Introduction
Our antitrust laws are a product of their time. Beginning in the 1870s, fundamental changes in transportation, communications, population growth, production technology, business organization, and finance culminated in rapid economic growth.[1] As the United States industrialized, it entered the “Gilded Age,”[2] characterized by rapid social upheaval and technological advancement. Between 1870 and 1890, the population of the United States nearly doubled from 38.6 million to 63 million people,[3] while 7.1 million new Americans immigrated into the country.[4] America’s industrial sector grew tremendously; real GDP increased twofold,[5] the energy consumption of the United States more than quadrupled,[6] and manufacturing production grew by over 50 percent.[7] New industries emerged. Railroads drastically lowered freight rates and enabled rapid, cross-country movement of goods and people. New technological advancements, such as the Bessemer process of steelmaking and new methods of distillation in petroleum refining,[8] led to the emergence of large, capital-intensive firms that were able to take advantage of economies of scale.[9]
However, the economic gains from this period were not evenly distributed; rather, corporate power became concentrated in the hands of the few. During the 1870s, John D. Rockefeller’s Standard Oil grew from comprising about 4 percent of the US petroleum industry to 90 percent.[10] Standard Oil was able to use its dominant market position to extract rebates from railroads,[11] spend vast sums to defeat political rivals,[12] and exclude competitors from entering the market.[13]
Andrew Carnegie’s Steel Company, which was later sold for an enormous sum to J.P. Morgan to create U.S. Steel,[14] bought out its rivals[15] and crushed labor unions.[16] Cornelius Vanderbilt formed his monopoly, New York Central Railroad, by refusing to accept the passengers or freight of his rivals until they agreed to sell their companies to him.[17] Criticizing the excesses of the Gilded Age, Walt Whitman wrote:
In fashionable life, flippancy, tepid amours, weak infidelism, small aims, or no aims at all, only to kill time. In business, (this all-devouring modern word, business,) the one sole object is, by any means, pecuniary gain. The magician’s serpent in the fable ate up all the other serpents; and money-making is our magician’s serpent, remaining to-day sole master of the field.[18]
In 1890, in response to an alarming concentration of corporate wealth and power, Congress passed the Sherman Antitrust Act,[19] which, generally speaking, targeted attempts at monopolization and other anticompetitive behaviors.[20] Nearly two decades later, in 1914, Congress passed the Clayton Antitrust Act to further prohibit anticompetitive practices,[21] as well as the Federal Trade Commission Act, which established the titular agency to enforce violations of antitrust laws.[22] In the decades that followed, the federal docket saw numerous lawsuits challenging the monopolies of the Gilded Age,[23] many of which resulted in the dissolution of trusts or otherwise diminished unlawfully amalgamated corporate power. Congress later amended these acts by passing the Robinson-Patman Act,[24] the Miller-Tydings Act,[25] the Celler-Kefauver Act,[26] and the Hart-Scott-Rodino Antitrust Improvements Act.[27] However, no significant antitrust legislation has been enacted since 1964.
While the times have changed, antitrust law has not. The monopolies of the twenty-first century are not railroads, oil producers, or steel manufacturers, but multinational technology companies: Amazon, Apple, Facebook and Google, often collectively referred to as “Big Tech.”[28] However, while the technology monopolies of the twenty-first century look very different from the monopolies of the Gilded Age, America’s antitrust framework remains mired in the past. Unsurprisingly, the Sherman Antitrust Act and the Clayton Antitrust Act, which continue to form the backbone of American antitrust regulation, have proven inadequate for preventing the emergence of, or otherwise regulating, today’s monopolies; these technology companies, sometimes dubbed “data-opolies” on account of the massive amounts of data they are able to collect, are able to engage in anticompetitive conduct, including leveraging their monopoly power to exclude competitors from market entry and acquiring would-be market entrants. The rise of the data-opoly has also harmed consumers by reducing consumer choice, diminishing product innovation, and eroding user privacy.[29] However, the traditional antitrust framework, and its focus on price-related consumer harm, has failed to account for the economics of the data economy where users pay not with dollars, but with data.
In Part I, this Note will consider the history of antitrust regulation in this country, from the Gilded Age to the twenty-first century. Part II will provide a brief overview of the classical antitrust framework. In Part III, this Note will illustrate how the conceptual shortcomings of the classical antitrust framework have facilitated the emergence of data-opolies. Part IV will analyze proposals and potential solutions to the data-opoly problem, and propose a focus on data, the underlying commodity which has enabled the rise of the data-opoly. Part V of this Note will consider other similar measures, including state laws, the current European privacy framework, and several pieces of legislation pending in various state legislatures. Finally, in Part VI, this Note will suggest implementing a privacy regime focused the rights of individuals in their data, which would have the effect of providing an effective remedy to the data-opoly problem from outside the antitrust regulatory framework.
I. Antitrust Regulation
The regulatory framework for antitrust law comes from a variety of statutes passed between 1890 and 1964. In 1890, Congress passed the Sherman Antitrust Act,[30] which prohibited contracts, combinations, or conspiracy in restraint of interstate or international trade,[31] outlawed monopolizing, attempting to monopolize, or conspiring to monopolize,[32] and tasked the Department of Justice with the duty to institute proceedings in equity to prevent and restrain such violations, including by injunctive relief.[33] Within the meaning the Sherman Act, unlawful restraints of trade can include horizontal restraints such as price fixing,[34] market allocation,[35] and concerted refusals to deal,[36] as well as vertical restraints such as tying.[37] Monopolization and attempted monopolization offenses require anticompetitive behavior. In order to demonstrate anticompetitive behavior under the Sherman Act, a plaintiff must show “that (1) defendant has, and exercises, such overwhelming strength in the [relevant] market that it controls that market, (2) this strength excludes some potential, and limits some actual, competition, and (3) this strength is not attributable solely to defendant’s ability, economies of scale, research, natural advantages, and adaptation to inevitable economic laws.”[38]
In 1914, the Clayton Antitrust Act expanded antitrust regulation to prohibit predatory pricing,[39] to prohibit sales and leases contingent on the purchaser or lessee refusing to deal with competitors of the seller or lessor,[40] and to prohibit anticompetitive mergers and acquisitions,[41] as well as to provide for a right of action for damages by individuals,[42] and for injunctive relief by individuals and the federal government.[43] The 1914 Federal Trade Commission Act established the Federal Trade Commission (FTC), an administrative body tasked with enforcing antitrust laws.[44] The FTC was statutorily authorized to conduct its own investigations, although enforcement required an Article III Court.[45] The act also substantively expanded antitrust laws by prohibiting unfair methods of competition and unfair or deceptive acts or practices.[46]
The Robinson-Patman Act of 1936[47] amended the Clayton Antitrust Act to redefine price discrimination and address other discriminatory practices,[48] to criminalize certain offenses in the Clayton Antitrust Act,[49] and to prohibit sales at unreasonably low prices.[50] The Miller-Tyding Act of 1937 amended Section 1 of the Sherman Act to provide an exception for fair trade agreements,[51] and although this provision limited the efficacy of the Sherman Act,[52] this provision was narrowly construed by the Supreme Court,[53] and later repealed.[54] The Celler-Kefauver Act, passed by Congress in 1950, amended the Clayton Antitrust Act to expand its prohibitions against mergers and acquisitions so as to include in its scope both vertical and horizontal mergers and acquisitions which could limit competition.[55] The Hart-Scott-Rodino Antitrust Improvements Act of 1976 strengthened antitrust law by requiring parties undergoing mergers to file with the Federal Trade Commission and Department of Justice to determine whether those mergers would violate antitrust laws.[56]
II. Classical Antitrust Theory
While the American economy has changed dramatically since these laws were originally enacted, the core statutory framework has remained substantially the same. Furthermore, while the antitrust laws were originally interpreted broadly,[57] subsequent trends and developments in the enforcement of antitrust laws have significantly diminished their reach. First, the Courts have narrowly interpreted the goals of antitrust laws by applying a “consumer welfare” focus, which emphasizes not the effect on the market as a whole but rather the prices ultimately paid by consumers. Second, courts have taken the view that underenforcement is preferable to overenforcement,[58] a position at odds with the legislative intent of the antitrust laws.[59] Third, enforcement of the antitrust laws has been split between the Federal Trade Commission and the Department of Justice, who have contributed to the underenforcement problem by interpreting their legal authorities narrowly and by being overly permissive towards market power.[60]
A. The Chicago School
The narrow consumer welfare standard, as well as the intellectual roots of much of modern antitrust jurisprudence, can be traced back to the Chicago School, specifically to the scholarship of Robert Bork.[61] In his foundational The Antitrust Paradox,[62] Bork identified three principal critiques of the U.S. antitrust regime.[63] First, he argued that it was incorrect for courts to try to foster an egalitarian business environment, and that instead courts should only intervene when challenged conduct decreased economic efficiency.[64] Second, Bork argued that antitrust enforcement should focus on consumer welfare, and only intervene to ban collusive arrangements among direct rivals, horizontal mergers which would leave three or fewer firms in a relevant market, and business efforts to misuse government regulatory processes to forestall competitors.[65] Third, Bork criticized the antitrust establishment, including Congress, the Federal Trade Commission, the Department of Justice, and the federal judiciary, and argued that judges incorrectly considered externalities while overlooking economic justifications.[66] Bork even went so far as to encourage judges to ignore antitrust legislation that conflicted with his economic efficiency centered framework.[67]
The influence of the Chicago School was not confined to the ivory tower of academia; it significantly shaped the federal courts’ antitrust jurisprudence.[68] In the 1986 decision Matsushita Electric Industrial Co. v. Zenith Radio Corp.,[69] for instance, the Supreme Court directly cited Bork’s Antitrust Paradox.[70] He has been directly quoted by regulatory agencies, such as the FTC,[71] which in 1982 endorsed an analytical framework similar to Bork’s.[72] Federal judges often cite Bork,[73] and his influence has had the effect of creating a presumption among federal judges that concerns other than economic efficiency should be ignored by the courts.[74]
Although the influence of the Chicago School is notable, an analysis of the intellectual underpinnings of modern antitrust jurisprudence would be incomplete without analyzing the influence of the significant contributions made by the Harvard School.[75] Under the stewardship of Professors Phillip Areeda and Donald Turner, who authored the seminal treatise Antitrust Law,[76] the Harvard School, like Bork, thought that courts and government agencies should eschew social and political externalities and focus solely on how challenged actions would affect economic performance.[77] Areeda and Turner were greatly concerned with the institutional capacity of the antitrust system,[78] and thought that the private rights of action associated with antitrust enforcement (as well as the accompanying treble damages, jury trials, joint and several liability, plaintiff friendly rules on fee shifting, availability of extensive discovery, and class actions) posed a serious threat of overdeterrence.[79] However, unlike Bork, Areeda and Turner argued that courts should defer to the legislature and adhere to established precedent when possible.[80] Areeda and Turner advocated a contextualist approach which would, while still applying efficiency-based legal standards, pay greater attention to the unique facts of the case.[81]
Perhaps Areeda’s most notable contribution to antitrust scholarship was his narrow conceptualization of antitrust injury,[82] which further narrowed the reach of the antitrust laws by making it more difficult for private plaintiffs to bring antitrust claims. Areeda argued that the treble damages provision of the Clayton Act[83] should be construed narrowly and require a strong showing of actual injury.[84] While Areeda acknowledged that it was possible that an antitrust violation might not cause an injury, he dismissed this possibility as “superficially paradoxical.”[85] Areeda defended this contention by arguing that interpreting Section 7 of the Clayton Act,[86] which prohibits acquisitions that “may lead to circumstances that may cause competitive injury,”[87] to require present harm to recover for damages does not undermine antitrust enforcement because plaintiffs can still seek governmental action or injunctive relief.[88]
Like Bork, Areeda’s influence was not confined to academia. In Brunswick Corp. v. Pueblo Bowl-O-Mat, Inc., the Supreme Court, citing Areeda, defined antitrust injury as not “injury causally linked to an illegal presence in the market” but “antitrust injury, which is to say injury of the type the antitrust laws were intended to prevent and that flows from that which makes defendants’ acts unlawful. The injury should reflect the anticompetitive effect either of the violation or of anticompetitive acts made possible by the violation.”[89]
The rise of the modern data-opoly has laid bare the deficiencies of the previous antitrust regime.[90] In part, the reemergence of monopoly power can be seen as the natural culmination of decades of underenforcement and deference to corporate power. Regulatory agencies’ tendency to underregulate, as Areeda and Bork have argued is preferable,[91] has enabled technology companies to amass large market shares while evading significant scrutiny.[92] For example, the Federal Trade Commission engaged in an extensive investigation of just one of Facebook’s nearly 100 acquisitions: its purchase of Instagram in 2012.[93]
However, underenforcement is only half of the picture. Any analysis of the inability of classical antitrust theory to account for the emergence of “big tech” would be incomplete without considering the specific manner in which classical antitrust theory conceptualizes consumer harm and the ways in which that conceptualization intersects with the business models of data-opolies. Certainly, it is no coincidence that the largest monopolies of today emerged not from railroads, oil companies, and other traditional industries but from business models centered on gathering data. As discussed above, a central tenet of classical antitrust theory is the consumer welfare standard, under which the focus of antitrust enforcement is, normatively, the price paid by consumers.[94] For example, as recently as 2012, Bork argued that Google was not anticompetitive because Google Search does not charge consumers a fee to use their service, and thus causes no consumer harm.[95] While the courts’ narrow formulation of antitrust standing recognizes consumer harm, [96] it has limited private antitrust claims to injuries the “antitrust laws were intended to prevent,”[97] such as artificially high prices paid by consumers. However, this narrow focus on the dollar price paid by consumers for services provided by technology companies ignores a simple reality: although consumers may not pay for such services with their wallets, they do pay with their data.[98]
In exchange for their services, data-opolies are able to extract massive amounts of consumer data. For example, shopping platforms such as Amazon “gather enormous amounts of information, ranging from the amount of time you hover your mouse over a particular button and the number of days an item sits in your shopping basket, to every location you’ve visited with your phone and how you psychologically react to different posts and words.”[99] Such platforms can even track user activity on third-party websites and applications.[100] Amazon also collects data from the merchants that rely on its marketplace to do business, analyzing sales data to create products to compete directly with those sold successfully by Amazon merchants,[101] thus harming competitors as well as reducing consumer choice.
Most data-opolies are opaque about the data they collect, and if this information is presented to consumers it is often done so in the form of lengthy and unwieldly disclosures.[102] As a result, consumers are often unaware of what data is being collected, creating an information asymmetry that allows data-opolies to extract data without paying its fair market value. And, because consumers are unaware about what their data is being used for, they tend to undervalue their data.[103] Furthermore, access to the services provided by data-opolies is provided on a take-it-or-leave-it basis; consumers have no ability to opt out of data collection and are offered the choice of surrendering their data or not using the service at all.[104]
The traditional antitrust framework’s focus on price also enables anticompetitive mergers to escape regulatory scrutiny. Upstart competitors are often data-rich but cash poor, so utilizing a price-centric review allows otherwise anticompetitive mergers to avoid detection by the FTC,[105] as evidenced by the fact that acquirers conducting competition-squashing acquisitions are more likely to do so via deals that do not trigger the FTC notification requirements for premerger review.[106] Since the mid-1990s, hundreds of billions of dollars in output have been concentrated via mergers that fall below the threshold for merger review.[107]
IV. Fixing the Data-Opoly Problem
There are many tools available to regulators that could help curb the monopolistic tendencies of data-opolies. These options can generally be grouped into two categories: preemptive and reactive. Preemptive reform options include limiting the type of data that can be collected,[108] granting users ownership rights over their data, requiring interoperability and data portability,[109] or limiting how collected data can be used.[110] Reactive reform options include undoing mergers and preventing future mergers, requiring data-opolies to spin off parts of their business,[111] or prohibiting data-opolies from entering ancillary lines of business on their platforms. Some options operate both preemptively and reactively, such as prohibiting platforms from discriminating against competitors that rely on their platforms.[112]
This Note advocates for a statutory framework aimed at protecting the rights of the individual in their data, which would have the effect of providing an effective remedy to the data-opoly problem from outside of the antitrust regulatory framework. This approach is viable for several reasons. For one, such a proposal would likely be politically popular, as the vast majority of Americans are concerned with the amount of their data being collected,[113] and believe that big tech unfairly undermines competition.[114] While few legislators are clamoring for new antitrust laws,[115] regulating big tech has attracted a fair amount of bipartisan support.[116] Second, a robust data privacy regime would have the ancillary effect of protecting user privacy. Just as monopolistic firms, as price setters, have no incentive to compete on price, modern technology monopolies, as data collectors, have no incentive to provide or compete on privacy protections.[117]
Most importantly, granting individual users rights to their own data will significantly hamper the data-collection efforts of data-opolies. In turn, this will significantly diminish the monopoly power of technology firms, as well as enable new competitors to enter the market, thus boosting competition. This is because data collection forms a core component of data-opolies’ business models and enables many of their monopolistic tendencies. Google tracks what users search for and how they interact with those results, then uses this data to efficiently manage index upkeep, improve its search algorithm, and maximize advertising revenue.[118] Furthermore, because Google’s suite of products is so varied, it can collect and aggregate data from across the Google ecosystem, including Chrome, Android, Maps, and other widely used Google applications.[119] And, as the owner of the Android platform, Google can also track real-time data usage of third-party apps, including those of Google’s competitors.[120] Facebook, on the other hand, utilizes user data to provide individualized user experiences,[121] as well as to maximize advertising revenue by providing users with targeted ads.[122]
Additionally, data-opolies are able to use data in anticompetitive ways, such as by identifying potential business rivals and acquiring them before they develop into genuine threats.[123] And, because antitrust enforcers lack access to the data that monopolistic firms use to make these anticompetitive acquisitions, these transactions escape the scrutiny of regulators.[124] Facebook, for example, uses the data it collects to “identify nascent competitive threats and then acquire, copy, or kill [them].”[125] Google “exploits information asymmetries and closely tracks real-time data across markets” to set up programs to track actual and potential competitors,[126] as well as disfavor vertical providers that compete with Google’s own services.[127] Amazon utilizes the data collected from merchants on Amazon Marketplace to create products that compete directly with those sold successfully by these merchants.[128]
Not only does collecting data enable pernicious anticompetitive behavior, but the manner in which data-opolies use the data results in a feedback loop that increases barriers to entry. Take the search market for example: Google uses the data it collects to improve its search engine, which in turn draws users to their product. As more users use Google Search, Google gets more data, which it uses to improve its search engine, and so on and so forth. Because alternative search engines do not have access to the same data that Google does, they are unable to compete with Google Search.[129] Facebook likewise uses data to create ever-mounting barriers to entry. Because it is the largest social media platform,[130] Facebook has more data than its competitors and is able to use this data to provide tailored, individualized user experiences.[131] In turn more users join and existing users spend more time on Facebook, making it harder for would-be competitors to enter the market. Although data is theoretically a non-rivalrous good, firms can prevent rivals from using their data through technical restrictions and contracts.[132]
Additionally, this phenomenon leads to indirect network effects as increasing use of platforms incentivizes third parties to “invest in developing compatible technologies, which in turn reinforces the popularity of the original product or service with users.”[133] Consequently, the switching costs for businesses that rely on data-opolies’ platform’s increase, thus further entrenching the market positions of those data-opolies.
However, creating individual rights in data is not without its pitfalls. First, it is both philosophically and practically challenging to conceptualize the value of data, as would be necessary in order to determine whether an individual’s rights in their data are sufficiently strong as to affect the economic business models of data-opolies. Different monopolistic firms utilize data for different purposes, meaning that deriving a value for an individual’s data based on empirical methods is likely unfeasible. Determining the value of individual data by analyzing the value of the data to the consumer is likely to be ineffective as well, since the massive scale of data-opolies allows them to utilize consumer data in a myriad of ways such that the value of consumer data is worth significantly more to the data-opolies than it is to the consumer.[134] Third, looking at the value of data within the antitrust consumer framework does not account for other, noneconomic reasons why individuals might value privacy. Nonetheless, despite these shortcomings, such an approach could be effective at regulating data-opolies.
V. The Scope of Existing Data Protection
A. Data Protection in the United States
A statutory data privacy regime could take a variety of forms, and a brief overview of existing data privacy regimes will be illustrative. Few states have prophylactic measures to limit the degree to which data can be collected ex ante, although all fifty states, as well as the District of Columbia and the U.S. territories, do have laws which require the notification of individuals when a data breach affects their personally identifiable information.[135] At the federal level, while there is no generally applicable right to data privacy, there are several laws which protect various classes of data, including financial data, health data, educational data, and children’s data.[136] In the absence of a robust federal framework, some states have gone a step further and enacted their own data privacy laws.
In California, the California Invasion of Privacy Act restricts recording or listening to private electronic communications and creates a private right action,[137] while the California Online Privacy Protection Act requires operators of commercial websites and online services to affirmatively disclose their privacy policies.[138] The California Comprehensive Computer Data Access and Fraud Act imposes criminal and civil liability for knowingly accessing, and without permission, using computer data.[139] The California Privacy Rights Act, which is modeled after the GDPR,[140] grants individuals the right to correct inaccurate information, the right to have personal information collected limited in purpose, the right to receive notice from businesses using sensitive personal information, the right to access data previously collected, the right to opt out of sharing information with third parties, and the right to sue businesses that suffer from data breaches.[141] The California Privacy Rights Act also creates a new agency for enforcing the law.[142] In Illinois, the Biometric Information Privacy Act regulates the collection of an individual’s biometric information and provides for a private right of action.[143] Texas passed a similar law limiting the collection of biometric data,[144] as did Washington,[145] although neither measure includes a private right of action.
Additionally, many state legislatures are considering passing various privacy-related statutes. Both houses of the Virginia legislature have passed the Consumer Data Protection Act, which would “grant consumer rights to access, correct, delete, obtain a copy of personal data, and to opt out of the processing of personal data for the purposes of targeted advertising.”[146] The New York State Legislature introduced the New York Privacy Act, which is substantially similar to the California Privacy Right Act but includes a private right of action.[147] The State of Washington is considering two separate data privacy laws, one of which would allow individuals to find out how much of their data has been collected,[148] and another which would require companies to obtain consent before collecting or processing personal data.[149] The Utah State Legislature recently introduced a measure which would give consumers the right to opt out of data collection for certain purposes as well as impose several data handling requirements on data processors, and empower the Office of the Attorney General to enforce the law.[150] The Oklahoma State Legislature recently introduced a measure which would require certain companies to inform users what data has been collected.[151] However, this is the extent of data privacy protection in the United States, leaving American consumers with few federal protections and a loose patchwork of state laws.
B. Data Protection in the European Union
The most prominent non-American data collection regime is the European Union’s General Data Protection Regulation (GDPR),[152] which was enacted in 2018 to protect individual rights to protection of data and ensure “[t]he free movement of personal data within the [EU]”.[153] Under the GDPR, there are strict limits upon the types of data that can be collected, as well as limits on the manner in which that data can be collected. Significantly, the GDPR requires, in many circumstances, that data subjects consent to have their data processed.[154]
The GDPR requires data to be processed lawfully, to be collected and processed in a manner not inconsistent with specific allowed purposes, and to be limited to the extent necessary for the purpose for which the data is processed.[155] The GDPR also protects individual confidentiality by placing limits on how collected data may be maintained and processed.[156] The GDPR further protects the data rights of individuals by establish certain individual rights. Article 15 allows individual data subjects to obtain confirmation as to whether or not their personal data is being processed as well as information pertaining to that processing.[157] Article 16 allows data subjects to have inaccurate personal data rectified.[158] Article 17 allows data subjects to, in certain situations, have their personal data erased.[159] Article 18 allows data subjects to obtain restrictions on processing in certain circumstances.[160] Article 20 provides data subjects with the right to receive copies of their personal data in a readable format.[161] Article 21 allows data subjects to object to the processing of personal data when that data is used improperly.[162] By regulating data processing, the GDPR thus limits what can be done with data once it is collected.
Thus, by limiting the conditions under which data can be collected and restricting what can be done with data after it is collected, the GDPR directly regulates a core component of data-opolies’ business models, and in turn indirectly regulates the manner in which they can compete in the digital economy. For instance, in 2017, Germany’s national competition regulator notably found that “Facebook is abusing [its] dominant position by making the use of its social network conditional on its being allowed to limitlessly amass every kind of data generated by using third-party websites and merge it with the user’s Facebook account.”[163]
VI. Creating a New Regime
The data privacy provisions contained by the aforementioned state laws and the GDPR should be instructive in identifying potential provisions of a data-protection framework aimed at combatting data-opolies. First, an effective data privacy regime tailored towards promoting competition in digital markets should prohibit data-opolies from preventing their competitors from using the data. This could be done directly with a blanket ban on such conduct, or by an affirmative obligation of data sharing and interoperability. Additionally, a regulatory framework could prohibit the cross-referencing of data across applications or platforms, which would limit the ability of data-opolies to take advantage of economies of scale. Data-opolies could be forced to pay users for their data, either directly or through a data licensing organization, thus allowing consumers to leverage their power as data sellers.
Alternatively, this could be accomplished indirectly by vesting users with the right to make the decision of how their data is used. Vesting users with an individual, property-like right in their data is likely to be effective for several reasons. With respect to protecting the rights of individuals, user consent is likely to be ineffective, as user consent is unlikely to be freely given since access to the services provided by data-opolies is provided on a take-it-or-leave-it basis.[164] Allowing consumers to learn what data has been collected is a notable commonality of many of the recently enacted or pending privacy laws discussed in Part V, but is unlikely to pose a serious deterrent to the data-opoly. Indeed, Washington’s Privacy Act,[165] which provides for as much, has in fact been endorsed by Amazon.[166] However, giving users a property right in their data, and creating a private right of action for violations of this right, avoids this pitfall. Furthermore, because property rights are enforceable in rem, individuals who have had their data rights violated could potentially hold future users of that data liable, increasing the risk for data-opolies of data misappropriation.[167] Allowing individual consumers to bring lawsuits under a private right of action would also circumvent two shortcomings of the existing antitrust framework: the current tendency of regulatory agencies to underenforce antitrust laws,[168] and the strict injury requirements that the courts have imposed on private plaintiffs bringing antitrust actions.[169]
While a private right of action would likely help to deter anticompetitive data collection, an effective data protection regime, especially one created with the goal of protecting consumers from the exploitative practices of the data-opolies, would be greatly strengthened by an effective enforcement mechanism. The GDPR, for instance, created the European Data Protection Board to oversee enforcement of the GDPR among EU member states.[170] The United States could just as easily establish a federal agency tasked with protecting individual data rights. Alternatively, in the United States the chief enforcer of most federal privacy statutes is the Federal Trade Commission;[171] expanding the jurisdiction of the FTC to handle more robust data privacy regulations would be fairly in line with the agency’s mandate.[172]
Conclusion
Competition in the digital economy is in a precarious position. Data-opolies have come to dominate the country’s search engines, e-commerce websites, and social media platforms, and in doing so have seized control over some of the basic mechanisms through which American consumers use to interact with the digital world. The data-opoly problem is not just an economic problem, it’s a societal one.
Fortunately, regulators have a wide variety of tools available to them. At the federal level, regulators should be able to draw upon the examples from the European Union and from the various US states that have enacted or will enact data privacy schemes. Imposing restrictions similar to those proposed in Part VI of this Note will go a long way towards protecting competition from the anticompetitive behavior of data-opolies. In the past, it has been said that price is the “central nervous system of the economy.”[173] However, for the modern internet economy, at least for the data-opolies that operate in digital markets, the central nervous system may in fact be data. It is only logical that America’s regulatory framework adapt to the times by adopting a framework focused on data.
Benjamin M. Fischer
-
. Wayne D. Collins, Trusts and the Origins of Antitrust Legislation, 81 Fordham L. Rev. 2279, 2282 (2013). ↑
-
. “The term ‘Gilded Age’ was at first a pejorative term that emerged from the preoccupations of 1920s Young Intellectuals, particularly Van Wyck Brooks and Lewis Mumford.” Richard Schneirov, Thoughts on Periodizing the Gilded Age: Capital Accumulation, Society, and Politics, 1873-1898, 5 J. Gilded Age & Progressive Era 189, 193–94 (2006). ↑
-
. U.S. Bureau Of Census, Historical Statistics of the United States, Earliest Times to the Present: Millennial Edition, at ser. Aa2, 1-26 (Susan B. Carter et al. eds., 2006). ↑
-
. Id. at ser. Ad22, 1-547. ↑
-
. Id. at ser. Ca9, 3-24 to -25. ↑
-
. Id. at ser. Db164, 4-338. ser. Db164. ↑
-
. Id. at ser. Dd497, 4-652. ↑
-
. John A. James, Structural Change in American Manufacturing, 1850–1890, 43 J. Econ. Hist. 433, 434 (1983). ↑
-
. Id. ↑
-
. Naomi R. Lamoreaux, The Problem of Bigness: From Standard Oil to Google, 33 J. Econ. Persps. 94, 96 (2019). ↑
-
. Id. at 97. ↑
-
. Richard White, The Republic for Which It Stands: The United States during Reconstruction and the Gilded Age, 1865–1896 (2017). ↑
-
. Standard Oil Co. of N.J. v. United States, 221 U.S. 1, 75–77 (1911). ↑
-
. David Nasaw, Andrew Carnegie 570–88 (2006). ↑
-
. Id. at 560–80. ↑
-
. Nasaw, supra note 14, at 405–27. ↑
-
. See generally T.J. Stiles, The First Tycoon: The Epic Life of Cornelius Vanderbilt 474–517 (2009). ↑
-
. Walt Whitman, Democratic Vistas 12 (1871). ↑
-
. Sherman Antitrust Act of 1890, 15 U.S.C. §§ 1–7 (2004). The Act was specifically aimed at the railroad industry and Standard Oil, the latter of which dominated the petroleum industry. Richard B. McDermott, History and Identity of the Relevant Antitrust Statutes, 5 Tulsa L.J. 265, 267 (1968). Senator John Sherman, on the floor of the Senate discussing the Act, said, quoting Senator George,
These trusts and combinations are great wrongs to the people. They have invaded many of the most important branches of business. They operate with a double-edged sword. They increase beyond reason the cost of the necessaries of life and business and they decrease the cost of the raw material, the farm products of the country. They regulate prices at their will, depress the price of what they buy and increase the price of what they sell. They aggregate to themselves great, enormous wealth by extortion which makes the people poor. Then, making this extorted wealth the means of further extortion from their unfortunate victims, the people of the United States, they pursue . . . their ceaseless round of peculation under the law, till they are fast producing that condition in our people in which the great mass of them are the servitors of those who have this aggregated wealth at their command.
21 Cong. Rec. 2461 (1890). ↑
-
. The Sherman Act prohibits illegal restraints of trade, monopolization, attempts at monopolization, and conspiracy to monopolize. §§ 1–2. ↑
-
. Clayton Antitrust Act of 1914, 15 U.S.C. §§ 12–27, 29 U.S.C. §§ 52–53. The Clayton Act restricts price discrimination, discrimination in services or facilities, discrimination in rebates, discounts, and advertising service charges, underselling, price fixing, exclusive dealings, tying arrangements, anticompetitive mergers and acquisitions, and interlocking directorates and officers. ↑
-
. Federal Trade Commission Act, 15 U.S.C. §§ 41–58.
Under this Act, as amended, the Commission is empowered, among other things, to (a) prevent unfair methods of competition and unfair or deceptive acts or practices in or affecting commerce; (b) seek monetary redress and other relief for conduct injurious to consumers; (c) prescribe rules defining with specificity acts or practices that are unfair or deceptive, and establishing requirements designed to prevent such acts or practices; (d) gather and compile information and conduct investigations relating to the organization, business, practices, and management of entities engaged in commerce; and (e) make reports and legislative recommendations to Congress and the public.
Statutes Enforced or Administered by the Commission, Fed. Trade Comm’n, https://www.ftc.gov/enforcement/statutes [https://perma.cc/GZ86-VNHR]. ↑
-
. See, e.g., Standard Oil Co. of N.J. v. United States, 221 U.S. 1 (1911) (holding that Standard Oil was guilty of monopolization in violation of the Sherman Antitrust Act, and ordering that Standard Oil be divided into several distinct firms); United States v. Am. Tobacco Co., 221 U.S. 106 (1911) (holding that the American Tobacco Company violated the Sherman Antitrust Act, and ordering the breakup of the American Tobacco Company); N. Sec. Co. v. United States, 193 U.S. 197 (1904) (overturning the merger of the Great Northern and Northern Pacific railroad companies); United States v. Joint Traffic Ass’n, 171 U.S. 505 (1898) (finding a violation of the Sherman Antitrust Act); United States v. Trans-Mo. Freight Ass’n, 166 U.S. 290 (1897) (holding that the Sherman Antitrust Act applied to railroads, and that the Trans-Missouri Freight Association violated the Sherman Antitrust Act). ↑
-
. Robinson-Patman Act of 1936, ch. 592, 49 Stat. 1526 (codified at 15 U.S.C. §§ 13–13b, 21a). ↑
-
. Miller-Tydings Act, ch. 690, tit. VIII, 50 Stat. 693 (1937) (repealed 1975). ↑
-
. Celler-Kefauver Anti-Merger Act, P.L. 81-899, 64 Stat. 1125 (1950) (codified at 15 U.S.C. §§ 18, 21). ↑
-
. Hart-Scott-Rodino Antitrust Improvements Act, Pub. L. 94–435, 90 Stat. 1383 (1976) (codified at 15 U.S.C. § 18a). ↑
-
. “As of September 2020, the combined valuation of these platforms is more than $5 trillion—more than a third of the value of the S&P 100.” Maj. Staff Subcomm. on Antitrust, Com. and Admin. L., 116th Cong., Investigation of Competition in Digit. Mkts. 10 (Comm. Print 2020) [hereinafter Investigation of Competition]. ↑
-
. Id. at 12. ↑
-
. Sherman Antitrust Act of 1890, 15 U.S.C. §§ 1–7. ↑
-
. § 1. ↑
-
. § 2. ↑
-
. § 4. ↑
-
. See, e.g., United States v. Socony-Vacuum Oil Co., 310 U.S. 150, 223–24 (1940) (“Under the Sherman Act a combination formed for the purpose and with the effect of raising, depressing, fixing, pegging, or stabilizing the price of a commodity in interstate or foreign commerce is illegal per se. . . . Proof that a combination was formed for the purpose of fixing prices and that it caused them to be fixed or contributed to that result is proof of the completion of a price-fixing conspiracy under § 1 of the Act.”). ↑
-
. See, e.g., United States v. Addyston Pipe & Steel Co., 85 F. 271, 277 (6th Cir. 1898), aff’d as modified, 175 U.S. 211 (1899). ↑
-
. Nw. Wholesale Stationers, Inc. v. Pac. Stationery & Co., 472 U.S. 284, 294 (1985) (recognizing that “joint efforts by a firm or firms to disadvantage competitors by ‘either directly denying or persuading or coercing suppliers or customers to deny relationships the competitors need in the competitive struggle’” is per se illegal); Klor’s, Inc. v. Broadway-Hale Stores, Inc., 359 U.S. 207, 212 (1959) (“Group boycotts, or concerted refusals by traders to deal with other traders, have long been held to be in the forbidden category.”). ↑
-
. Eastman Kodak Co. v. Image Tech. Servs., Inc., 504 U.S. 451, 461 (1992) (defining when tying arrangements violate 15 U.S.C. § 1). ↑
-
. United States v. United Shoe Mach. Corp., 110 F. Supp. 295, 343 (D. Mass. 1953), aff’d, 347 U.S. 521 (1954); see also Jacobs v. Tempur-Pedic Int’l, Inc., 626 F.3d 1327, 1339 (11th Cir. 2010) (setting standard for motion to dismiss in antitrust cases). ↑
-
. 15 U.S.C. § 13. ↑
-
. § 14. ↑
-
. § 18. ↑
-
. § 15. ↑
-
. §§ 25–26. ↑
-
. Federal Trade Commission Act, 15 U.S.C. §§ 41–58. ↑
-
. § 45. ↑
-
. § 45(a). ↑
-
. Robinson-Patman Act, P.L. No. 74-692, 49 Stat. 1526 (1936) (codified at 15 U.S.C. §§ 13–13b, 21a). This Act was actually a consolidation of the Robinson-Patman Bill with the Borah-Van Nuys Bill. 80 Cong. Rec. 6,323–38 (1936). ↑
-
. § 13. ↑
-
. § 13a. ↑
-
. Id. ↑
-
. Miller-Tydings Act, ch. 690, tit. VIII, 50 Stat. 693 (1937) (repealed 1975). ↑
-
. McDermott, supra note 19, at 277. ↑
-
. Schwegmann Bros. v. Calvert Distillers Corp, 341 U.S. 384 (1951) (holding that the Miller-Tydings exemption only applied to the contracting parties of a fair-trade agreement). ↑
-
. Consumer Goods Pricing Act of 1975, Pub. L. No. 94-145, 89 Stat. 801. ↑
-
. Celler-Kefauver Act, Pub. L. No. 81-899, 64 Stat. 1125 (1950) (codified at 15 U.S.C. §§ 18, 21). ↑
-
. Hart-Scott-Rodino Antitrust Improvements Act, Pub. L. No. 94-435, 90 Stat. 1383 (1976) (codified at 15 U.S.C. § 18a). ↑
-
. See, e.g., United States v. Trans-Mo. Freight Ass’n, 166 U.S. 290 (1897) (interpreting the Sherman Act to reach all restraints of trade, not just unreasonable ones). Compare Brown Shoe Co. v. United States, 370 U.S. 294 (1912) (finding that a proposed merger might substantially lessen competition, despite the post-merger market share being less than 10 percent) with United States v. Phila. Nat’l Bank, 374 U.S. 321 (1963) (establishing a post-merger market share as 30 percent as a rough benchmark for raising an inference of anticompetitive effects); compare United States v. Aluminum Co. of Am., 148 F.2d 416 (2d. Cir. 1945) (recognizing a price squeeze as a theory of antitrust liability) with Pac. Bell Tel. Co. v. Linkline Commc’ns, Inc., 555 U.S. 438 (2009) (applying a neoclassical framework to reject price squeezes as a basis for antitrust liability). ↑
-
. See Verizon Commc’ns, Inc. v. Law Offices of Curtis V. Trinko, LLP, 540 U.S. 398, 414 (2004) (“Mistaken inferences and the resulting false condemnations ‘are especially costly, because they chill the very conduct the antitrust laws are designed to protect.’”) (citation omitted). ↑
-
. Investigation of Competition, supra note 28, at 393. See also Christopher Grandy, Original Intent and the Sherman Antitrust Act: A Re-examination of the Consumer-Welfare Hypothesis, 53 J. Econ. Hist. 359 (1993) (analyzing several competition interpretations of legislative intent). ↑
-
. Id. For example, in the recent T-Mobile–Sprint merger, Makan Delrahim, the Assistant Attorney General for the Antitrust Division of the Department of Justice, worked behind the scenes to facilitate the merger by connecting executives and providing instructions for lobbying legislators. Katie Benner & Cecilia Kang, How a Top Antitrust Official Helped T-Mobile and Sprint Merge, N.Y. Times (Feb. 11, 2020), https://www.nytimes.com/2019/12/19/technology/sprint-t-mobile-merger-antitrust-official.html [https://perma.cc/5FBM-NL85]. ↑
-
. Many contemporary antitrust scholars are highly critical of Bork’s scholarship (and influence in the judiciary). See, e.g., Christopher R. Leslie, Antitrust Made (Too) Simple, 79 Antitrust L.J. 917 (2014). However, I discuss Bork not to assess his arguments on the merits but to illustrate his influence in antitrust jurisprudence. As such, a thorough analysis of Bork’s work is beyond the scope of this Note. ↑
-
. Robert H. Bork, The Antitrust Paradox: A Policy at War with Itself (1978). ↑
-
. William E. Kovacic, The Chicago Obsession in the Interpretation of US Antitrust History, 87 U. Chi. L. Rev. 459, 471 (2020) [hereinafter Kovacic, The Chicago Obsession]. ↑
-
. Bork, supra note 62, at 55–66. ↑
-
. Id. at 405–07 (“The only goal that should guide interpretation of the antitrust laws is the welfare of consumers . . . In judging consumer welfare, productive efficiency, the single most important factor contributing to that welfare, must be given due weight along with allocative efficiency.”). ↑
-
. Id. at 164–75, 280–309, 365–81, 419–20. ↑
-
. Id. at 409–10; Leonard Orland, The Paradox in Bork’s Antitrust Paradox, 9 Cardozo L. Rev. 115, 121–22 (1987) (“With a bold assertion of judicial intervention, Professor Bork urges that if Congress passes antitrust legislation which does not pass the ‘efficiency’ litmus test, the Supreme Court should refuse to enforce the legislation.”). ↑
-
. See, e.g., Brooke Grp. Ltd. v. Brown & Williamson Tobacco Corp., 509 U.S. 209, 222–24 (1993) (requiring both pricing below cost and a dangerous probability of recoupment for predatory pricing claims); Matsushita Elec. Indus. Corp. v. Zenith Radio Corp., 475 U.S. 574, 589 (1985) (adopting Bork’s view that predatory pricing is rare because “the success of [predatory pricing] schemes is inherently uncertain: the short-run loss is definite, but the long-run gain depends on successfully neutralizing the competition”); Nw. Wholesale Stationers, Inc. v. Pac. Stationery & Printing Co., 472 U.S. 284 (1985); Continental T.V., Inc. v. GTE Sylvania, Inc., 433 U.S. 36 (1977); In re Echlin Mfg. Co., 105 F.T.C. 410, 486–87 (1985) (adopting Bork’s view that that ease of entry should lead to a finding of legality); United States v. Waste Mgmt., Inc, 743 F.2d 976, 983 (2d Cir. 1984). ↑
-
. Matsushita Elec. Indus. Corp., 475 U.S. at 574. ↑
-
. Id. at 589. See also Waste Mgmt., Inc., 743 F.2d at 983 (citing Bork, supra note 62, at 222). ↑
-
. See e.g., Detroit Auto Dealers Ass’n, Inc. v. FTC, 955 F.2d 457, 470 (6th Cir. 1992). ↑
-
. William E. Kovacic, The Antitrust Paradox Revisited: Robert Bork and the Transformation of Modern Antitrust Policy, 36 Wayne L. Rev. 1413, 1453 (1990) [hereinafter Kovacic, Revisited](citing Fed. Trade Comm’n, Statement of Federal Trade Commission Concerning Horizontal Mergers, reprinted in 4 Trade Reg. Rep. (CCH) ¶ 13,200 (1982)). ↑
-
. Professor Christopher R. Leslie argues that the enduring appeal of Bork’s argument is that it “present[s] a judge-friendly theory of economics that allowed judges to dismiss antitrust cases quickly,” which assumes that barriers to entry do not exist, “mak[ing] federal judges’ lives a lot easier because they do not have to worry about efficient rivals being illegally excluded from the market because if the rival were efficient, by definition, according to Bork, it would be able to compete.” Leslie, supra note 61, at 934. ↑
-
. Kovacic, Revisited, supra note 72, at 1450. ↑
-
. See, e.g., Kovacic, The Chicago Obsession, supra note 63 (arguing that the robustness of contemporary discourse surrounding American antitrust history suffers because it significantly overstates the dominance of the Chicago School); see generally William H. Page, Areeda, Chicago, and Antitrust Injury: Economic Efficiency and Legal Process, 41 Antitrust Bull. 909 (1996). ↑
-
. Phillip Areeda & Donald F. Turner, Antitrust Law: An Analysis of Antitrust Principles and their Application (1978). Although the phrase “Harvard School” can refer to two distinct periods of thought, Kovacic, The Chicago Obsession, supra note 63, at 468, in this Note it will be used exclusively to refer to the latter of the two. ↑
-
. Areeda & Turner, supra note 76. ↑
-
. Kovacic, The Chicago Obsession, supra note 63, at 475. ↑
-
. William E. Kovacic, The Intellectual DNA of Modern U.S. Competition Law for Dominant Firm Conduct: The Chicago/Harvard Double Helix, 2007 Colum. Bus. L. Rev. 1, 51–64 (2007). ↑
-
. Page, supra note 75, at 913. ↑
-
. Id. at 912. ↑
-
. Id. at 927. ↑
-
. 15 U.S.C. § 15. ↑
-
. Phillip E. Areeda, Antitrust Violations Without Damage Recoveries, 89 Harv. L. Rev. 1127, 1128 (1976). ↑
-
. Id. ↑
-
. 15 U.S.C. § 18. ↑
-
. Areeda & Turner, supra note 76, at 1129. ↑
-
. Id. at 1130. However, the tendency of the government to underregulate antitrust matters casts doubt on the strength of this argument. ↑
-
. Brunswick Corp. v. Pueblo Bowl-O-Mat, Inc., 429 U.S. 477, 489 (1977) (citations omitted). ↑
-
. Although recent developments, such as the suit filed by the Department of Justice against Google, Complaint, United States v. Google, LLC, No. 1:20-cv-03010 (D.D.C. Oct. 20, 2020), the suit filed by the State of New York and joined by forty-seven other states against Facebook, Complaint, New York v. Facebook, Inc., No. 1:20-cv-03589 (D.D.C. Dec. 9, 2020), the suit filed by the State of Colorado and joined by thirty-seven other states against Google, Complaint, Colorado v. Google, LLC, No. 1:20-cv-03715 (D.D.C. Dec. 17, 2020), and the suit filed by the FTC against Facebook, Complaint, In re Facebook, Inc., No. 1:20-cv-03590 (Jan. 1, 2021), suggest that antitrust enforcement is returning to the fold, it does not necessarily follow that the classical antitrust framework is finally catching up to the times. The Department of Justice’s suit, for instance, is extremely limited in scope, narrowly challenging Google’s dominance of the search market by use of a tying arrangement with Apple that makes Google the default search engine of all Apple iPhones. Press Release, U.S. Dep’t of Just., Justice Department Sues Monopolist Google for Violating Antitrust Laws (Oct. 20, 2020), https://www.justice.gov/opa/pr/justice-department-sues-monopolist-google-violating-antitrust-laws [https://perma.cc/28J9-S664]. It does not, however, address any of the anticompetitive concerns levied at Alphabet Inc., Google’s parent company, nor does it address any of Google’s other anticompetitive behaviors. ↑
-
. Areeda & Turner, supra note 76; Bork, supra note 62. ↑
-
. Investigation of Competition, supra note 28, at 11. ↑
-
. Id. ↑
-
. See supra Part II. Although applying the consumer welfare standard is not necessarily mutually exclusive with considering non-price related harms, such as product quality, in practice consumer price, as the most readily quantifiable measure of consumer harm, dominates. ↑
-
. Robert H. Bork, Antitrust and Google, Chi. Trib. (Apr. 6, 2012), https://www.chicagotribune.com/opinion/ct-xpm-2012-04-06-ct-perspec-0405-bork-20120406-story.html [https://perma.cc/Q3WX-K6EZ]. ↑
-
. See supra Section II.B. ↑
-
. Brunswick Corp. v. Pueblo Bowl-O-Mat, Inc., 429 U.S. 477, 489 (1977). ↑
-
. See e.g., Mireille Hildebrandt, Primitives of Legal Protection in the Era of Data-Driven Platforms, 2 Geo. L. Tech. Rev. 252, 256 (2018). ↑
-
. Lina M. Khan, Sources of Tech Platform Power, 2 Geo. L. Tech. Rev. 325, 329 (2018). ↑
-
. Id. ↑
-
. Julie Creswell, How Amazon Steers Shoppers to Its Own Products, N.Y. Times (June 23, 2018), https://www.nytimes.com/2018/06/23/business/amazon-the-brand-buster.html [https://perma.cc/ G872-E7Z6]. ↑
-
. Cf. Investigation of Competition, supra note 28, at 53. ↑
-
. Maurice E. Stucke, Should We Be Concerned About Dataopolies?, 2 GEO. L. TECH. REV. 275, 289 (2018). ↑
-
. Id. ↑
-
. Investigation of Competition, supra note 28, at 44. The Hart-Scott-Rodino Antitrust Improvements Act, 15 U.S.C. § 18a, established a minimum size of transaction threshold that is adjusted annually in response to changes in gross national product. Mergers that meet or exceed this threshold must file pre-merger notification with the FTC and wait a predetermined period of time before consummating the transaction. Id. ↑
-
. Colleen Cunningham, Florian Ederer, & Song Ma, Killer Acquisitions, 129 J. Pol. Econ. 649 (2021); Thomas Wollmann, Stealth Consolidation: Evidence from an Amendment to the Hart-Scott-Rodino Act, 1 Am. Econ. R. 77, 77–91 (2019). ↑
-
. Wollmann, supra note 106, at 92. ↑
-
. For example, the European Union’s General Data Protection Regulation (GDPR) implements “purpose limitation,” which requires companies to collect data only for a specific purpose, as well as “data minimization,” which requires companies to collect only data necessary to fulfill that specific purpose. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation), 2016 O.J. (L 119) 45 [hereinafter GDPR]. ↑
-
. Investigation of Competition, supra note 28, at 20. One notable example of a data portability requirement is Article 20 of the EU’s GDPR. Id. ↑
-
. The EU’s GDPR, for example, requires that data is processed only for a specific purpose and stored for no longer than necessary to accomplish that purpose. Id. For a longer list of use restrictions in the GDPR, see infra Section V.B. ↑
-
. For example, the consent decree entered in connection with the AT&T antitrust litigation required AT&T to divest itself of local operating companies, refrain for seven years from electronic publishing, and divide assets between the corporation and the divested companies. United States v. Am. Tel. & Tel. Co., 552 F. Supp. 131 (D.D.C. 1982), aff’d sub nom. Maryland v. United States, 460 U.S. 1001 (1983), and amended sub nom. United States v. W. Elec. Co., 714 F. Supp. 1 (D.D.C. 1988), aff’d in part, rev’d in part sub nom. United States v. W. Elec. Co., 900 F.2d 283 (D.C. Cir. 1990), and modified sub nom. United States v. W. Elec. Co., 890 F. Supp. 1 (D.D.C. 1995), vacated, 84 F.3d 1452 (D.C. Cir. 1996). ↑
-
. Investigation of Competition, supra note 28, at 20. ↑
-
. 85% of Americans are concerned about the amount of data online platforms store about them, and 81% are concerned that platforms are collecting and holding this data in order to build out more comprehensive consumer profiles. Consumer Reps., Platform Perceptions: Consumer Attitudes on Competition and Fairness in Online Platforms (2020), https://advocacy.consumerreports.org/wp-content/uploads/2020/09/FINAL-CR-survey-report.platform- perceptions-consumer-attitudes-.september-2020.pdf [https://perma.cc/2F67-WQYA]. ↑
-
. Id. ↑
-
. Although few in Congress have come out in favor of passing new antitrust laws, many scholars have. See, e.g., Steve Lohr, Forget Antitrust Laws. To Limit Tech, Some Say a New Regulator Is Needed, N.Y. Times (Oct. 22, 2020), https://www.nytimes.com/2020/10/22/technology/antitrust-laws-tech-new-regulator.html [https://perma.cc/EHM3-XZYV]. ↑
-
. Christopher Mims, Republicans and Democrats Find a Point of Agreement: Big Tech Is Too Powerful, Wall St. J. (July 30, 2020, 10:49 AM), https://www.wsj.com/articles/republicans-and-democrats-find-a-point-of-agreement-big-tech-is-too-powerful-11596118625 [https://perma.cc/7TEW-WQUS]. ↑
-
. “The collection and use of personal data by Google and Facebook for personalised advertising, in many cases with no or limited controls available to consumers, is another indication that these platforms do not face a strong enough competitive constraint.” Competition & mkts. Auth., Online Platforms and Digital Advertising: Market Study Final Report 318 (2020). ↑
-
. Investigation of Competition, supra note 28, at 80–81. ↑
-
. Id. at 208. In 2007, after Google acquired DoubleClick, an internet advertising firm, it promised the FTC that it would not combine this data with data gathered via the Google ecosystem. Dina Srinivasan, Why Google Dominates Advertising Markets: Competition Policy Should Lean on the Principles of Financial Market Regulation, 24 Stan. Tech. L. Rev. 55, 92 (2020). However, it later reneged on its commitment. Id. at 93. ↑
-
. Investigation of Competition, supra note 28, at 214. ↑
-
. Id. at 148. ↑
-
. Id. at 149. ↑
-
. Id. at 44. ↑
-
. Id. See also Cunningham, Ederer, & Ma, supra note 106; Wollmann, supra note 106. ↑
-
. Investigation of Competition, supra note 28, at 14. ↑
-
. Id. at 15. ↑
-
. Id. at 83–84. ↑
-
. Khan, supra note 99, at 329. This is anticompetitive because it enables Amazon to freeride on the research and development of those merchants that rely on Amazon Marketplace. ↑
-
. Competition & mkts. Auth., supra note 117, at 73 (identifying the most significant barriers to entry in the search market as “economies of scale in developing a web index; access to click-and-query data at scale; and Google’s extensive default positions”) ↑
-
. As of December 2020, Facebook had 1.84 billion daily active users and 2.80 billion monthly active users. Press Release, Facebook, Facebook Reports Fourth Quarter and Full Year 2020 Results (Jan. 17, 2021), https://s21.q4cdn.com/399680738/files/doc_news/Facebook-Reports-Fourth-Quarter-and-Full-Year-2020-Results-2021.pdf [https://perma.cc/4AFH-EGWQ]. ↑
-
. Competition & mkts. Auth., supra note 117, at 148. ↑
-
. Id. at 43. ↑
-
. Id. at 40–41. ↑
-
. Id. at 45–46. ↑
-
. Prac. L. Data Privacy Advisor, State Data Breach Laws Protected Personal Information Chart: Overview, 2015 WL 3938380 (2021). ↑
-
.
U.S. privacy laws only apply to certain classes of information—GLBA addresses financial data, [the Health Information Technology for Economic and Clinical Health Act (‘HITECH’)] and the Health Insurance Portability and Accountability Act (‘HIPAA’) govern health data, the Family Educational Rights and Privacy Act (‘FERPA’) regulates maintenance of educational records, and the Children’s Online Privacy Protection Act (‘COPPA’) applies to children’s data.
Alexandria Bradshaw, Emerging Trends in International Data Breach Law, 1 Geo. L. Tech. Rev. 143, 144 (2016). ↑
-
. Cal. Penal Code §§ 630–38 (West 2020). ↑
-
. Cal. Bus & Prof. Code §§ 22575–79 (West 2020). ↑
-
. Cal. Penal Code § 502 (West 2020). ↑
-
. See infra notes 152–160. ↑
-
. California Privacy Rights Act: An Overview, Priv. Rts. Clearing House (Dec. 10, 2020), https://privacyrights.org/resources/california-privacy-rights-act-overview [https://perma.cc/6QJN-MZWZ]. ↑
-
. Id. ↑
-
. 740 Ill. Comp. Stat. 14/99 (2020). ↑
-
. Tex. Bus & Com. Code Ann. § 503.001 (West 2020). ↑
-
. H.B. 1493, 65th Leg., 2017 Reg. Sess. (Wash. 2017). ↑
-
. S.B. 1392, 2021 Sess. 1 (Va. 2021). ↑
-
. S.B. 567, 2021-2022 Leg., 567th Reg. Sess. (N.Y. 2021). ↑
-
. S.B. 5062, 67th Leg, 2021 Reg. Sess. (Wash. 2021). ↑
-
. H.B. 1433, 67th Leg., 2021 Reg. Sess. (Wash. 2021). ↑
-
. S.B. 200, 2021 Gen. Sess. (Utah 2021). ↑
-
. H.B. 1602, 58th Leg, 2021 1st. Sess. (Okla. 2021). ↑
-
. GDPR, supra note 108. ↑
-
. Id., art. 1. ↑
-
. Id., art. 5. See also Id. art. 6 (establishing conditions for consent). ↑
-
. Id., art. 5. ↑
-
. Id. ↑
-
. GDPR, supra note 108, art. 15. ↑
-
. Id., art. 16. ↑
-
. Id., art. 17. Article 17 allows data subjects to have their data erased when the data is no longer necessary in relation to the purpose for which it was collected; for certain situations in which data subjects withdraw consent; when the data is unlawfully processed; when necessary to comply with a member nation’s law; and when necessary to comply with regulations governing child’s consent in relation to information society services. Id. ↑
-
. Id., art. 18. ↑
-
. Id., art. 20. ↑
-
. Id., art. 21. ↑
-
. Press Release, Bundeskartellamt, Preliminary Assessment in Facebook Proceeding: Facebook’s Collection and Use of Data from Third-Party Sources Is Abusive (Dec. 19, 2017), http://www.bundeskartellamt.de/SharedDocs/Meldung/EN/Pressemitteilungen/2017/19_1 2_2017_Facebook.html [https://perma.cc/GT5P-M8YA]. ↑
-
. See Stucke, supra note 103. ↑
-
. S.B. 5062, 67th Leg, 2021 Reg. Sess. (Wash. 2021). ↑
-
. Monica Nickelsburg, Why Washington State Could Finally Pass Data Privacy Laws with a Bill Backed by the Tech Industry, GeekWire (Jan. 26, 2021, 8:13 AM), https://www.geekwire.com/2021/washington-state-finally-pass-data-privacy-laws-bill-backed-tech-industry/ [https://perma.cc/E7BP-CQFK]. See also Mark Scott, How Lobbyists Rewrote Washington State’s Privacy Law, Politico (Apr. 26, 2019, 7:00 AM), https://www.politico.eu/article/how-lobbyists-rewrote-washington-state-privacy-law-microsoft-amazon-regulation/ [https://perma.cc/DW5E-XELX]. Facebook has endorsed similar policies. Erin Egan, Facebook, Charting a Way Forward, Communicating About Privacy: Towards People Centered and Accountable Design (2020), https://about.fb.com/wp-content/uploads/2020/07/Privacy-Transparency-White-Paper.pdf [https://perma.cc/CW6Z-WN3K]. ↑
-
. See Vlad A. Hertza, Fighting Unfair Classifications in Credit Reporting: Should the United States Adopt GDPR-Inspired Rights in Regulating Consumer Credit?, 93 N.Y.U. L. Rev. 1707, 1738–39 (2018) (arguing that within the context of consumer credit, property rights in credit data renders all processors liable and thus allows consumers to control the spread of their information). For a broader perspective on the distinction between liability rules and property rules and the rights and obligations that they incur, see Guido Calabresi & A. Douglas Melamed, Property Rules, Liability Rules, and Inalienability: One View of the Cathedral, 85 Harv. L. Rev. 1089, 1106–09 (1972). ↑
-
. See Verizon Commc’ns Inc. v. Law Offices of Curtis V. Trinko, LLP, 540 U.S. 398 (2004). ↑
-
. See Brunswick Corp. v. Pueblo Bowl-O-Mat, Inc., 429 U.S. 477, 489 (1977). ↑
-
. Michael L. Rustad & Thomas H. Koenig, Towards a Global Data Privacy Standard, 71 Fla. L. Rev. 365, 379 (2019). The European Commission, however, has found that the impact of the GDPR has been diminished by the dispersal of enforcement power across EU member states. Data Protection as a Pillar of Citizens’ Empowerment and the EU’s Approach to the Digital Transition – Two Years of Application of the General Data Protection Regulation, COM (2020) 264 final (June 24, 2020). ↑
-
. For example, the FTC enforces the Children’s Online Privacy Protection Act of 1998, 15 U.S.C. §§ 6501–6505, the Fair Credit Reporting Act, 15 U.S.C. § 1681, as well as the Federal Trade Commission Act, 15 U.S.C. §§ 41–58, the last of which “has been applied to both offline and online privacy and data security policies.” Rustad & Koenig, supra note 170, at 381; see also A Brief Overview of the Federal Trade Commission’s Investigative and Law Enforcement Authority, Fed. Trade Comm’n (May 2021) [hereinafter FTC A Brief Overview], https://www.ftc.gov/about-ftc/what-we-do/enforcement-authority [https://perma.cc/V2TE-HTF5]; Daniel J. Solove & Woodrow Hartzog, The FTC and the New Common Law of Privacy, 114 Colum. L. Rev. 583 (2014). ↑
-
. FTC A Brief Overview, supra note 171; cf. Statement of Chairman Joe Simons
and Commissioners Noah Joshua Phillips and Christine S. Wilson, In re Facebook, Inc., Fed. Trade Comm’n, (July 24, 2019), https://www.ftc.gov/system/files/documents/ public_statements/1536946/092_3184_facebook_majority_statement_7-24-19.pdf [https://perma.cc/L5S2-MP4T] (“The extent to which Facebook, or any other company, should be able to collect, use, aggregate, and monetize data, is something Congress should evaluate in its consideration of federal privacy legislation. Our 100-year-old statute does not give us free rein to impose these restrictions.”). ↑ -
. United States v. Socony-Vacuum Oil Co., 310 U.S. 150, 226 n.59 (1940). ↑