Digital Sovereignty 1.2 - Digital Transformation is Based on Data Sovereignty

In the course of the ongoing digital transformation data owners will become part of the value chain - our data are valuable - we have to charge for their use!

Data are Entering Blue and White Collar Work

Digital transformation processes, as we know them from the first Internet hype in the year 2000, are entering more and more areas of our society. You find them in the ongoing industrial automation (Industry 4.0), automated driving of cars (autonomous vehicles) and the overall influence of information technology (IT) on mobility (integrated traffic management), or the automation of energy production and its distribution in the optimization of energy use.

 The effects of the digital transformation on human beings is still in hot debate. However, we may expect that

  • the progress in sensor technology,
  • the processing of huge amounts of data,
  • and the still growing transmission speed of communications networks with highest availability

will enforce major adaptation efforts on us. Many of today’s work processes will be performed by machines. For example, already now we have replaced the travel agent by doing travel plans and bookings ourselves in combination with electronic booking services. Such changes can be compared with the dramatic changes the steam engine has brought to society in the 1800s.

It is our data as users and consumers of services which make new Internet services useful!

Therefore, we should check how the digital transformation affects the value added and where we as humans could contribute to the value added chain in the future. Many of today’s services depend on data, which are provided by the service users. This will even increase in the future as more work processes will be implemented by digital services. Let us look at a few examples:

  • Internet based advertising does cannot be successful without an excellent understanding of the behavior of search engine or social network users.
  • Streaming services are optimized following actual user behavior.
  • Car insurance companies are adapting their offerings to the driving habits of their customers.
  • New power meters track the power consumption of individual households and assure the required generation of power.
  • The growing mobility requirements in cities and mega cities require a much more detailed planning based on the individuals’ mobility profiles.
  • More examples are visible or will shortly be available following the spreading digital transformation …

So, should we check out the following four important questions:

  • Have we been asked to make the required data available?
  • Are we paid for our data (contribution) to the evolution of services?
  • What is the (€) value or our data?
  • Do we have to give our data away as a present to be able to use a service?

Digital Transformation – from the (Knowledge) Worker to the Owner of Knowledge

Should we not introduce a price to be paid for our data to compensate for the expected transformation of work processes? This would only be possible, if we were sovereign of our data and could control and manage their use as appropriate. And a data market needs to be established.

Data protection and data security (cyber security) is getting a lot of attention due to the still increasing dangers. Critical infrastructures such as power generation, hospitals, passport agencies are not possible without IT – their protection is pushed heavily.

However, our Digital Sovereignty is mostly ignored in public discussions. Many Internet business models will not be profitable without our data! We have to change our perception and become fully conscious of the value added by our data. And we have to demand adequate appreciation of the provided data from businesses and politics. Consumer support groups and data protection agencies may be able to help.


Read more on secure services and data sovereignty:

  1. Security as differentiator
    Data Protection THE Business Driver for New Apps and Services
    Digital Transformation is Based on Data Sovereignty (this report)
  2. Security Architectures
    Architectures for Secure Internet Services
  3. Security Technologies
    in preparation
  4. Regulierung und Datenschutz
    in preparation
  5. Data Sovereignty
    Digital Sovereignty - What is it?
    Digital Sovereignty – why we need it
    Data Sovereignty - Why Do We Give It Up?