Feeds

Privacy advos demand 'do not track list' for websites

As web marketeers tune up for FTC privacy meeting

Beginner's guide to SSL certificates

A coalition of US privacy organisations has demanded the Federal Trade Commission (FTC) set up a "do not track" list to allow consumers to surf the web without having their behaviour monitored, warehoused, and mined by marketeers.

The groups' call for more internet privacy was part of the knuckle cracking by Washington's net lobbyists this morning ahead of an FTC sponsored Town Hall meeting covering behavioural internet advertising.

The coalition, which includes the Electronic Frontier Foundation (EFF) and the Centre for Democracy and Technology, has demanded customers be able to opt out of being tracked by advertisers, just as US consumers can sign up to a do not call list to escape telemarketers.

Other demands from the consumer privacy lobby include a redefinition of "personally identifiable information" and the setting up of an "online consumer protection privacy committee".

It's also demanded more disclosure by advertisers and a ban on "collecting and using personally identifiable information about health, financial activities, and other sensitive data".

Given that sensitive data is the gold dust that keeps advertisers digging away in their data warehouses, the battle lines are clearly drawn.

On the other side of the town hall, the Internet Advertising Bureau (IAB), in its submission to the FTC, trumpeted its initiatives to protect consumer privacy, while saying "the interaction among consumers, publishers, and advertisers fuels the engine that drives the net".

Unsurprisingly, it insisted "self regulation protects consumer privacy". It is the increased use of information which "fosters the availability of free content and services and more relevant advertising", apparently, but consumers can rest easy as IAB members recognised their "responsibility to protect and use that information to benefit consumers". Mainly by producing more targeted marketing material.

And just to show how in tune it is with the kids, the IAB included a presentation that declares: "Marketing is the new rock and roll, Super CMOs are the stars, and growth champion marketing teams are the band." Which presumably makes tracking data the new cocaine. ®

Intelligent flash storage arrays

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.