Risk
3/30/2011
02:05 PM
50%
50%

Schwartz On Security: Online Privacy Battles Advertising Profits

Do businesses have the right to make money from the unregulated buying and selling of personal information?

That golden goose may go bye-bye if the government enshrines a person's right to online privacy. The White House is backing stronger privacy rights, as are three bills pending in the House and one in the Senate.

What might such legislation look like? Sens. John Kerry (D-Mass.) and John McCain (R-Ariz.) are co-sponsoring a "Privacy Bill of Rights." While the bill is still a work in progress, a recently leaked, draft version aims to regulate organizations that use, transfer, or otherwise handle personally identifiable information (PII) or unique identifier information relating to 5,000 or more people per year.

"Some provisions require businesses to comply with specific obligations when dealing with 'sensitive' PII, which is defined as PII which, if lost, compromised, or disclosed without authorization, could 'result in harm to an individual,'" said attorney Nicole Friess, an associate at Information Law Group, in a blog post.

Fines would run $16,500 per day, multiplied either by the number of days of noncompliance or the number of people harmed. "However, liability is capped at $2 million or $3 million depending on the nature of the violation," she said.

But many questions remain unanswered, such as what constitutes "tracking" or "harm." For example, in its comment on the FTC's privacy framework, the Mercatus Center at George Mason University made the humorous, but often true, observation: "How Do We Conduct Cost-Benefit Analysis When 'Creepiness' Is the Alleged Harm?" noted attorney Richard Santalesa, senior counsel at Information Law Group, in a blog post.

In fact, the Mercatus comment argues that consumers stand to gain more than they lose from tracking. "Importantly, nothing in the Commission's proceeding has thus far demonstrated that online data collection and 'tracking' represent a clear harm to consumers per se, or that any 'market failure' exists here," it said. "Such a showing would be difficult since using data to deliver more tailored advertising to consumers can provide important benefits to the public.

So let's put the question out there: Is better advertising worth the potential tradeoff of anyone being able to buy detailed information about your browsing habits, income, or medical conditions? Because with luck, you'll be able to decide.


Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7896
Published: 2015-03-03
Multiple cross-site scripting (XSS) vulnerabilities in HP XP P9000 Command View Advanced Edition Software Online Help, as used in HP Device Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Tiered Storage Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Replication Manager 6.x and 7.x before ...

CVE-2014-9283
Published: 2015-03-03
The BestWebSoft Captcha plugin before 4.0.7 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2014-9683
Published: 2015-03-03
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

CVE-2015-0890
Published: 2015-03-03
The BestWebSoft Google Captcha (aka reCAPTCHA) plugin before 1.13 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2015-2168
Published: 2015-03-03
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue in customer-controlled software. Notes: none.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.