News
News
2/22/2006
07:02 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Policy Group: Privacy Laws Lag Far Behind Data Harvest Tools

The Center for Democracy and Technology called for more stringent regulations Wednesday, citing government attempts to retrieve millions of cell phone records, its use of cell phones to track suspects, and other privacy issues.

The widening gap between technology harvesting sensitive personal data and the laws designed to prevent misuse of that data needs to be filled, according to the Center for Democracy & Technology.

The center called for more stringent regulations Wednesday, citing government attempts to retrieve millions of cell phone records, its use of cell phones to track suspects, as well as privacy issues raised by Web-based e-mail and spyware that logs keystrokes.

"The capacity of Internet Technology to collect and store data increases every day, as does the volume of personal information we willingly surrender as we take advantage of new services," CDT Policy Director Jim Dempsey said in a prepared statement. "Meanwhile, the laws that are supposed to prevent the government from unfairly accessing personal information haven't changed in two decades."

Dempsey, who authored a report called "Digital Search & Seizure: Updating Privacy Protections to Keep Pace with Technology," said most Internet users don't know their privacy is on the line.

The report warns that Web-based e-mail can be reviewed with a subpoena, without users ever realizing it, while messages stored on personal computers can only be accessed with search warrants. It also points out that there aren't any laws specifically governing the signals and identification numbers that cell phones send out while they are turned on and seeking signals.

CDT points out that new laws are needed to protect privacy from intrusions via Web-based e-mail, mobile phones, RFID, search services and keystroke loggers.

The U.S. Department of Justice has defended its recent subpoenas of Internet search records, saying they are needed to determine whether child pornography laws are effective. Investigators and administration officials have said that regular Americans are not being spied on in the government's ongoing surveillance efforts aimed at terrorist networks. The F.B.I. has ignored several requests for comment on its surveillance standards.

Comment  | 
Print  | 
More Insights
The Agile Archive
The Agile Archive
When it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Government, May 2014
Protecting Critical Infrastructure: A New Approach NIST's cyber-security framework gives critical-infrastructure operators a new tool to assess readiness. But will operators put this voluntary framework to work?
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.