Government officials tell companies at Web 2.0 Summit that they are asking for trouble if they collect data first and ask questions later.
10 Lessons Learned By Big Data Pioneers
(click image for larger view and for slideshow)
Would-be data miners were urged to dig carefully at the Web 2.0 Summit in San Francisco on Tuesday.
Ann Cavoukian, information and privacy commissioner of Ontario, Canada, and David Vladeck, director of the Federal Trade Commission's Bureau of Consumer Protection, took turns advising the entrepreneurs and business leaders in the audience to gather only data that's necessary and to do so in a way that respects user privacy.
Cavoukian advocated what she called privacy by design, building privacy protections into products because it's better business and better for consumers. Privacy and business interests are not a zero-sum game, she insisted. It can be a positive-sum game, where businesses can gain better, more actionable information by involving consumers in the process.
Businesses have a choice between privacy-by-design or privacy-by-disaster, she suggested.
"Privacy is about control," said Cavoukian. "The individual should control what happens to the information."
[ Facebook has been mentioned frequently at the Web 2.0 Summit because it has so much data. Ironically, its biggest problem may be that it presents users with too much information. ]
If Cavoukian's vision of proactive privacy protection represented the carrot, Vladeck described the stick. As the U.S. government's consumer privacy enforcer, Vladeck acknowledged that the business leaders in the audience didn't want to hear from him and he insisted that he didn't want to hear about them.
Don't collect data you don't need, urged Vladeck. "It's an albatross that can come back and really bite you," he said.
He urged entrepreneurs to familiarize themselves with privacy laws like the Children's Online Privacy Protection Act, which forbids the collection of personal information from children under 13 without parental consent. He cited the FTC's recent settlement with mobile app maker Broken Thumb Apps as an example of how companies can get in trouble when they fail to follow the law.
And lest anyone be tempted to ignore the call to self-regulate, Danny Weitzner, from the White House Office of Science and Technology Policy, spoke briefly to remind conference attendees that the openness of the Internet should not be taken for granted.
Those who have been paying attention to the global tide of Internet policy will know that the tradition of leaving the Internet loosely regulated is being reevaluated in various countries, he said. This is happening not just in countries like China but in European countries like Germany, he said.
The message coming out of these sessions was clear: Be careful with your data, or be prepared to deal with regulators.
Published: 2015-05-21 Multiple cross-site request forgery (CSRF) vulnerabilities in Simple PHP Agenda 2.2.8 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator via a request to auth/process.php, (2) delete an administrator via a request to auth/admi...
Published: 2015-05-21 Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596.
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.