Policy Group: Privacy Laws Lag Far Behind Data Harvest Tools - InformationWeek
IoT
IoT
News
News
2/22/2006
07:02 PM
50%
50%
RELATED EVENTS
[Cybersecurity] Costs vs. Benefits
Feb 28, 2017
This online event, hosted by the editors of Dark Reading, brings together IT security leaders, bus ...Read More>>

Policy Group: Privacy Laws Lag Far Behind Data Harvest Tools

The Center for Democracy and Technology called for more stringent regulations Wednesday, citing government attempts to retrieve millions of cell phone records, its use of cell phones to track suspects, and other privacy issues.

The widening gap between technology harvesting sensitive personal data and the laws designed to prevent misuse of that data needs to be filled, according to the Center for Democracy & Technology.

The center called for more stringent regulations Wednesday, citing government attempts to retrieve millions of cell phone records, its use of cell phones to track suspects, as well as privacy issues raised by Web-based e-mail and spyware that logs keystrokes.

"The capacity of Internet Technology to collect and store data increases every day, as does the volume of personal information we willingly surrender as we take advantage of new services," CDT Policy Director Jim Dempsey said in a prepared statement. "Meanwhile, the laws that are supposed to prevent the government from unfairly accessing personal information haven't changed in two decades."

Dempsey, who authored a report called "Digital Search & Seizure: Updating Privacy Protections to Keep Pace with Technology," said most Internet users don't know their privacy is on the line.

The report warns that Web-based e-mail can be reviewed with a subpoena, without users ever realizing it, while messages stored on personal computers can only be accessed with search warrants. It also points out that there aren't any laws specifically governing the signals and identification numbers that cell phones send out while they are turned on and seeking signals.

CDT points out that new laws are needed to protect privacy from intrusions via Web-based e-mail, mobile phones, RFID, search services and keystroke loggers.

The U.S. Department of Justice has defended its recent subpoenas of Internet search records, saying they are needed to determine whether child pornography laws are effective. Investigators and administration officials have said that regular Americans are not being spied on in the government's ongoing surveillance efforts aimed at terrorist networks. The F.B.I. has ignored several requests for comment on its surveillance standards.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll