Transcript051403.Pdf (514.04
Total Page:16
File Type:pdf, Size:1020Kb
1 FEDERAL TRADE COMMISSION 2 3 PUBLIC WORKSHOP: 4 TECHNOLOGIES FOR PROTECTING PERSONAL INFORMATION: 5 THE CONSUMER EXPERIENCE 6 7 8 9 10 11 Wednesday, May 14, 2003 12 7:30 a.m. 13 14 15 16 Federal Trade Commission 17 Conference Center 18 601 New Jersey Avenue, N.W. 19 Washington, D.C. 20 21 22 23 24 25 26 For The Record, Inc. Waldorf, Maryland (301)870-8025 2 1 FEDERAL TRADE COMMISSION 2 I N D E X 3 4 Welcoming Remarks -- Page 3 5 6 Panel 1: Consumer Tools for Managing the Collection and 7 Use of Personal Information -- Page 24 8 9 Panel 2: Consumer Tools for Managing Information 10 Security -- Page 99 11 12 Introductory Remarks for Afternoon Panels -- Page 164 13 14 Panel 3: Making Effective Use of Technology: 15 Understanding Consumer Behavior -- Page 170 16 17 Panel 4: Building Protections into the Architecture of 18 Identity Management Systems -- Page 249 19 20 Panel 5: Building Security into the Architecture for 21 Safer Computing -- Page 317 22 23 Closing Remarks -- Page 363 24 25 For The Record, Inc. Waldorf, Maryland (301)870-8025 3 1 P R O C E E D I N G S 2 - - - - - 3 WELCOMING REMARKS 4 MS. LEVIN: Good morning. Welcome to the 5 Federal Trade Commission's public workshop on 6 "Technologies for Protecting Personal Information: The 7 Consumer Experience." This is a first day of a two-day 8 program. I hope you will return on June 4th to explore 9 the business experience. 10 My name is Toby Levin. I am an attorney in the 11 Division of Financial Practices, and in addition to being 12 one of the moderators for today, I have the extended duty 13 of making just a few administrative announcements. 14 First of all, I want to just point you to the 15 exits that are behind you. And know that if, in the 16 unlikely event there is an emergency of any sort, we will 17 get back to you from the podium with the appropriate 18 information, but just make you aware that there are exits 19 behind you. 20 Secondly, please wear your badges throughout 21 the day. If you exit the building for any reason, you 22 will have to return through security, even if you have 23 your badges on. So we recommend that you stay close by. 24 We have refreshments for you for the morning here. And 25 keep your badges on at all times. For The Record, Inc. Waldorf, Maryland (301)870-8025 4 1 And secondly, here is your first test, to see 2 how much of a technologist you really are. If you have a 3 cell phone, please turn it off now. That will make the 4 program more enjoyable for all of us. 5 Okay. With that, it's my pleasure to introduce 6 Howard Beales, the Director of the Bureau of Consumer 7 Protection. 8 MR. BEALES: Thank you, Toby. I am actually 9 here as a stand-in for Chairman Muris. As we begin a 10 workshop about technology, it's perhaps useful to 11 understand the limits of technology, because Chairman 12 Muris was supposed to be here by videotape, but instead, 13 here I am with Chairman Muris's remarks. 14 Usually I would have to say that the views are 15 my own, and not those of the Commission or any 16 commissioner, but I guess today they are the views of the 17 chairman, and not of any other commissioner or the staff. 18 But I want to welcome you, on Chairman Muris's 19 behalf, to the first day of the FTC's Public Workshop on 20 Technologies for Protecting Personal Information. 21 Although the chairman couldn't be with you in person, 22 technology was supposed to enable him to share with you 23 his strong interest in this forum, and his thanks to the 24 participants who have come to the Commission to share 25 their expertise and perspectives. For The Record, Inc. Waldorf, Maryland (301)870-8025 5 1 I also want to thank everyone in the audience, 2 whom we hope will carry back with them a better 3 understanding of the issues that frame today's full 4 agenda. 5 This is the latest in a series of FTC workshops 6 designed to explore the wide range of privacy issues 7 affecting consumers. Just two weeks ago, we held a 8 highly successful forum to examine the many challenges 9 presented by spam. Today, we turn to another topic of 10 interest in the privacy community: what role technology 11 plays in helping consumers and businesses protect 12 consumer information. 13 We have heard a lot about the promise of 14 technology for protecting privacy. We want to look more 15 closely at whether, and to what extent, consumers and 16 businesses are using these technologies. We will examine 17 technologies that are available to both consumers and 18 businesses. 19 The session today will focus on consumer 20 technologies, and our June 4th session will focus on 21 business technologies. During both sessions, we will 22 consider technologies designed to manage consumer 23 information, including technologies such as P3P, designed 24 to honor consumer privacy preferences. 25 We will also evaluate technologies designed to For The Record, Inc. Waldorf, Maryland (301)870-8025 6 1 keep consumer information secure. As part of the 2 discussion of security technologies, we also plan to 3 examine whether there have been advances in information 4 security since our workshop on this topic last year. 5 Our goal is more than listing the available 6 technology. We want to explore the potential and limits 7 of technology for both consumers and businesses. Have 8 privacy technologies, including those designed to keep 9 information secure, succeeded in the marketplace? Why, 10 or why not? What does research on consumer behavior tell 11 us about how consumers will likely use these 12 technologies? Are certain types of consumer technologies 13 more likely to succeed in the market than others? 14 For businesses, what role does technology play, 15 as opposed to policies and practices? What challenges 16 can and cannot be addressed by technology? 17 Today's workshop, in conjunction with the one 18 on June 4th, should shed some light on these questions. 19 It should give us greater understanding of the role of 20 technology in this important area. We have, today, some 21 of the finest researchers and technologists in the field. 22 We look forward to your participation, and thank you 23 again for joining us. 24 And now, it's my pleasure to introduce 25 Commissioner Orson Swindle, who has played a key role in For The Record, Inc. Waldorf, Maryland (301)870-8025 7 1 this workshop, and in our workshop on information 2 security, roughly a year ago. Commissioner Swindle. 3 COMMISSIONER SWINDLE: Thank you, Howard, and 4 thank you all for being here. Our audience is somewhat 5 smaller and perhaps less confrontational than one we had 6 a couple of weeks ago. 7 So, you are all the pros in the business, and 8 you're busy trying to find solutions, and we appreciate 9 not only your help in finding those solutions, but in 10 your help and your participation in this conference. And 11 I think, from each other, we should learn a lot of 12 things. 13 Bob Liscouski is going to be a real treat for 14 you. I just met Bob a couple of days ago. I found him 15 to be pleasant, a pro, and extremely well qualified for 16 the task that he has been assigned, and that's being 17 Assistant Secretary for Infrastructure Protection. 18 That's an extremely large title. 19 As I said, I found him pleasant, a 20 professional, and qualified. He has had a career in law 21 enforcement, criminal investigation, software 22 development, information management, consulting, and 23 perhaps the most important job he has had in his entire 24 life, it was for Coca Cola, a good George company which 25 I'm familiar with, as the director for information For The Record, Inc. Waldorf, Maryland (301)870-8025 8 1 assurance. 2 And we all know what a success that is. So 3 it's nice to have a guy walk in to a new job with awesome 4 responsibilities, and have those kind of qualifications. 5 He understands what we, at the FTC, understand, 6 that this whole concept of protecting the critical 7 infrastructure of this country is a multi-tiered process. 8 It's like a big triangle, and at the bottom of that 9 triangle are 200 or so million consumers in this country. 10 And they are using computers. 11 So, therefore, they are linked to the other -- 12 the entire structure. They play a role, and if we think 13 in terms of the strong -- the chain being only as strong 14 as its weakest link, we have a lot of potential weakest 15 links out there. It's a target-rich environment, as we 16 know. 17 And I think, as many of you heard me say in the 18 past, the solutions to these problems that we face are 19 never going to be found. But we're going to solve many 20 problems en route. It's a journey, and not a 21 destination. There will be many leaders along that road, 22 that journey.