Q&A: New technologies pose online privacy uncertainties, Rotenberg claims
Privacy advocate says that much remains unknown about how collected data will be used
Computerworld - Marc Rotenberg, executive director of the Electronic Privacy Information Center (EPIC), spoke recently with Computerworld about online privacy issues. In an initial installment of the interview, Rotenberg said he fears that a "privacy meltdown" will result from Google Inc.'s planned acquisition of online ad-serving vendor DoubleClick Inc., a deal that was given the green light last month by the U.S. Federal Trade Commission. In this second installment, he gives his take on how young people view privacy and discusses the privacy ramifications of shopping courtesy cards, radio frequency identification (RFID) tags and bar-coded driver's licenses.
Some privacy advocates argue that the younger generation of Internet users – the Facebook and MySpace users – are less guarded about data privacy. Is this younger generation in the vanguard of a new way of thinking about privacy, or are they just naïve? Younger people today have a different way of thinking about privacy. I think it's a mistake to believe that they value privacy less [than other users do]. And in many respects, that's actually the experience we've often had in this country: notions of privacy evolve based on what technology makes possible. But I think the mistake that people sometimes make is to believe that because kids have a different expectation of privacy, somehow it's a diminished expectation.
Do you think, though, that young users are sharing more information about themselves in public environments than they should be? I think the interesting issue, and where the privacy debate begins, is when the information that they make available to their friends – for example, on a social network site – is gathered surreptitiously and used for marketing purposes. And there, I think there really is a [valid] debate about whether people, and kids in particular, understand what's going on and if it's really fair.
The courtesy cards that retailers issue to customers to qualify for discounts can be used to record everything that someone like me buys. How can that information be used? And as a consumer, should I worry about it? I generally think that being worried is not a helpful way to talk about privacy. In terms of how businesses collect and use personal information, the right approach is really to ask the question, "Are companies being fair with what they do with the data they collect?" If they aren't, then we need some rules in place.
Do you think that retailers are being fair about how they use the purchasing information they collect? I think it's a very serious issue. One of the big paradoxes about privacy is that the companies that collect and use so much information about consumers tend to be very secretive about their own practices, and as a result, it's just very difficult for people to really know what's happening to the data that is provided to [the companies]. So typically, when we talk about privacy laws, one of the main things we're arguing for is simply making companies more accountable in the collection and use of data that they collect.
At an IBM conference that I was at recently, the ID badges for attendees included RFID tags that automatically tracked what sessions people attended. IBM's conference organizers had a reasonable explanation: instead of scanning people's badges as they went into sessions, they just RFID'ed them. But where can this all go if things like driver's licenses or library cards get RFID tags? Your story is very interesting, and in fact, [IBM's] analogy is imperfect. When you scan a card, there's a moment when the card is removed, it's turned over to a reader and the person is aware of the fact that the card is being read. The problem, of course, with an RFID tag is that it can be read at any time by anyone who is in possession of a reader – whether or not the person knows that their card is being scanned. And this is precisely the debate we are having right now with the Department of Homeland Security over many of the identity schemes.
This state transportation department uses computer science students from a local university as programming interns, and everyone is happy with the arrangement -- until one intern learns how to bring down the mainframe.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- The Big Data Opportunity for HR and Finance
- If CEOs, CFOs, CIOs, and CHROs want to drive their businesses forward, they will need to quickly recognize the enormous value of big...
- Path Selection Infographic
- Path Selection Infographic
- Hyperconvergence Infographic
- A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era
- From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers. All Government IT White Papers
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the...
- Endpoint Data Management: Protecting the Perimeter of the Internet of Things Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and...
- All Government IT Webcasts