Daily updates on privacy stories in the news.

October 2009 Archives

« September 2009 | Main | November 2009 »

Job Applicants May Have to Give DNA

University of Akron Ohio employment application process includes the possibility that a DNA sample may be requested so that a federal criminal background check can be conducted. The requirement may violate the Genetic Information Nondiscrimination Act. The University argues that there are positions at the institution, which require background checks to be performed. The University has not provided information on privacy questions regarding its collection, retention, sharing, and use of genetic information. How long DNA samples would be retained and who would have access to the information are not clear. DNA information can be used to determine whether a person has a predisposition for a medical condition as well as other personal information about the subject.

Want A Job In Akron? Hand Over Your DNA, Declan McCullagh, CBS News Blogs

Privacy Groups Seek Investigation of DHS Chief Privacy Office

Privacy Coalition members were joined by other organizations on a letter sent to the House Committee on Homeland Security urging them to investigate the Department of Homeland Security's (DHS) Chief Privacy Office. DHS is unrivaled in its authority to develop and deploy new systems of surveillance. The letter cited DHS ongoing use of Fusion Center, Whole Body Imaging, funding of CCTV Surveillance, and Suspicionless Electronic Border Searches as examples of where the agency is eroding privacy protections.

House Members Introduce New Bill to Fix US Patriot Act

On October 22, 2009, Representatives Conyers, Nadler, and Scott introduced two bills today that would amend the PATRIOT Act and the Foreign Intelligence Surveillance Act. The Patriot Amendments Act of 2009 will enhance reporting and judicial oversight of law enforcement powers, including the National Security Letter process. The FISA Amendments Act of 2009 will place new limits on the government's ability to collect and store Americans' communications without a warrant and repeals retroactive immunity. For more information, see EPIC FISA, EPIC PATRIOT Act.

Google Oops! User Voice Mails Disclosed in Search Engine

Reported flaw in Google's voice mail service said to expose users' messages to search engine users. The messages are reported to include the audio file and transcript of the call, but also included the callers name and phone number.

Random users Google Voice mail is searchable by anyone?, Michael Bettiol, Boygeniusreport.com, October 19, 2009

Are Smart Grids Privacy Smart?

Public electric utility companies are installing new meter technology and offering smart meters to monitor customer consumption of electricity. Some utilities are offering lower utility rates in exchange for customers agreeing to the installation of smart meters. What might not be well known is the capacity of these new data collection systems to monitor electric utility use within a home or office space. This can include consumption of new appliances fitted with technology that would allow the monitoring their use inside homes and businesses. The move from an Internet of people to the "Internet of things" means that many appliances would come with unique Internet protocol addresses and wireless communication applications. How these devices might be used to collect information on their use, and who would have access to that information, and for what purpose is still unknown. The key to privacy protection is to control the collection, use, reuse, and sharing of personal information, which would include electricity use.

From Smart Grid to Big Brother? by Michael Graham Richard, Ottawa Canada, October 14, 2009

Where is Your Digital Data Privacy Protection?

The line between when people believe that their privacy is protected and when in fact it is NOT protected is stirring public debate. The false sense of personal data security offered by de-identification is confusing many digital information consumers over when their sensitive or personal information may be up for grabs. Claims that de-identification can protect privacy often do not address the issue of re-identification the power to connect identity to data on individuals. Sensitive medical records, search engine activity, or other records that may not contain a name but can be used to identity the data subject are raising questions about privacy.

When 2+2 Equals a Privacy Question, Natasha Singer, New York Times, October 17, 2009

Federal Government Launches Cloub Computing Effort

The federal government now has an "app store" for agencies to have access to cloud computing services. The move means that federal employees can now use YouTube, Gmail, WordPress, and other online services for official agency activities. Current federal laws that provide privacy protection and transparency to the public have yet to be defined when government employees use cloud computing services.

U.S. government sets up online 'app store', John D. Sutter, CNN