Feeds

EC data protection proposals could open up Zuck's 'social graph'

Will Facebook be required to allow info transfer to *gasps* Google+?

Internet Security Threat Report 2014

Draft proposals on the European Commission's "general data protection regulation" have been leaked online.

The authenticity of the 116-page document (PDF) was corroborated by the EC, which The Register contacted on Wednesday afternoon.

Version 56 of the draft proposal was issued by Brussels on 29 November this year, and published by non-profit organisation Statewatch on its website.

The document says it "sets out to a proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data."

Reding said in a speech yesterday that "[t]his right to 'data portability' will be an essential element of the legislative reform."

Brussels' officials are currently fine-tuning the now delayed proposals for revamping the 1995 Data Protection Directive. Those plans were originally to be published in the autumn, but are now expected to land next month.

A spokeswoman for the European Commission in the UK told El Reg that the leaked document should not be considered as a definitive version of the EC's plans.

"Draft proposals are circulated to every department (Directorate-General or DG in short) in the Commission. This is called inter-service consultations and every DG can make comments," she said.

"Therefore this is NOT the final proposal and is subject to change before its 'adoption' by the Commission expected before end of January 2012."

However, the document provides some interesting nuggets about what the EC has been mulling over.

Among other things, it states:

To further strengthen the control over their own data, data subjects should have the right, where personal data are processed by automated means, to obtain a copy of the data concerning them also in commonly used electronic format.

The data subject should also be allowed to transmit those data, which they have provided, from one automated application, such as a social network, into another one. This should apply where the data subject provided the data to the automated processing system, based on their consent or in the performance of a contract.

That's an interesting suggestion, given last year's high-profile spat between Google and Facebook over the latter's "social graph".

Facebook is clearly keen to protect its most valuable asset - by ring-fencing that data within its own siloed network.

Its terms currently state that no one should "collect users’ content or information, or otherwise access Facebook, using automated means (such as harvesting bots, robots, spiders, or scrapers) without our permission."

Google, in July this year, tried to help users ignore that term by offering up a Chrome extension that enables information about an individual's Facebook "friends" to be exported, thereby allowing data to be shuttled into competing services such as Google+.

Facebook wasn't happy, and quickly blocked the extension from being used on its site.

In November last year, Google cut off Facebook, which up to then had access to the company's Gmail contacts API. That process had helped Facebookers to import their contact details from Google's email service.

Google cut it dead and said it would only open the API up to Facebook if Mark Zuckerberg's company offered a similar data transfer interface to Mountain View.

For its part, Google - aided, we suggest, only by a melon spoon - has been trying to scoop out user data from Facebook for years now. Which leaves us with the following, yet to be answered, question: Is Brussels about to insist that process is opened up, to help players such as Google get its hands on Zuck's precious social graph? ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.