1L0P 7DLypX3XxniezsAJqA
Editor’s Note: This blog post highlights Palantir’s response to a Request for Information from the House Energy and Commerce Committee’s Privacy Working Group, which is exploring the creation of a national data privacy law. For more information about Palantir’s contributions to AI Policy, visit our website here.
In April, Palantir submitted a response to a Request for Information from the House Energy and Commerce Committee’s Privacy Working Group regarding its efforts to develop a federal comprehensive data privacy and security law. How the federal government finally works to resolve the challenges of a patchwork of consumer privacy legislation is not just critical in its own right, but also serves as a signal for how the government should be addressing similar challenges with AI regulation.
At Palantir, we see our work as a duty and a privilege, serving our nation and strengthening its vital interests at home and abroad. Respect for individual liberties is central to the American way of life, and privacy rights have always been a crucial part of these freedoms. That is why privacy rights shaped Palantir’s founding 20 years ago and remain core to our identity as a company today.
The Privacy Working Group’s deliberations on the framework and essential details of a federal comprehensive data privacy and security law may prove crucial to the safeguarding of Americans’ fundamental privacy rights for years to come. We approached our response to the working group’s RFI with abiding respect for the delicate balance that must be struck between maintaining a commitment to America’s democratic process and formulating a federal data security and privacy law that safeguards the privacy rights of all Americans while encouraging innovation.
Below is a portion of our RFI response. We encourage interested readers to check out our full response posted here.
Recommended Scope: Any organization [excepting exempted organizations] that processes the data of United States citizens or residents (“U.S. persons”).
Any organization handling the data of U.S. persons should be subject to laws that protect the data of U.S. persons, no matter where they are based. This is the best way to guard against organizations based offshore that poorly handle sensitive data.
Recommended Definitions:
We recognize the challenge of defining personal information, especially against a backdrop of existing — and often inconsistent — definitions enshrined in other sectoral (e.g., HIPAA) and jurisdictional (e.g., CPPA/CPRA, GDPR) privacy legislation. As a company that provides configurable, privacy-enhancing technology capabilities adaptable to heterogeneous definitions of personal and sensitive personal information, we are agnostic to the specific attributes of a chosen definition. We do, however, wish to urge caution on two areas of potential ambiguity that flow from sub-optimal definitions:
2. What disclosures should consumers be provided with regard to the collection, processing, and transfer of their personal information and sensitive personal information?
Entities should provide clear, articulate, and reasonably specific documentation of the intended use cases for which data is to be collected, processed, or transferred.
For instance, “general marketing” is an example of too vague an explanation of legitimate purpose of use. Instead, stating, “marketing of complementary services within X months of collection,” would establish a clearer framework for onward use for collected data.
3. Please identify consumer protections that should be included in a comprehensive data privacy and security law. What considerations are relevant to how consumers enforce these protections and how businesses comply with related requirements?
We believe the following consumer protections should be included in any comprehensive data privacy and security law:
Right to Delete / Right of Erasure
Right to Know / Right to Access
Compliance with Rights of Access and Erasure
Right of Redress
The above outlined consumer protections offer important measures for reaffirming the rights of American consumers. Their full implementation, however, may implicate organizational, procedural, and technical burdens that are onerous to smaller ventures. It may therefore be prudent to consider a tiered or graduated framework for operationalizing these protections, with escalating requirements as organizations grow in both their risk profile and capacity to support such measures.
4. What heightened protections should attach to the collection, processing, and transfer of sensitive personal information?
Regardless of a party’s standing as controller or processor, we view the following as core privacy and security protective principles for the collection, processing, and transfer of all personal information, whether or not it rises to defined level of sensitivity:
The above principles are well established within existing privacy protective frameworks, including various formulations of the of the Fair Information Principles (FIPs) and Fair Information Practice Principles (FIPPs). See, for example, the Department of Homeland Security’s articulation of the Fair Information Practice Principles (FIPPS).
These articulated principles should be reinforced through a mix of both organizational practices and technical controls. While prescriptive approaches to institutional practices tend to be more difficult and less effective to impose (given the multitude of creative business approaches taken by America’s entrepreneurs and business leaders), more discrete specifications of the supporting technical controls can be articulated and provided as examples.
Our response to the House Energy and Commerce Committee’s Privacy Working Group underscores Palantir’s long-standing commitment to privacy-protective technologies. We look forward to engaging with the working group and other stakeholders as this critical work continues to evolve.
Palantir Advocates for Balanced Data Privacy Legislation in RFI Response was originally published in Palantir Blog on Medium, where people are continuing the conversation by highlighting and responding to this story.
So any alternatives or is it VPN buying time? submitted by /u/mrgreaper [link] [comments]
In this article, you will learn: • the purpose and benefits of image augmentation techniques…
Machine learning projects can be as exciting as they are challenging.
Legal teams spend bulk of their time manually reviewing documents during eDiscovery. This process involves…
Developers building with gen AI are increasingly drawn to open models for their power and…
The move underscores Meta’s strategy of spending aggressively now to secure a dominant position in…