Beyond Data Ownership
Beyond Data Ownership
Ignacio Cofone†
Proposals for data ownership are widely misunderstood, aim at the wrong
goal, and would be self-defeating if implemented. This Article, first, shows that data
ownership proposals do not argue for the bundle of ownership rights that exists over
property at common law. Instead, these proposals focus on transferring rights over
personal information solely through consent.
This Article, third, develops proposals for privacy law reform amidst a
national debate on how to formulate federal and state privacy statutes. It argues for
a combination of what Calabresi and Melamed call property and liability rules. A
mixed rule system is essential because property rules alone fail to protect data
† Assistant Professor and Canada Research Chair in A.I. Law & Data Governance, McGill
University Faculty of Law, ignacio.cofone@mcgill.ca. Many thanks to BJ Ard, Lisa Austin,
Michael Beauvais, Elettra Bietti, Johannes Buchheim, Rebecca Crootof, Christopher Essert, Inge
Graef, Nikolas Guggenberger, Tom Haley, Claudia Haupt, Chris Howard, Martin Husovec, Shaz
Jameson, Robert Leckey, Anthony Niblett, Przemyslaw Palka, Adriana Robertson, Teresa Scassa,
Alicia Solow-Niederman, Mark Verstraete, Jacob Victor, Salome Viljoen, and Ari Waldman for
their helpful comments. This Article also benefited from presentations at the Council of Europe
Convention 108, Tilburg University TILTing Perspectives 2021 Conference, Torcuato Di Tella
Regulation Workshop, University of Toronto Law & Economics Workshop, and Yale Law
School. I gratefully acknowledge that financial support for research assistance was provided by
the Social Sciences and Humanities Research Council (Insight Development Grant) and the
Canada Research Chairs Program; that an academic visit at the Tilburg Institute for Law,
Technology, & Society to work on this project was supported by Microsoft; and that this Article
received the Council of Europe Stefano Rodota Award Special Jury Mention. I also thank Ana
Qarri, Jeremy Wiener, Vanessa Di Feo, and Martina Kneifel for their fantastic research assistance
and the editors of the Cardozo Law Review for their help during the editing process.
501
502 CARDOZO LAW REVIEW [Vol. 43:2
subjects from future uses and abuses of their personal information. This Article
implements this idea with two recommendations. First, it proposes bolstering private
rights of action for privacy harm unattached to statutory breach. Second, it proposes
reinforcing ongoing use restrictions over personal data by strengthening the purpose
limitation principle, an underutilized ongoing use restriction in American law.
TABLE OF CONTENTS
INTRODUCTION
1 See, e.g., Own Your Own Data Act, S. 806, 116th Cong. (as introduced by Sen. John
Kennedy, Mar. 14, 2019); see also Angel Au-Yeung, California Wants to Copy Alaska and Pay
People a “Data Dividend.” Is It Realistic?, FORBES (Feb. 14, 2019, 10:04 AM),
https://www.forbes.com/sites/angelauyeung/2019/02/14/california-wants-to-copy-alaska-and-
pay-people-a-data-dividend—is-it-realistic/?sh=61e758521358 [https://perma.cc/72DE-
ZYWK].
2 See infra Section I.A.
3 See infra Section I.B.
4 Stacy-Ann Elvy, Paying for Privacy and the Personal Data Economy, 117 COLUM. L. REV.
1369, 1400–28 (2017) (showing that pay for privacy models turn privacy into a tradeable
product).
5 ERIC A. POSNER & E. GLEN WEYL, RADICAL MARKETS: UPROOTING CAPITALISM AND
DEMOCRACY FOR A JUST SOCIETY 209–33 (2018) (including in the proposal both personal and
non-personal information).
6 Ben Dickson, How Blockchain Solves the Complicated Data-Ownership Problem, NEXT
WEB (Aug. 17, 2017), https://thenextweb.com/news/blockchain-solves-complicated-data-
ownership-problem [https://perma.cc/X4TF-YJJ3] (“Blockchain technology provides an
alternative that gives the ownership of data back to users.”).
504 CARDOZO LAW REVIEW [Vol. 43:2
First, data property relies on—and would magnify the role of—
consent in privacy.11 Such reliance on consent, which Daniel Solove
refers to as “privacy self-management,”12 has been criticized as
fundamentally flawed. Seeing how data property relies on consent
makes clear that it inevitably inherits and magnifies consent’s
deficiencies: asymmetric information,13 unequal bargaining power,14
and data aggregation.15 Due to these problems, even if data property
may seem like it would provide strong protection, it cannot improve
data subjects’ vulnerable situation.
Second, understanding data property as transfer rules allows one
to see how data property is counterproductive when it comes to
achieving its own aim: promoting consumer control. Relying solely on
property rules would lead to inadequate and insufficient control
because it would eliminate incentives for companies to take efficient
levels of care after a data transaction. Therefore, they generate a moral
hazard: by not facing the consequences of the losses they produce,
companies would have larger incentives to engage in risky uses and
disclosures of personal data. This would further reduce people’s long-
term control over their personal data and expose them to more harm.
This moral hazard makes data property self-defeating.16
This critique informs normative debates in privacy law that do not
resort to the language of property but nevertheless share some of data
property’s elements by relying on consent. The failures of data property
show that ex-post accountability is a necessary condition for robust
privacy protection. Privacy law must protect privacy rights with both
consent-based rules (which operate ex-ante) and accountability
mechanisms (which operate ex-post). Statutory privacy seems to lean
too heavily on the side of the former. This Article proposes two ways to
address this: (i) combining consent requirements with new private
rights of action and (ii) keeping and reinforcing restrictions on the use
of personal data.
11 See Václav Janeček, Ownership of Personal Data in the Internet of Things, 34 COMPUT. L.
& SEC. REV. 1039, 1041 (2018); see also infra Part II.
12 Daniel J. Solove, Introduction: Privacy Self-Management and the Consent Dilemma, 126
HARV. L. REV. 1880, 1882–83 (2013); Neil Richards & Woodrow Hartzog, Taking Trust Seriously
in Privacy Law, 19 STAN. TECH. L. REV. 431, 444 (2016) (explaining the narrative of privacy self-
management).
13 See Katherine J. Strandburg, Free Fall: The Online Market’s Consumer Preference
Disconnect, 2013 U. CHI. LEGAL F. 95, 130–52, 165–72; see also infra Section III.A.
14 See infra Section III.B.
15 See infra Section III.C.
16 See infra Part IV.
506 CARDOZO LAW REVIEW [Vol. 43:2
23 Own Your Own Data Act, S. 806, 116th Cong. (as introduced by Sen. John Kennedy, Mar.
14, 2019).
508 CARDOZO LAW REVIEW [Vol. 43:2
24 Jill Cowan, How Much Is Your Data Worth?, N.Y. TIMES (Mar. 25, 2019),
https://www.nytimes.com/2019/03/25/us/newsom-hertzberg-data-dividend.html
[https://perma.cc/YX8E-T788] (describing California’s Governor’s proposal).
25 Marty Swant, Andrew Yang Proposes Digital Data Should Be Treated like a Property Right,
FORBES (Oct. 1, 2019, 4:27 PM), https://www.forbes.com/sites/martyswant/2019/10/01/andrew-
yang-proposes-digital-data-should-be-treated-like-a-property-right/?sh=49c5d6163ab7
[https://perma.cc/62ZH-2UVW].
26 Regulating Technology Firms in the 21st Century, YANG2020 (Nov. 14, 2019) [hereinafter
Regulating Technology Firms], https://2020.yang2020.com/blog/regulating-technology-firms-in-
the-21st-century [https://perma.cc/T57L-VHSP]; see also NBC News Now, Andrew Yang
Explains Why Digital Data Is Personal Property, YOUTUBE (Oct. 15, 2019),
https://www.youtube.com/watch?v=tSOf0Eh-4dU (last visited Nov. 18, 2021); Jaron Lanier & E.
Glen Weyl, A Blueprint for a Better Digital Society, HARV. BUS. REV. (Sept. 26, 2018),
https://hbr.org/2018/09/a-blueprint-for-a-better-digital-society [https://perma.cc/X7K8-AXP9]
(presenting the idea of “data dignity” and arguing that data is a form of labor and taking it
without compensation is labor exploitation).
27 Tyler Sonnemaker, Andrew Yang Wants You to Make Money off Your Data by Making It
Your Personal Property, INSIDER (Nov. 14, 2019, 4:15 PM), https://www.businessinsider.com/
andrew-yang-data-ownership-property-right-policy-2019-11 [https://perma.cc/BE8K-K6H5];
Matt Stevens, Andrew Yang’s next Move: A New Nonprofit Organization, N.Y. TIMES (Mar. 5,
2020), https://www.nytimes.com/2020/03/05/us/politics/andrew-yang-humanity-first.html
[https://perma.cc/H7W3-LJDS] (discussing the organization’s involvement in property rights
over data).
28 BOB ZIMMER, ADDRESSING DIGITAL PRIVACY VULNERABILITIES AND POTENTIAL THREATS
TO CANADA’S DEMOCRATIC ELECTORAL PROCESS 23 (2018).
29 Communication from the Commission to the European Parliament, the Council, the
European Economic and Social Committee and the Committee of the Regions: Towards a Thriving
Data-Driven Economy, COM (2014) 0442 final (Feb. 7, 2014).
30 See Press Release, Merkel: Regulate Ownership of Data (Mar. 18, 2017),
https://www.bundesregierung.de/breg-de/aktuelles/merkel-eigentum-an-daten-regeln-745810
[https://perma.cc/A8M7-QBK4].
2021] BEYOND DATA OWNERSHIP 509
31 Data Privacy Rights Require Data Ownership, FIN. TIMES (Mar. 21, 2018),
https://www.ft.com/content/a00ecf9e-2d03-11e8-a34a-7e7563b0b0f4 [https://perma.cc/8E8C-
XJRT].
32 Will.I.Am, We Need to Own Our Data as a Human Right—And Be Compensated for It,
ECONOMIST (Jan. 21, 2019), https://www.economist.com/open-future/2019/01/21/we-need-to-
own-our-data-as-a-human-right-and-be-compensated-for-it [https://perma.cc/7AGH-CXWD].
33 Dan Demers, From Complexity to Control: It’s Time to Own Your Data, FORBES (Feb. 27,
2020, 7:45 AM), https://www.forbes.com/sites/forbestechcouncil/2020/02/27/from-complexity-
to-control-its-time-to-own-your-data/?sh=42199876ceda [https://perma.cc/PB36-P8Q2]
(capitalization alterations omitted).
34 ROBERT SHAPIRO & SIDDHARTHA ANEJA, WHO OWNS AMERICANS’ PERSONAL
INFORMATION AND WHAT IS IT WORTH? 5 (2019).
35 Why You Should Own Your Data, SEGMENT, https://segment.com/academy/intro/why-
you-should-own-your-data [https://perma.cc/N9FN-3PL5].
36 BENOIT VAN ASBROECK, JULIEN DEBUSSCHE & JASMIEN CÉSAR, BUILDING THE EUROPEAN
DATA ECONOMY 121 (2017) (adding that exclusive ownership would be meaningless in the
context of GDPR).
37 See, e.g., David Floyd, Blockchain Could Make You—Not Equifax—The Owner of Your
Data, INVESTOPEDIA (June 25, 2019), https://www.investopedia.com/news/blockchain-could-
make-you-owner-data-privacy-selling-purchase-history [https://perma.cc/MZ4R-HA93]
(“Users of digital services are treated a bit like oblivious gulls who happen to excrete an
immensely productive resource, rather than owners of an asset they create. Blockchain
technology and related cryptographic techniques could change that, giving us control over our
personal data and enabling us to sell it to whomever we please.”); Dickson, supra note 6
(“Blockchain technology provides an alternative that gives the ownership of data back to users.”);
Ben Dickson, What’s the Value of Blockchain to Consumers?, TECHTALKS (June 1, 2017),
https://bdtechtalks.com/2017/06/01/whats-the-value-of-blockchain-to-consumers
[https://perma.cc/TX5H-2K36] (“So what is the tangible value of blockchain to consumers? I
believe it’s ownership of data. . . . Blockchain makes sure that you have full ownership of your
data . . . .”); Mark van Rijmenam, How Blockchain Will Give Consumers Ownership of Their Data,
MEDIUM (July 5, 2019), https://markvanrijmenam.medium.com/how-blockchain-will-give-
510 CARDOZO LAW REVIEW [Vol. 43:2
B. Scholarly Proposals
42 JEROEN VAN DEN HOVEN, MARTIJN BLAAUW, WOLTER PIETERS & MARTIJN WARNIER,
PRIVACY AND INFORMATION TECHNOLOGY (Edward N. Zalta ed., 2019).
43 Leon Trakman, Robert Walters & Bruno Zeller, Is Privacy and Personal Data Set to Become
the New Intellectual Property?, 50 INT’L REV. INTELL. PROP. & COMPETITION L. 937, 951–52 (2019)
(adding that “a constrained conception of IP rights can assist in reconciling principles of contract
and general property”); see also Will Rinehart, The Law & Economics of “Owning Your Data,”
AM. ACTION F. (Apr. 10, 2018), https://www.americanactionforum.org/insight/law-economics-
owning-data [https://perma.cc/Q723-YS8Q].
44 Scholtz, supra note 38, at 1123 (“Privacy should be understood as a quasi-property interest.
Courts can handle privacy interests in similar ways as the other members of the quasi-property
class.”); Timothy D. Sparapani, Putting Consumers at the Heart of the Social Media Revolution:
Toward a Personal Property Interest to Protect Privacy, 90 N.C. L. REV. 1309, 1313 (2012).
45 Jeffrey Ritter & Anna Mayer, Regulating Data as Property: A New Construct for Moving
Forward, 16 DUKE L. & TECH. REV. 220, 260–76 (2018) (discussing the particulars that regard
implementing their proposal).
46 See, e.g., Casey Quackenbush, If You Want an Ad-Free Facebook You’re Going to Have to
Pay for It, Says Sheryl Sandberg, TIME (Apr. 6, 2018, 2:38 AM), https://time.com/5230506/
facebook-pay-ad-free [https://perma.cc/HWB4-4QJA].
47 Elvy, supra note 4, at 1400–28 (showing that pay-for-privacy models turn privacy into a
tradeable product).
512 CARDOZO LAW REVIEW [Vol. 43:2
data as labor that is done for companies that acquire such data,
describing it in ownership terms.48 The personal data that companies
profit from is produced and provided by the people to whom that
information refers, who are not on those companies’ payroll.49 Data as
Labor sees personal data “as user possessions that should primarily
benefit their owners.”50 Accordingly, Weyl and Jaron Lanier argued
that, because data is a form of labor, taking it without compensation is
a form of labor exploitation.51
48 POSNER & WEYL, supra note 5, at 209–33, 245 (including in the proposal both personal and
non-personal information and stating, for example, that “[g]overnments would have to ensure
that individual digital workers have clear ownership rights over their data . . . [and] the right to
freely associate to form data labor unions”).
49 Id. at 209–33 (adding that “[p]eople’s role as data producers is not fairly used or properly
compensated” and introducing the concept of “technofeudalism,” reminiscent of the property
concept of feudalism in which lords take advantage of serfs’ land labor and agricultural output).
50 Imanol Arrieta-Ibarra, Leonard Goff, Diego Jiménez-Hernández, Jaron Lanier & E. Glen
Weyl, Should We Treat Data as Labor? Moving Beyond “Free,” 108 AEA PAPERS & PROC. 38, 39
(2018).
51 Lanier & Weyl, supra note 26 (proposing the establishment of “mediators of individual
data,” which operate similarly to data trusts, and tying it to the idea of data dignity).
52 Jennifer Baker, Vestager on the Intersection of Data and Competition, IAPP (Oct. 30, 2018),
https://iapp.org/news/a/vestager-on-the-intersection-of-data-and-competition/
[https://perma.cc/6VPT-7D7S]; see also Kalinda Basho, The Licensing of Our Personal
Information: Is It a Solution to Internet Privacy?, 88 CALIF. L. REV. 1507, 1526 (2000) (“Under
current law, ‘the ownership right to personal information is given to the collector of that
information, and not to the individual to whom the information refers.’”).
53 Council Regulation 2016/679, 2016 O.J. (L 119) [hereinafter GDPR].
2021] BEYOND DATA OWNERSHIP 513
Data property proposals involve moving the dial further toward these
property elements and away from consent-independent restrictions and
guarantees.
These descriptive statements show that, because of the property-
like elements in current privacy law, data property critiques inform
privacy law reform. Under current law, one may transfer rights over
personal information through consent, but one may not relinquish all
rights regarding personal information. Certain uses of this
information—such as use for public shaming—remain prohibited
regardless of what people agree to. These restrictions speak against
conceptualizing privacy rights as transferable, property-like
commodities under current law. While this Article is concerned with
normative and not descriptive views on data property, the descriptive
view underscores something important: The negative consequences of
moving privacy law all the way to consent-based protection can inform
whether privacy law should actually move one step toward the opposite
direction.
61 This is a broad definition of entitlement, similar to the definition used by Calabresi and
Melamed, which only entails that the good (in this case personal information) is owned by
someone, and that such person has rights over it. Calabresi & Melamed, supra note 8, at 1089; see
also Wesley Newcomb Hohfeld, Fundamental Legal Conceptions as Applied in Judicial Reasoning,
26 YALE L.J. 710 (1917) (discussing jural opposites and jural correlatives).
62 See Alvin K. Klevorick, On the Economic Theory of Crime, 27 NOMOS 289 (1985); Alvin K.
Klevorick, Legal Theory and the Economic Analysis of Torts and Crimes, 85 COLUM. L. REV. 905,
907–09 (1985) [hereinafter Klevorick, Legal Theory] (discussing this in the context of criminal
law).
2021] BEYOND DATA OWNERSHIP 515
In the first position, the set of ownership rights include, for example,
the right to use, exclude, sell, possess, subdivide, and lease. In the second
position, ownership is a relationship between people in relation to a
thing with the key characteristic of omnilaterality.73
The right of ownership right (or a property right) is a type of right
that can be protected by any transfer rule: property rules, liability rules,
or inalienability rules.74 In contrast—in an unfortunate ambiguity—
property rules are a transfer rule based on consent that can be used for
any type of right.75 It may be the case that the more one conceives an
entitlement as a property right, the more favorably one will tend to look
at property rules and the less that one will tolerate liability rules; for
example, the ownership right has few liability rules. Rights over real
property are frequently protected by injunctions while contractual
rights are frequently protected by damages.76
But this correlation does not collapse the conceptual distinction.
For example, eminent domain is a liability rule over an ownership right
over one’s land. Buying the land, on the other hand, is a property rule
over the same ownership right. Receiving compensation for
environmental harm is a liability rule for something (the environment)
over which one does not have ownership; receiving compensation for a
bodily injury is also a liability rule over something (one’s body parts)
that cannot be described as ownership. Subletting a room in an
apartment is a property rule over something one does not own.
Similarly, transferring rights over data only by consent and on an agreed
upon compensation is a property rule over something that one needs
not have ownership over. Individuals do not need to hold a property
right (ownership) in data in order for the transfer of whichever rights
they have over it to occur via property rules.
73 See Lisa M. Austin, The Public Nature of Private Property, in PROPERTY THEORY: LEGAL
AND POLITICAL PERSPECTIVES 1, 22 (James Penner & Michael Otsuka eds., 2018).
74 Calabresi & Melamed, supra note 8.
75 Id. at 1092, 1106.
76 Mark A. Lemley & Philip J. Weiser, Should Property or Liability Rules Govern Information?,
85 TEX. L. REV. 783, 786 (2007).
2021] BEYOND DATA OWNERSHIP 517
Transfer rule
Property rule Liability rule
Ownership Sale of a house Compensation for
damage of a car
Patent Sale of a patent Non-commercial
Right
use
Copyright Transferring Compulsory license
copyright
Table 1: Illustrating the difference between rights and transfer rules
77 Susan Rose-Ackerman, Inalienability and the Theory of Property Rights, 85 COLUM. L. REV.
931, 969 (1985) (characterizing inalienability as a “second-best response to the messiness and
complexity of the world”); Margaret Jane Radin, Market-Inalienability, 100 HARV. L. REV. 1849,
1903–36 (1987) (evaluating market-inalienability); Lee Anne Fennell, Adjusting Alienability, 122
HARV. L. REV. 1403, 1404–10 (2009).
78 Rose-Ackerman, supra note 77, at 937–41 (providing efficiency and equity arguments for
one transfer rule over another); Radin, supra note 77; Fennell, supra note 77.
79 Solon Barocas & Helen Nissenbaum, Big Data’s End Run Around Anonymity and Consent,
in PRIVACY, BIG DATA, AND THE PUBLIC GOOD: FRAMEWORKS FOR ENGAGEMENT 44, 57 (Julia
Lane, Victoria Stodden, Stefan Bender & Helen Nissenbaum eds., 2014).
518 CARDOZO LAW REVIEW [Vol. 43:2
80 See LESSIG, CODE: AND OTHER LAWS, supra note 39, at 85–90, 159–63; LAWRENCE LESSIG,
CODE VERSION 2.0 200–33 (2006).
81 Laudon, supra note 39; Murphy, supra note 38; Lessig, Architecture of Privacy, supra note
39; Mell, supra note 39; LESSIG, CODE: AND OTHER LAWS, supra note 39, at 85–90, 159–63.
82 See Pamela Samuelson, Privacy as Intellectual Property?, 52 STAN. L. REV. 1125, 1129
(2000).
83 See Prins, supra note 38, at 271 (“[M]arket-oriented mechanisms based on individual
ownership of personal data could enhance personal data protection. If ‘personal data markets’
were allowed to function more effectively, there would be less privacy invasion.”).
84 See supra Section II.A.
85 See Calabresi & Melamed, supra note 8, at 1092 (explaining that “entitlement is protected
by a property rule to the extent that someone who wishes to remove the entitlement from its
holder must buy it from him in a voluntary transaction in which the value of the entitlement is
agreed upon by the seller”).
2021] BEYOND DATA OWNERSHIP 519
86 See Thomas W. Merrill, Property and the Right to Exclude, 77 NEB. L. REV. 730, 734–40
(1998) (canvassing perspectives on the right to exclude).
87 Václav Janeček, Ownership of Personal Data in the Internet of Things, 34 COMPUT. L. &
SEC. REV. 1039, 1041 (2018) (comparing civil and common law and stating that “civilian idea of
ownership is an absolute dominion encompassing all the listed rights (numerus clausus) over the
relevant object; whereas in the common law tradition, ownership includes a variety of different
rights over the same property”); see also PURTOVA, A EUROPEAN PERSPECTIVE, supra note 56, at
1–4.
88 See supra Part I.
89 Baron, supra note 39, at 415–17.
90 Raymond T. Nimmer & Patricia A. Krauthaus, Information as Property Databases and
Commercial Property, 1 INT’L J.L. & INFO. TECH. 3, 5–6 (1993).
520 CARDOZO LAW REVIEW [Vol. 43:2
97 Václav Janeček & Gianclaudio Malgieri, Data Extra Commercium, in DATA AS COUNTER-
PERFORMANCE—CONTRACT LAW 2.0? (Sebastian Lohsse, Reiner Schulze & Dirk Staudenmayer
eds., 2020).
98 Merrill & Smith, supra note 72, at 360–66 (defending the exclusionist view).
99 JOHN G. SPRANKLING, UNDERSTANDING PROPERTY LAW 4–5 (2d ed. 2008) (noting that the
right to exclude and right to transfer are different sticks in the bundle).
522 CARDOZO LAW REVIEW [Vol. 43:2
C. Inadequate Goal
100 Helen Nissenbaum, Must Privacy Give Way to Use Regulation?, in DIGITAL MEDIA AND
DEMOCRATIC FUTURES 255, 264–69 (Michael X. Delli Carpini ed., 2019) (indicating that the
distinction between data collection and use has fuzzy boundaries and leads to slippery slopes).
101 See, e.g., Cohen, supra note 10, at 1377.
102 Lisa M. Austin, Re-reading Westin, 20 THEORETICAL INQUIRIES L. 53, 58–63 (2019)
(discussing how Westin also understands privacy in terms of a condition’s experience).
103 See Lisa Austin, Privacy and the Question of Technology, 22 L. & PHIL. 119, 129, 140 (2003)
(explaining how this would affect reasonable expectations of privacy).
104 Stanley I. Benn, Privacy, Freedom and Respect for Persons, in PRIVACY 1, 6–7 (J. Roland
Pennock & John W. Chapman eds., 1971).
2021] BEYOND DATA OWNERSHIP 523
105 Julie E. Cohen, What Privacy Is For, 126 HARV. L. REV. 1904, 1912–18 (2013) (analyzing
the interplay between privacy and systems of surveillance and arguing that freedom from
surveillance is key to the practice of informed and reflective citizenship).
106 Cohen, supra note 10, at 1380.
107 Julie E. Cohen, Privacy, Autonomy and Information, in CONFIGURING THE NETWORKED
SELF: LAW, CODE, AND THE PLAY OF EVERYDAY PRACTICE 1, 4 (2012) (adding that propertizing
privacy shields surveillance from public scrutiny because the marketplace rubberstamps it).
108 Cohen, supra note 10, at 1384.
109 Id. at 1378 (stating that “the understanding of ownership that applies to, say, cars or shoes
just seems a crabbed and barren way of measuring the importance of information that describes
or reveals personality”).
110 Jessica Litman, Information Privacy/Information Property, 52 STAN. L. REV. 1283, 1294
(2000) (“Property rights in any sort of information raise significant policy and free speech issues.
Facts are basic buildings blocks: building blocks of expression; of self-government; and of
knowledge itself.”).
111 Ari Ezra Waldman, Privacy as Trust: Sharing Personal Information in a Networked World,
69 U. MIA. L. REV. 559, 582–85 (2015) (linking this idea to sociology).
112 Elettra Bietti, Locked-in Data Production: User Dignity and Capture in the Platform
Economy 19 (Oct. 14, 2019) (unpublished manuscript) (on file with SSRN).
113 Id.
114 Jane Yakowitz Bambauer, The New Intrusion, 88 NOTRE DAME L. REV. 205, 224 (2012).
524 CARDOZO LAW REVIEW [Vol. 43:2
Once one understands data property proposals for what they are—
relying on people to self-protect and compensate privacy based on
agreements, independently of eventual harms caused—one can see that
several criticisms directed at privacy law’s reliance on individual
consent also apply to data property, exposing equivalent flaws.
Because of its focus on trade (relying solely on property rules), data
property creates three structural problems in the protection of privacy
rights. First, it inherits the notice and choice model’s asymmetric
information problem. Second, and relatedly, it becomes ineffective at
protecting privacy due to unequal bargaining positions. Third, it under-
protects personal information derived from data aggregation (inferred
information). These structural problems are discussed in the following
three Sections.
A. Asymmetric Information
The last Part showed that data property is not concerned with the
type of rights held over personal information but rather with
transferring them through consent.115 For that reason, the limits of the
notice and choice paradigm translate into data property. Although this
Article is not about the benefits and limits of consent in privacy, notice
116 See, e.g., Elena Gil González & Paul de Hert, Understanding the Legal Provisions that Allow
Processing and Profiling of Personal Data—An Analysis of GDPR Provisions and Principles, 19
ERA F. 597, 600 (2019) (“Consent has become a cornerstone of data protection across the EU.
However, reliance on consent is not always the best option. Indeed, it is only appropriate if the
controller can offer genuine choice, control and responsibility to individuals over the use of their
personal data.”).
117 Schwartz, supra note 38, at 2080; see TONY VILA, RACHEL GREENSTADT & DAVID MOLNAR,
WHY WE CAN’T BE BOTHERED TO READ PRIVACY POLICIES: MODELS OF PRIVACY ECONOMICS AS
A LEMONS MARKET 3 (2003) (arguing that the information asymmetry leads to an adverse
selection problem); see also Neil M. Richards, The Dangers of Surveillance, 126 HARV. L. REV.
1934, 1935 (2013) (“A second special harm that surveillance poses is its effect on the power
dynamic between the watcher and the watched.”).
118 Tal Z. Zarsky, Privacy and Manipulation in the Digital Age, 20 THEORETICAL INQUIRIES L.
157, 172–74 (discussing the sustainability of the market-based manipulation argument); Ryan
Calo, Digital Market Manipulation, 82 GEO. WASH. L. REV. 995, 1003–18 (2014) (arguing that
the future of market manipulation is one marked with corporations exploiting the limits of each
consumer’s ability to pursue their own self-interests).
119 Aleecia M. McDonald & Lorrie Faith Cranor, The Cost of Reading Privacy Policies, 4 J.L. &
POL’Y FOR INFO. SOC’Y 543, 544 (2008).
120 Solon Barocas & Helen Nissenbaum, Computing Ethics Big Data’s End Run Around
Procedural Privacy Protections, 57 COMMC’NS ACM 31 (2014) (also stating that “the problem we
see with informed consent and anonymization is not only that they are difficult to achieve; it is
that, even if they were achievable, they would be ineffective against the novel threats to privacy
posed by big data”); see also Strandburg, supra note 13, at 165–72 (arguing that neither notice
and choice nor a more robust consent regime can overcome the basic problems of behavioral
advertising business models).
121 M. Ryan Calo, Against Notice Skepticism in Privacy (and Elsewhere), 87 NOTRE DAME L.
REV. 1027, 1047–59 (2012) (proposing visceral notices for privacy); Paula J. Dalley, The Use and
Misuse of Disclosure as a Regulatory System, 34 FLA. ST. U. L. REV. 1089, 1092–93 (2006) (noting
the provision of notices as a common method for regulation); William M. Sage, Regulating
Through Information: Disclosure Laws and American Healthcare, 99 COLUM. L. REV. 1701, 1715–
20 (1999) (explaining the provision of notices as a common method for regulation in medicine).
526 CARDOZO LAW REVIEW [Vol. 43:2
and even if people read them.122 Empirical evidence has shown that
simplifying disclosures has no effect on consumer awareness,
suggesting that language complexity is not the main driver.123
Moreover, other empirical work suggests that the language used in a
privacy policy is irrelevant, which in turn suggests that consumers do
not react to different kinds of language.124
This limitation on the usefulness of notices may be due to
information overload.125 That is, it may be the case that the reason why
notices are rarely effective is that, no matter how simply formulated or
visible they are, there are too many cognitive steps between the
information disclosed (e.g., geolocation tracking) and the information
that is useful (e.g., does anyone know where I go and who I spend time
with?).126 For example, while people do not respond to privacy policies,
they have been shown to more easily respond to and understand
information conveyed by design choices.127 Information overload is
worsened by the problem of data aggregation discussed below because
one of the main drivers of consumers’ difficulty to estimate costs is
anticipating how information aggregates.128
Beyond descriptive criticisms about the effectiveness of the notice
and choice approach, it has received normative criticisms based on the
dynamic between companies, the State, and individuals.129 From a
122 Kirsten Martin, Do Privacy Notices Matter? Comparing the Impact of Violating Formal
Privacy Notices and Informal Privacy Norms on Consumer Trust Online, 45 J. LEGAL STUD. S191,
S204–06 (2016) (using a vignette study to show that formal privacy notices reduce consumer trust
in a website); see also SOLON BAROCAS & HELEN NISSENBAUM, ON NOTICE: THE TROUBLE WITH
NOTICE AND CONSENT, in PROCEEDINGS OF THE ENGAGING DATA FORUM (2009); McDonald &
Cranor, supra note 119, at 544 (showing the time and energy needed to comprehend privacy
policies); Susanna Kim Ripken, The Dangers and Drawbacks of the Disclosure Antidote: Toward
a More Substantive Approach to Securities Regulation, 58 BAYLOR L. REV. 139, 185–203 (2006)
(explaining the limits of a disclosure-based policy generally and suggesting direct conduct
regulation through the example of securities).
123 Omri Ben-Shahar & Adam Chilton, Simplification of Privacy Disclosures: An Experimental
Test, 45 J. LEGAL STUD. S41, S44 (2016) (finding that best-practice simplification techniques have
little or no effect on respondents’ comprehension of disclosures).
124 Lior Jacob Strahilevitz & Matthew B. Kugler, Is Privacy Policy Language Irrelevant to
Consumers?, 45 J. LEGAL STUD. S69, S76–83 (2016) (testing language in privacy policies).
125 Ignacio N. Cofone & Adriana Z. Robertson, Consumer Privacy in a Behavioral World, 69
HASTINGS L.J. 1471, 1475, 1489–90 (2018).
126 Id.
127 Ari Ezra Waldman, Privacy, Notice, and Design, 21 STAN. TECH. L. REV. 74, 113–14 (2018)
(characterizing design’s effect as “powerful”); Ari Ezra Waldman, A Statistical Analysis of Privacy
Policy Design, 93 NOTRE DAME L. REV. ONLINE 159, 163–71 (2018) (discussing a survey’s
findings).
128 See infra Section III.C.
129 See Lisa M. Austin, Is Consent the Foundation of Fair Information Practices? Canada’s
Experience Under PIPEDA, 56 U. TORONTO L.J. 181, 188–94 (2006) (presenting the case for being
2021] BEYOND DATA OWNERSHIP 527
skeptical of notice and choice); Lisa M. Austin, Reviewing PIPEDA: Control, Privacy and the
Limits of Fair Information Practices, 44 CAN. BUS. L.J. 21, 24–25 (2006) (summarizing the
consent-based model’s deficiencies).
130 Lisa M. Austin, Enough About Me: Why Privacy Is About Power, Not Consent (or Harm),
in A WORLD WITHOUT PRIVACY: WHAT LAW CAN AND SHOULD DO? 131, 141 (Austin Sarat ed.,
2014).
131 Id. at 7–9.
132 See Richards & Hartzog, supra note 12, at 444 (explaining that the narrative of control
feeds from the narrative of privacy self-management); see also Neil Richards & Woodrow
Hartzog, Privacy’s Trust Gap: A Review, 126 YALE L.J. 1180, 1184 (2017).
133 Sarah Spiekermann, Alessandro Acquisti, Rainer Böhme & Kai-Lung Hui, The Challenges
of Personal Data Markets and Privacy, 25 ELEC. MKTS. 161, 165–67 (2015); see also Woodrow
Hartzog & Neil Richards, Privacy’s Constitutional Moment and the Limits of Data Protection, 61
B.C. L. REV. 1687 (2020) (discussing power asymmetries between data subjects and companies).
528 CARDOZO LAW REVIEW [Vol. 43:2
product at all.134 If they need to use the service, for example, because
using it is part of normal social life and therefore costly to opt-out of it,
such as with email or a cellphone provider, this consent is not given
freely.135
This relates to the idea of privacy self-management, under which
people manage their own privacy in making decisions about when and
how to give away their personal information.136 The privacy self-
management model is predicated on the false premise that informed
and rational individuals will make appropriate decisions as to the use
and collection of their personal data.137 This model fails to address the
unequal bargaining positions between data subjects and information
intermediaries, as well as the data aggregation problem explained
below.
It is impossible for data subjects to properly assess the risks
involved in disclosing their personal information in the digital
environment.138 Data subjects cannot assess the risks of disclosing
because they do not always know how their data will be used and what
can be done with it.139 Some also argue that data processors even have
economic incentives to mislead data subjects, which adds to the
problem.140 As Maurice Stucke and Ariel Ezrachi explain: “Under
the . . . opaque system, there’s no way of knowing whether we’re getting
a fair deal. We have little idea how much personal data we have
provided, how it is used and by whom, and what it’s worth.”141 The costs
of assessing risks when providing consent are enormous.142
134 See Samuelson, supra note 82, at 1162–63 (describing the contractual elements of this
relationship).
135 Bietti, supra note 112 (manuscript at 29) (“[O]pting for market or property-based
mechanisms, leaves private platform companies with too much objectionable power over their
users and too much power to interfere with their basic human interests.”).
136 See Solove, supra note 12, at 1882–83 (introducing privacy self-management and consent’s
structural problems in privacy).
137 Id. at 1883 (noting that “[p]rivacy self-management envisions an informed and rational
person who makes appropriate decisions about whether to consent to various forms of collection,
use, and disclosure of personal data”).
138 See Bietti, supra note 112 (manuscript at 19) (“[I]t is likely that an ownership regime would
benefit the most informed and educated of data producers to the detriment of the helpless and
misinformed, who could easily be tricked into selling their data at lower than market value.”); see
also Samuelson, supra note 82, at 1128, 1145 (noting that commentators think the law should
supply corrective measures).
139 Cofone & Robertson, supra note 125, at 1475, 1489–90 (discussing information overload
and aggregation).
140 Trakman, Walters & Zeller, supra note 43, at 950.
141 MAURICE E. STUCKE & ARIEL EZRACHI, COMPETITION OVERDOSE: HOW FREE MARKET
MYTHOLOGY TRANSFORMED US FROM CITIZEN KINGS TO MARKET SERVANTS 435 (2020).
142 Samuelson, supra note 82, at 1145 (adding that while most objects that are sold can be
replaced, one cannot replace personal data once it is disclosed).
2021] BEYOND DATA OWNERSHIP 529
143 Neil Richards & Woodrow Hartzog, The Pathologies of Digital Consent, 96 WASH. U. L.
REV. 1461, 1476–91 (2019).
144 Id. at 1498–1502.
145 See Strandburg, supra note 13, at 95 (“In a functioning market, payment of a given price
signals consumer demand for particular goods and services, transmitting consumer preferences
to producers. Data collection would serve as ‘payment’ in that critical sense only if its transfer
from users to collectors adequately signaled user preferences for online goods and services.”);
Nadezhda Purtova, Do Property Rights in Personal Data Make Sense After the Big Data Turn?, 10
J.L. & ECON. REG. 64, 72–73 (2017).
146 Barocas & Nissenbaum, supra note 120, at 32 (discussing the harm aggregated information
poses); Solove, supra note 12, at 1889–91; Strandburg, supra note 13, at 98 (“[I]mperfect
consumer information about the potential harms of data collection, company data practices, and
means to mitigate data collection combine with the properties of information aggregation and
with common behavioral economics concerns to undercut the market’s responsiveness to
consumer preferences.”).
530 CARDOZO LAW REVIEW [Vol. 43:2
them.147 But, combined, the same data points present high risks to
users.148 And the way that information aggregates, as well as how high
these costs are, are extremely difficult for data subjects to anticipate.149
People lack protection for the risks of disclosing personal data if they
are given small compensations for each disclosure while they face high
expected harms for them in aggregation.150
Two recent cases illustrate this dynamic. In Meyers v. Nicolet
Restaurant, a restaurant allegedly violated the Fair and Accurate Credit
Transactions Act (FACTA) by printing the expiration date of a credit
card on a sales receipt.151 In Kirchein v. Pet Supermarket, a supermarket
printed more than five digits of credit card numbers on customers’
receipts, which is a violation of prohibitions on printing more than the
last five digits of the credit card number or expiration date on the
receipt provided to the customer.152 In both cases, the plaintiffs alleged
that the company increased the risk that the customers’ identity would
be compromised, for example through identity theft. Printing a full
credit card number instead of the last four digits, or printing the
expiration date together with the last four digits, may seem harmless in
isolation. But, if businesses are not sanctioned for breaching FACTA in
such a way and a malicious actor can hack the systems of a few
restaurants, because of the aggregation problem, it may be easy for them
to duplicate credit cards. If that happens, it will be difficult for
customers to trace back the duplicated credit cards to the aggregation
147 See, e.g., Emily Steel, Callum Locke, Emily Cadman & Ben Freese, How Much Is Your
Personal Data Worth?, FIN. TIMES (June 12, 2013), https://ig.ft.com/how-much-is-your-
personal-data-worth [https://perma.cc/CZ2W-BRMZ]; Ignacio Cofone, Why Paying for
Facebook Won’t Fix Your Privacy, VENTUREBEAT (Apr. 17, 2018, 5:10 PM),
https://venturebeat.com/2018/04/17/why-paying-facebook-wont-fix-your-privacy
[https://perma.cc/Q9F5-46JX].
148 Strandburg, supra note 13, at 134–41 (discussing how “data accumulated for behavioral
targeting of advertisements can be (and is) used not only to target ads for particular products to
particular consumers but also to facilitate price discrimination”).
149 Strandburg, supra note 13, 130–52 (“[I]t is nearly impossible for a consumer to estimate
the increment in expected harm associated with a given instance of data collection.”); Cofone &
Robertson, supra note 125.
150 This aggregation problem relates to the dignity-based criticism of data as property. See
Bietti, supra note 112 (manuscript at 13) (“[S]ubjecting and devolving large amounts of personal
data to market forces could be said go against our dignity . . . .”).
151 Meyers v. Nicolet Rest. of De Pere, LLC, 843 F.3d 724, 725 (7th Cir. 2016) (“Meyers was
given a copy of his receipt after dining at Nicolet . . . . He noticed that Nicolet’s receipt did not
truncate the expiration date, as the FACTA requires.”).
152 Kirchein v. Pet Supermarket, Inc., 297 F. Supp. 3d 1354, 1356 (S.D. Fla. 2018) (“Kirchein
filed a putative class action alleging that the Defendant violated the Fair and Accurate Credit
Transactions Act (‘FACTA’), which prohibits printing ‘more than the last five digits of the credit
card number or the expiration date upon any receipt provided to the cardholder at the point of
the sale or transaction.’”).
2021] BEYOND DATA OWNERSHIP 531
153 Daniel J. Solove & Danielle Keats Citron, Risk and Anxiety: A Theory of Data Breach
Harms, 96 TEX. L. REV. 737, 756–58 (2018) (“A problem is that fraud may not surface until after
an identity thief combines leaked personal data with other information.”).
154 See Bietti, supra note 112 (manuscript at 7, 19) (“[A] lot of data is created
unintentionally . . . as part of a diffuse system that captures it without a specific purpose for doing
so.”).
155 Przemyslaw Palka, Data Management Law for the 2020s: The Lost Origins and the New
Needs, 68 BUFF. L. REV. 559, 595–602 (2020) (adding that, for that reason, I lack a moral right to
give such consent).
156 Barocas & Nissenbaum, supra note 120 (explaining consent becomes meaningless as
someone aggregates people to the data); Purtova, supra note 145 (explaining this in terms of
network effects).
157 See, e.g., Schwartz, supra note 38, at 2084; Ignacio N. Cofone, The Dynamic Effect of
Information Privacy Law, 18 MINN. J.L. SCI. & TECH. 517, 530–31 (2017); Joshua A.T. Fairfield &
Christoph Engel, Privacy as a Public Good, 65 DUKE L.J. 385, 421–33 (2015).
158 Lanah Kammourieh et al., Group Privacy in the Age of Big Data, in GROUP PRIVACY: NEW
CHALLENGES OF DATA TECHNOLOGIES 37, 52–55 (Linnet Taylor, Luciano Floridi & Bart van der
Sloot eds., 2017); Ugo Pagallo, The Group, the Private, and the Individual: A New Level of Data
Protection?, in GROUP PRIVACY: NEW CHALLENGES OF DATA TECHNOLOGIES 159, 161–64 (Linnet
Taylor, Luciano Floridi & Bart van der Sloot eds., 2017).
159 Schwartz, supra note 38, at 2084–90; Nadezhda Purtova, Property Rights in Personal Data:
Learning from the American Discourse, 25 COMPUT. L. & SEC. REV. 507, 519 (2009); Spiekermann,
Acquisti, Böhme & Hui, supra note 133, at 162; Fairfield & Engel, supra note 157.
532 CARDOZO LAW REVIEW [Vol. 43:2
160 Neil Richards & Woodrow Hartzog, A Relational Turn for Data Protection?, 4 EUR. DATA
PROT. L. REV. 492, 493 (2020) (“[T]he FIPs approach never considered that future consumers
and citizens might create so much data and have so many commercial and government accounts
that informational self-determination could become impossible.”).
161 Spiekermann, Acquisti, Böhme & Hui, supra note 133, at 163.
162 HELEN NISSENBAUM, PRIVACY IN CONTEXT: TECHNOLOGY, POLICY, AND THE INTEGRITY
OF SOCIAL LIFE 67–126 (2010); Helen Nissenbaum, Privacy as Contextual Integrity, 79 WASH. L.
REV. 119, 131–36 (2004).
163 Paul Ohm, Broken Promises of Privacy: Responding to the Surprising Failure of
Anonymization, 57 UCLA L. REV. 1701, 1716–31 (2010) (discussing the ease of reidentification).
164 Linnet Taylor, Bart van der Sloot & Luciano Floridi, Conclusion: What Do We Know About
Group Privacy?, in GROUP PRIVACY: NEW CHALLENGES OF DATA TECHNOLOGIES 225, 225–29
(Linnet Taylor, Luciano Floridi & Bart van der Sloot eds., 2017) (explaining that anonymized
data is informative of preferences, behavior, population mobility, urban dynamics, among
others); see also Brent Mittelstadt, From Individual to Group Privacy in Big Data Analytics, 30
PHIL. & TECH. 475, 475–80 (2017).
165 Arvind Narayanan & Vitaly Shmatikov, Privacy and Security: Myths and Fallacies of
“Personally Identifiable Information,” 53 COMMC’NS ACM 24, 24–26 (2010).
2021] BEYOND DATA OWNERSHIP 533
This includes both the privacy harm that re-anonymization involves per
se and the consequential harms that can accrue from it.
From a process viewpoint, the idea of data as labor diverges here
because it validates control over inferred data by data aggregators by
arguing that, because they invested labor into creating it, they are more
deserving of having control.166 That is, the lack of protection for inferred
data is not a bug but a feature of the data as labor idea. This does not
invalidate the aggregation-based normative criticism towards it.
Moreover, even under the data as labor idea, most pieces of inferred
information that someone contributes to will also have had
contributions by others, creating simultaneous claims or at least the
curtailing of some property rights by other people’s incompatible
claims.167
Personal data, in other words, is about inferences.168 Even if it were
true that data subjects made informed and free decisions about their
data, companies would infer information about them based on the
information that they have about others; that is, information that others
have consented to disclose but the data subject has not.169
In sum, data property would not protect against data aggregation.
That is so because it would not provide control over inferred
information—created by assembling previously collected
information—and would be impossible to allocate appropriately for
information that is relational.
***
177 See PAUL MILGROM & JOHN ROBERTS, Moral Hazard and Performance Incentives, in
ECONOMICS, ORGANIZATION AND MANAGEMENT 166, 166–70, 179, 185–90 (1992) (explaining
how moral hazard leads to perverse risk incentives). See generally John M. Marshall, Moral
Hazard, 66 AM. ECON. REV. 880 (1976) (introducing the seminal contribution for moral hazard
in economics); David Rowell & Luke B. Connelly, A History of the Term “Moral Hazard,” 79 J.
RISK & INS. 1051, 1051–58, 1064–69 (2012) (explaining the historical evolution of the term and
the differences between its colloquial and economics uses).
178 Tom Baker, On the Genealogy of Moral Hazard, 75 TEX. L. REV. 237, 272 (1996).
179 Reinier H. Kraakman, Corporate Liability Strategies and the Costs of Legal Controls, 93
YALE L.J. 857, 873–74 (1984); James R. Garven & Steven W. Pottier, Incentive Contracting and
the Role of Participation Rights in Stock Insurers, 62 J. RISK & INS. 253 (1995).
180 See, e.g., George L. Priest, A Theory of the Consumer Product Warranty, 90 YALE L.J. 1297
(1981); Richard S. Higgins, Products Liability Insurance, Moral Hazard, and Contributory
Negligence, 10 J. LEGAL STUD. 111 (1981); Lawrence Blume & Daniel L. Rubinfeld, Compensation
for Takings: An Economic Analysis, 72 CALIF. L. REV. 569 (1984); Richard A. Epstein, Products
Liability as an Insurance Market, 14 J. LEGAL STUD. 645 (1985); Jon D. Hanson & Kyle D. Logue,
The First-Party Insurance Externality: An Economic Justification for Enterprise Liability, 76
CORNELL L. REV. 129 (1990); Richard J. Butler & John D. Worrall, Claims Reporting and Risk
Bearing Moral Hazard in Workers’ Compensation, 58 J. RISK & INS. 191 (1991); Daniel Keating,
Pension Insurance, Bankruptcy and Moral Hazard, 1991 WIS. L. REV. 65; Howell E. Jackson, The
Expanding Obligations of Financial Holding Companies, 107 HARV. L. REV. 507 (1994); Nita Ghei
& Francesco Parisi, Adverse Selection and Moral Hazard in Forum Shopping: Conflicts Law as
Spontaneous Order, 25 CARDOZO L. REV. 1367 (2004); Ronald J. Gilson & Alan Schwartz,
Understanding MACs: Moral Hazard in Acquisitions, 21 J.L. ECON. & ORG. 330 (2005); Lawrence
A. Cunningham, Sarbanes-Oxley Accounting Issues: Too Big to Fail: Moral Hazard in Auditing
and the Need to Restructure the Industry Before It Unravels, 106 COLUM. L. REV. 1698 (2006);
Jonathan Klick & Thomas Stratmann, Diabetes Treatments and Moral Hazard, 50 J.L. & ECON.
519 (2007); Karl S. Okamoto, After the Bailout: Regulating Systemic Moral Hazard, 57 UCLA L.
REV. 183 (2009); Henry Schneider, Moral Hazard in Leasing Contracts: Evidence from the New
York City Taxi Industry, 53 J.L. & ECON. 783 (2010); Omri Ben-Shahar & Kyle D. Logue,
Outsourcing Regulation: How Insurance Reduces Moral Hazard, 111 MICH. L. REV. 197 (2012);
Albert C. Lin, Does Geoengineering Present a Moral Hazard?, 40 ECOLOGY L.Q. 673 (2013); Steven
L. Schwarcz, Too Big to Fool: Moral Hazard, Bailouts, and Corporate Responsibility, 102 MINN.
L. REV. 761 (2017); Peter Molk, Playing with Fire? Testing Moral Hazard in Homeowners
Insurance Valued Policies, 2018 UTAH L. REV. 347; Solomon Miller, Current Developments 2018–
536 CARDOZO LAW REVIEW [Vol. 43:2
2019: Ending Prosecutor’s Moral Hazard in Criminal Sentencing, 32 GEO. J. LEGAL ETHICS 833
(2019); Jeffrey L. Vagle, Cybersecurity and Moral Hazard, 23 STAN. TECH. L. REV. 71 (2020).
181 See John Armour, Henry Hansmann & Reinier Kraakman, Agency Problems and Legal
Strategies, in THE ANATOMY OF CORPORATE LAW: A COMPARATIVE AND FUNCTIONAL
APPROACH 29 (3d ed. 2017) (explaining principal-agent problems); Kenneth J. Arrow, The
Economics of Moral Hazard: Further Comment, 58 AM. ECON. REV. 537, 538 (1968) (introducing
moral hazard).
182 Armour, Hansmann & Kraakman, supra note 181 (explaining moral hazard’s incentive
problems in principal-agent problems).
183 Bengt Holmström, Moral Hazard and Observability, 10 BELL J. ECON. 74, 74, 80–81 (1979)
(discussing the consequence of information asymmetries in the context of optimal deductibles in
insurance).
184 Sugato Bhattacharyya & Francine Lafontaine, Double-Sided Moral Hazard and the Nature
of Share Contracts, 26 RAND J. ECON. 761, 766–75 (1995) (exploring contractual arrangements
involving revenue in double-sided moral hazard, including limited possibilities for customizing
contractual terms); Eva I. Hoppe & Patrick W. Schmitz, Hidden Action and Outcome
Contractibility: An Experimental Test of Moral Hazard Theory, 109 GAMES & ECON. BEHAV. 544,
550–57 (2018) (showing in an experimental setting that contractual bargaining is desirable, when
possible, to solve hidden action moral hazard).
185 Holmström, supra note 183, at 74.
186 Patrick W. Schmitz, On the Interplay of Hidden Action and Hidden Information in Simple
Bilateral Trading Problems, 103 J. ECON. THEORY 444, 444–47 (2002) (classifying this scenario as
“hidden action”).
2021] BEYOND DATA OWNERSHIP 537
party’s care can reduce the amount of harm to the first party, they can
control their level of care, their liability does not depend on their level
of care, and they are expected to behave rationally.187
191 See, e.g., Leonid Bershidsky, End-to-End Encryption Isn’t as Safe as You Think, BLOOMBERG
(May 14, 2019, 7:00 PM), https://www.bloomberg.com/opinion/articles/2019-05-14/whatsapp-
hack-shows-end-to-end-encryption-is-pointless [https://perma.cc/5PZQ-6RFV]; Bruce
Schneier, Why “Anonymous” Data Sometimes Isn’t, WIRED (Dec. 12, 2007, 9:00 PM),
https://www.wired.com/2007/12/why-anonymous-data-sometimes-isnt [https://perma.cc/
SH7H-49EP].
192 See Mark Verstraete & Tal Zarsky, Optimizing Breach Notification, 2021 U. ILL. L. REV.
803, 845 (discussing the role of reputation in corporate privacy compliance). Corporations may
have incentives to provide safeguards for information only when they gain a reputation as with
data subjects who would in turn react to the practice so that if corporations do not provide
adequate safeguards, it would be harder for them to gain consent. In that case, the costs of
inadequate security would not be entirely borne on data subjects but there would be some
reputational consequences.
2021] BEYOND DATA OWNERSHIP 539
rules are satisfied only at the point of transfer, allowing the acquirer to
ignore potential externalities later on. This can be contrasted with
liability rules, which can impose costs after the transaction.193
The market failure would be aggravated if the law relied on data
property for data subjects’ protection, moving the dial further away
from liability rules and into data property’s exclusively-property-rule
protection. If data collectors must only compensate data subjects to
obtain consent to collect their personal information (for example, by
providing them a service), then companies have no incentives to incur
costs of care or to moderate activity levels (information processing) to
avoid risk to data subjects. These are data externalities.194
This market failure would defeat any permutation of data property
even if data subjects had perfect information, were fully rational, and
could engage in capable privacy self-management—which is not the
case. This is so because moral hazard does not arise from an agent
failure: it arises from a combination of a party’s level of risk-taking after
the interaction affecting the well-being of the other and a structural lack
of incentives for that party to take the other party’s interest into account
after the exchange. For that reason, it would be impossible for data
subjects and companies to anticipate the magnitude of the moral hazard
and factor it into a price for data. Prices simply cannot set adequate
incentives ex-post.
Moreover, even if data subjects had full information and could
calculate the expected externalities into their compensation for data,
this would not solve the problem because companies would continue to
lack incentives to invest in care to minimize data subject risk ex-post. If
users under data property were rational, they would anticipate this
increase in risk and increase the “price” demanded for their personal
information in accordance with the increased risk.195 The price increase
would reduce the demand for such information in equilibrium, which
would reduce the supply of information to meet that demand.196 This
moral hazard problem would, in turn, make the market unravel. This,
of course, has not happened, but not because the market failure does
not exist but rather because, as the last Part explained, data subjects do
not make fully informed choices, so they cannot adjust for expected
risk.197 In other words, the market does not unravel because data
subjects often unknowingly make welfare-decreasing decisions.
The measures that are beneficial for data subjects, but which
companies lack incentives to incorporate under a property regime, are
different. These measures could be cybersecurity protections to prevent
data breaches. Arguably, cybersecurity regulations mandate these
protections because consent-based privacy regimes are ineffective at
encouraging them. These measures could also involve avoiding risky or
harmful uses of data. They could also be, for example, encouraging
sufficient de-identification of data. Many activities may increase
expected harm for data subjects more than they increase expected
benefits for companies processing data, but companies have incentives
to engage in the socially inefficient behavior because they can
externalize this cost.
197 Ignacio N. Cofone, The Value of Privacy: Keeping the Money Where the Mouth Is, 2015
PROC. WORKSHOP ON ECON. INFO. SEC. 1 (2015).
198 Cofone, supra note 157, at 524–27 (discussing “concealment and asymmetric
information”).
2021] BEYOND DATA OWNERSHIP 541
with the data ex-post.199 Negotiating over one’s information thus has
high costs, even when communication costs are low. For this reason,
the transaction costs of protection are more relevant than the
transaction costs of communications to set a transfer rule for privacy
rights.
Moreover, these transaction costs are not equally distributed. They
are astronomical and unpredictable for those that are disadvantaged in
society, who have fewer options and fewer means to protect themselves.
This fact adds a distributional concern to the efficiency concerns of data
property. Because of their lack of options, the people for whom
transaction costs are higher are precisely those that, under property
rules, are the least empowered to improve their situation.
In sum, unlike things that are subject to personal or real property,
personal data have the capacity to affect the data subject’s interest after
transfer. Data property can protect from some wrongful collection, but
not from wrongful use or wrongful sharing, and many of the harms
related to privacy occur at these two stages. This continuity makes
property rules a bad fit for personal information.
199 Amy Kapczynski, The Cost of Price: Why and How to Get Beyond Intellectual Property
Internalism, 59 UCLA L. REV. 970, 1009 (2012) (explaining that the cost of protecting private
information “requires more than relying on formal individual consent”).
542 CARDOZO LAW REVIEW [Vol. 43:2
200 H.B. 2307, 2021 Gen. Assemb., Spec. Sess. (Va. 2021) (to be codified at VA. CODE ANN.
§§ 59.1-571(1)–(2), 591.580(A)) (providing the attorney general the exclusive authority to
enforce).
201 NEV. REV. STAT. ANN. § 603A.360(3) (LexisNexis 2017) (rejecting private rights of action);
COLO. REV. STAT. §§ 6-1-1311(1) (rejecting private rights of action).
202 CAL. CIV. CODE §§ 1798.150, 1798.155 (Deering 2019).
203 They are included in the proposed New York Privacy Act, Massachusetts Information
Privacy Act, and North Carolina Consumer Privacy Act, but not in the Minnesota Consumer
Data Privacy Act or the Ohio Personal Privacy Act. See S.B. 6701, 2021–2022 Leg., Reg. Sess.
§ 1106.6 (N.Y. 2021) (“Any consumer who has been injured by a violation of section eleven
hundred two of this article may bring an action in his or her own name.”); S.B. 46, 192 Leg., Reg.
Sess. (Mass. 2021); S.B. 569, 2021 Gen. Assemb., Reg Sess. (N.C. 2021). H.F. 1492, 92d Leg., Reg.
Sess. (Minn. 2021); H.B. 376, 134th Gen. Assemb., Reg. Sess. (Ohio 2021). Among recently
proposed but now inactive bills (which nonetheless indicate how state congresses have thought
about legislating privacy), they were excluded, for example, from Utah’s Consumer Privacy Act
and the Washington Privacy Act. See S.B. 200, 64th Leg., 2021 Gen. Sess. (Utah 2021); S.B. 5062,
67th Leg., 2021 Reg. Sess. §§ 101(6), 107(2), 107(4) (Wash. 2021).
204 CAMERON F. KERRY, JOHN B. MORRIS, JR., CAITLIN T. CHIN & NICOL E. TURNER LEE,
BRIDGING THE GAPS: A PATH FORWARD TO FEDERAL PRIVACY LEGISLATION, Brookings
Institution Report 19 (June 2020) (“No issue in the privacy debate is as polarized.”).
2021] BEYOND DATA OWNERSHIP 543
205 See Danielle Keats Citron, Mainstreaming Privacy Torts, 98 CALIF. L. REV. 1805, 1815
(2010); Marshall Allen, Health Insurers Are Vacuuming up Details About You—And It Could
Raise Your Rates, PROPUBLICA (July 17, 2018, 5:00 AM), https://www.propublica.org/article/
health-insurers-are-vacuuming-up-details-about-you-and-it-could-raise-your-rates
[https://perma.cc/XG32-AXBM].
206 See Cofone & Robertson, supra note 168, at 1056–58 (arguing that privacy harm and
reputational harm are conceptually distinct but are both protected by privacy rules).
207 Mary Anne Franks, Sexual Harassment 2.0, 71 MD. L. REV. 655, 657–58 (2012); DANIELLE
KEATS CITRON, HATE CRIMES IN CYBERSPACE 5–8 (2014).
208 See Ignacio N. Cofone, Antidiscriminatory Privacy, 72 SMU L. REV. 139 (2019) (arguing
that privacy rules can be used to prevent discrimination); see also Fair Hous. Council v.
Roommates.com, LLC, 521 F.3d 1157 (9th Cir. 2008).
209 See Ian Ayres & Eric Talley, Solomonic Bargaining: Dividing a Legal Entitlement to
Facilitate Coasean Trade, 104 YALE L.J. 1027, 1036–72 (1995).
210 Litman, supra note 110.
211 Calabresi & Melamed, supra note 8, at 1110.
212 See Kapczynski, supra note 199, at 1009 (explaining that the cost of protecting private
information “requires more than relying on formal individual consent”).
544 CARDOZO LAW REVIEW [Vol. 43:2
transfer rule best protects privacy rights in each context are the
transaction costs of self-protection and obtaining agreement on the
transfer and the price, not the costs of surveillance or communications.
In other words, even if the information and power asymmetries did not
exist, the costs of bargaining over personal data would be too high
because people would have to bargain with countless parties. Coupling
both problems makes bargaining and control over personal information
impossible.
Fixing damages in accordance with the harm caused also addresses
property rules’ problem of under-protecting inferred and re-identified
information.213 Aggregation, as seen above, is a problem for property
rules’ effectiveness: the information that is most relevant is not the
disclosed information that property rules cover but aggregated
information, including the inferred information made possible by such
aggregation, which property rules do not cover. Under data property,
data subjects would receive no compensation for harm produced by
aggregated and inferred information—which is most harm. Liability
rules overcome this problem because they can set compensation equal
to the harm. Conversely, the expected cost of liability rules from the
industry side would be equal to the expected cost of harm rather than
the bargained-for price.
Due to that, moreover, an ex-post compensation would correct the
moral hazard problem by varying compensation according to levels of
care through liability. If data collectors’ cost of processing data was not
fixed ex-ante by what data subjects agreed to, but rather ex-post by the
harm produced to them, the externalities introduced by moral hazard
would be internalized because companies would have to take risk into
account to minimize their own liability. In other words, companies
would have better incentives not to overprocess data and to invest in
reasonable security measures because harming data subjects would
become expensive.214 Liability rules correct moral hazard in an
orthodox way: deterrence.215
213 See generally Ian Ayres & Eric Talley, Distinguishing Between Consensual and
Nonconsensual Advantages of Liability Rules, 105 YALE L.J. 235, 236 n.3 (1995) (stating that,
under liability rules, “even if damages are set imprecisely, liability rules can induce beneficial
nonconsensual taking”).
214 Contracting insurance against data breaches would, in turn, reduce the variability of the
cost of harm for companies. Because insurers are in a better position to estimate risk than the
average data subject, this would lead to a more accurate ex-ante premium than property rules
would in the form of a price. Note, however, that the insurance market is often used as an example
of a moral hazard problem.
215 See Robert H. Sitkoff, The Economic Structure of Fiduciary Law, 91 B.U. L. REV. 1039,
1042–45 (2011) (“The agent is induced to act in the best interests of the principal by the threat of
after-the-fact liability for failure to have done so.”); Frank H. Easterbrook & Daniel R. Fischel,
2021] BEYOND DATA OWNERSHIP 545
Corporate Control Transactions, 91 YALE L.J. 698, 702 (1982) (explaining fiduciary obligations,
liability, and deterrence in corporate law).
216 See Calabresi & Melamed, supra note 8, at 1106 (explaining that risk may be reduced from
a liability theory because a collective determination of value leads to quick and efficient
transactions); see also Soo Jiuan Tan, Strategies for Reducing Consumers’ Risk Aversion in Internet
Shopping, 16 J. CONSUMER MKTG. 163 (1999) (showing in a different context that sellers’ risk-
reducing strategies are welfare increasing for both parties).
217 See supra Section III.C.
218 For example, if the probability of harm was estimated to be 10% without the FACTA
breach, but is estimated to be 20% with the FACTA breach, and the harm if it happens would be
$1,000, the expected harm increase would be $100.
219 KENNETH J. ARROW, The Theory of Risk Aversion, in ESSAYS IN THE THEORY OF RISK-
BEARING 90, 90 (1971); John W. Pratt, Risk Aversion in the Small and in the Large, 32
ECONOMETRICA 122 (1964); Giora Hanoch, Risk Aversion and Consumer Preferences, 45
ECONOMETRICA 413 (1977).
220 See, e.g., Seung Hwan Kim & Framarz Byramjee, Effects of Risks on Online Consumers’
Purchasing Behavior: Are They Risk-Averse or Risk-Taking?, 30 J. APPLIED BUS. RSCH. 161 (2013).
546 CARDOZO LAW REVIEW [Vol. 43:2
3. Objections to Liability
221 SHAVELL, supra note 195 at 186–205 (“In contrast to risk-neutral parties, risk-averse
parties care not only about the expected value of losses, but also about the possible magnitude of
losses.”).
222 This conclusion would stand even with some level of overcompensation due to judicial
error, as long as the overcompensation is, in expectation, lower than the amount needed to cover
risk averseness.
223 See supra Parts III & IV.
224 Bernard Chao, Privacy Losses as Wrongful Gain, 106 IOWA L. REV. 555, 557 (2021)
(referring to privacy harm as “by far the thorniest obstacle” to implementing liability rules);
Danielle Citron & Daniel Solove, Privacy Harms, 102 B.U. L. REV. (forthcoming 2022)
(manuscript at 29) (on file with SSRN) (stating that “[u]nder the current U.S. approach to
litigation, harm plays a central gatekeeping role in many instances, and failing to recognize
privacy harm shuts down important cases and prevents many privacy statutes from being
effectively enforced”); Lauren Henry Scholz, Privacy Remedies, 94 IND. L.J. 653, 656 (2019)
2021] BEYOND DATA OWNERSHIP 547
(“Courts worry that recognizing the privacy right in the absence of a clearly defined concrete
harm may lead to unpredictable, excessive damages based on plaintiffs’ subjective perceptions.”).
225 See, e.g., Brief of the Chamber of Commerce of the United States of America, et al. as Amici
Curiae in Support of Petitioner at 6–7, Spokeo, Inc. v. Robins, 578 U.S. 330 (2016) (No. 13-1339).
226 See, e.g., Spokeo, Inc. v. Robins, 578 U.S. 330 (2016).
227 See Editorial Board, The Unfinished Business of the Equifax Hack, BLOOMBERG (Jan. 29,
2019, 8:30 AM), https://www.bloomberg.com/opinion/articles/2019-01-29/equifax-hack-
remains-unfinished-business [https://perma.cc/R4FW-6AAJ].
228 See Ignacio Cofone, Privacy Standing, U. ILL. L. REV. (forthcoming 2022).
229 Cofone & Robertson, supra note 168, at 1049–58 (presenting a model of privacy harm);
Solove & Citron, supra note 153, at 774, 777–85 (presenting an approach for assessing risk and
anxiety harms).
230 Clapper v. Amnesty Int’l USA, 568 U.S. 398, 401–09 (2013); see also Bradford C. Mank,
Clapper v. Amnesty International: Two or Three Competing Philosophies of Standing Law?, 81
TENN. L. REV. 211, 213, 255–56 (2014) (demonstrating that “[t]here has been considerable debate
548 CARDOZO LAW REVIEW [Vol. 43:2
criticism. Thomas Haley, for example, has argued that federal standing
analysis in privacy cases harms both public policy and standing
doctrine.231 As Ari Waldman argues: “We live in a legal environment in
which privacy rights mobilization is already difficult; managerial
privacy compliance exacerbates the problem. Standing requirements
and other hurdles hamper privacy plaintiffs’ use of tort law, contract
law, and federal privacy statutes to vindicate their privacy rights.”232 In
an ideal world, the moral hazard problem and the consequent centrality
of liability for privacy protection should lead federal courts to revise and
expand standing doctrine for privacy harms.
In the meantime, state courts have enormous power to hold
corporations accountable for harm. Some of the most consequential
privacy cases have come from state courts. For instance, in Rosenbach
v. Six Flags, the Illinois Supreme Court ruled that an individual need
not allege an injury beyond violation of her rights under the Illinois
Biometric Information Privacy Act to be considered an “aggrieved”
individual.233 The role of state courts in privacy will continue to grow as
state privacy statutes introduced across the country become law.
Privacy liability could function adequately while depending entirely on
state courts.
about the extent to which Congress may enlarge the definition of concrete injury under Article
III” and the extent to which the separation of powers limits congressional authority to grant
universal standing rights to plaintiffs who lack a concrete injury); Ass’n of Data Processing Serv.
Orgs., Inc. v. Camp, 397 U.S. 150, 153 (1970) (landmark case separating the invasion of a legal
interest from an injury-in-fact).
231 Thomas D. Haley, Data Protection in Disarray, 95 WASH. L. REV. 1193 (2020); see also
Cofone, supra note 228; Citron & Solove, supra note 224.
232 Ari Ezra Waldman, Privacy Law’s False Promise, 97 WASH. U. L. REV. 773, 812 (2020).
233 Rosenbach v. Six Flags Ent. Corp., 129 N.E.3d 1197 (Ill. 2019).
2021] BEYOND DATA OWNERSHIP 549
234 Solove & Citron, supra note 153, at 739–41 (“In the past two decades, plaintiffs in hundreds
of cases have sought redress for data breaches caused by inadequate data security.”); William
McGeveran, The Duty of Data Security, 103 MINN. L. REV. 1135 (2019) (describing the process
by which “reasonable security practices” developed).
235 Sasha Romanosky, David Hoffman & Alessandro Acquisti, Empirical Analysis of Data
Breach Litigation, 11 J. EMPIRICAL LEGAL STUD. 74 (2014) (examining empirical data on data
breach litigation to determine what types of data breaches are litigated more often and which are
more likely to settle).
236 McGeveran, supra note 234, at 1195–99 (explaining how data security benefits from
flexible standards).
237 See Citron, supra note 205, at 1828–52 (proposing how to expand the privacy tort and
complement it with other torts to cover new ground); Bambauer, supra note 114, at 256–57
(discussing intrusion liability rules); see also Neil M. Richards & Daniel J. Solove, Privacy’s Other
Path: Recovering the Law of Confidentiality, 96 GEO. L.J. 123, 145–56 (2007) (explaining the
evolution of common law privacy). But see Neil M. Richards, The Limits of Tort Privacy, 9 J.
TELECOMMS. & HIGH TECH. L. 357, 382–84 (2011) (arguing that the tort of privacy as developed
by Warren, Brandeis, and Prosser is ill-equipped to address digital harms to privacy and
reputation).
238 Bambauer, supra note 114, at 209–10, 238 (arguing that intrusion upon seclusion targets
privacy concerns and that enforcement of seclusion can expand significantly).
239 Toxic Substances Control Act, 15 U.S.C. § 2641 (1986); Federal Water Pollution Control
Act, 33 U.S.C. § 1319.
550 CARDOZO LAW REVIEW [Vol. 43:2
240 See, e.g., Motor Vehicles and Traffic Act, GA. CODE ANN. § 40-8-20 (West 1982); N.Y. VEH.
& TRAF. LAW § 375(2)(a) (McKinney 2021); WASH. REV. CODE ANN. § 46.37.040 (West 1977).
241 Michael S. Greve, The Private Enforcement of Environmental Law, 65 TUL. L. REV. 339
(1990) (explaining how Congress partially relies on private enforcement for public
environmental law objectives); Kai Hüschelrath & Sebastian Peyer, Public and Private
Enforcement of Competition Law: A Differentiated Approach, 36 WORLD COMPETITION 585
(2013) (explaining mixed public and private enforcement in antitrust law).
242 See, e.g., CAL. CIV. CODE §§ 1798.150–17.98.155 (Deering 2019); H.B. 2307, 2021 Gen.
Assemb., Spec. Sess. (Va. 2021) (to be codified at VA. CODE ANN. §§ 59.1-579–59.1-580); COLO.
REV. STAT. §§ 6-1-1310–6-1-1312 (2021); NEV. REV. STAT. ANN. § 603A.360(3) (LexisNexis
2017); S.B. 6701, 2021–2022 Leg., Reg. Sess. (N.Y. 2021); H.B. 1602, 58th Leg., 1st Reg. Sess. § 26
(Okla. 2021); S.B. 200, 64th Leg., 2021 Gen. Sess. § 13.58.401–13.58.404 (Utah 2021); H.B. 408,
2021 Reg. Sess. § 6 (Ky. 2021); H.F. 36, 92d Sess. § 6 (Minn. 2020). Some formerly proposed bills
even actively preempt privacy torts. See, e.g., H.B. 216, 2021 Reg. Sess. §§ 11(a)(1), (4), 17 (Ala.
2021); S.B. 5062, 67th Leg., 2021 Reg. Sess., § 114 (Wash. 2021).
2021] BEYOND DATA OWNERSHIP 551
243 See Chris Jay Hoofnagle, Internalizing Identity Theft, 13 UCLA J.L. & TECH. 1, 33 (2009)
(explaining that “database providers have ultimate control over use of personal information and
protections that are in place”).
244 Frank H. Easterbrook & Daniel R. Fischel, Limited Liability and the Corporation, 52 U.
CHI. L. REV. 89, 102 (1985) (explaining the desirability of placing liability on the most efficient
risk bearer).
245 SHAVELL, supra note 195, at 5–46 (introducing the theory of liability and deterrence in
accident law).
246 Steven Shavell, Strict Liability Versus Negligence, 9 J. LEGAL STUD. 1 (1980).
247 SHAVELL, supra note 195, at 73–104 (exploring factors bearing on the determination of
negligence).
248 Id.
249 Shavell, supra note 246.
250 Richard A. Epstein, A Theory of Strict Liability, 2 J. LEGAL STUD. 151 (1973).
552 CARDOZO LAW REVIEW [Vol. 43:2
are under any other liability regime, in which only under certain
circumstances will they be held responsible for the harm.
Such incentive-setting is relevant for resolving moral hazard. As
explained in the context of product liability:
[I]f manufacturers have more control over the safety of their
products than customers [do], the insurance [that] the consumers
provide to manufacturers (in the form of limited liability for
products’ accidents) would present a greater moral hazard than
would the insurance that manufacturers provide to consumers (in
the form of liability for those accidents).251
In technical terms, privacy harm is produced in unilateral
accidents.252 After data are disclosed, data leave the data subjects’ sphere
of control, thereby also rendering them unable to control the
probability of harm.253 The protection mechanisms that data subjects
can use after data are disclosed have a negligible influence on the
probability of data harms compared to the security measures that data
processors can implement.254
In addition, both the level of care and the activity levels of
corporations are relevant for the probability of data harm
materializing.255 The types of processing and level of database security
(care level), as well as the amount of processing and number of data
transfers (activity levels), affect the probability of data subjects being
harmed.256
This is important for the choice of liability rule. The application of
a negligence standard to liability for data breach notifications,257 and for
data security generally,258 has been attacked on the basis that the correct
level of due care may be uncertain, leading databases to overinvest in
care. An ambiguous negligence standard would indeed introduce costly
Privacy lawsuits are not new.262 In the past, privacy problems were
addressed through tort law: people sued when someone opened their
letters, went through their financial papers, or disclosed harmful secrets
to others.263
In most of statutory privacy law, however, it does not matter
whether a victim was harmed, but whether a company behaved in a way
259 Note, however, that an ambiguous negligence standard would lead potential tortfeasors to
overinvest in care only up to the investment level they would have under a strict liability rule—
which would be a desirable level of care for unilateral accidents because it would fully internalize
the externalities. See Hoofnagle, supra note 243, at 32–35 (suggesting strict liability for identity
theft).
260 Citron, supra note 258, at 266.
261 See Ayres & Talley, supra note 213; Louis Kaplow & Steven Shavell, Do Liability Rules
Facilitate Bargaining? A Reply to Ayres and Talley, 105 YALE L.J. 221 (1995); Ian Ayres & J.M.
Balkin, Legal Entitlements as Auctions: Property Rules, Liability Rules, and Beyond, 106 YALE L.J.
703, 717–33 (1996) (describing the nonconsensual advantage of second-order liability rules); Ian
Ayres & Paul M. Goldbart, Correlated Values in the Theory of Property and Liability Rules, 32 J.
LEGAL STUD. 121 (2003) (arguing that liability rules cannot harness private information both
when the disputants’ valuations are correlated and when they are not).
262 See Solove Citron, supra note 153, at 781 (“Private lawsuits serve a function that these other
tools lack. Such lawsuits allow individuals to have a say about which cases are brought. These
lawsuits bring out facts and information about blameworthy security practices by organizations.
They provide redress to victims, and they act as a deterrent.”).
263 Neil M. Richards & Daniel J. Solove, Prosser’s Privacy Law: A Mixed Legacy, 98 CALIF. L.
REV. 1887 (2010).
554 CARDOZO LAW REVIEW [Vol. 43:2
264 See Janet Walker, Douez v Facebook and Privacy Class Actions, in CLASS ACTIONS IN
PRIVACY LAW 56, 68–69 (Ignacio N. Cofone ed., 2020) (discussing statutory privacy in Canada);
see, e.g., NEV. REV. STAT. ANN. § 603A.360(3) (LexisNexis 2017) (rejecting private rights of
action); COLO. REV. STAT. § 6-1-1311 (2021) (rejecting private rights of action).
265 See Omri Ben-Shahar, Data Pollution, 11 J. LEGAL ANALYSIS 104, 105 (2019).
266 Christine S. Wilson, Comm’r, Fed. Trade Comm’n, A Defining Moment for Privacy: The
Time Is Ripe for Federal Privacy Legislation 2–5 (Feb. 6, 2020), https://www.ftc.gov/system/files/
documents/public_statements/1566337/commissioner_wilson_privacy_forum_speech_02-06-
2020.pdf [https://perma.cc/YQ6J-M4L7].
267 H.B. 2307, 2021 Gen. Assemb., Spec. Sess. (Va. 2021) (to be codified at VA. CODE ANN.
§§ 59.1-571(1)–(2), 59.1-580(A)); NEV. REV. STAT. ANN. § 603A.360(3) (LexisNexis 2017); COLO.
REV. STAT. § 6-1-1311 (2021).
268 See KERRY, MORRIS, JR., CHIN & TURNER LEE, supra note 201, at 20 (referring to joint
public and private enforcement as “force multipliers”); Walker, supra note 264.
269 See, e.g., Hancock v. Urban Outfitters, Inc., 830 F.3d 511 (D.C. Cir. 2016).
270 740 ILL. COMP. STAT. 14/20.
271 Rosenbach v. Six Flags Ent. Corp., 129 N.E.3d 1197 (Ill. 2019).
2021] BEYOND DATA OWNERSHIP 555
272 Mutnick v. Clearview AI, Inc., No. 20 C 512, 2020 U.S. Dist. LEXIS 109864 (N.D. Ill. May
19, 2020) (refusing to dismiss the class action).
273 CAL. CIV. CODE §§ 1798.150, 1798.155(a)–(b) (Deering 2021).
274 Anupam Chander, Margot E. Kaminski & William McGeveran, Catalyzing Privacy Law,
105 MINN. L. REV. 1733, 1759 (2021).
275 Enforcement of PIPEDA, OFF. OF THE PRIV. COMM’R OF CAN. (Apr. 20, 2017),
https://www.priv.gc.ca/biens-assets/compliance-framework/en/index [https://perma.cc/2YZC-
JRBB].
276 Gabriela Zanfir-Fortuna, Article 82. Right to Compensation and Liability, in THE EU
GENERAL DATA PROTECTION REGULATION (GDPR): A COMMENTARY (Christopher Kuner, Lee
A. Bygrave, Christopher Docksey & Laura Drechsler eds., 2020); see also GDPR supra note 53, at
art. 82(1).
277 Eoin O’Dell, Compensation for Non-Material Damage Pursuant to Article 82 GDPR,
CEARTA.IE (Mar. 6, 2020), http://www.cearta.ie/2020/03/compensation-for-non-material-
damage-pursuant-to-article-82-gdpr/ [https://perma.cc/M32W-WCEY].
278 Eoin O’Dell, Compensation for Breach of the General Data Protection Regulation, 40
DUBLIN U. L.J. 97, 113–15, 147 (2017).
556 CARDOZO LAW REVIEW [Vol. 43:2
279 Id. at 115, 122 (adding that the fact that this is a state-by-state approach means that private
enforcement will be uneven unless cases reach the CJEU).
280 Note that these cases have also relied on art. 6:106 of the Dutch Civil Code. See, e.g.,
Overijssel D. Crt. (Rechtbank Overijssel), ECLI 2019 1827 (NL),
https://uitspraken.rechtspraak.nl/inziendocument?id=ECLI:NL:RBOVE:2019:1827; Amsterdam
D. Crt. (Rechtbank Amsterdam), ECLI 2019 6490 (NL), https://uitspraken.rechtspraak.nl/
inziendocument?id=ECLI:NL:RBAMS:2019:6490; North Holland D. Crt. (Rechtbank Noord-
Nederland), ECLI 2020 247 (NL), https://uitspraken.rechtspraak.nl/
inziendocument?id=ECLI:NL:RBNNE:2020:247.
281 See Jan Spittka, Germany: First Court Decision on Claims for Immaterial Damages Under
GDPR, DLA PIPER: PRIVACY MATTERS (Dec. 12, 2018), https://blogs.dlapiper.com/
privacymatters/germany-first-court-decision-on-claims-for-immaterial-damages-under-gdpr
[https://perma.cc/9GXE-GDDZ]. However, other courts have disagreed. For example, German
courts in 2018 and 2019 stated that a GDPR violation without material damage does not give rise
to an Article 82 claim. See Local Court (Amtbsgericht) Diez, 2018 8 C 130/18 (DE),
https://openjur.de/u/2116788.html; Karlsruhe Regional Crt. (Landgericht), 2019 8 O 26/19 (DE),
https://dejure.org/dienste/vernetzung/rechtsprechung?Gericht=LG%20Karlsruhe&Datum=
02.08.2019&Aktenzeichen=8%20O%2026%2F19.
282 Innsbruck Higher Regional Crt. (Oberlandesgericht), 2020 1 R 182/19b (AT), at
https://www.dataprotect.at/2020/03/06/post-schadenersatz. Note that the Higher Regional Court
of Innsbruck reversed the judgment but not due to a disagreement in law about non-material
damages but rather about the standard that should be applied for them.
283 See Lloyd v. Google LLC, EWCA Civ. 1599 (2019) (holding that plaintiffs may recover
damages for loss of control without proving pecuniary loss); see also Priv. & Elec. Commc’n Regs.
2003 SI 2003 No. 2426, art. 22; Brendan Van Alsenoy, Liability Under EU Data Protection Law:
From Directive 95/46 to the General Data Protection Regulation, 7 J. INTELL. PROP. INFO. TECH.
& E-COM. L. 271 (2016).
2021] BEYOND DATA OWNERSHIP 557
where compliance with the regulation is due care that exempts from
liability.
For liability to be most effective, private rights of action must be
based on harm, not based on regulatory breach. This is so because of
the moral hazard problem explained above. Creating a private right of
action for breach of the regulation doubles down on consent and
control, simply adding private enforcement. Doing so may be effective
as a means of reducing public resources needed by the FTC and data
protection authorities abroad, but it does not change the nature of the
rules: companies can still pay attention only to the behaviors mandated
and ignore whether they are producing harm. The only way to solve the
moral hazard problem is to meaningfully enhance the role of liability
rules in statutory privacy. And to enhance the role of liability rules is to
create liability for harm created independent of whether it was a
consequence of regulatory breach.
In other words, private rights of action based on harm will require
companies to internalize externalities. Statutes like the CCPA that
condition private rights of action on breach of regulated conduct and
make them agnostic to harm do this wrongly. To be effective at
protecting consumers, these private rights of action should, instead,
depend on harm.
284 See Thomas E. Kadri & Ignacio N. Cofone, Cy Près Settlements in Privacy Class Actions, in
CLASS ACTIONS IN PRIVACY LAW 99, 99–112 (Ignacio N. Cofone ed., 2020).
285 Ben-Shahar, supra note 265, at 104–08.
286 See generally Hohfeld, supra note 61.
2021] BEYOND DATA OWNERSHIP 559
limits the use of firearms: to use them lawfully, people in those states
must fire them in a shooting range.
One could ask based on this: do principles such as data
minimization and necessity share this characteristic?287 The answer is
yes to the extent that they are mandatory rules. But they have one
relevant difference in that they do not prohibit purposes. These
principles reduce risk in a harm-focused manner but, because they are
ex-ante, they do not address moral hazard like prohibiting purposes or
setting liability rules do. Instead, these principles reduce risk by
reducing companies’ options.
The diluted version that exists in privacy law of that broad,
hypothetical, and robust purpose limitation is the purpose limitation
principle. Although it does not prohibit any particular purposes, the
principle prohibits using personal data for a new purpose or collecting
personal data for undeclared purposes. Because it does not limit
possible purposes but it mandates their specification, it could be more
accurately called purpose specification principle, as some statutes do.288
The law should, at least, maintain and bolster this minimal limitation
on ongoing use.
Incidentally, a reader could ask: if purpose limitation were to be
violated, what would be the remedy? The answer is liability. A
corporation that breaches purpose limitation, depending on the
enforcement system, may have to pay a fine if subject to public
enforcement or monetary damages if subject to a private right of action.
This is where both proposals converge.289
287 H.B. 2307, 2021 Gen. Assemb., Spec. Sess. (Va. 2021) (to be codified at VA. CODE ANN.
§§ 59.1-574(A)(1)–(2), 59.1-580(A)) (requiring a limit on personal data collection to what is
adequate, relevant, and reasonably necessary); COLO. REV. STAT. § 6-1-1308(3) (2021)
(establishing that personal data collection must be adequate, relevant, and limited to what is
reasonably necessary); CAL. CIV. CODE § 1798.100(a)(3) (Deering 2019) (prohibiting the
retention of personal information for longer than reasonably necessary).
288 See, e.g., COLO. REV. STAT. § 6-1-1308(2) (2021).
289 In breaching purpose limitation, liability would be attributed independent of harm. It
would be a liability to take a prohibited use that is risky or likely to cause harm.
290 Jones & Kaminski, supra note 19, at 99, 112.
560 CARDOZO LAW REVIEW [Vol. 43:2
Privacy Act. The CCPA adopts this principle when it requires purposes
“compatible with the context in which the personal information was
collected.”291 It is also included in Virginia’s CDPA when it prohibits
businesses from “process[ing] personal data for purposes that are
neither reasonably necessary to nor compatible with the disclosed
purposes for which such personal data is processed, as disclosed to the
consumer, unless the controller obtains the consumer’s consent”292 and
by the Colorado Privacy Act when it requires controllers to “specify the
express purposes for which personal data are collected and processed,”
and prohibits “purposes that are not reasonably necessary to or
compatible with the specified purposes for which the personal data are
processed.”293 But, far from being an obvious inclusion in states’ privacy
statutes, purpose limitation is not included in Nevada’s PICICA,294 and
proposed state bills have been divided on its inclusion.295
Abroad, purpose limitation is a key provision of the GDPR and of
privacy legislation in countries that have or seek GDPR adequacy
status.296 Purpose limitation is required by the GDPR by articles 5(1)
291 CAL. CIV. CODE §§ 1798.140(d), 1798.120, 1798.121(b) (Deering 2019); CAL. CIV. CODE
§ 1798.100(b); see also CAL. CIV. CODE § 1798.100(a)(1) (amending this section, effective as of
2023); CAL. CIV. CODE § 1798.100(a)(1) (containing the same provision as CCPA § 1798.100(b)),
§ 1798.100(c).
292 H.B. 2307, 2021 Gen. Assemb., Spec. Sess. (Va. 2021) (to be codified at VA. CODE ANN.
§§ 59.1-574(A)(1)–(2), 59.1-580(A)).
293 COLO. REV. STAT. § 6-1-1308(2), (4) (2021).
294 NEV. REV. STAT. ANN. § 603A.360(3) (LexisNexis 2017).
295 The proposed New York Privacy Act, Massachusetts Information Privacy Act, Minnesota
Consumer Data Privacy Act, North Carolina Consumer Privacy Act, and Ohio Personal Privacy
Act all include purpose limitation, while Pennsylvania’s bill does not. See S.B. 6701, 2021–2022
Leg., Reg. Sess. § 1102.1(b)(iii)(B) (N.Y. 2021) (establishing that controllers must notify
consumers of “the purposes for which the categories of personal data is being shared, disclosed,
transferred, or sold to the processor or third party”); id. § 1103.1(b)(iii)(B) (requiring that
controllers delete the consumer’s personal data on request where the data “is either no longer
necessary to provide the services or goods requested by the consumer or for the purposes for
which the consumer’s freely given, specific, informed, and unambiguous opt-in consent is in
effect”); S.B. 46, 192 Leg., Reg. Sess., § 6(b)(3)(ii) (Mass. 2021); H.F. 1492, 92d Leg., Reg. Sess.,
§§ 7(2)(a)–(c), 9(f)(1)–(3) (Minn. 2021); S.B. 569, 2021 Gen. Assemb., Reg Sess., § 75-72(a)(1)–
(2) (N.C. 2021); H.B. 376, 134th Gen. Assemb., Reg. Sess., § 1355.03(E)(1)–(2)(a) (Ohio 2021);
H.B. 1126, 2021 Gen Assemb., Reg. Sess. (Pa. 2021). Among recently proposed but now inactive
bills, the Alabama Consumer Privacy Act, the Utah Consumer Privacy Act, and the Washington
Privacy Act had included it, while the Oklahoma Computer Data Privacy Act, the Kentucky Act
Relating to Consumer Privacy of Personal Information, and the previous Minnesota Consumer
Data Privacy Act did not. See H.B. 216, 2021 Leg., Reg. Sess. (Ala. 2021) (proposed 2021); S.B.
200, 64th Leg., 2021 Gen. Sess. (Utah 2021); S.B. 5062, 67th Leg., 2021 Reg. Sess. §§ 101(6), 107(2),
107(4) (Wash. 2021); H.B. 1602, 58th Leg., 1st Reg. Sess. (Okla. 2021); H.B. 408, 2021 Reg. Sess.
§ 6 (Ky. 2021); H.F. 1492, 92d Leg., Reg. Sess. (Minn. 2021).
296 See generally Merel Elize Koning, The Purpose and Limitations of Purpose Limitation
(2020) (Doctoral Thesis, Radbound University Nijmegen) (on file with Radboud University
Nijmegen).
2021] BEYOND DATA OWNERSHIP 561
304 Investigation into the Personal Information Handling Practices of Ganz Inc., OFF. OF THE
PRIV. COMM’R OF CAN. (Oct. 7, 2014), https://www.priv.gc.ca/en/opc-actions-and-decisions/
investigations/investigations-into-businesses/2014/pipeda-2014-011 [https://perma.cc/ET38-
YQH4].
305 Samuelson, supra note 82, at 1138–39 (using the language of property rights and
identifying free alienation as a problem of property).
306 Schwartz, supra note 38, at 2090.
307 Cohen, supra note 10, at 1375.
308 Peter P. Swire, Markets, Self-regulation, and Government Enforcement in the Protection of
Personal Information, in PRIVACY AND SELF-REGULATION IN THE INFORMATION AGE (1997)
(arguing that if such sales are made illegal, it would not stop the sales from occurring, but merely
cause sales to be more expensive).
309 Cofone, supra note 157, at 543–44 (discussing the “non-collection default rule”).
310 Id. at 545 (“If companies had to ask Internet users for permission each time such
information was traded, transaction costs would be too high.”). Note that, however, if there is
consent for a transaction different than transferring the right, such as a license in copyright, then
consent would have to be reacquired for anything that exceeds what was agreed on, such as the
scope of the license.
2021] BEYOND DATA OWNERSHIP 563
311 Tal Z. Zarsky, Incompatible: The GDPR in the Age of Big Data, 47 SETON HALL L. REV. 995,
1006 (2017); David Basin, Søren Debois & Thomas Hildebrandt, On Purpose and by Necessity:
Compliance Under the GDPR, in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY 20, 23 (Sarah
Meiklejohn & Kazue Sako eds., 2018).
312 Swire, supra note 308 (stressing the importance of keeping overall prices low).
313 Holmström, supra note 183, at 74 (showing that improving on imperfect information can
reduce the moral hazard problem in principal-agent relationships).
314 Nancy A. Lutz, Warranties as Signals Under Consumer Moral Hazard, 20 RAND J. ECON.
239, 240–45 (1989) (presenting a model of warranty provision).
315 Patrick W. Schmitz, Allocating Control in Agency Problems with Limited Liability and
Sequential Hidden Actions, 36 RAND J. ECON. 318, 221–25 (2005) (discussing sequential agency
problems’ optimal organization).
564 CARDOZO LAW REVIEW [Vol. 43:2
316 However, not all tangible property transfers are in fee simple (although most chattel
transfers are). For example, one can grant a limited easement for a neighbor’s passage over part
of one’s land without transferring ownership; one can grant a time or activity-limited license for
entry to one’s land while making anyone who exceeds that license a trespasser; and one can make
a conditional transfer such that the new owner forfeits her rights if she violates the condition.
317 See BJ Ard, More Property Rules than Property? The Right to Exclude in Patent and
Copyright, 68 EMORY L.J. 685, 697–99 (2019) (describing the liability rule features of copyright).
318 See id.
319 See WILLIAM CORNISH, DAVID LLEWELYN & TANYA APLIN, INTELLECTUAL PROPERTY:
PATENTS, COPYRIGHT, TRADEMARKS AND ALLIED RIGHTS 525–30 (8th ed. 2013).
320 See Ard, supra note 317, at 712–14 (arguing that copyright statutory damages awards are
often high enough to function as property rules).
321 Trotter Hardy, Property (and Copyright) in Cyberspace, 1996 U. CHI. LEGAL F. 217, 233.
322 See 17 U.S.C. § 107 (2012); see also Pierre N. Leval, Toward a Fair Use Standard, 103 HARV.
L. REV. 1105, 1110–25 (1990) (discussing fair use’s contours); Glynn S. Lunney, Fair Use and
Market Failure: Sony Revisited, 82 B.U. L. REV. 975, 979–96 (2002) (discussing fair use in the
context of a copyright dispute).
2021] BEYOND DATA OWNERSHIP 565
323 Wendy J. Gordon, Fair Use as Market Failure: A Structural and Economic Analysis of the
Betamax Case and Its Predecessors, 82 COLUM. L. REV. 1600 (1982).
324 In expectation, they do not reduce the expected number of copies sold—they may even
increase sales.
325 In general, fair use finds its scope defined in the uses of the product that do not significantly
affect the economic interests of the owner and, as a doctrine, strives to prevent the stifling of
creation. See Leo J. Raskind, A Functional Interpretation of Fair Use: The Fourteenth Donald C.
Brace Memorial Lecture, 31 J. COPYRIGHT SOC’Y 601 (1983); Richard A. Posner, When Is Parody
Fair Use?, 21 J. LEGAL STUD. 67 (1992).
326 See Christopher M. Newman, A License Is Not a “Contract Not to Sue”: Disentangling
Property and Contract in the Law of Copyright Licenses, 98 IOWA L. REV. 1101 (2013).
327 Id.
328 On the other hand, use restrictions in the form of non-compulsory licenses are compatible
with property-rule protection (e.g., a licensee can only obtain rights barred by the license through
bargaining, a licensee who exceeds the license’s terms is subject to injunctive relief rather than
compensatory damages, and a non-licensee who tries to engage in the licensed activity is also
subject to injunctive relief).
329 Samuelson, supra note 82, at 1140–41; Rochelle Cooper Dreyfuss, Warren and Brandeis
Redux: Finding (More) Privacy Protection in Intellectual Property Lore, 1999 STAN. TECH. L. REV.
5, 8; see also Ritter & Mayer, supra note 45, at 222 (proposing property rights while
acknowledging that “these enormous data sets have nothing to do with the creative artistic assets
that copyright laws serve to protect”).
566 CARDOZO LAW REVIEW [Vol. 43:2
330 Samuelson, supra note 82, at 1155–56 (“Trade secrecy law has a number of default rules
that might be useful for information privacy protection. The general rule of trade secrecy
licensing law is that if the licensor has provided data to another for a particular purpose, the data
cannot be used for other purposes without obtaining permission for the new uses. . . . One of the
most significant advantages of the licensing regime is that it avoids the problems of a property
rights approach . . . .”).
331 GDPR, supra 53, at art. 7(4), Recital 32, 43; ARTICLE 29 WORKING PARTY, GUIDELINES ON
CONSENT UNDER REGULATION 2016/679, at 5–7 (2018).
332 See Nikolaus Forgó, Stefanie Hänold & Benjamin Schütze, The Principle of Purpose
Limitation and Big Data, in NEW TECHNOLOGY, BIG DATA AND THE LAW 17, 17 (Marcelo
Corrales, Mark Fenwick & Nikolaus Forgó eds., 2017).
2021] BEYOND DATA OWNERSHIP 567
1. Purpose Specificity
333 Joseph A. Cannataci & Jeanne Pia Mifsud Bonnici, The End of the Purpose-Specification
Principle in Data Protection?, 24 INT’L REV. L. COMPUTS. & TECH. 101, 102 (2010) (“[W]atering
down ‘purpose’ . . . is an indication that the bigger picture (or human dignity and lex
personalitatis) is being ignored or worse eroded.”).
334 Article 29 Data Protection Working Party, Opinion 03/2013 on Purpose Limitation,
EUROPEAN COMM’N (Apr. 2, 2013), https://ec.europa.eu/justice/article-29/documentation/
opinion-recommendation/files/2013/wp203_en.pdf [https://perma.cc/4PYP-RW86]; Chris Jay
Hoofnagle, Bart van der Sloot & Frederik Zuiderveen Borgesius, The European Union General
Data Protection Regulation: What It Is and What It Means, 28 INFO. & COMMC’NS TECH. L. 65,
77 (2019) (discussing the purpose limitation principle).
335 Hoofnagle, van der Sloot & Borgesius, supra note 334, at 77 (“A specific purpose exists, for
example, when a pizza delivery service asks for the consumer’s address, to deliver the pizza.”).
336 See, e.g., Personal Information Protection and Electronic Documents Act, S.C. 2000, c 5,
§ 4.2.2 (Can.).
568 CARDOZO LAW REVIEW [Vol. 43:2
2. Clear Standard
337 See, e.g., Use of Personal Information Collected by Global Positioning System Considered,
OFF. OF THE PRIV. COMM’R OF CAN. (Nov. 30, 2006), https://www.priv.gc.ca/en/opc-actions-and-
decisions/investigations/investigations-into-businesses/2006/pipeda-2006-351 [https://
perma.cc/XD3L-9KB8] (finding acceptable the purpose of “managing workforce productivity”).
See generally MAXIMILIAN VON GRAFENSTEIN, THE PRINCIPLE OF PURPOSE LIMITATION IN DATA
PROTECTION LAWS (2018).
338 CCPA 1798.100(b); CAL. CIV. CODE §§ 1798.100(a)(1) (containing the same provision as
CCPA 1798.100(b)), 17.98.100(c) (Deering 2019); COLO. REV. STAT. § 6-1-1308(2), (4); H.B.
2307, 2021 Gen. Assemb., Spec. Sess. (Va. 2021) (to be codified at VA. CODE ANN. § 59.1-
574(A)(1)–(2)).
339 Rauhofer, supra note 299, at 146–47 (discussing different interpretations of purpose
limitation’s compatibility rule).
2021] BEYOND DATA OWNERSHIP 569
340 See Neil Richards & Woodrow Hartzog, A Duty of Loyalty for Privacy Law, OXFORD BUS.
L. BLOG (Oct. 28, 2020), https://www.law.ox.ac.uk/business-law-blog/blog/2020/10/duty-loyalty-
privacy-law [https://perma.cc/GA7B-UBC3] (developing an ex-post accountability mechanism
consisting of a heightened reasonable person standard through a duty of loyalty).
341 See Clark C. Havighurst, Altering the Applicable Standard of Care, 49 L. & CONTEMP.
PROBS. 265, 266 (1986) (“The impossibility of precisely articulating in advance the performance
required of a health care provider under all possible circumstances explains why professional
custom has been widely used as a benchmark for evaluating a professional’s work. Indeed, if there
is to be accountability at all, any specification of the obligation of true professionals to their clients
must at some point have reference to what other professionals would do under the same
circumstances.”); Jane P. Mallor, Liability Without Fault for Professional Services: Toward a New
Standard of Professional Accountability, 9 SETON HALL L. REV, 474, 477–79 (1978) (discussing
the policy principles relating to standards in professional responsibility).
342 See, e.g., GDPR, supra note 53, at Recital 50 (stating that people’s “reasonable expectations”
will be considered); see also S.B. 6701, 2021–2022 Leg., Reg. Sess. § 1102 (N.Y. 2021).
343 See Hoofnagle, Van der Sloot & Borgesius, supra note 334, at 77 (“[T]o assess whether a
new purpose is compatible with the original purpose, the controller should consider, for instance,
the link between the original and new purposes, the context, the data subject’s reasonable
expectations, the data’s nature and sensitivity, the consequences of the intended further
processing for data subjects.”); see also GDPR, supra note 53, at art. 5(1)(a), Recital 39.
570 CARDOZO LAW REVIEW [Vol. 43:2
3. Prohibited Purposes
344 Laying Down Harmonised Rules on Artificial Intelligence (Artificial Intelligence Act) and
Amending Certain Union Legislative Acts, COM (2021) 206 final, https://eur-lex.europa.eu/
legal-content/EN/TXT/?qid=1623335154975&uri=CELEX%3A52021PC0206 [https://perma.cc/
T89Q-98E8].
345 Id., tit. II, art. 5.
346 Id., art. 5(b).
2021] BEYOND DATA OWNERSHIP 571
CONCLUSION
348 See, e.g., COLO. REV. STAT. § 6-1-1308(5) (establishing the duty to take reasonable
measures to secure personal data from unauthorized acquisition during storage and use); H.B.
2307, 2021 Gen. Assemb., Spec. Sess. (Va. 2021) (to be codified at VA. CODE ANN. § 59.1-
574(A)(3)) (including the obligation to establish, implement, and maintain reasonable data
security practices); CAL. CIV. CODE § 1798.100(e) (Deering 2019) (establishing the obligation of
reasonable security procedures and practices).