Network World - It has now been just about a year since the Obama administration put forth its online privacy blueprint. In spite of a title on the announcement that insisted "We Can't Wait," not much has happened since the blueprint was published. Meanwhile, things are heating up on the online privacy front in Europe, and the contrast between the United States and European viewpoints is and is not stark.
The Obama administration blueprint starts off with the clearly nonsensical statement that "The consumer data privacy framework in the United States is, in fact, strong." There is nothing that could remotely be called a "consumer data privacy framework" in the United States. Every company that collects information about you and me is free to do whatever it wants with that data, except for some narrow exceptions around medical records and quirky things like videotape rental records, and there is an attempt to dilute even that exception. There is nothing in the United States that says you, as the person some data is about, has any right to know that the data exists or what it will be used for (never mind having any say in how it can be used).
[ DATA PRIVACY DAY 2013: Microsoft releases privacy trends study ]
The broad picture that the Obama blueprint paints is not all that different from a surface reading of the EU rules. The Obama blueprint's six consumer rights (individual control, transparency, respect for context, access and accuracy, focused collection and accountability) sound quite like the EU's seven principles (notice, purpose, consent, security, disclosure, access and accountability).
One of the basic differences is in the definition of "accountability." In both the U.S. and the EU a data holder is supposed to be accountable for abiding by the principles of consumer rights. In the EU, governmental authorities have big sticks they can use to punish data holders who do not do their part -- up to 2% of a company's annual revenue under the proposed updates.
In the United States there is far less of a governmental role. The Obama blueprint proposes to strengthen the role of the Federal Trade Commission (FTC) in enforcement, but historically the FTC has been more of a kitten than a tiger when it comes to enforcement. Most of the time the FTC gets a company to agree to not be bad again and to pay a fine that represents a small percentage of the extra money the company made from the violation. The Obama blueprint wants "a sustained commitment of all stakeholders to address consumer data privacy issues as they arise from advances in technologies and business models." "Commitment" is all well and good, but a few big sticks might meaningfully increase the level of commitment.
Having said all that, some movement toward the Obama blueprint would be nice. I can understand why there was not much movement in an election year but, with President Obama re-elected, it is time to move. Some progress here might avert the worst of the trade war with the EU predicted by one U.S. official. It might also be good for you and me, whose data is cached in places we have no idea even exist.
Disclaimer: Harvard, I assume, obeys EU rules when in the EU but has expressed no opinion on either the Obama blueprint or the updated EU rules. So the above is my desire for a tiny bit of privacy.
Read more about wide area network in Network World's Wide Area Network section.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts