{"id":2631,"date":"2014-09-08T09:16:01","date_gmt":"2014-09-08T14:16:01","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=2631"},"modified":"2015-04-24T15:49:26","modified_gmt":"2015-04-24T20:49:26","slug":"big-data-and-the-law","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/big-data-and-the-law\/","title":{"rendered":"Big Data and the Law"},"content":{"rendered":"<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2659\" style=\"border: 3px solid black;\" title=\"Big Data and the Law\" src=\"\/blog\/wp-content\/uploads\/2014\/09\/big-data-background-blog.jpg%20\" alt=\"Big Data and the Law\" width=\"206\" height=\"206\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/09\/big-data-background-blog.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/09\/big-data-background-blog-150x150.jpg 150w\" sizes=\"auto, (max-width: 206px) 100vw, 206px\">Big Data is the term used to describe the commercial aggregation, mining, and analysis of very large, complex and unstructured datasets based on social media and Web-enabled workloads.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Platforms like Google and LinkedIn have created a revenue stream from the data they collect. Everything from your Facebook posts and tweets, to your late-night shopping habits are analyzed. They supply businesses, individuals and public institutions with insights into the behavioral patterns of target audiences.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Raw digital data is a resource many companies are turning to in their quest for market advantage.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Dubbed \u201cthe new oil\u201d by the World Economic Forum, big data can improve decision making, reduce the time before taking a product to market and increase profits. But it can also raise significant risk, ranging from disastrous data breaches to concerns about privacy and compliance.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Its place in the legal landscape is still being defined. And it\u2019s in your best interests to <a title=\"Big Data and the Law\" href=\"http:\/\/bigdataandthelaw.com\/\" target=\"_blank\" rel=\"nofollow\">keep abreast of these developments<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>The NSA Affair<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Big data made global news in 2013 with the revelations of fugitive whistle-blower <a title=\"The NSA and Your Network\" href=\"https:\/\/www.google.com\/url?q=\/blog\/the-nsa-spying-fiasco-and-your-network\/&amp;sa=U&amp;ei=j3pjVMrYHczsoAS97ILQAQ&amp;ved=0CAYQFjAA&amp;client=internal-uds-cse&amp;usg=AFQjCNGoO9h70OHo6S_ix-BRwuq7pS8uxA\" rel=\"nofollow\" target=\"_blank\">Edward Snowden <img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>concerning the US National Security Agency (NSA). Leaked documents confirmed that the Agency has been gathering sensitive information (including email and phone transcripts) on private individuals and public figures. The purposes of this data collection remain unspecified.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Privacy advocates have pressed for legal action. And, after the NSA\u2019s loss in the District court of Washington DC the presiding judge made this comment on the agency\u2019s use of Big Data:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">\u201cThe threshold issue\u2026 is whether plaintiffs have a reasonable expectation of privacy that is violated when the Government indiscriminately collects their telephony metadata along with the metadata of hundreds of millions of other citizens without any particularized suspicion of wrongdoing, retains all of that metadata for five years, and then queries, analyses, and investigates that data without prior judicial approval of the investigative targets.\u201d<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #3366ff;\"><b>The court\u2019s analysis throws up vital issues. Namely:<\/b><\/span><\/h2>\n<ul>\n<li><span style=\"font-family: verdana,geneva; font-size: 12pt;\">How data can be used to discern other data<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva; font-size: 12pt;\">How data is (or can be) used<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Where it comes from in the first place<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #3366ff;\"><b>The Mechanics of Big Data<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2676\" title=\"Big Data and the Law\" src=\"\/blog\/wp-content\/uploads\/2014\/09\/big-data-court-gavel-300x300.jpg\" alt=\"Big Data and the Law\" width=\"186\" height=\"186\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/09\/big-data-court-gavel-300x300.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/09\/big-data-court-gavel-150x150.jpg 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/09\/big-data-court-gavel.jpg 500w\" sizes=\"auto, (max-width: 186px) 100vw, 186px\">Gathering information is a costly exercise that requires extensive storage facilities and a solid privacy compliance system.<br>\n<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">The legal framework regulating the big data business model is based on existing principles of intellectual property, confidentiality, contract and data protection law.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Database Rights will protect a data set under English law. Rights belong to the person who takes the initiative in \u201cobtaining, verifying and presenting the content of a database, while assuming the risks involved in doing this.\u201d This is an automatic right of ownership and should be respected.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">The Database Right may also cover a database, which has been substantially formed by collecting data from various different databases. This is one argument to further support claims that the NSA breached copyright laws.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #3366ff;\"><b>Implications for IT Management<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">The business of Big Data changes the function of the IT department. There\u2019s less emphasis on technology, and more on information architecture.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Rather than building a <a title=\"Database Monitoring\" href=\"\/help\/sm_5_6\/howto_monitor_database.aspx\">universal database<\/a>, creation of domain specific databases solving domain-specific problems is the conventional thought on how to resolve this issue.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">In effect, the data is in a data warehouse. It\u2019s the responsibility of IT to get the HCI [human computer interaction] part right.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">With cloud infrastructure, software as a service, applications moving outside, the role of IT changes even more. It\u2019s no longer a case of just managing servers, databases, or applications (other than some security administration).<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Instead of IT managers, the trend is moving towards data scientists with IT capabilities who can manipulate big data technologies. Professionals with a solid knowledge of data architectures, data quality, and mastery of data management hubs are highly sought after.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Overall, a business should do a proactive job of telling consumers what is known about them, what is done with that information, and why it\u2019s done.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #3366ff;\"><b>Intellectual Property<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">In November 2013, Google won a legal case after a suit was brought against the company in relation to book-scanning.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Briefly, Google indexed books and gave the public access to the indexes. Copyrights had expired with respect to some of the indexed books, but not (allegedly) all of them. The copyright holders sued Google for infringement of copyright on the scanned and indexed books.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Google\u2019s defense to the infringement claims is that its actions fell under a fair usage clause and thus could not be considered an infringing activity.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">A business using big data must be clear on the extent to which it can re-use this information. It is wise to address these issues as far up the \u201cdata chain\u201d as possible.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">In addition it\u2019s worth considering these <b>factors<\/b> (which are actually enshrined in US legal statutes):<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">(1) The purpose and character of the use, including whether it is of a commercial nature, or for non-profit educational purposes;<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">(2) The nature of the copyrighted work;<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">(3) The amount and substantiality of the portion used in relation to the copyrighted work as a whole; and<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">(4) The effect of the use on the potential market for or value of the copyrighted work.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">The source of the data set needs to be investigated. Unless specifically released as open data, most data sets will be subject to some controls in relation to their use. Any license terms on which data is supplied must be identified, and used to engineer protection in the form of warranties in the agreement with the data owner.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Warranties will also be required in relation to ownership of and \u201cfreedom to use\u201d the data. This will avoid disputes arising from an infringement of intellectual property rights or a breach of confidentiality.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #3366ff;\"><b>Nondisclosure<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2679\" title=\"Nondisclosure\" src=\"\/blog\/wp-content\/uploads\/2014\/09\/nondisclosure.jpg\" alt=\"Nondisclosure\" width=\"153\" height=\"153\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/09\/nondisclosure.jpg 250w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/09\/nondisclosure-150x150.jpg 150w\" sizes=\"auto, (max-width: 153px) 100vw, 153px\">At the outset of a big data transaction between companies, it\u2019s advisable to enter a nondisclosure agreement.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Each nondisclosure should include a provision that disclosed information will be considered confidential only if the information is:<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">1. Marked as confidential at the time of disclosure;<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">2. If unmarked at the time of disclosure, was treated as confidential at the time of disclosure and subsequently identified in writing as confidential, or that the receiving party knows, or should reasonably be expected to know, is confidential to the disclosing party<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">In November 2013, Convolve, INC entered a nondisclosure agreement with Compaq. Convolve entered a similar agreement with Seagate.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Having made disclosures of confidential information without meeting any of the conditions set out above, Convolve sued to keep the information it disclosed confidential. The court ruled that this information was no longer a Convolve trade secret. This lead to Convolve losing lots of money.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Sometimes, the people reading or drawing up a nondisclosure agreement don\u2019t communicate the requirements to the people making the disclosures. There may be limitations of liability, to consider. The unthinking use of form agreements is another potential pitfall.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #3366ff;\"><b>Recruitment and Vetting<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">In the USA, Wichita State University is using Big Data analytics in its recruiting and admissions program. IBM is using Wichita State\u2019s Big Data program as a case study.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">A quote in the IBM White Paper, attributed to David Wright, Assistant Vice-President for Strategic Planning and Business Intelligence states that: \u201cUltimately, [business analytics] predicts the chances of success for potential students, enabling marketing teams to focus on high-quality applicants.\u201d<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Big data is a predictive tool for enhancing academic standards and financial stability.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Fine, so far as it goes.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">But organizations using big data in their admissions practices, or to develop these practices will need to understand how its use affects them. Then they will need to consider whether they are accurately communicating their admissions standards and practices to applicants.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #3366ff;\"><b>Codes of Ethics<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2677\" title=\"Big Law and the Courts\" src=\"\/blog\/wp-content\/uploads\/2014\/09\/big-law-scales.jpg\" alt=\"Big Law and the Courts\" width=\"170\" height=\"170\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/09\/big-law-scales.jpg 250w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/09\/big-law-scales-150x150.jpg 150w\" sizes=\"auto, (max-width: 170px) 100vw, 170px\">A set of standards, voluntarily imposed to temper the increasing power that IT professionals now have, have been devised with big data in mind.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Google chairman Eric Schmidt\u2019s 2003 ethos \u201cDon\u2019t be evil\u201d isn\u2019t one of those standards. At least, it\u2019s not a very workable one.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">A better model might be this, posed by the Association for Computing Machinery Code of Ethics and Professional Conduct:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">\u201cHarm\u201d means injury or negative consequences, such as undesirable loss of information, loss of property, property damage, or unwanted environmental impacts. This principle prohibits use of computing technology in ways that result in harm to any of the following: users, the general public, employees, and employers.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Harmful actions include intentional destruction or modification of files and programs leading to serious loss of resources or unnecessary expenditure of human resources such as the time and effort required to purge systems of \u201ccomputer viruses.\u201d<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #3366ff;\"><b>The ICO Guidelines: Anonymization<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">The Data Protection Act controls how organizations use \u2018personal data\u2019 which is defined as any information that allows individuals to be identified.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Anonymization is the process of turning data into a form that doesn\u2019t identify individuals, and where identification isn\u2019t likely to take place. This avoids having to tackle problems concerning the data subject\u2019s consent. It also allows for a much wider use of the information.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Guidelines from the UK Information Commissioner\u2019s Office (ICO) include a <a title=\"Code of Practice on Anonymization\" href=\"http:\/\/ico.org.uk\/for_organisations\/data_protection\/topic_guides\/~\/media\/documents\/library\/Data_Protection\/Practical_application\/anonymisation-codev2.pdf\" target=\"_blank\" rel=\"nofollow\">Code of Practice on Anonymization<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, that\u2019s aimed at helping companies to manage risk.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">The code of practice explains the issues surrounding the anonymization of personal data, and the disclosure of data once it has been anonymized. It describes the steps an organization can take to ensure that anonymization is conducted effectively while retaining useful data.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">The code is useful to any organization wanting to turn personal data into anonymized information for research or other data analysis purposes.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">As further help the ICO is supporting the establishment of a network for practitioners to discuss issues relating to anonymization, and share better practices.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">The UK Anonymisation Network (UKAN) is coordinated by the University of Manchester, the University of Southampton, the Open Data Institute, and the Office for National Statistics.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #3366ff;\"><b>Big Data Best Practices<\/b><\/span><\/h2>\n<p><span style=\"color: #808080;\"><em><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>Consider these key questions:<\/b><\/span><\/em><\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">1. Can we trust our sources of Big Data?<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">2. What information are we collecting without exposing the enterprise to legal and regulatory battles?<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">3. How will we protect our sources, our processes and our decisions from theft and corruption?<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">4. What policies are in place to ensure that employees keep stakeholder information confidential during and after employment?<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">5. What actions are we taking that create trends that can be exploited by our rivals?<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">A business should identify any license terms by which data is supplied.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">This should be used to engineer protection in the form of warranties in its agreement with the data owner.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">If the data collected is going to be used in a commercial service delivered to users by the business, then those customers can expect to receive assurances as well.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Even where anonymized data is supplied it\u2019s wise to request a warranty from the supplier giving assurances that the data is fully compliant with Data Protection Act (DPA) requirements.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">This should include scrutiny of the information on use of data and privacy that was given to the data subjects at the point of data collection.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Individuals should be told in a privacy statement accessible at the point the data is collected, that their data may be used and disclosed to others in anonymized form. This is good practice, and the credibility of the data set will depend on it.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Businesses also need to be multitasking, as they consider the consequences of using data from multiple sources.<\/span><\/p>\n<p><a title=\"\" href=\"http:\/\/www.twitter.com\/home?status=RT:%20@poweradmn%20Big%20Data%20and%20the%20Law%20\/blog\/big-data-and-the-law\/?ref=blog\" target=\"_blank\" rel=\"nofollow\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-1028\" title=\"\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large-300x75.png\" alt=\"Tweet this\" width=\"300\" height=\"75\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large-300x75.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large.png 310w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/p>\n<p><a title=\"\" href=\"https:\/\/plus.google.com\/share?url={\/blog\/big-data-and-the-law\/?ref=blog}\" target=\"_blank\" rel=\"nofollow\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-1053\" title=\"\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2-300x75.png\" alt=\"Share on Google+\" width=\"300\" height=\"75\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2-300x75.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2.png 310w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Big Data is the term used to describe the commercial aggregation, mining, and analysis of very large, complex and unstructured datasets based on social media and Web-enabled workloads. Platforms like Google and LinkedIn have created a revenue stream from the data they collect. Everything from your Facebook posts and tweets, to your late-night shopping habits [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2659,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,13,6],"tags":[],"class_list":["post-2631","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-pc-security","category-tech"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=2631"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2631\/revisions"}],"predecessor-version":[{"id":3464,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2631\/revisions\/3464"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/2659"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=2631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=2631"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=2631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}