by Privacy & Data Security Member Karin McGinnis
The Federal Trade Commission’s PrivacyCon event brings together the FTC, researchers and academics to discuss the latest research and trends related to consumer privacy and data security. Much of the discussion today centered on Big Data, coming on the heels of the FTC’s report, Big Data: A Tool for Inclusion or Exclusion? Understanding the Issues, which can be found here. Also prominent were concerns about web transparency and whether consumers in fact understand what data is collected on them and how it will be used. FTC Commissioner Julie Brill gave some specific insight into the FTC’s focus. In her statements, she identified two principles that she believes should guide the development on privacy and data security issues going forward. First, she believes that individuals must be in the loop regarding how their data will be collected and used. Relevant questions include what consumers expect regarding how their data will be collected and used and what they understand about how they can exercise control over that collection and use. Second, she counseled wariness about privacy and data security solutions that depend too heavily on one technology, such as encryption. We anticipate more action by the FTC pushing companies to be more transparent in their notices to consumers about their data collection and use practices. At the same time, we expect the FTC to be less understanding of companies who rely too much on single sources of data protection, especially in the face of changing technology. A webcast of the event will be posted on the FTC website.
About Data Points: Privacy & Data Security Blog
The technology and regulatory landscape is rapidly changing, thus impacting the manner in which companies across all industries operate, specifically in the ways they collect, use and secure confidential data. We provide transparent and cutting-edge insight on critical issues and dynamics. Our team informs business decision-makers about the information they must protect, and what to do if/when security is breached.