EPIC's Call to Arms: Protecting Consumer Data
Nathan E Botts
/ Categories: Privacy

EPIC's Call to Arms: Protecting Consumer Data

Urging CFPB to Take Firm Regulatory Measures Against Data Brokers

The Electronic Privacy Information Center (EPIC) has urged the Consumer Financial Protection Bureau (CFPB) to intensify regulatory actions against data brokers due to concerns about the invasive nature of data collection and the potential harms to consumers. EPIC emphasizes that everyday activities lead to extensive data profiles, which most consumers cannot evade.

EPIC recommends leveraging the Fair Credit Reporting Act (FCRA) more effectively to monitor and restrict data broker activities. EPIC's suggestions include confirming FCRA's broad scope, limiting consumer report sales, ensuring data minimization, and applying additional safeguards under the Consumer Financial Protection Act (CFPA) like prohibiting secret scoring and certain data disclosures.

 

 

SOAP Notes on Data Brokering and Privacy Issues

Subjective:
- EPIC's concern over widespread data trafficking, its effect on consumers, and the inadequacy of current protective measures.
- Daily activities produce data that brokers compile into comprehensive profiles.
- Average individuals cannot avoid data collection, given the pervasive data-extractive technologies and online services.
- EPIC Director of Litigation, John Davisson, labels data brokers as the central mechanism of the surveillance economy.

Objective:
- EPIC has approached the CFPB with extensive comments in response to the bureau's inquiry into the data broker industry.
- The Fair Credit Reporting Act (FCRA) was established in 1970 to regulate the collection, sharing, and disposal of personal data by consumer reporting companies.
- EPIC's recommendations to CFPB focus on ensuring consumers' rights, data minimization, security of consumers’ personal information, and restrictions on the use of certain types of data.

Assessment:
- Data brokers operate on a large scale with limited oversight, transparency, and accountability.
- Existing regulations under the FCRA can be better leveraged to monitor and restrict data brokers.
- EPIC emphasizes the importance of the CFPB's role in ensuring consumer data protection, especially given the increasing influence and reach of data brokers.

Plan:
1. EPIC urges the CFPB to:
   - Utilize unused regulatory and enforcement powers under FCRA.
   - Confirm the wide reach of FCRA.
   - Establish that FCRA should primarily be applicable to data brokers and related entities.
   - Limit the purposes for which consumer reports can be sold.
   - Emphasize liabilities for both unintentional and unauthorized disclosures of personal information.
   - Incorporate data minimization principles into regulations.
   - Restrict certain uses of credit reports.
2. Beyond FCRA, EPIC advises the CFPB to use the Consumer Financial Protection Act (CFPA) to:
   - Prohibit secret scoring.
   - Limit disclosure and buying of certain types of data.
   - Stop data brokers from facilitating discrimination.
   - Regulate non-FCRA-covered fraud scoring.
3. EPIC also encourages CFPB to seek more public input and collaborate with other organizations to further regulate data brokers.

Previous Article Inherent Vice and Its Relation to Personal Health Information Management
Next Article CISA warns of a cybersecurity problem involving Medtronic cardiac devices.
Print
764 Rate this article:
No rating
0Upvote 0Downvote
Please login or register to post comments.

How to Protect Your Privacy as More Apps Harvest Your Data

A New York Times Personal Tech series article by Brian X. Chen

Retrieved By Health eConsultation 0 14831 Article rating: 5.0

In this article written by Brian X. Chen from the New York Times he discusses some of the potential ways in which mobile apps that you download to your phone may be collecting and using your personal data in ways you did not know.

One of the key takeaways is that there are ways in which to protect yourself and tools that can help you figure out which apps are collecting your data and how to remove their ability to do so.

Stay Private: How to Hide Your Webcam, Mute Your Mic, and Turn Off Notifications

An article from Zapier

Nathan E Botts 0 14842 Article rating: 5.0

One consideration as you gather and store more personal health information on your computer and devices is making sure that you are not inadvertently sharing this information (or some other aspect of your personal health) through your webcam or mic.

This article from Zapier outlines several different ways and some handy applications that can help you control this on your PC or MAC.

Determining the Value of Compromising Your Privacy

An article from Engadget

Nathan E Botts 0 9939 Article rating: No rating

This article from the Engadget web magazine discusses how your online searching behaviors might be monitored by different companies that you are unaware about. This data is likely used to build profiles that may impact the advertisements you see, credit ratings received, and other potential social network aspects as of yet identified. 

Cybersecurity: Crash Course Computer Science #31

Retrieved By Health eConsultation 0 14452 Article rating: No rating

Cybersecurity: Crash Course Computer Science #31Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible as possible. From massive Denial of Service, or DDos attacks, to malware and brute force password cracking there are a lot of ways for hackers to gain access to your data, so we’ll also discuss some strategies like creating strong passwords, and using 2-factor authentication, to keep your information safe. Check out Computerphile’s wonderful video on how to choose a password! https://www.youtube.com/watch?v=3NjQ9b3pgIg Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here! https://store.dftba.com/products/computer-science-coasters Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios Want to know more about Carrie Anne? https://about.me/carrieannephilbin The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV Want to find Crash Course elsewhere on the internet? Facebook - https://www.facebook.com/YouTubeCrash... Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse CC Kids: http://www.youtube.com/crashcoursekids

RSS

What is Health eDefense?

Health eDefense is the act of protecting your personal health information. This not only protects your privacy, security, and safety, but also protects the data of your family, friends, and others in your community.

The Health eDefense platform is dedicated to providing consumers with actionable information on how to protect their personal health information effectively from cyber threats. Health eDefense provides informational content and education related to cyber security, privacy and consent, security, and related topics and policies such as HIPAA and GDPR.

Cyber security is impacting our daily lives, and our personal and protected health information is a target for hackers and criminals looking to make money off of our personal data. Your personal health data will always be about your health, demographics, social, lifestyle, financial history, and other related details. Once taken, they cannot be taken back.

We think the best cybersecurity tool is education and awareness, and we hope to provide users with tools and insight to protect themselves and their data better.