P. 1
OBAMA TYRANNY: KNOW WHERE YOUR PERSONAL INFORMATION GOES?

OBAMA TYRANNY: KNOW WHERE YOUR PERSONAL INFORMATION GOES?

Ratings: (0)|Views: 45 |Likes:
Published by Levitator
The flow of information about every one of us is largely unregulated and COLLECTED BY OBAMA ADMINISTRATION.

The entities that collect personally identifiable information on us are:
Public information (such as media, government)
Retail information (airlines, credit card companies, retail stores)
Telecommunications providers (the information that cable companies and mobile devices collect)
Financial information (banks and insurers)
Medical information (hospitals, pharmacists and doctors)
Internet information (search engines, websites, social networking)

The entities that collect a specific type of information including information brokers, credit bureaus, websites, healthcare analytics, list brokers and ad networks.

And, all of these information collectors share that information – the government, employers, marketers, banks, law enforcement and the media.

For example: information from the internet and retailers is shared with information brokers and these brokers in turn share it with the government. Alternatively, one can look and see that information collected by credit bureaus, websites and information brokers are all shared with employers.

Often, the greatest concern or fear of a surveillance society is that the government can acquire enormous amounts of information about all of us through private companies (and as the byproduct of new technologies.)
The flow of information about every one of us is largely unregulated and COLLECTED BY OBAMA ADMINISTRATION.

The entities that collect personally identifiable information on us are:
Public information (such as media, government)
Retail information (airlines, credit card companies, retail stores)
Telecommunications providers (the information that cable companies and mobile devices collect)
Financial information (banks and insurers)
Medical information (hospitals, pharmacists and doctors)
Internet information (search engines, websites, social networking)

The entities that collect a specific type of information including information brokers, credit bureaus, websites, healthcare analytics, list brokers and ad networks.

And, all of these information collectors share that information – the government, employers, marketers, banks, law enforcement and the media.

For example: information from the internet and retailers is shared with information brokers and these brokers in turn share it with the government. Alternatively, one can look and see that information collected by credit bureaus, websites and information brokers are all shared with employers.

Often, the greatest concern or fear of a surveillance society is that the government can acquire enormous amounts of information about all of us through private companies (and as the byproduct of new technologies.)

More info:

Published by: Levitator on Dec 06, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

04/11/2014

pdf

text

original

 
FEDERAL TRADE COMMISSION | DECEMBER 2010
A PROPOSED FRAMEWORK FOR BUSINESSES AND POLICYMAKERSPRELIMINARY FTC STAFF REPORT
 
DECEMBER 2010A PROPOSED FRAMEWORK FOR BUSINESSES AND POLICYMAKERSPRELIMINARY FTC STAFF REPORT
 
TABLE OF CONTENTS
EXECUTIVE SUMMARY......................................................iI.INTRODUCTION.......................................................1II.BACKGROUND........................................................3A.Privacy and the FTC...............................................31.The FTC Approach to Fair Information Practice Principles...........62.Harm-Based Approach .......................................9B.Recent Privacy Initiatives..........................................121.Enforcement...............................................122.Consumer and Business Education.............................133.Policymaking and Research...................................144.International Activities......................................17III.RE-EXAMINATION OF THE COMMISSIONS PRIVACY APPROACH.........19A.Limitations of the FTCs Existing Privacy Models.......................19B.Technological Changes and New Business Models......................21IV.PRIVACY ROUNDTABLES.............................................22A.Description......................................................22B.Major Themes and Concepts from the Roundtables......................221.Increased Collection and Use of Consumer Data..................232.Lack of Understanding Undermines Informed Consent.............253.Consumer Interest in Privacy..................................284.Benefits of Data Collection and Use............................335.Decreasing Relevance of Distinction Between PII and Non-PII.......35V.PROPOSED FRAMEWORK.............................................39A.Scope: The framework applies to all commercial entities that collect or useconsumer data that can be reasonably linked to a specific consumer, computer, or other device. ....................................................42B.Companies should promote consumer privacy throughout their organizations and at every stage of the development of their products and services.........441.Companies should incorporate substantive privacy protections into thei practices, such as data security, reasonable collection limits, sound retention practices, and data accuracy ...........................442.Companies should maintain comprehensive data management procedures throughout the life cycle of their products and services. . ..49C.Companies should simplify consumer choice ...........................521.Companies do not need to provide choice before collecting and usingconsumers’ data for commonly accepted practices, such as productfulfillment ................................................53

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->