Our website use cookies to improve and personalize your experience and to display advertisements(if any). Our website may also include cookies from third parties like Google Adsense, Google Analytics, Youtube. By using the website, you consent to the use of cookies. We have updated our Privacy Policy. Please click on the button to check our Privacy Policy.

The Data Controllers: Masters of Power

Who controls data and why that equals power

Data is not neutral raw material; it is a strategic asset. The entity that collects, stores, analyzes, and governs large, high‑quality data sets gains economic advantage, political influence, and operational control. That concentration of capability — to predict behavior, set markets, shape information flows, and make decisions at scale — is what turns data into power.

Primary stakeholders responsible for managing data

  • Big technology platforms: Companies like global search, social media, cloud, and ecommerce platforms aggregate massive behavioral, transactional, and location data across billions of users and services.
  • Governments and regulators: States collect identity, tax, health, telecommunications, and surveillance data; they also set rules that determine who may use what data and how.
  • Data brokers and aggregators: Firms that buy, enrich, and resell consumer profiles, often combining public records, purchase history, and inferred attributes for marketing or analytics.
  • Enterprises with vertical stacks: Healthcare providers, banks, retailers, and telcos that hold specialized, sensitive datasets linked to real-world outcomes.
  • Research institutions and public bodies: Universities and statistical agencies produce and steward scientific, demographic, and environmental data for public benefit.
  • Individuals and communities: End users create data by living, consuming, and interacting; collective action and legal frameworks can shift practical control back toward them.

Categories of data that grant influence

  • Personal identifier data: Names, government IDs, addresses — used for control, authentication, and enforcement.
  • Behavioral and interactional data: Search queries, clicks, watch history, social graphs — the raw materials for personalization and persuasion.
  • Transactional and financial data: Purchases, pricing, credit records — key to economic profiling and dynamic pricing strategies.
  • Sensor and IoT data: Location traces, device telemetry, smart home logs — enable continuous monitoring and context-aware services.
  • Biometric and genomic data: Fingerprints, facial data, DNA — uniquely sensitive inputs for identity, health research, and forensic uses.

How exercising authority over data becomes a source of power: underlying mechanisms and resulting impacts

  • Economic moat and market power: Large data sets improve machine learning models, which improve products, driving more users and more data — a virtuous cycle that erects barriers to entry. Example: search and ad targeting have concentrated advertising markets because better data yields higher ad relevance and revenue.
  • Predictive advantage: Accurate predictions about behavior enable firm decisions that tilt outcomes in their favor: targeted advertising, credit scoring, fraud detection, inventory optimization.
  • Behavioral influence and information control: Platforms control what content is amplified or suppressed through recommendation algorithms. The Cambridge Analytica case (where harvested Facebook data was used to target political messaging) exemplifies how behavioral data can be weaponized for persuasion.
  • Gatekeeping and platform governance: Owners of dominant platforms can set rules for third parties, controlling market access and terms for competitors — for example, marketplace platforms that combine seller data with platform-owned products gain insights that can disadvantage independent sellers.
  • Surveillance and social control: Centralized access to communication, movement, and transactional data enables monitoring at scale. Government programs and private analytic tools can be combined to build predictive policing, eligibility systems, or social scoring mechanisms.
  • National security and geopolitical leverage: Nations with advanced digital ecosystems and access to strategic data (telecoms, critical infrastructure telemetry, citizen registries) gain operational intelligence and bargaining power in diplomacy and conflict.

Representative cases and data points

  • Cambridge Analytica (2016–2018): Harvested Facebook user data to build psychological profiles for highly targeted political advertising, highlighting risks of third‑party access and opaque reuse.
  • Platform ad ecosystems: Google and Meta have historically captured major shares of digital advertising by combining search, social, and targeting data to sell precise audiences to advertisers.
  • Amazon marketplace dynamics: Amazon uses sales and search data across the platform to optimize its logistics, recommend products, and develop private‑label items — creating conflicts between marketplace operator and sellers.
  • Health data partnerships: Consumer genetics companies and health apps have partnered with pharmaceutical firms to accelerate drug discovery, illustrating how aggregated health data can be monetized with both public benefit and commercial profit.
  • Regulatory responses: The EU General Data Protection Regulation (implemented 2018) redefined data controller and processor responsibilities and introduced rights like data portability and the right to erasure; Apple’s App Tracking Transparency (2021) changed mobile ad tracking economics by restricting cross‑app IDFA access.

Implications for markets, democratic processes, and overall fairness

  • Market concentration: Data-driven strengths often give established players a dominant position, weakening competitive dynamics and potentially hindering progress in certain industries.
  • Privacy erosion and reidentification risk: Supposedly anonymized data can frequently be traced back to individuals when cross-referenced with additional sources, putting sensitive details at risk.
  • Discrimination and bias: Systems built on skewed datasets may perpetuate and even intensify inequitable patterns in areas such as credit evaluation, recruitment, law enforcement, and medical services.
  • Information manipulation: Targeted communication derived from granular data can deepen social divides, steer public attention, and reshape collective narratives.
  • Asymmetric bargaining power: People and smaller entities frequently lack the influence needed to secure equitable data-use terms, while data brokers profit from profiles created through obscure and complex data trails.

Tools across policy, technology, and governance to restore a balanced distribution of power

  • Regulation and antitrust: Binding requirements on data portability, interoperability, and duties for dominant platforms can curb gatekeeper influence, with enforcement actions such as privacy penalties and continuous antitrust investigations targeting major platforms.
  • Data minimization and purpose limitation: Collecting only what is essential and demanding explicit, well‑defined purposes helps reduce surveillance exposure and limits unauthorized secondary uses.
  • Data portability and open standards: Enabling users to transfer their information across services and adopting uniform APIs lowers switching barriers while stimulating broader market competition.
  • Privacy‑preserving technologies: Approaches including federated learning, differential privacy, and secure multi‑party computation make it possible to train models and run analyses without aggregating raw personal information in a single location.
  • Data trusts and stewardship models: Independent stewards can oversee sensitive data under fiduciary duties, providing responsible access for research and activities serving the public interest.
  • Transparency and auditability: Requiring model interpretability, traceable provenance, and external audits supports the identification of improper use and potential bias.

Practical steps for organizations and individuals

  • For organizations: Build clear data governance frameworks, map data flows, apply privacy‑by‑design, use synthetic data or privacy techniques when possible, and publish transparency reports about data use and model impacts.
  • For individuals: Use privacy controls, limit permissions, exercise data rights where available (access, deletion, portability), and prefer services that practice minimal collection and transparency.

Data control extends far beyond technical or commercial concerns; it ultimately determines who can shape markets, steer elections, set scientific agendas, and influence daily life. Power accumulates wherever data streams become exclusive, inference tools are centralized, and oversight remains unclear. Restoring balance calls for aligned legal structures, robust technical protections, thoughtful institutional arrangements, and shared cultural expectations that treat data both as an economic asset and as a form of collective social trust.

By Lily Chang

You May Also Like