In this section, we present the results of our effort to perform content analysis of data license agreements through both quantitative and qualitative approaches. We first extracted frequently used relevant words/phrases and then reviewed some samples.
5.4.2. Keyword Analysis for Questions
As per discussed above, we created 12 questions (see
Table 3) regarding ATPs’ data practices and used these queries to further analyze the agreements. The following are the results from the analysis of keywords for these questions. Analysis of some of the questions is presented in the
Supplementary Materials Section S3.
Question 1: Do the service provider agreements address ownership of my farm data after the data are collected and/or transferred?
The results presented in
Table 11 show that
ownership was mentioned in 19 policies only (13.47% of policies) which suggests that the keyword “
ownership” is not frequently used in FDLAs. The codes of conduct (e.g., the EU Code of Conduct on agricultural data sharing by contractual agreement) and best practices (e.g., Ag Data’s Core Principles) suggest that farmers are the owners of the data since data are generated on their farms or during their farming operations and the farmers must have the right to access and control the data. This recommendation was not reflected in the data agreements. However, ownership is a complex legal concept, and a clear definition does not exist. It is also impossible to clearly define ownership of farm data as many farm technologies are usually owned/accessed by the ATP, farm data reside in cloud storage providers, farm data are transferred through the network provided by the communication technologies, and also third parties have access and process farm data.
In addition to ownership, we analyzed the keywords that represented control over data such as control, access, transfer, change, delete, and other related words. These keywords illustrate whether ATPs allow farmers to have some level of control over their data, e.g., the ability to access or manage their data. It is noted that keywords such as access (86%), control (73%), disclose, delete, transfer, and retain are more frequently used in agreements in comparison to ownership. We also noted the word “own” is used in more than 70% of the agreements.
Observations: The following samples are taken from different data agreements which demonstrate how the term ownership is used in the agreements. It is noted that ownership is used in other contexts which are not related to ownership of farm data. For example, Sample text 2 mentions ownership of land and field boundaries. Another interesting example is Sample text 1. Although the service provider claims that farmers own their data, this claim does not include ownership of anonymized data. Interestingly, the service provider does not provide a clear explanation on what constitutes data ownership from legal and practical perspectives in their policies and also what constitutes anonymized data.
Sample text 1 related to Q1: Ownership of Your Data. At “our company”, we strongly believe that You own Your Data. “Your Data” means all data or information, electronic or otherwise, that is submitted by you in connection with the use of our Services and is identifiable to you. You exclusively own all rights, title and interest in and to all of Your Data. We do maintain a license to include Your Data in our anonymized, aggregated database in which individually identifiable information is masked. Your ownership does not include any anonymized databases we create.
Sample text 2 related to Q1: Land data, such as Your ownership and lease information related to field boundaries.
Question 2: If the service provider gets into a contract with other companies to provide data-related services, does the service provider require these companies to adhere to the original data agreements (privacy policies) that I have agreed to?
The results illustrate that
third party is the most frequent keyphrase used in the agreements (86.52%) (
Table 12).
Share is used 872 times in 77.30% of the policies.
Obligation is used in 60% of agreements and
adhere is used 31 times in around 14% of the contracts.
Observations: Some of the agreements, such as in Sample text 1, require that third parties should adhere to the data agreement that the farmers have agreed to. Other service providers (such as in Sample text 2) have clearly mentioned that they do not take any responsibility for the data practices of the third parties and also that farmers should consult the third party’s data practices. Such statements are very concerning as they suggest third parties have no legal constraints over use and misuse of farm data. It is observed that most of the data agreements did not have comprehensive third-party data sharing policies.
Sample text 1 related to Q2: This Privacy Statement does not address, and we are not responsible for, the privacy, information or other practices of any third parties, including any third party operating any website or service to which the Services link. The inclusion of a link on the Services does not imply endorsement of the linked site or service by us or by our affiliates.
Sample text 2 related to Q2: Handling of information: Your Data is held by our related companies and third party service providers in accordance with this Privacy Policy and on servers operated by third party service providers.
Question 3: Will the service provider notify me when its agreement changes?
Among these sets of words,
email is mentioned 1120 times in around 86% of the policies (
Table 13).
Notify is used 158 times in 58% of policies and
notice is used in 70% of the policies.
Communicate is used 554 times in 75% of the policies.
Update and
log are the other relevant frequent words related to this category.
Observations: The agreements do not refer to “change notifications” as frequently as expected and recommended. Instead, farmers are asked to read the current or updated version of the policies. For example, Sample text 3 mentions checking the policy to be aware of the changes. This is in contrast with many codes of conduct (e.g., the Australian Farm Data Code) and data privacy regulations (e.g., the GDPR) recommendations in which they put emphasis on “notice” and obtaining consent for any changes in data collection processing. This is one of the core steps ATPs can take to foster transparency. The GDPR goes one step further and recommends to companies to communicate the changes in such a way that the user will notice them [
45]. This could be achieved in the form of sending notifications through email or adding information to the privacy settings, apps, and through other means. Despite these recommendations, some ATPs assume acceptance of new/revised agreements after “an update” without providing a user-friendly notice (Sample text 3).
Sample text 1 related to Q3: From time to time, we may update this Privacy Statement to reflect new or different privacy practices. We will place a notice on our homepage when we make material changes to this Privacy Statement. Additionally, if the changes will materially affect the way we use or disclose previously collected Personal Information, we may also notify you about the change by sending a notice to you.
Sample text 2 related Q3: This Policy was last updated on 24 May 2018. We reserve the right to revise this Policy at any time and, as such, you should review its terms each time that you use our website or application. Any changes to this Policy will be promptly communicated on this page, but will not go into effect until at least five (5) days after they are posted.
Sample text 3 related to Q3: The “Last Updated” legend at the top of this Privacy Statement indicates when this Privacy Statement was last revised. Any changes will become effective when we post the revised Privacy Statement on the Services. Your use of the Services following these changes means that you accept the revised Privacy Statement.
Question 4: Will the service provider notify me if a breach of data security occurs that causes disclosure of my data to an outside party?
The most frequent keywords related to this query are
secure,
disclose, and
unauthorize. Keywords such as
threat,
compromise,
attack,
disaster, and
ransomware are used very rarely in policies (
Table 14). These keywords only exist in 1% to 17% of the policies.
Breach is used 96 times in only 27% of the policies.
Observation: Data security is another important data practice that is recommended by all data privacy regulations and several codes of conduct. This data practice requires that ATPs clearly explain what security measures and safeguards they use in order to keep the farm data secure. This also includes notifying the farmers and other stakeholders about data breach incidents, in particular, if data breaches compromise farmers’ personal/sensitive data. From our analysis, we have found that the ATPs mention data security measures in 86% of agreements. For example, Sample text 1 and Sample text 2 have referred to some data security practices such as encryption and password protection. However, many of the agreements do not mention notifying farmers/users about data breaches or data disclosure. Only a few companies (such as in Sample text 3) have mentioned that they would notify farmers about data breaches within two weeks. Furthermore, some of the companies (shown in Sample text 4) mention data security practices but do not guarantee that personal information will be secure.
Sample text 1 related to Q4: “Our company” stores your personal data on secure on-site servers or secure cloud servers. These servers are further secured by administrative restricted, password protected precautions.
Sample text 2 related to Q4: For example, we use industry-standard encryption technology to secure your Financial Account Information and other sensitive Personal Information when it is being collected and transmitted over the Internet.
Sample text 3 related to Q4: In order to be in line with Fair Information Practices, we will take the following responsive action, should a data breach occur: We will notify you via email within 2 weeks.
Sample text 4 related to Q4: We seek to use reasonable organizational, technical and administrative measures to protect Personal Information within our organization. Unfortunately, no data transmission or storage system can be guaranteed to be 100% secure. If you have reason to believe that your interaction with us is no longer secure, please immediately notify us in accordance with the “Contacting Us” section below.
Question 5: Upon my request, can my original dataset be deleted when my contract with the service provider terminates?
For this query,
request is the most frequent keyword which was used 1128 times in 85% of the policies (
Table 15). Other frequent keywords are
delete,
remove,
terminate,
cancel,
backup,
erase, and
erasure.
Observations: Acceptance of requests for data deletion is recommended in most of the data privacy regulations (e.g., the right to erasure in the GDPR) and codes of conduct (e.g., the Australian Farm Data Code). Some ATPs (e.g., Sample text 1) allow requests for data deletion. However, words such as ‘make our best effort’ and ‘where permissible’ are used which allow them to decline or ignore such requests without a clear justification. Also, some agreements (Sample text 2 and Sample text 3) have mentioned that personal information may continue to exist in the backup even after the deletion of personal information. This can be due to the fact that deleting every single record in the backup can be challenging. However, there are many best practices and standards that can be implemented for tracking backup data in the cloud environment. ATPs should ensure that personal information is deleted as per farmers’ and other legitimate users’ requests.
Sample text 1 related to Q5: Where permissible, we will also delete your personal data upon request; please see the Contact Us information below to make such a request.
Sample text 2 related to Q5: If you request that your name be removed from our databases, it may not be possible to completely delete all your Personal Information due to technological and legal constraints.
Sample text 3 related to Q5: Personal information that is no longer required will be destroyed, erased or made anonymous, although copies of deleted information may continue to exist on backup media. When destroying personal information, we delete electronically stored personal information and share any tangible materials containing personal information. While we will endeavour to destroy all copies of personal information, you acknowledge that deleted information may continue to exist on back-up media but will not be used unless permitted by law.
Sample text 4 related to Q5: We retain information for as long as reasonably necessary to deliver our Services to you or to fulfill the purposes described in this Policy, or as required by law. To request the deletion of your personal information, please send us an email at…. We will make our best effort to delete all personal information about you. However, please note that certain information, including other information, may be retained in backup databases.
Question 6: Will the service provider obtain my consent before providing other companies with access to my data?
Our observation shows that
third party and
access are the most frequent keyphrases which are used in 87.94% and 86.52% of the policies, respectively (
Table 16). The other frequent words are
purpose which is used in 63.68% of the policies,
disclose,
consent is mentioned in around 77% of the policies,
disclosure is used in 65.95% of the policies.
The following are samples of text which are related to the query. ‘Consent’ is mentioned in these texts.
Observation: Obtaining consent is an important data practice which is recommended and, in some cases, enforced by the data protection legislation (e.g., the GDPR) and codes of conduct (e.g., the Australian Farm Data code, the EU code of conduct on agricultural data sharing on contractual agreement). It is observed that consent is mentioned in most of the agreements. However, it is expected that the ATPs collect farm data through informed consent to ensure transparency. Some sample texts are included below. Sample text 1 mentions obtaining consent before transferring information to third parties. Sample text 2 mentions that the individuals can withdraw their consent to processing of data and the service provider collects information from third parties with the consent of the individual.
Sample text 1 related to Q8: We do not disclose any personal information to any third party without your informed consent unless we are required by law to disclose the information.
Sample text 2 related to Q8: Individuals can deny or withdraw their consent to AGI’s collection, use and disclosure of their personal information at any time upon reasonable notice, subject to any legal or contractual requirements. However, if consent is denied or withdrawn, AGI may not be able to provide certain products or services.
Occasionally, “our company” may collect personal information from third party sources, but only with the knowledge and consent of the individual or where otherwise authorized by law.
Question 7: What categories of farm-related data do the product or service collect from my farm?
Our results suggest that information related to farms such as land, animal health, machinery, or other non-identifiable information is not frequently mentioned in data agreements (
Table 17). For example, keywords such as
camera and
sensors are used in 15.60% and 25.53% of the agreements, respectively. Other relevant keywords are
machine (used in 27.65% of the agreements),
land (occurred in 43.26% of the agreements),
equipment (occurred in 24.82% of the agreements), and
non-identifiable (occurred in 7.09% of the agreements).
Observations: Some of the codes of conduct (e.g., the Australian Farm Data Code) recommend that the ATPs clearly explain what type of data is collected from the farms and farming operations to ensure transparency. However, only some of the agreements mention data collection from farms. The data agreements, in general, do not extensively mention the information regarding farm data.
Sample text 1 related to Q9:
Machine Data is data generated by, collected by, or stored in your equipment or any hardware or device interfacing with your equipment. Machine data includes the location of your equipment, the number of engine hours of your equipment, data regarding equipment operation (such as quantity of fuel used), and equipment diagnostic data.
Sample text 2 related to Q9: Livestock Information: We collect data on livestock you select for tagging and monitoring through the Services, including information on health and animal history, when you voluntarily install our DoggTag and DoggBone products in your herd and/or subscribe to the Services.
Sample text 3 related to Q9: The Services also may receive certain data from a drone that you connect to the mobile device that uses our mobile application, such as motion sensor data, visual and sonic sensor data, GPS sensor data, battery level and images captured by a camera. This Privacy Policy may refer to any such data collected from your device or drone as “device data”.
Question 8: What categories of personal (sensitive) data does the product or service collect from me?
It is observed that the collection of personal information is discussed in the majority of the agreements. For example,
email is used in 86.52% of the agreements, and
address is used in 85.10% of the agreements. Location data is a very sensitive data point that is used in 70% of the data agreements.
Name is used in 80% of the data agreements and
age is used in 89% of the agreements.
Phone is used in 56% of the data agreements (
Table 18).
Observations: The codes of conduct (e.g., the Australian Farm Data Code) recommends being transparent about the collection of personal information. Transparency about collection of personal data is also encouraged by many privacy regulations. In our analysis, it is observed that the collection of personal information is discussed more extensively in the agreements as compared to farm data collection.
Sample text 1 related to Q10: The type of information that AGI may collect from individuals depends upon the Authorized Purpose for which it is being collected. This information may include, for example, name, email address, address, telephone number, fax number, information regarding your use of AGI’s website, products or services, and other information individuals choose to provide.
Sample text 2 related to Q10: We may use your device’s physical location to provide you with personalized location-based services and content.