Feeds

EC data protection proposals could open up Zuck's 'social graph'

Will Facebook be required to allow info transfer to *gasps* Google+?

Top three mobile application threats

Draft proposals on the European Commission's "general data protection regulation" have been leaked online.

The authenticity of the 116-page document (PDF) was corroborated by the EC, which The Register contacted on Wednesday afternoon.

Version 56 of the draft proposal was issued by Brussels on 29 November this year, and published by non-profit organisation Statewatch on its website.

The document says it "sets out to a proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data."

Reding said in a speech yesterday that "[t]his right to 'data portability' will be an essential element of the legislative reform."

Brussels' officials are currently fine-tuning the now delayed proposals for revamping the 1995 Data Protection Directive. Those plans were originally to be published in the autumn, but are now expected to land next month.

A spokeswoman for the European Commission in the UK told El Reg that the leaked document should not be considered as a definitive version of the EC's plans.

"Draft proposals are circulated to every department (Directorate-General or DG in short) in the Commission. This is called inter-service consultations and every DG can make comments," she said.

"Therefore this is NOT the final proposal and is subject to change before its 'adoption' by the Commission expected before end of January 2012."

However, the document provides some interesting nuggets about what the EC has been mulling over.

Among other things, it states:

To further strengthen the control over their own data, data subjects should have the right, where personal data are processed by automated means, to obtain a copy of the data concerning them also in commonly used electronic format.

The data subject should also be allowed to transmit those data, which they have provided, from one automated application, such as a social network, into another one. This should apply where the data subject provided the data to the automated processing system, based on their consent or in the performance of a contract.

That's an interesting suggestion, given last year's high-profile spat between Google and Facebook over the latter's "social graph".

Facebook is clearly keen to protect its most valuable asset - by ring-fencing that data within its own siloed network.

Its terms currently state that no one should "collect users’ content or information, or otherwise access Facebook, using automated means (such as harvesting bots, robots, spiders, or scrapers) without our permission."

Google, in July this year, tried to help users ignore that term by offering up a Chrome extension that enables information about an individual's Facebook "friends" to be exported, thereby allowing data to be shuttled into competing services such as Google+.

Facebook wasn't happy, and quickly blocked the extension from being used on its site.

In November last year, Google cut off Facebook, which up to then had access to the company's Gmail contacts API. That process had helped Facebookers to import their contact details from Google's email service.

Google cut it dead and said it would only open the API up to Facebook if Mark Zuckerberg's company offered a similar data transfer interface to Mountain View.

For its part, Google - aided, we suggest, only by a melon spoon - has been trying to scoop out user data from Facebook for years now. Which leaves us with the following, yet to be answered, question: Is Brussels about to insist that process is opened up, to help players such as Google get its hands on Zuck's precious social graph? ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
US Supreme Court supremo rakes Aereo lawman in oral arguments
Antenna-array content streamers: 'Ruling against us could dissipate the cloud'
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.