EU data protection targets tech giants

The EU is looking at enforcing new privacy rules to give web users the "right to be forgotten."

EU

New EU data privacy rules could mean tech giants like Google and Facebook will have to rethink their data rules, European Union (EU) justice chief Viviane Reding said yesterday.

Reding will propose an overhaul of the EU's 16-year-old laws on data protection in the coming months to enforce more safeguards on how personal information is used.

Much of the revamp would target sites such as Facebook, Google, Microsoft or Yahoo, because of rising worries about how they use information they collect about users' personal habits.

Reding wants to force companies to allow internet users to withdraw any data held by the websites, calling it the "right to be forgotten," as well as make the firms provide more information on what data is collected and for what purpose.

With many of the companies based in the US or holding data on servers there, she said agencies watching over privacy issues in EU countries should be given more powers to enforce compliance outside Europe.

"Any company operating in the EU market or any online product that is targeted at EU consumers must comply with EU rules," Reding, who oversees justice and human rights in the executive European Commission, said in a speech.

"To enforce EU law, national privacy watchdogs shall be endowed with powers to investigate and engage in legal proceedings against non-EU data controllers," she said.

Privacy concerns led to tensions with Washington last year after the European Parliament vetoed a deal struck with the European Commission on sharing bank transfer data with counter-terrorism investigators from the US.

The agreement had to be renegotiated to increase privacy protection before it took effect.

Any new EU rules on privacy are still some way away. Reding's proposals, expected before July, would have to be approved by EU governments and by the European Parliament.

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

3 Mar 2021
Microsoft Exchange targeted by China-linked hackers
zero-day exploit

Microsoft Exchange targeted by China-linked hackers

3 Mar 2021
Malicious ‘dependency confusion’ packages are stealing password files
hacking

Malicious ‘dependency confusion’ packages are stealing password files

2 Mar 2021
What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

2 Mar 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021