IDG News Service - The anti-counterfeiting trade agreement (ACTA) being negotiated in secret by the U.S., E.U. and others potentially runs roughshod over European data protection requirements, European data protection supervisor (EDPS) Peter Hustinx said Monday.
"Intellectual property is important to society and must be protected [but] it should not be placed above individuals' fundamental rights to privacy and data protection," Hustinx said in statement.
His statement follows the leaking of part of the draft ACTA on Friday, which revealed plans to make internet service providers (ISPs) liable under civil law for the content of messages distributed on their networks.
The leak also revealed that negotiators, led by the U.S., want ISPs to monitor the content on their networks and to sever internet connections of subscribers who repeatedly upload or download copyright-protected content without permission.
The trade agreement aims to crack down on the sharing of files containing music and movies over the Internet, as well as on illegal counterfeiting of goods.
Hustinx criticized the European Commission, which is negotiating the agreement on behalf of the E.U., for not consulting him "on the content of an agreement which raises significant issues as regards individuals' fundamental rights," the EDPS's office said in the statement.
In particular he is worried that an international treaty to fight piracy on the Internet "could include the imposition of obligations on ISPs to adopt "three strikes Internet disconnection policies" -- also referred to as "graduated response" schemes, the EDPS statement said.
Under the draft trade agreement, to avoid being sued by a record company or Hollywood studio for illegally distributing copyright-protected content, an ISP would have to prove that it took action to prevent the copyright abuse, and in a footnote the draft agreement gave an example of the sort of policy ISPs would need to adopt to avoid being sued by content owners:
"An example of such a policy is providing for the termination in appropriate circumstances of subscriptions and accounts in the service provider's system or network of repeat offenders," the leaked text states.
Terminating someone's subscription is the graduated response enacted in France last year that sparked widespread controversy. The French law is dubbed the "Three Strikes" law because French ISPs must give repeat file sharers two warnings before cutting off their connection.
The EDPS suggested that instead of getting ISPs to snoop on their subscribers, "less intrusive solutions with a limited scope should be considered," such as "targeted ad hoc monitoring" of some Internet traffic, instead of the blanket surveillance proposed in the draft ACTA.
He also called for safeguards for citizens' privacy. "The EDPS calls on the E.U. to implement appropriate safeguards to all data transfers made in the context of ACTA. Such safeguards should take the form of binding agreements between EU senders and third country recipients," it said in the statement.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Red Hat Enterprise Linux - The Original Cloud Operating System
- Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse
- Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center
- Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper
- Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support... All Government IT White Papers
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- All Government IT Webcasts