Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Trading Cookies for U.S. Federal Data Privacy Regulations
  • Data Breach

Trading Cookies for U.S. Federal Data Privacy Regulations

6 years ago Tripwire Guest Authors
Trading Cookies for U.S. Federal Data Privacy Regulations

The General Data Protection Regulation (GDPR) has been in effect for two years in the European Union (EU). As Americans continue to become attentive to GDPR and their own data privacy, it’s not surprising that some data protection guidelines are emerging in the United States. Indeed, it’s safe to assume that California Consumer Privacy Act (CCPA) was modeled from the EUs data privacy framework.

Though localized to California, CCPA may be the starting point to overarching federal law on online data privacy. Let’s talk about what this could mean and how we can get there. Before we drill down on this, however, we first have to understand the issues.

Understanding the Need for a Federal Data Privacy Law

What do we require protection from? As we use the internet, every site visited, or activity done on the web generates metadata. At times, this information is anonymized for your safety, but it still follows you through the network.

We’ve seen this behavior with cookies. Created to bring memory to webpages by developer Lou Montuilli at Netscape in 1994, cookies have since been repurposed as third-party cookies used by brands, ads, and intermediaries in some cases to show you ads through your meta perceived “wants and needs”. The prospect of ads following you around the web and of your device spying on you is a concern for many.

But what it’s not a worry for all. A former head of America’s Federal Trade Commission during a talk with The Economist had this to say about tracing consumers’ digital footprint through online services.

It’s okay that they collect information from me while I’m on their site …(for suggestion purposes)… but when you’re talking about the sort of invisible Cyber Otzi that put cookies in your computer and track you around the internet and may or may not but may up-sell your information to data brokers and may combine it with offline information and may build these incredibly robust profiles of you, it’s just not appropriate unless the consumer gives his or her consent because that information is yours.

Online Privacy Act: An Attempt at a Federal Law

The Online Privacy Act of 2019 (H.R. 4978) was the first preference to tackle online privacy at an overarching federal level. Section 106 of this bill (the Right to Individual Autonomy) states that an entity would not be allowed to collect an individual’s personally identifiable information for behavioral personalization by giving the user the option of opting out while continuing to use said entity service. This would change the way our data is viewed on the net altogether.

As of today, this Bill has been introduced into the House and assigned two committees for study. What comes next? If released by those Committees, the Bill gets put on the calendar to be voted on, debated and amended. If passed by the House by a simple majority (more than half of 435 votes), it would then move to the Senate where the Bill would go through another committee along with another vote, debate and amendment process before being voted on. In the Senate, the Bill once again has to pass by a simple majority (more than half of 100) of votes.

At that point, the bill would be reviewed by a third Conference Committee of members from the House and Senate to work out any differences between the bills, respectively approved by the House and Senate. The final bill approval from the House and Senate would then get sent to Enrolling by the Government Printing Office before reaching the President’s desk, where she/he would have 10 days to sign or veto the enrolled Bill. This process can take anywhere from over a month to a year to have legislation become law (or alternatively get scrapped).

The Anti-Cookie Quest Continues

During a TED Talk, Andy Yen stated the following:

…A lifetime of email, collectively, this tells a lot. It tells where we have been, who we have met, and in many ways, even what we’re thinking about. And the more scary part about this is our data now lasts forever, so your data can and will outlive you.

As many individuals take a privacy by design focus to their data, buy-in by entity stakeholders is required to make data privacy full circle within America.

Moving away from third-party cookies is a step in the right direction, but we can all agree more has to be done. What areas do you feel were left out of the Online Privacy Act of 2019? Is it expansive enough for systems not yet created?


About the Author: Felix Leroy protects the service, data, and infrastructure of over 8 million residents as an I.T. Security Specialist in a local City Government. Having experience in both the private and public sectors. Over the years, he has performed tasks related to I.T. Infrastructure, while focused on Security Domains such as Security Architecture & Operation, Governance, Risk Assessment & Data Continuity. Felix holds an MBA in Information System Management and several Industry Certifications. In his free time, he runs a nonprofit organization, educating individuals on creative- and self-development topics.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Trading Cookies for U.S. Federal Data Privacy Regulations” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Compliance, Encryption, Google, Google Chrome, Goverment, Medium Severity, Privacy, TripWire

Continue Reading

Previous Understanding the Benefits of the Capability Maturity Model Integration (CMMI)
Next Assisted Living Services Provider Discloses Data Security Incident

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

3 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents

4 hours ago [email protected] (The Hacker News)
  • Data Breach
  • Vulnerabilities

The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills

5 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials

6 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

9 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware

21 hours ago [email protected] (The Hacker News)

Recent Posts

  • Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials
  • 5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents
  • The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills
  • TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials
  • Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT