Monthly Archives: August 2014

16-31 August 2014

Big Data

US – Researchers Release Paper on Big Data Pitfalls

Princeton University’s Solon Barocas and lawyer Andrew Selbst have published their paper on “Big Data’s Disparate Impact.” While big data has its benefits, they argue, data mining as a decision-maker “has the potential to reproduce existing patterns of discrimination, inherit the prejudice of prior decision-makers or simply reflect the widespread biases that persist in society,” adding that antidiscrimination doctrines currently on the books aren’t equipped to handle the concerns arising from big data’s pitfalls. [SSRN]

Canada

CA – OPC Annual Report: Online Transparency is “Significant Concern”

In the Office of the Privacy Commissioner’s (OPC) 2013 Annual Report to Parliament on the Personal Information Protection and Electronic Documents Act (PIPEDA), online transparency is cited as “a significant concern.” The OPC accepted 426 PIPEDA complaints in 2013, almost double from the year before (although 183 pertain to one complaint against Bell Canada). “It is becoming increasingly apparent that the protection of privacy demands a partnership between individuals and the corporations with which they interact,” said Privacy Commissioner Daniel Therrien. “Like any successful partnership, this must be based on trust and therefore openness. Now that personal data has become such a precious coin of commerce, the rules governing its collection, use and disclosure must be crystal clear, well-understood and actively accepted.” The OPC dedicated the report to former Privacy Commissioner Jennifer Stoddart. [CBC News] [Canada: Privacy complaints doubled in 2013] See also: Mondaq reports on opportunities for public input on British Columbia’s Personal Information Protection Act (PIPA), including public hearings on September 8 and 9, and written submissions will be accepted until September 19th.

CA – Retired Judge Recommends Spy Agency Increase Protections

Communications Security Establishment Canada (CSEC) Commissioner Jean-Pierre Plouffe, a retired judge, says CSEC should do more to protect Canadians’ privacy. Plouffe said if CSEC intercepts emails made to a person in Canada, such emails should either be marked for deletion or as essential to national security. If deemed essential, they should be reevaluated every quarter to verify whether they are still required. Plouffe recommended the government issue a directive to CSEC on information-sharing with its partners, spelling out how Canadians should be protected, and “CSEC itself should ‘promulgate guidance to formalize and strengthen practices for addressing potential privacy concerns’ involving the Five Eye partners,” the report states. [Reuters]

US – The Supreme Court Decision on IP Addresses and Its Implications

Canada’s Supreme Court unanimously concluded individuals “may have an interest in anonymity on the Internet that should be taken into account in determining whether law enforcement should have warrantless access to subscriber information associated with Internet Protocol addresses.” The court determined Internet service providers’ (ISPs’) terms of service and the Personal Information Protection and Electronic Documents Act (PIPEDA) “did not affect the analysis in the way previous courts had suggested,” writes Timothy Banks of Dentons Canada in this Privacy Tracker post. “The court rejected the idea that PIPEDA permits an organization to respond to a police request that would otherwise violate an individual’s reasonable expectation of privacy.” This decision sets the stage for consideration of other data and has implications for any organization that receives police requests for information. [Source]

CA – Number 25: Dr. Ann Cavoukian – Canadian Power 50

Ann Cavoukian, Executive Director, Ryerson University, Institute for Privacy and Big Data: While few outside the world of privacy regulation know her name, the former Ontario Information and Privacy Commissioner is Canada’s most powerful broker in convincing corporations and government agencies to treat people’s private data with care. “She was more a force of nature than a regulator,” says Jules Polonetsky, of the Future of Privacy Forum, a think tank in Washington, D.C. “She’s used every policy tool, and then some, to advance the Privacy by Design agenda.” Cavoukian’s model encourages corporations, governments and other organizations to embed privacy alongside normal business practices. She counts GE, McAfee and Intel among .her enthusiastic supporters. Cavoukian’s strategy has been to work with companies and organizations to help them achieve their goals, while still ensuring they uphold strict privacy standards. ‘‘If you approach privacy in this way, you will always get a seat at the table,” Cavoukian says. “Otherwise you don’t get heard.” [Canadian Business Magazine]

Consumer

US – Fitbit Responds to Senator’s Public Call for Transparency, Legislation

Despite concerns raised by Sen. Charles Schumer (D-NY), Fitbit says it does not sell personal data to advertisers. Schumer warned of a potential “privacy nightmare” regarding concerns the company sold users’ data to advertisers and called for federal regulations to require it and similar companies to allow customers to prevent their data from being sold. But the company responded by spelling out its privacy policy on its website. Meanwhile, Neustar’s privacy officer Becky Burr tries to alleviate customer concerns over worries about data-aggregating companies like hers in a sponsored post on Business Insider. [Associated Press]

WW – Survey: 80% Want Limits on Third-Party Data-Sharing

GFK has released its Survey on Data Privacy and Trust, in which it interviewed 1,000 Americans in an effort to understand the way they perceive and manage their personal data and how this differs by generation. The survey found 59% say their level of concern for their data has risen in the past 12 months, and two-thirds of respondents from older generations say the government isn’t doing enough to protect their data. “Overall, almost 80 percent of respondents feel that there should be more regulations, preventing organizations from repurposing personal data to third parties,” the report states. [Source]

US – BBB: Cross-Device Tracking Requires Notification, Opt-Outs

The Better Business Bureau (BBB) has warned that, based on its Accountability Program, companies engaging in cross-device tracking—including cookies, fingerprinting and other technology—must provide users with notification and opt-outs. The BBB’s Genie Barton said if companies are “tracking online and they’re going to use the information cross-screen, they need to tell consumers that and make clear that consumers can opt out.” [MediaPost]

E-Government

UK – Ban Junk Mail Companies from Accessing Electoral Roll, Councils Say

Junk mail companies should be barred from being able to buy access to the personal data of millions of people including their names and addresses, council leaders have said. Under present rules marketing companies can buy the details of 1,000 people from the electoral roll for £21.50 and use it to send out junk mail promoting products and services. The data is held on the public version of the electoral roll, meaning any person or company can buy the information. While people can choose not to be listed publicly on the register, very few are aware that they can do so. Councils fear that concerns about junk mail could be deterring people from signing up to vote and are calling for the public register to be scrapped. More than 11 billion items of junk mail are produced each year in the UK with each household getting at least 400. The industry is worth about £250 million. [The Telegraph]

US – Vote! You Just Might Win $50,000

To get people more involved–and prevent further embarrassment–the city is now considering a pilot program that would use lottery-type cash prizes as enticement to get locals to participate in elections. The Los Angeles Times reported that on Thursday night, the Los Angeles Ethics Commission voted unanimously to recommend that the city council begin offering cash prizes to voters randomly as soon as next year. “Maybe it’s $25,000 maybe it’s $50,000,” said [Ethics] Commission President Nathan Hochman. “That’s where the pilot program comes in–to figure out what … number and amount of prizes would actually get people to the voting box.” … “Wouldn’t we get a lot of people who know nothing about politics or the candidates jumping in and voting and just checking the box so they could get a million bucks?” the radio host asked Guerra. “Absolutely,” Guerra responded. But, he added, that might not be bad thing. “That might produce better results. There is no data to show that uninformed voters make worse decisions than informed voters.” (TIME)

NZ – Public Servants See Inappropriate Access of Personal Data

A survey has found that one in every 20 public servants has seen a colleague inappropriately accessing or misusing a client’s personal information in the past year. The finding doesn’t surprise Accident Compensation Corporation client Bronwyn Pullar, who was sent files about almost 7000 other ACC clients in one of New Zealand’s worst privacy breaches in 2012. “I don’t think New Zealanders appreciate the extent to which there is inappropriate and unauthorised use of information,” she said. “It does raise serious concerns about the degree of access Government employees have over people’s private information, particularly sensitive health information.” The survey found that the highest proportion of public servants who saw improper access or misuse of personal files – 7% – was in the district health boards (DHBs). The numbers were 4% in core government departments, 3% in non-DHB Crown agencies such as ACC, and 2% in other Crown entities such as TVNZ. [nzherald.co.nz]

E-Mail

EU – Judge Says Microsoft Must Turn Over eMails Stored on Server in Ireland

A US District Judge in New York has ordered Microsoft to turn over email records stored on a company server in Ireland to US authorities. US District Judge Loretta Preska wrote that “it is a question of control, not a question of the location of that information.” Privacy laws in Europe are stronger than those in the US. [ArsTechnica] [ZDNet]

WW – Facebook Reports Enormous Uptick in Use of Snoop-Proof Email

The social network sends billions of emails to users daily and says adoption of the encryption standard it uses has skyrocketed among webmail providers. The percentage of emails sent from Facebook that are received by webmail providers which support encryption has jumped from less than 30% in May to 95% by mid-July, according to a Facebook blog post. [Source]

Electronic Records

US – National Database Could Streamline Care, But Concerns Persist

There are concerns about state health information exchanges that could one day connect, compiling patient data in a vast national database. It’s already likely becoming a reality as states create health information exchanges that will allow professionals nationwide to access records. While advocates say a centralized storage center makes sense from a patient-care perspective, streamlining access to information and reducing redundancies as well as costs, critics worry about where the data will be stored, who will have access and how it will be used. [InformationWeek]

Encryption

US – NIST Report Urges Tighter Implementation of SSH

According to a report from the National Institute of Standards and Technology (NIST), US companies are not implementing Secure Shell (SSH) appropriately or well. SSH is often used to allow automated communications between hosts. The report says, “The security of SSH-based automated access has been largely ignored.” NIST is accepting comments on the document through September 26, 2014. [The Register] [NIST] [Reading Encryption Keys from Surface Electric Potential Measurement] [Mobile Applications use bad SSL Implementations]

WW – Will Tokenization Be the Way Forward for Data Transfers?

The possibility of foreign government access to personal information has been a hurdle to international data transfers, even between countries with strong ties such as Canada and the U.S. Timothy Banks writes about a report from BC Information and Privacy Commissioner Elizabeth Denham indicating there may be hope for Canada-U.S. data transfer in the form of “tokenization,” a system of de-identifying data using random tokens as stand-ins for meaningful data. While questions remain, Banks writes, “Denham’s openness to considering this method of de-identification illustrates a practical commitment on the part of Canada’s data protection authorities to revisiting the issue of de-identification, which could have broader implications for data processing and data use.” [Privacy Tracker] Timothy Banks writes for Privacy Tracker about a report from BC Information and Privacy Commissioner Elizabeth Denham that indicated there may be hope for Canada-U.S. data transfer in the form of “tokenization,” a system of de-identifying data using random tokens as stand-ins for meaningful data.

EU Developments

EU – Court Rules Facebook Must Respond to Schrems Suit

A class-action lawsuit against Facebook will move forward after an Austrian court said the company must respond to the 25,000 individuals who joined in the complaint alleging the company violated its users’ privacy. Earlier this month, privacy activist and lawyer Max Schrems filed the lawsuit against the social network. The suit alleges Facebook’s data use policy violates EU law, including reusing data without an individual’s consent and unauthorized sharing of user data with third parties. Europe-v-Facebook, the group led by Schrems, is demanding 500 euros per individual in the suit. The Vienna Regional Court ruled Facebook has four weeks to address the complaints but said it can file for a four-week extension. [ZDNet] [Austrian court orders Facebook to respond to privacy suit claims] SEE ALSO: Newly appointed EU Justice Commissioner Martine Reicherts pushed for clearing up the right-to-be-forgotten debate and adopting strong data protection reform soon, according to a Europa press release.

France’s data protection authority, the CNIL, will begin conducting cookie audit on websites in October, and for the first time ever, will be able to do so remotely.

EU – Telegraph Keeping List of Stories Taken Down Under RTBF

Thus far, 250,000 takedown requests have been made under the Court of Justice of the European Union (CJEU) “right to be forgotten” ruling in May requiring Google to remove links to any content that is “inadequate, irrelevant or no longer relevant” or else face a fine. Though the content is not deleted, Google will not list it in its search results. Users searching for a particular topic on google.co.uk will see a message indicating the information has been removed under data protection laws, while those using the U.S. site google.com will be unaffected, even if they live in the UK. The Telegraph has begun a running list of the paper’s content that has been removed from search results. [Source]

UK – Direct Marketing Association Code of Practice – Direct Marketing Association

The new Code of Practice focuses on 5 principles – put the customer first (understand the customer’s needs and offer relevant products and services), respect privacy (act in accordance with customer expectations), be honest and fair (act in a transparent manner, and do not use high-pressure sales tactics), be diligent with data (treat personal data with care and respect, in accordance with data privacy principles), and take responsibility (members are responsible for the actions of their agents and must have records to demonstrate compliance with the Code). [Source]

Facts & Stats

US – Companies Say Users Consented to Uploading of Contacts

Twitter, Yelp, Foodspotting and other app developers are asking a federal judge to dismiss a lawsuit accusing them of violating iPhone users’ privacy by uploading their address books. In court papers, Twitter argues that the users who are now suing previously consented to share information about their contacts by opting in to the service’s “find your friends” feature, the report states. Twitter says the users have no grounds to sue for storing the data. Yelp and Foodspotting have responded to the suit with similar arguments. [MediaPost] See also: [How to Read (and Actually Understand) a Wearable Tech Privacy Policy]

WW – Extending Passwords Best Defence Against Password-Cracking Tools

Longer passwords are harder to decode than those which are shorter but more complex in nature, according to a new study. A technology expert has said that the news has implications for companies’ password policies and for the risks involved in storing encrypted versions of the passwords. “Many general users and some IT administrators incorrectly assume that using various uppercase letters, lowercase letters, numbers and special characters in a password will make it more secure,” Trustwave said. “The practice would likely make it harder for a human to guess your individual password, but it does not make recovering the password any more resource-intensive for password-cracking tools. Only increasing the number of characters in the password dramatically affects the time it will take an automated tool to recover the password.” Trustwave explained the findings as it outlined the result of a study it conducted into password security. The company built two machines to decipher 626,718 ‘hashed’ passwords and said it managed to work out more than half of those encrypted passwords within a few minutes. It “eventually cracked 576,533 or almost 92% of the sample within a period of 31 days”, it said. [Source] See also: [The password of the future may be your heartbeat — no, really]

Filtering

US – University Bans Social Media, Political Content and Wikipedia Pages on Dorm Wifi

Northern Illinois University enacted an Acceptable Use Policy that goes further than banning torrents, also denying students access to social media sites and other content the university considers “unethical” or “obscene.” A discussion on the ban was brought to Reddit by user darkf who discovered the new policy while trying to access the Wikipedia page for the Westboro Baptist Church from his personal computer in his dorm room. The student received a filter message categorizing the page as “illegal or unethical.” It seems possible to continue to the webpage, but the message warns that all violations will be reviewed. (BetaBeat)

WW – People are More Likely to Self-Censor If Others Online Disagree WithThem

In the age of social media, it may seem like everyone has an opinion to share on the latest news of the day. But a new study released by the Pew Internet and American Life Project has revealed that, in fact, there may fewer opinions on your feeds than you think. Last summer, researchers from Rutgers University and Pew asked 1,800 American adults how likely they were to speak out, online and in person, about the news that former NSA contractor Edward Snowden leaked information regarding domestic surveillance to media outlets. They found that while 86% of Americans would be willing to have a conversation about the issue in person, just 42% of Facebook and Twitter users were willing to post about it on those platforms. The study also found that peer pressure on these sites is alive and well. If people thought their opinions would be well received, they were more likely to post about the topic. But even the thought that some of their followers and friends might disagree led many to self-censor. And the more information people had about the diversity of opinions on their social networks, the less likely they were to speak up, the study found. That unwillingness to speak up also transferred to the real world. [The Washington Post]

WW – Thermal Imaging to Become Smartphone Add-On

Smartphones are getting a new way of seeing: thermal imaging. A group of industry veterans plan to begin selling an add-on camera for smartphones for about $100 or less that will allow for generated color thermal images that can be contrasted with traditional images using a split-screen feature. It may be used for finding lost pets, playing hide-and-seek or spotting intruders, for example. “It’s very hard to hide from a thermal imager,” one expert said. “You can’t get behind a bush—you will show up.” [The Wall Street Journal]

FOI

US – MIT Researchers Create “HTTP with Accountability”

Researchers at the Massachusetts Institute of Technology (MIT) Decentralized Information Group are creating a new tool to stymie the “inadvertent misuse” of sensitive data by unauthorized users. Dubbed “HTTP with Accountability,” or HTTPA, the tool would automatically scan the transmission of private data, allowing the data owner to analyze how it’s being used. Under the guidance of web founder Tim Berners-Lee, MIT graduate student Oshani Seneviratne and CSAIL Research Scientist Lalana Kagal will share their insights on HTTPA at the IEEE’s Conference on Privacy, Security and Trust this July. “It’s not that difficult to transform an existing website into an HTTPA-aware website,” Seneviratne says. “On every HTTP request, the server should say, ‘OK, here are the usage restrictions for this resource’ and log the transaction in the network of special-purpose servers.” [ZDNet] See also: [Canada: SaskTel has under-reported how often the company gives customers’ information to government agencies and police] and [SK: Names of disciplined teachers should be withheld, privacy commissioner says]

Genetics

US – NIH’s Genome Project Data-Sharing Policy Suggests Seeking Broad Consent

The National Institutes of Health (NIH) has released a data-sharing policy promoting the sharing of “large-scale human and nonhuman genomic data generated from NIH-funded research.” The goal is to “speed the transition of data into knowledge, products and procedures that improve health while protecting the privacy of research participants.” The NIH is encouraging those using genomic data to seek “the broadest possible sharing permissions” from participants for the future use of their data, the report states. [HealthData Management] [US: NIH Releases Final Genomic Data Sharing Policy] See also: Advocates in Minnesota are pushing to reinstate a DNA collection law deemed unconstitutional by an appellate judge now that the U.S. Supreme Court has okayed the practice.

Google

WW – Google to Offer Kids Under 13 Online Accounts

Google plans to offer accounts to children under the age of 13 for the first time. Sites typically avoid offering services to children under that age because of the U.S. Children’s Online Privacy Protection Act, which requires parental consent and tightly controls how data may be used. But Google’s new system would allow parents to set up accounts for their kids and control how they use Google services and what information about their children can be collected. [The Wall Street Journal] See also: [Meanwhile, Junkee’s Elizabeth Flux reports on a Google Maps website that reveals, when a user’s location services are on, where the phone has been for up to a month. For the website to work, a user must log in with the same account used on a smartphone and have location services turned on.]

WW – Google Goes Public With Security Audits to Ease Corporate Concerns

Google is taking unprecedented steps to show its cloud, business, and education customers that data protection is its top priority. To prove its commitment, Google is making the details of an independent security audit and of a security compliance certificate available to the public for the first time on its Google Enterprise security site. The SOC 3 Type II audit report and updated ISO 27001 certificate denote security approval for Google Apps for Business, Google Apps for Education, and Google Cloud Platform. Security and data centers are both big business. Google currently employs more than 450 full-time security engineers, and a Gartner study projects that companies will spend nearly 8 percent more on security this year than they did last year. The SOC 3 report and the ISO certificate that Google made public are widely accepted, internationally recognized security compliance standards. The SOC 3 is essentially a shorter report from the same audit as the longer SOC 2, while the ISO certification covers organizational and logical security. [CNET]

AU – Google’s Knowledge Vault Already Contains 1.6 Billion Facts

Google has decided to create the largest store of knowledge in human history and it is going to create it without using human brainpower. Google’s Knowledge Vault is a massive database of facts, built up by an algorithm that autonomously trawls the web and transforms data into useable, bite-sized pieces of information. The predecessor of Knowlege Vault, known as Knowledge Graph, used crowdsourcing techniques but Google realised that humans could only take the project so far; computers could drastically speed up the process. To date the Knowledge Vault contains over 1.6 billion facts. This huge fact reservoir will be the basis of future search engines. Google is currently racing Microsoft, Facebook, Amazon and IBM, who are all attempting to build the same kind of database. The Knowledge Vault will be the foundation for smartphone and robot intelligence. Siri is going to get a lot better at interpreting what you mean when you ask her questions in the future. In the future, virtual assistants will be able to use the database to make decisions about what does and does not matter to us. Our computers will get better at finding the information we are looking for and anticipating our needs. Once the Knowledge Vault can interpret objects on sight, it will become integral to real-time information generation. One day you might be able to walk around, point your phone at an object, ask a question about it and recieve an intelligent response. At the Conference on Knowledge Discovery and Data Mining in New York on 25 August Kevin Murphy and his team will present a paper on the Knowledge Vault. [Science Alert]

Health / Medical

US – Why Psychologists Need Social Media Best Practices

Steven Petrow discusses his concerns with mental health professionals sharing too much about themselves online, particularly on social media sites like Facebook. The issue started when Petrow saw much of his analyst’s personal information because of the privacy settings on the doctor’s personal Facebook account. “At that point, I started wondering,” Petrow wrote, “Are there no social media best practices for mental health professionals?” As of now, there are not, but, he reports, the American Psychological Association (APA) has published “The Internet’s Ethical Challenges,” in which APA Director Stephen Behnke writes, “psychologists have special ethical issues they need to think through to determine how this technology is going to affect their work.” [The Washington Post]

Horror Stories

US – 200 Hospitals Hit Affecting 4.5 Million Patients

Tennessee-based Community Health Systems (CHS) says that intruders accessed its system over a three-month period earlier this year, compromising patient names, addresses, and Social Security numbers

(SSNs) of 4.5 million people. The company maintains that medical and financial information was not affected. CHS operates more than 200 hospitals in 29 US states. The company claims that the attacks emanated from China. Information in CHS’s Securities and Exchange Commission (SEC) Form 8-K filing says that the intruders were attempting to obtain medical equipment device development information, but were thwarted in their efforts. [DarkReading] [BBC] [NYTimes] [ComputerWorld] [The Register] [CHS SEC Filing]

WW – Breach Roundup

South Korea – 70% of South Korea’s population between the ages of 15 and 65—and more than half of South Korea’s total population—may have had their personal information stolen in a data breach involving 27 million people and 220 million records. Sixteen hackers were arrested on Thursday for allegedly circulating the records and conducting money laundering schemes which earned them at least $390,000. The hackers targeted registration pages for online gaming and gambling sites and online ring tone and movie ticket stores.

UPS – UPS announced that 51 UPS locations have been affected by a malware breach. UPS was quick to do the math to assure customers that the breach only impacts about 1% of their 4,470 franchised stores. The Wall Street Journal reports that the breach affected approximately 105,000 customer transactions. The malware may have been in the stores as early as January 20, 2014, but UPS believes the breach began after March 26, 2014. The malware was eliminated by August 11, 2014, so UPS says it’s safe to use your card in UPS Stores now. A full list of affected stores is available on the UPS website. [CNET] [Ars Technica] [NBC News] [SC Magazine]

PlayStation Network – A group named Lizard Squad says it was responsible for a DDoS (distributed denial of service) attack that took down PlayStation Network on Sunday. Sony announced that the network was back online and no personal information had been stolen. Lizard Squad’s attack escalated beyond simply shutting down the PlayStation Network when the group tweeted that there were explosives on board an American Airlines flight carrying Sony Online Entertainment President John Smedley. The FBI is now investigating the bomb threat, and Lizard Squad says it is moving on to target Xbox Live.

JPMorgan ChaseAccording to security firm Proofpoint, JPMorgan Chase customers are under attack in a phishing scheme called a “Smash and Grab Campaign.” Approximately 500,000 phishing emails have been sent out so far, with 150,000 emails in the first wave. Here’s how it works: after clicking a link in a phishing email designed to look like it’s from JPMorgan Chase, a customer is taken to a login webpage that automatically installs Dyre banking Trojan on the user’s computer, whether or not the customer decides to enter login information. Proofpoint says the attackers are not worried about stealth, and are instead focusing on sending out a high volume of emails in hopes that some percentage of recipients will click on the links. Reuters reports that the attack is consistent attacks by Eastern European cyber gangs.

Backoff – According to a Secret Service announcement on Friday, more than 1,000 U.S. businesses have been compromised by a Point of Sale (PoS) malware dubbed “Backoff.” Seven PoS system providers and vendors have confirmed that some of their clients were affected by the malware. No breaches have been directly connected to Backoff, although there is speculation that the malware is tied to recent breaches such as Target, Supervalu, and UPS. The existence of Backoff was first announced on July 31, 2014, by the National Cybersecurity and Communications Integration Center and U.S. Secret Service.

Onsite Health Diagnostics – Third time is not the charm for Onsite Health Diagnostics. Children’s Mercy Hospital in Kansas City is notifying 4,076 individuals that they were victims of a data breach that occurred two years ago when the hospital registered for a wellness program, according to the Kansas City Star. The compromised information was originally collected in 2012 and stored by Onsite Health Diagnostics. When Onsite discovered the breach, it deleted the old data that had been on its servers ever since 2012. This is the third reported breach involving Onsite this year.

USIS – Two weeks ago, I wrote about a potential breach to U.S. Investigative Services (USIS). At that time, the scope of the breach was not known, but it now looks like up to 25,000 government workers may have been affected by the breach in the Department of Homeland Security, U.S. Immigration and Customs Enforcement, and U.S. Customs and Border Protection units, according to sources in the investigation. USIS has begun emailing those affected by the breach, informing them that their Social Security numbers, birth dates, education and criminal history, and names and addresses of relatives and friends, may have been accessed, according to Reuters.

US – LinkedIn, Capital One Settlements Total Nearly $77 Million

LinkedIn has agreed to pay $1.25 million to settle a class-action lawsuit stemming from a 2012 data breach. The settlement requires LinkedIn to pay up to $50 to some of the users who purchased premium memberships, and the company promises to protect users’ passwords by “salting” and “hashing” them for the next five years, the report states. One lawyer called the settlement “extraordinary” because it provides “significant direct cash to the class and valuable prospective relief.” Meanwhile, users who sued Facebook for privacy violations are asking a California judge to consider U.S. District Judge Lucy Koh’s recent refusal to toss similar claims brought against Yahoo, and Capital One Financial Corp. and three collection agencies have agreed to pay one of the largest settlement amounts in history—$75.5 million—to end a privacy class-action. [MediaPost]

Identity Issues

EU – CNIL on Traffic Measurement, Analysis of Consumer Behavior in Stores

Companies that implement devices which record consumer behavior (through a billboard camera or a mobile phones) are obliged to take steps that ensure the anonymity of data subjects; for billboard cameras ensure that the images are not stored, transmitted or are visible to device providers. Prior to setting up these devices, authorization is required from the CNIL for any system that automatically measures the audience of an advertising device or analyzes the typology or the behavior of people around an advertisement. [CNIL]

EU – Netherlands: DPA Issues Second Opinion on the Benefits of eID

The DPA has issued a second opinion (source document in Dutch) on a report on the public benefits of a new electronic ID system (“eID”). This system is being developed by the Dutch government together with the private sector as an online identification and authentication system that may be used for the exchange of personal data in the context of the online provision of services. The DPA questions whether the eID system will in practice increase security overall compared to the current DigiD-system and is concerned that due to a higher level of security, more confidential information will be shared, which in turn introduces new security issues. [Mondaq News]

Internet / WWW

WW – Ralph Lauren Releases “Smart” Polo Shirt

Designer Ralph Lauren has released a “smart” Polo shirt. The compression shirt has knitted-in sensors capable of reading biological data such as heartbeat, respiration, stress level and energy output. The shirt’s aim is to “improve general wellness and increase physical fitness,” according to the brand. It was developed with a Canadian-based maker of wearable fitness trackers. “Our goal is to create and reflect the ultimate lifestyle, and we believe a healthy and active life is an essential part of that,” said a Ralph Lauren representative, adding, “Ralph Lauren is excited to help lead the industry in wearable technology in this ever-evolving, modern world.” [PC Magazine] EE ALSO: [HP Investigates “Internet of Things” devices and finds plenty of Vulnerablities]

UK –Spies Have Scanned the Internet Connections of Entire Countries

Heise has obtained documents showing that a GCHQ system, Hacienda, can scan every internet address in a given country to see both the connection types in use (such as web servers) as well as any associated apps. The scanning platform is looking for relevant targets and any exploitable security holes; if a target is running software with known vulnerabilities, it’s relatively easy for agents to break in and either swipe data or set up malicious websites that trick suspects into compromising their PCs. Poring over this much data would normally be time-consuming, but there’s a companion system (Olympia) that makes it easy to find useful information within minutes. The technology itself isn’t shocking; anyone can do this, if they don’t mind incurring the wrath of internet providers and law enforcement. However, the global scale of Hacienda is bound to raise eyebrows. Agents had scanned 27 whole countries as of 2009, along with parts of five others — it’s clear that the goal is to have complete national network maps on demand, whether or not they’re really needed for investigations. GCHQ can also hand its findings over to the NSA and other intelligence groups. There are ways to thwart this probing, such as the early version of an internet stealth protocol (TCP Stealth), but it could be a while before you’re completely off the radar. [Source]

Law Enforcement

US – Ferguson Events Prompt Calls for Police Body Cams

Amidst the events swirling in Ferguson, MO, calls for police-mounted body cameras have been increasing, but some are concerned such surveillance could pose significant privacy issues, including the loss of anonymity in public and lack of national guidelines for proper use. The cameras would be mounted either on an officer’s chest or sunglasses to record interactions with citizens and suspects. The Electronic Frontier Foundation’s Jennifer Lynch asks, in a separate report , “What happens to the data after the fact?” UC Berkeley’s Jen King points out that putting secure systems in to protect sensitive data collected by the cameras requires expertise that many departments simply do not have. [New York Times]

US – California Cops Caught Using Police Database to Spy on Potential Mates on Online Dating Sites

Two veteran police officers in Fairfield, California are being investigated for using confidential law enforcement databases to obtain private information about women they met on online personal websites. Sergeant Stephen Ruiz and Detective Jacob Glashoff are accused of misusing the California Law Enforcement Telecommunications System database in order to pry into the lives of women they were interested in meeting on Tinder.com, Match.com, eHarmony.com, and Care.com, according to court documents. Authorities were alerted to the pair’s actions by one of their colleagues, who said that they were on the sites “while at work every day for what seems like months,” and were “often having their own side conversations regarding dating sites.” [The Daily Republic] See also: [The Sexual Predator App With a 100 Percent Conviction Rate]

Location

US – Smart Outlet Startup Raises $1.65 Million in Seed Funding

Zuli, a startup “making a connected outlet with presence detection and energy monitoring, has raised $1.65 million in seed funding from several investors.” That follows a Kickstarter launch in December that raised more than $175,000, the report states. Zuli’s CEO says it plans to partner up with other smart home device-makers interested in the “Bluetooth mesh concept,” which offers presence detection—communicating where a person is in relation to a smart outlet. [GigaOm]

Online Privacy

WW – Attack on TOR Attempted to Strip Traffic Anonymization

The TOR Project has issued an advisory about malicious relays being used to launch an attack on the TOR network that persisted for five months and may have revealed identifying information about the network’s users. The TOR Project says it stopped the attack on July 4. The attack appears to have been designed to unmask TOR users’ identities. It is possible that the attack was launched by researchers at Carnegie Mellon University, who recently cancelled a talk they planned to give at the Black Hat security conference at the behest of CMU lawyers. The TOR Project also said that anyone who used the service or operated the service during that time “should assume they were affected.” [ArsTechnica] [BBC] [ZDNet] [SCMagazine] [v4.co.uk] [TOR Project Advisory]

WW – Analysis of Chrome Extensions Finds Malicious Activity

Researchers analyzed extensions for Google’s Chrome browser and found that many conduct malicious activity, including fraud and data theft. The activity often remains undetectable to most users. Of 48,000 extensions analyzed, 130 were “outright malicious,” and more than 4,700 exhibited signs of suspicious behavior. [ComputerWorld]

WW – Blog Names Unsecure Apps and Services

A Tumblr blog called HTTP Shaming posts a list of apps and services that do not take sufficient measures to protect user data. The site’s creator hopes that making this information known will prompt companies to encrypt data sent over wireless networks. The number of apps and services on the list currently stands at 19. If a case is deemed especially serious, it is not posted until the organization responsible for it is contacted so they can mitigate the problem. [ArsTechnica] [SMH.com] [

WW – App Store Removing Privacy-Friendly Apps

Certain apps are being removed from the Android app store based on Google’s policy of banning apps that interfere with other apps. Disconnect Mobile is one such app that was recently removed from the store; its aim was to stop other apps from collecting data on users. The practice is indicative of the concerns that some have voiced over the amount of control Google, and its rival Apple, have through their app stores. Casey Oppenheim, Disconnect’s co-founder, notes, “There is no reason why you shouldn’t have the same degree of control over the computer you have in your pocket as you do over your computer on your desktop,” but a Google spokeswoman says its policies are “designed to provide a great experience for users and developers.” [Wall Street Journal]

WW – Tumblr Partners With Photo-Scanning Company

Social network Tumblr has reached a deal with photo analysis company Ditto Labs to scan its users’ photos to help companies better understand how their brands are being perceived online. T.R. Newcomb, Tumblr’s head of business development, said, “Right now, we’re not planning to do anything ad-related.” Meaning, for example, if a bottle of Coke appears in a user’s photo, that user will not start receiving Coke ads. “If Coke wants to understand the nature of the conversation (about them on Tumblr) Ditto can sift through and deliver it to Coke,” Newcomb said. According to the report, Tumblr appears to be the first major online company to employ such photo-scanning techniques. [Mashable]

WW – Unlocking the Web’s Black Box

A new tool for tracking personal data online. Called XRay, the open-sourced tool created by researchers at Columbia University reverse-engineers correlations made by web services-for example, Gmail or Facebook ads or Amazon product recommendations-to help understand how the ads or recommendations are served up. “The web today is a big black box,” said one of the researchers. “What’s needed is transparency.” [New York Times]

WW – On “Creepy” Personality Tools and Data Doppelgangers

There is criticism over the amount of user data Facebook may be able to collect under changes to its ad network. Some are also criticizing the U.S. Federal Trade Commission for allowing the company to make the changes, arguing they violate a 2011 privacy settlement. The Post also looks into a new tool called Five Labs that scans a user’s Facebook profile to generate a personality test. Five Labs’ Nikita Bier said the most common response from volunteers who helped with the program was “this is kind of creepy” and many asked if Internet companies would use this kind of analysis on users. The Atlantic examines “why customized ads can be so creepy, even when they miss their target.” [The Washington Post]

US – AOL Won’t Respond to DNT Until Uniform Standard Exists

AOL has disclosed it doesn’t respond to do-not-track (DNT) signals. The company said it may be willing to reconsider its position “if the industry can agree on a uniform do-not-track standard,” the report states. In part of its most recent privacy policy update, AOL inserted a new section indicating how it intends to react when a DNT signal is sent by an online user. [Law 360]

Other Jurisdictions

AU – Australian Legislation Would Give Intelligence Agency Broad Access to Computers

Legislation proposed by Australian attorney general George Brandis would broaden the Australian Security Intelligence Organisation’s (ASIO) access to computers and networks. Some legal experts say that the law could be interpreted to give ASIO access to every Internet-connected computer. Civil liberties groups are also concerned about provisions that would criminalize journalists who receive and publish leaked documents. [ZDNet] [The Guardian] SEE ALSO: At the recent APEC’s Data Privacy Subgroup meetings, Canada submitted its Notice of Intent to participate in the Cross Border Privacy Rules system, meaning, after a favorable determination by the APEC’s Joint Oversight Panel, Canada will become the fourth country to join the system. Supratim Chakraborty writes on India’s data privacy regime. Advocates are calling for laws to keep up with Internet usage in Indonesia. Some say Romanian law requiring registration of pre-paid SIM cards violates citizens’ privacy rights.

NZ – Plan to Expose Breaches of Privacy Act

Privacy Commissioner John Edwards says his office is considering naming and shaming agencies that break the rules on personal information. Mr Edwards said until now, agencies and companies that breach the Privacy Act have rarely been named publicly. He said the new policy would enable the office to be a more effective regulator, particularly in cases of repeat offenders. The Office of the Privacy Commissioner will release a discussion document on the naming policy next week to get public feedback on the idea. In the interim, Mr Edwards said he planned to make more use of the regulatory powers he already had and take a tougher line on privacy breaches. [Radio New Zealand News]

MX – DPA Won’t Challenge New Telecom Law; Advocates Outraged

The battle over Mexico’s new telecom law persists, Global Voices reports, with many citizens fearing the law could mean censorship and an increased level of digital communications surveillance in the country. Privacy advocates are looking to Mexico’s Federal Institute for Access to Public Information and Data Protection (IFAI), but the IFAI voted in a recent plenary session not to challenge the proposed law in the Supreme Court—a decision that sparked backlash on the Twittersphere. The law would allow law enforcement to monitor calls and text messages without warrants and give Mexico’s attorney general the authority to solicit real-time data on cell-phone locations. [Global Voices] Mexico’s Federal Institute for Access to Public Information and Data Protection says it won’t challenge a new law that many fear could mean censorship and an increased level of digital communications surveillance in the country.

Privacy (US)

US – FTC: We Need Comprehensive Data-Security Legislation

While the FTC is responsible for ensuring fair trade practices, it has “been steadily hacking the law to make itself into a privacy and security officer responsible for protecting Americans’ data,” writes Kashmir Hill. It’s come with some controversy, as evident in the case of Wyndham Hotels, in which the FTC charged the brand with “unfair” data practices. Wyndham fought back that the FTC doesn’t have the regulatory authority to oversee data security, and the case is now headed to the Third Circuit. While unable to discuss the Wyndham case, speaking at hacker conference Defcon, Federal Trade Commissioner Terrell McSweeny said, “This reinforces my support—and it’s a unanimous position held by the FTC—that we need comprehensive data-security legislation.” [Forbes]

US – Military Contractors Face New Breach Disclosure and Procedure Deadlines

Contractors for the US Defense Department are facing a new deadline for rules that will require them to report breaches to the Pentagon and to grant the government access to their networks so they can conduct attack analysis. Concerns about the rules include requiring companies to report even minor breaches and allowing the government access to trade secrets and personal information. The rules were part of a congressional Defense Department budget authorization measure in 2013. Director of communications for the Aerospace Industries Association Daniel Stohr said, “Cyber security is increasingly becoming the cost of doing business with the federal government.” [Bloomberg] The American Farm Bureau Federation has filed a complaint in a Minnesota federal court against the Environmental Protection Agency for its public release of farmers’ and ranchers’ personal information.

US – Sen. Questioning Airline Privacy Practices

Sen. Jay Rockefeller (D-WV) has sent a letter to 10 major U.S. airline companies inquiring about their data privacy practices. Rockefeller noted consumer advocates are concerned airline privacy policies “can contain substantial caveats and that it is difficult for consumers to learn what information airlines and others in the travel sector are collecting, keeping and sharing about them.” United, Delta, American and Southwest were among the airlines Rockefeller contacted. “Data collected during ticket purchase can include a passenger’s name, credit card numbers, date of birth, addresses, travel destinations and travel companions,” he wrote, adding, “No comprehensive federal privacy law currently applies to the collection, use and disclosure of consumer travel information.” [PCWorld] Sen. Jay Rockefeller (D-WV) has sent a letter to 10 major U.S. airline companies inquiring about their data privacy practices.

US – Judge Rules LinkedIn Must Face Privacy Lawsuit

Professional services social network LinkedIn must face a privacy class-action lawsuit alleging the company violated its users’ privacy when it accessed their external e-mail accounts, downloaded their contacts’ e-mail addresses and solicited business from those contacts. U.S. District Court Judge Lucy Koh said the practice “could injure users’ reputations by allowing contacts to think that the users are the types of people who spam their contacts or are unable to take the hint that their contacts do not want to join their LinkedIn network,” adding, “In fact, by stating a mere three screens before the disclosure regarding the first invitation that ‘we will not … e-mail anyone without your permission,’ LinkedIn may have actively led users astray.” [Reuters]

Privacy Enhancing Technologies (PETs)

WW – Despite Tools, Anonymity Online Remains Difficult—If Not Impossible

Despite the proliferation of privacy-enhancing tools, anonymity online remains difficult to achieve. Some popular web browsers—Chrome, Firefox, Internet Explorer and Safari—offer “private” web browsing. But that kind of privacy only applies to the user’s computer, the report states; websites can still identify computers by their IP addresses. Similar problems exist with cookie-blocking, encryption and browsers like Tor. Meanwhile, new research findings indicate millennials are determined to take back their digital privacy. [Tech Crunch] See also: [Amazon Web Services First Cloud Provider Authorized to Handle Sensitive DOD Data] and [WSJ: For German, Swiss Privacy Start-Ups, a Post-Snowden Boom | WSJ: Can This Little Orange Box Beat the NSA?]

WW – Researchers Create Privacy Wrapper for Android Web Apps

Users can wrap Facebook and other apps to better control their privacy and security, according to researchers from North Carolina State University. On a mobile application, users typically have a single choice to protect their privacy: install the application or not. The binary choice has left most users ignoring permission warnings and sacrificing personal data. Most applications aggressively eavesdrop on their users, from monitoring their online habits through the device identifier to tracking their movements in the real world via location information. Now, a research group at North Carolina State University hopes to give the average user a third option. Dubbed NativeWrap, the technology allows Web pages to be wrapped in code and make them appear as a mobile application, but with user-controlled privacy. Because many applications just add a user interface around a Web application, the user should have equivalent functionality for many wrapped apps, said William Enck, assistant professor in the department of computer science at North Carolina State University. “You can go to any Web site that you want to turn into an app and create your own custom version that can be installed to your phone,” he said. “Permissions are determined by you, the user.” Numerous studies have found that applications routinely use unnecessary permissions to collect data on users. A study released in February by McAfee found that 82% of applications tracked their users. 99 of the top 100 free mobile applications on both Android and iOS had at least one risky behavior, according to application-reputation firm Appthority’s Summer 2014 App Reputation Report. Paid applications were not much more respectful of their users’ privacy: 87% of iOS and 78% of Android apps risked users’ privacy and security. Appthority defines risky behavior as the collection of location information and device identifiers, the allowing of in-app purchases, or the accessing of the contacts database or the user’s calendar. [ARS Technica]

Security

US – Survey Says Companies Not Prepared to Manage Insider Threats

According to the “2014 Insider Threat Survey” from Spectorsoft, more than half of IT and security professionals feel that their organizations are not adequately prepared to deal with insider threats. The study surveyed 255 people at small and medium sized businesses in the US, Latin America, and Europe. Fifty-five percent attributed the lack of preparedness to a lack of training; 51% attributed it to insufficient budgets; and 34% said that inside threats were not a priority. [SC Magazine] See also: Kaspersky Report Shows Users are concerned about online risks but don’t do anything about them.

US – Study: University Networks Less Secure than Retail, Healthcare Sectors

According to a report from BitSight Technology, college and university networks face greater risk of attacks than retail and healthcare networks. Attackers target university systems during the academic year, and many schools do not have the resources to protect their networks. The report says that part of the reason that network security is worse during the academic year is the presence of so many devices that students bring. Universities can also be appealing targets for data thieves because of the abundance of personal data and research data. Also, many schools have partnerships with government agencies, which could put those agencies at risk as well. Most attacks on university systems come from malware, and most of those are from Flashback, which targets Macs. [SC Magazine] [ZDNet] [NBCNews]

US – FBI and DHS Plan to Provide Healthcare Organizations More Threat Info More Quickly

Following a breach that compromised personal information of 4.5 million patients seen at hospitals operated by Community Health Systems (CHS), representatives from the FBI and the US Department of Homeland Security (DHS) say they are taking steps to share more threat information more quickly with organizations in the healthcare sector. [ComputerWorld]

WW – Researcher Finds Vulnerabilities in Antivirus Products

A researcher in Singapore examined antivirus products and found remotely exploitable flaws in 14 of them. Analysis accompanying the results indicates that many antivirus products pose security risks by requiring broad privileges, not signing updates, and delivering updates over HTTP. [SysCan] [The Register] [ComputerWorld]

WW – Android Reset Flaw Allows Data Recovery

Several Android devices, including the Tesco Hudl, are affected by a reset flaw that allows recovery of data that users may believe they have erased from the device. Three separate investigations, which were carried out with used devices purchased through eBay, came to the same conclusion. [BBC] [The Register] See also: [Android Fake ID Vulnerability]

WW – Tesla to Hire Hackers to Find Connected Car Vulnerabilities

Electric carmaker Tesla Motors will hire up to 30 full-time hackers whose job will be to find and close vulnerabilities in the firmware that controls its cars. “Our security team is focused on advancing technology to secure connected cars,” said a company spokesman, adding the focus is now on “setting new standards for security and creating new capabilities for connected cars that don’t currently exist in the automotive industry.” Tesla’s cars are some of the most digitally connected cars in the industry, the report states, with batteries, transmissions, engine systems, climate control, door locks and entertainment systems remotely accessible via the web. [ComputerWorld].

CA – Study estimates 36 % of Canadian Businesses Know They’ve Been Hit by Cyber Attack

More than one-third of Canada’s IT professionals know — for sure — that they’d had a significant data breach over the previous 12 months that could put their clients or their organizations at risk, a cybersecurity study suggests. And as startling as that statistic may be, the actual number of breaches could be higher since the same international study found 56% of the 236 Canadian respondents said they believed threats sometimes fall through the cracks. “Even the best-protected networks have regular security incidents,” says Jeff Debrosse, director of security research for Websense, a U.S.-based security company that commissioned the study. A Statistics Canada report in June said that six per cent of the 17,000 private Canadian enterprises it surveyed had experienced an Internet security breach in 2013. About one-quarter of those reporting a breach — representing roughly 260 companies — said client or proprietary information had been corrupted, stolen or accessed without authorization. The Websense report done by the Ponemon Institute, a private-sector think-tank that conducts independent research on privacy, found 36% of the Canadian companies in the study had experienced one or more cyber attack over the previous year that infiltrated networks or enterprise systems. It also found 89% cent of the Canadian respondents said they personally know another security professional whose company had sensitive of confidential data stolen as a result of an inside threat. It also found 23% of the Canadian cyber security teams never speak with their executive team. Of those who did, nearly half did so only annually or semi-annually, while only two per cent talked weekly with executives about security. “If the conversation is happening less than monthly, that’s a pretty significant problem,” Debrosse says. [Source]

Surveillance

CA – Peeping Drone ‘An Invasion of Privacy,’ B.C. Homeowner Says

A Victoria-area resident says she spotted a drone buzzing around her property, but police say their hands are tied. Laura Moffett says the man, who was flying the drone in a park across the street, was allegedly trying to peek inside her home in Oak Bay. “It’s an invasion of privacy. We have a skylight above, and on the weekend I had my nieces and nephews around playing in the pool, and what if he had been doing it then and taking videos?” said Moffet. But Oak Bay police Sgt. Chris Goudie says the actions weren’t criminal, and police won’t be recommending any charge. “There’s nothing on the books for hobbyists. It’s much like a remote control airplane. Where it’s going to come to our attention is when they’re intruding on people’s privacy.” Last week a Vancouver man filmed a drone flying spying on his False Creek area highrise condo. [Source]

US – Incentive-Based Insurance Programs on the Up, But Who Has Data Access?

Insurance companies are increasingly offering consumers a deal: Let us track your driving and we’ll give you an annual discount if you behave yourself on the road. In theory, everyone wins, as consumers save money and insurance companies attract safer drivers. But such programs generate vast amounts of data, and while insurance companies promise it’s for their eyes only, some experts have concerns that that’ll change—perhaps to a central industry database. And while the big companies aren’t yet tracking driver location, at least one company is testing it. Meanwhile, researchers in Brazil have presented a potential solution to the pervasive problem of distracted drivers: a dashboard camera in front of a driver capable of spotting cell phone use. [The New York Times] See also: [Datenschutzkommission, Austria – Decision DSB K121.998 – Vehicle Monitoring]

US – ‘Smart’ Lighting System Provides Surveillance at U.S. Airport

Newark Liberty International Airport has installed 171 “smart” LED lighting fixtures, attached to the ceiling, that peer down and record the movements of passengers and staff. They’re incredible pieces of technology: Sure they illuminate, and use much less energy than other lights. But each lighting fixture also has computing and networking capabilities. The system includes cameras and sensors that feed data into it. The airport won’t discuss the system’s full capabilities, but we know it can monitor licence plates of cars entering the departure area or the parking lots. [Sourc]

US – Dance Depicts a Farewell to Privacy

“Surveillance” is a new 60-minute dance performance at New York Live Arts this week that looks at an Orwellian Big Brother society. “In a society in which people need to film or photograph everything, what intimacy is left?” writes Alastair Macaulay. The dance is choreographed by Zvi Gotheiner and features depictions of people passing through a body check, ostensibly at a national border, and illustrates a sense of humiliation felt by the subjects of the searches. In another scene, one dancer videotapes another, and later, the camera is turned on the audience. [The New York Times]

Telecom / TV

US – White House Advising Police to Keep Quiet on Cell Data Sweeps

The Obama administration has been “quietly advising local police not to disclose details about surveillance technology they are using to sweep up basic cellphone data from entire neighborhoods.” The administration, citing security reasons, has intervened in “routine state public records cases and criminal trials regarding use of the technology,” the report states, resulting in police departments “withholding materials or heavily censoring documents in rare instances” when the documents include information about the purchase and use of the surveillance equipment. [Associated Press] [Any government can track your cellphone with right technology] and [Canada: Lost smartphones can lead to anxiety disorders: Study]

US Government Programs

US – CIA Director Apologizes for Unauthorized Access of Senate Committee Computers

CIA Director John Brennan has apologized to the Senate Intelligence Committee for improperly accessing Senate computers during the Senate’s investigation into Bush-era interrogation practices. Brennan called the action “inconsistent with the common understanding” between the agency and Senate overseers. Earlier this year, Brennan denied that the CIA had accessed the computers. [NextGov] [ArsTechnica] [NBC News]

US – NSA’s Search Engine Allows Agencies to Share Data

In the latest leak from Edward Snowden, an internal search engine has been built by the NSA allowing the agency to share vast amounts of surveillance data with nearly two dozen government agencies. Called ICREACH, the “Google-like” search engine shares more than 850 billion records, including phone calls, emails, cell-phone location data and Internet chats. Key participants, the report states, include the Federal Bureau of Investigation and the Drug Enforcement Agency. ICREACH is accessible by as many as 1,000 analysts at 23 U.S. government agencies and can handle between two and five billion new records per day. [The Intercept]

US Legislation

US – California Assembly Passes Groundbreaking Student Privacy Bill

California’s Assembly on Monday approved first-in-the-nation privacy measures prohibiting the use of students’ personal information for profit. The Student Online Personal Information Protection Act was authored by Senate Leader Darrell Steinberg (D-District 6) and passed the Assembly unanimously on a 71-0 vote. The bill “would end targeted advertising on K-12 websites, services and applications” and also “prohibits operators from using any information gained from the use of their K-12 site to target advertising on any other site, service or application,” according to a press release from Steinberg’s office. The bill will now head to the Senate for a vote. [Source] See also: [What Student Data Do Schools Collect?] See also: [Calgary principal apologizes after students’ personal information disclosed]

US – Delaware Passes Legislation Grants Heirs Access to Digital Assets

The US state of Delaware has passed legislation giving a person’s heirs the right to digital assets, such as social media accounts, in the event of incapacitation or death. The Fiduciary Access to Digital Assets and Digital Accounts Act, signed into law by Governor Jack Markell, allows a person’s heirs to assume control of digital accounts and devices just as they would any physical assets and documents. [ArsTechnica]

US – House Passes Bills to Address Critical Infrastructure Security

The US House of Representatives has approved legislation aimed at improving the cyber security of companies that operate elements of the country’s critical infrastructure. One of the bills would create public-private partnerships. Another bill focuses on improving critical infrastructure security technology, and a third bill is aimed at building DHS’s cyber work force. [NextGov] Sen. Ron Wyden (D-OR) discussed the need for outdated privacy laws to be changed in order to “reflect both the Constitution and public expectations.”

US – House Bill Would Require Federal CIOs to Sign Off on Web Site Security

A bill passed by the House of Representatives would require federal websites that retain personally identifiable information to be certified as secure by an agency chief information officer. New sites would have to obtain CIO approval before going live. Sites that are already live and were launched after October 1, 2013 would have to obtain the approval within 90 days of the bill’s passage. [NextGov] JDSupra has published a summary of changes made to U.S. state data breach notification laws.

US – Tennessee Legislature Adds Employee Privacy Protections to “Internet Accounts”

“Accessing information about employees and applicants via their social media accounts just got a bit more complicated in Tennessee. This past legislative session, the Tennessee General Assembly passed the Employee Online Privacy Act of 2014 aimed at protecting employees and applicants from being forced by an employer to turn over access to their social media accounts. The Act makes Tennessee part of a growing number of states enacting similar legislation. Although the Act, which takes effect January 1, 2015, can be seen as a win for employee privacy, it is not an absolute bar to employers using social media as a tool to monitor their employees’ and applicants’ actions. The law still leaves several permissible purposes for which employers may utilize social media in the employment context.” [More] [Source]

US – CA Drone Privacy Bill Moves Forward; Amazon Seeks DOT Exemption

A California bill that would place strict regulations on how law enforcement and other government agencies can use drones passed the California Assembly. The bill would require law enforcement to obtain warrants before using drones except in cases of emergency such as fires or hostage situations. Other public agencies would be able to use drones as long as the purpose is not for gathering criminal intelligence. The bill now heads to the governor’s desk. Meanwhile, the Association for Unmanned Vehicle Systems International has written to the U.S. Department of Transportation to grant Amazon an exemption under Federal Aviation Administration rules that would allow it to conduct immediate outdoor tests of its commercial drones. [Reuters] See also: [Eyes in the Sky: Inquiry into Drones – The Parliament Of The Commonwealth of Australia]

US – California Passes Law Mandating Smartphone Kill Switch

Smartphones sold in California will soon be required to have a kill switch that lets users remotely lock them and wipe them of data in the event they are lost or stolen. The demand is the result of a new law, signed into effect on this week, that applies to phones manufactured after July 1, 2015, and sold in the state. While its legal reach does not extend beyond the state’s borders, the inefficiency of producing phones solely for California means the kill switch is expected to be adopted by phone makers on handsets sold across the U.S. and around the world. The legislation requires a system that, if triggered by an authorized user, will lock a handset to essentially make it useless. The feature must be installed and activated in new smartphones, but users will be able to deactivate it if they desire, and it must be resistant to attempts to reinstall the operating system. Police can also use the tool, but only under the conditions of the existing section 7908 of the California Public Utilities Code. That gives police the ability to cut off phone service in certain situations and typically requires a court order, except in an emergency that poses “immediate danger of death or great bodily injury.” The law doesn’t specify how the system locks the phone, nor what happens to the data on the phone when it’s locked. Each manufacturer can come up with their own system. [PC World]

Workplace Privacy

US – Survey: Some Employees Would Trade PI for Benefits

According to a report on workplace privacy, nearly one-third of respondents said they would be willing to trade personal data to their employers for certain benefits. Conducted by PricewaterhouseCoopers (PwC), the research surveyed 10,000 employees and 500 human resources (HR) professionals worldwide. PwC Global HR Consulting Leader Michael Rendell said, “Just as advertisers and retailers are using data from customers’ online and social media activity to tailor their shopping experience, organizations could soon start using workers’ personal data (with their permission) to measure and anticipate performance and retention issues,” adding, “This sort of data profiling could also extend to real-time monitoring of employees’ health, with proactive health guidance to help reduce sick leave.” [The Financial]

ON – Canada: Employer Asks HRTO for Permission to Access Employer’s Own “Occupational Health and Claims Management” File on Employee

Must an employer obtain permission from the Human Rights Tribunal of Ontario to access medical records held in the employer’s own file on an employee who filed a human rights complaint with the Tribunal? That question is raised by a recent Tribunal decision. The employer submitted that Tribunal authorization was necessary “because there may be a conflict with respect to privacy standards required by applicable legislation. The respondent indicates that the expectations and protections under the Personal Health Information Protection Act . . . for health information custodians regarding disclosure may be different from the duty imposed on employers by the Occupational Health and Safety Act . . . The respondent submitted that the Tribunal has granted the orders it seeks in other cases in which similar circumstances arose.” The employer was likely referring to subs. 63(2) of the OHSA which states: “No employer shall seek to gain access, except by an order of the court or other tribunal or in order to comply with another statute, to a health record concerning a worker without the worker’s written consent.” The case illustrates that employers seeking to use information in an employee medical file for litigation purposes should proceed cautiously and should seek a court or Tribunal order if necessary. [Mondaq News]

+++

16-30 June 2014

Biometrics

WW – Industry: “There Is No Anonymity If We Choose to Live in Society”

The recent National Telecommunications and Information Administration (NTIA) meeting on drafting a voluntary code for commercial uses of facial recognition technology was short, but not for lack of contentious debate. As promised at the last NTIA meeting, the trade association representing the biometrics industry prepared a draft of principles on a code, and there were a few people who didn’t like what it had to say—at all. It’s a particularly heated time to talk facial recognition: More than 30 privacy and civil liberties groups sent the Justice Department a letter this week asking that it complete a “long-promised audit of the FBI’s facial-recognition database,” while behavioral authentication company Biocatch has raised $10 million to expand its biometric authentication platform. But the meeting turned on this one sentence: “There is no anonymity if we choose to live in society.” Angelique Carson reports for The Privacy Advisor.

US – Biometrics Industry Introduces Best Practices Draft, Advocates Don’t Like It

The International Biometrics Industry Association has introduced a discussion draft on proposed self-regulatory standards on facial recognition as part of the National Telecommunications and Information Administration (NTIA) multi-stakeholder process. The draft, introduced ahead of the NTIA’s June 24 meeting, has some privacy advocates upset. The Center for Digital Democracy’s Jeff Chester said the draft is “just the latest example of where the NTIA process is being run by industry lobbyists who really don’t want to see consumer privacy protected.” [Broadcasting & Cable] [Biometrics and its Emerging Role in Financial Services]

US – Researchers’ Work Takes “Quantified Self” to New Level

A prototype wearable device is designed to detect nonverbal body noises—including coughing, laughing and teeth grinding—that can provide evidence of a person’s mood and health. Developed by researchers at Cornell University, the system attaches behind a user’s ear and could possibly be integrated with Google Glass in the future. Its built-in sensors can detect subtle clues to determine mood and emotional state. “We see ‘quantified self’ and health tracking taking off, but one unsolved problem is how to track food consumption in an automated way,” said the lead researcher of the technology. She said if enough people use it, for example, the health of a city may be measured. [MIT Technology Review]

US – Match Pairs Up with Facial Recognition Company to Find Clones of Exes

Popular dating site Match.com is rolling out facial recognition technology that will help users find “clones” of their exes. Three Day Rule, the company partnering with Match for the facial recognition tool, bases its model on the fact that “attractive” means different things to different people. Match users can opt in to the Three Day Rule database to be paired up. The software identifies hair color, face shape, eye shape and eyebrow structure of the “ex” to find a match. While that gives some folks the creeps, the algorithm is not much different than what other sites are using these days, the report states. [The Washington Post]

Big Data

WW – Big Data Discrimination Issues the Focus of Winners at PLSC

Over the past year, the idea of big data analytics and its potential for discriminatory harm has only gained steam. IAPP VP of Research and Education Omer Tene published with the Future of Privacy Forum’s Jules Polonetsky about the topic in a paper called “Judged by the Tin Man”; Michael Schrage wrote about it for Harvard Business Review , and the White House reports on big data highlighted potential discrimination as an issue to watch. Perhaps it’s not surprising then that the two IAPP prize-winning papers at this year’s Privacy Law Scholars Conference both deal with big data and the increasingly complicated systems that employ it. The IAPP’s Sam Pfeifle interviews the four authors of the two papers in this exclusive for The Privacy Advisor.

Canada

CA – Commissioner Cavoukian Calls on Govt to preserve Freedom and Liberty

In the final annual report of her unprecedented third term as Ontario’s Information and Privacy Commissioner, Dr. Ann Cavoukian draws attention to the need for greater transparency and accountability from the provincial and municipal governments. She also calls on Canadians to keep the pressure on our country’s leaders to ensure that the message of “respect our privacy, respect our freedoms,” is heard loud and clear. Entitled Freedom and Liberty, the Commissioner has put forward four key recommendations in her report to safeguard Ontarians’ right of access to public records, and holding government to account:

  • New Consequences for Insufficient Records Retention
  • Municipal Councillors’ Records
  • Government Contracts
  • Modernization of the Acts. [Source] [2013 Annual Report]

CA – Commissioner Therrien: Human Rights Run in My Blood

Daniel Therrien applied for the job as Canada’s federal privacy commissioner as soon as he read the news: Jennifer Stoddart would soon retire. For many in the privacy community, the government’s subsequent approval of Therrien for the role earlier this month was confusing. Most hadn’t heard of him—and he certainly wasn’t known among the privacy circuit. In an exclusive interview, Angelique Carson spoke with Therrien about how he feels his career to this point, his upbringing, even his home in the country, all align perfectly with his new role as the chief protector of Canadians’ privacy. [The Privacy Advisor] [Therrien believes his public safety background will bolster privacy watchdog role]

CA –Supreme Court Says Warrant Required to Obtain Customer Data from ISPs

Canada’s Supreme Court has ruled that law enforcement agencies must obtain a warrant to request customer information, such as names, addresses, and phone numbers, from Internet service providers (ISPs). The court ruled that individuals are entitled to a reasonable expectation of privacy, but did not overturn the conviction of the man whose case brought the issue before it because the police had been acting in good faith. [The Register] [R. v. Spencer – 2014 SCC 43 – Supreme Court of Canada]

CA – B.C.’S Top Court Says Police Cellphone Searches Unconstitutional

British Columbia’s highest court says police must obtain a warrant before searching through the vast amounts of personal information stored in a smartphone, the latest in several court judgments across Canada warning law enforcement that the contents of cellphones are private. The B.C. Court of Appeal released a decision that concluded the RCMP violated the rights of a man charged in a kidnapping when they searched two of his BlackBerry smartphones without a warrant. The court also made it clear that police must ask for permission before examining the contents of a smartphone. “It seems to me that downloading the entire contents of a cellphone or smartphone, like the BlackBerrys in this case … can no longer be considered valid … as a reasonable warrantless search,” Justice Risa Levine wrote in a unanimous decision. “The highly invasive nature of these searches exceeds the permissible scope for a warrantless search authorized under the common law as a search incident to arrest.”[The Canadian Press]

EU – WP 29 Opinion: Wait on Quebec Adequacy Decision

The Article 29 Working Party has released an opinion recommending the European Commission “wait to consider whether the Canadian province of Quebec’s data protection legal regime is adequate to preserve the privacy of personal data received from the European Union.” The opinion raises several points, including “that the territorial scope of the Quebec Act in relation to the PIPEDA should be clearly defined before any decision on its adequacy is taken by the European Commission” and stating “the Working Party considers necessary any initiative, such as a legislation change or a court ruling, offering a clear definition of the notion of ‘sensitive information’ … (and) considers that the onward transfer principle needs to be clarified in Quebec’s law.” [EU Europea] [Bloomberg BNA] {H&W Blog]

CA – Examining Ontario’s “Vicarious Liability” Case

Norton Rose Fulbright Canada LLP’s Christine Carron, Pamela Sidey and Randy Sutton consider the question, “Should an employer be held vicariously liable if an employee breaches the privacy of a company’s customers?” They write that according to Ontario’s Superior Court of Justice, “vicarious liability for the nascent tort of ‘intrusion upon seclusion’ could be the basis of a nationwide class-action for non-pecuniary damages.” The authors note employers could also face liability “for failing to adequately supervise employees and protect their customers’ personal and financial information.” [Mondaq]

CA – Poll: Most Canadians Don’t Approve of Bill C-13

A new poll by Forum Research indicates most Canadians oppose Bill C-13, “at least when asked about elements of Bill C-13 that have nothing to do with cyberbullying.” The survey, which was conducted earlier this month, included 1,433 respondents. Of those, “more than two-thirds of Canadians disapproved of a stipulation in the controversial bill that would allow authorities to access personal data without a warrant,” report states, noting 79% of those who have personal data online “said they expect their personal information to remain confidential and private.” [The Huffington Post Canada] [Letter to Prime Minister Steven Harper Regarding Canada’s Growing Privacy Deficit – AMINA Corp, Canadian Civil Liberties Association, Canadian Internet Policy & Public Interest Clinic et. al]

CA – New Tool Helps Canadians Find Out if Telecoms are Collecting Their Info

Canadians concerned about their online privacy have a new way to find out whether their telecom provider is collecting information about them — and sharing it with third parties like government entities. The new tool, developed by some of the country’s top privacy experts, makes it easier for Canadians to force their provider to disclose their practices. “What we’re trying to do as researchers is identify what kind of data telecommunications companies in Canada collect, obtain, and process, and disclose to third parties,” said Dr. Christopher Parsons, a fellow at the Munk School of Global Affairs’ Citizen Lab. “But we also wanted to make it easier for Canadians individually to engage in the same sort of action.” Known as “Access My Info,” the web tool helps create a formal letter which, under Canadian privacy law, telecom companies are legally obliged to respond to within 30 days, the website offering the tool says. The project was developed by OpenMedia.ca, the Citizen Lab and the Digital Stewardship Initiative. [The Canadian Press]

CA – Ring Outlines Recommendations That Would Dismantle Bill 29

Newfoundland and Labrador Privacy Commissioner Ed Ring’s first presentation at the Access to Information and Protection of Privacy Act Review Committee hearings, where he “outlined a series of recommendations that he says will equate to the dismantling of Bill 29, the province’s privacy legislation.” Ring’s office has spent much time in court since the controversial Bill 29 was passed, the report states, noting those court cases often involved determining “if solicitor-client privilege exceptions are valid.” Ring has called the process “expensive, time-consuming and frustrating,” the report states. [Voxy]

CA – The Supreme Court Decision on IP Addresses and Its Implications

Canada’s Supreme Court unanimously concluded individuals “may have an interest in anonymity on the Internet that should be taken into account in determining whether law enforcement should have warrantless access to subscriber information associated with Internet Protocol addresses.” The court determined Internet service providers’ (ISPs’) terms of service and the Personal Information Protection and Electronic Documents Act (PIPEDA) “did not affect the analysis in the way previous courts had suggested,” writes Timothy Banks of Dentons Canada. “The court rejected the idea that PIPEDA permits an organization to respond to a police request that would otherwise violate an individual’s reasonable expectation of privacy.” This decision sets the stage for consideration of other data and has implications for any organization that receives police requests for information. [Privacy Tracker]

CA – Judge Certifies Class-Action Under New Canadian Privacy Tort

Justice Robert Smith recently certified a class-action lawsuit against the Bank of Nova Scotia under the new privacy tort of intrusion upon seclusion, saying “he couldn’t rule out the possibility the bank is vicariously liable for breach of privacy” after an employee stole client records. The employee “was given complete power in relation to the victims’ (customers) confidential information because of his unsupervised access to their confidential information,” Smith said, which created the opportunity for him to “abuse his power.” Suzanne Chiodo, an associate at Rochon Genova LLP, says this is good news for privacy lawyers, adding it “combines the law that was laid down in Jones v. Tsige with the low bar for certification” in class-actions. [Law Times] [Canada: Stolen Customer Data Results In Ontario’s First Certified Privacy Class Action]

CA – Despite Supreme Court Ruling, Senate Passes Bill S-4

While Privacy Commissioner Daniel Therrien has said Bill C-13 and S-4 should be reviewed in light of last week’s Supreme Court ruling that warrants are required to access telecom subscriber info, the Senate has passed Bill S-4. In his blog, Michael Geist called the move a “head in the sand approach.” Meanwhile, Justice Minister Peter MacKay has said the Supreme Court’s ruling “actually confirms what the government has said all along: that Bill C-13’s proposals regarding voluntary disclosure do not provide legal authority for access to information without a warrant.” [The Huffington Post Canada] See also: [OIPC BC – Follow-Up to Special Committee to Review the Personal Information Protection Act]

CA – Bill Calls for CSEC Scrutiny

Liberal MP Joyce Murray has tabled a private member’s bill seeking “to impose greater judicial and parliamentary scrutiny on Communications Security Establishment Canada (CSEC).” CSEC currently “faces no such direct scrutiny,” the report states, noting, “This spy agency operates under secret orders from the Minister of National Defence and keeps its relationships with communications corporations murky,” while being allowed to gather Internet data “without going to court.” Critics are calling for changes, with University of Ottawa Law Prof. Craig Forcese suggesting, “The government has been operating on a theory that what they’re collecting is something magical that doesn’t attract a reasonable expectation of privacy.” [The Globe and Mail] See also: [Border agency backs down on cross-border data bank]

CA – Cavoukian Calls for Document Destruction Penalties

Describing the alleged destruction of public records related to a scandal over a decision to cancel two gas plants as “offensive,” Ontario Information and Privacy Commissioner Ann Cavoukian is calling for “real penalties for bureaucrats or elected officials who deliberately destroy government records in violation of the Privacy Act.” “This is not how freedom works,” Cavoukian said during the release of her final annual report before the end of her third term as the province’s commissioner. She added, “I just think we have to drive that home so government doesn’t think they can do whatever they want quietly behind closed doors.” [The Canadian Press] See also: [Exit interview: Ann Cavoukian leaves privacy watch dog role to lead Ryerson’s big data institute]

Consumer

US – Woman Registers Herself as Corporation to Take Back Data Control

One woman aiming to regain ownership and control of her data. Jennifer Lyn Morone, an American working on her master’s degree at London’s Royal College of Art, has turned an art project aimed at designing a protest into an effort to transform herself into a “humanoid/corporate hybrid” and has become Jennifer Lyn Morone (JLM), Inc., registered as a company. JLM’s business plan is an attempt to “establish the value of an individual in a data-driven economy.” The business “derives value from three sources,” its plan states: “accumulation, categorization and evaluation of data generated as a result of Morone’s life.” [The Economist]

WW – “Respect Network” Aims to Put Users in Control

The Respect Network, launched in an attempt to “create a decentralized successor to today’s ad-centric model, where everyone throws their personal data into centralized services such as Google and Facebook.” The service is a new application platform and “a network of private, portable ‘clouds’ of personal data” that allows the user to stay in control, the report states. Meanwhile, a new study has found that banning the use of privacy services to hide domain name registrants from potential criminals would have privacy implications for lawful users of such services. [GigaOM] See also: [Is privacy loss worth 8% Ajusto car insurance saving: Mayers] See also: [U.S. GAO – Consumers’ Location Data – Testimony Before the Subcommittee on Privacy, Technology and the Law, Committee on the Judiciary, United States Senate]

WW – Facebook Moods May be Contagious, but So Is User Ire

Late last week, Facebook revealed it had manipulated a randomly selected number of users’ news feeds in a psychological experiment to see if mood is essentially contagious. Researchers determined it was. But public outcry for such an experiment without users’ consent prompted lead researcher Adam Kramer to post a public apology. In January 2012, Facebook selected 689,003 users and changed the number of positive and negative posts in their feeds. Users who saw more positive posts tended to write positive posts and vice versa. The research was in line with Facebook’s terms of service, but some say it was unethical. Meanwhile, in the U.S., Facebook is taking on the New York district attorney’s office for its seizure of 381 disabled retirees’ profiles in a fraud investigation. [The New York Times]

E-Government

UK – Government in Cyberspace: UK Citizens Remain Divided

A survey by KPMG and Censuswide has found that UK citizens are divided on the role of government in cyberspace. Calls have been made for UK laws governing internet surveillance to be reviewed after revelations of a secret government policy justifying mass surveillance of UK users of Facebook, Twitter, YouTube and Google. The survey found that 76% of respondents think government needs to do more to protect their online privacy. Additionally, 55% said government should be responsible for keeping the internet running, and 54% said the government should not interfere with the operation of the internet. [Digital By Default News]

UK – U.K. Conducts Mass Cyber-Snooping, Rights Groups Say

Britain’s top counterterrorism official says the country’s espionage rules allow its electronic spy agency to routinely intercept online communications between Britons who use U.S.-based platforms such as Facebook, Twitter and Google. A witness statement by Office for Security and Counterterrorism chief Charles Farr, made public Tuesday, said data sent on those services is classed as “external” rather than “internal” communications because the companies are based outside Britain. Britain’s Home Office confirmed the document was genuine. It was written in response to a legal action by civil liberties groups who are seeking to curb cyber-spying, and was published by the groups this week. [Associated Press]

Electronic Records

US – Hospital Networks Leaking Data

Researchers have found that hospital networks are leaking information to the Internet. In some instances, the leaked data include lists of all computers and devices on a hospital’s internal network. In every case, the leakage problem could be traced to an Internet connected computer that was improperly configured. Attackers could potentially identify vulnerable systems because network administrators have enabled Server Message Block (SMB) in a configuration that makes the data externally accessible. These computers were often found to be running Windows XP. [WIRED]

Encryption

US – Massachusetts Court Says Man Can be Compelled to Decrypt Computers

The Massachusetts Supreme Judicial Court has ruled that a man suspected of mortgage fraud can be ordered to decrypt computers seized from his possession. According to the court, the defendant, Leon Gelfgatt, admitted to police that he owned the computers and that he could decrypt them. The court ruled that this information means that decrypting the devices would not reveal anything new to authorities. [Ars Technica] [DocumentCloud] See also: [U.S. Department of State Written Response to Kelley Drye & Warren LLP in Relation to the Use of Tokenization]

WW – More Than 300,000 Servers Still Have Not Patched Heartbleed

According to a recent scan of web servers, at least 300,000 have not been patched to protect them from exploits targeting the Heartbleed vulnerability. The flaw was disclosed in April; a scan run at that time indicated more than 615,000 publicly available SSL servers with the vulnerability. A month later, the number had dropped to 318,000. However, the most recent scan showed that fewer than 10,000 servers had been patched in the last month. [CNET] [ComputerWorld] [v3.co.uk] See also: [Android 4.4.4 Addresses Heartbleed Flaw | The Register | Ars Technica | ComputerWorld]

WW – Researchers Use Big Data, Data-Mining to Bypass HTTPS Encryption

Researchers from the University of California at Berkeley and Intel say they were able to use big data models to get around a widely used version of encryption—Hypertext Transfer Protocol Secure (HTTPS)—including on sites operated by the Mayo Clinic, Planned Parenthood, Kaiser Permanente, Bank of America and the American Civil Liberties Union. The researchers say, in their most recent paper, they were able to identify sensitive information a person was searching on HTTPS-encrypted sites with 90-percent accuracy—including searches on pregnancy and suicide. [The Wall Street Journal]

EU Developments

EU – Irish High Court Refers Facebook Case to ECJ

In a move that could have big implications for Facebook and the EU-U.S. Safe Harbor arrangement, Ireland’s High Court has referred questions raised in a case brought by Max Schrems to the European Court of Justice (ECJ). A recent ECJ ruling made waves after it ruled Google must delete links in the so-called “right-to-be-forgotten” case. Schrems, who started Europe-v-Facebook , has alleged Facebook illegally transferred EU citizens’ personal data out of the EU to U.S. intelligence agencies and that Irish Data Protection Commissioner Billy Hawkes wrongly interpreted EU data transfer law. A legal representative for Hawkes said the controversy was a matter for the political level, the report states. Meanwhile, EU Justice Commissioner Viviane Reding said a lack of judicial redress for EU citizens in the U.S. could prevent the EU from backing the Safe Harbor agreement. [The Irish Times]

EU –The Irish Facebook Case Is About Safe Harbor’s Future: Opinion

Analysis continues to pour in now that an Irish High Court judge has issued a preliminary judgment in a case involving Facebook that may have “sweeping consequences for U.S. e-commerce firms.” In the case, privacy activist Max Schrems claimed Safe Harbor didn’t protect his data because he’s not a U.S. citizen. “The judge hasn’t ruled directly on the major arguments of the privacy activist,” the report states, but has referred the case to the European Court of Justice to determine the validity of the EU-U.S. Safe Harbor agreement. Schrems’ case argues that Facebook, because it founded a subsidiary in Ireland, is subject to European privacy laws. EU Justice Commissioner Viviane Reding has said her office has begun a review of Safe Harbor. [The Washington Post]

EU – CNIL Gets New Online Audit Powers

Reports on the Act on Consumer Protection, which has amended the Act on Information Technology, Data Files and Civil Liberties “to allow the French data protection authority, the Commission Nationale Informatique et Libertés (CNIL), to conduct online audits.” The legislature’s goal was to allow the CNIL “to find infringement efficiently on the Internet by giving such findings probative value, and once an infringement has been found, to instruct the data controller to comply immediately,” the report states. The CNIL may now conduct Data Protection Act compliance audits remotely, “from a computer connected to the Internet” in this “latest addition to the audit procedures already in place.” [International Law Office]

UK – UK Gov’t Says Warrantless Spying on Social Media Sites is Legal

The UK government’s most senior security official says mass surveillance of social media is permissible under the law because such sites are “external communications.” Christopher Farr, director general of the Office for Security and Counter-Terrorism, says the monitoring of such online communications—recently called out in a case brought by Privacy International, Liberty, Amnesty International and other civil rights groups—does not require law enforcement to obtain search warrants because the Regulation of Investigatory Powers Act only requires warrants for spying on internal communications between British residents. [The Guardian]

UK – UK Government Can Intercept Social Media Posts Without Warrant

The British government can collect posts from social media sites like Google, Twitter, and Facebook without a warrant because the content is considered “external communications.” This revelation comes from court testimony from the Director General of the UK’s Office for Security and Counterterrorism published ahead of a hearing scheduled for mid-July. The distinction between the types of communications is made in sections 8(1) and 8(4) of the UK’s Regulation of Investigatory Powers Act (RIPA). [ArsTechnica] [BBC] [ComputerWorld] [Privacy International]

US – Bill Would Amend ECPA, Require Warrant to Search eMail

A bill that would require the government to obtain a warrant before searching people’s email and other stored communications now has majority support in the US House of Representatives. The Email Privacy Act would amend 1986’s outdated Electronic Communications Privacy Act (ECPA). The proposed legislation would bar third-party service providers from disclosing customers’ communications to law enforcement unless they have a warrant. [ComputerWorld] [CNET] [Text of Bill]

EU – Irish High Court Refers Facebook Case to ECJ

In a move that could have big implications for Facebook and the EU-U.S. Safe Harbor arrangement, Ireland’s High Court has referred questions raised in a case brought by Max Schrems to the European Court of Justice (ECJ). A recent ECJ ruling made waves after it ruled Google must delete links in the so-called “right-to-be-forgotten” case. Schrems, who started Europe-v-Facebook, has alleged Facebook illegally transferred EU citizens’ personal data out of the EU to U.S. intelligence agencies and that Irish Data Protection Commissioner Billy Hawkes wrongly interpreted EU data transfer law. A legal representative for Hawkes said the controversy was a matter for the political level, the report states. Meanwhile, EU Justice Commissioner Viviane Reding said a lack of judicial redress for EU citizens in the U.S. could prevent the EU from backing the Safe Harbor agreement. [The Irish Times]

EU – Right-to be-Forgotten Decision Has Nothing to Do With Right to be Forgotten

In the weeks following the European Court of Justice (CJEU) decision on the so-called “right to be forgotten,” reactions have varied among stakeholders. Google announced it will begin removing links to online content in Europe by the end of June. Now that enough time has passed since the decision, Profs. Vagelis Papakonstantinou and Paul de Hert have ruminated on its implications. Papakonstantinou and de Hert “calmly assess what the CJEU decision really is and is not about,” suggesting it “has nothing to do with a ‘right to be forgotten’” at all. [Privacy Perspectives] [The New York Times]

EU – Hustinx Pushes for Privacy Framework in Letter to EC President

It is “vital for a strong and modernised data protection framework in the EU to be adopted as soon as possible and for privacy and data protection considerations to be mainstreamed into all new policies and legislation,” European Data Protection Supervisor Peter Hustinx wrote in a letter to European Council (EC) President Herman Van Rompuy. The letter comes in advance of the EC’s next meeting, during which it intends to agree on “strategic guidelines for the future development of justice and home affairs in the EU.” Hustinx notes his concern that communications from the council “barely acknowledge the role of data protection in ensuring the EU’s activities are appropriate and proportionate” and recommends the council use his office’s opinion on the future development of freedom, justice and security as guidance. [EDPS]

EU – Are EU States Allowing Direct U.S. Surveillance?

The U.S. National Security Agency (NSA), with the aid of several EU governments, directly taps cables to collect high volumes of private e-mails, phone calls and Internet chats. The program, known as RAMPART-A, was revealed to a Danish newspaper in collaboration with The Intercept. According to documents leaked by Edward Snowden, foreign partners “provide access to cables and host U.S. equipment.” And, the “NSA is more active in Germany than anywhere else in Europe,” Der Spiegel reports . In a letter to European Council President Herman Van Rompuy, European Data Protection Supervisor Peter Hustinx said the EU needs stricter controls to protect citizens from spying. And the U.S. House of Representatives overwhelmingly passed a bill this week that would significantly restrict warrantless government access to private electronic communications. [The Intercept]

Facts & Stats

WW – “People Are Now Products” and PI Is Currency, Study Suggests

A recent study by encrypted communications company Silent Circle found that 88% of people in the UK believe their mobile calls and texts are being tapped. The results indicate “people are now products, and their private information is the currency,” said Silent Circle CEO Mike Janke. Meanwhile, services that offer encryption apps for privacy and data storage are seeing an uptick in sales. Ctrl-Shift, a marketing consultancy group, says it sees the launch of a new personal information-management services initiative once per week, on average. [The Wall Street Journal] See also: [National Institute of Standards and Technology – Guidelines on Mobile Device Forensics – Special Publication 800-101 – Revision 1]

Finance

US – Ford and Intel Pair Up Toward Smarter, Privacy-Enhanced Cars

Research from Ford and Intel recently explored how interior-facing cameras would be integrated with sensor technology and data generated within and around a car to create “a more personalized and seamless interaction between driver and vehicle,” according to a press release. Project Mobii also aims to give drivers greater privacy and controls, with features like facial recognition technology that personalizes display information depending on whether there’s an additional passenger in the car and alerts the primary vehicle owner via a smartphone picture if the driver is not recognized by the car. [Wall Street Journal] [US: Privacy an issue in auto technology, expert says]

FOI

US – Open Gov’t Initiatives Mean Increased Transparency, Privacy Risks

Governments are making more data publicly available in machine-readable formats in an effort to be more transparent, but doing so has privacy risks, according to a paper recently published in a Switzerland-based scholarly journal. The report is authored by the University of Ottawa’s Teresa Scassa, who says the open government movement has privacy risks, including responsibly handling public personal information, distinguishing between public- and private-sector actors and “the potential for monitoring and profiling of citizens through big data.” [FierceGovernmentIT] See also: [Article 29 Data Protection Working Party – Statement on the Role of a Risk-Based Approach in Data Protection Legal Frameworks]

CA – Federal Advisers Urge Access to Information Reform

Several members of the federal advisory panel on open government are urging the Conservatives to reform the Access to Information Act, a law that has barely changed in more than 30 years. The panel of experts from business, academia and civil society is providing advice to Ottawa on preparations for the next open government plan, to be released this fall. In their first plan, published in 2012, the Conservatives focused on making data sets more readily available, increasing access to archived federal documents and developing new ways to consult Canadians online. But the government has made no commitment to reforming the Access to Information Act despite calls for modernization from the federal information watchdog, opposition parties and pro-democracy groups.[The Canadian Press] see also [ON: Complaints about justices of peace kept secret] See also: [US – Further Guidance on the Implementation of FATCA and Related Withholding Provisions: Notice 2014-33 – Internal Revenue Service]

Google

WW – Google to Unveil Connected Health Service

On the heels of a similar announcement by Apple, Google will reportedly launch a new health service called Google Fit, which will collect and aggregate data from fitness trackers and other health-related applications. The announcement is expected next week at the Google I/O conference on June 25 and 26. Google Fit will collect the data from open APIs and will announce partnerships with other wearable device makers. Google Fit may also make it possible for health-monitoring, wearable devices to interface with Google’s cloud-based services. [Forbes]

Health / Medical

US – ONC Team to Consider Protecting Minors’ EHR Data

The Privacy and Security Tiger Team of experts, coordinated by the Office of the National Coordinator for Health IT, will focus next on the complexities surrounding minors’ electronic health records. The team’s July 14 meeting will look at the varying state laws that allow minors to obtain certain health services and whether the information involved may be disclosed to parents. At issue is how to segregate the information a minor may not want shared with parents—on substance abuse or reproductive health, for example—from the rest of the minor’s record. [FierceHealthIT]

US – Pritts Talks Mobile Health Apps; Online Therapy Brings Privacy Concerns

Joy Pritts, who is about to exit as the Office of the National Coordinator (ONC) for Health Information Technology’s first-ever privacy officer, discusses the privacy risks of mobile health apps in a Q&A. Among the top threats to patient health privacy remains the loss and theft of devices as well as “inappropriate access” to health records, Pritts says, adding, “We always encourage a multilayered approach to securing information.” Meanwhile a federally backed consortium of health providers, administrators and health information exchange experts are discussing how to exchange behavioral health data while maintaining privacy, and NPR reports on online psychotherapy and the privacy concerns that come with it. [SearchHealthIT] [Privacy and security experts: mHealth requires a new approach]

US – Industry Wants Patient Data-Sharing Made Easier

Health industry leaders met with lawmakers Tuesday in a roundtable discussion pushing for legislation to make patient health data-sharing easier, but lawmakers expressed concern about “nefarious” use of the data. During the discussion within the House Energy and Commerce Committee, industry asked lawmakers for legislation that would allow electronic medical records companies to charge physicians for data transfers, improve cloud computing and invest in more federal medical research. The move, argued industry, would change the healthcare system and curb medical mistakes. 23andMe’s CEO said she’d “like to democratize healthcare,” but Rep. Phil Gingrey (R-GA) said more open health data flows would be “scary.” [The Hill]

US – Hospitals May Be Using Data Brokers to ID Potential High-Risk Patients

Some U.S. hospitals are using public records and credit card transaction data gleaned from data brokers to identify potential high-risk patients. The largest hospital organization in the Carolinas, the report states, is placing data for two million individuals into algorithms that locate high-risk patients. Similarly, the largest hospital system in Pennsylvania is allegedly using household and demographic data. [Bloomberg]

Horror Stories

US – 160,000 Breached at Butler U; Biz Releases Student Data Privacy Guidelines

Officials at Butler University have warned that the records of 160,000 students, faculty, staff and alumni have been compromised after a hack. Exposed data includes birthdates, Social Security numbers and bank account information. Meanwhile, in a press release, Skyward, a K-12 software provider, has unveiled a set of data security and privacy guidelines for protecting student data. The recommendations include best practices for electronic storage as well as how to evaluate and strengthen schools’ internal privacy policies. Separately, former Mississippi Governor Haley Barbour writes, “Student privacy should be protected, and companies should not be raiding kids’ records to make a buck.” Last week, in a joint House subcommittee hearing, lawmakers and experts discussed student data privacy issues and concerns. [Miami Herald] See also: [NZ: At what point is data breach reporting overkill?]

WW – Smart LED Lights Save Energy, Spark Privacy Concerns

A California-based company has developed Energy-saving, smart LED lights that become smart networks that can collect data. The lights contain built-in sensors and cameras—and in the case of Terminal B in Newark airport—they can monitor for security and traffic. A building in Silicon Valley uses the lights in its parking lot, where they are also connected to security cameras. “We do use the license-plate recognition, and we can also detect people,” said the building’s owner, adding, “Everything goes up in the cloud, so we can access everything from anywhere. The future is limitless for this technology.” [CBS News]

US – Bistro Hit with Class-Action Following Breach

P.F. Chang’s China Bistro has been hit with a proposed class-action lawsuit following a data breach that exposed its customers’ credit and debit card data. The plaintiff in the case, John Lewert, says P.F. Chang’s “security failures enabled hackers to steal financial data from within P.F. Chang’s systems and subsequently make unauthorized purchases on customers’ credit cards and otherwise put consumers’ financial information at serious and ongoing risk,” the report states. It appears that the security breach at PF Chang’s began in September 2013 and was still active until June 11, 2014. The breach compromised continental US customers’ payment card data. A PF Chang’s spokesperson did not comment on the timing of the attack, but noted that it does not appear to have affected the company’s Pei Wei Asian Diner restaurants. [Krebs on Security] [Law360] See also: [Forbes: Yeah, the Thieves Got the Data. But How Do They Turn It Into Cash?]

US – 1.3 Million Affected by Montana Breach

The state of Montana has begun sending out notification letters to 1.3 million people affected by a data breach. The breach was discovered in mid-May by a contractor who noticed suspicious activity on one computer storing millions of records. And a New York radiology practice has informed 97,000 patients of a data breach after an employee of the practice gained unauthorized access to their personal information. Meanwhile, privacy attorney Gregory Parks advises organizations about which data breach provisions should be included in outsourced contracts, and EDUCAUSE Center for Analysis and Research has released a paper on data breaches in higher education. [CSO]

US – Healthcare Provider Settles with HHS for $800,000

Parkview Health System has agreed to settle potential violations of the Health Insurance Portability and Accountability Act (HIPAA) with the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) for $800,000. Parkview will also adopt a corrective action plan to address deficiencies in its HIPAA-compliance program, according to a press release. The settlement follows an HHS investigation into a retiring physician’s complaint over 71 cardboard boxes of medical records being transferred from him to other physicians, which were left accessible to unauthorized persons. “All too often we receive complaints of records being discarded or transferred in a manner that puts patient information at risk,” said an OCR spokeswoman, adding that HIPAA-covered entities must protect information even during transfer or disposal. [HHS] See also: [$412-million lawsuit launched against Toronto hospital over privacy breach]

CA – $412-Million Lawsuit Against Toronto Hospital Over Privacy Breach

A $412-million class action lawsuit has been launched against Rouge Valley Health System less than a month after the Scarborough hospital admitted to a major privacy breach affecting up to 8,300 new mothers. Michael Crystal, one of the lawyer behind the lawsuit, said that the firm is seeking damages of approximately $49,000 per person and Crystal said the number of affected patients could rise depending how widespread the breach becomes. The hospital came under fire at the beginning of June after admitting that two former employees sold patient information to multiple Registered Education Savings Plan (RESP) companies. Both the Ontario Securities Commission and the Privacy Commissioner of Ontario were notified of the breach, which is said to have occurred over a two-year period. [CP24.com]

US – Advocate Files Complaint with FTC; Other Incidents Reported

A privacy advocate has filed a complaint with the FTC over a Maricopa County Community College District (MCCCD) data breach that compromised the data of approximately 2.5 million faculty, students, vendors and staff, alleging the school violated the Safeguards Rule. “Having researched and reported on breaches for about a decade now, some breaches strike me as really appalling, and the MCCCD breach is one of those,” the advocate wrote in a blog post. Meanwhile, the U.S. Department of Justice is leading a multinational effort against the “Gameover Zeus” botnet and “Cryptolocker” ransomware. The world’s largest medical device maker, Medtronic, says it was the victim of a cyberattack in papers filed with the U.S. Securities and Exchange Commission, and Krebs on Security reports on a slew of data breaches affecting car washes across the country. BankInfoSecurity reports on lessons learned from distributed-denial-of-service attacks, including how they’re used as a diversionary tactic. [Source] See also: [In the Matter of Snapchat Inc.: Comments to the FTC – Electronic Privacy Information Center]

Identity Issues

US – New York to Issue ID Cards for Undocumented Immigrants

New York City’s 500,000 undocumented immigrants will be able to open bank accounts, visit libraries and use medical clinics, thanks to an official municipal identification card approved by the City Council. The measure, backed by Mayor Bill de Blasio, passed in a 43 to 3 vote with two abstentions. The photo IDs will display the holder’s name, birth date, address and – at the cardholder’s option – a self-designated gender. Similar cards have been created in Los Angeles, San Francisco and New Haven, Connecticut, which began its program in 2007 in response to a series of street robberies of undocumented immigrants who carried cash because they lacked access to banks. The victims’ status made them reluctant to report the crimes, said Officer David Hartman, a New Haven police spokesman. New York’s program would be the largest in the U.S., costing $8.4 million when it goes into effect next year, decreasing to $5.6 million annually over the next three years, Mark-Viverito said. The city will seek sponsors to offer discounts and other inducements for residents to carry the card so that its use would expand beyond undocumented immigrants, Mark-Viverito said. Details of how the card would be administered are still being worked out, she said. [Bloomberg] See also: [Barth-Jones: Does De-identification Work?]

Intellectual Property

AU – Australian and Irish Commissioners Agree to Cooperate

The Office of the Australian Information Commissioner (OAIC) and the Data Protection Commissioner of Ireland (DPCI) have signed a Memorandum of Understanding (MOU) to assist each other with investigations and collaborate on consumer and business education, new laws, government and self-regulatory enforcement, staffing and resource issues and information relating to investigations. “Each participant will designate a primary contact for the purposes of requests for assistance and other communications,” the MOU states. In the MOU, the OAIC and DPCI recognize the complexity of the global economy and the wide-ranging circulation of personal information across national borders, increasing the need for cross-border enforcement cooperation. [PS News]

Internet / WWW

WW – Group Developing Open-Sourced IoT Data-Sharing Standard

HyperCat is a project funded by the UK government and comprising the work of more than 40 organizations—including IBM as well as several start-ups and universities—tasked with developing a standard that would allow sensors and devices to share data more easily. The UK’s Technology Strategy Board allotted £6.4 million to the project, and the group hopes it can encourage an open-standards-based Internet of Things framework rather than an ecosystem where data is stored in silos or only available via proprietary formats and application programming interfaces. BT Semantic Technology Head John Davies said, “This will drive commercial use of the hubs and lowers the barrier to participation, particularly for SMEs.” [ZD Net]

WW – Protecting Student Privacy in the Age of Ed Tech

Attorney Bradley Shear discusses the challenges of protecting student privacy in an environment where students regularly use online technology in the classroom. Pointing to the outdated nature of the Family Educational Rights and Privacy Act, Shear writes that an “update to the terms ‘education records’ and ‘personally identifiable information’ to account for the increased capturing of student data in a digital format is needed.” Some states have stepped in with possible solutions, but, according to Shear, “The bottom line is that students, parents, teachers, privacy professionals, lawmakers, state attorneys general, the FTC and the ed-tech industry must work together to ensure that student privacy is protected in the Digital Age.” [Privacy Tracker]

US – EFF Says Opening Wi-Fi Networks Would be a Boon to Privacy

The Electronic Frontier Foundation (EFF) wants people to start opening their home wi-fi connections, saying that the change would actually improve privacy. While some companies have already begun testing this model, they have charged customers for use of their network. The EFF’s plan would be free. The organization says the initiative will boost privacy, sharing connectivity would drive home the point that an IP address is not an individual, and linking illegal activity to an IP address does not mean that the person whose router is running on that address is the culprit. Each link to the router will be encrypted, which will require users to download a certificate. Network owners’ traffic will receive priority. The EFF plans to release firmware for the project next month. [Wired] [ArsTechnica]

US – Turning Private WiFi Routers into Public Hotspots

Over the past year, Comcast started exchanging customers’ home wi-fi routers for models that allow them to be used as public hotspots. The arrangement does not allow passers-by access to password-protected home networks, but is instead intended to allow users with registered Xfinity accounts access wi-fi connections while visiting friends or in public places. The routers do not have a stronger signal, meaning people driving past homes are not likely to piggyback on strangers’ networks. The change means that users do not have to provide visitors with the password to their home network. People who use the Xfinity public network will also be required to sign in with their Comcast customer access credentials. One concern is that vulnerabilities in routers could be exploited to tamper with the devices. [CNN]

US – Postal Service Explores Sensors, Data Collection Via ‘Vehicles, Mailboxes, Machines, Letter Carriers’

The U.S. Postal Service is seeking a company to help develop a program called the Internet of Postal Things. The Risk Analysis Research Center (RARC), part of the Postal Service’s Office of the Inspector General (OIG), is looking for a supplier “who possesses expertise and critical knowledge of the Internet of Things, data strategy and analytics, and the Postal Service’s operations, infrastructure, products and services.” The OIG is exploring ways for the Postal Service to benefit from the technology that provides “virtually unlimited opportunities to collect and process data from any device, infrastructure, machine and even human beings.” [The Weekly Standard]

Law Enforcement

US – Law Enforcement Agencies Using Spyware for Mobile Device Surveillance

Researchers have uncovered a mobile spyware product known as Remote Control System (RCS), which is being sold by an Italian company to police around the world. RCS can intercept and record communications from devices running Android, iOS, Windows Mobile, Symbian, and BlackBerry operating systems. There are at least 320 command-and-control servers for RCS in more than 40 countries. [ComputerWorld] [The Register] [USA Today] See also: [Documents Suggest Illinois State Police Purchased Stingray] and [Law Enforcement Officers Were Purposely Deceptive About Stingray Use | Source]

US – FBI Discloses Data on ‘Backdoor’ Searches of Americans’ Phone Calls, E-Mails

U.S. intelligence revelations include the number of warrantless searches conducted by the Federal Bureau of Investigation (FBI) under Section 702 of the FISA Amendments Act and the FISA Court ruling that allowed for broad surveillance authority over 193 countries worldwide. The FBI sent a letter to Sen. Ron Wyden (D-OR) reporting the NSA last year used 198 e-mail addresses or phone numbers of U.S. citizens to search for data on foreign intelligence. Such a low number, Wyden said, means the FBI should be able to obtain a warrant for each one. The NSA has been granted “a far more elastic authority than previously known,” a newly disclosed 2010 legal certification indicated. [The Washington Post]

US – San Diego Police to Wear Cameras Inside Private Homes

San Diego police officers equipped with cameras on their uniforms will be allowed to record interactions with the public within private homes, Chief Shelley Zimmerman said Wednesday. The chief outlined for the City Council’s Public Safety and Livable Neighborhoods Committee the SDPD policies developed for use of the new cameras. The cameras will always be on during an officer’s shift, recording in 30-second loops so that video of the moments leading up to an interaction will be saved, she said. The officer will activate full video and audio recording before a contact. “Private citizens have a reasonable expectation to privacy in their homes,” Zimmerman said. “However, when an officer is lawfully present inside a home, such as on a warrant, consent or exigent circumstances as examples – in the course of the officer’s official duties – there’s no reasonable expectation of privacy.” The chief said officers will not be required to inform citizens that they are being recorded, but should acknowledge it when asked. They will also not be required to stop recording if a citizen makes a demand, she said. Zimmerman also described situations when officers will not push the record button, including:

  • non work-related activity in a locker room, break room or restroom;
  • when someone is being examined by a physician because of patient-doctor confidentiality;
  • when someone is a victim or witness of a sex crime or child abuse;
  • a peaceful demonstration, until it appears the gathering is about to become unlawful; and
  • victims or witnesses of other crimes so there is no hesitation to share sensitive information.

However, domestic violence victims, who often quickly recant their statements, should be recorded, she said. Kellen Russoniello, of the American Civil Liberties Union of San Diego and Imperial Counties, said the public should be informed upfront about the recording, and should be allowed to obtain a copy. Strong disciplinary procedures are also needed for officers who do not follow the procedures, he said. [City News Service]

Offshore

SG – Personal Data Protection Regulations 2014 in Force July 1st

Singapore’s Personal Data Protection Regulations 2014, effective July 2, 2014, prescribe requirements related to the exercise of rights under the Personal Data Protection Act 2012 (the “Act”) in relation to deceased individuals (the right to give/withdraw consent or bring an action/complaint), and access and correction requests (generally providing for a 30-day timeline for response, and permitting fees only for access requests, not correction requests); provisions concerning the transfer of personal data outside Singapore specify that such transfers comply with the Act if the data is in transit or publicly available in Singapore, the transfer is necessary for a contract, or the transferring organization has obtained individual consent or is required to transfer the data pursuant to a law, contract, binding corporate rules, or other legally binding instrument. [Source]

SG – Data Privacy Ambiguity May Hamper Singapore’s Smart Nation Ambition

It’s been a big week for the Singapore government which unveiled its big plan to become “the world’s first smart nation”, tapping strongly on data sensors and analytics to enable intelligent urban living. However, unanswered questions about the management of such data, which cuts across government agencies and private entities, could prevent Singapore from realizing its smart nation dream. [Source]

Online Privacy

WW – Facebook Added Research Exception to User Agreement Ex-Post

Facebook has added the term “research” to its user agreement approximately four months after its now infamous study on emotional contagion. Some have defended the study, noting that Facebook’s current user agreement explicitly says it can use data for research, but Hill points out critics “were all relying on what Facebook’s data policy says now,” adding it was not until May 2012 that Facebook made changes to its data use policy to reflect research exceptions. A Facebook spokesperson said, “To suggest we conducted any corporate research without permission is complete fiction.” Jaron Lanier writes, “My guess is that the public would choose to outlaw using our communication tools as conduits for secret, algorithmic manipulations of our emotions.” [Forbes] [The New York Times]

WW – Ad Industry Urges Web Standards Group to Abandon Do-Not-Track Effort

The Digital Advertising Alliance (DAA) is calling on web standards group the World Wide Web Consortium (W3C) to stop its Do-Not-Track initiative. “By wading into this public-policy matter, the W3C not only duplicates efforts undertaken by legitimate policy-makers but also strays far beyond its expertise and mission,” DAA Executive Director Lou Mastria wrote to the W3C on Wednesday, adding the DAA wants the W3C “to abandon this effort and to return to its mission of developing consensus around specifications for web technologies.” Turn General Counsel and CPO Max Ochoa said the proposed “tracking” definition will result in “a dramatic concentration of market power in the hands of first parties that … are historically poor stewards of privacy.” [MediaPost News] See also: [EU Article 29 Data Protection Working Party Opines on Tracking Preference Expression]

US – Amazon Phone Transmits Data; LinkedIn Launches Privacy-Guaranteed App

While Amazon’s Fire Phone is fascinating, it’s “probably also the biggest single invasion of your privacy for commercial purposes ever. And no one seems to have noticed.” While the phone is able to identify objects like books, movies and games as well as songs, TV shows and phone numbers, it does so by transmitting pictures and GPS location information to “the company that pretty much invented what we now call big data analytics for customer insights and the largest online retailer in the wild wild west.” Meanwhile, Google’s latest changes to its app permissions are “just wrong,” one blogger says, and LinkedIn has launched a job search app that promises complete privacy. [VentureBeat]

WW – Exploring OnionShare and the Risks of File-Sharing Apps for Organizations

The Electronic Frontier Foundation’s Parker Higgins writes about a newly created one-to-one file-sharing tool—OnionShare—that allows for simple, encrypted data-sharing between two people over the Tor browser. The code for OnionShare is simple, making it difficult for backdoors to be inserted, and avoids using a middleman site, such as Dropbox or Mega. Higgins also argues copyright issues—particularly ones raised by the Motion Picture Association of America and the Recording Industry Association of America—have prevented more file-sharing technology. In a separate story, eSecurity Planet reports 46% of IT security pros say data is leaking from their businesses because of file-sharing services. [WIRED]

WW – BuzzFeed Quizzes: Who Has Your Info?

The popular website Buzzfeed has “shareable quizzes” that have become “an unprecedented opportunity for data-mining.” Analytics expert Dan Barker said that while most websites record some information about you, “Buzzfeed records a whole ton.” And while most of the quiz topics are playful and innocuous, some are not. For example, one quiz asked users whether they’d been raped, attempted suicide or taken medication for mental health, and the site assigns a unique ID to every answer. BuzzFeed says it anonymizes all data and has strict policies to only access data “in the aggregate form.” [Newsweek]

US – Website Analysis Turns Up Slew of Possible COPPA Violations

An analysis of 40 popular children’s websites has found a majority of them “aggressively” tracked users. TRUSTe analyzed the top 10 websites in four categories—pre-school, education , kids’ entertainment and gaming—and found high levels of user tracking. On the 40 websites, researchers found a total of 1,110 third-party trackers from 644 different organizations. “This post-Millennial generation of kids has access to unprecedented levels of technology from an early age,” said TRUSTe CEO Chris Babel. “From toddlers to teens, kids’ online activity is monitored and their personal data is being collected, stored and possibly shared.” [PC Magazine]

WW – Westin Center Unveils First Global Survey of Rapporteurs

Can a privacy statement be valid if the statement is in English and not translated into the official local language of the country in which it’s being read by a consumer? Tough question. To get the answer, the Westin Research Center reached out to rapporteurs from around the world to get answers for 21 different countries in its first global survey of privacy law. [Source]

WW – Beyond Privacy Policies: Why Software Transparency Is Needed

“A privacy policy or transparency statement is a good starting point but, by itself, only expresses aspirations and intentions,” write Ontario Information and Privacy Commissioner Ann Cavoukian and Dawn Jutla of Saint Mary’s University. “It stands to reason,” they add, “that documented and independently verifiable privacy claims should enhance compliance, credibility and trust goals. To achieve this, we need standardized methods and tools.” Cavoukian and Jutla detail how to accomplish this and discuss the work of the OASIS Privacy by Design for Software Engineers Technical Committee. [Privacy Perspectives]

US – Privacy Policies Don’t Inspire Consumer Trust

Responding to the California AG’s recently issued CalOPPA guidance, Andrew Serwin says while transparency is a noble goal, recent research shows that statements made in a privacy policy may not be so important for consumer trust. Serwin discusses the Lares Institute’s recent research finding consumers “did not rank disclosures in a privacy policy as being that important. Indeed, what people read in a privacy policy was seventh out of the 10 reasons people trusted companies with their information,” and only five percent of respondents said reading the policy was the reason they trusted the company. [The Privacy Advisor]

US – HIPAA-Compliance Software Increasingly Popular

With HIPAA audits to increase this year, healthcare organizations are investing in software or services to ensure compliance. HIPAA Secure Now, a risk assessment service, saw website activity grow from 400 to 7,000 hits a month since the HIPAA omnibus rule went into effect in March 2013. Meanwhile, since federal breach reporting requirements took effect nearly five years ago, more than 1,000 medical breaches involving 500 people or more have been reported to HHS. An InsuranceNewsNet article offers five tips on how to avoid HIPAA breaches. [InformationWeek]

Other Jurisdictions

MX – Mexican Congress Expected to Tackle Telecom Bill

After widespread protests halted the advancement of a comprehensive telecoms reform bill, a special session of Congress is expected to debate the bill in the next few weeks. The bill would expand government surveillance powers and allow for network discrimination, taking on similar rules to those proposed by the U.S. Federal Communications Commission. The bill also requires telecoms to retain consumer data for two years. [Access Now]

MX – Mexican Telecoms Bill to Be Taken Up in Special Session

Activist site Access Now reports that a telecoms regulation bill that has been hotly contested among Mexican Internet users is likely to be taken up in a special session of Congress in the next few weeks. The contentious portions of the bill would allow for greater law-enforcement access to data without judicial approval, allow for law enforcement to block phone and Internet access and would allow for so-called “fast lanes,” whereby Internet Service Providers could provide more bandwidth to those companies who pay for it. According to the report, “President Enrique Peña Nieto and his party, the Institutional Revolutionary Party or PRI, was forced to publicly say they would modify the bill.”

RU – Russian Parliament Passes Tax Information Sharing Bill

A bill allowing banks to share data on foreign clients with overseas governments is headed to Russian President Vladimir Putin for his signature. Hundreds of Russian institutions have signed on to comply with U.S. tax law, even given the risk of fines. The U.S. Foreign Account Tax Compliance Act requires foreign financial institutions to share information on Americans’ accounts with balances upwards of $50,000 with the U.S. Internal Revenue Service. [Reuters]

AU – Pilgrim on Australia’s Privacy Act Changes in Practice

Looking at the complexity of the Privacy Act changes that went into effect on March 12, Australian Privacy Commissioner Timothy Pilgrim discusses what those changes mean in daily life. Companies, Pilgrim states in the report, must now “be open and transparent about what they do with personal information—why they’re collecting it, how they’re going to collect it from you, the types of information they want to collect, how they’re going to use it, who they might disclose it to and how they’re going to protect it.” Companies must also make privacy policies “easily understandable and readable,” the report states, noting the Office of the Australian Information Commissioner “can enforce these changes if they see fit and is examining further policies to ensure readable policies become a reality.” [The Sydney Morning Herald]

CN – Is China’s Privacy Law Being Used to Quell Dissent?

Chinese officials arrested prominent human rights lawyer Pu Zhiqiang, according to a Reuters report, on “suspicion of the crimes of causing a disturbance and illegal access to the personal information of citizens.” The charges carry penalties of five and three years in prison, respectively. Pu was arrested at a private gathering commemorating the 25th anniversary of the Tiananmen Square protests, in which he took part. He has represented artist Ai Weiwei and other activists who have been a thorn in the side of the Chinese government. In a piece for The Washington Post, former NSA General Counsel Stewart Baker suggests the Chinese are using privacy law as a means to quell dissent. Further, “How is China’s privacy law different from the data protection laws that Europe has been urging the world to adopt?” [Reuters]

AU – Australian Gov’t: Breach Legislation Needs More Work

Although agreeing with the proposal in principle, the government will not support a bill to force companies to notify customers of data breaches because the legislation “needs more work.” In March, Sen. Lisa Singh reintroduced the lapsed Privacy Alerts Bill, which seeks to compel organisations that suffer data breaches involving such information as personal, credit or tax file number data to notify the privacy commissioner and individuals affected “as soon as possible,” the report states. Senators raised concerns about reintroducing a bill without updating the text from the prior bill. “Definitions are important. It’s not something we should just be rushing through,” said Liberal Senator David Fawcett. [IT News]

AU – Australian and Irish Commissioners Agree to Cooperate

The Office of the Australian Information Commissioner (OAIC) and the Data Protection Commissioner of Ireland (DPCI) have signed a Memorandum of Understanding (MOU) to assist each other with investigations and collaborate on consumer and business education, new laws, government and self-regulatory enforcement, staffing and resource issues and information relating to investigations. “Each participant will designate a primary contact for the purposes of requests for assistance and other communications,” the MOU states. In the MOU, the OAIC and DPCI recognize the complexity of the global economy and the wide-ranging circulation of personal information across national borders, increasing the need for cross-border enforcement cooperation. [PS News]

HK – Chiang Supports Right to be Be Forgotten in Hong Kong

Following the EU’s “right to be forgotten” ruling, Hong Kong Privacy Commissioner Allan Chiang “will ask his regional counterparts to join him in pressing the Internet search giant to extend the same safeguards to the region.” Chiang said, “As a responsible enterprise, Google should also entertain removal requests from other parts of the world to meet their privacy expectations … We are not exercising a legal right but requesting a service that is available to EU citizens.” In a separate report, SCMP quotes a Hong Kong cryptography expert on the increased “interest in open-source cryptographic tools“ since the Edward Snowden revelations. [South China Morning Post]

AU – Commissioner: Policies Needed for Wearables at Work

With wearable devices sure to make it into the workplace, Privacy Commissioner Timothy Pilgrim is encouraging companies to develop policies addressing the use of such devices. For devices that collect personal information, Pilgrim said, “the policy could also outline how that information is used, disclosed and stored.” The report suggests organisations “develop their own enterprise-grade privacy policies to ensure employees are at ease working with and around wearable computers,” noting there has been a lack of discussion “on the impact wearables will have on employee privacy and how organisations can deal with this challenge.” [The Sydney Morning Herald]

NZ – Business NZ Drops Breach Notification Objection

Lobbying group Business NZ has dropped its objection to Justice Minister Judith Collins’ call for organisations to inform the Office of the Privacy Commissioner in data loss incidents and to inform those affected in “serious” breach cases, Fairfax NZ News reports. Phil O’Reilly said issues the group would have with a change in New Zealand law would be in such details as defining what constitutes a “serious” breach, the report states, noting “BusinessNZ would object if officials implemented the law change in an ‘impractical fashion,’ but O’Reilly did not believe that was likely.” [BusinessNZ]

Privacy (US)

US – Supreme Court: Google Must Face Lawsuit Over ‘Street View’ Privacy Invasions

The Supreme Court decided it will not hear Google’s challenge to an appeals court ruling requiring the company to face a class-action lawsuit alleging it illegally spied on users from 2008 to 2010 in order to bolster its Street View data. The Supreme Court ruled the Wiretap Act covers data on unencrypted, in-home WiFi data, which Google collected as part of its Street View project. Last year, Google reached a settlement with 38 U.S. states and the District of Colombia, agreeing to pay $7 million and destroy the data it collected in the U.S. [Venture Beat] See also: [Maybe SCOTUS Gets Tech After All]

US – Privacy Groups Write Letter Against CISA

A group of 22 privacy groups wrote a letter to the Senate Intelligence Committee warning of the increased surveillance that would come with the Cybersecurity Information Sharing Act. Senate Intelligence Committee Chairwoman Dianne Feinstein (D-CA) and Vice Chairman Saxby Chambliss (R-GA) introduced the bill, which has been called a rehash of their failed bill CISPA. The letter said the bill doesn’t appropriately restrict data-sharing and includes broad definitions of cyber threats and a failure to protect personally identifiable information. [The Hill]

US – Federal Judge Rules SC Law Banning Political Robocalls Unconstitutional

U.S. District Court Judge Michelle Childs has ruled that a South Carolina law banning political robocalls is unconstitutional. Basing her decision on the First Amendment, Childs noted the government should not use content—importantly, political speech—to ban robocalls. A Columbia-based media attorney noted, “Political speech has the highest level of protection under the First and Fourteenth Amendment, and the court’s ruling is certainly consistent with the notion that a content-based restriction on political speech can be constitutional only if it serves a compelling governmental interest and no less-restrictive alternative exists.” [SC Now]

US – FTC Launches Contest at DEF CON to Find Robocall Solution

The FTC receives more than 150,000 complaints about robocalls every month, but it’s determined to find a technological solution and is tapping one of the world’s largest hacking conferences to find answers. It will hold a contest at DEF CON 22 in Las Vegas, NV, this August “to inspire the next generation tech solution in the fight against illegal robocalls,” according to the FTC’s blog. “Unfortunately, the technical distinctions between a telephone call and an e-mail have made it difficult to use Internet security tactics in the battle against robocalls,” the blog says, but the contest will hopefully change that. [FTC]

US – SCOTUS Unanimously Rules Warrants Needed for Cell Searches

In a developing story, the Supreme Court of the United States has unanimously ruled that law enforcement must obtain a warrant prior to searching the contents of a suspect’s mobile phone. Chief Justice John Roberts wrote, “To further complicate the scope of privacy interests at stake, the data a user views on many modern cell phones may not in fact be stored on the device itself,” adding, “Treating a cellphone as a container whose contents may be searched incident to an arrest is a bit strained as an initial matter.” Roberts also wrote, “We cannot deny that our decision today will have an impact on the ability of law enforcement to combat crime … Privacy comes at a cost,” but the justices reserved the right for police to claim “exigent circumstances.” [Full Story] [Court defends ‘21st-century mobile castles’: U.S. ruling protects cellphone privacy and ‘bodes well’ for Canada]

US – What the SCOTUS Cellphone Decision Means Going Forward

With the proliferation of smartphones and other electronic devices, courts have struggled to apply old Fourth Amendment principles to modern technologies and the digital data they hold. Now, by and large, that struggle is over. The change came through an unexpected vehicle: Riley v. California. Yesterday, the Supreme Court decided in a surprising 9-0 decision that police officers must now obtain a warrant before searching the digital information on the cellphone of an arrestee. The court’s ruling in Riley signals an important shift in the notion of privacy as it relates to digital information. IAPP Westin Research Fellow Dennis Holmes analyzes the decision and its implications for Privacy Tracker. [Full Story]

US – U.S. May Extend Privacy Right of Redress to Europeans

The U.S. government may extend to Europeans a privacy right in the U.S. that EU citizens have at home, according to a European Commission press release. A welcoming statement from EU Justice Commissioner Viviane Reding noted U.S. Attorney General Eric Holder said the U.S. intends to “take legislative action in order to provide for judicial redress for Europeans who do not live in the U.S.” Reding said this action could remove a major obstacle in negotiations between the two regions. “This is an important first step towards rebuilding trust in our transatlantic relations,” Reding said, adding, “Now the announcement should be swiftly translated into legislation so that further steps can be taken in the negotiation. Words only matter if put into law. We are waiting for the legislative step.” [Full Story]

US – Competitors Put Differences Aside to Fight Microsoft Case

Apple, Cisco and AT&T all filed amicus curiae briefs supporting Microsoft in its appeal of a federal court order to turn over a customer’s information stored in a data center in Ireland to U.S. law enforcement officials. Verizon filed an amicus brief last week. “The case highlights how the advent of cloud computing has technology companies overcoming their competitive differences in order to challenge troublesome data protection laws,” the report states. The companies say the court’s reasoning indicates, no matter where it is stored in the world, customer data isn’t safe from law enforcement’s grip. [GigaOM]

US – Tech Giants Back Spokeo in Privacy Class-Action

A group of web companies have joined together to back Spokeo in fighting a class-action lawsuit alleging the company provided inaccurate data. Google, Yahoo, Facebook and eBay are pushing the Supreme Court to hear Spokeo’s appeal of a recent decision allowing a Virginia resident to sue the data broker for allegedly violating the Fair Credit Reporting Act. In an amicus brief, the tech companies argue such “no-injury” lawsuits are producing an “increasingly negative impact” on their business. “If any of the millions of individuals who interact with (web companies) is willing … to allege that a generalized practice or act violated a law providing a private cause of action and statutory damages, then she could launch a putative class action,” the companies write. [MediaPost News] [Spokeo, Inc. v. Thomas Robins – Brief for Amici Curiae eBay Inc., Facebook, Inc., Google Inc., and Yahoo! Inc. in support of Petitioner – In the Supreme Court of the United States]

US – Judge Rules Carrier IQ Privacy Lawsuit Must Move Forward

U.S. District Court Judge Edward Chen has ruled that a privacy lawsuit against Carrier IQ must move forward. Chen wrote he was “not convinced” that allowing the case to continue would cause “irreparable injury” to the company. In 2011, Carrier IQ was accused of logging users’ keystrokes on mobile phones. Chen also suggested that the involved parties could resolve the issue through mediation and directed them to proceed with discovery. In the meantime, Chen scheduled the next conference for mid-November. [MediaPost News]

US – Markey Wants Privacy Protected Before Commercial Drones Take Flight

Sen. Ed Markey (D-MA) proposed a funding bill amendment to prohibit the Federal Aviation Administration (FAA) from approving nonmilitary drone use unless steps are taken to protect personal privacy. The amendment would require the FAA to add a data collection mechanism to its application process for commercial drone use that would specify the drone operator, the location where the drone would be flown and what type of data would be collected, along with what would happen to it afterwards, the report states. “We need to build in strong personal privacy protections and public transparency measures before commercial drones take off, which is exactly what my amendment will do,” Markey said. [The Hill]

US – House Has Enough Votes for ECPA Reform

The E-mail Privacy Act gained its 218th cosponsor this week, enough to give lawmakers hope the reform could move forward this year. “Having a majority of House members supporting our bill shows House leadership that the bill would pass … if it was put on the House floor,” said one of the bill’s authors, Rep. Kevin Yoder (R-KS). The proposed legislation would reform the Electronic Communications Privacy Act. There are signs, according to the report, that other lawmakers may have “some interest in attaching additional components,” including restrictions on law-enforcement access to cellphone location information. Though Yoder conceded that he’d be flexible with add-ons, he warned, “The more things you add … the more challenging it becomes.” [The Hill]

US – Changes to Incident Reporting; Potential New Legislation

The “Morning Cybersecurity” report from Politico had a number of items of interest. First, they report on an update from US-CERT that will change the system for reporting cybersecurity incidents on federal networks. It’s expected to go into effect by October 1. Further, Rep. Lee Terry (R-NE) is expected to circulate a federal data breach bill this week, which would go before the House Energy and Commerce Committee. He’s looking for democratic cosponsors before bringing the bill forward. In other legislative news, the FY15 State and Foreign Operations Appropriations bill supports funding to continue for implementing the White House’s International Strategy for Cyberspace. Finally, there is a note on YouTube and its 38,000 instructional videos on obtaining stolen credit card numbers, discovered by the Digital Citizens Alliance. [Politico]

US – Judge Rules LinkedIn Must Face Privacy Lawsuit

Professional services social network LinkedIn must face a privacy class-action lawsuit alleging the company violated its users’ privacy when it accessed their external e-mail accounts, downloaded their contacts’ e-mail addresses and solicited business from those contacts. U.S. District Court Judge Lucy Koh said the practice “could injure users’ reputations by allowing contacts to think that the users are the types of people who spam their contacts or are unable to take the hint that their contacts do not want to join their LinkedIn network,” adding, “In fact, by stating a mere three screens before the disclosure regarding the first invitation that ‘we will not … e-mail anyone without your permission,’ LinkedIn may have actively led users astray.” [Reuters]

US – Tech Sector Approves of New Majority Leader

Newly appointed House Majority Leader Kevin McCarthy (R-CA) is receiving praise from much of the tech sector. “Few members of Congress have as deep an understanding and appreciation for the economic impact and social change created by technology as Leader McCarthy,” said TechNet Chief Executive Linda Moore, who added, “he knows what public policies make the innovation economy thrive.” TechNet’s members include Apple, Google, Facebook and Microsoft. [The Hill]

US – State Working on Privacy Changes; New Social Network for Students, Teachers

The Louisiana Board of Elementary and Secondary Education (BESE) is expected to appropriate $1 million toward an effort to create a new identification system for public school students that doesn’t use Social Security numbers. A recently passed bill requires schools to use unique student IDs. The BESE president said, “This goes to the benefit of every single family and every single student of this state.” Meanwhile, Wired reports on Edmodo, a social network built specifically for primary and secondary students and teachers that offers new ways for teachers to assess students and trade tips. Cofounder Nic Borg said, “K-12 is an incredibly change-resistant system, and to be disruptive, you have to do it in the least disruptive way possible.” [Associated Press]

US – Hearing Features Debate on Student Data Mining, FERPA Reform

During a joint House subcommittee hearing on student privacy, experts, industry, regulators and lawmakers explored and debated the current state of federal student privacy laws in the digital age. Overall, there was quite a bit of agreement on moving forward with student privacy issues—including greater participation by states and the need for more legal counsel in drafting contracts between school districts and vendors—but panelists did not agree on the existing scope of the Family Educational Rights and Privacy Act and whether a federal mandate updating the statute is necessary. [The Privacy Advisor].

US – Lofgren: Congress Has No Appetite for Consumer Privacy Bill

Rep. Zoe Lofgren (D-CA) has said she does not see Congress moving forward with consumer privacy legislation any time soon, The Hill reports. “We’re not doing that,” she said, adding, “Do you see any appetite to do that? No.” At this point, Congress is focused on government surveillance reform. “People have an interest in privacy overall,” she noted, “but Yahoo can’t arrest you.” [Full Story]

US – Federal Breach Law Not Likely, Especially with Cantor Defeat

Kentucky recently became the 47th state to enact a breach notification law. One of the bill’s sponsors pointed to its success as a way “to be in uniformity with other states, especially the big commerce states that you think of, like Texas, New York and California,” adding, “That uniformity helps our business community here.” However, Joseph Lazzarotti, head of Jackson Lewis’ privacy, social media and information management practice, notes, “The nuances of breach notification laws across the country … further complicate responding to multi-state breaches.” The “toxic atmosphere in Congress” means “a data breach notification measure and other cybersecurity reforms can’t get passed,” noting that the defeat of House Majority Leader Eric Cantor in his state’s primary race “makes passing such a bill tougher.” [BankInfoSecurity]

US – Sixth Circuit Clarifies “Development” in Dirty World Decision

The Sixth Circuit has overturned a lower court ruling that determined a website provider was liable under Section 230 of the Communications Decency Act for defaming comments made on the site. The district court ruled against Dirty World Entertainment, saying, ““a website owner who intentionally encourages illegal or actionable third-party postings to which he adds his own comments ratifying or adopting the posts becomes a ‘creator’ or ‘developer’ of that content and is not entitled to immunity.” The Sixth Circuit, however, interpreted the term “development” using the “material contribution test” and sided with the defendant, saying it “cannot be found to have materially contributed to the defamatory content of the statements … simply because those posts were selected for publication” or “through the decision not to remove the posts.” [News Room Legal]

US – Data-Flow Restrictions Topic at Presidential Meeting

President Barack Obama’s Export Council hosted a meeting that included discussion on the effect foreign laws are having on cross-border data flows. Private-sector members submitted to Obama a recommendation letter detailing concerns about data flow restrictions in other nations and how other governments are implementing “digital protectionism.” The report states, “These foreign laws may limit the ability of American businesses, particularly small- to medium-sized businesses, to expand their business operations to include countries that enact such measures.” [Hunton & Williams’ Privacy and Information Security Law Blog]

US – Is Self-Regulation the Way Forward for Privacy?

A few weeks back, as part of the European Commission’s Digital Agenda for Europe, the Community of Practice (CoP) held its second-ever meeting to explore co- and self-regulatory best practices, and, today, the Council of Better Business Bureaus (BBB) is holding its first-ever meeting to develop self-regulatory best practices. The BBB’s Genie Barton said, “as far as I know, it’s the first private-sector conference on self-regulation writ large in the U.S.” This exclusive for The Privacy Advisor looks into both events and explores the role self-regulation has in privacy, including insights from Barton, the CoP’s Robert Madelin, FTC Commissioner Maureen Ohlhausen, National Consumer League’s Sally Greenberg and the Future of Privacy Forum’s Joshua Harris.

US – Lawyers Given Green Light to Scan Social Media Sites of Jurors

Lawyers have been given the green light to scan the social media sites of jurors. The American Bar Association says it’s ethical for lawyers to scour online for publicly available musings of citizens called for jury service—and even jurors in deliberations. But the ABA does warn lawyers against actively “following” or “friending” jurors or otherwise invading their private Internet areas. The “formal opinion” was issued in April and will serve as an ethical guideline for the nation’s lawyers. The ABA’s ethics committee began reviewing the issue about two years ago and concluded that looking at Facebook posts, Twitter tweets and other information gathered passively is ethical research. [The Associated Press]

US – Court Rules Against Wyndham in FTC Challenge

Court denies a hotel company’s motion to dismiss a lawsuit against it, holding it liable for a data breach suffered by a subsidiary – the claim sufficiently alleges that the company and its subsidiaries were operating as a common enterprise with respect to the use of computer systems that were not subject to reasonable safeguards and sufficiently identifies that on behalf of its subsidiaries, the company created the information security policies, and provided oversight for the IT and security functions. [FTC v. Wyndham Worldwide Corporation – 2014 U.S. Dist. LEXIS 84913 – United States District Court for the District of New Jersey]

Privacy Enhancing Technologies (PETs)

WW – Blackphone Reviewed: Little If Any Data Leakage

Dubbed the “Android for the paranoid,” the Blackphone runs an operating system called PrivatOS and is the first consumer-grade smartphone to be built explicitly for privacy. It employs services and software aimed at protecting users’ digital information in a straightforward way. The phone is the product of collaboration between Silent Circle and Geeksphone. the phone appears to live up the hype; user testing indicated “little if any data leakage that would give any third-party observer anything usable in terms of private information.” [Ars Technica]

US – $30 Million Investment Will Test Encryption’s Ease of Use

In one of the largest investments in consumer-privacy technology, encrypted messaging app Wickr has now received $30 million from venture capitalists. The service uses proprietary encryption for messaging, and, in a post-Snowden world, the service is enticing for many. However, some say it’s difficult to create encryption that is foolproof and easy to use. In the coming months, Wickr also plans to expand its services into paid offerings—including video communication. One of the main investors said, “There is room for what Wickr is doing to greatly enhance the effectiveness and the utility of messaging.” [The Wall Street Journal] Meanwhile, the Massachusetts Supreme Judicial Court ruled that a criminal suspect can be ordered to decrypt his seized computer.

WW – Introducing: Connect in Private

Like a lot of tech start-ups, Connect in Private has designs on changing the world. The unique angle in this case involves a patent the company has recently been granted for certificate-less, authenticated, encryption technology, or CLAE. “Current encryption is certificate-based,” said Alexander Hanff, a long-time privacy advocate who’s been brought on board as Connect in Private’s CPO. “That creates an issue because many of the certificate authorities are susceptible to secret court orders in the U.S. The beauty of CLAE is that it allows for identity-based encryption without the need for certificate authorities.” [The Privacy Advisor]

WW – Browser Add-on Aims to Decipher Privacy Policies

Privacy-focused companies Disconnect and TRUSTe have worked together to develop a browser add-on that translates website privacy policies into easily understandable language. The product, Privacy Icons, analyzes privacy policies, describing them in nine categories, including data retention, location tracking, expected use of data, and vulnerability to Heartbleed. Each category is accompanied by an icon that is colored, green, yellow, or red to indicate levels of concern about the site’s policy. The average website privacy policy is 2,400 words long and is written at a college student reading level. The pay-whatever-you-want add-on is currently available for Chrome, Firefox, and Opera. Versions for Safari, Internet Explorer, and mobile browsers will be available soon. [ComputerWorld] [DisConnect.Me]

WW – Disconnect, TRUSTe Unveil Privacy Icons

Consumer privacy software developer Disconnect, together with TRUSTe, has unveiled Privacy Icons, software intended to help consumers easily understand how websites collect and process their data. “Not many people read privacy policies,” said Disconnect Cofounder Casey Oppenheim in a press release. “But these are legally important documents that communicate what’s going on with your personal information. Privacy Icons translates these complicated policies into terms people can easily understand, including how their data is collected, shared and protected by the websites they visit and the services they use.” [Disconnect.Me]

EU – German Publisher Buys Into French Privacy Search Engine

German publisher Axel Springer has reportedly bought a minority stake in French search engine company Qwant—a privacy-conscious search engine. Qwant categorizes results into columns for web, news, social and shopping, among others. “We want to use the knowledge of Qwant and to make an exchange of ideas to see how search works,” said Axel Springer’s Michael Schneider. The publisher’s CEO recently sent an open letter to Google Chairman Eric Schmidt on “why we fear Google.” [GigaOM]

WW – Hackers Use Snowden Leaks to Reverse-Engineer NSA Surveillance Devices

Edward Snowden’s document leaks gave security researchers the necessary insights to develop their own. After the NSA’s classified Advanced Network Technology catalogue was published, Michael Ossmann and his team set about recreating two of its approved radio-based surveillance devices: one that could be fixed to a computer’s monitor connector to send on-screen images and another that can be fixed to a keyboard cable to collect keystrokes. Before, nobody knew how the so-called “retro reflectors” worked, but armed with NSA documentation, Ossmann and co. were able to create their own tiny transistor-sized devices that could surreptitiously transfer wireless data to a nearby radio point (much like the NSA is reported to have done). For reference: intelligence officers can use radio-based trackers to monitor computers that are not connected to the internet. Now that the NSA tech is no longer a mystery, Ossmann intends to educate others about how the NSA’s bugs operate so they can be protected against in the future. He’s due to present his findings at the Defcon hacking conference in Las Vegas in August, alongside many other experts who have found ways to expose and rebuild the agency’s technology. [engadget.com]

Security

WW – Anti-Hacking Org: Industry Data-Sharing Is Needed

The U.S. National Cybersecurity and Communications Integration Center, now with the backing of Capitol Hill, is set to improve its role as the coordinator between U.S. banks, utilities and other critical infrastructure organizations to thwart cyber attacks. “If we don’t know what’s going on, we can’t respond to it,” said the center’s director, Larry Zelvin. Lawmakers are crafting legislation to allow businesses that share threat data with the center to not be liable. Privacy advocates are concerned, however, that the system would expand surveillance practices of U.S. intelligence agencies. Plus, Juniper Networks Vice President of Government Affairs Robert Dix said, “There are a lot of people in industry that frankly are not comfortable sharing” with the Department of Homeland Security. [Bloomberg]

US – Study Shows Benefits of CISO Reporting to CEO

CSO Online Publisher Bob Bragdon cites findings of the 2014 Global State of Information Security Survey that support the idea that the CISO should report directly to the CEO. Organizations in which the CISO reported to the CIO had 14% more downtime than those in which the CISO reported to the CEO. Companies in which the CISO reported to the CIO had higher financial losses. “In fact, having the CISO report to almost any other position in senior management other than the CIO reduced losses from cyber incidents.” The study gathered information from more than 9,000 respondents. [CSO Online]

WW – Ten Ideas for Improving Cyber Security

Ten cyber experts’ best ideas for thwarting digital security threats include changing the way we think about security and being proactive about protecting sensitive data; encouraging transparency from cloud services about data handling; making better use of encryption; developing systems that present smaller attack surfaces; developing a new secure network for critical infrastructure; and establishing privacy and data security regulation and enforcement for companies. Most acknowledged that there are no easy and quick fixes. [Forbes]

WW – Start-Up to Accelerate Smart Home Products; Nest Purchases Dropcam

Quirky is a start-up that fields and produces new product ideas, but its founder and CEO Ben Kaufman has realized that, increasingly, approximately one in four product pitches are for connected devices for the home. “The Internet of Things is still for hackers, early adopters and rich people,” he said, but his company plans to accelerate the adoption of smart home devices. Quirky will spin off a new company called Wink, dedicated exclusively to providing an operating system to integrate all kinds of automated home devices. Meanwhile, Nest, which was recently purchased by Google, will buy home-monitoring camera start-up Dropcam for $555 million. [The New York Times] See also: [You’ve Got a Connected Home: What Could Go Wrong?]

Surveillance

US – US Legislators Approve Measure to Cut Funds for NSA Backdoor Installations

The US House of Representatives has approved a measure that would strip funding from NSA surveillance programs that involve placing backdoors on IT equipment. The measure, an amendment to the Department of Defense Appropriations Act 2015, would also forbid access to citizens’ Internet communications under Section 702 of the Foreign Intelligence Surveillance Act, without a warrant. [CNET]

US – PCLOB to Release Report on Foreigner Spying

The Privacy and Civil Liberties Oversight Board will next week release its report on the NSA’s collection of foreigners’ data. The report will “contain a detailed analysis” of surveillance programs targeting foreigners, which the government has said are legal under Section 702 of the FISA Amendments Act. Meanwhile, a coalition of privacy groups has released a “Congressional Scorecard” that assigns lawmakers a grade based on their support for surveillance reform; the Office of the Director of National Intelligence has released its first annual report on U.S. surveillance programs, and the new NSA chief says the damage done by the Snowden revelations does not mean “the sky is falling.” [The Hill]

CN – Is Privacy Law Being Used To Quell Dissent?

Chinese officials arrested prominent human rights lawyer Pu Zhiqiang last week on “suspicion of the crimes of causing a disturbance and illegal access to the personal information of citizens.” The charges carry penalties of five and three years in prison, respectively. Pu was arrested at a private gathering commemorating the 25th anniversary of the Tiananmen Square protests, in which he took part. He has represented artist Ai Weiwei and other activists who have been a thorn in the side of the Chinese government. In a piece for The Washington Post, former NSA General Counsel Stewart Baker suggests the Chinese are using privacy law as a means to quell dissent. Further, “How is China’s privacy law different from the data protection laws that Europe has been urging the world to adopt?” [Reuters]

Telecom / TV

EU – Germany to Drop Verizon Contract Over Spying Fears

The German government plans to drop a contract with Verizon because of fears about U.S. government surveillance. Tobias Plate, a spokesman for the German Interior Ministry, said Berlin has decided not to renew the contract for Verizon to provide Internet service to several government departments, the report states. “There are indications that Verizon is legally required to provide certain things to the NSA, and that’s one of the reasons the cooperation with Verizon won’t continue,” Plate said. Verizon’s current contract will expire in 2015. [The Hill] [The Register] [ZDNet]

US – DAA Unveils Mobile Privacy App

The Digital Advertising Alliance (DAA) announced it has created a mobile privacy app that enables users to opt out of behavioral advertising on mobile devices. The tool will also allow users to pick and choose which ad networks and third parties to avoid. “It’s about getting this in front of the DAA participants and showing them what it looks like,” said DAA Managing Director Lou Mastria, adding the group will “be doing a bigger push” to market the app when it becomes available to consumers this fall. [MediaPost News] See also: [So, Your Site’s Secure. What About Your App?]

US Government Programs

US – GAO: Small Gov’t Agencies Lack Cybersecurity

A recent report from the Government Accountability Office (GAO) finds that policy gaps leave small federal agencies—those with 6,000 employees or less—unprepared for cybersecurity risks. GAO’s analysis of six small agencies, which found “policies and procedures related to information security and privacy often needed an update, were incomplete or missing entirely.” For the analysis, the agencies were scored against 11 security and privacy elements taken from various laws and guidance documents, including the Privacy Act of 1974 and the Federal Information Security Management Act. [FierceGovernmentIT] [download the report, GAO-14-344]

US – Audit: USPS Fails to Observe Safeguards with “Snail Mail Snooping”

While digital surveillance has been stealing the headlines lately, the U.S. Postal Service (USPS) has been failing to comply with key safeguards on “snail mail.” An Office of Inspector General audit of “mail covers”—orders to record addresses or copy the outside of mail sent to a particular individual or address—were not properly approved, and 13% were “either unjustified or not correctly documented.” Additionally, the audit uncovered that some of the safeguards to catch such violations were not being implemented since the USPS was not conducting the required annual reviews. Former White House Privacy Director Tim Edgar called the audit’s findings “troubling.” [Politico] [Redacted version of report]

US Legislation

US – U.S. Reps. Introduce SSN Protection Bill

Reps. Dennis Ross (R-FL) and Kathy Castor (D-FL) have introduced the Safeguarding Social Security Numbers Act of 2013, a bill to protect Social Security numbers by limiting the number of visible digits. “Identity theft is a serious issue in our community … More needs to be done to protect our neighbors, and this is bipartisan legislation to implement an important safeguard and reduce identity theft-related scams,” said Castor. [Sunshine State News]

US – Feinstein Releases Draft Information Sharing Bill

Senate Intelligence Committee Chairman Dianne Feinstein (D-CA) has released a draft of the Cybersecurity Information Sharing Act, which she wrote with the Committee Vice Chairman Saxby Chambliss (R-GA). The bill creates incentives for private organizations to share cybersecurity threat information with the government and within public agencies. It would provide liability protection for the sharing of cyber information for cybersecurity reasons under the terms of the bill and then sets out protections to stave off privacy intrusions, such as a requirement for companies to strip out personally identifying information before sharing data. [Sierra Sun Times]

US – Florida Governor Signs Breach Notification Law

Florida Gov. Rick Scott has signed a revised data breach notification law that strengthens consumer protections. The law includes a 30-day deadline on notification from the date of discovery of the incident, adds account credentials to the list of data that constitutes “personal information” and imposes a statutory requirement to protect that information, among other changes. [National Law Review]

US – Louisiana Gov. Signs Student ID Bill

Louisiana Gov. Bobby Jindal has signed HB 1076, meaning that public school students in the state will get unique ID numbers instead of having Social Security numbers tied to academic records, and districts will have to get parental consent before collecting certain student data. The state has until May 1, 2015, to put in place a system for unique IDs, and all public school students will have a number by June 1. [The Advocate]

US – New Jersey “Ban the Box” Heads to Gov.

New Jersey legislators have passed The Opportunity To Compete Act, which limits employers’ ability to conduct criminal background checks. Employers would be required to make a conditional offer to applicants prior to conducting such checks and would be subject to a $1,000 fine for a first offence and increasing to $10,000 upon a third offence. [NJBiz]

US – North Carolina Legislature Passes Student Privacy Bill

The North Carolina legislature has unanimously passed SB 815, which would require the state Board of Education to make information about the student data system available to the public and ensure the protection of personally identifiable information in the system. Sponsored by Sen. Chad Barefoot (R-District 18), the bill would also restrict the collection of biometric information and certain sensitive information and require notification of parental rights and opt-out opportunities. The bill now heads to Gov. Pat McCrory for a signature. [Lincoln Times-News]

US – Connecticut Gov. Signs Pharmacy Rewards Program Bill

Connecticut Governor Dannel Malloy has signed into law a bill requiring pharmacies to notify customers that take part in prescription drug rewards programs about which third parties will have access to their data and whether they will have access to protected health information. The law requires pharmacies to provide a “plain language summary of the terms and conditions” of their pharmacy reward programs before the consumers enroll and information on how they may revoke their HIPAA authorization. [Hunton & Williams’ Privacy and Information Security Law Blog]

US – Kentucky State Rep. Pre-files Drone Privacy Bill

State Rep. Diane St. Onge (R-District 63) has reintroduced a bill requiring police to obtain a warrant before using drones to gather evidence. St. Onge pre-filed the bill for the 2015 session and has received support from the American Civil Liberties Union and others. The bill allows for colleges and private businesses to use drones for research and business purposes and allows for emergency police use other than evidence-gathering. [USA Today]

Workplace Privacy

US – Employers Increasingly Monitoring Employees

Digital tools being used to monitor employees. In one positive example, a company learned workers are more productive if they have social interaction, so it introduced a 15-minute coffee break, resulting in reduced turnover and increased productivity. But fine-grained digital monitoring of worker behaviors concerns advocates like the Electronic Frontier Foundation’s Lee Tien, who said the rules on such surveillance are few. A Harvard researcher recently found that worker surveillance aimed at increasing productivity can sometimes have the opposite effect. Meanwhile, a new online service helps job candidates tidy up their Facebook and Twitter accounts before applying for jobs. [The New York Times]

ON – Workplace Safety Insurance Board (WSIB) Steps Up Spying On Clients

Documents obtained by Torstar News Service suggest the WSIB is spying on clients claiming to be seriously injured, now more than ever and often without cause. “Now that we are conducting more surveillance related to misrepresentation of level of disability where we don’t have an actual allegation, e.g. call record, there have been lots of questions from compliance specialists around what constitutes sufficient grounds to warrant surveillance,” states a 2011 internal email from Bob Thomas, an employee in the WSIB’s regulatory services division. Those “sufficient grounds,” according to the email, include dozens of indicators such as chronic pain, language barriers and problems speaking to an injured worker directly, frequent change of phone number or address, recovery times that are inconsistent with usual healing times, anti-social behaviour or overreaction and psychological problems. Other “red flags” for fraud, as the board refers to them, include forms returned by someone else or not signed, an unreasonable distance travelled by the worker to see a doctor, a worker who is “never home, returns calls after hours, noise in background” or who has a “first medical treatment from chiropractor.” The documents were obtained by the IAVGO Community Legal Clinic through a freedom of information request after surveillance was used to reduce the benefits of eight clients. [Source]

NO – Privacy Appeals Board, Norway – Decision on Employee CCTV Surveillance

The Board overturns the data protection authority’s prohibition on a company’s video and audio monitoring of its employees and a fine of NOK 200,000 (approximately USD 32,556) imposed under the Personal Data Act and the Personal Data Regulations); the monitoring is permitted provided that the cameras are not configured to gain access to staff areas via VPN (having IT equipment that can be accessed via the internet does not constitute a violation as long as the link is appropriately secured), cameras in an equipment room are permitted because the company’s interests outweigh privacy considerations (suspected employee misconduct), and the company does not have to erase secret audio recordings (the manual recordings are not searchable and some employees have been subjected to serious threats). [Source]

+++

01–15 July 2014

Biometrics

US – FBI Facial Recognition Not on Par with Facebook?

The FBI is planning to deploy its own facial recognition system, which will centralize millions of photos in one federal database, this summer and to have it reach all 50 states by year’s end. But the Electronic Frontier Foundation has found the system, called Next Generation Identification, isn’t as efficient as may have been expected. Facebook’s DeepFace system, however, operates at 97% accuracy, meaning “the nation’s most powerful law enforcement agency is getting outgunned by a social network.” One biometrics expert says while plenty of facial-recognition contractors promise near-human capabilities, “the difference between a human brain and a computer brain is huge.” [The Verge]

WW – New Google Glass App Reads Brainwaves, Translates Them to Action

A new app aims to kickstart a more seamless way of interacting with Google Glass. MindRDR links with Google Glass with a biosensor—which is mounted on the user’s head—to create a “communication loop.” The biosensor picks up on brainwaves that correlate to the user’s ability to focus. Then, those brainwaves are translated to a meter reading that “gets superimposed on the camera view in Google Glass. As you ‘focus’ more with your mind, the meter goes up, and the app takes a photograph of what you are seeing in front of you,” the report states. The technology may be used to train people to concentrate better or for medical applications for users with mobility problems, among other uses. [Tech Crunch]

CA – Facial Recognition with Biometric Encryption in Match-on-Card Architecture for Gaming and Other Computer Applications

A facial recognition system with biometric encryption using match-on-card (“MOC”) technology has the following advantages – the MOC technology allows the secure storage and processing of biometric data within a tamper-resistant secure module of a device which is in the user’s possession (including smart cards, USB flash drives, and certain types of smartphones), the system cannot be linked with other databases that store biometric keys (“BK”) since a BK generated for the same user will be completely different, the host stores a BK that is generated from a biometric that cannot be reverse engineered, and the smart card cannot be loaned to another user because the BK will not be valid. [Source] and also: [IPC ON – Privacy by Design Solutions for Biometric One-to-Many Identification Systems]

Big Data

WW – De-ID Is Not Sufficient: Scholars

Scholars at Princeton University say data de-identification tools aren’t sufficient to ensure privacy. Asst. Prof. Arvind Narayanan and Prof. Ed Felten have published an academic paper, “No Silver Bullet: De-identification Still Doesn’t Work,” poking holes at the methodologies of a paper published last month by researcher Daniel Castro and former Ontario Information and Privacy Commissioner Ann Cavoukian that claimed the opposite , the report states. Felton and Narayanan list eight problems with Castro and Cavoukian’s paper. “There is no evidence that de-identification works either in theory or in practice and attempts to quantify its efficacy are unscientific and promote a false sense of security,” they write. Meanwhile, Zach Wener-Fligner writes on “why you may never be truly anonymous in a big data world.” [IT News] and also: [De-identification Protocols: Essential for Protecting Privacy – Ann Cavoukian, Ph.D., Information and Privacy Commissioner, Ontario, and Khaled El Emam, Ph.D., Canada Research Chair in Electronic Health Information, University of Ottawa]

EU – EDPS Report: Ensuring More Effective Data Protection in an Age of Big Data

The new E.U. legal framework will require data controllers to verify if any consent relied upon was valid, and that other legal grounds relied upon are also sound and convincing; this requirement will apply to the use of big data technology, and whenever personal data is processed in that context. The new framework will deliver stronger rights for data subjects, responsibilities for data controller, and supervision and enforcement of data protection rules across the EU; it will provide for strong sanctions (up to millions of euros) for the most serious cases. [Source] and see: [Using Privacy by Design to Achieve Big Data Innovation Without Compromising Privacy – Ann Cavoukian, Ph.D., Information and Privacy Commissioner, Ontario, and David Stewart and Beth Dewitt, Deloitte] and also: [A Risk-Based Approach to Privacy: Improving Effectiveness in Practice – Center for Information Policy Leadership, Hunton and Williams LLP] and [The Scored Society: Due Process for Automated Predictions – Danielle Keats Citron and Frank Pasquale, University of Maryland School of Law – Social Science Research Network]

Canada

CA – Ottawa Prepares to Share Personal Data with Foreign Governments

The Conservative government has given itself broad new powers to share Canadian immigration files and other information with foreign governments – a practice that could have far-reaching implications for individuals who cross borders. The powers are included in Bill C-24, an overhaul of citizenship law passed last month, though have drawn little attention. The changes amend the Citizenship Act to allow Stephen Harper’s cabinet to draft regulations “providing for the disclosure of information for the purposes of national security, the defence of Canada or the conduct of international affairs,” including under international deals struck by Citizenship and Immigration Minister Chris Alexander. The police and our security agencies are clearly gaining warrantless access to customer information that allows them to identify us and our activities online and probably more. Cabinet will also now be permitted to allow the “disclosure of information to verify the citizenship status or identity of any person” to enforce any Canadian law “or law of another country.” Ottawa contends the final regulations are still being developed and will comply with Canadian law. However, critics warn the changes could lead to Canada sharing citizenship and immigration details with foreign countries, whether verified or not, without oversight. [The Globe and Mail] See also: [Allegations of widespread bugging at Saskatoon jail] and also: [OIPC BC – Special Report: A Failure To Archive – Recommendations To Modernize Government Records Management] and also: [OIPC BC – Updated Guidance on the Storage of Information Outside of Canada by Public Bodies]

CA – Canadians Report 1,000 Anti-Spam Law Violations

More than 1,000 complaints have been filed since the new anti-spam law took effect, says Manon Bombardier, the CRTC’s chief compliance and enforcement officer. Hundreds of reports have been submitted daily at fightspam.gc.ca and investigators are already at work looking into whether companies have violated the new law.Consumers who wish to report unwanted spam emails can forward messages to spam@fightspam.gc.ca or fill out an online form to register a complaint. “We’re going to look at all the complaints we receive,” Bombardier says. “We will be strategic in which ones we pursue for investigations but we will review all the complaints.” [The Canadian Press] See also: [Office of the Privacy Commissioner of Canada – Personal Information Retention and Disposal: Principles and Best Practices]

CA – A Review of CSEC SIGINT Information Sharing With Second Parties

The Minister of National Defense (the “Minister”) should issue a new ministerial directive to provide general direction to Communications Security Establishment Canada (“CSEC”) on its foreign signals intelligence information sharing activities with its second partners (the US, UK, Australia, and New Zealand), and set out expectations for the protection of the privacy of Canadians in the conduct of those activities. The CSEC Commissioner should report annually to the the Minister the number of one-end-in-Canada second-party-collected communications it acquires from its second partners. [A Review of CSEC SIGINT Information Sharing With the Second Parties – File #2200-79 – Office of the Communications Security Establishment Commissioner]

CA – A New Possibility for Security and “Privacy by Design”: Fault-Free Software

“Semantic analysis” is a new approach to ensuring software accuracy that analyzes code statements with formal logic rules to ensure the software is semantically correct and output data is tracked backwards through the logic to ensure it is consistent with the input data set; this approach can be used to achieve Security and Privacy by Design by identifying the presence of malware (semantic analysis can generate a functional signature, where any departure from that signature can be flagged) and addressing privacy issues (e.g., if output data sets are constrained to exclude personal information, the program logic can be tested to ensure it correctly handles an occurrence of PI in the input data set). [Source]

Consumer

US – Senator Wants Answers from Facebook

Sen. Mark R. Warner (D-VA) has asked the FTC to provide more details about Facebook’s emotion contagion study and to determine whether the company violated any existing law or its consent agreement with the agency. Meanwhile, in a separate story, Future of Privacy Forum Executive Director Jules Polonetsky writes about anti-behavioral advertising group Some of Us and its criticism of Facebook’s use of targeted ads. Upon looking at the group’s privacy policy, Polonetsky found the group “does exactly what it is calling on its users to protest to Facebook,” allowing tracking by some of the ad industry’s largest data brokers and placing users on an e-mail list for future use. [Forbes] See also: [European Regulators Looking Into Facebook Study] and [Canada: Facebook emotion study examined by privacy commissioner] and [Privacy vs. Personalization – The Creepy Side of Small Business CRM] and, finally: [Prepared Statement of Woodrow Hartzog to the Committee on Oversight and Governmental Reform Regarding the FTC and its Section 5 Authority] [Prepared Statement of Gerard M. Stegmaier to the Committee on Oversight and Governmental Reform Regarding the FTC and its Section 5 Authority] and finally [FTC v. Wyndham Worldwide Corporation, et al. – Memorandum Opinion and Order – United States District Court for the District of New Jersey]

US – Retail Breaches Making Customers Wary

Two surveys reveal that recent breaches are making consumers think twice about where they shop and how they pay for products. The Consumer Data Insecurity Report from the National Consumer League (NCL) notes consumers are increasingly blaming retailers for compromised credit cards and are changing services because of that. Security Matters: Americans on EMV Chip Cards states that nearly two-thirds of U.S customers are more likely to pay in cash after a breach. Nearly 60 percent of the fraud victims surveyed in the NCL study said their trust in retailers has significantly decreased. [Dark Reading]

AU – Psychologists Warn Lack of Privacy May Put Students at Risk

School counsellors in NSW independent schools fear students will avoid seeking help or talking openly about their problems because principals can now demand access to their confidential files, the Australian Psychological Society (APS) has warned. A new national privacy manual for independent schools says a principal can access a counsellor’s files “in the same way as he or she may call for the records made by any other school employee which relate to school matters”. It also says that if a student did not accept this, they would need to seek counselling elsewhere. The APS has warned the policy could have a devastating impact on students but the Association of Independent Schools of NSW says principals have no interest in prying into the private lives of students or their families and have an obligation to ensure the wellbeing of all students in their care. [The Sydney Morning Herald]

E-Mail

US – Goldman Sachs Wants Google to Delete Misdirected E-mail

To prevent what it calls a “needless and massive” breach of privacy, the Goldman Sachs Group is asking Google to delete an e-mail containing “highly confidential brokerage account information” that was mistakenly sent to a Gmail account. Goldman Sachs has filed a complaint with a New York state court and says Google “appears willing to cooperate” if that order is issued. The bank said, “Emergency relief is necessary to avoid the risk of inflicting a needless and massive privacy violation upon Goldman Sachs’ clients and to avoid the risk of unnecessary reputational damage to Goldman Sachs.” [Reuters] See also: [In The Matter Of A Warrant For All Content And Other Information Associated With The Email Account xxxxxxx@Gmail.com Maintained At Premises Controlled By Google, Inc. – Memorandum Opinion – U.S. District Court for the Southern District of New York] and [In the Matter of a Warrant to Search a Certain Email Account Controlled and Maintained by Microsoft Corporation – Government’s Brief In Support Of The Magistrate Judge’s Decision To Uphold A Warrant Ordering Microsoft To Disclose Records Within Its Custody And Control – U.S. District Court Southern District Of New York]

CA – Onslaught of E-mails: CASL’s Unintended Consequence

“In recent weeks, Canadians have been inundated with e-mails from retailers, manufacturers, nonprofits, even government agencies—all rushing to verify that people actually want their accounts flooded with deals, discounts, announcements or anything with a whiff of commerciality, useful or otherwise,” describing the phenomenon as “the unintended by-product of a new Canadian law designed to de-clutter inboxes.” Canada’s Anti-Spam Legislation (CASL) is now in effect, and senders of commercial electronic messages to Canadians—regardless of where the senders are located—must verify recipients’ consent, thus spurring the proliferation of e-mail requests in the weeks before July 1. [The New York Times] See also: [Geist: In Defence of Canada’s Anti-Spam Law, Part Two: Why the Legislation Is Really a Consumer Protection and Privacy Law in Disguise]

Electronic Records

WW – Human Care Systems Taps Perspecsys for Cloud Compliance

Human Care Systems (HCS), which designs and delivers patient, physician and pharmacist support services for some of the top pharmaceutical companies globally, has selected Perspecsys AppProtext Cloud Data Protection Gateway to secure patient medical data. Andrew Taff, director of operations and technology at HCS, said the selection was made in order to “meet strict EU data residency and privacy compliance requirements while recording, storing and processing patient treatment and medical data in the cloud.” The system will allow HCS to retain confidential and sensitive patient medical data within their “local regional data center” while transferring only “surrogate token values” to the cloud platform, according to a press release. [Big News Network]

Encryption

US – Survey: More Than One-Third of Respondents Not Using Encryption

A Voltage Security survey conducted at a recent European IT security exhibition found “nearly 36% of IT security professionals admit to sending sensitive data outside of their organisations without using any form of encryption to protect it.” Voltage CTO Terence Spies commented, “This statistic is cause for alarm, particularly given that encryption provides protection for companies against cyber criminals, competing companies and even governments; it is the key to keeping sensitive data away from prying eyes.” The survey included responses from 200 IT professionals, the report states. [Information Age]

UK – Jail Time for UK Man Who Refused to Surrender Crypto Keys

A UK man has been sentenced to six months in jail for refusing to surrender cryptographic keys to police. Computer science student Christopher Wilson was asked to provide police with keys to unlock his computer because he is suspected of breaking into the Northumbria Police website and attempting to break into the website of the Serious Organised Crime Agency. [The Register]

WW – Microsoft Flips Switch on New Webmail Encryption

Microsoft has pulled back the curtain on its implementation of tougher encryption standards for Web-based email and some cloud services, the company announced. In the works for more than six months, Microsoft has now activated Transport Layer Security encryption (TLS) for its webmail services at Outlook.com, Hotmail.com, Live.com, and MSN.com. This means it will be significantly harder for email originating from and being sent to a Microsoft account to be spied on, as long as the connecting email service also uses TLS. Matt Thomlinson, vice president of Microsoft’s Trustworthy Computing division, said that this work is part of a “comprehensive engineering effort to strengthen encryption.” “This effort also helps us reinforce that governments use appropriate legal processes, not technical brute force, if they want access to that data,” he said. [CNET]

EU Developments

UK – Britain Unveils Emergency Laws to Keep Email, Phone Data for Security

Britain said it would rush through emergency legislation to force telecoms firms to retain customer data for a year, calling the move vital for national security following a decision by Europe’s top court. Communication companies had been required to retain data for 12 months under a 2006 European Union directive but this was thrown out in April by the European Court of Justice on the grounds that it infringed human rights. Britain’s coalition government said the scrapping of that directive could deprive police and intelligence agencies of access to information about who customers contacted by phone, text or email, and where and when. Prime Minister David Cameron said it was vital these powers were not compromised at a time of growing concern over Britons travelling to Iraq and Syria to join militant Islamist groups. Those concerns prompted the government to take the unusual step of announcing fast-track legislation which, under a deal brokered behind closed doors between Britain’s three major political parties, could become law as soon as next week. [Reuters]

UK – Parliament Fast Tracking Emergency Data Retention Law

The UK government is pushing emergency legislation through Parliament that will require telecommunications service providers to store communications metadata for up to one year. All three major political parties have expressed their support of the measure. Prime Minister David Cameron says the law does not create new surveillance powers. The Data Retention and Investigation Powers Bill is being rushed through Parliament because in April, the European Court of Justice overturned the EU Data Retention Directive on the grounds that it “interferes in a particularly serious manner with the fundamental rights to respect for private life and to the protection of personal data.” [BBC] [v3.co.uk] [ZDNet]

UK – ISPs, Nonprofits File Legal Complaint Against Spying Practices

Seven Internet service providers, along with nonprofit groups from multiple countries, have filed a legal complaint against British spy agency GCHQ. The groups allege the organization illegally hacked into the computers of Internet companies to access their networks. The complaint was filed with the Investigatory Powers Tribunal and calls for an end to GCHQ’s targeting of system administrators to gain access to the networks of service providers for the purpose of mass surveillance. It also alleges GCHQ paired up with the U.S. NSA to target exchange points operated by three German companies, in violation of international law. [Wired] See also: [Report: NSA targeted German privacy activist]

EU – BCRs Gain Momentum with Article 29 WP Endorsement

Phil Lee discusses the Article 29 Working Party’s letter to the European Parliament illustrating the clear support that Binding Corporate Rules (BCRs) for processors have and will continue to have from the Working Party. BCRs are an “optimal solution to promote the European principles of personal data abroad,” said Working Party Chair Isabelle Falque-Pierrotin. The letter is “representative of a growing trend for global organizations to seek BCR approval in preference over other data export solutions,” Lee writes, noting there were 19 BCR-approved organizations in 2012 compared with 53 today. [Fieldfisher]

EU – EDPS Opines on the Transfer of Personal Data to 3rd Countries and International Orgs

The following are considered adequate safeguards when transferring personal data to an inadequate country – a third party beneficiary clause, clarification of the exporter and importer’s obligations (such as requirement to respond to enquiries, provide a copy of the clauses to the data subject, and submission to reviewing, auditing), a liability clause, obligation of the importer to communicate security breaches to the exporter, details of governing law, information about cooperation with supervisory authorities, and power of the data protection authority to block or suspend the transfers. [Opinion] [Press Release: European Commission – Cloud Service Level Agreement Standardisation Guidelines] [Guidelines]

EU – Germany Gives Berlin CIA Chief the Boot Over Spying Allegations

Germany has told the U.S. CIA station chief in Berlin to leave the country after two suspected U.S. spies were unearthed. The revelations follow allegations that Chancellor Angela Merkel was among the many Germans whose mobile phones were bugged by U.S. agents. “Spying on allies … is a waste of energy,” Merkel said. “We have so many problems, we should focus on the important things.” German authorities say they are investigating a government employee suspected of spying on confidential government affairs and have seized evidence including computers and several data storage devices. [Reuters]

EU – Privacy Pro to Head European Marketing Trade Group FEDMA

For the first time, a privacy officer will be the chair of a major European trade body. The Federation of European Direct and Interactive Marketing (FEDMA) has announced Sachiko Scheuing, the European privacy officer at Acxiom, has been elected to the post alongside Director General of the Dutch Marketing Association Diana Janssen. The two will serve a three-year term in an effort to further FEDMA’s pursuit of helping the marketing industry to use data in an ethical way and to ensure that both consumers’ and marketing organizations’ needs are met. [The Privacy Advisor].

EU – Reding Leaves European Commission To Become MEP

Four European Commissioners—including Viviane Reding—left their jobs after being elected to the European Parliament. Formerly the commission’s justice commissioner, Reding is now Luxembourg’s MEP, the report states. The other commissioners who have left their posts to become MEPs include former economics commissioner Olli Rehn of Finland, industry commissioner Antonio Tajani of Italy and Janusz Lewandowski, of Poland, who was previously in charge of the EU budget. Jose Manuel Barroso, outgoing head of the commission, “said their portfolios will be temporarily taken over by other commissioners, pending the hearings and appointment of their successors,” the report states, noting, “Austria’s Johannes Hahn, responsible for regional policy, will also look after justice and fundamental rights.” [EU Observer]

Facts & Stats

CA – Most Alberta Freedom of Information Requests Get No Results

Two out of three Albertans who ask for government records using a freedom of information request get nothing, a Journal analysis shows. A review of nearly two decades of data revealed a majority of people who request provincial records are told documents “do not exist.” Fewer than two in 10 will get some of the information they wanted, and fewer than one in 10 will get everything they asked for. Information and privacy commissioner Jill Clayton said the findings are “concerning,” and she will review the issue as part of her ongoing investigation into Alberta’s freedom of information system. [Edmonton Journal] See also: [Nova Scotia: New FOIPOP review officer appointed for province] and [NB: Hospital privacy breach report set for release]

Filtering

WW – Microsoft Preps for RTBF; DPAs Prep for Refusals

In response to the recent EU high court ruling, Microsoft plans to join Google in rolling out an online takedown form to delink personal information. “Developing an appropriate system is taking us some time,” the company said. “We expect to launch a form through which users can make requests soon.” Data protection authorities in the EU plan to meet next week to commence work drafting “procedural guidelines” for handling complaints about search engines’ refusals of takedown requests. [The New York Times]

Finance

US – Federal Court Dismisses FINRA Privacy Case

A U.S. District Court judge has tossed a privacy lawsuit by a former broker who alleged public disclosures by the Financial Industry Regulatory Authority (FINRA) violated his privacy rights. Alan Santos-Buch sued FINRA for making details of a 1997 case against him public on its website and in a regulatory document. He said such public disclosures have made it difficult for him to get a job. However, the judge ruled the case failed to raise “substantial constitutional questions” that would allow it to proceed, noting in a 21-page opinion, “Santos-Buch has failed to allege any facts establishing that irreparable injury may occur without immediate judicial relief.” [Reuters]

FOI

EU – EU Court Orders More Transparency of Anti-Terror Program

The Court of Justice of the EU (CJEU) has ordered that EU institutions be more transparent about negotiations over transferring EU citizens’ banking data to U.S. anti-terrorism authorities. In 2001, the U.S. Terrorist Finance Tracking Program had ordered the Society for Worldwide Interbank Financial Telecommunication to share financial transactions via its U.S. operating center. Of the recent CJEU ruling , Dutch MEP Sophie in ‘t Veld said, “The court clearly states that transparency is a prerequisite for a truly democratic Europe. The European Union must develop from a Europe of diplomats, discretion and confidentiality to a Europe of citizens, administrative transparency and trust.” [PC World]

US – FOIA Lawsuit Seeks Documentation of Intelligence Agency Flaw Stockpiling

The Electronic Frontier Foundation (EFF) has filed a Freedom of Information Act (FOIA) lawsuit for information about US intelligence agencies’ stockpiling of security flaws. Specifically, the request seeks information about how intelligence agencies decide which flaws to disclose and which to keep secret. The privacy rights group is concerned that the flaws, which have not been patched by software vendors, could pose a threat to users. [The Register] [ComputerWorld]

CA – Edmonton Urged to Publish Sunshine List of Top Salaries

Edmonton should follow the provincial lead and disclose its own sunshine list, a government-spending critic argues. Figures compiled by the Journal show that roughly 2,000 City of Edmonton employees earned more than $100,000 last year. The information indicates roughly 12.3% of the total 16,100 workforce — planners, bus drivers, park rangers, technicians and other staff — made six figures in 2013. Fire rescue services and the Edmonton Police Service each had 27% of their staff in this range, the highest proportion among major sections of the city. But virtually everyone in the auditor’s office — 13 of 14 employees — was paid $100,000 plus. In January, the province released a “sunshine list” of 3,455 public service employees — 12.7% of the total — whose pay and benefits exceed $100,000. Derek Fildebrandt, the Alberta director of the Canadian Taxpayers Federation, said Edmonton should follow suit. About 11.7% of Alberta’s overall labour force was in the $100K club in 2011, according to the most recent Statistics Canada figures.[Edmonton Journal] [Alberta Education broke privacy laws in minister Jeff Johnson’s email to teachers]

Genetics

CA – Call to Halt Use of Gene Test Results in Insurance Calculations

Canada’s Office of the Privacy Commissioner (OPC) has issued a statement urging the life and health insurance industry to refrain from asking applicants for access to existing genetic test results. This would require the insurance industry to go beyond its current voluntary moratorium on asking people to undergo genetic testing on application. The insurance industry, however, disagrees. ‘They say these tests aren’t necessary, we think they are’, said Frank Zinatelli, vice president and general counsel for the Canadian Life and Health Insurance Association, a group representing 99% of the insurance industry in Canada. From the commercial perspective, it thought that genetic information should be treated in the same way as any other piece of available medical information; access to data enabling accurate individual risk classification is paramount to the insurance industry’s sustainability. The present lack of legislative guidance on the issue in Canada appears to contribute to the sense of urgency with which the OPC statement has been issued. Nevertheless in, ‘[r]ecognising that the state of medical technology is changing rapidly,’ the OPC has indicated that its ‘position should be revisited on a periodic basis’. [BioNews] [Source]

Google

EU – Google to Tour Europe on Privacy, RTBF

In response to the EU court ruling on the right to be forgotten, Google plans to tour Europe as early as this fall in a series of meetings to explain its stance on privacy. Additionally, the online search giant has announced additional members of its privacy panel, including former German Minister Sabine Leutheusser-Schnarrenberger and Le Monde Editorial Director Sylvie Kauffmann. Details on the full 10-person panel, with individual biographies, as well as an online form asking users to “tell us your thoughts on the CJEU ruling” are now available on a Google webpage. “For each of these requests, we’re required to weigh … an individual’s right to be forgotten with the public’s right to know,” Google states. “We want to strike this balance right.” [The New York Times] See also: [Businesses Finding Opportunity in RTBF Ruling] [Brussels: Google seeks privacy debate]

WW – Google Restores Links Removed After RTBF Ruling

Google has “restored links to some news articles that were removed to comply with a European Union court privacy ruling days after the deletions were criticized by publishers.” The news follows last week’s comments by a UK journalist that the so-called “right to be forgotten” will curtail freedom of expression. The Guardian’s Hayley Dunlop said, “Some but not all of the Guardian stories that Google hid in search results are now appearing once more,” and notes The Telegraph has also confirmed two 2010 articles that had been removed are once again accessible. The UK Information Commissioner’s Office has not “received any complaints over how Google has handled requests for removal,” the report states. [Bloomberg] [Google does U-turn on some deleted links in ‘Right to be Forgotten’ cases]

UK – Google Blurs Out Homes of Celebrities on Its Street View Maps

Google has begun blurring out the homes of celebrities on its ‘street view’ maps after some claimed the images breached their privacy under new European laws, it has been reported. The search engine giant this week removed images of properties owned by the likes of Prime Minister Tony Blair and Sir Paul McCartney. Pictures of houses owned by singer Katherine Jenkins and rocker Jimmy Page are also understood to have been removed, according to reports. The Google Street View tool currently includes millions of photographs which allow online users to navigate their way around most parts of the UK at street level in 3D. But following a ruling by the Court of Justice of the European Union in May, which gave individuals the “right to be forgotten”, certain images have become obscured. [London Evening Standard]

Health / Medical

WW – Is Big Data Becoming Health Industry’s Big Brother?

Health data generated by apps, devices, electronic health records and wearables combined with purchasing and TV-watching habits tracked by social media sites and others mean big data may be poised to become big brother, noting, “It’s hardly out of the question that someday soon the healthcare industry might want to tap into social media to find out more about patients’ health habits.” A new report by the World Privacy Forum (WPF) found healthcare analytics companies are already drawing from retail databases, data brokers, retailer loyalty cards and nonprofit organization member lists, among others. The WPF report notes if the data is used for discrimination, it could have “dire consequences … The secrecy of the data being shared is the part society should worry about.” [GovernmentHealthIT] [Is Google eyeing big data analytics in electronic medical records?] and [OPC Canada – Wearable Computing: Challenges and Opportunities for Privacy Protection] and [Ontario’s privacy watchdog probing leak of woman’s medical information]

US – New Mobile Platform Seeks to Make Health Apps HIPAA-Ready

Medable is a platform designed to allow “medical grade” apps to safely share health data with clinical systems. Michelle Longmire, the Stanford-based physician who created the platform, said, “With Medable, mobile apps can make it easy for users to communicate with their doctors, nurses and caregivers and also provide them with any kind of data originating from the mobile devices,” adding, “That lets everyone receive the data, visualize it, and then communicate about it in a very natural way.” App developers can use the platform to create new services, all delivered through a software development kit and an application programming interface. Longmire also said Medable uses the HL7 clinical data format for easy integration with existing electronic health records systems. [VentureBeat] See also: [What big data could do for health care] and [The Legal And Ethical Concerns That Arise From Using Complex Predictive Analytics In Health Care]

WW – Can Software Make Health Data More Private?

Researchers are developing software designed to prevent sensitive medical information from being inadvertently shared. The software, developed by computer scientists at the University of Illinois, would allow patients to decide which parts of their records they want to keep private but also aims to use machine-learning analysis to reveal whether unselected information would disclose sensitive data such as mental health issues, sexually transmitted diseases or past drug abuse. The software would then keep that additional data confidential for the patient. “Electronic health records at the moment have no facility—none—to break the record into parts,” said Harvard Medical School’s John Halamka. “You either get the record or you don’t.” This software aims to change that. [MIT Technology Review] See also: [You’ve Been Doing It Wrong. Privacy Is Part of User Experience ]

CA – Hospital Suicide Prompts Review of Secrecy in ‘Quality of Care’ Law

Critics say the Quality of Care Information Protection Act — intended to allow for honest review of medical errors — has morphed into a shield for health-care providers. The Ontario Minister of Health launched a review of controversial legislation that keeps internal hospital investigations secret. The review comes after Star stories revealed the suicide of a 20-year-old while under a Brampton hospital’s psychiatric care and the family’s struggle for answers. The review will look at how the Act has been used in the past and “any shortcomings.” The sweeping piece of legislation, brought in in 2004, was meant to allow health professionals to speak freely about medical error without fear and to protect patient privacy. But critics of the Quality of Care Information Protection Act (QCIPA), including NDP health critic France Gelinas, say it has morphed into a shield for health care providers at the expense of the public’s trust. The Freedom of Information and Protection of Privacy Act does not apply to QCIPA. and unless otherwise specified QCIPA trumps all other Acts. That means the public won’t know how an incident happened — or the steps being taken to prevent it from happening again. [Toronto Star] see also [Toronto: Hospital class action informed by intrusion upon seclusion case] and [Temorshah Hafizi v. Her Majesty the Queeen – Court File No. 12-1063 – Ontario Superior Court of Justice]

Horror Stories

US – One Class-Action Gets Tossed While Others Forge Ahead

An Illinois state court has thrown out a putative class-action lawsuit over a data breach at Advocate Health and Hospitals Corp., finding “the plaintiffs needed to prove that their data had actually been misused in order to sustain their claims.” In California, however, a federal judge gave preliminary backing to a class-action settlement that would give $15 million in games, online currency and ID theft reimbursement to PlayStation Network users affected by a 2011 data breach, and a long-standing dispute over Carrier IQ’s alleged violation of consumers’ privacy has been sent to mediation. Meanwhile, the California Department of Managed Health Care is apologizing for an incident where 18,000 doctors’ Social Security numbers were released and San Diego Children’s Hospital Mistakenly Shares Medical Data and [Gaelen Patrick Condon et al. v Her Majesty the Queen – 2014 FC 250 – Federal Court of Canada] [Law 360]

US – AG Fines Country Store $3,000 for Failing to Notify Security Breach

In a move that shows even small businesses are not free from privacy obligations, the Vermont attorney general (AG) has levied a $3,000 civil penalty on a country store for failing to notify its Internet customers of a security breach. Late last year, the Shelburne Country Store’s website was hacked and credit card information was stolen. The company fixed the problem but did not notify consumers until it was contacted by the AG. “At this stage of the game, having seen widely reported data breaches at big retailers like Target and dozens of others, we will not accept the excuse that a business did not know of its obligations to report a breach,” said Vermont AG William Sorrell. [Vermont Biz] See also: [US Blue Shield discloses 18,000 doctors’ Social Security numbers] and [OPC Canada – Ten Tips for Reducing the Likelihood of a Privacy Breach]

US – Luxury Hotel, School District Hit by Breaches

The Houstonian Hotel, Club & Spa has announced at least 10,000 customers’ credit card details were exposed in a breach that lasted approximately six months. The “malicious software attack” commenced on December 28, 2013, and continued until June 20, the report states. “We undertook immediate action to fully secure our customers’ data,” a news release issued Tuesday said. “As of June 20, we had fully replaced and overhauled the breached systems, further restricted access to all our servers and hired a data forensics firm to help us enhance our digital security.” Meanwhile, a Kansas City-based school district is investigating an incident that involved current and former students’ and employees’ personal data—including Social Security numbers—being leaked online. [Houston Chronicle]

Identity Issues

WW – When a Password-Is-Dead Scheme Goes Terribly Wrong

Recently, The Wall Street Journal’s Christopher Mims, to prove a point that two-factor authentication makes relying simply on passwords a thing of the past, publicly posted his Twitter password. However, the experiment went terribly wrong. In response, “a whole bunch of people tried to log in to his Twitter account,” prompting Twitter to send Mims a text message. Mims said at one point he was receiving two text messages per minute. He then tried to switch to a “Twitter for iPhone” app, which essentially revealed Mims’ phone number to those who clicked the verification code link. “The good thing to come out of exercises like these,” Hill writes, “is getting companies to protect stupid users from themselves.” [Forbes] See also: [How to Teach Humans to Remember Really Complex Passwords] and [Datatilsynet, Denmark – Guidance on Multifactor IT Security and Logins]

US – NY De Blasio Signs City ID Bill, Cards Will Be Free for One Year

New York Mayor Bill de Blasio signed into law a bill that would create a citywide identification card program. The cards will be free for the first year of the program. New Yorkers will be able to apply at locations in the five boroughs. The program is specifically designed to provide identification cards to the city’s nearly 500,000 undocumented immigrants so that they can sign apartment leases, open bank accounts, and visit their children at public schools, among other things. “This card important is for all New Yorkers,” de Blasio said. “But, for all those who don’t have ID, it’s going to be crucial.” Now the administration’s goal is to implement the program. The New York Civil Liberties Union issued a statement opposing the legislation, saying that it could expose the immigrants who apply for cards to prosecution and deportation by federal authorities. De Blasio said that the information will not be shared with any agencies and that applicants will not be asked about their immigration status.[Epoch Times]

CA – No Sin to Give Your SIN: Statscan Looks to Shore Up Census With Number

Statistics Canada is asking people to provide their SIN during test runs for the 2016 census, part of an effort to make the survey data more reliable. The agency is trying to find out if people will reveal a key identifier they’ve been so often warned to protect. The Conservative government eliminated the mandatory long-form census in 2011, saying it was too intrusive. It was replaced with a controversial voluntary National Household Survey. When the data from the survey was released last year, information on thousands of smaller communities was withheld because of low response rates. And because some people didn’t want to fill out the voluntary form or parts of it, collected data on income levels has been criticized as flawed. The agency is now asking a broad sample of those who fill out the tests of the mandatory, short-form census to include their SIN. The number will help tap into specific information from tax returns held by the Canada Revenue Agency, the type of solid data that could backstop the census. Previous questionnaires have asked people for permission to seek information from the revenue agency, but a SIN is a much more accurate link to income tax files than a name and date of birth. In 2006, the mandatory long census had a response rate of 93.5%. The 2011 NHS received a response rate of 68.6%, with higher reluctance among some groups, such as aboriginals. [The Canadian Press]

Internet / WWW

WW – TRUSTe Event Explores Intersection of Tech and Privacy

Data privacy management firm TRUSTe followed up on its work with the Future of Privacy Forum (FPF) to create a smart grid privacy seal by creating a day-long Internet of Things Privacy Summit, which concluded yesterday in Silicon Valley. The event had 26 speakers exploring the future of connected technology and its implications. Finally, the event finished with a debate on whether privacy “is even possible” in the Internet of Things era. The full event is archived and available for viewing. Following the event, TRUSTe announced an Internet of Things Privacy Tech Working Group, which includes the FPF, along with the Online Trust Alliance, the Center for Democracy & Technology and others. The group will begin meeting in the next three months and will report out findings at the next Internet of Things Privacy Summit in June of 2015. [Webcast]

US – NIST Cloud Computing: Forensic Science Challenges – NISTIR 8006

Challenges regarding cloud computing forensic science include the following – architecture (proliferation of systems, locations and endpoints that can store data), data collection (accessing the data of one tenant without breaching the confidentiality of other tenants), analysis (correlation of forensic artifacts across and within cloud providers), legal (identifying and addressing issues of jurisdictions for legal access to data), incident first responders (confidence, competence, and trustworthiness of the cloud providers to perform proper data collection), standards (minimum/basic standard operating procedures, practices, and tools), and training (misuse of digital forensic training materials that are not applicable to cloud forensics). [Source]

Law Enforcement

CA – Calgary Police, Bylaw Enforcement to Track Licence Plates for Parking Data

Each day for the past four years, Calgary parking enforcement officers drive the city’s streets in cars equipped with cameras designed to scan licence plates and identify parking scofflaws. Even if no violation has been committed, the city still holds on to data showing the time and location the vehicle was spotted, as well as a photo of the vehicle. As use of licence-plate scanning technology grows in Canada among bylaw enforcement agencies and police departments there is no consistency as to how long such data is retained or who it’s shared with. While some agencies scrub their systems of so-called “non-hit” data daily, others hold on to that data for several years or indefinitely. Some agencies share the data they collect with police investigators, while others require a warrant. Privacy advocates are worried. The technology is becoming a “mass surveillance” tool and demands better oversight, said Christopher Parsons, a post-doctoral fellow at the University of Toronto’s Citizen Lab specializing in technology and privacy issues. “It doesn’t matter that there are positive intentions behind this. It’s a surveillance system,” he said. The Calgary Parking Authority is now conducting a privacy impact assessment of its ParkPlus System, spokeswoman Shelley Trigg said. [Canadacom] See also: [NC man puts up massive tarp to block neighbor’s surveillance camera]

US – Hot-Car Death Highlights Key Role of Digital Evidence

One of the few details to come out of the murder case against suburban Atlanta dad Justin Ross Harris — whose son was found dead after being strapped into a hot car for hours — is that he searched for information about such deaths shortly before the incident occurred. According to police, Harris used his work computer to search for information about “child deaths inside vehicles and what temperature it needs to be for that to occur.” While Harris’ family appears to be standing by him and he’s been convicted of no wrongdoing, the revelation is the latest reminder that what you do and say online can become public in unpredictable and sometimes undesirable ways: Fifteen or 20 years ago, the notion of taking criminal evidence from a personal computer was as novel as the technology itself. Today, it seems commonplace and all over the headlines. [CNN]

Location

BR – City Partners with Traffic Apps in Data Deal

As commuters increasingly use apps that incentivize data-sharing in exchange for updates on traffic jams, one government is finding similar opportunities using the same services. Waze and Moovit collect data from drivers and pedestrians, respectively, feeding back information on the most efficient ways to get around. Rio de Janeiro’s Department of Transport has partnered with Waze to help it eye traffic and hazards—via the GPS datapoints fed once-per-second from users’ cellphones—in exchange for real-time data from the city on highways and from cameras. While Waze can indicate how fast drivers are moving, spokesperson Julie Mossler says the passively tracked data “is not something we share.” [Forbes] See also: [German Federal Data Protection Commissioner – Guidance on Data Protection Requirements for App Developers and App Vendors]

CN – Apple Tells China It Does Not Track User Location

In response to a China Central Television (CCTV) report, Apple said it does not track the location of Chinese iPhone users. Apple said it “does not obtain or know a user’s frequent locations … Apple does not have access to frequent locations or the location cache on any user’s iPhone at any time.” CCTV had alleged the tracking could reveal “state secrets,” arguing, “Even if this feature is turned off, the information will still be recorded.” Apple said it appreciated CCTV’s “effort to help educate consumers,” adding, “We want to make sure all of our customers in China are clear about what we do and we don’t do when it comes to privacy and your personal data.” [International Business Times] See also: [BC: CCTV used to spy on tenants was ‘illegal’]

Offshore

NZ – Proposed Data Breach Fines a ‘Drop in the Ocean’

The New Zealand government is expected to introduce a rewrite of privacy laws into Parliament next year, but one security expert says the proposals are imprecise and don’t go far enough. “We are following the world rather than leading,” he says, noting data breach disclosure has been debated in New Zealand since at least 2002. However, Benson describes proposed penalties such as a $10,000 fine for not notifying the Privacy Commissioner of a breach, as a “slap on the wrist”. “Liability or decent fines are needed for people who fail to disclose,” he said. Further, a lot of the provisions remain undefined and may only be defined in case law after a new Privacy Act is passed. The meaning of terms such as “serious cases”, “enforcing compliance” and “reasonable care” remain unclear. [ZD Net] See also: [NZ Privacy Act: ‘Need to know or nice to have’ Guidelines Released]

AU – Drones Face Privacy Regulation Under Oz Government Plan

A parliamentary report into regulation surrounding the use of drones has recommended that Australia consider creating a tort of privacy invasion – something ruled out by the country’s attorney-general George Brandis as recently as April. In an example of the strange bedfellows politics can make, privacy activists and farming lobbies agree – for, perhaps, different reasons – that unfettered flying of drones poses privacy risks, and the government-dominated but bipartisan committee agrees. The government-dominated “Standing Committee on Social Policy and Legal Affairs” has published a report entitled Eyes in the sky, which notes that privacy and surveillance laws around Australia are “a complex web”. For example, the report notes that surveillance using listening devices is tightly regulated, but police can use drones for surveillance “without a warrant so long as they do not enter onto premises without permission, or interfere with any vehicle or thing without permission.” Hence the report’s recommendation that “the Australian Government consider introducing legislation by July 2015 which provides protection against privacy-invasive technologies (including remotely piloted aircraft), with particular emphasis on protecting against intrusions on a person’s seclusion or private affairs”. Such protection, the committee recommends, should include a tort of privacy invasion with “effective” opportunities for complainants to seek remedies. The recommendation has bipartisan support. [The Register] and [Eyes in the sky: Vanishing privacy] and [Hong Kong’s ‘hands off’ regulations prompt growth in drone flying by amateurs]

Online Privacy

US – Judge Approves Disclosure of Anonymous Commenters

A federal judge has authorized a subpoena to Craigslist and Amazon compelling the companies to disclose the personal details of anonymous commenters who allegedly posted negative reviews of nutritional supplement manufacturer Ubervita and its products. Judge Marsha Pechman said the subpoenas would be “intended to learn the John Doe defendants’ identities including names, addresses, telephone numbers, e-mail addresses, IP addresses, web hosts, credit card information, bank account information and any other identifying information.” [Hot Hardware] See also: [Is There Value in the Right To Be Anonymous Commenters?] and [WSJ – Clarke: In the Future, Only the Rich Will Have Privacy]

US – EPIC Files Complaint with FTC Over Facebook Study

The Electronic Privacy Information Center (EPIC) has filed a formal complaint with the FTC claiming Facebook deceived users when it conducted its emotion contagion study without user consent. “At the time of the experiment, Facebook did not state in the Data Use Policy that user data would be used for research purposes. Facebook also failed to inform users that their personal information would be shared with researchers,” the EPIC’s complaint states. Center for Digital Democracy Executive Director Jeff Chester said his organization will also speak with the FTC on this matter. Facebook Chief Operating Officer Sheryl Sandberg apologized for the study, saying it was “poorly communicated.” [USA Today]

WW – Facebook Study Demonstrates Need for Ethical Decision-Making

Opinions regarding the Facebook study on emotional response continue to reverberate in the privacy world. In a post for Re/code, Future of Privacy Forum Executive Director Jules Polonetsky and IAPP VP of Research and Education Omer Tene note “big data analysis raises issues that transcend privacy and implicate broader policy concerns around discrimination, filter bubbles, access to data and the ethics of scientific research,” adding, “Establishing a process for ethical decision-making is key to ensuring that the benefits of data exceed their costs.” In a separate post, Ed Felten writes, “experiments that manipulate user experience impact users’ privacy, and that privacy impact needs to be taken into account in evaluating the ethics of such experiments and in determining when users should be informed.” [Source]

US – Parents: Facebook Settlement Would Allow “Illegal Conduct”

Parents’ are reacting to Facebook’s $20 million settlement of a class-action filed over its “sponsored stories” program. The settlement “gives the company a free pass to violate laws in seven states that bar the use of a minor’s likeness without parental consent, the parents of several underage Facebook users told the Ninth Circuit,” the report states. They have filed a brief asking the Appeals Court to vacate the settlement, alleging it allows “clearly illegal conduct,” the report states. [Law360] See also: [Class-Action Alleges Retailer Routinely Violates Song-Beverly] See also: [Who benefits from online privacy policies?]

Other Jurisdictions

JP – Nation Set to Pass Cybersecurity Legislation

Deep and longstanding cybersecurity issues face Japan and how the nation is set to pass legislation that would bolster its cybersecurity. Recent cyber-attacks on Yahoo Japan, the country’s space agency, its largest defense contractor and Bitcoin operator Mt. Gox, as well as the highly publicized breach of Sony Playstation in 2011, have all threatened the world’s third largest economy. One information technology expert said, “The biggest problem—and the biggest ally of cyber-attackers aiming at Japan—is the widespread belief that ‘it can’t happen here,’” while also noting that cybersecurity awareness in Japan is still “very low.” [Businessweek]

RU – New Law Will Keep Personal Data Inside National Borders

The Russian State Duma has passed legislation that will require the personal data of Russian citizens to be stored inside the country. Any online service used by Russian citizens must have physical servers inside the country and such non-Russian businesses would be prohibited from sending personal information outside the border unless certain data protection guarantees are made. Those not in compliance would have their services restricted by the Russian state telecommunications agency. The proposed law is slated to take effect in September 2016, the report states, noting the law “could mean a fundamental change to how both international and Russian tech companies use international hosting services, not to mention huge costs for implementing the changes.” [TechCrunch]

Privacy (US)

US – NSA Won’t Release Snowden E-mails, Says Would Breach His Privacy

In response to a Freedom of Information Act (FOIA) request, the NSA has said it cannot release internal e-mails sent from whistleblower Edward Snowden because it would violate his personal privacy, according to U.S. News & World Report. Former Reuters Social Media Editor Matthew Keys filed the request seeking the e-mails sent from ejsnowd@nsa.ic.gov in the first five months of 2013. Snowden has said a number of times that he had raised concerns about the NSA’s surveillance programs internally while working as a contractor for the agency. The NSA had denied a broader FOIA request in June 2013. [U.S.News]

US – PCLOB Says No Illegitimate Activity in NSA Overseas Program

In a pre-released report on Section 702 of the Foreign Intelligence Surveillance Act, the Privacy and Civil Liberties Oversight Board (PCLOB) found no illegal activity but cautioned that parts of the program—including the collection of U.S. citizens’ communications—raise privacy concerns. Several civil rights and privacy advocacy groups said the report fell short of expectations. The Electronic Frontier Foundation said the recommendations were “anemic” and will do little to curb surveillance. New America Foundation’s Kevin Bankston tweeted, “If the last PCLOB report was a bombshell, this one is a dud.” [Computerworld]

US – Men File Suit Against 9/11 Threat Database

Five California men have started a legal battle against the government’s national database, built after Sept. 11 to store reports of suspicious activity in the hunt for terrorists. The suit, filed by the ACLU and Asian Americans Advancing Justice-Asian Law Caucus, challenges the database, alleging it’s “too easy for people engaged in innocuous activities to be put into the database and scrutinized as if they were a threat,” the report states. The plaintiffs include two photographers confronted by security guards at a national gas tank; an Egyptian-American who tried to buy multiple computers at a Best Buy, and a Muslim convert looking at a flight simulator game on the Internet. [The New York Times]

US – Group Releases Data Privacy Toolkits for School Districts

School technology officials’ membership organization Consortium for School Networking has released two new privacy-related toolkits, “Ten Steps Every District Should Take Today“ and “Security Questions to Ask of An Online Service Provider,” for school districts attempting to protect student information. “School leaders often need to access information immediately and with minimal hassle. These standalone resources will help district leaders quickly obtain the information and guidance necessary to ensure student privacy,” said Consortium for School Networking CEO Keith Krueger. [Education Week] [US Group Releases New Resources For Districts Grappling With Data Privacy] See also: [US: Officials say data could help identify at-risk children]

US – New York State Education Department Issues Parents’ Bill Of Rights For Data Privacy and Security

A New York law requires that a “Parent’s Bill of Rights for Data Privacy and Security” be published on the website of each state educational agency and be included with every contract that agency enters into with a third party contractor (“contractor”) that receives student data or certain protected teacher/principal performance data that is designated as confidential under the law. The Bill of Rights permits parents the rights of access and correction of their student’s personally identifiable information (“PII), and consent prior to disclosure of the PII from education records (unless FERPA permits disclosure without consent); in the event of a contractor data breach, the contractor must notify the agency, which must notify the parent. [Bill of Rights]

US – UC Berkeley Creates Campus Privacy Officer Post

As part of an initiative to bolster campus cybersecurity and information autonomy, the University of California-Berkeley has created a campus privacy officer position and is now looking for applicants. Interim Chief Information Security Officer Paul Rivers said, “I do absolutely see this position as critical to the mission of the campus … The proper balance between privacy and competing interests (such as information security) must be explicitly and transparently addressed in order to safeguard academic freedom.” [Daily Californian]

US – HHS Names New Office for Civil Rights Director

U.S. Health and Human Services (HHS) Secretary Sylvia Mathews Burwell has named Jocelyn Samuels as the new director of the agency’s enforcement wing. Samuels has previously served as acting assistant attorney general for the Civil Rights Division within the Department of Justice. She succeeds Leon Rodriguez at the Office for Civil Rights (OCR). Christina Heide, who is a senior advisor for health information privacy at the OCR, is also serving as acting deputy director for health information privacy. Susan McAndrew left the role in May. [Health Data Management]

US – FTC Approves iKeepSafe COPPA Safe Harbor Oversight Program

The FTC approved the iKeepSafe Children’s Online Privacy Protection Rule safe harbor program which includes an effective, mandatory mechanism for the independent assessment of the safe harbor program participants’; compliance with the guidelines; website operators that use a safe harbor program are subject to the program’s disciplinary procedures in lieu of formal FTC investigation and enforcement. [Press Release] [Approval Letter]

Privacy Enhancing Technologies (PETs)

WW – Companies Continue Rolling Out Privacy-Enhancing Tech

Technology designed to protect the online privacy of users from third parties or governments continues to make its way into the marketplace. Motherpipe recently announced it has launched privacy search extensions for the Chrome browser in the U.S., UK, India, Germany and Sweden. Motherpipe’s CEO said the service “offers users a choice when they are searching for things that they simply don’t want Google to share with anyone.” In a separate rollout, Rællic allows users to communicate securely. With three modes—”Normal,” “Paranoid” and “Tin Foil Hat”—Rællic’s director of systems said it “is the only software in the public sphere that offers such intensive but easy-to-use data protection to consumers and enterprises worried about interface with their communications.” [PRWeb] See also: [With privacy concerns rising in retail, Prism Skylabs says video analytics are the future]

WW – CitizenMe Aims To Embrace User Privacy and Ad Ecosystem

CitizenMe is an an app designed to inform users what online services deduce about their personalities and with future intentions to encourage users to sell that data to advertisers. Instead of reinventing the current Internet ad model, Meyer writes, the app aims to improve it. CitizenMe has been working with the Psychometrics Centre at the University of Cambridge to tap into web services to help determine how users are scored. “The first step is to provide visibility and control of data, so you can go into your settings and have some control. If you want to, you can share that data … you can exchange data for a reward,” the company’s founder said, adding, “We then provide a marketplace and exchange where we exchange on your behalf.” [GigaOM]

WW – Will IceBrowser Put Privacy Fears on Ice?

Amidst ongoing concern about government surveillance, a California company is turning to Iceland to offer its users “a new layer of security.” “The new IceBrowser service, which costs $30 a year for early users, browses the Internet through their computers routing through Iceland, using a method which blocks outside tracking and cookies as well as viruses,” the report says. Jeff Bermant, founder of California-based Cocoon, said of Internet privacy, “Certainly the United States is not considered a safe country … If they are using Internet services based in the U.S. they don’t actually have privacy.” [Forbes] [Startup Sees Iceland As Best Route To Chill Privacy Fears] See also: [The Revolution Will Not Be Monetized]

WW – Invisible IM Project Aims to Leave No Forensic Trail

The Invisible IM project aims to develop a means for people to communicate “without leaving a retrospectively recoverable forensic trail behind on third-party servers.” The technology establishes a local XMPP server on a user’s computer, which then connects to the Tor network. A secure mode will be available that will prevent anyone from knowing who is on someone else’s buddy list or even if they have ever communicated through Invisible IM. The project is being designed to provide anonymity for whistleblowers. [The Register] [ComputerWorld]

Security

WW – Survey: IT Pros’ Main Worry Is Wondering Where Sensitive Data Lives

A new global survey of more than 1,500 IT and IT-security professionals looks at how organizations understand and respond to data security threats today, Informatica Corporation states in a press release on a new Ponemon Institute study . The study found that the location of sensitive or private data is “the foremost concern of today’s IT-security professionals”—even above hacker attacks. The survey also found that organizations are “in the dark regarding sensitive data, with only 16% knowing where all their sensitive structured data resides,” the report states. Other concerns include migration to new mobile platforms, worker or contractor mistakes and outsourcer management of data. [Source]

US – Rise in Electronic Payments Sharpens Security Focus

Companies have decided they won’t wait “for Congress to ensure that the billions of dollars in electronic payments flowing through data networks each year are defended from hackers,” detailing efforts by businesses to combat data breaches. For example, the New York Office of the Attorney General has said security breaches in that state have become more serious and more common, and they cost businesses upwards of $1.37 billion last year. “With action in Congress unlikely to happen soon, the nation’s largest retailers and financial groups are taking it upon themselves to increase safeguards for consumer information. With their reputations and business on the line, both industries are determined to make progress.” [The Hill]

WW – Hackers Targeting Small Businesses

Small businesses face increased risk of a data breach or cyber-attack. One Georgia business owner, Brad Spiegel, owner of Quality Computer Systems, said, “Big businesses are going to have bigger, badder routers and bigger, badder equipment that is going to protect them. So the criminals are going to go after the low-hanging fruit.” A National Small Business Association survey revealed 44 percent of respondents had been victims of at least one attack. Meanwhile, eBay, which recently sustained a data breach, is expected to announce its earnings report later this week. In other reports, a judge has granted preliminary approval of a data breach settlement with Schnucks, with a potential payout ranging between $300,000 to $500,000, and the University of Illinois Chicago is warning former students of a possible data breach.

US – Hackers Targeted U.S. Gov’t Employees

Officials have confirmed that Chinese hackers infiltrated the computer networks of the U.S. Office of Personnel Management and appear to have been seeking information on federal employees who have applied for top security clearance. An official from the personnel agency said neither it nor the Department of Homeland Security had “identified any loss of personally identifiable information,” and an emergency response team has been assigned. Though the attack has been traced to China, it is not yet clear whether it is tied to the Chinese government. This incident comes on the heels of an attack on the Justice Department resulting in the indictment of a group of hackers from the Chinese military for stealing corporate secrets. [The New York Times] See also: [Cyber Crime and Security Survey Report 2013 – Australian Government]

WW – The Internet of Things: Smart Lightbulb Exposes Wi-Fi Password

In a proof-of-concept attack, Internet connected LED lightbulbs were used to gain access to the Wi-Fi network that controls them. LIFX smart lightbulbs can be controlled with iOS and Android devices. LIFX was made aware of the problem and has issued a firmware update to address it. The attackers were able to trick the devices into revealing the network password; they had to be within 30 meters of the devices they were targeting. [CNET] [The Register] [Ars Technica]

US – Grid Security Concerns

Some experts are saying that the addition of wind farms, solar panels, and smart meters to the power grid add points at which attackers could infiltrate and attack the country’s energy grid. There have been documented attacks on the power grid that damaged equipment, disrupted service, and required long term repairs. An Ernst & Young survey of 61 power and utility companies found that one-third report spending at least US $3 million a year on information security, which includes protecting systems from cyber attacks. [Bloomberg] SEE ALSO: [College Bescherming Persoonsgegevens, Netherlands – Privacy Checklist for Smart Meters]

US – Hotels Urged to Check Business Center Computers for Malware

An advisory from the US Secret Service and the National Cybersecurity and Communications Integration Center warns organizations in the country’s hospitality sector that computers available for hotel guests’ use in their hotels are likely being infected with keystroke loggers. The advisory was issued after suspects who had managed to compromise public use computers in hotels were arrested in Texas. The advisory urges hotels to check the computers in their business centers. [KrebsonSecurity] [ZDNet]

WW – Most Critical Infrastructure Executives Say Security is Not a Priority

According to a study that compiles responses from nearly 600 IT and IT security executives around the world, two-thirds of those responding said that their infrastructure had been compromised in the preceding 12 months, but just over a quarter said that security is a top priority. Nearly 60% acknowledged that the threat to ICS and SCADA networks is increasing, but just 5% have a dedicated ICS and SCADA security department. 55% percent of those responding said that there is just one person at their organization responsible for the security of those systems, and a quarter have no dedicated personnel at all. The report was conducted by the Ponemon Institute and sponsored by Unisys. [SC Magazine] [Unisys]

Surveillance

US – NSA Retains Data Belonging to Non-Suspects

The Washington Post conducted analysis on 160,000 intercepted conversations intercepted by the NSA and found that the majority of the people whose personal information was stored by the NSA (according to information provided by Snowden) were not suspects in investigations. The information includes highly personal messages, medical records, school transcripts, baby pictures, and resumes. The analysis of the data supports the contention that the NSA is not taking steps to exclude personal information of US citizens, as required by US law. An NSA spokesperson acknowledged that the agency “incidentally intercept[s] the communications of persons in contact with valid foreign intelligence targets,” and maintains that the NSA takes precautions to protect the privacy of the data it collects. [Washington Post] [ArsTechnica] [ComputerWorld] [CNN.com] Former NSA legal counsel Stewart Baker writes that the statistics in the report are doubtful. A separate report suggests those who use privacy-enhancing tools online are more likely to be targeted by the NSA, and The Hill reports that it is “crunch time” for reforming government surveillance. [Source] [Americans’ baby photos and resumes among NSA spy haul]

US – Analysis of Leaked XKeyscore Source Code Shows NSA Targets Tor Users

Analysis of source code in a program used by the NSA to snoop on Internet communications suggests that people outside the US who use online privacy and anonymization services are likely to have had their IP addressed collected. The source code is for a program called XKeyscore. The analysis indicates that people who search for tools like Tor will get labeled as extremists. XKeyscore also conducts deep packet inspection on messages sent through Tor. The code was analyzed by German public broadcaster ARD, which did not say how the code was obtained. [ArsTechnica] [WIRED] [CNET]

WW – A New Device Lets You Track Your Preschooler … And Listen In

LG Electronics have relased the KizON wearable tracking wristband. The technology uses WiFi and GPS to provide real-time location tracking in addition to a “One Step Direct Call” feature designed to allow the child and parent to communicate directly. Such technology, the report states, raises the question of whether minors have a right to privacy. In 2008, one lawyer wrote, “Children do have privacy rights, just like adults, although even the most important constitutional rights of children may be limited because of their minority status.” Iowa State University Prof. Reynol Junco said, “I think they’re entitled to some privacy, but not much. We are parents, after all.” [NPR]

CA – Too Many Hidden Cameras: Yukon Privacy Commissioner

Yukon’s Information and Privacy Commissioner is cautioning government against the overuse of video surveillance. Diane McLeod-McKay says there are far too many hidden cameras in Whitehorse. “My concern is that video is being overused and sometimes the reason for its use is not being balanced against the privacy risks,” adding that ‘Cost-effectiveness is no justification to infringe on privacy rights.’ McLeod-McKay says video surveillance is one of the most invasive tools available, and should only be used as a last resort. After discussions with various departments, McLeod McKay has published a guide targeting government and other public bodies on the use of hidden cameras. [CBC News]

US – FAA Drafting Commercial Drone Use Rules

Federal Aviation Administration (FAA) plan to permit small drones to be used for commercial purposes. Media sources, energy companies, farmers and other groups have been pressuring the FAA to lift its ban on flying commercial drones, and an FAA spokesman said the agency is drafting rules for small drones now that will be “issued for comment late this year.” But finalizing such rules could take several years because multiple agencies would be involved, including the Pentagon and the Department of Homeland Security. [Reuters]

Telecom / TV

UK – ISPs File Complaint Against GCHQ Over Alleged Spying

Seven Internet service providers have filed a complaint against GCHQ regarding allegations that the British intelligence agency broke into their networks to conduct surveillance. The complaint filed with the Investigatory Powers Tribunal calls for GCHQ to stop targeting system administrators to gain access to networks. The complaint was prompted by reports that GCHQ had targeted employees of Belgacom to gain access to the telecommunications company’s network. They were allegedly targeted not because they posed any sort of security threat, but because they were administrators for a network that intelligence wanted to infiltrate. [WIRED]

WW – Naked Selfies Extracted From ‘Factory Reset’ Phones

Thousands of pictures including “naked selfies” have been extracted from factory-wiped phones by a Czech Republic-based security firm. The firm, called Avast, used publicly available forensic security tools to extract the images from second-hand phones bought on eBay. Other data extracted included emails, text messages and Google searches. Experts have warned that the only way to completely delete data is to “destroy your phone”. Most smartphones come with a “factory reset” option, which is designed to wipe and reset the device, returning it to its original system state. However, Avast has discovered that some older smartphones only erase the indexing of the data and not the data itself, which means pictures, emails and text messages can be recovered relatively easily by using standard forensic tools that anyone can buy and download. The company claims that of 40,000 stored photos extracted from 20 phones purchased from eBay, more than 750 were of women in various stages of undress, along with 250 selfies of “what appears to be the previous owner’s manhood”. There was an additional 1,500 family photos of children, 1,000 Google searches, 750 emails and text messages and 250 contact names and email addresses. The company said: “Deleting files from your Android phone before selling it or giving it away is not enough. You need to overwrite your files, making them irretrievable.” [BBC News] [Android’s phone wiping fails to delete personal data]

US Government Programs

US – Placing Faces and Naming Names in New NSA Leak

The latest leaks from Edward Snowden identify five specific Muslim-Americans targeted by the NSA and the FBI and prompting a number of privacy advocates to call for reforms to the Foreign Intelligence Surveillance Act (FISA). The five “targets,” named by reporter Glenn Greenwald and Murtaza Hussain, were part of an NSA spreadsheet “in the Snowden archives called ‘FISA recap.’” The 7,485 e-mails on the list were monitored between 2002 and 2008. Wired interviewed Greenwald about the leak and why it matters. ProPublica reports that users who downloaded the Tor browser in 2011 were also targeted by the NSA. [The Intercept]

US Legislation

US – Senate Committee Approves CISA Despite Privacy Fears

In a 12-3 vote, the US Senate Intelligence Committee has approved the Cybersecurity Information Sharing Act (CISA). The bill aims to improve data sharing between the government and private sector to help protect systems from attacks. The bill provides liability protection for private companies that monitor their own networks and that share information. Following its introduction last month, the bill was heavily criticized by privacy advocates who took issue with CISA’s broad definitions, lack of Department of Homeland Security oversight and inadequate minimization techniques to protect U.S. citizens’ privacy. Compounding the concerns are the Snowden revelations, indicating the government’s willingness to circumvent law in the name of surveillance. Despite such concerns, the committee approved the bill by a vote of 12 to three. [Tech Crunch] [Forbes] [ComputerWorld] [Analysis of Feinstein-Chambliss Cybersecurity Information Sharing Act of 2014 Discussion Draft – Center for Democracy & Technology] and [Letter to the United States Senate Regarding the Cybersecurity Information Sharing Act of 2014 – American Civil Liberties Untion, et al.]

US – SB 806 – Educational Longitudinal Data System Changes – North Carolina

Senate Bill 806, Educational Longitudinal Data System Changes, if passed, would require the state board of education to create an inventory of the individual student data proposed to be accessible in the North Carolina Longitudinal Data System and required to be reported by state and federal education mandates; direct access to data will be restricted to authorized staff of the Board, only de-identified data may used in the analysis, research, and reporting conducted by the system, and individual or personally identifiable data accessed through the system may not be a public record. [Bill 806]

US – Florida Info Protection Act of 2014 in Effect; Regulator Notification Required

Effective July 1, 2014, Florida has repealed its existing data breach law in favor of a new, more stringent, law. Florida has joined the list of states requiring notice to regulators: specifically, an entity must notify the Department of Legal Affairs of any breach affecting 500 or more Florida residents as soon as possible, but no later than 30 days after determining that a breach has occurred or having reason to believe that a breach has occurred. The new law also specifies the content of that notification (e.g., description of the breach, number of Florida residents affected, services offered to individuals, copy of the notice to be provided to the individual, and contact person to field questions regarding the breach). Florida also has expanded the definition of personal information. Under the prior law, Florida had defined personal information to include name plus a social security number, a driver’s license (or other government identification number), or certain financial account information. The new Florida law also includes the following in the definition of personal information: (1) name plus an individual’s health insurance policy number or subscriber identification number and any unique identifier used by a health insurer to identify an individual; and (2) user name or email address, plus a password or answer to security question that would enable access to an online account. [lexology]

US – Voters to Decide Privacy Measure Aug. 5

A ballot measure protecting Missourians’ privacy that went through the Missouri Senate with overwhelming support (31-1) and also passed the Missouri House by a vote of 114-28 will be put before the voters Aug. 5. SJR 27, the legislation passed in order to get the proposed constitutional amendment on the ballot, was sponsored in the Senate by Sen. Robert Schaaf (R-St. Joseph) and handled in the House by Rep. Paul Curtman (R-Pacific). Curtman said this is a bill he thinks revolves around people’s “reasonable expectations to privacy” guaranteed in both the U.S. Constitution and the Missouri Constitution. He said writers of these documents had never seen electronic communications or the sending of data, but the same principle of having reasonable expectations to privacy would apply. “SJR27 is a necessary addition to our state constitution,” he said. “It will ensure that modern communications (electronic and data) as well as traditional communications are protected from unwarranted search and seizure.”[Source]

Workplace Privacy

US – Customs Under Fire for Sweeping Scans of Employees’ Personal Data

A troubled division of Customs and Border Protection whose leader was recently ousted by the Obama administration is now accused of improperly scrutinizing the personal information of the agency’s 60,000 employees for evidence of potential misconduct and corruption. In one program, the agency’s internal affairs division shared employees’ Social Security numbers with the FBI, looking for possible criminal leads. The program is no longer operating and is under review by the Department of Homeland Security’s inspector general, according to three federal officials with knowledge of the inquiry. In another effort, the division automatically scanned the Social Security numbers of all the agency’s employees in a Treasury Department financial records database, said the officials, who spoke only on the condition of anonymity because of the sensitivity of the matter. The Treasury Department halted the daily monitoring in April over questions about whether it violated federal policies. The programs were inspired by the Obama administration’s Insider Threat initiative, a governmentwide crackdown on security threats that relies on profiling federal workers for certain behaviors. While such data-sharing efforts didn’t appear to be illegal, they might infringe on the privacy rights of federal employees.[mcclatchydc.com]

US – Survey: Employers Nervous About Workplace Privacy

A recent survey indicates workplace privacy is a growing area of concern as companies increasingly shift toward new technology policies and widespread data breaches persist. According to the Littler 2014 Executive Employer Survey of more than 500 in-house C-suite executives, avoiding workplace and data security breaches was the top concern related to workplace privacy, while safeguarding customer and corporate data without unlawfully accessing employee information was a close second. Phil Gordon of Littler Mendelson said it’s interesting that the monitoring of employees’ personal social media activity was low on the priority list despite the proliferation of state laws on the matter. [HR.BLR.com] See also: [IAPP Workplace Privacy Resources]

US – CBP Accused of Snooping on Employees

A division of U.S. Customs and Border Protection (CBP) is under review by the Department of Homeland Security’s inspector general for potentially improperly scrutinizing the personal information of the agency’s 60,000 employees. The internal affairs division shared employees’ Social Security numbers with the FBI in an effort to find potential misconduct and corruption, the report states, and in another instance, the division “scanned the Social Security numbers of all the agency’s employees in a Treasury Department financial records database.” Although the actions weren’t technically illegal, they may infringe on employees’ privacy rights, the report states. CBP’s actions are “pushing the legal envelope,” said one privacy attorney. [McClatchy]

CA – Right to Fire Civil Servant for Abusing Internet, Privacy Breach: Tribunal

A labour relations tribunal has upheld the firing of a civil servant who used his government computer to indulge his car obsession, complain about his job, store electronic music files, and attempt to cheat on staffing competitions. In a recent decision, the Public Service Labour Relations Board said the government had just cause to fire Marc Gravelle, a human resources assistant in the Department of Justice, in July 2011. Gravelle had argued that the government did not prove its case against him and that his abrupt dismissal ignored the principle of progressive discipline. Adjudicator Renaud Paquet, however, concluded that Gravelle had severed the bond of trust that must exist between the government and one of its employees. [Ottawa Citizen ]

EU – Data Protection Authority Opinion on Location Tracking in the Workplace

A Finnish employer’s tracking of an employee’s location (e.g. GPS monitoring of a vehicle) falls under the Personal Data Act, the workplace Data Protection Act 759/2004 and the Electronic Communications Privacy Act; such monitoring may be conducted only for justifiable and specific circumstances pursuant to the employment relationship, after a hearing of employees’ concerns and by using a prescribed statutory cooperation procedure (which includes written operating rules), and with detailed notice to employees, and employees must be able to turn off the tracking during non-working hours. [Source]

+++

01-15 August 2014

Biometrics

US – Facial Recognition Leads Feds to Fugitive After 14 years

A cold case comes back to life after facial recognition software recognizes an alleged US outlaw who’d been hiding out in Nepal. In 2000, after being accused of child sex abuse and kidnapping in New Mexico, Neil Stammer skipped town and went underground. Fourteen years later he was arrested in Nepal. How did the authorities catch this fugitive? Facial recognition technology. [C|Net]

Big Data

US – FTC to Consider Data Collection’s Impact on Low-Income Consumers

The FTC will host its “Big Data: A Tool for Inclusion or Exclusion” workshop in Washington, DC, on September 15. The workshop will look at the ways advancing technologies are increasingly collecting data for commercial purposes and the impact that has on consumers, including low-income and underserved individuals. Panel discussions will assess the current environment, look at what’s on the horizon, survey the legal landscape and map the path forward. [FTC Announcement and Agenda] [NYT Debate: Does Big Data Spread Inequality?]

US – Disagreement Among Tech Giants on Comprehensive Privacy Legislation

Stakeholders from industry to advocacy to regulators have submitted comments to the National Telecommunications and Information Administration (NTIA) on how the U.S. government should protect consumers in the era of big data. On one side, some urge President Barack Obama to initiate strong legislation for data collection while others say industry can self-regulate. Microsoft is calling on Congress to enact “strong, comprehensive privacy legislation,” noting that although big data “holds great promise for technology, for the economy and for the people,” such legislation “can and should be part of unlocking that promise.” On the other side, the Internet Association—which represents Google, Facebook and Yahoo, among others—advocated for “a flexible and balanced self-regulatory responsible use framework.” The NTIA has compiled a complete list of comments. [The Hill] See also: [NYT: As Data Overflows Online, Researchers Grapple With Ethics]

US – Advocates: Self-Regulation Isn’t Working; We Need a Law

A coalition of advocacy groups are reiterating the call for a privacy “bill of rights” that would limit marketers’ ability to collect or use individuals’ data. The organizations, which include the ACLU, the Center for Digital Democracy, Consumer Action, Consumer Watchdog and Common Sense Media, submitted the comments in response to the National Telecommunications and Information Administration’s request for opinions on how to balance privacy principles with the value that data collection can bring. “Industry self-regulation is not enough and has failed to inform or protect consumers,” said the groups last week. [MediaPost]

US – Berkman Releases Paper on Privacy in Longitudinal Studies

Long-term longitudinal research studies often collect highly specific and sensitive data about individuals. The benefits are in the ability to link sets of behaviors in specific people, but that is also where the danger lies: It’s difficult to keep those individuals from being identifiable from their unique traits. In the first in a series of reports based on the “Integrating Approaches to Privacy Across the Research Data Lifecycle” workshop held by the Privacy Tools for Sharing Research Data project at Harvard University last year, Harvard’s Berkman Center provides an overview of the long-term longitudinal study use case. It describes the disclosure risks as well as common legal and technical approaches for managing confidentiality and identifies “urgent problems” for privacy in the research environment. [Source]

US – Exploring the Privacy Paradox

Chris Hoofnagle explores the phenomenon known as the “privacy paradox,” where privacy concerns do not relate to people’s behavior. “The privacy paradox is a major problem for consumer advocates. It suggests that advocates are out of touch with average consumers and that government should not intervene in privacy because individuals really do not care about it,” he writes. Examining the book, Exit, Voice, and Loyalty, he suggests if the privacy paradox “is understood with the impoverished view that only exit matters, we will misinterpret individuals’ actions and policy-makers can buy into narratives that people are hypocrites who do not really care about privacy. If we consider voice, attitudes and action may not be in conflict.” [Source]

US – Commissioner Talks FIPPs, Big Data; LabMD Seeks Sanction for FTC

Federal Trade Commissioner Maureen Ohlhausen sent a letter to the National Telecommunications and Information Administration this week on the tension between privacy advocates’ push for officials to support Fair Information Practice Principles (FIPPs) limiting companies’ ability to collect, retain and use data and the potential value to be gained from maximizing the benefits of big data. While FIPPs call for companies to explain to consumers why data is being used and to gain their consent, big data can yield insights unforeseen at the time of collection. Ohlhausen called for strategies such as de-identification to bridge the gap. Meanwhile, LabMD has asked a judge to sanction the FTC for allegedly having a secretive relationship with the source of a key piece of evidence in the data breach case against the company [MediaPost]

Canada

CA – CSEC Won’t Say How Long It Keeps Canadians’ Private Data

The federal government’s secretive electronic intelligence agency is not disclosing how long it can hold onto Canadians’ communications – even though its leaders have said that “firm” time limits are in place to protect privacy. The strictures surrounding Communications Security Establishment Canada’s data-retention periods – including those affecting recognized “private communications” and also “metadata” – are blacked out from an operational document obtained by The Globe and Mail. [Source]

CA – Police Record Checks Under Scrutiny In Ontario

The disclosure of non-conviction information on police record checks costs many people educational and job opportunities in this province. But steps are being taken to ensure innocence is presumed until proven guilty. Police services across the province are evaluating what they disclose on record checks. They’re debating whether they should end the practice of noting how many times a person has had contact with police. The Ontario Association of Chiefs of Police recently revised its voluntary record check guidelines to limit the practice. Brian Beamish, the acting information and privacy commissioner for Ontario, called the recommendation a step in the right direction. But Beamish said he’d like the reporting of non-conviction information eliminated from police records altogether. “I think it points to the need to have some kind of provincial standard,” he said. “So that this is no longer a voluntary process for police services that they have a standard that they have to guide their actions by. It needs the force of law.” The Canadian Civil Liberties Association is currently in talks with the provincial government to create that legislation. Association spokesperson Abby Deshman said she wants to see all police services adopt the guidelines. [Source]

CA – Should Your Home’s Selling Price Be Public Information?

The selling prices of homes are currently the property of real estate boards. Should they be forced to share it with the public? If you’re in the market for a house and know what other houses in the area are selling for, would that help you to make an offer? This question is at the heart of the lengthy proceedings between the Competition Bureau and the Toronto Real Estate Board (TREB). The Bureau wants anyone to have access to the Multiple Listing Service (MLS) owned by real estate board. TREB says the information is private. In a Supreme Court of Canada decision given last week, the parties were basically told to keep fighting.[Source]

Consumer

US – Whitepaper Measures Whether Consumers Are “Getting the Message”

The Lares Institute has released whitepaper on whether consumers are “getting the message” about steps they can take to protect their own privacy. The FTC has suggested, for example, that individuals know who they share their information with; store and dispose of sensitive data securely; ask questions before deciding to share personal data, and maintain appropriate security on electronic devices. The paper is based on data from multiple years of surveys that asked consumers questions about their own privacy-protective behavior, such as whether they carry their Social Security cards in their wallets, shred documents that include personal information or use antivirus programs. [Source]

US – Poll: Consumers Concerned About In-Store Tracking

A new survey reveals that a majority of retail consumers are concerned in-store tracking invades their privacy. According to the PunchTab survey, brick-and-mortar retailers need to overcome consumer perceptions about whether in-store communications from tracking provide useful information. Merely 27% of respondents would allow in-store tracking for deals and relevant messaging, while 50% were not open to tracking at all, citing privacy as their biggest concern. However, providing discounted prices, coupons and shorter checkout times were found to be acceptable uses of in-store tracking. [eMarketer]

UK – Beacon Deployment Hampered by Consumer Privacy Concerns

Companies like Lord & Taylor and Hillshire Brands indicate they’re seeing positive early results from the rollout of Bluetooth technology location-tracking beacons to enhance services and boost sales. A new report by Forrester analyst Adam Silverman suggests “beacons will succeed where Wi-Fi, near-field communication and other location-focused technologies have failed,” largely because it is an opt-in location-tracking solution. But privacy remains a major barrier to the use of such technology: Forrester’s research indicates 56% of customers overall aren’t comfortable sharing their in-store location with retailers. Given an offer or discount, 41% are still uncomfortable. [MediaPost]

EU – 3rd Party Data Must Be ‘Properly Sourced, Permissioned and Cleaned’ for Use in Direct Marketing Under New Industry Code

Companies buying personal data from third parties to use in direct marketing campaigns must “satisfy themselves” that data was “properly sourced, permissioned and cleaned”, according to a new industry code developed by the Direct Marketing Association (DMA). [Out-Law] [The new DMA code (12-page / 321KB PDF)] BACKGROUND: [Reding: US authorities wrong to ask Microsoft directly to hand over customer data stored in the EU 02 Jul 2014] | [Apple and Cisco back Microsoft challenge to US data search powers 17 Jun 2014] | [US search powers extend to data stored on foreign servers, rules judge 30 Apr 2014] | [Microsoft commits to offer non-US storage of data 24 Jan 2014]

UK – Information Commish Concerned About Data Security in Legal Profession

The UK Information Commissioner’s Office (ICO) has received reports of 15 incidents in the past three months involving mishandling of client data by those in the legal profession. The ICO is warning that barristers and solicitors who do not take adequate precautions to protect their clients’ data would face fines of up to GBP 500,000 (US $840,000). [Source]

E-Government

UK – Government to Unveil New Personal Data Sharing Plans

Plans to allow personal data stored on different public sector databases to be aggregated could be unveiled by the UK government later this year. Under the plans being considered, “all bodies providing public services” could be given greater freedom to share the personal data they store to “improve outcomes in health, education or employment”, according to a report by the Daily Telegraph. According to the paper, individuals might not be asked whether they consent to the sharing of their data. The white paper to be published will also contain plans to enable greater sharing of anonymised data by public sector bodies, the Telegraph reported. [Out-Law]

WW – Twitter Says Governments Asking for More User Data than Ever

Twitter said government requests for user data grew sharply in the past six months as more countries asked for a greater amount of information about users. More than half of the requests came from the United States, as has been the case since Twitter began issuing its “transparency report” in 2012. Typically, the requests are part of criminal investigations. San Francisco-based Twitter Inc. said in a blog post Thursday that it received 2,058 requests from 54 countries in the first six months of the year, including from eight countries that had not previously submitted requests. Twitter produced at least “some information” that the governments asked for in 52% of cases worldwide and in 72% of requests coming from the U.S. [CBS News] SEE ALSO: [Twitter vows to “improve our policies” after Robin Williams’ daughter is bullied off the network]

WW – White Paper Examines Gov’t Access to Data in the U.S. and Latin America

Hogan Lovells has published Pan-American Governmental Access to Data in the Cloud, the fifth installment in a series of White Papers examining government access to data held by Cloud service providers. Examining the right of governments in the United States and Latin America to access data in the Cloud, the White Paper concludes that the physical location of Cloud servers does not significantly affect government access to data stored on those servers, and that it is fundamentally incorrect to assume that the United States government’s access to data in the Cloud is greater than that in the Latin American countries examined. [Hogan Lovells] See other papers in this series: [A Global Reality: Governmental Access to Data in the Cloud comparing government access in the United States, Australia, Canada, Denmark, France, Germany, Ireland, Japan, Spain, and the United Kingdom] | [Individual Rights to Challenge Government Access to Data in the Cloud, comparing the ability of citizens and non-citizens to challenge government access to data in the U.S., France, Germany, the UK, and Australia] | [An Analysis of Service Provider Transparency Reports on Government Requests for Data, comparing the number of government access requests to Cloud service providers who have published those numbers]; and [A Sober Look at National Security Access to Data in the Cloud, comparing the mechanisms international governments can use to access sensitive foreign intelligence information]

E-Mail

US – Justice Dept. Gets Involved in Microsoft Email Privacy Case

The next chapter in the Microsoft email privacy case has unfolded as the U.S. Department of Justice has asked a New York court to vacate a stay on an order that would compel Microsoft to turn over to the U.S. government certain emails currently being held on servers in Dublin, Ireland. Microsoft had asked for the stay to pursue an appeal, but may now have to refuse to comply with the order if the court follows the DoJ’s lead. If the company refuses the order, then the New York court is requested to issue “a contempt order that would, in turn, be a properly appealable final order, which could be stayed on consent pending appeal.” The European Commission, last week, expressed concern about the case. [PC World] See also: [Out-Law: Microsoft Launches Further Appeal Over US Ruling to Hand Over Emails Stored In the EU]

US – Judge: Path May Appeal Text-Spam Ruling

Path has been authorized to appeal a ruling in a text-spam case. Northern District of Illinois Judge Manish Shah said, “An immediate appeal may materially advance the ultimate termination of the litigation.” The 2013 lawsuit, which seeks class-action status, alleges Path sent Kevin Sterk a text message saying that his friend, a Path user, wanted to share photos with him and contained a link to a Path registration page. Sterk argues Path violated the Telephone Consumer Protection Act by sending him an automatic message. Shah said, “The course of the litigation depends on the interpretation of automatic telephone dialing system.” [MediaPost] See also: [US: Enforcing The Canada Anti-Spam Legislation (CASL) Against U.S. Companies]

US – Yahoo Must Face Email Scanning Suit; Google Beats Privacy Suit

Yahoo has been ordered by a federal judge to face a privacy class-action alleging it scanned its users’ emails for targeted advertising. U.S. District Judge Lucy H. Koh did grant the company’s request to throw out a federal wiretap allegation as well as throw out claims that Yahoo did not properly disclose it would collect and store users’ content for future use, the report states. However, Koh ruled she will permit the suit to move forward under a different wiretap claim alleging the company may have illegally shared content between Yahoo and non-Yahoo users. Meanwhile, a California federal judge has dismissed a putative class-action against Google that alleged the company violated a contract with users by giving their private data to third-party app developers. [Bloomberg]

WW – Unsubscribing from Annoying E-Mails Just Got Easier For Gmail Users

Have you ever got frustrated trying to find the “unsubscribe” link at the bottom of promotional e-mails? Google just made it a lot easier. In a change announced Wednesday in a Google+ post, Gmail users will now find the unsubscribe button at the top of those newsletters and promotional e-mails. The new feature will display the unsubscribe link right next to the sender’s e-mail address. The feature relies on the existing filtering system used in Gmail’s Inbox tabs that categorizes social, promotional, updates and forum e-mails. It will only work for e-mails that include an unsubscribe link within them. [Source] See also: [‘Google Glass on your windshield’ lets you check your phone with eyes on the road]

Electronic Records

US – California’s Ahead of the E-Health Game, But Breach Concerns Persist

California’s Cal Index system will transition one in four state residents to electronic health records by the end of the year thanks to a partnership between Blue Shield and Anthem Blue Cross. The system will be the biggest health information network anywhere in the U.S. and aims to make for faster and better healthcare. However, some opponents are concerned about the potential for data breaches while others don’t like the idea of their medical information being readily available. [Southern California Public Radio].

US – Court Rules In Favor of Providing Officials Access to Entire Email Account

A Judge in Columbia ruled that providing law enforcement with access to an entire email account in an investigation did not violate the Fourth Amendment to the U.S. Constitution that prohibits unreasonable searches and seizures of property. The order by Chief Judge Richard W. Roberts of the U.S. District Court for the District of Colombia reversed an earlier decision by Magistrate Judge John M. Facciola who refused to allow a two-step procedure whereby law enforcement is provided all emails relating to a target account, and is then allowed to examine the emails at a separate location to identify evidence. The striking down of Judge Facciola’s ruling will likely fuel the privacy debate in the country. A New York judge defended last month his order that gave the government access to all content of the Gmail account of a target in a money laundering investigation. [Source] See also: [Judge orders destruction of residential school documents after 15-year holding period]

Encryption

US – Breach Index: Encryption Used in only 4% of Q2 Incidents

Last quarter, organizations that reported data breaches only used encryption around four percent of the time to further safeguard data, a report found. [SC Magazine] See also: [US: No noise is good noise, Cary police say of plan to encrypt radio traffic]

WW – Google Rewarding HTTPS Sites with Higher Search Rankings

Google says it is giving sites that use HTTPS a slightly higher ranking in Internet searches in an effort to stimulate further adoption of the protocol. In tests, Google has found HTTPS yields positive results as a ranking signal, though for now it carries less weight than such signals as high-quality content, according to two Google webmasters. Over time, “we may decide to strengthen it, because we’d like to encourage all website owners to switch from HTTP to HTTPS to keep everyone safe on the web.” Meanwhile, Yahoo said yesterday it will join Google’s efforts to create a secure email system that could make it nearly impossible for hackers or governments to read users’ email. [ZDNet]

EU Developments

UK – Cyber Security Body Warns of IT Security Flaws, Risks Posed by Malware

Weak passwords and unpatched software is enabling hackers to use organisations’ own servers as the hosts of cyber attacks, the UK’s National Computer Emergency Response Team (CERT-UK) said. [Out-Law] [CERT-UK’s quarterly report (20-page / 1.26MB PDF)]

UK – Government to Unveil New Personal Data Sharing Plans

Plans to allow personal data stored on different public sector databases to be aggregated could be unveiled by the UK government later this year. [Out-Law] [The Telegraph’s report] UK ministers plan to “link up thousands of state databases used by schools, councils, police and civil servants, “which is expected to bring privacy concerns. The Irish Department of Public Expenditure and Reform launched a public consultation on the planned Data Sharing and Governance Bill, which deals with data sharing between public-sector agencies.

Facts & Stats

WW – Infographic for More Compelling Big Data statistics

Did you know that 90% of the world’s data was created in the last two years? And that 80% of data today is unstructured? like these in an easy to consume graphic deliverable. [GCN]

Finance

CA – Women File Suit Over FATCA

Two Ontario women allege “Canada has violated the charter rights of nearly a million Canadians by agreeing to share their financial details with authorities in the United States,” in a lawsuit launched against the Attorney General of Canada. The suit alleges Ottawa breached Canada’s constitution by complying with the U.S. Foreign Account Tax Compliance Act. Attorney David Gruber said, “The non-U.S. person would presumably not have any potential liability to the U.S., but nevertheless, they would have the intrusion of their privacy.” He said the case argues Canada’s government has breached the Charter of Rights and Freedoms. [The Canadian Press] [Marni Soupcoff: Ottawa is violating Canadians’ constitutional rights to help the U.S. collect taxes]

FOI

UK – FOI Requests in Particular Formats Must Be Adhered To: Court of Appeal

Public bodies must generally adhere to individuals’ requests for information to be provided in a specific electronic format under freedom of information (FOI) laws, the Court of Appeal in London has ruled.

[Out-Law] [The Court of Appeal judgment (22-page / 413KB PDF)]

UK – Evidence During FOI Disputes Can Be Provided in Secret: Court of Appeal

Public bodies defending a decision to withhold information requested under freedom of information (FOI) laws can submit evidence to an information rights tribunal in secret, the Court of Appeal has ruled. [Out-Law]

US – Snowden Isn’t the Only NSA Whistleblower

A former State Department official in April filed a whistleblower complaint arguing National Security Agency (NSA) data collection practices violate Americans’ Fourth Amendment rights. John Napier Tye had top-secret clearance and worked on Internet freedom issues. He knew the Obama administration was considering a proposal that an internal White House document said represented “significant changes” for handling Americans’ data collected by the NSA from fiber-optic networks abroad, unbeknownst to Congress or the American people. Meanwhile, Wired sat down with Edward Snowden in a hotel room in Moscow to discuss his ordeal over the last year. [The New York Times]

UK – FOI response times not good enough in Scotland, says watchdog

Many public authorities in Scotland are failing to respond quickly enough to requests for information, the Scottish Information Commissioner’s Office (SICO) has said. [Out-Law]

Health / Medical

US – White House Offers Agencies Security, Privacy Tips

Learning from mistakes made during last year’s rollout of Healthcare.gov, the Obama administration has announced it is offering other federal agencies help—including a focus on privacy and security—for their own IT rollouts. Part of the White House’s latest efforts stem from the newly created U.S. Digital Service, an elite team of technology experts (“the country’s brightest talent”) designed to work with federal agencies “to remove barriers to exceptional service delivery and help remake the digital experience that people and businesses have with their government.” Additionally, the administration is offering a “Digital Services Playbook“ to provide best practices for building digital services, which includes “managing security and privacy through reusable processes.” [GovInfoSecurity]

US – Insurance Giants Creating Massive Database of Patient Records

The benefits could prove useful in emergency rooms, where doctors would be able to review patients’ histories instantly. It’s expected to go online by the end of the year. Insurers say the new system, called Cal Index, will help save money be reducing repetitive tests and procedures. Anthem and Blue Shield are providing $80 million in seed money to start the nonprofit database, with the hope it ultimately will survive on subscriptions paid by health providers. Technological challenges have caused previous attempts to fail. Patient privacy is another concern, said Pam Dixon, executive director of the World Privacy Forum. People who suffer from rare diseases, domestic-abuse victims and others are often concerned about keeping their records private, Dixon said. [LA Times]

WW – Apple HealthKit Aims to Centralize Health Data

Apple has been working out how its HealthKit will integrate with a number of healthcare providers and aims to centrally locate health data generated from thousands of third-party health apps for its users. Expected to be released next month as part of the company’s iPhone 6, HealthKit will need to navigate the web of privacy regulations under HIPAA. Joy Pritts, who recently served as chief privacy officer for the Office of the National Coordinator for Healthcare IT, said Apple may need to reassess its responsibility to protect data with each new partnership—meaning a partnership with a wearable tracking company would not be subject to HIPAA but one with a clinic would. [Reuters]

NZ – Report Slams Medical Privacy

A damning Privacy Commission review shows snooping doctors, nurses and even admin workers can access patients’ most personal medical records. The Office of the Privacy Commissioner identified significant flaws in the security and regulation of three shared care record (SCR) portals used by a number of district health boards. A draft review leaked to the Sunday Star-Times has major concerns about all three portals, noting they need to be “more demanding” of patient security with none of the reviewed SCRs able to provide a compelling picture of how access was audited. There was also a concern health information was being electronically recorded and monitored without patient knowledge. [Source] See also: [AU — AUS: Concerns over PCEHR survey privacy quelled]

US – Your Baby’s Cute, But No More Pics on the Doc’s Wall

For generations, doctors have proudly displayed in their offices pictures of the babies they’ve delivered. But that’s a practice patients will see less and less. “I’ve had patients ask me, ‘Where’s your baby board’,” said Columbia University Medical Center’s Mark Sauer. “We just tell them the truth, which is that we no longer post them because of concerns over privacy.” Under the Health Insurance Portability and Accountability Act (HIPAA), baby photos are protected health information. Meanwhile, in a separate report, Khaled El Emam and Scot Ganow discuss the best methods of protecting patient privacy and data de-identification under HIPAA. [The Boston Globe]

Horror Stories

WW – Security Firm Says Russian Gang Amassed 1.2 Billion Passwords

A security firm has discovered a collection of stolen passwords, usernames and email addresses has been amassed by a ring of Russian hackers. According to Hold Security, the collection includes 1.2 billion username and password combinations and more than 500 million email addresses. The company will not disclose the victims due to “nondisclosure agreements and a reluctance to name companies whose sites remained vulnerable,” according to the report. The firm’s CEO said the hackers not only targeted Fortune 500 companies but small websites as well. Meanwhile, Target has announced it will book $148 million in expenses in its second quarter results stemming from last year’s massive data breach. [The New York Times] SEE ALSO: [Krebs: Q&A on the Reported Theft of 1.2B Email Accounts] and [Vast majority of hackers believe they’re above the law — survey]

US – Suit Alleges Hospital’s Lack of Procedures Led to Breach

Two Ohio women have filed a lawsuit alleging their privacy was violated when employees at Kettering Health Network accessed their health information. Vicki Sheldon says her ex-husband Duane Sheldon, who worked in an administrative position at the hospital, accessed her files and those of her daughter. In subsequent months, other people accessed her records, she says, and the health network didn’t have the appropriate procedures in place to protect them. An attorney for Duane Sheldon, who is also named in the suit, said the claims are inaccurate. [2News] See also: [PR Expert on Commonly Made Breach Response Mistakes] see also: [WSJ: An Argument for Not Disclosing Breaches]

US – Bank, Hospital Report Data Breaches

A Florida-based bank is alerting approximately 72,500 customers of a data breach involving personal information that may include account balances, personal identification numbers and Social Security numbers. An unauthorized third party accessed the TotalBank network. Meanwhile, Jersey City Medical Center says an unencrypted computer disk containing patient information from 2011 was lost when a package sent through the mail failed to arrive. Letters are being sent to the affected patients, although there’s no evidence to suggest the lost information has been made available to unauthorized parties or used in nefarious ways. [TweakTown] See also: [AU – Hospital kills off 200 patients by mistake] and [BC: 1,628 patients at Kamloops hospital had privacy breached]

US – Judge Rules on Portal Case; Paddy Power Breach Examined

A U.S. federal judge has ruled that Travelers Indemnity Co. of America must defend Portal Healthcare Solutions against class allegations that it posted confidential medical records online, ruling Travelers’ policy covers electronic publication of private information [Law360]. Meanwhile, a Canadian man found himself faced with a convoy of forensics experts and representatives from recently breached Irish company Paddy Power, holding court documents and subsequently seizing a hard drive and other equipment from his basement, after he sold data that had initially been stolen from the company in a 2010 hacking. [Irish Times] see also: [DHS contractor suffers major computer breach, officials say]

US – Advocates Want Google Settlement Quashed

A coalition of privacy groups is urging the FTC to ask a California judge to reject Google’s $8.5 million class-action settlement, alleging the company illegally divulged search information. The group says the FTC’s involvement is necessary in order to “quash the unfair and ineffective deal,” the report states. Meanwhile, the FTC has responded to a letter from the Electronic Privacy Information Center urging it to oppose the settlement, saying it “systematically monitors compliance” with its consumer protection orders and “takes alleged violation(s) of an order seriously” but cannot disclose details of investigations before a formal complaint is issued. [Law360]

WW – Mozilla Developer Network Info Accidentally Exposed

The Mozilla Foundation has apologized following an incident where “tens of thousands of email addresses and encrypted passwords” were accidentally exposed. The email addresses, which belonged to about 76,000 Mozilla Developer Network members, were exposed on a public server for a month, the report states, noting some 4,000 encrypted passwords were also exposed. “We are known for our commitment to privacy and security, and we are deeply sorry for any inconvenience or concern this incident may cause you,” two Mozilla spokesmen wrote, adding that while the encrypted passwords cannot be used to access the site, anyone who reused a password on another site should change it. [IT News]

Identity Issues

EU – Survey Reveals Business Attitudes to ‘Bring Your Own Identity’ Potential

Allowing customers to use an “existing digital or social identity” to access applications can help organisations deliver simple and secure services to customers, according to a new survey. [Out-Law] [The Ponemon report into BYOID attitudes (registration required)]

US – Inspector General Finds Risks with ONC’s Certification Process

In a report released this month, the Department of Health and Human Services Office of Inspector General concluded that the Office of the National Coordinator (ONC) for Health Information Technology “essentially has an insufficient compliance program to maintain the privacy and security of the protected health information hosted by electronic health records (EHRs).” The report found the ONC’s oversight of authorized testing and certification bodies (ATCBs) did not ensure they developed procedures to “periodically evaluate whether certified EHRs continued to meet federal standards” and developed a training program “to ensure that their personnel were competent to test and certify EHRs and to secure proprietary or sensitive EHR information.” [Med Law Blog]

Intellectual Property

WW – In Three Days, Facebook Class-Action Gains 11,000 Members

Days after the announcement by Europe v. Facebook’s Max Schrems on the filing of a class-action lawsuit “inviting adult noncommercial Facebook users located anywhere outside the U.S. and Canada to join in … (the) civil action has pulled in some 11,000 participants.” About 50% come from “German-speaking countries,” the report states, and a Europe v. Facebook spokesperson noted, “Reasonable numbers come from all European countries and South America.” The class-action is targeting what the group describes as “unlawful acts” by Facebook, including its alleged support of the U.S. NSA’s PRISM surveillance program and lack of “effective consent” for many uses of user data, the report states. [TechCrunch] Schrems is seeking 500 euros per Facebook user, and people can join the case by logging in with their Facebook credentials at www.fbclaim.com.

Internet / WWW

US – Man Launches Kickstarter Campaign to Live “A Year Without Privacy”

Noah Dyer calls himself an “anti-privacy” activist, and he’s seeking $300,000 in a Kickstarter campaign to fund a yearlong live-stream of his life. He calls the project, “A Year Without Privacy.” Dyer is a professor of mobile app and game programming at the University of Advancing Technology, and he believes government should be allowed to gather all data on its citizens, and likewise, the government itself should have no privacy. Meanwhile, an Internet privacy start-up has raised $100,000 in Kickstarter funding. The iCloak is a small USB device that thwarts companies’ attempts to track Internet browsing. [Source] see also: [Can Google be sued for a mere search suggestion? A Hong Kong judge says yes.]

Law Enforcement

US – Police Dept. Surveillance Potential Raises Concerns

Seattle’s police department still hasn’t released a draft policy on how it will use the surveillance cameras and communication nodes it installed as part of a federal port-security grant. Privacy and civil liberties advocates say the city must put a strong review process in place for the information collected via the surveillance cameras, smart meters and two aerial drones recently purchased with a Homeland Security grant. “We know that whenever these systems are put in place, they can be abused,” said a spokesman for the Seattle Privacy Coalition.. [Government Technology] See also: [Spy satellites fighting crime from space] and [Could drones get X-ray vision through Wi-Fi?] and [UK – Police want right to see medical records without consent]

US – FBI Using Drive-by Downloads to Catch Criminals

The FBI has been using drive-by downloads to identify people who visit certain suspicious websites. Specifically, the Justice Department is attempting to identify people who visit child pornography websites hiding in the Tor network. The tactic has paid off – more than a dozen people are now facing trial. However, critics say that the FBI has “glossed over the technique when describing it to judges” and has hidden its use from defendants. The FBI calls the method a network investigative technique (NIT) and has been using some form of it since 2002. There is also concern about mission creep, because the technology’s deployment has grown from targeted operations to a dragnet-like approach. Others are worried about weakening a technology useful to human rights and other activists. [WIRED]

Location

US – How Fast You Drive Might Reveal Exactly Where You are Going

Rutgers researchers have shown that GPS technology is not needed to show where a driver traveled. A starting point and the driver’s speed are enough. In our constantly connected, information-rich society, some drivers are jumping at the chance to let auto insurance companies monitor their driving habits in return for a handsome discount on their premiums. What these drivers may not know is that they could be revealing where they are driving, a privacy boundary that many would not consent to cross. A team of Rutgers University computer engineers has shown that even without a GPS device or other location-sensing technology, a driver could reveal where he or she traveled with no more information than a starting location and a steady stream of data that shows how fast the person was driving.[Source]

Offshore

AU – Data Retention Risks Private Information Leaking: Privacy Commissioner

Australia’s federal Privacy Commissioner says it remains “unclear” what information the Abbott government’s mandatory data retention proposal would require telecommunications companies to collect for law-enforcement purposes and has indicated that collecting the data increased “the risk of a data breach.” In a statement published on the Office of the Australian Information Commissioner’s website, commissioner Timothy Pilgrim said it was important there was “an opportunity for public consultation and debate” on the proposals once the detail was available. “At this stage, it is unclear exactly what type of information would be retained,” he said. “However, there is the potential for the retention of large amounts of data to contain or reveal a great deal of information about people’s private lives, and that this data could be considered ‘personal information’ under the Privacy Act.” [Sydney Morning Herald] see also: [Australian Government’s Data Retention Plan: Everything You Need To Know] [AU – The Australian Federal Cabinet has given its support, in principle, for a requirement that telecommunications companies retain certain undetermined customer data for up to two years for warrantless investigation by government agencies.

SK – Korea: New Korean Privacy Protection Law Set To Take Effect

A new personal information protection law is set to take effect this week, banning companies and website operators from collecting citizens’ resident registration numbers as the government steps up efforts to prevent identity theft, the home affairs ministry said. The law, which will go into effect on this week, comes after a series of recent personal data theft cases involving popular website operators as well as some credit card and financial companies. [Yonhap News] See also: [South Korea’s Personal Information Protection Act came into effect last week.] and [Concerns linger over the new South Korean law prohibiting public institutions and companies from collecting resident numbers]

Online Privacy

WW – Facebook Unveils Cross-Device Ad Reporting

Facebook has rolled out cross-device ad reporting to allow marketers to see how people are moving among devices, mobile apps and the web. For example, advertisers can see the number of customers who clicked on an iPhone ad but then later used a desktop. The reporting “relies on data from Facebook’s conversion pixel, a piece of tracking code used in conjunction with the social network’s software development kit, to get reports on which device someone saw an ad and eventually converted,” the report states. A recent analysis found that “among people who viewed a mobile Facebook ad in the U.S., nearly a third eventually clicked on the same ad on the desktop within 28 days.” [MediaPost]

WW – Google Acquires Chatting Service; Foursquare Releases Tracking Service

Google has acquired a start-up that offers an instant-messaging tool that also can monitor chats, infer what people are talking about and insert relevant links. A nearby café might pay for an ad to appear every time the word “coffee” appears in a user’s chat, for example. The service, called Emu, is part of a “much larger trend to monitor and thus profit” from such data, the report states. Meanwhile, Foursquare aims to boost its revenues by releasing a new version of its app that will function more like a “tracking machine.” [Wired] and [Google Street View Adds More Images of College Campuses]

EU – Wikipedia Fights RTBF; Auto-Complete Concerns Raised; Better Redress Sought for Cyber-Abuse

Online, open-sourced encyclopedia Wikipedia is countering Europe’s right-to-be-forgotten ruling by listing the articles the site has been asked to remove. Wikimedia Foundation Executive Director Lila Tretikov said, “Accurate search results are vanishing in Europe with no public explanation, no real proof, no judicial review and no appeals process.” That results, he said, in “an Internet riddled with memory holes …” Meanwhile, Google’s auto-complete function is being challenged in a Hong Kong court where a local businessman has been allowed to sue the company for what he views as negative suggestive terms in his search. Separately, University of Maryland Law Prof. Danielle Keats Citron, in a column for Slate, argues that a recent revenge porn lawsuit should prompt Facebook to improve how it deals with reports of abuse. [Reuters] and [The Internet Never Forgets: Google Inc.’S “Right To Be Forgotten” EU Ruling And Its Implications In Canada]

US – Federal Sites Working to Address “Canvas Fingerprinting”

The new online tracking tool “canvas fingerprinting“ has “latched onto” federal websites including those of the Department of Homeland Security, White House and Social Security Administration, according to research from Princeton and KU Leuven universities. The code for canvas fingerprinting comes from the AddThis widget, which is exploring the tool as an alternative to cookies. The agencies affected are looking for ways to address privacy concerns as they try to comply with privacy standards set by the Office of Management and Budget. The Transportation Security Administration plans to remove the AddThis widget from its site today, and the General Services Administration is reviewing its terms of service with AddThis. [FCW] [Canvas Fingerprinting and Why Website Operators Need to Take Control]

Other Jurisdictions

RU – Russian Government Bans Anonymous Wi-Fi

Russian Prime Minister Dmitry Medvedev has signed a decree prohibiting anonymous wireless Internet access. People using public wi-fi must provide identification before they are allowed to access the network. [The Register] [ZDNet] [CBC] see also: [Malta: Parents present Letter of Complaint opposing processing of student data] and [Chinese scientists develop mini-camera to scan crowds for potential suicide bombers] [The Turkish government has forwarded a data protection convention to the Turkish Grand National Assembly for ratification]

Privacy (US)

US – CDD Complaint Alleges Companies Are Breaking Safe Harbor Promises

A complaint filed with the FTC alleges at least 30 U.S. companies are “failing to provide” safeguards for European citizens promised under the Safe Harbor framework. The Center for Digital Democracy says Salesforce, Adobe, AOL and other companies are “compiling, using and sharing EU consumers’ personal information without their awareness and meaningful consent … All of the companies, we believe, fall far short of the commitments they have made under the Safe Harbor.” [ZDNet] [Dozens of U.S. tech firms violate EU privacy promises] see also: [US – DEA Improperly Paid $854,460 for Amtrak Passenger Lists]

US – Facebook Gets Support from Industry, Advocates in NYDA Case

A number of major tech companies, the New York Civil Liberties Union and the ACLU have filed amicus briefs with the court in support of Facebook over its fight with the New York District Attorney’s Office (NYDA) over protecting consumer data from government investigations. The groups say warrants like the one that required Facebook to hand over user data for 381 users to the NYDA are problematic, especially when they are attached to gag orders preventing the company from disclosing the data-sharing to users. “Unless Facebook is able to assert its subscribers’ constitutional rights … the legality of the government’s actions with respect to those subscribers will escape review altogether,” the groups wrote. [The Verge]

US – Schumer Warns About Wearables: “Privacy Nightmare”

Sen. Chuck Schumer (D-NY) has expressed harsh criticism and concerns about potential privacy issues related to wearable fitness trackers. “Personal fitness bracelets and the data they collect on your health, sleep and location should be just that—personal,” he said. “The fact that private health data—rich enough to identify the user’s gait—is being gathered by applications like Fitbit and can then be sold to third parties without the user’s consent is a true privacy nightmare.” The senator called on the Federal Trade Commission to require businesses to notify users that fitness and location data are being sold to third parties and provide opt-outs. A Fitbit spokesperson said the company does not sell user data and is willing to “work with” Schumer. [Business Insider] See also: [QR codes find a warm reception in Anchorage Mausoleum] and [UBC research on eye-tracking devices sheds light on the implications of wearable technology like Google Glass] and [Wearable users tracked with Raspberry Pi]

US – Citizens Don’t Want to Trade Privacy for Nat’l Security, Lower Prices

A new survey reveals that 42% of U.S. citizens would give up their privacy for national security and only 25% of respondents were willing to do so for lower prices. Released by the Public Affairs Council (PAC), the survey also found Republicans less likely than Democrats to trade some privacy for national security. PAC President Doug Pinkham said, “If you value your privacy, everyone says yes (that they are against giving up any of their privacy), but life is about trade-offs of cost or convenience or some other issue.” [The Wall Street Journal]

Privacy Enhancing Technologies (PETs)

WW – Computer Scientists Developing Web-Tracking Alternative

EU-based computer scientists have been developing peer-to-peer technology that could serve as an alternative to current web-tracking practices. Researchers from Germany’s Saarland University and the Center for IT Security, Privacy and Accountability and Italy’s IMT Institute for Advanced Studies have created Privada, which collects behavioral metrics on visitors to websites but separates the various metrics and sends them to different third-party servers, preventing any centralized database. “It’s a bit like tearing a picture apart and giving pieces to friends,” said one student involved in the project, adding, “They can only see the whole image if they put their pieces together.” [The Sydney Morning Herald]

WW – What’s Happening with Dark Mail?

Ladar Levison, creator of the now defunct Lavabit encrypted email service, described the progress of his new project, which aims to revolutionize email. Speaking at DefCon, Levison said that he is unhappy that the communications environment is such that “we need a [military grade] cryptographic mail system … just to be able to talk to our friends and family without … fear of government surveillance.” Now known as DIME, for the Dark Internet Mail Environment, the project uses layered cryptography to provide one-click, end-to-end email encryption. Levison expects DIME to be running by early next year. [The Register] [CNET] [TIME]

RFID

EU – Tech Standards for ‘Smart Tags’ Developed With Data Protection in Mind

Businesses making use of ‘radio frequency identification’ (RFID) chips will be able to comply with EU data protection laws if they adhere to new standards for the chips that have been finalised, according to the European Commission. [Out-Law] [New RFID standards from CEN/TC 225 – AIDC technologies]

Security

US – NIST Cybersecurity Guidelines Just a Starting Point

The National Institute of Standards and Technology’s cybersecurity guidelines for utilities, banks and other industries serve as the baseline for what affected companies should be doing to protect their networks from attacks. Some companies have come together to develop additional recommendations while other companies have created their own policies, the report states. The Financial Services Information Sharing and Analysis Center’s Third-Party Software Security Working Group, which included members from major financial institutions, had been looking at the issues since 2012, for example. Neuberger Berman’s chief information security officer said good companies will develop their own policies that exceed any standard—which always addresses the minimum controls needed. [The Wall Street Journal] See also: [Privacy Is Serious Business At Black Hat Security Conference]

US – Registration Now Open for NIST Event

The National Institute of Standards and Technology (NIST) is holding its second Privacy Engineering Workshop September 15 and 16, collocated with the IAPP’s Privacy Academy and CSA Congress. The workshop will consider draft privacy engineering definitions and concepts and the results will “inform the development of the NIST report on privacy engineering.” You can find a draft agenda here. If you’d like to be a part of the discussion, you can now register, for free, to attend the event, which will be held at the San Jose Marriott, in San Jose, CA. [NIST Press Release]

US – NIST Updates Draft Security, Privacy Assessments Guide

The National Institute of Standards and Technology (NIST) has released for public comment a draft update of the primary guide for assessing security and privacy controls that safeguard federal information systems and networks. The deadline for public comment is September 26. “We have made some significant changes to our security control assessment guidelines to support continuous monitoring and ongoing authorization,” said NIST Fellow and Joint Task Force Project Leader Ron Ross. “These changes can lead to greater efficiencies and cost-effective testing and evaluation of our critical information systems and supporting infrastructure.” [NIST press release]

US – Companies Doing Business with DoD Brace for New Rules

Organizations that conduct business with the Department of Defense (DoD) will be facing new rules for reporting computer breaches, and some fear the rules could hurt small- to medium-sized businesses. The pending rule change is part of a DoD effort to better understand the scale of hacking and to ensure businesses processing classified data inform the Pentagon of cyber-attacks. TechAmerica’s Mike Hettinger said the changes have “the potential to become too onerous” if minor breaches must be reported. Hogan Lovells Partner Harriet Pearson said, “What it really means is any defense contractor who intends to be able to handle classified information needs to review and update their breach detection, response and reporting.” [Bloomberg] See also: [Expert: Cybersecurity, privacy and government policy must adapt to a changing, complex environment | Video]

WW – PCI Security Standards Council Releases Third-Party Security Guidance

The Payment Card Industry (PCI) Security Standards Council has released guidance “to help organizations and their business partners reduce this risk by better understanding their respective roles in securing card data,” according to a PCI press release. With more businesses using third-party operations, risk of security incidents increase, the report states, hence the guidance aims to “ensure payment data and systems entrusted to third parties are maintained in a secure and compliant manner.” The “Third-Party Security Assurance Information Supplement“ has been informed by more than 160 organizations and includes recommendations to conduct due diligence and risk assessment, expectation-setting, appropriate third-party agreements and an ongoing monitoring process.

US – Most Companies Unsatisfied with Their Security Incident Response

A SANS study found that just nine percent of organizations believe that their response to security incidents is “highly effective.” More than a quarter of those responding said they were dissatisfied with their incident response. Among the impediments to effective response programs are lack of review and practice of response procedures, and insufficient budgets. [ZDNet]

US – Does It Matter That Wearables Often Have Bad Security?

As wearables proliferate—anything from medical devices to fitness trackers to infants’ onesies, all connected to the Internet—concerns about the security of the devices have consistently been raised. However, medical device manufacturers and the doctors who use them seem to be saying, “who cares?” One report notes that doctors can’t see why anyone would actually want to hack a pacemaker. Security experts call this “faith-based mismanagement.” Further, a pair of articles in CIO note that wearables are changing online privacy in significant ways and that it’s important to read privacy polices extensively before using such products. [IDG News Service] [NetworkWorld]

Smart Cards

CA – SecureKey to Launch New BC Services Card

Toronto-based SecureKey, a provider of organizations that deliver online consumer services, has announced that the Province of British Columbia (BC) is using SecureKey briidge.net Connect 3.0 as the foundation for the BC Services Card, the world’s first public sector Services Card for online authentication. The implementation also includes support from the world’s leading supplier of secure smart card microcontrollers, NXP Semiconductors. The BC Services Card replaces the existing provincial health CareCard and creates the foundation for multiple uses in the future. Citizens of British Columbia have the option of combining the BC Services Card with their driver’s license into a single, convenient card. It is envisioned that citizens will be able to use this card in the future for secure and private authentication to access in-person and online government services.[Government Security News Magazine]

Surveillance

US – How One City’s Video Surveillance System Got Hacked

Redlands, CA, employs a robust network of surveillance cameras to help law enforcement stymy drunk-driving, vandalism and other crimes, but the system was easily vulnerable to hacks. Two IT experts discovered the cameras were part of a mesh network but were not password-protected. The two were able to gain access to the police’s bird’s eye view of the city, creating a map of what the cameras watched—including the entrance to an adult movie store. A Redlands police commander said, “Our cameras only capture something happening in public view, so we weren’t incredibly concerned … But when we saw teasers for the presentation, we encrypted all the feeds out of an abundance of caution.” [Forbes] See also: [Halifax: City isn’t sure how many security cameras it has] and [About Those Facial Recognition Experiments at Your Nearest Music Festival] and also: [California PD Doesn’t Believe FAA Has Jurisdiction Over Its Drone Acquisition]

Telecom / TV

WW – Researchers Reveal Surveillance Capabilities in Phone Gyroscopes

The motion-detection capabilities in smartphones may have the potential to become a surreptitious eavesdropping sensor, according to researchers from Stanford University and Israeli defense research group Rafael. Gyroscopes help stabilize images for built-in cameras, aid in motion-based games and more, but the researchers also found they are sensitive enough to pick up on some sound waves, making them into rudimentary microphones. What’s more, apps do not need permission from a user to gain access to the gyroscope, the report states. One researcher noted it’s “quite dangerous to give direct access to the hardware like this without mitigating it in some way,” adding, “The point is that there’s acoustic information being leaked to the gyroscope.” [Wired]

US – FTC Approves iKeepSafe Under COPPA

The FTC has announced its approval of the Safe Harbor program of iKeepSafe, also known as the Internet Keep Safe Coalition, under COPPA. The application was approved in a 5-0 vote because of its compliance with the FTC’s COPPA rule, which requires online sites and services directed at children under the age of 13 to provide notice and obtain permission from parents before collecting personal information. The FTC said iKeepSafe provides “the same or greater protections for children” as those in the COPPA rule. [FTC]

US – California’s ‘Kill-Switch’ Bill Will Have Big Impact in U.S.

Legislation on California Gov. Jerry Brown’s desk, if signed, would require the sale of smart phones with a “kill switch” that could be activated by consumers if the devices are lost or stolen. Because of California’s immense size –12% of U.S. residents live in the state — the practical impact of the legislation could be the sale of smart phones with deactivation capabilities across the nation. California Senate Bill 962, which passed the Senate this week and the Assembly last week, would prohibit retailers from selling smart phones in California after next July 1 unless they come pre-equipped with theft-deterring technology. Consumers would have the opportunity to opt-out of using this technology. Retailers selling devices without the anti-theft technology could face fines of between $500 and $2,500 for each smart phone sold. The bill would require the smart phone, during the initial device setup process, to prompt a user to enable the technology to deactivate the device. Consumers could opt out of implementing the kill switch. [Source]

US Government Programs

US – FISA Court Judge Criticizes NSA for “Overcollection”

According to newly declassified documents, a National Security Agency (NSA) metadata program was fraught with “systemic overcollection” of private Internet connections. In the 117-page decision, Foreign Intelligence Surveillance Court Judge John Bates criticizes the agency’s management of its top-secret electronic surveillance metadata program, noting the NSA had difficulty collecting the metadata without also collecting other data, including the contents of communications, the report states. Bates’ memorandum calls out the NSA for “long-standing and pervasive violations of the prior (court) orders in this matter” and also notes the frequency that employees shared data about U.S. residents showed a “widespread ignorance of the rules…” [The Wall Street Journal]

US – NSA’s MonsterMind Aims to Detect and Stop Cyber Attacks Instantly

An NSA program known as MonsterMind, currently under development, is being designed to detect and stop cyber attacks against the US; the system would also be capable of launching retaliatory cyber attacks. Described in broad terms, the program would analyze metadata to detect anomalous network traffic. [WIRED] [SC Magazine]

US Legislation

US – Destroy Securely: Delaware Adopts New Data Destruction Law

Delaware recently adopted a new law that will add requirements related to the destruction of records containing “personal identifying information.” With that law, Delaware joined a number of other states that place restrictions on the ways in which entities destroy or dispose of personal information. The Delaware law will become effective January 1, 2015. [Hogan Lovells]

US – Proposed USA Freedom Act Updated for Improved Privacy

Efforts to reform government surveillance laws continue to push through Congress. The USA Freedom Act of 2014 is the latest step in that direction. [eWeek]

US – Law to Close NY Privacy Loophole Signed

A law to close a privacy loophole in New York was signed Friday by Governor Andrew Cuomo. A press release says the law will ensure people who have their image broadcasted without their consent will be able to take legal action. “No one should be humiliated by having their image broadcast without their consent – and this common-sense legislation ensures that any victim of such an act will have the law on their side,” Gov. Cuomo said. The law will allow law enforcement to charge individuals with unlawful surveillance in the second degree if they use a device to view, broadcast, or record another person engaged in sexual conduct without their consent – regardless of what’s being broadcasted. The law will take effect November 1. [Source]

Other news: A federal judge has said Sen. Patrick Leahy’s (D-VT) anti-surveillance bill could undermine “the twin goals of protecting privacy and national security“ and may even be unconstitutional.

The North American Securities Administrators Association wrote to leaders of the House and Senate Judiciary Committees saying provisions of the Email Privacy Act (HR 1852) and the Electronic Communications Privacy Act Amendments Act of 2013 (S 607) could significantly limit the effectiveness of state civil and administrative investigations.

A court decision may stop California Invasion of Privacy Act class-actions against companies.

Watchdog.org reports Missouri citizens voted to constitutionally protect electronic communications and data from warrantless police searches, and FBI Director James Comey thinks it’s a good idea.

Workplace Privacy

US – Tiffany’s Policy Too Broad, NLRB Finds

A National Labor Relations Board administrative judge has found that Tiffany & Co. exercises an “overly broad confidentiality policy prohibiting employees from disclosing information readily available on employee lists, including names, addresses and phone numbers of other employees,” Law360 reports. Judge Steven Davis ruled the retailer’s privacy agreement is too broad and violates the National Labor Relations Act. The ruling comes after a former employee sued Tiffany’s for allegedly maintaining unlawful policies since last December, the report states. [Law 360]

+++

16-31 July 2014

Biometrics

US – State Police Now Fingerprinting Every Texan

The Texas Department of Public Safety has quietly embarked on a project to take the fingerprints of every Texan old enough to drive over the next 12 years, and add them to a statewide criminal history database. Not only has the department made that momentous decision on its own, it doesn’t even have clear legal authority to do so. [Watchdog.org]

US – Facial Recognition Code Should Protect Minorities, Adolescents

In trying to establish a code of conduct on the commercial uses of facial recognition technology, there’s been much discussion about the potential harms if the technology isn’t regulated. At the National Telecommunications and Information Administration’s July 24 meeting, stakeholders called in a couple of experts to better understand who is most vulnerable. UCLA Assistant Prof. Adriana Galván testified that adolescents are particularly at risk because research indicates they are more excited by “rewards” than adults, which could be exploited by marketers using the technology to recognize age. Rutgers Prof. Jerome Williams discussed evidence of the risks minorities already face in the marketplace that could be exacerbated using technology capable of detecting race. [Source]

US – Franken Appreciates Responses, Wants More Done

Following concerns from Capitol Hill about new technology using fingerprints as passwords, Apple and Samsung sent letters to Sen. Al Franken (D-MN) claiming users’ fingerprints are not stored on their smartphones and are safe from hackers and identity theft. “We agree with you that fingerprint-scanning technology for smartphones can be convenient and beneficial for consumers but must be implemented in a way that safeguards consumer privacy,” Samsung’s vice president wrote. Franken had requested information from the companies on data protection provisions, and while the responses were “mostly good news,” the companies still haven’t taken steps to prevent criminals “from bypassing fingerprint readers with a spoofed print,” the senator said. [The Hill]

US – AG’s Office Reduces Access to Facial Recognition Database

Ohio AG Mike DeWine’s office continues to reduce the number of law enforcement officers statewide who have access to controversial facial-recognition technology. The system was rolled out last year and allows police to run pictures of unknown individuals through a database of 23 million Ohio driver’s license photos and prison mug shots to establish a match, the report states. It’s led to at least one murder arrest, state officials say. But the American Civil Liberties Union and other advocates complained about potential privacy violations. As a result, the number of individuals with access to the system has shrunk from 30,000 to 5,594, according to the AG’s office. [Associated Press]

Big Data

UK – ICO Publishes ‘Big Data’ Guidance, Stresses Fairness and Transparency

The UK Information Commissioner’s Office (ICO) has published a new report on big data and data protection (51-pages) in which it warned businesses to ensure that they process personal data fairly and in a transparent manner when undertaking big data initiatives. In some cases businesses will use new analytics capabilities to make use of existing personal data sets that they have collected. However, in other cases companies will use data collected from third parties to glean information on individuals’ behaviours and attitudes or to personalise services they offer. The ICO warned businesses of the checks they need to carry out to ensure they comply with the Data Protection Act (DPA) in those cases. The ICO said that businesses need to get “innovative” to convey concise information about the way in which they intend to use individuals’ personal data in a big data setting. The watchdog said companies need to update their privacy notices and make sure individuals are aware if they find new purposes for processing personal data when processing that information that were unforeseen when consumers were first told of the reasons for which their data was to be used. Uncertainty over how personal data may be used in future big data projects does not remove businesses’ obligations to explain possible foreseen purposes of future processing to individuals, it added. [Source] [Pinsent Masons, the law firm behind Out-Law.com, called on the ICO to explain “what transparency and fairness looks like” in the big data era.]

Canada

CA – IAPP Thanks Ann Cavoukian for Her Service to the Profession

At the recently concluded IAPP Canada Privacy Symposium, Kris Klein, the IAPP’s managing director for Canada, took time from the keynote stage to thank Ontario Information and Privacy Commissioner Ann Cavoukian for her service to the profession. The IAPP captured the moment in a short video that is now part of our new video archive. Cavoukian now heads up Ryerson University’s Institute for Privacy and Big Data, but you can see the emotion with which she left the position she occupied for nearly two decades. [Source]

CA – Average of “Almost One Breach a Day” Reported

“The federal government has quietly logged 101 breaches of Canadians’ private information over the last four months,” citing information released by the Office of the Privacy Commissioner (OPC) indicating “his office was informed of a privacy breach an average of almost once a day since April 1.” The OPC has also weighed in on a hacking incident involving Canada’s National Research Council, stating, “We are following developments very closely due to the potential implication for personal information.” Meanwhile, New Brunswick Privacy Commissioner Ann Bertrand has recommended “ disciplinary measures and provincial charges“ for a doctor who accessed 141 patients’ medical files. [Toronto Star]

CA – Judge Agrees to Hear Telecoms’ Charter Rights Challenge

The Canadian Press reports that Ontario Justice John Sproat “has agreed to hear a Charter of Rights challenge brought by Telus and Rogers after they were asked by police in April to release cellphone information of about 40,000 to 50,000 customers as part of an investigation.” In his ruling, Sproat wrote, “The privacy rights of the tens of thousands of cell-phone users (are) of obvious importance.” Sproat’s ruling follows the Supreme Court of Canada’s June ruling affirming “Canadians have a right to online privacy under the Charter of Rights and Freedoms” and the announcements that followed from Telus and Rogers that they would require warrants “give basic customer information to police or security agencies,” the report notes. [Source] SEE ALSO: Michael Geist writes of last month’s Supreme Court decision and the actions several telecoms have taken regarding data retention following that ruling. The Toronto Star opines, “With giants Rogers and Telus on side, and Bell under pressure to follow, the message should be clear for Ottawa,” suggesting, “The writing is on the wall” for bills C-13 and S-4. Telus and Rogers Communications now require warrants for customer information after the Supreme Court decision. University of Toronto’s Christopher Parsons said if other telcos “start to take a similar position, maybe that would defray the impact of C-13, although it wouldn’t mean that C-13 was a better law.” [Telecoms move in right direction on privacy: Editorial]

CA – OACP Update Guidelines for Police Record Checks

Recently the Ontario Association of Chiefs of Police (OACP) updated their LEARN Guideline for Police Record Checks. We applaud the OACP for taking this important step, which has the potential to have a positive effect on the lives of thousands of law-abiding Ontarians. While the guidelines are voluntary, this is an important step to ensuring a proper and consistent approach to how information is disclosed when police record checks are conducted. We strongly encourage all of Ontario’s 57 police forces to adopt the OACP’s guidance on limiting the disclosure of non-conviction and non-criminal records to a limited class of exceptional circumstances. Similar to the recommendations of our recent Crossing the Line investigation into the disclosure of attempted suicide to US boarder officials through the CPIC database, the OACP recommends police forces to keep mental health police contacts confidential unless exceptional circumstances are present. The position of the IPC has long been that non-conviction and non-criminal information should only be disclosed during the course of a police records check only in exceptional circumstances, consistent with focused, objective public safety-related criteria. [Source] [The Toronto Star: Toronto Police To Keep Sharing Non-Conviction Records]

CA – Police Chiefs Call for Presumed Innocence in Background Checks

Police forces across Ontario are being told to stop disclosing unproven allegations, withdrawn charges and 911 mental health calls in background checks shared with employers, volunteer organizations and U.S. border officials. The Ontario Association of Chiefs of Police (OACP) issued the strong new recommendations this week amid an ongoing Star investigation documenting how the professional and personal lives of innocent Ontarians have been undermined by routine disclosures of non-conviction records. The voluntary guidelines call on forces that sign on to keep mental health police contacts and unproven charges confidential except under exceptional circumstances. OACP is also calling on the government of Ontario to introduce legislation that would compel all of the province’s 57 police forces to follow clear rules about what they can — and cannot — disclose. As it stands, records ranging from police surveillance notes to mental health incidents that never prompted a charge or conviction are making their way onto police background checks and the computer screens of U.S. border officials, the Star investigation has shown. The fallout includes lost jobs and educational opportunities, inability for some people to enter the U.S. and roadblocks to volunteering with agencies that serve vulnerable Ontarians. Until now, only about half the province’s police forces had signed on fully to the existing OACP guidelines, said Cormier. [Source]

CA – Class Actions Seek to Expand Law of Privacy Breaches

Two recently certified class action lawsuits could expand the scope of the fledgling Ontario tort of “intrusion upon seclusion”—the privacy tort first recognized by the Court of Appeal in 2012. The two cases—Evans v. The Bank of Nova Scotia1and Condon v. Canada2—are notable for being, respectively, the first class action to be certified in Ontario based on the tort of “intrusion upon seclusion” and the largest class action involving a digital privacy breach in Canada. Both cases seek to extend the reach of the privacy tort by claiming that institutions are liable when their actions either directly or indirectly compromise the personal information of their clients. In Evans, the Ontario Superior Court of Justice will be asked to determine whether an employer is vicariously liable for its employee’s deliberate theft of clients’ personal information. In Condon, the Federal Court will assess the government’s responsibility for allegedly reckless behaviour by its employees, leading to the loss of thousands of student loan records. Both class actions seek to push the current boundaries of the tort of intrusion upon seclusion. [Mondaq]

CA – Charities May Be Asked for Donor Lists Under CRA Proposal

Canadian charities would have to turn over lists of their donors’ identities to the Canada Revenue Agency under a proposal being floated by the Conservative government. The move is touted as a way to prevent tax-receipt fraud, but some charities are wary of the administrative burden — and the potential close surveillance of groups that criticize government policies. Revenue Minister Kerry-Lynne Findlay made the suggestion behind closed doors this spring to charities officials in Ottawa as the government seeks ways to tighten regulation of Canada’s charitable sector. Findlay asked officials of the Heart and Stroke Foundation, the Canadian Cancer Society and others for their input, as well as their reaction to a proposal to standardize the format, size and colour of official income-tax receipts for charitable donations. The consultation took place before a March 26 media event at which Findlay and Kevin Sorenson, minister of state for finance, boasted about the government’s achievements in reducing red tape for charities. The suggestion about turning over donor lists also came as some charities, subject to lengthy audits by the Canada Revenue Agency over their political activities, were feeling vulnerable and threatened by the Harper government. Findlay’s proposals apparently met with “stunned silence” initially, according to one witness, who requested anonymity. At least one charity official later spoke against them. “You can imagine why neither of these proposals would reduce red tape for charities — and why, given the current climate, there would be significant concern about the intent,” said the source. Pamela Fralick, president and CEO of the Canadian Cancer Society, was also at the closed-door meeting and said the minister was “floating ideas” rather than putting forward concrete proposals. Fralick said she would need to see more details before the society could adopt a position. There are some 86,000 registered charities in Canada, though fewer than one per cent report any political activity. [The Winnipeg free Press]

CA  Other Canadian News

The Globe and Mail reported that, as part of Bill C-24, the government can share Canadian immigration files and other data with foreign governments, and Prime Minister Stephen Harper’s cabinet can now draft regulations “providing for the disclosure of information for the purposes of national security, the defense of Canada or the conduct of international affairs” as well as for the “disclosure of information to verify the citizenship status or identity of any person” to enforce the nation’s law “or law of another country.”

CBC reported that Communications Security Establishment Canada says it cannot be sure Canadian intelligence protects information about Canadians when sharing intelligence data with the other Five Eyes partners.

CASL brought an onslaught of e-mails as senders of commercial electronic messages to Canadians attempting to verify recipients’ consent.

CA – Symantec Study Reveals 93% of People Access Data on Lost Smartphones

Symantec Canada recently ran something of a sting operation to figure out what people generally do when they come across a homeless smartphone. First, the company “lost” 60 smartphones in Vancouver, Calgary, Toronto, Ottawa, Montreal and Halifax. Then it monitored the phones to see what people did with them once they picked them up. The good news is that if you lose your phone, there’s a slightly better than 50/50 chance the person will try to return it to you. Apparently, 55% of people attempted to return the phone to its rightful owner. The bad news is that even those kind souls are pretty nosy and will take a peek at your private data before they give your phone back. According to the Symantec, 93% of people accessed the devices and half looked at private photos. A total of 63% looked at corporate email and a little more than half (52%) opened the password file. 35% accessed the bogus online banking application loaded on the lost phone. The results of the study come hot on the heels of a report from Avast! that revealed many people selling their phones on eBay don’t do enough to wipe their personal data from the device before shipping it to the buyer. The company purchased 20 second-hand cell phones from users on eBay and discovered over 40,000 photos on the phones, including 1,500 pictures of children, 750 photos of women in various stages of undress and 250 dick pics. They also discovered the identity of four previous owners, and more than 750 emails and text messages. [Source]

CA – ON Breach Being Investigated; Post-BC Breaches, Researcher Reinstated

An Ontario woman “is asking how a medical company knew details of her surgery when they tried to persuade her to change surgeons.” Ontario’s Office of the Privacy Commissioner “is looking into how the Centric Health plastic surgery clinic … got the information” about her surgery, the report states. Meanwhile, The Vancouver Sun reports the second of seven individuals who lost their jobs following privacy breaches two years ago and “a mass firing by the BC Health Ministry” has been reinstated. Drug researcher Malcolm Maclure has been rehired as a consultant on research and evidence development, the report states, quoting Maclure as saying, “I feel exonerated.” [Digital Journal] See also: [Saskatchewan: Expert calls for release of critical-incident info]

Consumer

US – Americans Most Worried About Financial Data

A survey indicates 71% of Americans say they’re “petrified” someone will snoop as they access their bank accounts or other financial data. 57% say they’re worried someone will snoop on their online shopping. Social networks were the platforms that made users most worried, and email came second at 56%. Harris Interactive surveyed 2,100 Americans in June. [CNET] See also: [Businesses Beware: Millennials Could Revolt Over Data-Gathering]

US – People With Higher Job Status Prioritize Security Over Privacy

Privacy and security are two sides of the same coin and it’s sometimes very difficult to find a perfect balance of the two. In most cases, people tend to prioritized one over the other based on their personal choices or requirements. A new study published by Penn State researchers found that people in higher job positions are more likely to sacrifice privacy in the same of security. For the study, researchers analyzed how people in leadership job positions evaluated security and privacy and how impulsive or patient they were in making decisions. They found that those who were randomly placed in charge of a project tended to become more concerned with security issues. “Social status shapes how privacy and security issues are settled in the real world,” said Grossklags. “Hopefully, by calling attention to these tendencies, decision makers can rebalance their priorities on security and privacy.” [Source]

US – Businesses Beware: Millennials Could Revolt Over Data-Gathering

“Millennials care about online privacy—but only to an extent that’s convenient,” Megan Meagher writes, noting they are supplying data brokers with thousands of data points about themselves that are then turned into consumer profiles that can be detrimental to their options as customers. However, she writes, millennials take on causes quickly, and issues that were once innocuous become pressing overnight given online forums like Facebook that allow campaigns to travel at warp speed. Given that, it’s “only a matter of time before marketers are held accountable for any unpalatable practices they undertake involving the use of personal data,” Meagher writes, suggesting companies would be wise to get ahead of such a revolution. [Forbes]

US – Tech Seeks Life After Death for Accounts

There are legal challenges surrounding online accounts after their owners’ death. Estate lawyers and some tech industry representatives say changes to the Electronic Communications Privacy Act allowing for the release may simplify things. [The Hill]

US – OKCupid Experiments with User Data on Whether Love Is Blind

Despite the privacy uproar that was caused when Facebook recently disclosed it had used user data to see “if emotions were contagious,” OKCupid this week disclosed the results of three experiments it recently conducted on users, including whether users rated potential matches’ personality in correlation with their looks. OKCupid’s user agreement does state that, upon signing up to use the site, personal data may be used for research and analysis. [The New York Times]

WW – Coke and Keurig Partner for Drink Data

Emboldened by the useful data gathered from its Freestyle home soda fountains,Coca-Cola has partnered with Keurig to gather consumption data from the company’s new Keurig Cold machines. Launching next year, the machines will allow consumers to make one-off carbonated beverages, including Coke products, and will send data about what people are drinking back to the Keurig and Coke home offices. Coke is Keurig’s largest shareholder. “We’ll know exactly—with the consumer’s permission, of course—what they’re drinking and when they drink it in their home,” The Coca-Cola Company’s Deryck Van Rensburg said. “Imagine what you can do with that.” Coke used feedback from Freestyle to make the decision to bring Cherry Fanta to store shelves. [Quartz]

WW – Research: Sustainably Managing Large Numbers of Accounts / Passwords

Abstract: We explore how to manage a portfolio of pass-words. We review why mandating exclusively strong passwords with no re-use gives users an impossible task as portfolio size grows. We find that approaches justified by loss-minimization alone, and those that ignore impor- tant attack vectors (e.g., vectors exploiting re-use), are amenable to analysis but unrealistic. In contrast, we pro- pose, model and analyze portfolio management under a realistic attack suite, with an objective function costing both loss and user effort. Our findings directly challenge accepted wisdom and conventional advice. We find, for example, that a portfolio strategy ruling out weak pass- words or password re-use is sub-optimal. We give an optimal solution for how to group accounts for re-use, and model-based principles for portfolio management. [Full paper]

E-Government

AU – Australian Government Keeping Voting Source Code Secret

Australia’s government is refusing to share the source code for the software used in the country’s elections, claiming that “publication of the software could leave the voting system open to hacking or manipulation.” Experts point out that the source code for voting software “implements a very subtle, complex algorithm,” and needs to be open to scrutiny to find and fix problems. [SMH] See also: [B.C. government needs to fix archiving] ]

E-Mail

WW – Dark Mail Project Seeks to Hide Metadata from Snoops

An email privacy project called Dark Mail aims to hide users’ communications metadata, information the NSA has been collecting wholesale for years. Metadata is usually not encrypted, even when the email messages are. The project is a joint effort between Ladar Levison, who founded security email service Lavabit, and Steven Watt, who in 2011 completed a two-year in prison sentence for writing a packet sniffer for TJX data breach mastermind Albert Gonzalez. The Dark Mail project comprises an eMail client called Volcano; server software Magma Classic and Magma dark; and the Dark Mail protocol. Most email encryption services work within a closed community – users can communicate only with other people who also use the service. But Dark Mail is seeking to move beyond that model; Levison and Watt want it to work with existing email programs. [WIRED] SEE ALSO: a federal judge in New York has granted prosecutors access to a Gmail user’s e-mails as part of a criminal probe. And [Canada: CASL: Still Muddy Waters]

US – Court Says Warrant for Access to All Content of Email Account is Justified

A New York judge defended a controversial order that gave the government access to all content of the Gmail account of a target in a money laundering investigation, holding that courts have long recognized the practical need for law enforcement to seize documents if only to determine whether they fall within the warrant. The opinion, which will likely fuel the privacy debate in the country, is at odds with decisions by judges in several courts including courts in the Districts of Columbia and Kansas, Magistrate Judge Gabriel W. Gorenstein of the U.S. District Court for the Southern District of New York noted in an opinion Friday. The District of Columbia judge had refused disclosure of the contents of an entire email account because that would allow the government to actually seize large quantities of emails “for which it has not established probable cause.” The court in Kansas criticized a similar warrant as it failed to “limit the universe of electronic communications and information to be turned over to the government to the specific crimes being investigated.” The New York court, in contrast, granted on June 11 a warrant that permitted law enforcement to obtain emails and other information from a Gmail account, including the address book and draft mails, and to permit a search of the emails for certain specific categories of evidence. [Computerworld]

EU Developments

UK – Data Protection Fines Drive Up Compliance Elsewhere Across Industry

News of a data protection fine being served prompts nearly half of organisations operating in that sector to review their own data protection policies and practices (19-page / 104KB PDF), according to a survey commissioned by the ICO. Civil monetary penalties (CMPs) have a “clear impact” on how organisations served with the fines manage their own data protection responsibilities, but they also act as a “useful deterrent” to others, the ICO’s report said. Senior managers at approximately 60% of other organisations become more interested in data protection as a result of hearing about fines issued to other organisations, whilst 47% of respondents said that news of a data protection fine prompted them to introduce new data protection training for staff, it said. More than a quarter of organisations also conduct internal audits after hearing about others’ data protection fines, according to the ICO’s report. The ICO also said that it will review the guidance it has issued previously on issuing CMPs in light of the concerns raised during the research exercise about how the ‘substantial damage and distress’ test is interpreted. [Out-Law] [The ICO’s report (19-page / 104KB PDF] See also: [UK – Annual review of social media policies may not address regulatory risks, says expert]

UK – Legal Challenge Lodged Against New UK Data Retention Laws

A legal challenge is to be launched against new UK data retention laws that received parliamentary backing under a prioritised approval process earlier this month. Civil rights campaigners Liberty said it will seek a judicial review of the Data Retention and Investigatory Powers (DRIP) Act on behalf of two MPs, David Davis and Tom Watson. In a statement the MPs criticised the speed with which the DRIP Act gained parliamentary approval and questioned whether the new rules sufficiently protect individuals’ privacy rights. The DRIP Act replaces previous UK regulations on data retention that had implemented an EU law which earlier this year was ruled to be invalid by the EU’s highest court. The Court of Justice of the EU (CJEU) ruled that the EU Data Retention Directive disproportionately infringed on privacy rights enjoyed by EU citizens. Home secretary Theresa May said the speedy approval of the new rules was necessary to plug potential holes in UK intelligence gathering capabilities that could have arisen if the telecoms companies subject to the data retention requirements had stopped collecting the information in light of the CJEU’s ruling. [Out-Law] [Insights on the draft EU Data Protection Regulation from a UK Information Commissioner’s Office spokesperson who said while it is still subject to change, the draft regulation “provides a guarantee for freedom of expression”] See also: [UK – Emergency data retention law could fail same tests as the existing law]

EU – Legal Analysis Containing Personal Data Is Not Personal Data, Rules CJEU

The legal analysis used to support administrative decisions “cannot of itself” be classed as ‘personal data’ even if the analysis contains personally identifying information, the Court of Justice of the EU (CJEU) has ruled. As a result, the Court found that individuals do not have a right of access to the full legal analysis document under EU data protection laws. Under the EU’s Data Protection Directive, individuals have a general right to access the personal data stored about them by organisations. [Out-Law] [The CJEU’s judgment] SEE ALSO: Hogan Lovells Partner Eduardo Ustaran takes a look at what’s changed and the current state of play in the cookie ecosystem, noting DPAs “have realized that a large number of websites are cutting corners” and the fallout that might ensue. Checking In on the State of Cookie Consent

US – EDPS Workshop Examines Role of Privacy in Competition

The European Data Protection Supervisor (EDPS) recently hosted a workshop that determined “the world of ‘big data’ likely will require consideration of privacy in competition matters.” The workshop discussed the policy implications of big data and the digital economy in relation to data protection, competition and consumer protection. A report issued after the workshop noted, “Data protection and competition specialists do not necessarily speak the same language. Laws may currently be applied effectively to address visible large-scale abuses. But the laws seem not to cover the incremental ‘day-by-day drops into the ocean of data’ which are used to construct user profiles, where even seemingly innocuous data can reveal sensitive information.” [Hogan Lovells] See also: [EU: Privacy Officer To Head European Marketing Trade Group FEDMA]

US – Analyzing the Mutual EU-U.S. Distrust Over Privacy

The EU and U.S. have always had differing approaches to privacy and data protection, but since the Snowden revelations began making their way into the headlines, the gap and distrust has grown wider. “To help illustrate the nature of these doubts,” Berkeley Law Prof. Paul Schwartz commissioned a “mini-poll” that asked privacy attorneys in the U.S. and Germany their opinions about each region’s approach to privacy and data protection. Schwartz reveals each side’s concerns and how there “are no easy solutions to differences in EU-U.S. data protection.” “Instead,” he writes, “there are only tough discussions ahead.” Schwartz, in addition, highlights two lessons that can be learned from this analysis. [Privacy Perspectives] See also: Viviane Reding left the European Commission to become an MEP.

EU – Other News

EU ministers have undertaken efforts “to overcome ‘hurdles’ and agree on common rules for data protection laws“ at informal talks hosted by new the seat of the new EU presidency, Italy. Italian Justice Minister Andrea Orlando said, “There would be nothing worse than failing to agree on common rules.”

In the UK, the “Data Retention and Investigatory Powers Bill” was announced in the House of Commons, and BBC News reports that Prime Minister David Cameron “has secured the backing of all three main parties for the highly unusual move.” And here’s an analysis from Bird & Bird lawyer Graham Smith on “DRIP.”

The European Data Protection Supervisor said EU institutions may have to notify him when personal data processing operations “are likely to present specific risks to the rights and freedoms of data subjects.”

LexisNexis published “Company Lawyers: Independent by Design,” a whitepaper from the European Company Lawyers Association (ECLA) that includes a chapter on the role and function of the data protection officer (DPO) under the proposed European regulation, noting, the “required skill set, relationship with management and with the business and the ethical dimension of the role remain at an early stage.” ECLA is collecting feedback on the whitepaper until the end of September.

The Constitutional Court of the Republic of Slovenia “abrogated the data retention provisions of the Act on Electronic Communications,” Slovenia’s Information Commissioner’s Office reports, noting, the decision “represents an important part in the debate about the necessity and proportionality of the use of surveillance measures and technologies in the context of law enforcement and intelligence agencies.”

Filtering

EU – Court Orders to Block the Pirate Bay are Ineffective

Traffic to The Pirate Bay site has doubled since 2011, even though courts in several countries have ordered Internet service providers (ISPs) to block the site and its founders have been sentenced to prison for various offenses. Nearly 10 percent of users visiting the site do so through a proxy. In a nod to the ineffectiveness of such blocks, a Dutch appeals court recently ruled that ISPs should not block The Pirate Bay at IP and DNS levels because those methods are ineffective. [Ars Technica]

US – NSA: Releasing Snowden Emails Would Violate His Privacy

The National Security Agency says it can’t release emails sent by exiled whistleblower Edward Snowden to NSA officials because doing so would invade his personal privacy. That rationale was one of several given to journalist Matthew Keys, formerly social media editor at Reuters, in response to a Freedom of Information Act request that sought emails sent from ejsnowd@nsa.ic.gov in the first five months of 2013. Keys published the NSA’s response on Thursday. The NSA’s FOIA office, which is dealing with a significant backlog, could not immediately supply a copy to U.S. News. Snowden has said repeatedly he raised concerns internally when he worked as an NSA contractor before he decided to leak documents that exposed the agency’s sweeping – and arguably illegal – surveillance programs. [Source]

Finance

WW – OECD Unveils ‘Global Standard’ to Combat Tax Fraud and Banking Secrecy

A new global standard for the automatic exchange of financial information aims to “put an end to banking secrecy” in tax matters and increase transparency, the Organisation for Economic Co-operation and Development (OECD) said. The ‘Standard for Automatic Exchange of Financial Account Information in Tax Matters’, launched by the OECD on 21 July, calls on governments to obtain detailed account information from financial institutions and share the information automatically with other jurisdictions each year. The standard, developed by the OECD at the request of the G20 group of the world’s largest advanced and emerging economies, will be formally presented to G20 finance ministers next September. OECD secretary-general Angel Gurria said the organisation’s message to the G20 “will be clear and simple… the automatic exchange of information standard is ready for implementation”. The standard provides for annual automatic exchange between governments of financial account information, including balances, interest, dividends, and sales proceeds from financial assets, reported to governments by financial institutions and covering accounts held by individuals and entities, including trusts and foundations. More than 65 countries and jurisdictions have already publicly committed to implementing the standard, while more than 40 have committed to making the first automatic information exchanges in 2017. This includes a group of OECD and non-OECD countries which have adhered to the OECD declaration on automatic exchange of information in tax matters (7-page / 1.12 MB PDF) as well as a group of ‘early adopters’. The OECD said more jurisdictions are expected to commit to implement the standard in the run up to the Global Forum Transparency and Exchange of Information for Tax Purposes hosted by the German finance ministry in Berlin next October [Out-Law]

FOI

US – Microsoft Makes Privacy Part of Its K-12 Branding

Microsoft’s is striving “to position itself as a protector of student-data privacy” and to back up such claims. The company has spent the last year supporting academic research on privacy and guides for school officials. Earlier this year, its chief technology officer said, “Students are not products … We have a long way to go across the industry … in getting everyone on board with protecting students, and to a great degree, teachers, too.” As maker of many services for schools, and with rising concern about student privacy, the company is focusing on an issue “that has surged in the consciousness of parents and school officials,” the reports states. [McClatchy News Service] See also: [NL: Access to information watchdog in court over attorney-client privilege]

US – San Francisco Announces Open Data Plan

Five months after San Francisco’s appointment of Joy Bonaguro as its first chief data officer, the city has a new open data strategic plan, aiming to improve on its data quality and expand its data-driven decision-making. The city also aims to support the “democratization of consumer data,” the report states, allowing individuals to access data the city stores about them, although confidential data containing individually identifiable information will not be among the data shared. “Given the distributed nature of individual data, we expect this to be a complex undertaking, and we will focus on background research and planning in year one,” the city’s strategic plan states. [Full Story] [San Francisco’s Chief Data Officer wants to help citizens make data-driven decisions] See also: [Canada: First Nation chiefs’ salaries due to be posted under Transparency Act]

Genetics

CA – Privacy Watchdog Urges Insurers Not to Ask for Genetic Test Results

Canada’s privacy watchdog has called on the country’s health and life insurance industry not to ask applicants for access to existing genetic test results, “until such time as they can be shown to be demonstrably necessary and effective”. The Office of the Privacy Commissioner (OPC) acknowledged that “insurance industries need to collect and use personal information to assess risk”, but said “that a legitimate need does not necessarily give an organisation the authority to collect any and all personal information on the grounds that it might be useful or relevant”. OPC said its call would “effectively expand the industry’s current voluntary moratorium on asking applicants to undergo genetic testing”. OPC said in a policy statement that it had analysed the collection and use of genetic test results in light of existing legislation relating to personal information protection. [Out-Law] See also: [DNA tests: Child’s rights override parents privacy concerns]

CA – Canada Works to Institute a National Missing Persons DNA Databank

The Conservatives’ latest budget, tabled in February, pledged up to $8.1-million over five years starting in 2016-2017 to create a DNA-based national missing persons index (MPI). Public Safety Minister Steven Blaney, the lead minister on the file, told The Globe and Mail he is committed to tabling legislation by the end of 2015. He said it’s “realistic” to foresee the government creating a national MPI and a national human remains index (HRI), both of which could be housed at the RCMP’s existing National DNA Data Bank facility in Ottawa. Mr. Blaney also said it’s within the realm of possibility to cross-reference those two indexes with two existing ones – the crime scene index (CSI) and the convicted offenders index (COI) – to search, for example, for missing people like Lindsey at known crime scenes. The measure is in draft stage, he said, and it’s too soon to know exactly how it will unfold or what the consultation process will yield, including with regard to privacy. [The Globe and Mail]

Google

US – Google Must Face U.S. Privacy Lawsuit Over Commingled User Data

A federal judge has refused Google’s bid to dismiss a privacy lawsuit that claims Google “commingled user data across different products and disclosed that data to advertisers without permission,” Reuters reports. U.S. District Judge Paul Grewal ruled Monday that Google must face breach-of-contract and fraud claims, though parts of the suit were dismissed. Grewal had dismissed two earlier versions of the suit but wrote in his decision this time, “Like Rocky rising from Apollo’s uppercut in the 14th round, plaintiff’s complaint has sustained much damage but just manages to stand.” The suit stems from Google’s changes to its privacy policy in March 2012. Meanwhile, plaintiffs in a class-action lawsuit over Target’s data breach have protested the company’s request that discovery be delayed. [Reuters] See also: [US Supreme Court And European Union Expose Google’s Massive Privacy Liabilities]

WW – Google’s Project Zero Aims to Protect Privacy, Improve Internet Security

Google Project Zero is aiming to find software vulnerabilities and to protect Internet users’ privacy. People should “be able to use the web without fear that a criminal or state-sponsored actor is exploiting software bugs to infect your computer, steal secrets, or monitor your communications,” according to Google Researcher Herder Chris Evans. [ZDNet] [CNN] [Googleonlinesecurityblogspot] See also: [Google wants to know how the human body works]

Health / Medical

EU – Data Protection Reforms Should Enable ‘One Time’ Patient Consent

New EU data protection laws should not force medical researchers to seek consent from patients each time they wish to use their data or tissue samples in a new research project, the European Society of Medical Oncologists (ESMO) has said. ESMO warned that “the survival of retrospective clinical research, biobanking, and population-based cancer registries in the EU” would be put at risk if current proposals backed by MEPs earlier this year are introduced into law. It said that the MEP’s plans “imposes, or may be interpreted as imposing, the requirement for researchers to ask for a patient’s ‘specific’ consent every single time new research is carried out on already available data and/or tissues”, and said this would “lead to the necessity of researchers continuously asking patients to ‘re-consent’ for every single use of their data.” ESMO said that it would be better if the new General Data Protection Regulation gave medical researchers the right to use patient data and tissues “forever” on the basis of a “one-time consent” to that use from patients. “This consent could be withdrawn by the patient at any time, but researchers should not be compelled to ask for ‘re-consent’ by patients whenever new research is planned on their data and/or tissues,” ESMO said in a new position paper on the risks of the proposed new EU data protection framework. [Out-Law] [The ESMO position paper on the risks of the proposed new EU data protection rules] See also: [UK – Electronic health records can help simplify drugs trials, study finds] and also: [Will Capitol Hill Relax Healthcare Regs in the Name of Innovation?]

US – Recent HIPAA Cases Indicate Confusion, Misuse of Law

A litany of recent HIPAA-related cases indicates the law is open to misinterpretation and may sometimes provide cover for the health organization involved rather than working in the patient’s best interest. For example, a security guard in Missouri recently threatened a mom taking a picture of her son in the hospital and a Florida nursing home said it couldn’t cooperate with police investigating allegations of a crime against one of its residents. “Sometimes it’s really hard to tell whether people are just genuinely confused or misinformed, or whether they’re intentionally obfuscating,” said Manatt, Phelps & Phillips Partner Deven McGraw. [ProPublica] See also: [Tiny digital doctors to track your health] and [This amazing remote-controlled contraceptive microchip you implant under your skin is the future of medicine] and [Turkey: Our General Health Data Is On Free Trade! Who Wants To Buy?]

Horror Stories

UK – UK Travel Agency Fined for Violating Data Protection Act

The UK Information Commissioner’s Office (ICO) has fined a travel company GBP 150,000 (US $255,000) for failing to adequately protect customer data. By exploiting a coding error on the company’s website, attackers were able to steal customers’ credit card details dating back to 2006. Payment card data had never been deleted from the system and the system had never been tested. The company, Think W3 Limited, was found to have violated the Data Protection Act. [v3.co.uk] [The Register] See also: [US – Thousands Affected After South Carolina Hospital Suffers Laptop Theft] and [AU – Company Informs Customers of Breach Three Years After the Fact]

US – Dept. of Commerce IG Report Finds “Significant” Security Issues at NOAA

According to a report from the US Department of Commerce’s office of inspector general, satellite data were stolen from a National Oceanic and Atmospheric Administration (NOAA) contractor’s personal computer last year, but there has not been an investigation because the employee refused to allow NOAA to conduct a forensic investigation on the laptop. The report also noted other “significant security deficiencies” at NOAA, including unauthorized use of smartphones and thumb drives on sensitive systems. [NextGov] [OIG.doc.gov] See also: [GAO Says FDIC Cyber Security Still Needs Improvement] and also: [More Details Emerge About 2010 NASDAQ Breach] And [CA — Canada: National Research Council computers hacked]

US – EBay to Face Class-Action; Researchers Find Privacy Flaw

EBay is facing a class-action lawsuit after alerting users in May of unauthorized access to its systems. While the company says no financial data was accessed, the plaintiffs in the case allege eBay’s inadequate security led to the breach and have asked for a jury trial to settle the matter with combined claims of more than $5 million. Meanwhile, researchers from New York University have uncovered what they call a “privacy flaw” and “security breach” in eBay’s buyer feedback program allowing any individual to view the feedback. According to the research, “it is relatively easy to match the timestamp of the sale” with the seller’s feedback “and thus identify the item that was purchased.” [PCWorld] [Flaw in eBay lets your spouse know what you are buying]

US – Breach Settlements Come with High Costs

Two separate organizations are doling out funds for settlements following recent breach incidents. Equilon Enterprises LLC’s settlement of almost $2 million. The company, which recorded calls from customers contacting Shell Oil, is paying “to settle a class action alleging its actions violated California privacy laws,” the report states. Meanwhile, Boston.com reports Women & Infants Hospital of Rhode Island has agreed to a $150,000 settlement of “data breach allegations that affected more than 12,000 Massachusetts patients” whose “names, dates of birth, Social Security numbers, dates of exams, physicians’ names and ultrasound images” were allegedly compromised in a 2012 breach. [Boston.com] [Law 360] See also: [Data Breach Bulletin: Russian Hacker Claims To Have Infiltrated Both Wall Street Journal and Vice incl: Wall Street Journal and Vice | European Central Bank | Goodwill StubHub | Self Regional Healthcare | Women & Infants Hospital of Rhode Island] CBS Chicago reported that Illinois Attorney General Lisa Madigan called for a federal agency designed to investigate data breaches, saying, “It just makes sense that somebody has to take responsibility in this day and age for putting in place safety standards for our personal financial information…”

US – FedEx: Drug Indictment Is Result of Focus on Customer Privacy

A 15-count indictment against FedEx was handed down last week alleging the company helped “illegal online pharmacies traffic the sale of prescription drugs,” but the company says the issue comes down to privacy. The indictment claims that since at least 2004, FedEx “knowingly shipped controlled substances and prescription drugs for illegal Internet pharmacies despite warnings from the Drug Enforcement Administration, the Food and Drug Administration and Congress.” But FedEx says it will plead not guilty, arguing it is not a shipping company’s job to prevent the sale of illegal drugs. A spokesman said customer privacy is essential to the core of FedEx’s business and that privacy is now at risk. [Full Story] [FedEx: Drug Shipping Indictment a Matter of Privacy]

US – 72,500 Bank Customers’ Data Breached

Florida-based TotalBank is notifying 72,500 customers their account information was potentially compromised after an unauthorized third party accessed the bank’s computer network. Compromised information may include names, contact data, account numbers, balances and other personal identifiers—such as Social Security numbers and driver’s license number—but, according to the bank, accounts were not accessed. Krebs on Security reports on Indexeus, a search engine that compiles user account data gathered from recent data breaches. The site says it has more than “200 million entries available to our customers”—much of it gathered from “hacker forums that have been hacked, or from sites dedicated to … powerful servers that can be rented to launch denial-of-service attacks aimed at knocking websites and web users offline.” [BankInfoSecurity] See also: [NB: Privacy commissioner urges disciplinary action against doctor]

UK – Dublin Company Alerts 650,000 of Breach

A Dublin company is alerting nearly 650,000 customers that their personal information has been compromised in a hacking incident dating back to 2010. Paddy Power, which provides betting and casino games, among other services, says the data compromised included individual customer names, usernames, addresses, email addresses and more. Financial information was not compromised, however. The company has contacted the data protection commissioner and the police, advised customers to review other sites where they might use the same username and prompted security questions to change that information. The extent of the breach, a result of hackers, was uncovered with the assistance of Canada’s Ontario Provincial Police. [Irish Times]

Identity Issues

EU – New EU Rules on Cross-Border Electronic Identification Finalized

The Council of Minsters’ General Affairs Council voted to support the Regulation on e-ID and trust services at a meeting last week. The Regulation is expected to come into force shortly. The European Parliament previously gave its backing to the new rules in April. Under the new rules, EU countries would have the option of signing up to a ‘mutual recognition’ scheme for e-ID. Many member states have national e-ID schemes that are relied upon for verifying the identity of consumers when transacting or engaging with public services online. In a move designed to boost cross-border trade in the EU, the e-ID schemes used nationally would be recognised by other EU countries if the countries agree to give recognition to the national e-ID schemes operated by those other nations, under certain conditions. Only national e-ID schemes that are “interoperable” could be put forward by EU countries for participation in the mutual recognition regime. The mutual recognition scheme is not expected to be in operation until the latter half of 2018. [Out-Law] [The finalised Regulation on e-ID and trust services]

CA – Privacy Analytics Raises $3.5 Million

Khaled El Emam and his work provides de-identification solutions for the transfer of health data. Now, his software start-up Privacy Analytics has announced $3.5 million in seed financing. Investors include Bell Canada and the Ontario Institute for Cancer Research. While running a research lab associated with the Children’s Hospital of Eastern Ontario, El Emam developed software, now called Parat, that scores the potential risk of re-identifying individuals in shared data while making the health data anonymous. According to the report, Privacy Analytics looks to hire three additional employees by the end of October. [Ottawa Citizen]

WW – How to Go Semipublic in the Google Age

After a longstanding real-name policy, Google+ announced that “there are no more restrictions on what name you can use.” The policy had been criticized by journalists and privacy advocates who said pseudonyms were needed to protect users for valid reasons. Will Oremus writes about a recent article in The New York Times detailing one former college student’s struggles after being raped and how the Times decided to use her first name and face but not her last name. Oremus writes, “And then I realized: Anna and the Times aren’t trying to hide her identity from anyone who’s ever met her. They’re trying to hide it from all the people who never have. That is, they’re shielding her identity from Google.” Meanwhile, BBC News reports a website has been created to list items Google has removed due to the EU’s right-to-be-forgotten decision. [Slate] [You no longer have to use your real name on Google+.] See also: [De-Identification: A Critical Debate: Why de-identification is a key solution for sharing data responsibly] and [On Why Surprise Minimisation Is a Misguided Principle]

Intellectual Property

UK – Digital Economy Act Copyright Regime Shelved by UK Government

Work on a new online copyright enforcement regime under the Digital Economy Act (DEA) has been shelved now that rights holders and internet service providers (ISPs) have voluntarily agreed a framework for educating alleged infringers about the harm of piracy, the UK government has confirmed. [Out-Law]

US – Advocates Hope SCOTUS Ruling Catches Fire

Privacy advocates are hoping the Supreme Court’s unanimous ruling on cell phone privacy last month will have a broader impact than just that case itself-perhaps even leading to the end of the government’s post-9/11 surveillance of telephone records. After all, Chief Justice John Roberts’ cell phone opinion was an “emphatic, emphatic message from the court that digital is different,” said one law professor. The question is, how different? Will it be enough to “topple a 35-year-old court precedent that denied privacy protection to telephone records shared with third parties?” Separately, a federal judge in New York has granted prosecutors access to a Gmail user’s e-mails as part of a criminal probe. [USA Today]

Internet / WWW

US – Is the Internet of Things Getting Too Big?

US presidential policy advisers are concerned that the Internet of Things is simply too large. Companies that are making some of the items, such as refrigerators, “are not information companies, and the effect is that we are much more vulnerable,” according to Defense Policy Board and President’s Intelligence Advisory Board member Richard Danzig. A report from Danzig’s Center for a New American Security suggests that security can be improved by paring down systems to their essentials, so that they may be able to do less, but also will present fewer opportunities for security problems. [NextGov] See also: [NYT: The Next Big Thing in Hardware: Smart Garbage]

WW – Cloud Services Can Impede Forensic Investigations

As governments have moved to cloud services, they have saved money and improved efficiency, but the technology holds some challenges to forensic investigations. A draft report from the National Institute of Standards and Technology (NIST) describes 65 “challenges” forensic investigators encounter when dealing with cloud computing. The report classifies the challenges into nine categories, including data collection, analysis, and architecture. One example of a challenge is email. On non-cloud systems, deleted email messages can often be recovered because they are not truly deleted until they are over-written. Because of the shared nature of the cloud, deleted files are more likely to be overwritten. [NextGov] [NIST Report]

WW – Hackers Find Security Flaw, Offer Enhanced Privacy Option

Nest allows users to regulate the heating and cooling in their homes, but it also might allow hackers with physical access to the device to gain access to its system. A group of researchers from the University of Central Florida found they could do so, allowing them to siphon data and install malware into the system. Acquiring that kind of sensitive data potentially reveals personal details about living habits. They’ll present their findings at Black Hat security conference in August, and they say there may be a “privacy upside.” They’ve written a program that would allow users to stop data from being sent back to Nest headquarters, for enhanced data protection. [Forbes] [Nest Hackers Will Offer Tool To Keep The Google-Owned Company From Getting Users’ Data]

WW – Microsoft Launches Online Take-Down Request Form

Microsoft has launched an online form to take requests from European residents that want to delete old or outdated search results for their names. Google launched a similar form in June after Europe’s highest court ruled it must allow for such a request. Microsoft said it plans to study how many requests it gets before moving to implement any more takedown requests. Meanwhile, a recent Microsoft survey found that 83 percent of American voters agree with a recent Supreme Court decision requiring police to get a warrant before searching someone’s cellphone. [Wall Street Journal]

WW – Samsung Rumored to Have Purchased SmartThings for $200 Million

Samsung may have reached a deal with home automation company SmartThings for approximately $200 million. The service allows its users to remotely connect and control devices in their home—including door locks and lights. The move is part of a larger play by other companies—such as Google, Amazon and Apple—to get into the Internet of Things (IoT) ecosystem and “be the first to own your home and data,” the report states, adding, “What they do with that data will depend on the player.” Additionally, Samsung has joined forces with Google and other companies to launch Thread, a new standard protocol for the IoT. [TechCrunch]

US – Ford and Intel collaborate to make cars that identify their drivers

The trend has been to outfit vehicles with cameras facing outside for the purposes of safety and convenience, but now Ford and Intel are pointing cameras inwards toward the driver for the same reasons. Dubbed Project Mobii, the collaboration was announced during a recent presentation at a Ford conference. Still in a conceptual phase, its stated purpose is to bridge connected cars with the Internet of Things, allowing them to interface more seamlessly with mobile devices for safer usage. The idea of an interior-facing camera is meant to identify who is driving via face recognition, and tailor the in-car experience based on his or her preferences. These could include seat adjustment, radio presets, contacts, navigation maps and more. The car’s internal data connection would also enable car owners to peer into the vehicle remotely using a smartphone or tablet. In recognizing a driver and front-seat passenger, the camera could sense who is reaching for the head unit’s screen and open the system up for unfettered use to the passenger, while locking out the driver. In turn, the passenger would be locked out of any personal information the driver has in the system. Under this scenario, unrecognized drivers wouldn’t be able to start the car unless the vehicle owner approves them through a mobile app. Temporary access can then be given with parameters that can limit top speed, apply a geo-fence perimeter, ban extra passengers and restrict access to the infotainment system. Refusal to abide by the rules would allow the owner to monitor the driver in real time. [The Globe and Mail]

Law Enforcement

US – Wisconsin High Court Sides With Police In Cellphone Tracking Suits

The Wisconsin Supreme Court issued twin rulings stating police had the authority to track suspects through their cell phones, in one case absent a warrant, rejecting claims that the searches violated their rights under the Fourth Amendment.

US – Wisconsin Supreme Court Allows Stingray Use in Murder Case

In a narrow decision, the Supreme Court of Wisconsin upheld a lower court decision permitting the warrantless use of devices known as stingrays, which can track cell phone locations. In this particular case, the court found that while Milwaukee police had not obtained a warrant to use the stingray to determine a murder suspect’s location, a related judicial order served the same purpose. [Ars Technica] [DocumentCloud] [Law36: Wisconsin High Court Sides With Police In Cellphone Tracking Suits]

CA – Millions of Police Requests for Canadians’ Data Every Year: Report

Government authorities have been making millions of requests to telecommunications companies for Canadians’ personal information as far back as 2006, newly released documents show. Internal documents from Public Safety Canada reveal authorities requested telecom companies to turn over “basic subscriber information” at least 1.13 million times a year between 2006 and 2008. That figure matches revelations from the federal privacy watchdog earlier this year that authorities sought subscriber information 1.2 million times in 2011. “It suggests that there have been huge numbers of requests for years now taking place largely below the radar screen . . . without very much public awareness,” said Michael Geist, a University of Ottawa law professor and Star columnist, who obtained the documents. “Basic subscriber information” can include details like name, address, Internet protocol (IP) address, telephone number, email address and local service provider identity. The federal government and law enforcement agencies have argued this amounts to “phonebook information” — police seem to generally request names and addresses — but privacy advocates warn it can lead authorities to more personal and detailed information. [The Star] See also: Opinion: Come Back With a Warrant: How Will the Canadian Government Respond to the Supreme Court’s Reshaping of Privacy Law? ]

Location

US – Panel Approves Giving Police Emergency Access to Cellphone Locations

The House Energy and Commerce Committee has passed a bill that would allow law enforcement agencies to access cell phone users’ geolocation information in emergencies. The Kelsey Smith Act—named after a Kansas teen who was murdered in 2007—was passed Wednesday after being introduced last year by Rep. Kevin Yoder (R-KS). The bill was amended after Rep. Greg Walden (R-OR) pushed for privacy protections—including a court’s required approval to retroactively approve emergency requests for cell phone location information—to be added in the name of finding the “right balance to save lives and prevent abuse,” Walden said. [The Hill]

CA – Database maps Saskatoon, Regina violent crime sites by address

The website www.housecreep.com is a national database of “stigmatized properties.” Plug an address into its search engine and a property’s unsavoury history emerges. The categories run the gamut of human tragedy: Homicide, shooting, stabbing and murder are all covered. So are meth labs, grow ops, dismemberments and mental illness. [Source] See also: [Cat location tracking website stokes fire on privacy debate]

Offshore

US – Judge Finds Data’s Controller Trumps Its Location

U.S. District Judge Loretta A. Preska ruled that U.S. law enforcement can force Microsoft to turn over emails it stores in Ireland. Preska agreed with the findings of a magistrate judge who approved a sealed search warrant in December as part of a narcotics investigation. It came down to the question of who controlled the data rather than where it was stored. The judge did, however, stay the effect of her ruling to allow for an appeal from Microsoft, the report states. Microsoft General Counsel Brad Smith said the company will “appeal promptly and continue to advocate that people’s email deserves strong privacy protection in the U.S. and around the world.” [Associated Press]

Online Privacy

EU – Update on Right to Be Forgotten

Google’s committee of experts has convened following Europe’s right-to-be-forgotten ruling. The council includes Google’s Eric Schmidt and David Drummond as well as independent experts, but “the entire strategic endeavor is of Google’s making … so should be viewed in that context,” the report states, arguing the company is “creating its own privacy debate forum to grab attention and exert pressure for regulatory reform.” Meanwhile, a report by a UK House of Lords subcommittee says the right to be forgotten “must go,” and Google, Microsoft and Yahoo must this week respond to 20 questions issued by the European Commission on how they will meet right-to-be-forgotten requirements. [TechCrunch] Meanwhile, the Article 29 Working Party Chairwoman Isabelle Falque-Pierrotin and others are critical of Google’s right-to-be-forgotten response. Google’s decision to remove results only on EU search engines and its decision to notify media organizations when links have been removed are noted in the criticism. Italian DPA the Garante has issued a prescriptive rule to Google indicating changes Google should make to its data-handling practices in order to ensure compliance with “the applicable law and EU directive.” Rocco Panetta of NCTM Studio Legale Associato writes that, “[t]his is the first measure of this kind in Europe, and it is a result of a coordinated action with other European DPAs and follows the judgment of the European Court of Justice on the right to be forgotten.” See also: [Public Vs. Private Ain’t So Easy Anymore] [US: CDT’s O’Connor Calls on WP29 To Provide Clear Rules for RTBF Claims]

EU – Falque-Pierrotin Critical of Google RTBF Response

Criticism of Google’s implementation of the right to be forgotten from European data protection authorities (DPAs) continues in a Bloomberg report, which includes comments from Article 29 Working Party (WP29) Chairwoman Isabelle Falque-Pierrotin. “There has been a climate of controversy that’s been entertained in order to maybe endanger the right to be forgotten … It has led some people to say that the right to be forgotten leads to censorship of the press, which is not the case,” she said. Her comments come a day after regulators met with officials from Google, Microsoft and Yahoo. WP29 also released the questions it asked of the companies. Luxembourg DPA Gerard Lommel said the questions will help officials draft their guidelines and provide “food for further discussions in this matter.”

EU – DPAs Unhappy With Google’s Right-To-Be-Forgotten Implementation

European data protection authorities (DPAs) are concerned about how the so-called right-to-be-forgotten decision is being implemented by Google. Regulators plan to meet with officials from Google, Microsoft and Yahoo to discuss the implementation. One particular sticking point, according to the report, is Google’s decision to remove results only on EU search engines, meaning a quick search at google.com would sidestep any takedown request. Olswang Partner Ashley Hurst said, “Google has claimed that the decision is restricted to localized versions of Google … There appears to be no basis for that claim at all.” Another concern for DPAs—including Ireland’s Billy Hawkes—is the decision to notify media organizations when links have been removed. [Reuters] UPDATE: [Google Says RTBF Compliance Is Difficult with User Discretion on “Accuracy”] and [Italy gives Google 18 months to change data use practices]

US – Privacy Groups Call on FTC to Investigate Facebook

The FTC should investigate Facebook’s plan to collect the browsing history of its users, representatives from the European Consumer Organization (ECO) and the Center for Digital Democracy (CDD) have said. The ECO’s Kostas Rossoglou and the CDD’s Jeffrey Chester sent the FTC a letter arguing the company is violating an agreement with the FTC, Bloomberg reports. The groups, which have joined forces and call themselves the Trans Atlantic Consumer Dialogue, said in a letter addressed to FTC Chairwoman Edith Ramirez they “are writing to express their deep alarm.” [Bloomberg] See aso: [Slate: Facebook’s Privacy Pivot] SEE ALSO: [House Committee Questions FTC Authority]

WW – Facebook to Share Demographic Data with Nielsen

Facebook will share the age and gender of Facebook users who watch TV on their cellphones or computers with TV ratings measurement company Nielsen. The aggregated data will then be combined with other data—such as education level or relationship status, for example—to find trends among viewers of particular shows. A spokesperson for Nielsen said the data is anonymized and no personally identifiable information is transmitted between the two companies. But privacy groups are wary of the partnership ; an EPIC spokeswoman said consumers aren’t aware of “the extent to which Facebook is putting their non-Facebook activity to use.” [Journal Sentinel]

WW – Schrems Launches Global Class-Action Against Facebook

Max Schrems, founder of Europe-v-Facebook and initiator of a case Irish courts recently referred to the European Court of Justice, has filed a global class-action against Facebook. Austrian law allows for a group of people to transfer their financial claims to an individual, approximating a class-action. Schrems is seeking 500 euros per Facebook user, and people can join the case by logging in with their Facebook credentials at www.fbclaim.com . He alleges the harm comes from Facebook’s complicity with the U.S. government’s PRISM program. “We have this habit of pointing the finger at the United States, but we’re not enforcing our rights anyway,” Schrems told Reuters. “If we can get a class-action through like this, it will send out a huge signal to the industry overall.” [Reuters] See also: Austria’s data retention law was struck downby the Constitutional Court of Austria, saying, “it violates fundamental European privacy rights.”

WW – Cookies, Canvas Fingerprinting and Transparency

With news this week of new techniques being used to track consumers online—namely what’s being called canvas fingerprinting—Richard Beaumont writes, “The ideas behind browser and canvas fingerprinting have been around for some time now,” adding, “These techniques seem designed to get around standard browser controls that allow users to block tracking cookies relatively easily, but they also have an uncertain status with regard to the EU cookie laws.” Beaumont looks into the issue and argues why now is the time for “website owners to take responsibility themselves, in conjunction with the technology developers.” [Privacy Perspectives] [Research: The Web Never Forgets] [Canvas Fingerprinting is tracking you] [Stealthy Web tracking tools pose increasing privacy risks to users]

US – Brill Concerned About Apps Collecting Sensitive Data

App developers need to give consumers more tools and more choice over how sensitive health data is used. That’s the message FTC Julie Brill voiced at a panel discussion. “We don’t know where that information ultimately goes,” Brill said, noting that information is sometimes shared with third parties. The FTC released the results of a study on mobile health app developers in May, finding that many share data with third parties. In an interview with Reuters after the panel, Brill said “no one is talking about new regulations,” but the FTC has also made it clear that health data requires special protection. [Full Story] See also: [UK: Free Wi-Fi – but it’ll cost you your privacy] See also: AppMakers thanked the FTC for COPPA clarifications. Broadcasting & Cable reports that Morgan Reed, executive director of ACT: The App Association, said the FTC’s release “gives platforms and appmakers more guidance in areas where confusion has persisted.” And Sara Kloek, director of Moms With Apps, said the COPPA FAQ updates are “a major win for innovation and privacy.”

US – Netflix to Help You Hide Embarrassing Content From Your Activity Log

Netflix is testing a new privacy filter that helps users hide guilty pleasure content from their activity log. “At Netflix we continuously test new things. In this case, we are testing a feature in which a user watching a movie or TV show can choose to view in “Privacy Mode.” Choosing that option means the program will not appear in your viewing activity log, nor will it be used to determine recommendations about what you should watch in the future. Not everyone will see this and we may not ever offer it generally,” wrote Netflix’s new director of corporate communications, Cliff Edwards, in a recent press release. Netflix is currently testing the feature with a small group of subscribers across the streaming platform’s various territories. In order to access ‘Privacy Mode’ users have to click on a small globe icon while watching content. This activates privacy mode and doesn’t log what you’re watching in your activity feed. There’s no clear release date for the feature yet and Netflix is apparently still unsure if they’ll release Privacy Mode to all users according to Edwards. [Canada.com] See also: A federal judge authorized a subpoena to Craigslist and Amazon compelling the companies to disclose the personal details of anonymous commenters. Judge Marsha Pechman said the subpoenas would be “intended to learn the John Doe defendants’ identities including names, addresses, telephone numbers, e-mail addresses, IP addresses, web hosts, credit card information, bank account information and any other identifying information.”

Other Jurisdictions

RU – Russian Government Seeking Technology to Break Tor Anonymity

The Russian government is offering a 3.9 million rubles (US $109,500) contract for a technology that can be used to identify Tor users. Tor was initially developed by the US Naval Research Laboratory and DARPA, but is now developed by The Tor Project, a non-profit organization. Tor is used by journalists and others who need to keep their identities hidden for their own safety; it is also used by criminals for the same purposes. The entrance fee for the competition is 195,000 rubles (US $5,500). A new “blogger law,” passed earlier this year and going into effect in August, requires bloggers with audiences of more than 3,000 readers “to register their identity with the government,” but the law could be tough to enforce if bloggers use Tor. [BBC] [ComputerWorld] [Ars Technica] [Hacking Citizen Lab] See also: [Tor Says U.S. Researchers May Have ID’d Users]

RU – Putin Signs Data Localization Bill

Russian President Vladimir Putin has signed a law requiring Internet companies to store all personal data of Russian citizens on servers located within the country’s borders. Officials at the Kremlin said the law seeks to improve “the management of personal data of Russian citizens on computer networks,” and businesses that do not comply will be blocked. The new law could stymy dissent within the country—often expressed and disseminated via social networks such as Facebook and Twitter. The Association of Electronic Communication—a group that lobbies on behalf of Internet companies—said “many global Internet services would be impossible” under the law. [ZDNET] USA News reports that Russia’s new laws could have widespread negative consequences, from a loss of anonymity for bloggers to possible limited Internet access for residents due to the localized server requirement.

WW – Other News

New Zealand Justice Minister Judith Collins announced “significant improvements to privacy laws to ensure stronger protections for New Zealanders’ personal information.” However, ZDNet cited a security expert who suggested the expected proposals “are imprecise and don’t go far enough.”

Japan is set to pass cybersecurity legislation, noting recent cyber-attacks on Yahoo Japan, the country’s space agency, its largest defense contractor and Bitcoin operator Mt. Gox, as well as the highly publicised breach of Sony Playstation in 2011, have all threatened the world’s third largest economy.

The Monetary Authority of Singapore has provided guidelines that “explain the extent to which financial institutions have to observe individuals’ access and correction rights whilst ensuring compliance with their duties on conducting anti-money laundering and terrorist financing checks.”

Human Rights Watch called on Tunisia to amend its draft counterterrorism law “to make it fully consistent with international human rights standards on fair trial, privacyand freedom of expression.”

Privacy (US)

US – Obama Won’t Support CISA Until Privacy Concerns Addressed

A senior Obama administration official says the Cybersecurity Information Sharing Act of 2014 (CISA), which passed the Senate Intelligence Committee earlier this month, needs to have its privacy and civil liberties protection provisions strengthened before the president will support it. “Given some issues that the privacy community has raised, we need to take that into account as we … work on the bill,” said the official. The White House hasn’t taken an official stand on CISA, which aims to help the government receive information from businesses on cyber-threats. Privacy and civil liberties advocates wrote to Obama asking that he threaten to veto the bill. [Bank Info Security] UPDATE: The Cybersecurity Information Sharing Act was passed by the Senate Intelligence Committee. Then companies and privacy groups demanded Obama reject it. Then Treasury Secretary Jack Lew called for a cybersecurity law but didn’t even mention CISA.

US – Obama to Issue Drone Privacy Executive Order

President Barack Obama plans to issue an executive order to construct privacy guidelines for the commercial use of drones operating in U.S. airspace, Politico reports. The order would put the National Telecommunications and Information Administration (NTIA) in charge of the efforts. A White House spokesman said, “We don’t have any details to share at this time, but there is an interagency process underway.” The NTIA has already developed a code of conduct for mobile apps and is currently facilitating the development of a code for the commercial use of facial recognition technology. [Politico] Meanwhile, the FAA plans to permit small drones to be used for commercial purposes after media sources, energy companies, farmers and other groups put on the pressure. An FAA spokesman said the agency is drafting rules for small drones now that will be “issued for comment late this year,” but they could take several years to finalize. Also, a New York man escalated the drone debate after allegedly illegally taking video of hospital patients with his drone and then posting it to his Facebook page. SEE ALSO: [Opinion: Why Drone Benefits Outweigh Privacy Issues]

US – Court to Hear Wyndham Appeal in FTC Case

A federal appeals court has agreed to accept hotel chain Wyndham’s petition to appeal Federal Trade Commission (FTC) vs. Wyndham Worldwide Corporation et.al to determine whether the FTC has the authority to “bring charges against companies based on their alleged failure to protect consumers’ data.” The U.S. Chamber of Commerce, American Hotel & Lodging Association and National Federation of Independent Business filed a friend-of-the-court brief in support of the appeal, stating, “Whether the FTC’s enforcement authority … extends to regulation of data security is an issue of central importance to businesses that face the prospect of being investigated by the commission.” [MediaPost] [FTC Privacy Casebook]

US – Hartzog and Solove: How Broad Should FTC’s Regulatory Powers Be?

Profs. Woodrow Hartzog and Daniel Solove have released a paper on the scope and potential of the FTC’s data protection regulatory powers. “For more than 15 years, the FTC has regulated privacy and data security through its authority to police deceptive and unfair trade practices … Recently, the FTC’s powers for data protection have been challenged by Wyndham Worldwide Corporation and LabMD,” write Hartzog and Solove in the paper’s abstract. “These recent cases raise a fundamental issue, and one that surprisingly has not been well explored. How broad are the FTC’s privacy and data security regulatory powers? How broad should they be?” [Source]

Privacy Enhancing Technologies (PETs)

US – NIST Workshop to Collocate with Privacy Academy

The National Institute of Standards and Technology (NIST) has announced its Second Privacy Engineering Workshop will be held September 15-16 in San Jose, CA, in conjunction with the IAPP Privacy Academy and CSA Congress, which kicks off September 17 in the same complex. The workshop will consider engineering definitions and concepts with the intent to inform the development of the NIST report on privacy engineering. Registration and agenda details will be available soon. Meanwhile, three researchers have released a new paper, “ Privacy Mindset, Technological Mindset,” which argues that “a major obstacle for (Privacy by Design) is the discursive and conceptual gap between law and technology.” [NIST Press Release] See also: [Removing the Gap Between Privacy Engineers and Lawyers] and [Privacy Literacy for the Next Generation of Privacy Leaders: Georgetown Law Center Aims To Bridge the Gap Between Technologists and Privacy Lawyers]

US – Snowden Calls for Privacy by Design; Academics Win Award

Speaking at the Hope X conference via videolink over the weekend, Edward Snowden called on developers to build privacy protections into systems by design. He said encryption is an “important first step,” but added, “It doesn’t end at encryption; it starts at encryption.” Snowden said now’s the time “to help build a better future by encoding our rights into the programs and protocols upon which we rely … every day.” He also added that he intends to work on privacy-enhancing technology as well. In a related report, a team of Princeton and University of Texas at Austin researchers have been awarded a 2014 PET Award for their paper, “A Scanner Darkly.” The paper presents a privacy-enhancing layer to “perceptual computing.” [TechCrunch] [Snowden: NSA employees share intercepted sexts] See also: [Forbes: Forget Glass. Here Are Wearables That Protect Your Privacy]

WW – OpenPDS Would Give Users Data-Sharing Choice

A new system would allow Internet users to choose which data to share with websites and mobile apps. Prototype system openPDS—short for personal data store—stores data in a single location that users specify and then any cellphone app, online service or big data team that wants to use the data must “query your data store, which returns only as much information as is required,” the report states. In addition, the data that is shared is code instead of raw data. The MIT researchers who developed the system are now testing it with telecommunications companies in Italy and Denmark. [MIT News]

WW – Personal Robot Means Privacy Concerns, But May Be More Transparent

A new personal robot will be sold commercially in 2015. Jibo has sensors and will live in users’ homes—but that means privacy concerns such as the gathering, processing and storing of information. It also means the feeling of being observed, the report states. Users will no longer type a search phrase into a field but will instead ask the robot for help in finding information. But an advantage of Jibo is that it won’t be silently collecting data on the user and sending it back for processing at some ISP homebase; instead it will provide “visceral notice” of the collection of information—”more powerful, certainly, than any privacy policy,” the report states. [Forbes]

WW—Startup Unveils Portable, Encrypted Server

In one of the latest privacy-enhancing innovations, a UK start-up has released a portable server that comes with SSL/TLS and GPG encryption and only requires a WiFi network and AC plug to operate. The Wedg can host e-mail and cloud storage, with various levels of encryption, and is not susceptible, according to the company, to government surveillance. “Many small businesses are still using Gmail as their default e-mail solution. With a hosted service solution, the potential risk of data leakage and infiltration from other influences is great, but with Wedg, everything is hosted locally,” Wedg CEO Shehbaz Afzal said. [International Business Times] [UK: Paranoid About Online Privacy? How About a Portable Cloud Email Storage Server Instead]

WW – New E-mail Encryption Service Promises Even It Won’t Have the Keys

Enlocked has announced the release of an e-mail encryption solution that employs military-grade e-mail security. Enlocked caters to small businesses and independent professionals and aims to simplify encryption technology. The service encrypts and decrypts messages on users’ computers locally with a key, and the messages can only be unlocked with the users’ secure passphrases, which even Enlocked won’t know, according to a press release. Meanwhile, in response to a recent BlackBerry blog post criticizing encrypted phone Blackphone’s approach to privacy, CEO Toby Weir-Jones has fired back. [Source]

EU – Old Technology in the Modern Age: Typewriter Sales Surge in Germany

German typewriter makers such as Bandermann and Olympia have cited climbing sales amid NSA spying revelations. Meanwhile, Olympia spokesperson Andreas Fostiropoulis told Wirtschaftswoche magazine that the company expects typewriter sales to hit a 20-year high in 2014. German defense contractor Diehl switched from computers to typewriters last year. Earlier in July, German politicians said they were considering going back to old-fashioned manual typewriters for confidential documents, in order to protect national secrets from American NSA spooks. [nationalheadlines.co.uk]

US – New App Promises Privacy

Washington: Are you worried that your messages or pictures are not deleted completely after you send or receive them? Here comes a messaging app that promises to provide you the much sought after privacy by removing all your messages – texts, pictures or videos – after you send or receive them. Called Wiper, the app can delete anything sent or received. If you are having a chat and want it removed, all you have to do is select “Wipe” from within a chat. The messages – whatever they might be – are also removed from Wiper’s servers. If you make a call using Wiper, your call logs are also deleted, leaving no trace of any interactions you may have via the service, Slash Gear reported. Wiper says you can send text, videos, pictures or anything else via a closed system. This free to use app is available on both App Store and Google Play. [Source]

Security

WW – Spear Phishing on the Rise; Old Passwords Might Not Be So Bad

A recent security report from Symantec reveals a 91% increase in spear phishing attacks from 2012 to 2013, prompting TechInsurance CEO Ted Devine to offer some prevention tips for small businesses. “A single e-mail opened by an unsuspecting employee can undo months of work,” he said. “And once a hacker gains access, the financial consequences can be significant.” Meanwhile, Ars Technica reports researchers say traditional password best practice—”long, randomly generated passwords”—is not “feasible in practice” for lower-value accounts. More broadly, however, less valuable accounts may not need complex passwords, according to the report. [Source] SEE ALSO: [Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts].

WW – Researchers Find USBs Dangerous at Their Core

While many computer users often depend on USBs to easily transport data, there are more risks to using them than just the fact that they sometimes carry malware infections. The risk is built into the core of how they work, according to security researchers Karsten Nohl and Jokob Lell, who plan to present their findings next week. The researchers created a malware called BadUSB, which can be installed on a USB device to take over a PC and invisibly alter files or redirect users’ Internet traffic. And it doesn’t live in the thumb drive’s memory; it lives in the firmware itself. [WIRED]

WW – Exploring the Risk-Based Approach in Practice

The Centre for Information Policy Leadership at Hunton & Williams recently released a whitepaper on the risk-based approach, exploring how to improve its effectiveness in practice. “The whitepaper explores the fundamental question of how the ultimate purpose of privacy laws—to protect individuals from both tangible and intangible harm—can be achieved more effectively in the modern information age.” Issues explored in the paper include the potential benefits and applications of the risk-based approach in addition to the challenges and questions that face such a paradigm. [Hunton & Williams’ Privacy and Information Security Law Blog]

WW – Google Reveals Top Security Hackers

Google is publicly revealing “Project Zero,” its team of security researchers whose mission is to track down and neutralize “the most insidious security flaws in the world’s software,” hackable bugs known as “zero-day vulnerabilities.” Such bugs can be exploited by criminals and “state-sponsored hackers” for spying. One of the team’s members is George Hotz, who cracked AT&T’s iPhone lock back in 2007 when he was 17 years old. The team is encouraged to expose any zero-day software, not just those in Google products, “with the aim of pressuring other companies to better protect Google’s users,” the report states. [WIRED] See also: [Here’s How Easy It Could Be for Hackers to Control Your Hotel Room]

Smart Cards

AU – NSW Opal Card Raises Privacy Concerns

Australia’s spy agency could get its hands on the home address and travel history of NSW commuters using the state’s Opal card, a civil liberty group warns. The pay-as-you-go card, which can be used on trains, buses and ferries across the state, has been promoted by the Baird government as a way of saving travellers time and money. But Stephen Blanks, president of the NSW Council for Civil Liberties, says the Opal card’s privacy policy allows personal information of cardholders to be forwarded to law enforcement agencies without the need for a warrant. “It’s entirely up to the internal decision making of Transport NSW to whether or not information requests (from law enforcement agencies) will be complied with,” he told AAP on Tuesday. “Typically, they’ll comply with all requests.” [news.com.au] SEE ALSO: Australian AG George Brandis indicated that requiring ISPs “to retain customer data for up to two years for access by law enforcement agencies is under ‘active consideration’ by the government.” And the Australian Parliament’s House Standing Committee on Social Policy and Legal Affairs issued “Eyes in the Sky: Inquiry into drones and the regulation of air safety and privacy,” outlining “possible shortcomings of the current privacy regime,” among other things.

Surveillance

US – Artists, Writers to Congress: Mass Surveillance Is Censorship

A group of notable writers and artists has written an open letter to U.S. Senate leaders urging Congress to act to end mass surveillance, arguing its threat to “our most cherished democratic ideals” and “constitutional international human rights to free expression and privacy.” “Mass surveillance is censorship,” the group writes, citing an October 2013 survey of members of PEN—an international association of writers—that found one in six were refraining from writing or speaking on certain topics because of fears about NSA surveillance. “Congress must act now to protect our freedom to speak, think, write and create freely—and in private,” the authors write. [Full Story] SEE ALSO: the UN called government surveillance “almost certainly illegal.” A “damning but cautiously phrased report,” recommended that governments review national laws and policies to assess whether they are in line with international human rights law. [UN human rights report blows apart governments’ pro-surveillance arguments] Also: [Blacklisted: The Secret Government Rulebook For Labeling You a Terrorist]

US – Senator Introduces “Historic” Surveillance Reform Bill

Sen. Patrick Leahy (D-VT) introduced legislation this week that would bring extensive reforms and increased transparency to U.S. surveillance capabilities. “If enacted,” Leahy said, “this bill would represent the most significant reform of government surveillance authorities since Congress passed the USA PATRIOT Act 13 years ago,” noting the bill has support from the White House, several privacy groups and the technology industry. Meanwhile, the New America Foundation’s Open Technology Institute has released a report outlining some of the “collateral damage” caused by the widespread knowledge of the NSA programs, and a CyberArk survey indicates 68 percent of businesses have changed their security strategies in light of the NSA leaks and recent breaches.

UN – Gov’t Surveillance “Almost Certainly Illegal”

The United Nations (UN), “in a damning but cautiously phrased report,” recommends that governments review national laws and policies to assess whether they are in line with international human rights law. UN High Commissioner for Human Rights Navi Pillay said, “The very existence of a mass surveillance programme creates an interference with privacy,” adding, “The onus is on the state to demonstrate that such interference is neither arbitrary nor unlawful.” Meanwhile, two UK electronic surveillance programs were publicly debated on Tuesday, according to The Wall Street Journal. Members of the UK Parliament voted 498 to 31 to approve the “Data Retention and Investigatory Powers” bill. [GigaOM]

WW – Sleep Sensor Promises to Keep Bedroom Data Safe

Sense, a device promising to help people sleep better by tracking everything that happens at night in their bedrooms, raised $500,000 almost instantly on crowd-funding website Kickstarter this week, Forbes reports. Sense works when users attach movement-sensing “sleep pills” to their pillows that know when they go to bed and when they actually sleep. A microphone collects five-second sound snippets at a time, which are sent back to Hello Inc., the company that created Sense, so users’ can play back the sounds the next morning to know what may have disturbed them in the night. CEO James Proud said the company understands the privacy concerns and is aiming for full transparency on its data uses. [Full Story]

WW – Snowden on Cloud Service Providers and Naked Photos

In a recent media interview, Edward Snowden discussed cloud storage services and how some do a better job protecting user data from government surveillance than others. Snowden said Dropbox is “hostile to privacy,” while calling for more services that provide users with zero-knowledge systems whereby the service provider hosts and processes the information for its customers without actually having access to it themselves. Snowden said SpiderOak is one such service. In the same video interview, Snowden also alleged U.S. National Security Agency employees often share intercepted sexts—”an intimate nude photo of someone in a sexually compromising situation,” he said. Snowden said such privacy violations go unnoticed by oversight authorities “because the auditing is so weak.” [The Guardian]

US – PCLOB Expected to Investigate EO 12333

The Privacy and Civil Liberties Oversight Board (PCLOB), which has already conducted investigations and produced reports on sections of the USA PATRIOT Act and Foreign Intelligence Surveillance Act, is expected to focus its efforts on investigating a little-known but powerful U.S. intelligence mandate: Executive Order (EO) 12333. EO 12333 has no oversight and very little congressional review. EO 12333, which was originally issued in 1981 by President Ronald Reagan, specifies that the National Security Agency has control of signals intelligence collection overseas. However, the nature and scope of the collection have not yet been made public. [The Washington Post]

FI – ‘Big Brother’ Airport Installs World’s First Real-Time Passenger Tracking System

Civil liberty groups criticise a new tracking device at Helsinki Airport that can monitor passengers’ footsteps, from arrival at the car park to take-off. All mobile phones logged into the Wi-Fi network at Helsinki Airport will be monitored by an in-house tracking system that identifies passengers’ real-time movements. The technology has been criticised by privacy advocate groups, but is said to be aimed at monitoring crowds and preventing bottlenecking at the airport, which sees around 15 million passengers a year, Bloomberg reports. Currently at its initial phase, the full tracking system is expected to be in place by the end of this year which could enable shops to specifically target passengers that are within their vicinities, such as a deli that could alert a passenger walking by of a certain item on sale. All data collected is said to be in aggregated form, preventing any personal information from being seen by Finavia Oyi, the Finnish Civil Aviation Administration operating the airport, as the software discards any unique identifiers of devices, claims Tuomas Wuoti, the CEO at Walkbase. But software security analysts find it hard to believe “location tracking is only left at statistics” levels. [The Telegraph]

US – New York Knows Where Your License Plate Goes

In a crime-fighting tactic that sets civil libertarians’ teeth on edge, police in Monroe County and other urban counties across New York state are collecting and archiving tens of millions of records that track vehicle movement. The records are stored in a series of loosely connected secure computer servers, accessible directly or indirectly by police from one end of New York to the other and by federal Homeland Security officials. Each of the records, which are gathered by license plate cameras mounted on police cars or at fixed locations, includes a photograph and the time and place that a particular vehicle was imaged. Strung together, the records can paint a picture of where a person has traveled — whether to the scene of a crime, a doctor’s office or to church. The system can instantly alert patrol officers of a “hit” on a stolen car or, more often, a vehicle whose registration has lapsed and is ripe for ticketing. Stored records also can be accessed later as part of criminal investigations. [Rochester Democrat & Chronicle]

Telecom / TV

WW –New App Brings Free Encrypted Calling to iPhones

Open Whisper Systems, an open-source software group, has announced the release of Signal, a free iOS app allowing users to easily encrypt calls. Similar to Silent Circle, Signal uses ZRTP encryption and both the calling and receiving parties must have the app installed. But while Silent Circle is paid for by users, Signal will be funded by donations and government grants. Open Whisper’s Moxie Marlinspike says two main priorities are call quality and ease of use, adding, “The hard part is developing a product that people are actually going to use and want to use.” While he admits “there are always unknowns,” Marlinspike says Signal’s security protections relating to eavesdropping are “probably pretty great.” [WIRED]

WW – Apple iOS Diagnostics Tool Could be Exploited to Access Personal Data

Diagnostic services built into Apple’s iOS mobile operating system could be used to access personal data in iPhones. The services, which Apple says are designed for engineers, are not documented. Apple says that the feature was not designed to let the NSA access data in the devices. [Reuters] [The Register]

BR – Brazilian Telco Oi Fined $1.59 Million for Privacy Violations

Brazilian telecommunications firm Oi has been fined $1.59 million (3.5 million reais) for violating users’ privacy. The Consumer Protection and Defense Department (DPDC) fined the company after it found it had sold consumer browsing data to third parties. “The company, under the pretext of improving the browsing experience, hid from customers essential information about the service and its implications for privacy and the safety of their personal data,” said DPDC Director Amaury Oliva, adding, “At no time were customers told that their browsing would be monitored by the company and that their profile would be sold to advertising companies.” [EFE]

US – Class-Action Claims iPhones Spy on 100 Million Users

A class-action lawsuit filed in federal court alleges Apple uses the location service function on iPhones to spy on customers and give their private information to third parties. Chen Ma, the lead plaintiff, has sued on behalf of approximately 100 million iPhone users alleging privacy violations. “In or around September 2012, Apple released iPhone 4, which contains an iOS operating system software that enables iPhone 4 to track its users’ whereabouts down to every minute, record the duration that users stay at any given geographical point and periodically transmit these data stored on the users’ devices to Apple’s database for future references,” the complaint alleges. [Courthouse News Service]

US Legislation

US – Tech Companies Support Strengthened Leahy NSA Reform Bill

Sen. Patrick Leahy (D-VT) introduced the USA FREEDOM Act, and proponents “lined up … to praise the bill.” Leahy sought input from the tech industry, privacy groups and the Obama administration, and the bill is being lauded as a compromise by all of those groups. A previous version of the bill, after being gutted, passed in the House but lost the support of the tech industry due to the revisions. The current version includes curtailing bulk data collection, setting rules for the destruction of irrelevant information and creating congressional oversight. Jennifer Granick of the Stanford Center for Internet and Security notes, however, that while it does most of what civil liberties groups and others have asked for, it fails to address FBI surveillance. [TechCrunch]

US – Missouri to Vote on Digital Privacy; State Sen. Aims to Protect SSNs

While the U.S. Supreme Court recently upheld privacy protections against police searches of cell phones, Missouri voters will vote next week on a ballot measure that would require police to obtain a warrant before searching or seizing “electronic communications and data,” including cellphones, emails and flash drives. Meanwhile, a Missouri senator has introduced a measure he believes will garner bipartisan support that would end the state’s practice of posting death certificates 50 years and older online with Social Security numbers readable. Sen. Paul LeVota (D-Independence) said the Office of the Secretary of State has indicated it wouldn’t be opposed to changing the law. [Associated Press] [US: Voters to decide on electronic privacy]

US – NY Legislature Approves “Revenge Porn” Bill, Awaits Governor’s Approval

The New York legislature has passed a revenge porn bill that is now headed to the governor’s desk for signature [Rockland County Times] SEE ALSO: [Sweden’s justice minister announced the appointment of an investigator to produce a report on online slander—particularly revenge porn] See also Rhode Island passed a social media privacy law and Revenge porn laws went into effect in Colorado and Idaho. And The Massachusetts Senate passed a social media bill protecting students and job applicants from having to disclose online account information. It now heads to the governor for a signature.

US – Sens. Introduce Bill to Update FERPA

Sens. Ed Markey (D-MA) and Orinn Hatch (R-UT) introduced the Protecting Student Privacy Act, which would update the Family Education Rights and Protection Act, on Wednesday. The proposed legislation “clearly spells out information security practices and data responsibilities for both education institutions and outside parties.” The bill would also tie educational funding to whether schools follow the bill’s provisions, the report states. Schools that include personally identifiable information when unnecessary, don’t require third parties to destroy data that is no longer needed and don’t implement security policies to protect sensitive data would not receive funding. [Government Technology] See also: [Education Data Frontiers: Industry Could Provide the Answers]

Workplace Privacy

CA – Remote Staff Never Out Of Employer’s Eye

While studying history at the University of Waterloo in Waterloo, Ont., Tim Lichti started a lawn-cutting company and felt a need to get a better handle on tracking his workers as they moved from job site to job site. So he went looking for ideas, and in the process developed what would eventually become Breadcrumbtracking.com. Guided by the principle that staff are usually the biggest cost for almost any company, Mr. Lichti realized the importance of having an understanding of how those resources are being deployed. Breadcrumbtracking.com developed an app that works with almost any mobile device and provides employers with an almost instant update on where their staff are at any given moment during the workday, and how long they are spending on particular tasks. The app isn’t just for lawn maintenance businesses – it can be used by any company that has remote employees. Workers have to clock in and out on the app, so it also allows managers to easily record hours worked for payroll purposes, and the app also allows time- and datestamped pictures to be uploaded, which aids in time-specific jobs. Waterloo-based Breadcrumbtracking.com is also developing software that permits mobile workers to process invoices, estimates and payments on the road. [The Globe and Mail]

+++