Feeds

US outlines privacy safeguards – and reveals plans to mine personal data

'Invasive and unprecedented'

Build a business case: developing custom apps

The US Government signalled some willingness this week to address concerns over citizens' privacy, but also launched a scheme which will analyse secret airline passenger risk profiles and keep them for 40 years.

The US Government released guidelines which it says will protect the privacy of US citizens in an era of increasing data collection and information sharing by and between Government bodies.

Congress had previously mandated greater information sharing within government and law enforcement, but there have been concerns that that process undermines individuals' privacy.

The office of the US intelligence chief John Negroponte has now released a set of guidelines for state agencies to follow in dealing with individuals' data.

The guidelines say that Government bodies must ensure that information is being gathered lawfully and that sharing with other bodies is legal. Information can only be shared if it is to do with homeland security, terrorism or law enforcement, they say.

"Protected information should be shared through the Information Sharing Environment (ISE) only if it is terrorism information, homeland security information, or law enforcement information," said the guidelines. "Each agency shall adopt internal policies and procedures requiring it to ensure that the agency’s access to and use of protected information available through the ISE is consistent with the authorized purpose of the ISE."

Meanwhile, however, the US Government began a planned scheme this week which creates risk assessments of airline passengers, assessments that passengers can never see and which are kept on file for 40 years.

A programme has been identified by digital rights group the Electronic Frontier Foundation (EFF) which collects information about individuals, stores it in a database and performs a risk assessment about whether or not the individuals concerned are likely to break US law.

"Personally identifiable information is collected to ensure that people and cargo entering or exiting the United States comply with all applicable US laws," said a privacy impact report on the Automatic Targeting Scheme (ATS). "Relevant data, including personally identifiable information, is necessary for CBP to assess effectively and efficiently the risk and/or threat posed by a person, a conveyance operated by person, or cargo handled by a person, entering or exiting the country."

Information will be gathered and stored on US citizens and foreigners, including EU citizens. A major source of data will be passenger name records (PNR), themselves the subject of data protection controversy in Europe.

The US has agreed a controversial deal with the European Commission to allow airlines to pass 34 pieces of information to US authorities every time an EU citizen flies into the US. The European Parliament opposed the deal, as did privacy activists, in part because US data protection is weaker than that in the EU.

"Generally, data maintained specifically by ATS will be retained for up to forty years," said the ATS privacy report. "Certain data maintained in ATS may be subject to other retention limitations pursuant to applicable arrangements."

European PNS data will not be kept for as long as 40 years, said the report, because of the conditions of its transferral.

The EFF says that the system is invasive and unprecedented. "The government is preparing to give millions of law-abiding citizens 'risk assessment' scores that will follow them throughout their lives," said EFF Senior Counsel David Sobel. "If that wasn't frightening enough, none of us will have the ability to know our own score, or to challenge it. Homeland Security needs to delay the deployment of this system and allow for an informed public debate on this dangerous proposal."

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?