forensic Implications.
HighTechID.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
This example shows that consent at the data collection level is difficult to refuse and that once data have been anonymised, control over the use of these anonymised data is lost.
An organiser of a rock concert sells tickets on-line and the subjects must give name, address, age and billing information. After issuing the ticket and receipt of payment, the personal data are made anonymous. The organiser uses the anonymous data to calculate the average age of the visitors. The outcome is that the 64 % of the visitors are under 18. Consequently, the price of ‘breezers’ increases with 5 % because statistics have proven that 17- year- old children love these soft drinks…
In principle data protection law applies at the level of data collection: the data subject has to be informed of the purpose of profiling at the moment of collection if her personal data are used for the construction of the profile (see the discussion in section .A.3). The data subject could refuse that her data be used for such purpose, but then she may not get a ticket. However, as the construction of the profiles is based on data that are rendered anonymous, data protection law does not apply any more. Data protection will also not apply at the application level since the data subject is not identifiable at the moment of application.
57 / 62 |