VOOZH about

URL: https://arxiv.org/abs/2511.07307

⇱ [2511.07307] Singling out people without knowing their names -- Behavioural targeting, pseudonymous data, and the New Data Protection Regulation


Computer Science > Computers and Society

arXiv:2511.07307 (cs)
[Submitted on 10 Nov 2025]

Title:Singling out people without knowing their names -- Behavioural targeting, pseudonymous data, and the New Data Protection Regulation

View PDF
Abstract:Information about millions of people is collected for behavioural targeting, a type of marketing that involves tracking people's online behaviour for targeted advertising. It is hotly debated whether data protection law applies to behavioural targeting. Many behavioural targeting companies say that, as long as they do not tie names to data they hold about individuals, they do not process any personal data, and that, therefore, data protection law does not apply to them. European Data Protection Authorities, however, take the view that a company processes personal data if it uses data to single out a person, even if it cannot tie a name to these data. This paper argues that data protection law should indeed apply to behavioural targeting. Companies can often tie a name to nameless data about individuals. Furthermore, behavioural targeting relies on collecting information about individuals, singling out individuals, and targeting ads to individuals. Many privacy risks remain, regardless of whether companies tie a name to the information they hold about a person. A name is merely one of the identifiers that can be tied to data about a person, and it is not even the most practical identifier for behavioural targeting. Seeing data used to single out a person as personal data fits the rationale for data protection law: protecting fairness and privacy.
Subjects: Computers and Society (cs.CY)
Cite as: arXiv:2511.07307 [cs.CY]
(or arXiv:2511.07307v1 [cs.CY] for this version)
https://doi.org/10.48550/arXiv.2511.07307
arXiv-issued DOI via DataCite
Journal reference: Computer Law & Security Review, 2016-32-2, p. 256-271
Related DOI: https://doi.org/10.1016/j.clsr.2015.12.013
DOI(s) linking to related resources

Submission history

From: Frederik Zuiderveen Borgesius [view email]
[v1] Mon, 10 Nov 2025 17:09:31 UTC (384 KB)
Full-text links:

Access Paper:

  • View PDF
  • Source
Current browse context:
cs.CY
< prev   |   next >
Change to browse by:
cs

References & Citations

export BibTeX citation

BibTeX formatted citation

×
Data provided by:

Bibliographic and Citation Tools

Bibliographic Explorer (What is the Explorer?)
Connected Papers (What is Connected Papers?)
Litmaps (What is Litmaps?)
scite Smart Citations (What are Smart Citations?)

Code, Data and Media Associated with this Article

alphaXiv (What is alphaXiv?)
CatalyzeX Code Finder for Papers (What is CatalyzeX?)
DagsHub (What is DagsHub?)
Gotit.pub (What is GotitPub?)
Hugging Face (What is Huggingface?)
Papers with Code (What is Papers with Code?)
ScienceCast (What is ScienceCast?)

Demos

Replicate (What is Replicate?)
Hugging Face Spaces (What is Spaces?)
TXYZ.AI (What is TXYZ.AI?)

Recommenders and Search Tools

Influence Flower (What are Influence Flowers?)
CORE Recommender (What is CORE?)

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs.