The privacy cliff and how not to fall off it
by Siobhan MacDermott - Chief Policy Officer, AVG Techologies - Tuesday, 5 February 2013.
Bookmark and Share
Beyond this, further empower and simplify for the consumer. Specifically, enlist e-commerce stakeholders to create a single, simple, universal digital form that consumers may complete online to express their privacy requirements. Then require businesses to access and respect these forms. The result: Users who choose not to file a form may be tracked by default, and those who choose not to be tracked will not be.

Finally, beyond even this, develop technologies enabling consumers to manage their data as they would any other asset. One emerging technology is the personal data locker (PDL). A cloud service for storing anything one creates or does online, a PDL functions like a personal bank account. The individual controls it, and no third party can access it without the consumer’s permission. PDLs can put consumers and businesses on an equal privacy footing.

Empowering consumers acknowledges the transnational reality of Internet commerce. The day after Commissioner Reding’s address, U.S. Ambassador to the EU William E. Kennard spoke to the same Conference. He discussed, among other issues, “International Interoperability” and “Regulatory Cooperation,” the areas in which the U.S., EU, and all national sovereignties clash loudest.

The only means for achieving permanent interoperability and cooperation is to create, by international treaty, a transnational cyber zone for digital commerce. Modern ideas of national sovereignty date to the origin, some 500 years ago, of the nation-state. Alas, the utility of this durable invention does not extend into cyberspace. As no nation claims to control an entire ocean just because its waters touch its coast, no nation can claim sovereignty over cyber space just because it is a node on the network.

Going forward, a combination of consumer empowerment and legal recognition of what the Internet already is—transnational—provides a simple, uncompromising alternative to suffering the collective fate of digital lemmings. Consumer empowerment and transnational recognition is the only way back from the privacy cliff.

Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //