Government slates meetings on mobile privacy standards
White House effort aims to bring industry, consumer groups to the table to jointly create new Internet privacy codes of conduct
Computerworld - The National Telecommunications and Information Administration (NTIA) is set to host the first of several meetings seeking input for its effort to develop new codes of conduct for handling private consumer date on the Internet and mobile networks.
The meeting, scheduled for July 12 at the U.S. Department of Commerce building in Washington D.C., is open to all and will focus primarily on mobile application privacy.
NTIA expects that the initial meeting will attract industry stakeholders, rights groups and Internet marketers looking to offer views on privacy issues related to the use, consumption and sharing of consumer data stored on mobile devices and shared by mobile applications.
The sponsored meetings over the coming months are designed to let stakeholders jointly develop Internet privacy codes that are acceptable to most privacy and consumer groups, Internet companies and online marketing firms.
The Federal Trade Commission (FTC) will be responsible for enforcing the codes of conduct that result from the multi-stakeholder effort.
The initiative stems from a 60-page Consumer Privacy Bill of Rights released by the Obama Administration in February.
The document spelled out proposals that would give consumers more control over how their personal data is collected, used, stored and shared by websites and online advertisers.
The White House created the document as part of an effort to require companies to limit their collection of personal data, to protect any sensitive data and to give consumers the right to access and to correct personal data collected by Internet companies.
The final document would provide consumers with clear and easily understandable information about their privacy practices. according to the White House plan.
Instead of calling for new privacy regulations, Obama's Bill of Rights proposed a multi-stakeholder process for developing broadly acceptable standards.
Reaction to the multi-stakeholder proposal has been mixed.
While privacy advocates and consumer rights groups have generally supported the effort, they have also expressed considerable skepticism over the process set out by the administration. Many say they fear that Internet companies will hijack the process and that the final document will provide few real privacy protections for consumers.
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Is Your Big Data Solution Production-Ready? Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have. All Privacy White Papers | Webcasts