Feeds

EU damns scanners, Facebook, MySpace and Phorm

Not keen on SWIFT either

The Power of One Infographic

Viviane Reding, European Commissioner for Information Society and Media, has promised tough new laws to curb privacy-breaching technology like body scanners and has also warned the social networking industry that it needs to do more to protect children using its services.

In a speech to mark Data Protection Day Reding said she was studying more than 160 responses to proposed changes to data protection law and said most favoured stronger rules.

She said there needed to be clarity as to how key principles like consent and transparency work in practice.

That data was safe no matter where the data controller was located.

There should be promotion of 'privacy by design'.

There should be stronger enforcement.

The basic principles of data protection should cover all areas of European life including police and judicial and dealings with countries outside the EU.

Reding named Facebook, MySpace and Twitter and warned that children's profiles on such sites should be private by default. She will report back on progress working with companies on 9 February.

She is also concerned about behavioural advertising - the Commission has launched an infringement procedure against the British government's response to Phorm. She said: "For me it is clear that without the prior informed consent of citizens their data cannot be used."

On body scanners - which are being rushed into British airports today in response to the pants-bomber - Reding was clear in her disapproval.

Reding said: "This leads me to body scanners. I am convinced that body scanners have a considerable privacy-invasive potential. Their usefulness is still to be proven. Their impact on health has not yet been fully assessed. Therefore I cannot imagine this privacy-intrusive technique being imposed on us without full consideration of its impact."

She was equally damning about the wholesale export of financial data to the US. She said she remained to be convinced: "that all these SWIFT transfers are necessary, proportionate and effective to fight terrorism."

She promised to look closely at the issue in the coming weeks.

Finally Reding said she wanted to ensure that: "our EU legislation and international agreements are based on evidence rather than on emotional responses to the latest scare."

The full speech is here.

A spokesman for the Department of Transport said: “We understand the concerns expressed about privacy in relation to the deployment of body scanners. It is vital that staff are properly trained and we are currently developing a code of practice to ensure these concerns are properly taken into account.

Existing safeguards also mean those operating scanners are separated from the device, so unable to see the person to whom the image relates, and these anonymous images are deleted immediately.”®

Boost IT visibility and business value

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.