Feeds

Euro Data watchdog warns of database creep

Unbridled development a problem for EU

Mobile application security vulnerability report

State databases, the way the European Data Protection Supervisor talks about them in its annual report quickly grow beyond their function and not always with benign consequences for the people they have numbered.

The EDPS' 2006 Annual Report, published yesterday, noted (100-page pdf) how the data guardian's attention had been drawn to the increasing tendency of authorities to establish central databases and large scale IT systems.

This could be problematic because the systems had a habit of snowballing, it said.

"The EDPS has observed a trend in that once a database has been established, access to it is extended to more authorities, for other purposes than those for which it was set up.

"The risk of illegitimate use is another important reason why these databases create particular risks for the people whose data are used."

The report loosely describes how part of the reason people were at greater risk of becoming victims of the system was that authorities were rushing ahead with new technologies and thinking about the consequences for civil liberties later.

So European plans for co-operation between its police forces and judiciaries were being rushed through ahead of laws that would ensure their association was done without offending citizens' rights to data protection.

Generally speaking, said the report, the EDPS had only just started to get results in 2006, two years since its inception, and there was still much to do. It had to get the administration to adopt "data protection culture as a part of good governance", while striving to get data protection cover into EU legislation.

Meanwhile, vice president Franco Frattini, the commissioner responsible for both pieces of legislation concerning co-operation between and data protection of European police, came out in support of privacy enhancing technologies (PETs) today as a means of achieving the aims pursued by the EDPS.

He spoke in a statement of the problems the proliferation of computer technology brings. He did not mention the EDPS's lengthy description today of its efforts to get legislation pushed by Frattini to encompass privacy protections in the first place.

Frattini noted how individual privacy was threatened by technology that made "identity theft, discriminatory profiling, continuous surveillance, or deceit" possible.

Privacy enhancing technologies could do something about this, he said. They would ensure that "breaches of the data protection rules and violations of individual's rights are not only something forbidden...but also technically more difficult".

As well as announcing loose plans to promote PETs, Frattini said he was thinking about a pan-European system of "security seals", like ratings for video games, that would commend the privacy enhancing characteristics of certain goods. ®

Mobile application security vulnerability report

More from The Register

next story
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
US Social Security 'wasted $300 million on an IT BOONDOGGLE'
Scrutiny committee bods probe derailed database project
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.