Key Points
  • ECPA standards must be clarified, providing stronger privacy protections for communications and associated data in response to changes in technology and new services and usage patterns, while preserving the legal tools necessary for government agencies to enforce the laws, respond to emergency circumstances and protect the public.
  • Federal privacy law must be reconciled with requests by fiduciaries and executors for access to digital assets of deceased person, resolving serious conflict of law and preemption questions for the states and privacy questions for users of online services. Policy must balance the interests of estate administrators, with the privacy of users with whom and about whom they have communicated.
  • State Departments of Education should make publicly available an inventory and index of all data elements with definitions of individual student data fields currently in the statewide longitudinal data system, create a data security plan, and ensure compliance with federal and state data privacy laws and policies.
  • Effective cybersecurity measures will build upon public-private partnerships, existing initiatives, and resources, emphasize risk management, focus directly on threats and bad actors and be capable of responding and rapidly adapting to new technologies, consumer preferences, business models, and emerging threats.

A market environment is essential for future success of the Internet. A consumer and private-sector-driven approach to privacy via self-regulation avoids undue regulatory burden that would threaten a thriving electronic marketplace.

The Internet has flourished due in large part to the unregulated environment in which it has developed and grown. Self-regulation, industry-driven standards, individual empowerment and a market environment generally promise greater future success than intrusive governmental regulation.  In order to secure the economic growth and vitality of the electronic marketplace, the private sector must continue to lead through self-regulation. Innovation, expanded services, broader participation, and lower prices will arise in a market-driven arena, not in an environment burdened by over-regulation.

The market has responded favorably and swiftly to consumer concerns regarding the collection and use of personal information.  Innovators have crafted tools that let users block cookies, advertising, the tracking of Internet surfing behavior, and third party sharing of information. The market is responding to consumer concerns, without burdensome government regulation. The most effective privacy policies provide notice, choice, security, and access. Online sites and services should be encouraged to offer more options along these lines and individuals should be free to select the policy that best fits their needs and take responsibility for their online activities.

Effective cybersecurity is essential for the proper function of government and continued growth of the economy in cyberspace.  However, cyber challenges could pose an existential threat to the U.S. economy, our national security apparatus and public health and safety.

Cyberspace’s owners include all who use it: consumers, businesses, governments, and infrastructure owners and operators. Cybersecurity measures must help these stakeholders to be aware of the risks to their assets, property, reputations, operations, and sometimes businesses, and better understand their important role in helping to address these risks. Industry should lead the way in sharing information with the appropriate government entities following an attack and collaborating with others in the private sector to share best practices.

Partnerships between government and industry have provided leadership, resources, innovation, and stewardship in every aspect of cybersecurity since the origin of the Internet. Cybersecurity efforts are most effective when leveraging and building upon these existing initiatives, investments, and partnerships.

Publications

  • 2013-03-20 Abuse-and-Misuse-of-Personal-Info-Final cover

    Abuse and Misuse of Personal Information

    Executive Summary: Advances in technology provide a number of useful products and services that can either enhance or threaten personal privacy, …
+ All Privacy and Security Publications

Model Policies

  • Computer Protection Act Sunset Review

    Computer Protection Act Summary Prohibits a person from using specified protected computers to relay or retransmit commercial electronic mail messages with the intent to deceive or mislead recipients or an electronic mail service provider under specified circumstances; prohibits a person from materially falsifying header information in commercial electronic mail …

  • Computer Spyware Protection Act Sunset Review

    Computer Spyware Protection Act Summary Spyware is a catch-all term for computer programs that can track computer users’ movements online. There are hundreds of programs that range from innocuous “ad-ware,” which generates pop-up advertisements, to more dangerous programs that can record a user’s keystrokes to gather personal information such …

  • Anti-Phishing Act Sunset Review

    Anti-Phishing Act Summary This Act will help ensure that phishing and pharming are illegal and that the state has the ability to prosecute the bad actors that prey on the residents of this state.  Phishing or Pharming are acts that defraud someone by using a false web site or …

  • Electronic Government Services Act Final

    Electronic Government Services Act Summary While the continued development of information technology and the proliferation of the Internet has permitted government agencies to make more efficient the necessary transactions between citizens and the government, it has also blurred the lines between commercial activities and appropriate governmental functions. The “Electronic …

  • Neutrality and Integrity in Software Procurement Act Final

    Neutrality and Integrity in Software Procurement Act Summary This Act amends the state’s procurement rules to preserve choice, competition, and integrity in the state’s selection and installation of software products. It requires that software procurement decisions made by the state consider: (1) the total cost of ownership during the …

  • Resolution Supporting Pro Consumer Public Policy for Voice, Video, and Data Services Final

    Resolution Supporting Pro Consumer Public Policy for Voice, Video, and Data Services Summary This Resolution offers support for minimal federal, state, and local regulation of broadband networks, specifically regarding voice, video and data services. The Resolution recognizes that government, through regulation, tends to get in the way …

+ All Privacy and Security Model Policies

Task Forces

Commerce, Insurance and Economic Development

Members of the Commerce, Insurance and Economic Development Task Force believe that economic freedom is the cornerstone of prosperity. The …

Health and Human Services

There is no sector of our economy where the hand of government is more evident than in health care. Half …

Communications and Technology

With nearly 200 members representing all parts of the country and every segment of industry, the Communications and Technology Task …