The Right to Own Your Self

Privacy Co-op Media Staff
8 min readJan 28, 2021

Rights Equivalent to Ownership

No one can own data

As a consumer, you are engaging scores of services every day. As a result, companies learn all kinds of things about you. In most of these cases, companies exploit the things they learn for huge profits.

Are you OK with that?

Here’s a crazy secret that we hope you can’t keep…companies don’t own your data. Feel better? Well before you start your happy dance, the scarier truth is…you don’t own it either.

Why? It was never your data to begin with.

Now, before you immediately jump to the end of this article and flame it with troll-ish torrents, consider this…

Everyone thinks they can own data. It’s elusive to define or prove in the courts. It’s been argued that you cannot own data any more than you can own water. Ask yourself this simple question, “what would data ownership look like?” Would you own all the altered magnetization bits on the film of hard drives where your medical records are stored across data centers leased by a medical provider? Would you own the electrons buzzing through wires or light impulses coursing through fiber as data is transmitted around the world?

How would you go about gathering all that up to lock it away until a court date to prove it was yours? How would you carry it into a court and allege someone stole it from you?

The maddening truth is that data is not only intangible, in most cases it’s unintelligible. Even if you could hold it in your hand (which you can’t), you’d likely not be able to literally understand what it is.

If we stopped there, this story could be grim. So, let’s change the focus and find a handle we can all grasp.

A Handle to the Intangible

There have been in the past similar problems… how can you own a story told, or an idea imagined, or even a song sung? Today, these cases are immediately understood to be situations of license, or the rights to claim something intangible as yours. An artist can’t really own the song, itself, as it’s being heard because they can’t hold a song. And before you say, “they could hold a record!” remember that few songs are on vinyl anymore, and you wouldn’t want to say you owned the vinyl in the first place…it’s cheap plastic and all songs would end up having the same value as their plastic. The worst part would be — when someone bought they vinyl, could it be argued that they then own the song?

That would be nuts — but it’s the slope you start down when you attempt to objectify the song.

The better approach was to determine that the artist owned the rights to a song. That way it really doesn’t matter what medium is used for its distribution and enjoyment, the artist still owns the rights to it. Could you imagine if they had rather argued they owned the objectified song, itself? The first person that stole the vinyl and printed cheaper copies in a foreign country would immediately dilute the song’s value for the artist. Lucky for us, and the artist, since it’s the rights that are owned, a foreign pirate can still be held accountable for violating those rights and hopefully brought to justice to account for each instance of violation, all the while the overall ownership value to the rights remains intact.

Rights equivalent to ownership both maintain a concentrated value and provide a tangible handle of ownership for the intangible product.

Rights Equivalent to Ownership

As a definition for a highly optimized approach to ownership and information for commercial purposes, we will demonstrate that customers can have ownership, and by the same rules, so can companies.

1. Data is the intangible, most basic of abstracts (0s & 1s), generated when an actor engages a service.[i]

2. When a person observes data and perceives value in meaning, it then becomes information.[ii]

3. When information is generated, related rights owned by the actor are concomitantly generated.[iii]

4. Created data representing a creation of the mind, like the characters that form the body of an email written by the actor, is instantly also completely information.[iv]

5. Produced data that is not a creation of the mind, but rather is a generated byproduct of the actor’s actions, like data about an email, is data that may also yield some information when observed.

6. Newly created information can, without conflict resulting in potentially shared or lost ownership, draw upon older protected information when the new information adheres to fair use, or is otherwise sufficiently modified,”[v] such as an inspired conclusion within an email.

7. A set of tools and rules can be applied to a service bringing clarity to the ability to use produced information and the management of the pertaining rights — such as a clause in a privacy policy that spells out a secondary use of information for some additional value to the service provider.

8. Based upon applicable law, regulations, and tools and rules, viability and any resulting retention policy for information can be fleeting or long-lived.[vi]

9. Rights equivalent to ownership, such as information rights which can be owned as a claim for intangible things such as intellectual property over musical, literary or scientific creations of the mind, may better apply to information than Ownership which is the legal right to the possession of a tangible thing or claim. You can own rights, and rights can apply to information.[vii]

The highly optimized approach to ownership in relation to information might best be described…

Example: the derivatives generated from A.I. and Machine Learning run on original state data or derivatives therefrom are not necessarily or even generally going to be subject to the same rules for, and rights equivalent to ownership of, the original state data.

In this case, the viability of the information rights owned by a company would not be subject to the viability and potential durability of the information rights owned by their customers as different law, regulations and tools and rules would apply. As part of customer viability, inherent control would require methods for 1) deletion, 2) disassociation, or 3) otherwise sufficient modification to the point that it is not recognizable as a “substantial part” of the original. There will be many uses for such an ability to effectively wipe[viii] information in a smart way including heritage (post-probate death of the customer, etc.), and the “right to be forgotten.”

Where does that leave me?

OK, that all got a bit technical and legal, right? Here’s the plain truth we can all take away from it…

All those companies that are making boatloads of cash by exploiting the things they learn about you while you use their services don’t own the data. However, you do own the rights to that data. Even though they may have already sold personal insights about you, that doesn’t mean they got away with it free and clear. If you were to find a group of people like you, collectively the group could demand that 1) those businesses stop exploiting your information, and 2) that they then pay you your fair share going forward.

That’s the power a class of people have when they own the rights to something.

How do I get started?

The Privacy Co-op.com is a great place to start! We not only understand all these things, we have built an easy-to-use interface and agreement to support folks just like you. You can make companies stop by becoming a Participant for free, and you can make them pay by becoming a Member for a one-time $25 membership fee.

Learn more at PrivacyCo-op.com!

[i] In Retail Systems, Inc. v CNA Insurance Cos., 469 NW2d 735 (Minn App 1991), a customer’s computer tape mysteriously disappeared while in the insured’s custody. After finding the phrase “tangible property” to be ambiguous in the case of computer data, the court observed that the data recorded on the tape was merged with the tape itself. Thus, when the entire tape was lost along with its embedded data, there had been a loss of tangible property. However, the Retail Systems case did not actually answer the question of whether data itself, apart from the medium in which it is stored, is “tangible property.”

[ii] The Mathematical Theory of Communication — Claude Shannon, Bell Labs, 1947. According to the theory, transmission of the message involved sending information through electronic signals, the smallest measure of which was called bits (binary digits). According to Shannon and Weaver, not all bits were information, but rather information is defined as “a measure of one’s freedom of choice when one selects a message” from the bits.

[iii] Patent, trademark, and copyright law, notwithstanding trade secret law nor privacy law which may rely on established rights, constitute the bases on which the underlying intellectual property may be protected in law. Typically these types of law grant rights equivalent to ownership to the creator, unless otherwise specified.

[iv] Copyrights are generally owned by the people who create the works of expression, with some important exceptions. Such as works for hire, employment, or sold. Copyright law, Section 201(a) — “vests initially in the author or authors of the work”.

[v] Assuming that the use of the Original State Data does not violate privacy law, then non-conflicting use is a matter of quality not quantity — VMG vs Madonna found that a single horn stab copied from Funkadelic, a two second sample — had been modified to the point that it was not recognizable as a “substantial part” of the original and therefore not plagiarism or other such misappropriation.

[vi] Duration of the terms that permit various uses are clarified by law, regulations, and programs.

[vii] Ownership is the legal right to the possession of a thing; the complete dominion, title, or proprietary right in a thing or claim. Claim refers to the assertion of a fact, or set of facts, that establishes a legal right to some form of compensation or remedy which is enforceable in court. Claim can also refer generally to a belief in, assertion to or demand to some right in property, money or remedy.

[viii] For smart wipe, all information would need to be grouped into A) required for a finite amount of time to facilitate functionality, B) may be deleted immediately, C) may be disassociated, and D) may be modified/transformed. Some of the information listed in one of these groups may need to move to another group in certain cases. For example, a web history record not subject to a legal hold, may be immediately deleted in the case of either death post-probate or right to be forgotten, while a login credential may only be deleted in the case of death post-probate but would need to be kept for the case of right to be forgotten. Some data may require disassociation, like location data required for billing, and yet not required for relevant advertising in the case of right to be forgotten.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Privacy Co-op Media Staff
Privacy Co-op Media Staff

Written by Privacy Co-op Media Staff

htts://Privacy.coop You own the rights to your information and businesses desire your direction. Learn about your choices, direct them in less than 3 minutes.

No responses yet

Write a response