Today, the much-anticipated findings of President Obama’s National Security Agency task force have hit the wire [PDF]. The non-binding 200 page report of 40-plus recommendations calls for the end of many of the most controversial programs.
Here are the big takeaways:
1. The government would no longer hold on to phone records in bulk. Instead, phone companies might warehouse the data for individual requests from the government. The recommendations say that the government should only access such data with a specific purpose, so it’s unknown how the NSA would continue to mine networks for patterns — or if it would be allowed to at all.
Here’s the important quote, “We recommend that legislation should be enacted that terminates the storage of bulk telephony meta-data by the government.”
2. Stop undermining global security standards. The NSA likes to maintain undiscovered hacking tools (“zero-day exploits“) and force loopholes in Internet security standards. The work it’s doing to crack basic encryption falls along those lines as well. It helps them monitor more traffic, but makes the web overall a less safe place.
3. No tech company “backdoors”. Google and other major tech companies have vigorously denied that they create special backdoor access for NSA spying, but the report recommends they cease this supposedly non-existent practice anyway. It is unclear whether such backdoors were currently being built out or already in existence.
4. Organizational changes: The director of the NSA should be confirmed by the Senate and open to civilians, there should be a new privacy board to review strategies, and the secret court should have a special public advocate. This differs from previous leaks to the Wall Street Journal, which implied that the panel recommend a civilian director.
5. More transparency: The government should disclose the number of users who the NSA has requested to examine.
The panel follows a torrent of new developments, any of which may significantly alter the way U.S. intelligence agencies gather private data en masse.
Google has been slapped with a fine for breaking Spanish data protection laws with its privacy policy.
The Spanish Data Protection Agency (AEPD) said that Google does not
provide enough details about its data collection, and imposed a €900,000
($1.23M) punishment.
That's $400,000 each for three separate violations of the Organic Act
on Data Protection (LOPD) — collecting information, sharing data, and
not properly informing users. The AEPD called Google's privacy rules
"indeterminate and unclear."
A new Google privacy policy went into effect
on March 1, 2012. It consolidated about 70 cross-site guidelines into
one, but also switched to one profile for users across all services,
rather separate logins for applications like YouTube, Search, and
Blogger. It's that account consolidation bit that has privacy advocates
up in arms.
Google Search
The AEPD's action means that the California-based tech company must
comply with Spanish data protection law and correct its practices ASAP.
A Google spokeswoman told PCMag that the company will be examining the Spanish watchdog's report to determine next steps.
"We've engaged fully with the Spanish DPA throughout this process to
explain our privacy policy and how it allows us to create simpler, more
effective services, and we'll continue to do so," she said in a
statement.
Dutch and French officials have also spoken out against Google's practices. Late last month, the Dutch Data Protection Authority (DPA) accused the search giant of not adequately informing users about which personal data it collects and combines, and for what purpose. Source : PCMag.com
Google's practice of combining privacy policies across its various services has been found to be in violation of the Dutch law by the Netherlands' privacy regulator CBP (College BeschermingPersoonsgegevens) after extensive research on the matter.
In 2012, Google implemented a significant change in its privacy policy, merging the individual policies from its numerous services into one uniform document — which, according to the search giant, was convenient and easier to understand.
However, although presented as a measure to accommodate its users, the move immediately caught the attention of regulators across Europe, because it also allowed Google to combine user data from diverse services.
That in turn, allowed Google to put together an extremely detailed user profile, all without asking its users for their permission. After all, users don't have the ability to opt out of the process of their different data sets being combined, can contain extremely sensitive information, such as their payment details, location data and details about online behaviour.
Insufficiently informed
CBP chairman Jacob Kohnstamm strongly condemned the way Google handles its user data: "The way Google has combined personal data since the introduction of the revised privacy conditions on 1 March 2012 is in violation with the Dutch Data Protection Act," he said in a statement.
"Google combines personal data of internet users obtained via different kinds of Google services without properly informing its users and without asking them for permission. Our research shows that Google does not sufficiently inform its users about what personal data the company gathers and to what end. Google is creating an invisible web of our personal data, without our permission and that, by definition, is forbidden according to Dutch law."
No legal action… yet
Although Google's practices have found to be violation of Dutch Law, the privacy regulator said it currently has no intention to fine Google, provided that the company is willing to make changes.
"We have meanwhile invited Google for a hearing, after which we will decide if and how we are going to deploy any means necessary with regard to enforcement of the law," the CBP said.
Meanwhile, the Dutch branch of Google has responded to the allegations: "Our privacy policy respects European legislation and allows us to create simpler and more efficient services. During this process, we have seized each and every opportunity to engage in discussion with the CBP and we will continue to do so."
That in turn, allowed Google to put together an extremely detailed user profile, all without asking its users for their permission. After all, users don't have the ability to opt out of the process of their different data sets being combined, can contain extremely sensitive information, such as their payment details, location data and details about online behaviour.
Insufficiently informed
CBP chairman Jacob Kohnstamm strongly condemned the way Google handles its user data: "The way Google has combined personal data since the introduction of the revised privacy conditions on 1 March 2012 is in violation with the Dutch Data Protection Act," he said in a statement.
No legal action… yet
Although Google's practices have found to be violation of Dutch Law, the privacy regulator said it currently has no intention to fine Google, provided that the company is willing to make changes.
"We have meanwhile invited Google for a hearing, after which we will decide if and how we are going to deploy any means necessary with regard to enforcement of the law," the CBP said.
Meanwhile, the Dutch branch of Google has responded to the allegations: "Our privacy policy respects European legislation and allows us to create simpler and more efficient services. During this process, we have seized each and every opportunity to engage in discussion with the CBP and we will continue to do so."
Are you shopping for the perfect holiday gift for your conspiracy theorist friend who harbors a deep, seething rage for Google's "Your face in ads" policy? Good news! Microsoft's got you covered with a new Scroogled store stocked with mean-spirited gems like the coffee mug above.
The new wares—found in a corner of the virtual Microsoft Store—is an expansion into the physical realm for Scroogled, Microsoft's FUD-spreading smear campaign against Google. Over the past year, Scroogled has levelled its guns at Google Shopping's pay-to-play system, Gmail's automated ads, and Google Search's practice of placing ads next to results. (You know, like the ones Bing has, too.)
And while we're talking For What It's Worths, the Electronic Frontier Foundation's recent "Encrypt the Web" report gave Google a perfect score for trying to keep your data safe from prying eyes. Microsoft, meanwhile, scored 1 out of 5 on the testing criteria—just like MySpace.
You may have been one of the many Facebook users contacted by the company last week about the demise of the "Who can look up your Timeline by name" search setting. The Facebook e-mail announcing the discontinuation of the feature goes on to explain how to limit what information you share on the service. Unfortunately, there's no longer a way to limit globally the personal information Facebook shares with everyone; you can do so only for each separate post using the audience selector.
"Your name, gender, username, user ID (account number), profile picture, cover photo and networks (if you choose to add these) are available to anyone since they are essential to helping you connect with your friends and family."
Facebook users are installing apps from developers who help themselves to the users' private information without offering a clear mechanism for retrieving the data. Users have no way of knowing what the information includes or how it will be used, let alone whether it is accurate. Nope, no privacy risk there.
The Facebook App Settings page lets you control the information about you that friends can share when they use apps. You can uncheck any or all of the 17 categories of information presented.
Uncheck the categories of personal information you don't want your friends to be able to share with the Facebook apps they use.
(Credit: Screenshot by Dennis O'Reilly/CNET)
The App Settings page indicates that you can prevent apps and Web sites from accessing other categories of information by "turning off all Platform apps." To do so, click Edit to the right of "Apps you use" on the App Settings page, and click the Turn Off Platform button.
Privacy promises to European users come up empty Imagine if Facebook, Google, and other services had to notify you of the information they collect about you, how the companies will use the information, the third parties they will share the information with, and how you can restrict use and disclosure of the information.
Now imagine you're given the ability to opt out of the collection and use of your information beyond what is necessary to transact your business with the companies. Even better, imagine having to opt in to the use of your personal information in any way other than the original purpose for which you supplied the information.
These are two of the seven Safe Harbor Privacy Principles that US companies agree to comply with for their customers residing in European Union countries. Export.gov provides an overview of the Safe Harbor requirements. The principles specify that individuals be afforded access to the personal information the companies collect about them and be able to correct, amend, or delete the information.
As Politico's Erin Mershon points out, the Safe Harbor Framework is intended to allow US companies to comply with the EU's stringent privacy regulations. The rules have been a sticking point in light of the National Security Agency's widespread surveillance. Some Europeans believe US firms use the Safe Harbor Framework to avoid complying with the EU's privacy requirements.
While Federal Trade Commission Commissioner Julie Brill defends the Safe Harbor Framework, EU officials point out the lack of enforcement efforts by the FTC. Safe Harbor guidelines rely on companies self-certifying, so to a great extent the framework operates on the honor system.
At a meeting last month of the European Parliament's Civil Liberties, Justice and Home Affairs committee, an executive at Galexia, an Australian management consulting firm that researches Safe Harbor compliance, highlighted the program's lax enforcement. According to InfoSecurity, Galexia's Chris Connolly told the committee that 427 US companies make false claims about their Safe Harbor compliance.
A more-widespread compliance shortcoming relates to the Safe Harbor regulations' dispute-resolution requirements. Connolly testified that about 30 percent of the 3,000 self-certifying organizations offer no dispute-resolution options, and a large number of those companies that claim to provide dispute resolution, instead refer customers to the American Arbitration Association, which charges complainants from $120 to $1,200 per hour, with a minimum of 4 hours, on top of a $950 administration fee.
Some EU officials are calling for the cancellation of the Safe Harbor program, which has been in place for 13 years. Viviane Reding, vice president of the European Commission and EU justice commissioner, spoke at a seminar in Washington, D.C., late last month and recommended the only way for the US to restore Europe's trust is to enact privacy legislation that provides EU citizens with a right of redress when their privacy is violated, asBloomberg BNA's Stephen Gardnerreported last week. Source : CNET
Several advocacy groups are calling for an investigation into Internet companies Yahoo and Google whose networks were secretly accessed by the National Security Agency (NSA).
In a letter sent last week, the groups asked the U.S. Federal Trade Commission (FTC) find out how the NSA could extract so much data without the knowledge of Google and Yahoo.
"The Commission should pursue this investigation because it routinely holds itself out as the defender of consumer privacy in the United States," the authors said. "It is inconceivable that when faced with the most significant breach of consumer data in U.S. history, the Commission could ignore the consequences for consumer privacy."
The letter, signed by officials from the Electronic Privacy Information Center, Privacy Rights Clearinghouse, Center for Digital Democracy, and other organizations, follows recent reports that the NSA gained access to millions of consumer records by secretly tapping directly into data streams from major Internet companies.
The reports prompted fresh concern about NSA surveillance activities and of the privacy of data being held by the world's largest Internet companies.
Firms deny compliance
Google, Yahoo, Microsoft and others have insisted that they divulge consumer information to the NSA and other government agencies only under appropriate court orders. Each has denied providing any help to the NSA and other spy agencies gathering data on Internet users.
In fact, in a court filing last week the companies demandedthat the government release more information about the kind of data that Internet companies are being asked to provide the NSA.
The letter from the privacy groups stands out because it seeks to hold Google and Yahoo responsible for the NSA's data collection activities because of a lack of network security controls.
Rotenberg said consumer privacy groups have long urged Internet companies to adopt better privacy and security practices to safeguard the information they collect. He noted that privacy groups have asked Internet companies to minimize data collection when possible and to delete unneeded data."We are saying that the companies should do more to protect the privacy of user data and that the FTC has a responsibility to police these practices, particularly since both Google and Facebook are subject to consent orders concerning privacy," said Marc Rotenberg, executive director of EPIC.
Therefore, Internet companies must be held responsible for breaches of data they store, he said.
Adobe confirmed that a computer
security firm had found records stolen from its data center, but
downplayed the significance of the findings.
A computer security firm has
uncovered data it says belongs to some 152 million Adobe Systems Inc
user accounts, suggesting that a breach reported a month ago is far
bigger than Adobe has so far disclosed and is one of the largest on
record. LastPass, a password security firm, said on Thursday that
it has found email addresses, encrypted passwords and password hints
stored in clear text from Adobe user accounts on an underground website
frequented by cyber criminals. Adobe said last week that attackers
had stolen data on more than 38 million customer accounts, on top of
the theft of information on nearly 3 million accounts that it disclosed
nearly a month earlier.
The maker of Photoshop and Acrobat
software confirmed that LastPass had found records stolen from its data
center, but downplayed the significance of the security firm's findings. While
the new findings from LastPass indicate that the Adobe breach is far
bigger than previously known, company spokeswoman Heather Edell said it
was not accurate to say 152 million customer accounts had been
compromised because the database attacked was a backup system about to
be decommissioned. She said the records include some 25 million
records containing invalid email addresses, 18 million with invalid
passwords. She added that "a large percentage" of the accounts were
fictitious, having been set up for one-time use so that their creators
could get free software or other perks. She also said that the
company is continuing to work with law enforcement and outside
investigators to determine the cost and scope of the breach, which
resulted in the theft of customer data as well as source code to several
software titles. Source : MSN News
WhatsApp users, watch out! The cybercriminal(s) behind the most recently profiled campaigns impersonating T-Mobile, and Sky, have just launched yet another malicious spam campaign, this time targeting WhatsApp users with fake “Voice Message Notification/1 New Voicemail” themed emails. Once unsuspecting users execute the fake voice mail attachment, their PCs will attempt to drop additional malware on the hosts. The good news? We’ve got you (proactively) covered.
Detection rate for the malicious attachment:MD5: 0458a01e42544eacf00e6f2b39b788e0 – detected by 31 out of 48 antivirus scanners as Trojan.Win32.Sharik.qhd
Once executed, the sample creates the following Registry Keys on the affected hosts: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.sewwe HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.sewwe\ShellNew HKEY_LOCAL_MACHINE\SOFTWARE\Classes\S6.Document HKEY_LOCAL_MACHINE\SOFTWARE\Classes\S6.Document\DefaultIcon HKEY_LOCAL_MACHINE\SOFTWARE\Classes\S6.Document\shell HKEY_LOCAL_MACHINE\SOFTWARE\Classes\S6.Document\shell\open HKEY_LOCAL_MACHINE\SOFTWARE\Classes\S6.Document\shell\open\command HKEY_LOCAL_MACHINE\SOFTWARE\Classes\S6.Document\shell\print HKEY_LOCAL_MACHINE\SOFTWARE\Classes\S6.Document\shell\print\command HKEY_LOCAL_MACHINE\SOFTWARE\Classes\S6.Document\shell\printto HKEY_LOCAL_MACHINE\SOFTWARE\Classes\S6.Document\shell\printto\command HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\S6 HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\S6\Settings
It then attempts to download additional malware from the well known C&C server at networksecurityx.hopto.org
Canonical, the maker of Ubuntu, has been fending off criticism from privacy advocates because the desktop search tool in recent versions of the operating system also searches the Internet. That means if you're searching your desktop for a file or application, you might also see results from Amazon or other websites.
One person who dislikes Canonical's search tool is Micah Lee, a technologist at the Electronic Frontier Foundation who maintains the HTTPS Everywhere project and is CTO of the Freedom of the Press Foundation. Lee set up a website called "Fix Ubuntu," which provides instructions for disabling the Internet search tool.
"If you're an Ubuntu user and you're using the default settings, each time you start typing in Dash (to open an application or search for a file on your computer), your search terms get sent to a variety of third parties, some of which advertise to you," the website says.
According to Lee, Canonical sent him an e-mail this morning asking him to stop using the Ubuntu logo and also to stop using the word "Ubuntu" in his domain name. Lee reprinted the entire e-mail in a blog post titled, "Canonical shouldn’t abuse trademark law to silence critics of its privacy decisions." To prove its point, the e-mail showed a screenshot of Lee's site with the Ubuntu logo:
The policy Canonical pointed to does say that permission from the company is required to use "any Trademark in a domain name or URL or for merchandising purposes." Lee argued that his use of the Ubuntu logo and the name in his domain is "nominative use" and thus not a trademark violation. "Although I’m perfectly within my rights to continue using both, I’ve decided to remove the Ubuntu logo from the website, but add a disclaimer—because it seems like a nice thing to do," he wrote. (The EFF, for what it's worth, has published this list of tips to help makers of parody sites avoid getting shut down.)
His website still has the same domain name that includes the word "Ubuntu." Canonical doesn't seem to have a problem with other websites using the word Ubuntu in their domain names, such as "OMG! Ubuntu!," a news site that writes enthusiastically about the operating system.
Canonical's registered trademark doesn't specifically mention domain names, but it claims broad rights over the word Ubuntu for use in "Telecommunication, communication, and broadcasting services provided online, via the Internet, or via other communications networks," and "transmission of information, data, text, images, graphics, sound and/or audio-visual material online, via the Internet or via other communications networks."
We've contacted Canonical about the e-mail sent to Lee, but haven't heard back yet.
While Ubuntu's code is open source and free to everyone, Canonical obviously hasn't given up its right to enforce its trademarks. Lee argued that the company's stance against his website "isn't very much in the spirit of open source," though. The code for Fixubuntu.com is also open source—Lee invited Canonical to "submit a patch" if it decides to help out "in a more productive way."
The EFF has already sent a response to Canonical, in a letter from EFF Staff Attorney Daniel Nazer. "While we appreciate the polite tone of your letter, we must inform you that your request is not supported by trademark law and interferes with protected speech," the letter says. "The website criticizes Canonical Limited for certain features of Ubuntu that Mr. Lee believes undermine user privacy and teaches users how to fix these problems. It is well-settled that the First Amendment fully protects the use of trademarked terms and logos in non-commercial websites that criticize and comment upon corporations and products. Mr. Lee's site is a clear example of such protected speech. Neither Mr. Lee, nor any other member of the public, must seek your permission before engaging in such constitutionally protected expression."
“Apple’s main business is not about collecting information,” the company said in the report. In detailing its interactions with governments, both in the United States and around the world, Apple hoped to provide more transparency about the processes. Moreover, the company says that it has repeatedly made the case for more openness in its meetings with government officials; along with the report, Apple is also filing an amicus brief with the Foreign Intelligence Surveillance Court (FISA), supporting other cases requesting more transparency.
“We feel strongly that the government should lift the gag order and permit companies to disclose complete and accurate numbers regarding FISA requests and National Security Letters,” the company said in its report. “We will continue to aggressively pursue our ability to be more transparent.”
In the report, Apple explained that the U.S. government prohibits the company from disclosing “except in broad ranges” the precise number of requests it receives or the number of accounts affected, making it difficult to get a full picture of the government’s actions.
But the report suggested that the U.S. government’s requests for information dwarf that of any other country in which Apple does business.
During the time period surveyed, Apple said it received between 1000 and 2000 requests for information involving between 2000 and 3000 user accounts. Fewer than 1000 requests resulted in any content from accounts disclosed—such as information from iCloud email, contacts, calendar, or Photo Stream content—and fewer than 1000 requests resulted in any data about those accounts being shared.
By comparison, the United Kingdom generated just 127 requests for account information—the next-most active government on the list—resulting in just one case where actual content from an account was disclosed.
“The most common account requests involve robberies and other crimes or requests from law enforcement officers searching for missing persons or children, finding a kidnapping victim, or hoping to prevent a suicide,” Apple said in the report. “In very rare cases, we are asked to provide stored photos or email. We consider these requests very carefully and only provide account content in extremely limited circumstances.”
The Chocolate Factory has been slowly buttoning down its Chrome extension policies for the last few years. Initially, extensions could be installed from anywhere on the web, just by pointing the browser at the right URL. But beginning with Chrome 21 in 2012, Google established a policy that only URLs pointing to the Chrome Web Store are valid for extension installs.
In Chrome 21 and later, including current builds, users can still install extensions from other sites if they download the files to their desktops, manually drag them to the browser's Extensions window, then click OK in a dialog box to confirm they know what they're doing. But come January, even this won't be an option for either the stable or developer branches.
According to a blog post by Chrome engineering director Erik Kay, that's because too many extension writers have been figuring out ways to evade Chrome's security measures and silently install adware or other malicious code into unsuspecting users' browsers – something Kay says is a leading cause of complaints from Chrome users on Windows.
"Since these malicious extensions are not hosted on the Chrome Web Store, it's difficult to limit the damage they can cause to our users," Kay explains.
So, no more. Beginning with what will probably be Chrome 33 (Google doesn't set fixed dates for Chrome releases, so it's hard to be sure of the version number), extension developers will need to host their wares in the Chrome Web Store, whether the extensions are intended for a wide audience or just a few users.
That doesn't mean they have to charge for their extensions, or even let the general public know they exist.
"There will be no impact to your users, who will still be able to use your extension as if nothing changed," Kay explains. "You could keep the extensions hidden from the Web Store listings if you like."
For those developers who really, really want to use their own websites as the primary source to download their extensions, Google offers a feature called Inline Installationthat allows outside sites to make it seem as if extensions are being installed from their own pages, even though the actual extension files are hosted by the Chrome Web Store. This will still be supported after the policy change.
Also, the new rules won't interfere with enterprises that have set up group policies to allow Chrome to install extensions from their own servers. It's strictly meant to stem malicious downloads from the open internet.
Finally, a Chrome browser that has been put into developer mode will still be able to load unpacked extensions from the local drive – just not packed .crx files. This may be the best option for people, such as this Reg hack, who occasionally write one-off Chrome extensions for obscure purposes.
A French court has ordered Google to block from its search results pictures of former Formula One motor racing president Max Mosley participating in a sado-masochistic sex party with five women.
Google’s lawyers are still studying Wednesday’s ruling and plan to appeal. They say the Paris High Court wants the company to build a censorship machine.
The pictures were initially published under the headline “F1 BOSS HAS SICK NAZI ORGY WITH 5 HOOKERS” on March 30, 2008, by now-defunct British newspaper News of the World, which paid one of the women to record the event using a hidden video camera.
A subsequent court case found that, while the video showed participants speaking German and wearing modern German military uniforms or playing the role of prisoners, there was no evidence of a Nazi theme. In the same ruling, the High Court of England and Wales found that the newspaper had infringed Mosley’s right to privacy and awarded him £60,000 (then $120,000) in damages.
Mosley has also had publication of the photos declared illegal in separate cases in France and Germany, according to a statement released by his U.K. lawyers, Collyer Bristow.
“This is a welcome decision. The action was brought in respect of a small number of specific images ruled illegal in the English and French courts several years ago. Despite their illegality and my repeated notifications to them, Google continued to make the images available on its own webpages,” Mosley said in the statement.
However, the company maintains that it has responded to Mosley’s notifications by removing links to the photos.
Google has added some new privacy controls to
Google+ to give business users a more secure way to share sensitive
information on the social network. On Tuesday the company added
"restricted communities" to Google+, as a way to have conversations on
the social network but with privacy-aware controls. Users can decide
whether to open the community to everyone at their company, or open only
on an invite basis. Communities in Google+ were designed to let
people start conversations around any number of topics. But Google hopes
the new feature will attract business users without them worrying about
spilling company secrets on the site. "At most organizations,
it's important to make sure that private conversations remain private,"
Google+ Product Manager Michael Cai said in a blog post.
Whether
it's designs for a product in beta testing, or notes from an off-site
meeting, "anything you post will remain restricted to the organization,"
Cai said. Administrators will be able to make restricted
communities the default for their organization, Google said. After
creating the restricted community, users can share files from Google's
Drive file storage service as well as videos, events and photos.
Administrators can later invite other team members to join the
conversation, Google said. Users can also create communities open
to others outside the company, so clients, agencies and other business
partners can join in, Google said. Other social networking applications for business users include Yammer, Socialtext and Salesforce.com's Chatter service. Via : Computerworld
Although it has been six months since the first disclosure by Edward Snowden, the public revelations of the scope and scale of the capabilities of the National Security Agency do not appear to be slowing down.
Based on new leaked information, the NSA has recently been accused of eavesdropping on the telephone conversations of Angela Merkel, the Chancellor of Germany.
This information, along with accusations of intercepting phone calls by other high-ranking foreign officials, comes at a critical time as the European Union deliberates new data protection regulations. For over a decade, the data protection regulations of the European Union and its member states have represented the most stringent of their type in the world.
Germany, in particular, has been at the forefront in enforcing these laws. These regulations generally prohibit the transfer of personal data of EU citizens to any country that lacks adequate data protection safeguards unless approved by the citizen's member state.
Beginning in 2012, the EU initiated a process to further strengthen its approach to the protection of personal data and to ensure unified treatment and enforcement across all of its member states. In response to these new reports of government surveillance, the US can expect a critical review of its status as a permitted recipient of EU personal data.
In 2000, the European Commission and the US Department of Commerce instituted a "Safe Harbor" framework to prevent the EU's then-newly enacted data protection regulations from interrupting data flows between the US and the EU member states. Under the Safe Harbor framework, eligible US companies may self-certify to the US Federal Trade Commission that their internal policies and safeguards comply with the data protection principles enshrined in the EU regulations.
Failure to comply opens a company to a potential enforcement action by the FTC. This framework, along with the use of EU-approved contractual clauses, has been a resounding success for international e-commerce. Today, over 3,000 US companies participate in Safe Harbor, including Apple and Google. However, officials in the European Commission and the EU member states have publicly questioned the viability of the Safe Harbor framework, potentially to the detriment of every US company doing business in the EU.
According the to the European Commission Vice President, Viviane Reading, "The Safe Harbor agreement may not be so safe after all." Earlier this year, in the wake of the information leaked by Edward Snowden , German data protection officials notified the European Commission that Germany would no longer grant new approvals for the transfer of German data to non-EU countries.
Even though the Safe Harbor framework itself contemplates a national security exception, the official European Commission advisory group for data protection announced that it will formally consider "to what extent protection provided by EU data protection legislation is at risk." The results of this assessment will be released at the end of this year and will likely inform EU deliberations on the proposed enhanced data protection regulations.
Because the Safe Harbor framework automatically permits data transfers for the whole of the EU, Germany's refusal to grant new permissions has not impacted participating US companies. However, the consequences to US businesses of any disruption to the Safe Harbor framework could range from increased compliance costs and bureaucratic headaches to a complete suspension of services to Europe and the payment of fines and penalties.
At the very least, the regulatory uncertainty caused by the rhetoric in Europe may act to discourage future expansion of EU-based operations. If the Safe Harbor framework is suspended, the EU would deem the US's current data protection laws as inadequate. Each US company with the need to access and use EU personal data would then be subject to the data protection regulations (and associated penalties) of each EU member state.
Fortunately, many of the regulations provide workable exceptions to the permission requirement. However, the administrative burden of either navigating the permission process (if allowed at all) or determining if an exception applied to each data transfer would be highly disruptive to any company's operations.
For five years, Google has been holding onto a patent for a data Relevant Products/Services center Relevant Products/Services design that would allow the center to be cooled by ocean water. The company may finally be using the patent, as investigative reports seem to suggest that Google is building data centers in California and Maine. The buildings at these sites, while not explicitly connected to Google, are being constructed by a company that does have links to Google. Since the centers are adjacent to Treasure Island in the San Francisco Bay and off the coast of Portland, Maine, they are technically in international waters and free from government interest, if Google is looking to protect Relevant Products/Services its data The Plan Google's patent from 2008 detailed how a data center could be housed on a ship and its servers could be perpetually cooled by the ocean water. This sort of design is not only expensive to implement but it is also difficult, which may be why it has taken years for Google to actually use the patent. Not only would the sea water cool the servers, but the ocean currents would also totally power Relevant Products/Services the data centers, making them the most environmentally-friendly in the world. This is important, especially as data centers are now using nearly 2% of all the electricity in America. Although other rumors on the structures being built near Treasure Island and Portland suggest they are floating Google Glass stores, that seems unlikely. Joel Egan, of Cargotecture, told technology publications that a store requires large open spaces, therefore the small "cubbies" of shipping containers would not be very useful when housing a store and allowing people to look around. Again the store idea seems unlikely when you take into account the locations -- opening a groundbreaking and unique store in Maine does not make much sense if Google wants to attract as many people as possible. Mystery Structures These reports are based around pictures and information regarding multi-story structures currently being built in Portland and near Treasure Island. Both of the structures are four-stories tall and they are almost the same size and shape, meaning that they are probably being built for the same reason. A marine engineer told CNET that he had been working on a data center around the same time that Google applied for and attained its patent. He went on to say that the mystery structures look very similar to what he was working on. As a result, it seems extremely unlikely that the buildings will be retail stores, but rather, they fit Google's data center patent for its data center. Source : CIO Today
Recent headlines about shadowy government agencies, high-profile hack attacks, and your face in Google ads drive home a crucial point: Your online privacy is best protected when you keep an iron grip on the information you're handing out. If your info is on a server somewhere, it's not truly yours. So many core aspects of our lives have shifted to the cloud, mostly to our great benefit: Gmail and Outlook.com maintain our email archives. Dropbox and SkyDrive make your files available anywhere, anytime. Windows 8.1 searches include Bing results by default. Google Now dishes out the information you need before you even know you need it. But every gain in convenience comes with a loss of control, and that loss of control all too often comes bundled with privacy or security woes. You can take some simple precautions to minimize the amount of personal information that you have online. But before we get started, remember that this data checkup is about what you're comfortable with. You could follow all the tips in this post, tighten up on just a few of the practices mentioned below, or go even farther down the rabbit hole than the suggestions offered here. Digital privacy is not a zero-sum or a one-size-fits-all proposition. If nothing else, this article can help you make better decisions about the information you share with the services you love. Giving Google the cold shoulder When it comes to minimizing your digital footprint, we have to start with Google. Just imagine the dossier the company has on you: search history, sites you visit, Google Play purchases, location data from Android and Chrome and Maps, your Google Drive documents...it looks like a lot when it's all spelled out like that, doesn't it? To its credit, Google takes data security seriously, receiving fairly good marks in the Electronic Frontier Foundation's annual "Who has your back?" survey. But Google also makes heavy in-house use of your data, a point that touched a nerve with announcements of the company's plans to use your real name and face in online advertising (not to mention Microsoft's "Scroogled" campaign). Divorcing Google isn't a realistic option for most people, though, given its superior services and sheer ubiquity. Switching to Microsoft's services still leaves your information in the cloud. So what can you do if you want to reduce the amount of data you're sharing with either online monolith? Firefox's private browsing mode kills cookies dead. To start, you can keep Google from collecting and sharing your data as much as possible. Using your browser's private/incognito mode will erase tracking cookies, including Google's, when you close it. You can also tell Google to stop trailing you in your account's Web History page (at the expense of Google Now features) and take a minute to tweak your general Google privacy settings. Another solution is to replace what Google services you can with more private alternatives. Do you use Google Docs but don't really need its online capabilities? Try the open-source Libre Office suite. If you need only basic image-editing capabilities, skip Picasa and stick to Paint.net. What about Google Drive's on-the-go docs? We'll talk more about cloud storage later. And if you can cut the Google cord completely, there's always the nuclear option. (Here's how to shutter your Microsoft account for good measure.) Facebook Google may have a wide reach, but when it comes to mapping your social connections, no company knows more than Facebook. And just like Google, Facebook is practically impossible to shut out of your life. You need it to sign in to your favorite services, play games, chat, and keep in touch with pals. Tweaking your Facebook profile's privacy settings can keep other people's eyes at bay—but Facebook itself has a reputation for questionable user data decisions. How to give Zuck the cold shoulder without divorcing Facebook completely? You don't want to be among the first Graph Search results for "Males in New York that like Drugs and Marijuana" or anything similar. Mind those Likes, and those privacy preferences. Easy: Stop hitting that "Like" button so much and consider removing past thumbs-ups. Don't add extra information to your profile such as life events, places you've lived, and so on. (Here's a video on deleting life events.) Finally, decide whether you want to continue sharing your photo library online. Is anybody really looking at them, or are they just fodder for Facebook's face-detection algorithms? Facebook also tracks you as you travel from site to site, using the Like buttons embedded on each. Make sure you're signed out of Facebook to prevent that from happening, or use your browser's private mode. You can delete your Facebook account if you're able (and willing) to cut the socialite cord completely. Cloud storage If you slap your files in a cloud-storage locker for anytime, anywhere access, you probably don't want to give up that convenience. You can, however, seize control of your cloud documents by encrypting them, which helps protect against the data breaches (such as two that happened to Dropbox and Apple) and government information requests faced by many cloud providers. Note that while many services (such as Dropbox) encrypt your data on their servers, they control the encryption keys in most cases. That means you are not in control of when or for whom that encrypted data is unlocked, but it also makes using the service easier—just enter your login information and go! A truly "zero-knowledge" cloud provider such as SpiderOak or Wuala, on the other hand, never has access to your encryption key, meaning that only you can unlock your data. (Don't lose the key!) Alternatively, you could manually encrypt files bound for SkyDrive, Google Drive, Dropbox, SugarSync, or any other cloud service, using a tool like TrueCrypt or the cloud-focused BoxCryptor. Western Digital's My Cloud connected storage drive lets you build your own private cloud. Or, if you want anytime, anywhere access to your files but don't want to entrust your stuff to anyone else, you could use a Net-connected storage drive like Western Digital's My Cloud to create your own personal cloud-storage solution. All the rest We've taken care of your major online accounts, but what about all those random accounts you have connected to your social networks? Go through the settings of your Facebook, Twitter, and Google+ accounts to see the list of apps and services connected to them. Then simply remove access permissions for the ones you no longer use. Speaking of apps and services, part of good data hygiene is regularly deleting accounts you've left by the wayside. Go ahead: Close that MySpace profile and kill your Klout score if you're not using them. The tip of the iceberg Now that you have at least some of your data under control, you could look at numerous other things, as well. We briefly touched on restricting who can track your browsing while online. For a real eye-opener, try using Abine's DoNotTrackMe add-on for a week and see how many tracking cookies the add-on blocks. You could also use a stand-alone email program configured using the POP3 protocol to save your email locally and wipe your messages from your provider's servers. (Here's the info you need to do just that with Outlook.com, Gmail, and Mozilla's Thunderbird client.) For an even more comprehensive look at the topic, check out Macworld's seven-part series on protecting your online privacy—but note that some of the tips apply only to Apple's ecosystem. Going off-grid online is borderline impossible these days, but taking just a short time to tidy up your online footprint can pay big dividends for your security and your privacy. Source : PCWorld
Recent Comments