Welcome. Please log in or register.

Panel: New rules, tech needed for data privacy

By Anne Broache
Staff Writer, CNET News.com
Published: September 9, 2005, 1:51 PM PDT

WASHINGTON--The feds need new privacy rules and technological methods to police their use of personal data from contractors like ChoicePoint and Acxiom, representatives from within and outside the government suggested Friday.

"There are some valid uses of commercial data," Nuala O'Connor Kelly, chief privacy officer for the Department of Homeland Security, said in closing remarks at a two-day public workshop hosted by the office she runs. She pointed to the roles data brokers have played during Hurricane Katrina's aftermath in providing, for example, information needed to verify the identities of displaced storm survivors seeking their prescription medications.

The best protection against privacy intrusions is "for the government not to have the data for any long amount of time," O'Connor Kelly said. "Let's use basic holding and processing constraints to limit the government's access to data, whatever the source."

But building public trust in the government's intentions is still a major obstacle, a host of workshop panelists said. The Transportation Security Administration, for one, took heat recently for failing to provide adequate disclosures of personal data usage.

To start building that trust, the government must more clearly define its purposes for acquiring certain information, said Jim Dempsey, executive director of the Center for Democracy and Technology. Then it should ask, "Is it accurate enough for this purpose? Is it relevant to this purpose? Are we getting what we need for this purpose?" he said.

The Privacy Act of 1974 already requires government agencies to disclose information about their data use in many cases and to allow people to correct errors in their own data sets. But some panelists noted that the law's wording makes it unclear whether such regulations apply to government interactions with commercial data brokers, which the measure did not anticipate.

Now Congress needs to step in and form privacy rules that apply equally to all government agencies, suggested Fred Cate, director of the Center for Applied Cybersecurity Research at Indiana University. A handful of measures geared toward data safeguards have been introduced this term, but they primarily address steps data brokers must take in the event of a security breach.

Michael Daconta, Homeland Security's metadata program director, spoke of the need to bring "discipline" to the way that agencies manage personal data. "There are really no strong, consistent rules across the federal government on how to model these things," he said.

He cited, as an example, databases that have a column labeled "identifier," which contains a number that corresponds to a person's set of data. Some systems assign a random number, which wouldn't divulge a person's identity at a glance, but others use a social security number. Creating standardization--in this example, doing away with using social security numbers--would provide privacy benefits, Daconta said.

New techniques on the technology side are also important, though they could raise privacy questions of their own, panelists said.

John Bliss of IBM said the government could consider employing systems that "anonymize" data. Say, for example, the government wanted to compare a cruise passenger list and to a terrorist watch list, but the cruise company feared that turning over the complete list for the sake of a few potential violators would anger its customers. The anonymization system would hash each of the lists so that they would be indecipherable to the opposite parties but, even in this encrypted state, could be programmed to flag matches among the lists.

But if a match did surface, who would be allowed to decode and analyze it? "Ultimately, it becomes a very critical question for which business rules must be implemented and enforced," Bliss said.

Several panelists suggested that any new systems need to be equipped with an immutable audit trail--that is, a tamper-proof, automated way of logging who has accessed data sets and what they have done with them.

"I think we're all saying the same thing," said Steven Adler, also of IBM. "We want effective checks and balances in the use of data."

Read more on this story's topics

 3 comments
Post a comment

TalkBack

Here in Australia User Information Over the Internet

Raymond Kirk   Sep 13, 2005, 4:16 AM PDT

wish I had checks and balances

J O0o   Sep 10, 2005, 6:33 AM PDT

advertisement

Did you know?

Select a tab below to set your default view.

Scan the 15 newest and most read stories on News.com right now. Learn more

Updated: 2:53 AM PST
View as:
Gates touts Microsoft's supercomputing move Build-it-yourself cell phones Microsoft eyes ads as consumers close wallets Google Base service goes live Apple threat prompted name change, coders say Microsoft eyes making desktop apps free As teens embrace blogs, schools sound an alarm A movie projector in a cell phone? Amazon tries its hand at tagging Motorola plans Apple-style product launches Microsoft makes its way to 64-bit chips Global chip sales seen rising in 2006 Sony launches free Internet phone service IBM lands giant server deal with China Images: Meshing maps with UFOs, housing 
Legend:
Older
Newer
Larger boxes indicate hotter stories.

Image galleries

Resource center from News.com sponsors

Concerned About Computer Security?

Education is the best defense

Computer security threats are part of daily life. But today's malware techniques present unprecedented challenges for businesses of all sizes. Learn how to protect yourself.

Learn from the experts>>

CNET Poll

Top picks from News.com readers

Readers who read Panel: New rules, tech needed for data privacy also read...

More Info

Daily spotlight

Doerr talks up Web 2.0

At the TechNet Innovation Summit in San Jose, Calif., John Doerr, a partner at venture firm Kleiner Perkins Caufield & Byers, talks to ZDNet Editor in Chief Dan Farber about how he thinks this is a period of "intense innovation" that will empower consumers.

Microsoft sees no money from Money

Software giant isn't getting rich off many of its best-known consumer software titles, CNET News.com has learned.

Perspective: iPod porn pains parents, employers

Attorney Eric. J. Sinrod says the potential for iPod pornography is no longer a theoretical exercise.

Google Base service goes live

Service allows people to post "all types of online and offline information and images" that may be searchable on several Google sites.
Photos: Google Base--all that's fit to post

Perspective: The new name of the media game

CNET News.com's Harry Fuller says new media and old media are both missing the boat.

U.S. retains control of the Net

High Impact Last-minute deal at United Nation summit in Tunisia creates a new forum but maintains status quo.

Build-it-yourself cell phones

High Impact Frustrated at limitations on mainstream mobile phones, "homebrew" enthusiasts are building their own.
Photos: Tinkering with phones

A home theater in your front pocket

High Impact New technology could put tiny projectors inside cell phones, MP3 players.
Photos: Tiny projectors

Teens: Beware of your Web pages

Recent events at schools illustrate how reckless teens can be when it comes to posting personal information online.
Friendster for sale?

Symantec beats the research drum

The company is making research a higher priority--investing more resources in the group and aggressively developing technology in-house.
Photos: Behind the scenes at Symantec

Photos: 007's car for sale

James Bond's 1964 Aston Martin DB5 coupe will go up for sale for the first time in 35 years.

Perspective: Is it 'lights out' for e-mail?

MailFrontier CEO Anne Bonaparte warns that e-mail skepticism is on the rise.

advertisement
CNET.com
Copyright ©2005 CNET Networks, Inc. All Rights Reserved. Privacy Policy | About CNET Networks | Jobs | Terms of Use