Feeds

Should you own your own data?

Net privacy bill causes panic

Internet Security Threat Report 2014

Privacy campaigners have long advocated that we should own our data, and we should be able to do what we like with it. So why has an attempt to put this into law caused a minor panic?

A Michigan Senator has introduced a Bill giving individuals the right to request the removal of personal data from websites. Last week, Facebook unilaterally exposed the "interests" - the likes and dislikes - of hundreds of millions of its users, data they had previously thought was private. The Cyber Privacy Bill (HR 5108) would give users some redress. In fact, Facebook wouldn't even have dared try it.

HR 5108 is as brief as it gets. It obliges websites to remove "personal information" which it defines as "any information about an individual that includes, at minimum, the individual's name together with either a telephone number of such individual or an address of such individual".

Somewhat surprisingly the libertarian Cato Institute doesn't regard this as a property or a privacy matter.

Cato's Jim Harper suggests that malicious commenters would use it to post personal information about others - which would then require web hosts to demand authentication from every commenter. This is a strange basis on which to object to the Bill. A bigger problem, surely, is that personal information is so weakly defined in HR 5108 that it would be used to censor reporting.

European privacy legislation is already used in this way: it's had a chilling effect as celebrities use it to keep even established, previously reported facts from being reprinted.

Others object it to it because of its similarity to provisions in the Digital Millenium Copyright Act, that put obligations on publishers regarding infringement requests. The DMCA is indeed a major pain for publishers (like us), as a mischievous takedown request causes panic down the distribution chain - a nervous or poorly informed ISP will block access to a site rather than question the validity of the request.

But the DMCA does what it sets out to do. It makes publishers think twice about creator's rights - the default being respect: don't use something if it isn't yours. And the DMCA is one of the few tools in which the little guy can get redress without needing to hire an expensive lawyer. Google's continuing misinformation campaign about the DMCA shows what it really thinks of creator's rights. It makes a mockery of the idea that Web 2.0 "empowers" individual creators.

So while I'm with Cato in being against laws that regulate the internet, it's clear that it's a more complicated picture. I can envisage a "benign" CPA doing something to bring the Googles and Facebooks into line. Today, these companies regard the privacy of their users with contempt - as we saw with Buzz. Do individuals have any rights on the Intertubes, or are we just here to generate marketing information for large web companies? ®

Internet Security Threat Report 2014

More from The Register

next story
BIG FAT Lies: Porky Pies about obesity
What really shortens lives? Reading this sort of crap in the papers
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.