Feeds

US moves forward on data privacy

Draft law heads for full Senate hearing

The Power of One eBook: Top reasons to choose HP BladeSystem

A draft US law to increase the security and privacy of personal information held by companies took a step forward last week, when it was approved by the influential Senate Judiciary Committee. The bill includes a duty to disclose security breaches.

The draft Personal Data Privacy and Security Act of 2005 will now move forward to a full Senate hearing.

The bill, sponsored by Senators Arlen Specter and Patrick Leahy, will ensure that companies with databases containing personal information on more than 10,000 US citizens establish and implement data privacy and security programs and vet third-party contractors hired to process data.

Under the bill, data brokers will generally be required to let individuals know what information is held about them and, where appropriate, allow individuals to correct demonstrated inaccuracies. They will also be obliged to notify law enforcement agencies, consumers and credit reporting agencies when digitised sensitive personal data has been compromised.

The bill tackles the question of Government databases run by private contractors, requiring an evaluation of potential contractors involved in handling personal data; an audit of commercial data brokers hired for projects involving personal data; and a privacy impact assessment on the use of commercial databases by federal departments.

Penalties should be included in Government contracts for failure to protect data privacy and security, according to the draft.

The bill also sets out stiff monetary penalties for failing to provide privacy and security protections and notices of security breaches, and toughens criminal penalties for those who infiltrate systems to compromise personal data.

It also imposes a criminal penalty in the cases were there is intentional and wilful concealment of a security breach known to require notice.

"This bill will ensure that our laws keep pace with technology," said Senator Leahy after the Committee vote. "In this information-saturated age, the use of personal data has significant consequences for every American. People have lost jobs, mortgages and control over their credit and identities because personal information has been mishandled or listed incorrectly."

The bill is not the only data security legislation to be discussed in Congress at present. The Senate Commerce Committee recently approved the Identity Theft Protection Act, while the Data Accountability and Trust Act is still at the Committee stage in the House of Representatives.

The raft of legislation is a result of growing public concern arising from serious data breaches over the past year - including attacks on data brokers LexisNexis and ChoicePoint.

See: The draft Personal Data Privacy and Security Act of 2005 (S.1789) (63-page / 119KB PDF)

Copyright © 2005, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.