The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November/December (2010 vol.8)
pp: 68-71
Fred H. Cate , Indiana University
ABSTRACT
Governments have long sought access to private enterprise data, but there's a new voraciousness for such data. Furthermore, this demand is supported by the extraordinary growth of digital technologies that can record, store, and share electronically individuals' records, communications, movements, finances, relationships, and even tastes. Fortunately, best practices for accessing such data have emerged, which lawmakers around the world would do well to consider.
INDEX TERMS
security and privacy, government surveillance, national security
CITATION
Fred H. Cate, "Government Access to Private-Sector Data", IEEE Security & Privacy, vol.8, no. 6, pp. 68-71, November/December 2010, doi:10.1109/MSP.2010.176
REFERENCES
1. E. Kinetz, "India Eyes Google, Skype in Security Crackdown," San Jose Mercury News,13 Aug. 2010; www.mercurynews.com/rssci_15768910?nclick_check=1 .
2. E. Nakashima, "Money Transfers Face New Scrutiny," Washington Post,27 Sept. 2010, p. A1.
3. "Secure Flight Program," US Dept. Homeland Security, Federal Register, vol. 72, no. 163, 2007, pp. 48356–48368.
4. "Privacy Act of 1974; US Customs and Border Protection, Automated Targeting System, System of Records," US Dept. Homeland Security, Federal Register, vol. 72, no. 150, 2007, pp. 43650–43656.
5. "Council Directive 2006/24 on the Retention of Data Generated or Processed in Connection With the Provision of Publicly Available Electronic Communications Services or of Public Communications Networks," Official J., L105, Apr. 2006, pp. 54–63.
6. E. Nakashima, "U.S. Seeks Ways to Wiretap the Internet," Washington Post,28 Sept. 2010, p. A4.
7. Privacy Impact Assessment for the Border Searches of Electronic Devices, US Dept. Homeland Security, 2009; www.dhs.gov/xlibrary/assets/privacyprivacy_pia_cbp_laptop.pdf .
8. K.M. Sullivan, "Under a Watchful Eye: Incursions on Personal Privacy," The War on Our Freedoms: Civil Liberties in an Age of Terrorism, PublicAffairs, 2003, p. 131.
9. A. Miller, Assault on Privacy, Univ. of Michigan Press, 1971, p. 39.
10. Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals, Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Assessment, Nat'l Research Council, Nat'l Academies Press, 2008.
11. Technology and Privacy Advisory Committee, Safeguarding Privacy in the Fight against Terrorism, US Dept. Defense, 2004.
12. Protecting America's Freedom in the Information Age, Task Force on Nat'l Security in the Information Age, Markle Foundation, 2002; www.markle.org/downloadable_assetsnstf_full.pdf .
13. Creating a Trusted Network for Homeland Security, Task Force on Nat'l Security in the Information Age, Markle Foundation, 2003; www.markle.org/downloadable_assetsnstf_report2_full_report.pdf .
14. Mobilizing Information to Prevent Terrorism, Task Force on Nat'l Security in the Information Age, Markle Foundation, 2006; www.markle.org/downloadable_assets2006_nstf_report3.pdf .
15. "The Cantigny Principles on Technology, Terrorism, and Privacy," Nat'l Security Law Report, Feb. 2005, p 14.
16. I.S. Rubinstein, R.D. Lee, and P.M. Schwartz, "Data Mining and Internet Profiling: Emerging Regulatory and Technological Approaches," Univ. of Chicago Law Rev., vol. 75, no. 1, 2008, p. 261–285.
17. V. Reding, "Tomorrow's Privacy: The Upcoming Data Protection Reform for the European Union," to be published in Int'l Data Privacy Law, 2010.
18. F.H. Cate, "Government Data Mining: The Need for a Legal Framework," Harvard Civil Rights-Civil Liberties Law Review, vol. 43, no. 2, 2008, p. 436.
19. United States v. Robel, Supreme Court of the United States, 389 US 258, 1967; http://laws.findlaw.com/us/389258.html.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool