Privacy News Highlights
22 December–04
January 2007
Contents:
CA – B.C. Studying Use of Biometrics for Next Generation
of Driver’s Licenses
EU – Germany to Add Fingerprints to Passports
CA – Canadian Insurance Companies Offer
Consumers ID Theft Coverage
CA – Stoddart: Retailers to Mask Card
Numbers; Holiday Shoppers Should Protect PII
US – FTC to Host Workshop on Negative Option Marketing
US – Government Agencies to Test Employees with Phishing
Attacks
WW – Spam Volume Up 35% to 63 Billion Per Day
WW – Encrypted, Yet Searchable, Archiving
EU – One-Third of Top UK Companies Do Not Comply with EU
Privacy Directive
UK – APACS Declines to Name Banks with Poor Online
Security
CA – Amendments to "General"
Regulation under PHIPA
AU – E-Health Officials Seek Comment on Plan to Create
New Central Database
WW – Nissan Customer Database Leak
US – Utah Valley State College Data Breach
US – Indiana Hospital Notifies Patients of Data Theft
US – Stolen Computer Tapes Hold Insurance Records
US – Texas Woman’s University Notifies Students of Data
Compromise
US – State Prints Names, SSNs On Tax Forms
UK – UK Government Changes Plan on ID Card Database
UK – Public Online Authentication Plan Criticised
US – Sony BMG Settles with 39 More States
EU – French Court Favors Personal Privacy Over Piracy
Searches
WW – Cyber Criminals Got More Sophisticated in 2006
WW – MySpace Increasingly Facing Unfriendly Attacks
US – Suit Could Set Boundaries for Privacy in Online
Diaries
WW – Google’s Blogger Adds Privacy Options
US – Data Security Breaches Top Execs’ List of Concerns
WW – IBM Introduces RFID Tag Middleware To Promote Real
Time, Secure Data Sharing
WW – 3M Deploys RFID Specimen Tracking at Mayo Clinic
US – DHS Sets Rules For Port ID Cards
US – State Fusion Centers Pose Privacy, Other Concerns
US – These Shoes Are Made For (GPS) Tracking
US – TSA’s Secure Flight Program Violated Privacy Act
EU – EU Leader Seeks Answers From DHS About Border
Security Program
US – OneDOJ Database Raises Privacy Concerns
US – Bill Aims to Enhance VA Data Security
US – Cyber Legislation Before Congress in ’07
US – New Law Takes Effect In Illinois
US – Credit Freeze Bill Takes Effect Jan. 1 In N.H.
US – Lawmakers File Security Freeze Bill In Arkansas
US – Three New Laws to Combat ID Theft Take Effect In
Hawaii
US – Credit Freeze Law Takes Effect in Pennsylvania
B.C.’s Solicitor-General John Les said driver’s
licenses that use biometrics could strengthen efforts to prevent ID theft and
bolster arguments against a
Canadian consumers have the option of buying ID theft
insurance from most insurance companies, which have brought the policies to the
market within the past few years. The policies typically are added to house,
condo or apartment insurance for $30 to $40 a year. One company is planning to
offer a separate ID theft policy sometime in 2007. [Source]
Jennifer Stoddart,
The FTC will host a workshop on January 25 in
Spam volume soared another 35% in November, said
e-mail security vendor IronPort Systems, and the month saw spam tactics that
reduced the efficiency of traditional anti-spam filters. “There’s been a huge
increase in spam volume, from 31 billion spams a day on average in October 2005
to 63 billion in October 2006.” [Source]
Unstructured business content is increasingly
considered one of the most valuable assets in the enterprise. At the same time,
however, organizations are forced to balance two seemingly conflicting
objectives regarding this content. They must meet their fiduciary
responsibility by protecting content from unauthorized access and use through
encryption and rights management. They must also preserve content for future
search and disclosure through archiving. Until now, this has been an impossible
challenge. Organizations had to choose one or the other. Today, however,
organizations are adopting new secure archiving and retrieval tools that
support encryption as well as enterprise rights management (ERM). Encryption
enables companies to control who can see content such as email and documents,
particularly when it is in transit. ERM enables organizations to control what
can be done with that content, and by whom, on a granular basis. With these
tools, organizations can keep their unstructured content secure, archived, and
searchable. [Source]
According to reports of a survey of 200 top
The UK’s payments association APACS says it will not
release information about banks’ relative online security as members of the
House of Lords Science and Technology Committee have requested. The committee
is looking into Internet security and was told last week that phishing
incidents had risen 8,000 percent over the last two years. [Source]
Regulation 537/06 made under PHIPA, which amends
Regulation 329/04 (the "General" Regulation under PHIPA), has now
been published in the December 23, 2006 Ontario Gazette. The amendments came
into force on December 8, 2006. [Gazette]
The Australian National
E-Health Transition Authority has released a plan that calls for the
establishment of a new central database to store the identifying details of
every person accessing healthcare and all medical providers. The plan calls for
the assignment of unique healthcare numbers for doctors and patients. The authority
would enroll patients and manage the collection of data. Clinical information
would not be stored on the database. However, doctors would be able to search
for files using the patient’s assigned number as a way to identify previous
care-givers. The authority’s chief executive, Ian Reinecke, said the system’s
success depends on a strong privacy foundation. [Source]
[NEHTA website]
Nissan has acknowledged that information from its
customer database may have been leaked. The auto manufacturer plans to notify
the approximately 5.38 million affected customers. Nissan plans to implement
additional security measures in 2007, including physical security monitoring of
secure areas and software to monitor databases and track all access to the databases.
[Source] [Source]
The names, SSNs and other PII of approximately 15,000
Utah Valley State College (UVSC) students and faculty were inadvertently made
available on Yahoo for about six weeks in November and December of last year.
The data belong to students and faculty who participated in the college’s
distance education program between January 2002 and January 2005. UVSC removed
the files from its servers as soon as it became aware of the situation. The
school plans to notify all individuals affected by the data security breach. [Source]
A Hospital in
Computer tapes stolen during a burglary in
Texas Woman’s University (TWU) has sent letters to
approximately 15,000 students notifying them that their personally identifiable
information was exposed when an IRS tuition data document was sent to a vendor
over a non-secure connection. The breach affected all TWU students who were
enrolled at the school in the 2005 calendar year. [Source]
[Source]
The state of
The
UK Government plans for a single authentication system
for citizens accessing public services online may be derailed by procurement
issues branded by one industry insider as ‘rank bad practice’. The GC Register
component of the £27m Government Connects (GC) scheme will allow citizens to
identify themselves once at login, and then be recognised by all public sector
bodies that subscribe to the scheme. But council and industry groups are
warning that the Department for Communities and Local Government (DCLG) is
creating a de facto monopoly by endorsing a single product - CGI Excelsior.
They are also concerned that the central GC team has not been clear about how
such decisions are being made. [Source]
Days after reaching settlements with
A French court has ruled that copyright holders do not
have free reign to monitor the Internet for people violating their copyrights.
The case involved a man whose IP address was traced while he was using
peer-to-peer software. In
Computer security experts say 2006 saw an
unprecedented spike in junk e-mail and sophisticated online attacks from
increasingly organized cyber crooks. These attacks were made possible, in part,
by a huge increase in the number of security holes identified in widely used
software products. [Source]
MySpace bills itself as a “place for friends.”
Increasingly, it is also a place for unfriendly attacks from digital miscreants
on the prowl, luring users to sexually explicit Web sites, clogging mailboxes
with spam messages and playing on the trust users have when speaking to
“friends” to obtain passwords that could lead to identity theft. [Source]
Lurid testimony about spanking, handcuffs and
prostitution aside, a pending lawsuit could help establish whether people who
keep online diaries are obligated to protect the privacy of the people they
interact with offline. The case involves a Capitol Hill staffer who discovered
his girlfriend had discussed intimate details about their sex life in her
online diary. [Source]
Google has released a new version of its Blogger
service, adding privacy settings that restrict readership to a predetermined
audience. Users can choose to have blogs accessible to anyone or just to
themselves. [Source]
According to a Harris Interactive poll conducted in
September, corporate executives at large companies place data security breaches
and terrorism at the top of their list of concerns. Just 9% of the 197 senior
executives surveyed said they are not concerned about data security. Executives
say they are also worried about corporate malfeasance. [Source]
IBM’s new middleware is based on the draft Electronic
Product Code (EPC) Information Service standards, in order to better manage
data. The
3M has announced the successful pilot of an RFID-based
track and trace solution for Mayo Clinic, the well-known medical practice with
diagnosis and treatment facilities scattered across the
The Homeland Security Department this week issued a
rule for credentials for seaport and maritime workers to undergo background
checks and be credentialed before they are granted unescorted access to secure
areas of vessels and facilities. The much-anticipated rule defines the
enrollment process, disqualifying crimes, usage procedures, fees and other
requirements for workers, port owners and port operators. More than 750,000
employees, union workers, mariners and truckers will have to get credentialed,
paying up to $159 each. The credential will be a "smart card"
containing a photograph and name of each worker, expiration date and serial
number. An integrated circuit chip will store the holder's fingerprint
template, a personal identification number and a unique identifier. [Source]
[Source]
Privacy advocates question the vast amounts of
personal information federally funded state fusion centers are collecting and
whether strong enough protections are in place to limit data use and storage.
The intelligence centers are located in 37 states. They were established in the
aftermath of 9/11. Supporters say the information-gathering centers are a key
element of state efforts to detect and disrupt terrorist plots. They also say
agencies have improved in the area of information-sharing. However, after
several years of operation, questions are emerging about the centers, including
concerns about privacy. [Source]
A report from the Department of Homeland Security’s
(DHS) privacy office says the Transportation Security Administration’s (TSA)
Secure Flight program violated federal law during the program’s testing phase
that ran from fall 2004 through spring 2005. The program obtained passenger
data from data brokers without properly informing passengers, in violation of
“a 1974 Privacy Act requirement that the public be made aware of any changes in
a federal program that affects the privacy of US citizens.” The implementation
of the test differed from TSA’s initial description. TSA said it would maintain
a firewall between government systems and passenger data obtained from
commercial sources. However, it appears that TSA may have accessed and stored
such information. The program has been halted until privacy and security
concerns are adequately addressed. TSA did revise the “public notice about the
program to reflect more closely the program itself;” however, according to the
report, the program is likely to run into more problems unless it adheres to a
set of recommendations that include transparency regarding
passenger
data collection and use. [Source] [Source] [Source] [Source]
European Commissioner Franco Frattini is questioning
whether the DHS program, known as the Automated Targeting System, (ATS) is in
conflict with a recent agreement between the
[Source]
The
The Veterans Benefits, Health Care and Information
Technology Act of 2006, signed into law by President Bush, addresses data
security concerns raised by the theft last spring of equipment that held
sensitive PII of millions of veterans and active duty members. The new law
requires the VA to inform veterans when their data are exposed and to make
available fraud alerts, credit monitoring and identity theft insurance. The VA
must also provide Congress with reports regarding any security breaches. In
addition, the law provides an incentive for the VA to recruit employees with IT
skills commensurate with the department’s needs. The bill also increases funding
for certain veterans’ health benefits. [Source]
A substantial article on upcoming legislation before
Congress including data breach, patent reform, broadband networking and
expanding the cap on H-1B visas for high-skilled immigrant workers from 65,000
to 115,000. [Source]
Consumers in
A security freeze bill in
Under a new law, businesses and government agencies
are required to notify consumers in
The state’s new security freeze laws allow consumers
to freeze their credit. Credit-reporting agencies may charge a maximum $10 fee
for the freeze. However, people older than 65 and ID theft victims will be exempt
from the fee. [Source]
--------