DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Last call! Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

Related

  • Privacy Risk of ChatGPT for Software Developers
  • Methods of Source Code Management and Data Protection
  • Securing the Cloud: Navigating the Frontier of Cloud Security
  • What Is API-First?

Trending

  • Comparing SaaS vs. PaaS for Kafka and Flink Data Streaming
  • Building Scalable and Resilient Data Pipelines With Apache Airflow
  • Apache Doris vs Elasticsearch: An In-Depth Comparative Analysis
  • Power BI Embedded Analytics — Part 2: Power BI Embedded Overview
  1. DZone
  2. Data Engineering
  3. Data
  4. The Role of Data Brokers in Software Development: Navigating Ethics and Privacy Concerns

The Role of Data Brokers in Software Development: Navigating Ethics and Privacy Concerns

Discover how data brokers impact software development, ethics, and privacy. Gain insights into user behavior and preferences.

By 
Oliver Stone user avatar
Oliver Stone
·
Mar. 21, 24 · Opinion
Likes (1)
Comment
Save
Tweet
Share
18.1K Views

Join the DZone community and get the full member experience.

Join For Free

Unveiling Data Brokers

Data brokers are entities that gather personal information from various sources, then process and organize it to later license to other organizations or individuals for marketing, risk mitigation, identity verification, and other purposes.

The information data brokers collect encompasses various areas of a user’s life. According to Onerep, it ranges from demographics (birth date, ethnicity, gender, income, net worth, political and religious affiliations, etc) to consumer behavior (app activity, shopping history, location data, interests based on online activities, etc).

As for the sources, one of the biggest streams of this information is online tracking as nearly all websites, computer software, and mobile applications collect and share behavioral data with third-party companies. 

In turn, software developers themselves benefit a lot from data brokers as they provide insights into user behavior, preferences, and demographic trends. Developers leverage this data to enhance user experiences, tailor advertising, and optimize their applications. For instance, understanding user preferences allows developers to create personalized interfaces and recommend content that aligns with individual tastes. 

While this leads to more engaging and user-friendly applications, data brokers’ practices also raise ethical considerations.

Ethical Considerations Surrounding Data Brokers

Even though data brokers represent a massive multi-billion dollar industry, this industry seriously lacks transparency. Users are often unaware of how exactly their data is gathered, used, shared, and sold. Even if one is able to identify a broker that exposes their information, these companies rarely disclose where it came from. As a result, users can’t get rid of particular apps that participate in the trade of their personal information.

Users also have little control over the process of collection of their data. Once users grant permissions to an app, be it access to contacts or locations, any third-party code embedded in the app gets the same permissions. 

Another ethical concern associated with data brokers is the potential for data misuse. As personal information becomes a commodity, the risk of unauthorized access, data breaches, and misuse only grows. 

And this risk seems to prove real. Take the case of Kochava, a mobile app analytics company, which has been accused of collecting and selling vast amounts of geolocation data from millions of mobile devices that can be used to trace the movements of individuals to and from sensitive locations. One of the ways Kochava is believed to acquire this data is through the software development kits they provide to app developers. These kits, embedded with Kochava’s coding, allegedly gather loads of information and send it back to Kochava without the consumers’ consent or knowledge.

Strategies for Ethical Data Utilization

As of now, the United States doesn’t have overarching federal data privacy laws governing data brokers and there’s minimal regulation across individual states. Users have to rely on sector-specific laws like HIPAA or region-specific like CCPA. However, HIPAA doesn’t apply to healthcare apps unaffiliated with your hospital or insurance carrier and CCPA covers only the residents of California.

Still, the need for transparent data handling is only increasing as users are increasingly aware of the value of their personal information and require better control over it.

While governments worldwide are recognizing the need for comprehensive regulations, software developers must stay informed about evolving legal frameworks and navigate ethical challenges to ensure that the use of data aligns with the principles of transparency, consent, and security. Striking a balance between innovation and privacy protection is essential to build trust and maintain a positive user experience.

In this regard, there are several strategies software developers can implement to ensure transparency and responsible use of personal data.

First, developers should be transparent about their data sourcing practices, informing users about the types of information collected and how it will be utilized. That entails providing clear policies that detail the way personal information is gathered and used, including for what purposes and whether it’s shared with third-party companies.  

Next, developers should ensure that users are aware of and agree to the collection and use of their data. This also encompasses providing them with the option to opt out of data collection and/or data sharing. Implementing clear and understandable consent processes empowers users to control their information better.

Another important step is for every company, however big or small, to implement robust security measures and have clear data-protection guidelines in place. These include the rules on how consumer data is treated and protected and what measures are implemented to prevent data breaches.

Notably, having (and enforcing) clear data protection policies serves as a competitive advantage for any business and fosters a sense of trust between developers and their user base. As consumers prioritize the privacy of their personal information, they will choose companies that provide full transparency and accountability.

Personal data Software development Data (computing) security

Opinions expressed by DZone contributors are their own.

Related

  • Privacy Risk of ChatGPT for Software Developers
  • Methods of Source Code Management and Data Protection
  • Securing the Cloud: Navigating the Frontier of Cloud Security
  • What Is API-First?

Partner Resources

×

Comments
Oops! Something Went Wrong

The likes didn't load as expected. Please refresh the page and try again.

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends:

Likes
There are no likes...yet! 👀
Be the first to like this post!
It looks like you're not logged in.
Sign in to see who liked this post!