ICANN/GNSO GNSO Email List Archives

[council]


<<< Chronological Index >>>    <<< Thread Index >>>

Re: [council] Regarding data collected and the purpose of collecting data


<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
  <meta content="text/html;charset=ISO-8859-1" http-equiv="Content-Type">
</head>
<body bgcolor="#ffffff" text="#000000">
Dear GNSO Colleagues,<br>
<br>
on the day of departure from Wellington, I found an article in a NZ
newspaper &#8220;Privacy law upgrade to stop misuse"&nbsp; - I think this 
article
contains a number of concerns which are similar to our discussions
about WHOIS (though the article deals also with some wider issues). But
the following aspects relate also in one way or the other to what we
have to consider (my remarks in brackets):<br>
<br>
<ul>
  <li>"reforming the 13-year-old Privacy Act was a priority to keep
pace with developments in technology" (to keep pace with today's issues
seems to mean, after 13 years: to be more aware of the dangers which
appeared in the meantime)</li>
  <li>"include bringing New Zealand's information-sharing law in line
with Europe's, and limiting data shared through public registers" (to
upgrade means to look for international examples where more limits on
public registers are imposed than before)</li>
  <li>&nbsp;"that technology was posing a major challenge in maintaining
existing privacy laws" </li>
  <li>"Police also warned of growing incidents of identity theft. 'The
volume is astronomical compared with 15 years ago,' Police Identity
Intelligence Unit representative David Kennedy said. ID theft was a
fundamental privacy breach and businesses that stored unnecessary
personal details about customer databases could be contributing to the
problem" (the tendency of businesses to store more personal data is
possibly a contributing factor to privacy breach)</li>
  <li>"Australian Privacy Commissioner Karen Curtis issued a stern
warning about the consequences a business faced if it did not safeguard
personal information" (I do not remember that we devoted much time and
considerations what kind of 'consequences' can and will be imposed in
cases where WHOIS data have been misused).</li>
</ul>
The full text of the article follows at the end.<br>
<br>
I hope to be online for our meeting today.<br>
<br>
<br>
Norbert Klein<br>
<br>
= = =<br>
The Dominion Post, NZ, 31 March 2006<br>
Privacy law upgrade to stop misuse<br>
by ANNA CHALMERS<br>
<br>
The Government has announced plans to update privacy laws amid growing
criticism that personal information is being misused.<br>
<br>
Associate Justice Minister Clayton Cosgrove told a privacy forum in
Wellington yesterday that reforming the 13-year-old Privacy Act was a
priority to keep pace with developments in technology, science, and
human rights.<br>
<br>
Proposed amendments are understood to include bringing New Zealand's
information-sharing law in line with Europe's, and limiting data shared
through public registers.<br>
<br>
"There are also reforms to ensure that personal information is not
misused," Mr. Cosgrove said.<br>
<br>
The moves come as a survey issued this week shows New Zealanders are
increasingly concerned about privacy.<br>
<br>
Privacy Commissioner Marie Shroff said the "skimming" of $23,000 from
an Auckland ATM machine had also highlighted private security issues.
The commission's survey results showed 93 per cent of New Zealanders
thought businesses needed to act to protect private information.
"Modern technology offers many benefits to business and consumers. But
we should recognize people have significant concerns about threats to
privacy."<br>
<br>
Assistant Privacy Commissioner Blair Stewart said marketing companies
used public registers, such as the Motor Vehicle Register, to access
thousands of names and addresses daily. Under the proposed changes, a
cap of about 30 would be imposed to limit this.<br>
<br>
Delegates were also told that technology was posing a major challenge
in maintaining existing privacy laws.<br>
<br>
The growing use of radio frequency identification &#8212; monitoring tags
that contain a unique identifier and transmitter &#8212; posed a range of
privacy dilemmas, Otago University law professor Paul Roth said.<br>
<br>
Unlike bar codes, the data can be read from a distance and was used by
businesses in employee identification cards, medication, livestock, and
clothing. Some United States defense employees have RFID [radio
frequency identification] tags embedded in their skin.<br>
<br>
Police also warned of growing incidents of identity theft. "The volume
is astronomical compared with 15 years ago," Police Identity
Intelligence Unit representative David Kennedy said. ID theft was a
fundamental privacy breach and businesses that stored unnecessary
personal details about customer databases could be contributing to the
problem. "The information is a lot more dangerous and a lot more
valuable than people realize."<br>
<br>
Australian Privacy Commissioner Karen Curtis issued a stern warning
about the consequences a business faced if it did not safeguard
personal information.<br>
<br>
Past experience showed the public voted with their feet when companies
were caught abusing privacy, she said<br>
= = =<br>
</body>
</html>



<<< Chronological Index >>>    <<< Thread Index >>>