02:05 PM

Schwartz On Security: Online Privacy Battles Advertising Profits

Do businesses have the right to make money from the unregulated buying and selling of personal information?

That golden goose may go bye-bye if the government enshrines a person's right to online privacy. The White House is backing stronger privacy rights, as are three bills pending in the House and one in the Senate.

What might such legislation look like? Sens. John Kerry (D-Mass.) and John McCain (R-Ariz.) are co-sponsoring a "Privacy Bill of Rights." While the bill is still a work in progress, a recently leaked, draft version aims to regulate organizations that use, transfer, or otherwise handle personally identifiable information (PII) or unique identifier information relating to 5,000 or more people per year.

"Some provisions require businesses to comply with specific obligations when dealing with 'sensitive' PII, which is defined as PII which, if lost, compromised, or disclosed without authorization, could 'result in harm to an individual,'" said attorney Nicole Friess, an associate at Information Law Group, in a blog post.

Fines would run $16,500 per day, multiplied either by the number of days of noncompliance or the number of people harmed. "However, liability is capped at $2 million or $3 million depending on the nature of the violation," she said.

But many questions remain unanswered, such as what constitutes "tracking" or "harm." For example, in its comment on the FTC's privacy framework, the Mercatus Center at George Mason University made the humorous, but often true, observation: "How Do We Conduct Cost-Benefit Analysis When 'Creepiness' Is the Alleged Harm?" noted attorney Richard Santalesa, senior counsel at Information Law Group, in a blog post.

In fact, the Mercatus comment argues that consumers stand to gain more than they lose from tracking. "Importantly, nothing in the Commission's proceeding has thus far demonstrated that online data collection and 'tracking' represent a clear harm to consumers per se, or that any 'market failure' exists here," it said. "Such a showing would be difficult since using data to deliver more tailored advertising to consumers can provide important benefits to the public.

So let's put the question out there: Is better advertising worth the potential tradeoff of anyone being able to buy detailed information about your browsing habits, income, or medical conditions? Because with luck, you'll be able to decide.

2 of 2
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest September 7, 2015
Some security flaws go beyond simple app vulnerabilities. Have you checked for these?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-08
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

Published: 2015-10-08
Cybozu Garoon 3.x through 3.7.5 and 4.x through 4.0.3 mishandles authentication requests, which allows remote authenticated users to conduct LDAP injection attacks, and consequently bypass intended login restrictions or obtain sensitive information, by leveraging certain group-administration privile...

Published: 2015-10-08
The REST interface in Cisco Unified Communications Manager IM and Presence Service 11.5(1) allows remote attackers to cause a denial of service (SIP proxy service restart) via a crafted HTTP request, aka Bug ID CSCuw31632.

Published: 2015-10-08
Cisco Wireless LAN Controller (WLC) devices with software 7.0(240.0), 7.3(101.0), and 7.4(1.19) allow remote attackers to cause a denial of service (device outage) by sending malformed 802.11i management data to a managed access point, aka Bug ID CSCub65236.

Published: 2015-10-06
libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 21335999.

Dark Reading Radio
Archived Dark Reading Radio
What can the information security industry do to solve the IoT security problem? Learn more and join the conversation on the next episode of Dark Reading Radio.