Feeds

EC data protection proposals could open up Zuck's 'social graph'

Will Facebook be required to allow info transfer to *gasps* Google+?

High performance access to file storage

Draft proposals on the European Commission's "general data protection regulation" have been leaked online.

The authenticity of the 116-page document (PDF) was corroborated by the EC, which The Register contacted on Wednesday afternoon.

Version 56 of the draft proposal was issued by Brussels on 29 November this year, and published by non-profit organisation Statewatch on its website.

The document says it "sets out to a proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data."

Reding said in a speech yesterday that "[t]his right to 'data portability' will be an essential element of the legislative reform."

Brussels' officials are currently fine-tuning the now delayed proposals for revamping the 1995 Data Protection Directive. Those plans were originally to be published in the autumn, but are now expected to land next month.

A spokeswoman for the European Commission in the UK told El Reg that the leaked document should not be considered as a definitive version of the EC's plans.

"Draft proposals are circulated to every department (Directorate-General or DG in short) in the Commission. This is called inter-service consultations and every DG can make comments," she said.

"Therefore this is NOT the final proposal and is subject to change before its 'adoption' by the Commission expected before end of January 2012."

However, the document provides some interesting nuggets about what the EC has been mulling over.

Among other things, it states:

To further strengthen the control over their own data, data subjects should have the right, where personal data are processed by automated means, to obtain a copy of the data concerning them also in commonly used electronic format.

The data subject should also be allowed to transmit those data, which they have provided, from one automated application, such as a social network, into another one. This should apply where the data subject provided the data to the automated processing system, based on their consent or in the performance of a contract.

That's an interesting suggestion, given last year's high-profile spat between Google and Facebook over the latter's "social graph".

Facebook is clearly keen to protect its most valuable asset - by ring-fencing that data within its own siloed network.

Its terms currently state that no one should "collect users’ content or information, or otherwise access Facebook, using automated means (such as harvesting bots, robots, spiders, or scrapers) without our permission."

Google, in July this year, tried to help users ignore that term by offering up a Chrome extension that enables information about an individual's Facebook "friends" to be exported, thereby allowing data to be shuttled into competing services such as Google+.

Facebook wasn't happy, and quickly blocked the extension from being used on its site.

In November last year, Google cut off Facebook, which up to then had access to the company's Gmail contacts API. That process had helped Facebookers to import their contact details from Google's email service.

Google cut it dead and said it would only open the API up to Facebook if Mark Zuckerberg's company offered a similar data transfer interface to Mountain View.

For its part, Google - aided, we suggest, only by a melon spoon - has been trying to scoop out user data from Facebook for years now. Which leaves us with the following, yet to be answered, question: Is Brussels about to insist that process is opened up, to help players such as Google get its hands on Zuck's precious social graph? ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Singapore decides 'three strikes' laws are too intrusive
When even a prurient island nation thinks an idea is dodgy it has problems
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Reprieve for Weev: Court disowns AT&T hacker's conviction
Appeals court strikes down landmark sentence
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.