FPF-Safe-Harbor-Report1.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
White Paper Swire US EU Surveillance
December 17, 2015 US Surveillance Law, Safe Harbor, and Reforms Since 2013 Peter Swire1 Executive Summary: This White Paper is a submission to the Belgian Privacy Authority for its December 18, 2015 Forum on “The Consequences of the Judgment in the Schrems Case.”2 The Forum discusses the decision by the European Court of Justice in Schrems v. Data Protection Commissioner3 that the EU/US Safe Harbor was unlawful under the EU Data Protection Directive, particularly due to concerns about US surveillance law. For the Forum, I have been asked to comment on two issues: 1) Is US surveillance law fundamentally compatible with E.U. data protection law? 2) What actions and reforms has the US taken since the Snowden revelations began in June 2013? The White Paper draws on my background as a scholar of both EU data protection law and US surveillance law. It addresses serious misunderstandings of US national security law, reflected in official statements made in the Schrems case and elsewhere. It has three chapters: (1) The fundamental equivalence of the United States and EU member States as constitutional democracies under the rule of law. In the Schrems decision, the US was criticized for failing to ensure “a level of protection of fundamental rights essentially equivalent to that guaranteed in the EU legal order.” This chapter critiques that finding, instead showing that the United States has strict rule of law, separation of powers, and judicial oversight of law enforcement and national security 1 Peter Swire is the Huang Professor of Law and Ethics at the Georgia Tech Scheller College of Business and a Senior Fellow of the Future of Privacy Forum. -
|||GET||| Google+ for Business How Googles Social Network Changes
GOOGLE+ FOR BUSINESS HOW GOOGLES SOCIAL NETWORK CHANGES EVERYTHING 2ND EDITION DOWNLOAD FREE Chris Brogan | 9780789750068 | | | | | Google Maps is the new social network Here's a quick recap of Google's social media moves in February 8 : The Wall Street Journal reports Google prepared to unveil a Google+ for Business How Googles Social Network Changes Everything 2nd edition component to Gmail that would display a stream of "media and status updates" within the web interface. More Insider Sign Out. Google then goes out and gathers relevant content from all over the Web. Facebook vs. July 15, The Internet is a great tool for job hunting, but it Google+ for Business How Googles Social Network Changes Everything 2nd edition also made competing for a job much more challenging. Location-based services: Are they there yet? June Digg co-founder Kevin Rose posts a tweet that a "very credible" source said Google would be launching a Facebook competitor, called Google Me "very soon. Because each of these tools operates differently and has its own set of goals, the specific tactics will vary greatly for each of the sites. Although there isn't any word on specific product details David Glazer, engineering director at Google confirms the company will invest more effort to make its services more "socially aware" in a recent blog post. My next post will examine some of the strategies and tactics that can be used to generate new business from each of these social networking tools. The purchase rehashed speculation that the search giant is interested in working its way into social media, possibly with a game-centered service called "Google Me. -
7 October 2019 Dear Mr. Zuckerberg, OPEN LETTER
7 October 2019 Dear Mr. Zuckerberg, OPEN LETTER: FACEBOOK’S END-TO-END SECURITY PLANS The organizations below write today to encourage you, in no uncertain terms, to continue increasing the end-to-end security across Facebook’s messaging services. We have seen requests from the United States, United Kingdom, and Australian governments asking you to suspend these plans “until [Facebook] can guarantee the added privacy does not reduce public safety”. We believe they have this entirely backwards: each day that platforms do not support strong end-to-end security is another day that this data can be breached, mishandled, or otherwise obtained by powerful entities or rogue actors to exploit it. Given the remarkable reach of Facebook’s messaging services, ensuring default end-to-end security will provide a substantial boon to worldwide communications freedom, to public safety, and to democratic values, and we urge you to proceed with your plans to encrypt messaging through Facebook products and services. We encourage you to resist calls to create so-called “backdoors” or “exceptional access” to the content of users’ messages, which will fundamentally weaken encryption and the privacy and security of all users. Sincerely, 1. 7amleh-The Arab Center for Social Media Advancement 2. Access Now 3. ACM US Technology Policy Committee 4. ACT | The App Association 5. AfroLeadership 6. Alternatives 7. American Civil Liberties Union 8. Americans for Prosperity 9. APADOR-CH 10. ARTICLE 19 11. Asociación Argentina de Usuarios de Internet - Internauta Argentina 12. Asociación Colombiana de Usuarios de Internet 13. Asociación por los Derechos Civiles (ADC), Argentina 14. -
NOTHING to HIDE: Tools for Talking (And Listening) About Data Privacy for Integrated Data Systems
NOTHING TO HIDE: Tools for Talking (and Listening) About Data Privacy for Integrated Data Systems OCTOBER 2018 Acknowledgements: We extend our thanks to the AISP Network and Learning Community, whose members provided their support and input throughout the development of this toolkit. Special thanks to Whitney Leboeuf, Sue Gallagher, and Tiffany Davenport for sharing their experiences and insights about IDS privacy and engagement, and to FPF Policy Analyst Amy Oliver and FPF Policy Intern Robert Martin for their contributions to this report. We would also like to thank our partners at Third Sector Capital Partners and the Annie E. Casey Foundation for their support. This material is based upon work supported by the Corporation for National and Community Service (CNCS). Opinions or points of view expressed in this document are those of the authors and do not necessarily reflect the official position of, or a position that is endorsed by, CNCS or the Social Innovation Fund. TABLE OF CONTENTS Introduction ............................................................................................................................................................................................................................. 2 Why engage and communicate about privacy? ................................................................................................................................................. 2 Using this toolkit to establish social license to integrate data ..................................................................................................................... -
January 11, 2015 President Barack Obama the White House 1600 Pennsylvania Avenue NW Washington, DC 20500 Access Now 1110 Vermont
January 11, 2015 President Barack Obama The White House 1600 Pennsylvania Avenue NW Washington, DC 20500 Access Now 1110 Vermont Avenue NW Suite 500 Washington, DC 20005 Dear President Obama, We urge you to protect the security of your citizens, your economy, and your government by supporting the development and use of secure communications tools and technologies, rejecting policies that would prevent or undermine the use of strong encryption, and urging other leaders to do the same. Encryption tools, technologies, and services are essential to protect against harm and to shield our digital infrastructure and personal communications from unauthorized access. The ability to freely develop and use encryption provides the cornerstone for today’s global economy. Economic growth in the digital age is powered by the ability to trust and authenticate our interactions and communicate and conduct business securely, both within and across borders. Some of the most noted technologists and experts on encryption recently explained that laws or policies that undermine encryption would “force a U-turn from the best practices now being deployed to make the Internet more secure,” “would substantially increase system complexity” and raise associated costs, and “would create concentrated targets that could attract bad actors.”1 The absence of encryption facilitates easy access to sensitive personal data, including financial and identity information, by criminals and other malicious actors. Once obtained, sensitive data can be sold, publicly posted, or used -
Kids & the Connected Home
KIDS & THE CONNECTED HOME: PRIVACY IN THE AGE OF CONNECTED DOLLS, TALKING DINOSAURS, AND BATTLING ROBOTS DECEMBER 2016 Acknowledgements Future of Privacy Forum (FPF) and Family Online Safety Institute (FOSI) would like to thank the participants and attendees of "Kids and the Connected Home" (July 20, 2016), as well as the following individuals who contributed to the research and analysis in this paper: Carolina Alonso, Legal & Policy Fellow, Future of Privacy Forum Stacey Gray, Policy Counsel, Future of Privacy Forum Emma Morris, Global Policy Manager, Family Online Safety Institute Jennifer Hanley, Director, Legal & Policy Family Online Safety Institute Steven Anderson, Legal Intern, Future of Privacy Forum Hengyi Jiang, Legal Intern, Future of Privacy Forum Emily S. Tabatabai, Of Counsel, Orrick Herrington & Sutcliffe TABLE OF CONTENTS Executive Summary ............................................................................................................................................... 1 I. The Landscape: Connected Toys Are Increasingly Popular and Often Use Children's Data to Enable Interactive Play ................................. ....................................................................................................... 2 Connected Toys Differ from Other Toys Because They Collect, Use, and Share Data Via the Internet. ................................ ................................................................................................................ 2 Connected Toys Use a Variety of Technical Methods -
Jon Leibowitz, Chairman J. Thomas Rosch Edith Ramirez Julie Brill
102 3136 UNITED STATES OF AMERICA FEDERAL TRADE COMMISSION COMMISSIONERS: Jon Leibowitz, Chairman J. Thomas Rosch Edith Ramirez Julie Brill ____________________________________ ) In the Matter of ) ) GOOGLE INC., ) a corporation. ) DOCKET NO. C-4336 ____________________________________) COMPLAINT The Federal Trade Commission, having reason to believe that Google Inc. (“Google” or “respondent”), a corporation, has violated the Federal Trade Commission Act (“FTC Act”), and it appearing to the Commission that this proceeding is in the public interest, alleges: 1. Respondent Google is a Delaware corporation with its principal office or place of business at 1600 Amphitheatre Parkway, Mountain View, CA 94043. 2. The acts and practices of respondent as alleged in this complaint have been in or affecting commerce, as “commerce” is defined in Section 4 of the FTC Act. RESPONDENT’S BUSINESS PRACTICES 3. Google is a technology company best known for its web-based search engine, which provides free search results to consumers. Google also provides various free web products to consumers, including its widely used web-based email service, Gmail, which has been available since April 2004. Among other things, Gmail allows consumers to send and receive emails, chat with other users through Google’s instant messaging service, Google Chat, and store email messages, contact lists, and other information on Google’s servers. 4. Google’s free web products for consumers also include: Google Reader, which allows users to subscribe to, read, and share content online; Picasa, which allows users to edit, post, and share digital photos; and Blogger, Google’s weblog publishing tool that allows users to share text, photos, and video. -
EPIC FTC Google Purchase Tracking Complaint
Before the Federal Trade Commission Washington, DC In the Matter of ) ) Google Inc. ) ) ___________________________________) Complaint, Request for Investigation, Injunction, and Other Relief Submitted by The Electronic Privacy Information Center (EPIC) I. Introduction 1. This complaint concerns “Store Sales Measurement,” a consumer profiling technique pursued by the world’s largest Internet company to track consumers who make offline purchases. Google has collected billions of credit card transactions, containing personal customer information, from credit card companies, data brokers, and others and has linked those records with the activities of Internet users, including product searches and location searches. This data reveals sensitive information about consumer purchases, health, and private lives. According to Google, it can track about 70% of credit and debit card transactions in the United States. 2. Google claims that it can preserve consumer privacy while correlating advertising impressions with store purchases, but Google refuses to reveal—or allow independent testing of— the technique that would make this possible. The privacy of millions of consumers thus depends on a secret, proprietary algorithm. And although Google claims that consumers can opt out of being tracked, the process is burdensome, opaque, and misleading. 3. Google’s reliance on a secret, proprietary algorithm for assurances of consumer privacy, Google’s collection of massive numbers of credit card records through unidentified “third-party partnerships,” and Google’s use of an opaque and misleading “opt-out” mechanism are unfair and deceptive trade practices subject to investigation and injunction by the FTC. II. Parties 4. The Electronic Privacy Information Center (“EPIC”) is a public interest research center located in Washington, D.C. -
Recommendations for Businesses and Policymakers Ftc Report March 2012
RECOMMENDATIONS FOR BUSINESSES AND POLICYMAKERS FTC REPORT FEDERAL TRADE COMMISSION | MARCH 2012 RECOMMENDATIONS FOR BUSINESSES AND POLICYMAKERS FTC REPORT MARCH 2012 CONTENTS Executive Summary . i Final FTC Privacy Framework and Implementation Recommendations . vii I . Introduction . 1 II . Background . 2 A. FTC Roundtables and Preliminary Staff Report .......................................2 B. Department of Commerce Privacy Initiatives .........................................3 C. Legislative Proposals and Efforts by Stakeholders ......................................4 1. Do Not Track ..............................................................4 2. Other Privacy Initiatives ......................................................5 III . Main Themes From Commenters . 7 A. Articulation of Privacy Harms ....................................................7 B. Global Interoperability ..........................................................9 C. Legislation to Augment Self-Regulatory Efforts ......................................11 IV . Privacy Framework . 15 A. Scope ......................................................................15 1. Companies Should Comply with the Framework Unless They Handle Only Limited Amounts of Non-Sensitive Data that is Not Shared with Third Parties. .................15 2. The Framework Sets Forth Best Practices and Can Work in Tandem with Existing Privacy and Security Statutes. .................................................16 3. The Framework Applies to Offline As Well As Online Data. .........................17 -
Re-Socializing Online Social Networks
Re-Socializing Online Social Networks Michael D¨urr1 and Martin Werner1 Mobile and Distributed Systems Group Ludwig Maximilian University Munich, Germany {michael.duerr,martin.werner}@ifi.lmu.de, Web: http://www.mobile.ifi.lmu.de/ Abstract. Recently the rapid development of Online Social Networks (OSN) has extreme influenced our global community's communication patterns. This primarily manifests in an exponentially increasing number of users of Social Network Services (SNS) such as Facebook or Twitter. A fundamental problem accompanied by the utilization of OSNs is given by an insufficient guarantee for its users informational self-determination and an intolerable dissemination of socially incompatible content. This reflects in severe shortcomings for both the possibility to customize pri- vacy and security settings and the unsolicited centralized data acquisition and aggregation of profile information and content. Considering these problems, we provide an analysis of requirements an OSN has to fulfill in order to guarantee compliance with its users' privacy demands. Furthermore, we present a novel decentralized multi-domain OSN design which complies with our requirements. This work signifi- cantly differs from existing approaches in that it, for the first time, allows for a technically mature mapping of real-life communication patterns to an OSN. Our concept forms the basis for a secure and privacy-enhanced OSN architecture which eliminates the problem of socially incompatible content dissemination. Key words: Availability, Informational Self-Determination, Online So- cial Networks, Privacy, Trust 1 Introduction Online Social Networks (OSN) represent a means to map communication flows of real-life relationships to existing computer networks such as the Internet. Al- most all successful Social Network Service (SNS) providers like LinkedIn, Xing, MySpace, Facebook, Google Buzz, YouTube, Twitter, and others, operate their services commercially and in a centralized way. -
An Updated Privacy Paradigm for the INTERNET of THINGS
BEFORE THE UNITED STATES FEDERAL TRADE COMMISSION WASHINGTON, DC ____________________________________________________ ) COMMENTS OF THE FUTURE OF PRIVACY FORUM ) ) RE: INTERNET OF THINGS, PROJECT NO. P135405 ) ___________________________________________________) I. Introduction On November 19, 2013, the FTC held a Workshop examining the privacy and security issues associated with connected “smart technologies,” collectively referred to as the “Internet of Things.”1 The Future of Privacy Forum (“FPF”)2 was pleased to participate in the Workshop’s panel on Connected Cars. Following the event, the FTC invited public comments to further the Commission’s understanding of the issues raised at the Workshop. 3 FPF appreciates this opportunity to provide these Comments on those issues and to submit formally FPF’s white paper, An Updated Privacy Paradigm for the “Internet of Things”, which FPF published to coincide with the Workshop, attached as Appendix A to these Comments. The Internet of Things has been an important focus of FPF’s work since our founding in 2008. FPF recognizes the enormous potential benefits to consumers and to society of the inter- connected applications offered through the Internet of Things.4 At the same time and from the beginning, FPF has worked to ensure that privacy and security are integrated into those implementations of the Internet of Things that involve the collection and sharing of personal 1 Internet of Things—Privacy and Security in a Connected World, FTC, available at http://www.ftc.gov/news- events/events-calendar/2013/11/internet-things-privacy-and-security-connected-world (last visited Jan. 10, 2014). 2 The Future of Privacy Forum is a Washington, D.C.-based think tank whose mission is to advance privacy for people in practical ways that allow for innovation and responsible use of data. -
Transparency – U.S. Public Policy – Google
U.S. Public Policy Transparency Standards of business conduct Like all Google employees, our Public Policy and Government Affairs team follows Google’s Code of Conduct. At the core of this code is the mantra, “don’t be evil.” Googlers generally apply those words to how we serve our users. But it’s also about doing the right thing more generally —following the law, acting honorably and treating each other with respect. Oversight and Compliance Google’s Public Policy and Government Affairs team interacts with government and elected officials to explain our products and promote the growth of the web. In the United States, this team is led by Susan Molinari, Google’s VP of Public Policy & Government Affairs, who works directly with Google’s Chief Legal Officer, who reports to Google’s CEO. Google also has an Ethics & Compliance team, which works with outside ethics counsel to ensure compliance with all relevant political laws and the associated filings and reports. Political contribution policies and criteria for assessing candidates Google’s political spending decisions are based exclusively on what’s best for Google and an open Internet. Personal political preferences of Google executives, directors and employees play no part whatsoever in these decisions. U.S. campaign finance law prohibits Google from making direct contributions to federal political candidates. But Google has many employees who want to support an open Internet. So, in 2006, we created the Google NetPAC, a Political Action Committee. The NetPAC is a transparent, regulated system that allows Googlers to join together and support candidates who share our common values.