[House Hearing, 107 Congress] [From the U.S. Government Publishing Office] INFORMATION PRIVACY: INDUSTRY BEST PRACTICES AND TECHNOLOGICAL SOLUTIONS ======================================================================= HEARING before the SUBCOMMITTEE ON COMMERCE, TRADE, AND CONSUMER PROTECTION of the COMMITTEE ON ENERGY AND COMMERCE HOUSE OF REPRESENTATIVES ONE HUNDRED SEVENTH CONGRESS FIRST SESSION __________ JUNE 21, 2001 __________ Serial No. 107-38 __________ Printed for the use of the Committee on Energy and Commerce Available via the World Wide Web: http://www.access.gpo.gov/congress/ house __________ U.S. GOVERNMENT PRINTING OFFICE 73-730 WASHINGTON : 2001 _______________________________________________________________________ For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 COMMITTEE ON ENERGY AND COMMERCE W.J. ``BILLY'' TAUZIN, Louisiana, Chairman MICHAEL BILIRAKIS, Florida JOHN D. DINGELL, Michigan JOE BARTON, Texas HENRY A. WAXMAN, California FRED UPTON, Michigan EDWARD J. MARKEY, Massachusetts CLIFF STEARNS, Florida RALPH M. HALL, Texas PAUL E. GILLMOR, Ohio RICK BOUCHER, Virginia JAMES C. GREENWOOD, Pennsylvania EDOLPHUS TOWNS, New York CHRISTOPHER COX, California FRANK PALLONE, Jr., New Jersey NATHAN DEAL, Georgia SHERROD BROWN, Ohio STEVE LARGENT, Oklahoma BART GORDON, Tennessee RICHARD BURR, North Carolina PETER DEUTSCH, Florida ED WHITFIELD, Kentucky BOBBY L. RUSH, Illinois GREG GANSKE, Iowa ANNA G. ESHOO, California CHARLIE NORWOOD, Georgia BART STUPAK, Michigan BARBARA CUBIN, Wyoming ELIOT L. ENGEL, New York JOHN SHIMKUS, Illinois TOM SAWYER, Ohio HEATHER WILSON, New Mexico ALBERT R. WYNN, Maryland JOHN B. SHADEGG, Arizona GENE GREEN, Texas CHARLES ``CHIP'' PICKERING, KAREN McCARTHY, Missouri Mississippi TED STRICKLAND, Ohio VITO FOSSELLA, New York DIANA DeGETTE, Colorado ROY BLUNT, Missouri THOMAS M. BARRETT, Wisconsin TOM DAVIS, Virginia BILL LUTHER, Minnesota ED BRYANT, Tennessee LOIS CAPPS, California ROBERT L. EHRLICH, Jr., Maryland MICHAEL F. DOYLE, Pennsylvania STEVE BUYER, Indiana CHRISTOPHER JOHN, Louisiana GEORGE RADANOVICH, California JANE HARMAN, California CHARLES F. BASS, New Hampshire JOSEPH R. PITTS, Pennsylvania MARY BONO, California GREG WALDEN, Oregon LEE TERRY, Nebraska David V. Marventano, Staff Director James D. Barnette, General Counsel Reid P.F. Stuntz, Minority Staff Director and Chief Counsel ______ Subcommittee on Commerce, Trade, and Consumer Protection CLIFF STEARNS, Florida, Chairman NATHAN DEAL, Georgia EDOLPHUS TOWNS, New York Vice Chairman DIANA DeGETTE, Colorado ED WHITFIELD, Kentucky LOIS CAPPS, California BARBARA CUBIN, Wyoming MICHAEL F. DOYLE, Pennsylvania JOHN SHIMKUS, Illinois CHRISTOPHER JOHN, Louisiana JOHN B. SHADEGG, Arizona JANE HARMAN, California ED BRYANT, Tennessee HENRY A. WAXMAN, California STEVE BUYER, Indiana EDWARD J. MARKEY, Massachusetts GEORGE RADANOVICH, California BART GORDON, Tennessee CHARLES F. BASS, New Hampshire PETER DEUTSCH, Florida JOSEPH R. PITTS, Pennsylvania BOBBY L. RUSH, Illinois GREG WALDEN, Oregon ANNA G. ESHOO, California LEE TERRY, Nebraska JOHN D. DINGELL, Michigan, W.J. ``BILLY'' TAUZIN, Louisiana (Ex Officio) (Ex Officio) (ii) C O N T E N T S __________ Page Testimony of: Cerasale, Jerry, Senior Vice President, Government Affairs, Direct Marketing Association, Inc.......................... 59 Cole, Steven J., Senior Vice President and General Counsel, Corporate Secretary of the Council of Better Business Bureaus, Inc............................................... 66 DeVault, Jerry R., National Director, Innovative Assurance Solutions, Ernst & Young................................... 73 Hsu, Stephen, Co-Founder, Chairman and CEO, SafeWeb, Inc..... 29 Hughes, J. Trevor, Director, Privacy Compliance, Engage, Inc. 55 Rotenberg, Marc, Executive Director, Electronic Privacy Information Center......................................... 76 Schlosstein, Frances, Vice President, Business Development and Marketing, Webwasher................................... 25 Schwarz, John, CEO, Reciprocal............................... 32 Wallent, Michael, Product Unit Manager, Internet Explorer, Microsoft Corporation...................................... 18 (iii) INFORMATION PRIVACY: INDUSTRY BEST PRACTICES AND TECHNOLOGICAL SOLUTIONS ---------- THURSDAY, JUNE 21, 2001 House of Representatives, Committee on Energy and Commerce, Subcommittee on Commerce, Trade, and Consumer Protection, Washington, DC. The subcommittee met, pursuant to notice, at 10 a.m., in room 2123, Rayburn House Office Building, Hon. Cliff Stearns (chairman) presiding. Members present: Representatives Stearns, Deal, Shimkus, Bryant, Bono, Terry, Bass, Tauzin (ex officio), Towns, DeGette, Doyle, Harman, Markey, and Eshoo. Staff present: Ramsen Betfarhad, majority counsel; Mike O'Rielly, majority professional staff; Brendan Williams, legislative clerk; and Bruce M. Gwinn, minority counsel. Mr. Stearns. Good morning. The Subcommittee on Commerce, Trade, and Consumer Protection will come to order. I wish, of course, to thank all of those in attendance, especially our distinguished witnesses. Welcome to the subcommittee's hearing. We entitled it ``Information Privacy: Industry Best Practices and Technological Solutions.'' It could also be entitled ``Software Solutions and Self-Determination.'' This hearing is the fifth in a six-part series of hearings examining information privacy. The series is scheduled to conclude next month. My colleagues, I am confident that this morning's hearing, as with the four preceding it, will add to an already rich record on the issues of information privacy. The record developed by this subcommittee on information privacy is the most comprehensive in Congress and enjoys both an impressive range and depth. I invite all members to review the record before formulating their thoughts and positions on the issue of information privacy. Today's hearing adds a new and important dimension to the existing record--private sector response to privacy concerns. That response engenders two components--technological solutions and voluntary industry information privacy standards. I am particularly pleased that this morning we will witness the demonstration of just a handful of technological solutions that are now available to the American consumer. In my view, these solutions designed to reach information privacy concerns of the consumer are a critical ingredient of whatever is a recipe to the final solution of our problem. Technological solutions are such a critical ingredient for three reasons among many. First, nothing offers a consumer greater control over his information privacy destiny than technology. Using some of the filtering software being demonstrated today, I, as an internet user, can determine how much personal information I want to share and for what purpose. For example, I can determine to accept a ``good cookie,'' one that makes surfing a website seamless and efficient, as easily as I can decide to reject a ``bad cookie,'' one designed to track my online movements for purposes I don't care for. The second reason why technology is a critical part of any response to information privacy concerns is the fact that technology responds to change much faster and with greater responsiveness and precision to the new and continually evolving privacy concerns than any other way of addressing information privacy concerns. Innovation and technological change has, and continues to be, a hallmark of the American experience and its culture. Technology has helped us combat many ills of society, albeit not by itself. Moreover, solutions to privacy concerns have the advantage of precision, not too dissimilar to laser surgery. A tech solution can remove the bad cells with minimal, if any, damage to the good cells surrounding the bad. Finally, the incentive for the creation and constant improvement upon technological tools, getting at consumers' information privacy concern, is a great one. It is the mighty dollar. When there is a consumer concern such as privacy, a marketplace is created. Where there is a market, there are dollars to be made. Where there are dollars for whatever reason, there is creativity, innovation, speed, and efficiency. The second component of the private sector response to the American consumers' information privacy concerns is the adoption of self-regulatory measures. Today's witnesses will highlight a number of voluntary self-regulatory programs adopted by direct marketers, online advertisers, and retailers. Moreover, we will hear about a new field in ``assurance services,'' privacy assurance. No one is under the illusion that altruism has brought about this movement in self- regulation. After all, substantial costs are associated with the deployment, implementation, and adherence to these self- regulatory standards governing consumer information privacy practices. Rather, it seems that many, if not the majority, of companies dealing with individual consumers have reached the conclusion that being responsive to their customers' information privacy concerns is simply ``good business.'' Now, how successful have they been? I don't know. What I do know is that some companies have chosen to use their privacy policies as a means of gaining a competitive advantage vis-a-vis their competitors. Such competition ultimately empowers a consumer to vote with his dollars as to what are his or her information preferences. In my many years of public service, I have yet to find an important complex public policy concern that has lended itself to a panacea quick-like solution. Information privacy concerns are no exception. Private sector solutions, such as technology and self-regulatory practice, however, do go a long way toward mitigating those concerns. So I look forward to our witnesses' testimony, and we are just delighted to have them. And I will offer the ranking member, the distinguished member from New York, Mr. Towns, an opening statement. [The prepared statement of Hon. Cliff Stearns follows:] Prepared Statement of Hon. Clifford Stearns, Chairman, Subcommittee on Commerce, Trade, and Consumer Protection Good morning. I wish to thank all in attendance, especially our distinguished witnesses. Welcome to Commerce, Trade, and Consumer Protection subcommittee's hearing entitled, Information Privacy: Industry Best Practices and Technological Solutions. This hearing is the fifth in six part series of hearings examining information privacy. The series is scheduled to conclude next month. I am confident that this morning's hearing, as with the four preceding it, will add to an already rich record on the issue of information privacy. The record developed by this subcommittee on information privacy is the most comprehensive in Congress and enjoys both an impressive range and depth. I invite all members to review the record before formulating their thoughts and positions on the issue of information privacy. Today's hearing adds a new and important dimension to the existing record: private sector response to privacy concerns. That response engenders two components: technological solutions and voluntary industry information privacy standards. I am particularly pleased that this morning we will witness the demonstration of just a handful of the technological solutions now available to the American consumer. In my view, technological solutions designed to reach information privacy concerns of the consumer are a critical ingredient of whatever is the recipe to the solution for the problem. Technological solutions are such a critical ingredient for three reasons, among many. First, nothing offers a consumer greater control over his ``information privacy destiny'' than technology. Using some of the filtering software being demonstrated today, I, as an Internet user, can determine how much personal information I wish to share and for what purpose. For example, I can determine to accept a ``good cookie--one that makes surfing a website seamless and efficient--as easily as I can decide to reject a `bad cookie' '' one designed to track my online movement for a purpose I don't care for. The second reason why technology is a critical part of any response to information privacy concerns is the fact that it responds to change much faster and with greater responsiveness and precision to the new and continually evolving privacy concerns than any other way of addressing information privacy concerns. Innovation and technological change has and continues to be a hallmark of the American experience. Technology has helped us combat many ills of society, albeit not by itself. Moreover, technological solutions to privacy concerns have the advantage of precision. Not to dissimilar to laser surgery, a tech solution can remove the bad cells with minimal, if any damage, to the good cells surrounding the bad. Finally, the incentive for the creation and constant improvement upon technological tools getting at consumer's information privacy concerns is a great one. It is the mighty dollar. When there is a consumer concern such as privacy, a market place is created. Where there is a market, there are dollars to be made. Where there are dollars, for whatever reason, there is creativity, innovation, speed and efficiency. The second component of the private sector response to the American consumer's information privacy concerns is the adoption of self- regulatory measures. Today's witnesses will highlight a number of voluntary self-regulatory programs adopted by direct marketers, online advertisers and retailers. Moreover, we'll hear about a new field in ``assurance services,'' privacy assurance. No one is under the illusion that altruism has brought about this movement in self-regulation. After all, substantial costs are associated with the deployment, implementation and adherence to those self-regulatory standards governing customer information privacy practices. Rather, it seems that many, if not the majority, of companies dealing with individual consumers have reached the conclusion that being responsive to their customers information privacy concerns is simply good business. Now, how successful they have been, I don't know. What I do know is that some companies have chosen to use their privacy policies as a means of gaining a competitive advantage vis-a-vis their competitors. Such competition, ultimately empowers the consumer to vote with his feet and/or dollars as to what are his or her information privacy preferences. In my many years of public service, I have yet to find an important and complex public policy concern that has lent itself to a panacea like solution. Information privacy concerns are no exception. Private sector solutions such as technology and self-regulatory practices, however, do go a long way towards mitigating those concerns. Thank you. I look forward to the testimony. Mr. Towns. Thank you very much, Mr. Chairman. I have a prepared opening statement, but I would like to just put it in the record and just make a couple of comments. Mr. Stearns. Without objection, so ordered. Mr. Towns. First of all, let me commend you, Mr. Chairman, for the way you are handling this situation. The fact that you are moving very slowly, you are listening, you are talking to a lot of people before moving forward. I think that is really the smart way to do it, and I want to commend you for that. I also want to say that some people are saying that we should just leave this alone and it will sort of work itself out. But the consumers are out there saying, ``We want to be protected.'' And I think that we need to take a very careful look and try to find out ways and methods that we can protect them. And I feel very comfortable, Mr. Chairman, in the way you-- again, the way you are moving, because, you know, we need to talk to people, we need to listen, and we need to visit. And I have been trying to visit as many companies as I possibly can, of course, in the New York area to talk to them to get their input in terms of how we should handle this situation. I don't want us to make the mistake that Thomas Jefferson made. Thomas Jefferson read a pamphlet on how to swim and jumped in the water and almost drown--you know, kicking his leg and pulling his arm, and all of that. So I don't want to be guilty of that. I think that we need to make certain that we talk to people that are out there in the field on a day-to-day basis, in terms of--and involved in this issue. And I think that if we do that, then I think that at the end of the day we can come up with something that will not put a whole lot of folks out of business, but at the same time be able to protect the consumer as well. So I wanted to say to you, I salute you on that, and I am anxious and eager to hear from the witnesses because I think this is something that we must deal with eventually. No question about it. And on that note, I yield back. [The prepared statement of Hon. Ed Towns follows:] Prepared Statement of Hon. Ed Towns, a Representative in Congress from the State of New York Mr. Chairman, thank you for holding this educational hearing on information privacy. I would also like to join you in welcoming the members of both panels assembled here today. I would especially like to welcome my friend, John Schwarz, the CEO of Reciprocal, which is located in New York's Silicon Alley. John has a great product to display for us today and I look forward to hearing from him as well as all the witnesses. Mr. Chairman, I must say that I am heartened by the technologies assembled here today that will allow consumers more control over their personal identifiable information. I am particularly pleased with Microsoft including the Platform for Privacy Preferences or (P3P) into their latest edition of Internet Explorer. After seeing a demonstration of this new technology integrated with the new Microsoft Operating System, I feel that consumers are going to be empowered like never before to not only further protect themselves but to further educate themselves on protecting their privacy, which is of the utmost importance. I do not commend the P3P technology because it is an end all-be-all for privacy protection, but rather because Microsoft is truly the first company to offer a pragmatic solution which grants more power to the consumer while they surf the Internet. The other technology that I want to bring to my colleagues' attention is that which is being used by Reciprocal. Reciprocal is a company, which currently protects Intellectual Property on the Internet by encrypting the content when it is purchased online. While Mr. Schwarz will explain this more in depth during his testimony, his technology can be and in the near future I believe should be used to help protect medical as well as financial records, in addition to other personal information belonging to consumers. Companies need to feel that their efforts will not go unrewarded. Many of my colleagues are bent on legislating Internet privacy. While I would agree that minimum standards are needed, why limit an industry that continually awes consumers with each new product developed? Let's not put restrictions on the Internet or on the technology that is bettering our constituents' lives. I look forward to hearing the testimony from our witnesses and yield back the balance of my time. Mr. Stearns. I thank the gentleman. The gentleman from Illinois, Mr. Shimkus? Mr. Shimkus. Thank you, Mr. Chairman. And I will be brief; we have two large panels. And I apologize for having to leave. Our State delegation is meeting on appropriation issues, and I get to chair that meeting at 11. But I want to thank you for holding this hearing. I look forward to the demonstrations that I am going to be able to observe. We will have staff present. Also, I am interested in hearing how the businesses depend on sharing personal information and their views of new privacy tools. We all know that our citizens want privacy protection. We also know that our citizens want to accrue all of the benefits of information sharing. The question is: are these two issues mutually exclusive? Hopefully you will inform us that what is--what the consumers want is the best, and you are helping provide the technology through the business model to solve those issues. I hope you can answer those questions, and we look forward to hearing from you. I yield back my time, Mr. Chairman. Thank you. Mr. Stearns. I thank the gentleman. The gentlelady from California, Ms. Eshoo? Ms. Eshoo. Thank you, Mr. Chairman. Good morning to you, and welcome to the witnesses. We are grateful to you for coming to Washington to enlighten us. Today's hearing can provide very important information I think for all of the members of the subcommittee for our discussion on the need for privacy legislation. By examining some of the existing technological solutions and business practices, I think that we can learn and understand better and be able to gauge the type of legislation that the issue calls for. I have introduced a bill, along with Congressman Chris Cannon from Utah, that achieves--at least we think it achieves a balance between the protection of online consumers and continued promotion of technological innovation relative to the evolution of e-commerce. We want to be able to encourage the growth of the internet and e-commerce, and I think that the bill strikes that balance. It does this by establishing some basic minimum standards in the form of notice and choice, and at the same time leaving room for the industry to continue to develop its own privacy protection technologies, some of which we are going to see today. We have to get this right legislatively. I think if there is anything that is built into legislation that allows for the unintended consequences that could happen we can really hurt what we are really attempting to grow. So I am very mindful of that, and I think anything that we do that--in haste, that we could live to regret it legislatively. We know that all of our constituents feel very strongly about privacy. I think that privacy runs through the veins of the American people. We have always had a resistance and a suspicion of Big Brother, and I think that there are people out there today that have a sense that they are suspicious or afraid of Big Browser. So we not only can collect information, it can be sold, it can be shared. There are some blessings to that, but there is a down side to it as well. So I think that today's hearing can go a long ways with the subcommittee so that we can then tell our colleagues about what technologies can do, but I also think that it will help build a foundation for legislation in the 107th Congress to provide the privacy that the American people feel so strongly about and insist upon justifiably. So I look forward to hearing from the witnesses, and thank you, Mr. Chairman, for having this important hearing. Mr. Stearns. I thank the gentlelady. My colleague from New Hampshire, Mr. Bass, is recognized. Mr. Bass. Thank you very much, Mr. Chairman. And, again, I repeat, I appreciate these series of hearings. They have been tremendously informative for me as a newer member of the committee and my first exposure to what is an exceedingly complex and difficult issue. I understand that before the Congress moves forward with any kind of government solution--if you want to give it a generic definition--we need to fully understand the scope of the problem, the players involved, and what reasonable role government can play, balancing the need to maintain a strong and vital economy on the internet, while at the same time protecting the rights of individuals. I was, unfortunately, not able to come to the hearing that was held yesterday on--or Tuesday, rather, on Ford v. Firestone, because I was holding a cyber security/privacy conference of my own in my district, in which a number of individuals, some of whom are in the same business that you folks are in, and others that are--that run concerns that have a significant cyber exposure, to try to--we met to listen to speakers who made presentations to try to make sure that we understand, at least in my district, which is a very high-tech- oriented district, what the problems are and what the potential solutions are. And without getting into some of the conclusions that were drawn by this conference that I had, suffice it to say that this hearing dovetails very well with the subject matter that I am personally concerned with and that is the concern of a significant constituency in New Hampshire. So thank you, Mr. Chairman, and I will yield back to you. Mr. Stearns. The gentleman yields back. The gentleman from Massachusetts, the ranking member of the Telecommunications Subcommittee, Mr. Markey? Mr. Markey. Thank you, Mr. Chairman, very much. And we welcome all of you best practices people, and, you know, congratulations. We are going to give you each gold stars on your forehead today for your excellent work. And you are going to actually set a standard for this committee as to what we can expect everyone else in the industry to do. Obviously, we're not going to pass any laws that will punish you, because you all do good work. But because you know better than we do how many really bad people are out there online, which is why all of your technologies are necessary, we are going to have to pass laws to protect the public against them. But you don't have to worry because you all are meeting the standards for protection of the public. That is the good news about your testimony today, that this technology is there, that public privacy can be protected, that it is not hard for the industry to do this. That is the good news, that you have the strongest case that can be made to pass legislation, that we need legislation, that we have to give everyone the minimal rights to be able to protect their information. After all, we have done it before. You know, people's tax returns are protected, their cell phone records, their telephone records, their cable records. None of this is publicly available. None of it can be disseminated without the express permission of the individual. We were doing that in an analog world. Now that we have you digital geniuses here to help us to explain--there are some people, believe it or not, who will tell us you can't do it in a digital world, even though they did it in an analog world. You know, how foolish, how anti-technology, huh? How antediluvian they all are. Because we all know that we have moved, actually, from the world of Big Brother to Big Browser. The real threat now is less what the government can do to you, but what corporate America can do to you, as these corporate data-mining giants seek to combine every piece of information about you so that they actually wind up knowing more about yourself than you do or any other member of your family. Now, we should give every American, obviously, the right to protect against that kind of invasion, because that is--that is the central right that every American has. That is what distinguishes us from the rest of the world. And it is sad to think that the Europeans are ahead of us in granting these kinds of rights, because we have--that is why we fled all of these nice, European countries, most of us in this room, our grandparents, because we weren't given these rights to protect our religion, to protect our ethnic background, to protect our privacy, from what the king--from what these despots might try to do to us. So we thank you for illustrating how this is possible. And I think, Mr. Chairman, in conclusion, we need three levels of protection. One, we need for every American to have the right to access to these technologies--P3P, any other technology that can wall out any of this information. We need individuals to themselves try to protect themselves. But at the third level, you have to realize that there are still going to be corporate or individual attempts to intrude upon our privacy. And as a result, there has to be a minimal floor of privacy that every American is entitled to, legally and enforceably. And only at the point at which all three components are in place simultaneously will there be a set of privacy protections which can protect the public. But I want to thank all of you, because there are many people, by the way, who don't want to testify here today, who will contend that what you are saying is really impossible, too difficult, can't do it, technologically impossible to protect privacy, too complicated for industry. Even as industry says, ``We can move your information from here to Kuala Lampur in the blink of an eye. And isn't it great, this information age?'' And then when you say, ``Oh, by the way, can you just let me check off someplace where I don't want it disclosed,'' they go, oh, the horror, the technological complexity of adding that one extra little box. I don't know how we are going to do it. It is a little bit--I will just conclude on this. It is a little bit like this hearing that we had last week where, you know, you have got the Energy Department here saying, ``Yes, it is possible to deploy a Star Wars technology that can be deployed in outer space with nuclear powerplants in outer space, and lasers and beams and coordinated on the ground, and knock down every Chinese and Russian missile in under a minute and a half.'' And we can do this all in the next 4 years, and actually we don't even need the anti-ballistic missile treaty, and we can abrogate our relationships with just about every other country in the world, and we know it is technologically possible. And then you say to them, ``Well, can we improve the efficiency of air conditioners?'' And they go, oh, the horror. The horror of trying to improve air conditioners so that we can deal with the electricity crisis. Okay? So you are proof positive of something that is working in the marketplace that--complemented with a legal minimal set of enforceable protections that every American can sleep at night knowing that if somebody tries to do something to them that there will be a way in which the law can protect them. Thank you, Mr. Chairman. Mr. Stearns. Thank you. The gentleman from Nebraska, Mr. Terry, is recognized for an opening statement. Mr. Terry. Thank you. I appreciate your holding this hearing. Welcome to all of our witnesses, and I yield back. Mr. Stearns. The gentleman yields back. The gentlelady from Colorado, Ms. DeGette? Ms. DeGette. Thank you, Mr. Chairman, for holding yet another informative hearing on a topic none of us ever tire of--privacy. While I am always loathe to follow Mr. Markey, I still want to add a few words, although I am sure not as glibly as Mr. Markey often does. Not too long ago, if an online business had a privacy policy, they were probably way ahead of the eight ball, regardless of what the privacy policy actually said. Now having a privacy policy is not so important as what that policy actually is. And, increasingly, consumers seem to know that. During earlier hearings in this series on privacy, I remarked that I see privacy as an issue that can be used to great advantage by industry, if it realizes how important the issue is to consumers. And we all know poll after poll shows that personal privacy continues to be one of the top concerns of individuals ranking right up there with health care and social security. And in the technological age, privacy is an increasing concern of consumers. If businesses, like those today will testify, institute straightforward and effective privacy policies, I think customers will beat a path to their door. And there are a lot of examples how this is already happening. We need to address both the perceived and real fears people have with respect to privacy, though, particularly in this electronic age. And I think this bears repeating today because the best technology and privacy policies in the world won't do much to further consumer protections if the consumer doesn't realize what is aware to him or her, or if they don't understand the vagaries of the particular technologies or policies they are dealing with. From a business perspective, a lot of time and money can be invested in implementing a certain technology. And if the customers can't figure it out, or if the customers don't even know about the existence of the policy, then the business won't reap the benefits. One of the programs that I read about in the testimony for today is the AICPA web trust program for online privacy. I recently talked about this program with some of my constituents who are members of the Colorado Association of CPAs, and they told me that when this program was first getting off the ground their members did not want to implement the system. They thought it was a hassle. They thought it was expensive, and so on. Many of the CPAs still have not put the system into place, but those who have done so found they were more than earning back their investment because of the increased business that came their way because of higher levels of consumer confidence in the business. So I think it is both the responsibility of business and a smart economic decision to make sure their privacy policies are fully accessible to their customers. The trick will be, as Mr. Markey pointed out, what do we do about the businesses who don't understand that this is both the right thing to do for consumers and also the economically prudent thing to do for their own business? And how do we protect consumers? It is an ongoing discussion that we will have. There is no magic bullet, because of advances of technology. And I look forward to hearing from our witnesses and hearing some of the new advances, and I am happy to yield back, Mr. Chairman. Mr. Stearns. I thank the very distinguished colleague. The gentleman from Tennessee, Mr. Bryant, is recognized for an opening statement. Mr. Bryant. Thank you, Mr. Chairman. I, too, look forward to hearing from our witnesses today as we continue our look into the issue of information privacy. It is good to see the private sector respond to the concerns of so many--that so many people have about the internet, and this hearing is a great opportunity for us to learn more about the technologies developed and how it provides consumers with the protection that they want. In previous hearings, I have learned that each user has a different opinion of what a violation of a person's privacy entails. It is good to know that technology such as Webwasher, Zero-Knowledge, P3P, and Microsoft Internet Explorer have been developed so each user can choose what kind of protection she wants when using the internet. I am particularly glad that the Better Business Bureau has taken the initiative as a third party to verify the security of various websites. I am also looking forward to hearing from the Direct Marketers Association and the National Advertisers Initiative, so that we can learn more about the efforts used by each to ensure that online advertisers don't overstep their bounds. Internet users like to be aware of instances when their information is going to be shared, and I think most would like to have that option of opting out. I also hope that today's hearing can serve effectively as a public forum to inform Americans about technologies, software, and assurances out there, which a person can utilize to prevent information about themselves and their internet habits from being known by parties without knowledge or permission of that user. I also hope that this hearing will provide people with information so that a user can have more confidence in the security of internet. With this, I would close my statement and thank the members of this panel for coming here today. Thank you. Mr. Stearns. I thank my colleague. Mr. Doyle, Pennsylvania, is recognized for an opening statement. Mr. Doyle. Thank you, Mr. Chairman. Good morning and welcome to all our invited guests and witnesses. I am looking forward to hearing what you as industry experts have to tell us regarding the viability and approach that your companies have employed to make electronic transactions via the internet more secure. Many of my colleagues on this subcommittee are well aware that today's hearing is the fifth in a series that the Chairman has called to examine various aspects of internet privacy debate. Without a doubt, the majority of American consumers are concerned about the security of their personally identifiable information that can be gathered while online. This subcommittee has heard testimony from previous witnesses who have conducted numerous surveys of online customers that speak to this fact. Additionally, we are here today to listen to the technological solutions and approaches various companies have developed or are in the process of developing to meet the privacy needs of online consumers. Companies would not be developing and marketing these services if a market demand for such goods did not exist. The issue of controlling the information that is gathered about consumers while online and how to go about limiting the distribution of this information is a fundamental consumer protection issue. We have a significant challenge and a good deal of discussion ahead of us before we reach a conclusion as to the best way to ensure that personal information is protected online while not stifling the continued growth of e-commerce in America. Today we revisit the issue of proper industry self- regulation this subcommittee raised in another previous hearing, and hopefully we will see some definitive solutions to privacy protection. I find it encouraging that the industry is responding to the challenges presented by internet privacy and is developing and implementing security software or protocols to address these concerns. It has been said that there is a buck to be made with the development of such services. After all, innovation and creative industry response to consumer needs has long formed the backbone of commerce in this country. I am concerned that although privacy protection companies may prevent direct third-party access to personally identifiable information, the privacy protection software itself could be used to gather information which might be shared with affiliated third party companies. I am quite sure that the representatives of the companies here today would never employ such tactics and are making great strides to combat this abuse. But without a basic framework of standards and regulations, other less responsible entities could exploit public trust for financial gain. Mr. Chairman, I look forward to hearing about the software and the practices that our esteemed guests have developed to ensure that this scenario does not become a reality. I thank you, and I yield back. Mr. Stearns. I thank my colleague. And now we recognize for an opening statement the distinguished Chairman of the full committee, the gentleman from Louisiana, Mr. Tauzin. Chairman Tauzin. Thank you, Mr. Chairman. As the committee knows, this committee requested that Chairman Stearns conduct a thorough review and educational process on the issue of privacy. And, Mr. Chairman, I want to compliment you on the fact that I think you have already outdone your assignment. This has been an extraordinarily instructive series of hearings, and I think it is going to help our full committee at some point make some very good and wise decisions regarding privacy, not only online but for the general sake of the American public. And I thank you for this hearing today. Today, as you know, we focus on two very important aspects of the question. In the privacy conference this committee conducted last year with the Chamber of Commerce, we first-hand saw and learned about some of the new technological developments of new equipment and software that, in fact, enable consumers to protect themselves online in various and in sundry ways. And we have also learned that over the last year there have been a myriad of new products coming on board and new technologies being developed. We will learn more about that today, and I thank you for arranging that, Cliff. Second, we will learn a lot more about the practices in the self-regulatory regimes that exist in the marketplace by which the industry and its players are attempting to do what a good marketplace always does, and that is give consumers something they want. And we know that consumers do want an assurance that privacy concerns are being addressed by the companies they deal with, and the people they will deal with online, and that these privacy concerns are taken seriously enough that consumers have some confidence in both the security of their transactions and the respect that will be given to information that consumers would rather not be used in ways that they would not approve of. And so we will learn a lot today about the practices within the industry. Mr. Chairman, in your last hearing we learned why consumers have reason to be concerned, and that there are, in fact, some bad practices in the marketplace. We have learned recently, even worse, that Federal websites are filled with cookies, websites where consumers don't necessarily volunteer information but in many cases are obliged to give information to a Federal agency. So we have got some real work to do in both the publicly owned websites of America and the Federal agencies and their relation to their consumers and to the consumers who enter the commercial online world and want and expect some degree of security and privacy in their transactions. This will be a very illuminating hearing because it will help us understand what is, in fact, occurring out there, particularly over the last year, that will give consumers more and more control over this sensitive issue in their lives. I also want to point out that while privacy concerns are not limited to online transactions, this exercise today will again give us more insight as to some of the broader issues of privacy concerns in the marketplace. And, again, I thank you for that. Finally, I want to address one issue that has received a little attention lately, and that's the changes that have occurred in the other body, and as they affect the issue of privacy and legislating on privacy. Let me assure all of you that the subcommittee chairman and I are committed to a very thoughtful, a very careful, and professional review of these privacy concerns, and that changes in the other body are nothing more than that--changes in the other body. We intend to keep our course, and we intend to proceed very carefully in this area because we understand how delicately the information age depends upon a very careful cut between restricting information for the cause of protecting privacy and permitting the free flow of information for the sake of an information age that depends upon information. We are going to proceed very carefully because our rule is to do no harm and to facilitate and to actually encourage the development of things we are going to learn about more today-- self-regulatory practices, self-regulatory regimes, enforcement regimes, and technologies that empower consumers in this marketplace. Thank you very much, Mr. Chairman. [The prepared statement of Hon. W.J. ``Billy'' Tauzin follows:] Prepared Statement of Hon. W.J. ``Billy'' Tauzin, Chairman, Committee on Energy and Commerce Thank you, Mr. Chairman, for holding this hearing. This is another step in the education process on this important public policy issue. You have certainly outdone yourself in an effort to provide the Subcommittee with a full background on the subject of privacy. Today's hearing focuses on two important pro-active steps organizations are taking at their own initiative to help improve consumer privacy: developing technological privacy solutions and creating positive private sector practices and/or enforcement regimes. For a number of reasons, some valid and some invalid, current information exchange practices have generated increased concern by consumers about their ability to maintain their personal privacy. From the last hearing on privacy, we learned that consumer confidence is somewhat shaken by the privacy practices of some companies. Today, we get to look at what is being done about this. With every problem, however, there is a corresponding opportunity. As with most things in the free market, someone is going to find a way to take advantage of this opportunity. The creative and innovative nature of technology is starting to take root to fill in the gap between the privacy protections consumers want and the information gathering and exchange that some companies practice. Specifically, some entrepreneurs and technology companies are developing products designed to further protect consumer privacy. Software and hardware solutions are sprouting-up in the marketplace to deal with consumer privacy interests. These solutions come in many forms with differing options and costs. From filtering products, to anonymous web-surfing, to browser notifications and standards, technology is just starting to enter this field. And this is just the tip of the iceberg. I expect many new technologies to be created to address this issue and meet consumer demand for privacy protections. In addition, many American companies, recognizing it is in their best interest to address consumer concerns, have already taken steps to improve their privacy practices or provide necessary assurances to consumers of their practices. In other words, many companies want to promote consumer confidence by giving them what they want--better privacy. Self-imposed privacy enforcement and assurance regimes have been created to promote company use of positive privacy practices--or industry ``best practices.'' These regimes also come in many different forms and may target specific sectors of industry. Today, we will hear from a number of representatives about the steps they are taking, the companies they represent or oversee, the processes they use to approve and enforce their privacy practices, and more. I think one important message to take from this hearing is the great work that is being done by the private sector to promote consumer confidence as it pertains to privacy. I appreciate the work of those companies that are developing technology and those organizations keeping privacy practices in line with consumer wishes. I think the Committee can gain a valuable education by actually trying to use and implement the technology that is out there. And so, I will be asking the relevant interested parties, especially those not able to testify today, to work with us over the next few months to show us how your technology or industry best practice would work as they apply to this Committee's website. I recognize that the privacy debate is more than just what is happening online, but this should be a useful exercise. In a voluntary way, I am hopeful that we can explore the differing programs, including the seal and assurance programs, to learn how they work. We also need to learn more about which technologies the Committee could implement to ensure citizens feel comfortable with the Committee's privacy practices. In other words, show us first-hand what you have and what it really does. Lastly, let me address one issue that has received added attention recently because of the changed perspective of the Other Body towards privacy. Let me assure everyone that the Subcommittee Chair and I are committed to a well thought-out, deliberate, rational process as it pertains to privacy and any potential fixes. The changes in the Other Body and its impact on privacy are just that--changes in the Other Body. We will continue along our own path. I again thank the Subcommittee chair for holding this hearing and look forward to the testimony of the witnesses. Mr. Stearns. I thank the distinguished chairman. We will now go to panel No. 1. Before I start, I would introduce or indicate to my colleagues that Mother Nature has prevented one of our witnesses from attending. Mr. Austin Hill of Zero-Knowledge was unable to get a flight from Montreal to Washington last night because of electrical storms. Mr. Hill asked that his testimony be made part of the record in his absence. And without objection, it will be so ordered. [The prepared statement of Austin Hill follows:] Prepared Statement of Austin Hill, Co-Founder, Executive Vice President, and Chief Strategy Officer, Zero-Knowledge Systems, Inc. Thank you, Mr. Chairman and members of the committee. I applaud the Subcommittee's leadership in addressing privacy issues, and appreciate the opportunity to talk today about the role technology solutions play in maintaining information privacy in our global information society. My name is Austin Hill, and I am the co-founder, executive vice- president, and chief strategy officer for Zero-Knowledge Systems. Zero- Knowledge is a provider of privacy-enabling technologies and services. We employ 175 people and are headquartered in Montreal, Canada with offices in Redwood City, California. Zero-Knowledge is the oldest and largest privacy technology and services company. We employ many of the world's leading privacy policy and cryptography experts, and have been working since 1997 on technological ways to prevent the erosion of privacy in the information society.1 --------------------------------------------------------------------------- \1\ See http://www.zeroknowledge.com for more information. --------------------------------------------------------------------------- As both a privacy advocate and entrepreneur, I will outline the factors creating our society's major privacy challenges, and detail where we have the technological tools to manage and secure information privacy. INFORMATION PRIVACY: AN ENTREPRENEUR'S PERSPECTIVE Four years ago, after successfully creating Canada's third largest ISP, my partners and I started thinking about Internet privacy. We saw studies showing that privacy was a growing concern for consumers and immediately recognized its importance to an emerging e-business sector. Much of our inspiration was based upon the idea that technology will be everywhere: multiple networked devices, wireless location services, intelligent homes, and ubiquitous networks. We believed that if we, as a society, did not come to terms with how to safeguard people's personal information, the technologies that would soon become so pervasive would erode individual privacy. We also recognized that if information privacy was not addressed in a way that offered customer preference and choice while enabling businesses to build trusted relationships with consumers, all of the coming advancements in technology would not reach their full potential. As a person who places a high value on individual privacy, I was deeply concerned. Yet, I also saw an incredible opportunity for privacy-enabling products and services. So, in 1997 my partners and I created Zero-Knowledge Systems to be the company that provides the solutions to ensure information privacy in our society. At Zero-Knowledge we have long held the view that good privacy is good for business, and the more we talk with our customers at some of the world's leading companies, the more we see that industry leaders share this view. The Gartner Group articulated it well in a recent report, saying: ``The widespread adoption of the Internet and the web has shifted cultural attitudes toward privacy. Heightened privacy sensitivity will require online and offline businesses to re-examine existing information practices. Through 2006 information privacy will be the greatest inhibitor for consumer-based e-business.'' 2 --------------------------------------------------------------------------- \2\ Please visit http://www.gartner.com --------------------------------------------------------------------------- We are at the beginning of the information technology revolution and it is clear that privacy has emerged as both a major challenge and opportunity. Now is the time to build privacy into business, and the new products and services being deployed every day. On the positive side, businesses and policy-makers such as yourselves have recognized the problem and are actively looking for solutions. I firmly believe that Zero-Knowledge and other companies are well positioned to provide these solutions. When examining what we need to address to provide the tools to assure information privacy, one must look at the information itself. How well an enterprise manages its personal information assets will determine the success or failure of critical e-business initiatives. A core business asset, personal information carries with it many challenges and opportunities. One must recognize the information explosion our society is in the midst of. UC Berkeley's School of Information Management and Systems stated that ``(m)ore information will be created in the next 3 years than in the last 40,000 years.'' Between 1980 and 2000 we created 10 million terabytes of data. This includes music, books, credit, medical and personal records and other common data types. From 2000 to 2003 we will create 40 million terabytes of data.3 --------------------------------------------------------------------------- \3\ Please visit http//www.sims.Berkeley.edu --------------------------------------------------------------------------- This is a truly astounding statistic. It becomes even more important to today's discussion when two more factors are taken into account. The first is to again realize that the trend for technology is toward pervasive devices and ubiquitous networks. Everything from your car to your home and phone will talk to each other and share data. The combination of the two technological trends of information explosion and pervasive computing suggests that personal information will now need to stored and transferred in a variety of new manners. Information will not simply reside on a home PC, or a PDA, but will be stored on a variety of networks, and with a variety of different organizations. This data will then be shared via the fixed Internet, the mobile Internet, and emerging personal area networks such as Bluetooth and wireless 802.11 connections. The second factor, and most relevant to your topic today, is that of all of this data the overwhelming majority of it will be personal information. Some estimates hold that over 80% of it will be personal information, including medical records, insurance records, educational records, personal communications, credit history, photos and home video, and government records.4 --------------------------------------------------------------------------- \4\ EMC, the leading data storage company, http://www.emc.com --------------------------------------------------------------------------- Zero-Knowledge believes that there are two classes of privacy- enabling products necessary to fully address information privacy in a climate such as this: (1) consumer-side privacy protection tools; and (2) corporate-side Privacy Rights Management technologies. Examples of privacy protection tools include products such as anti- virus programs, firewalls, and encryption tools. The goal of privacy protection technologies is to stop people from invading your privacy. These types of tools place the burden of use on the consumer, but also empower them to take control over and protect their privacy. We will always have private data that only we as individuals can protect and so it is essential for there to be privacy protection tools available to consumers. Zero-Knowledge has created the Freedom Internet Privacy Suite to empower Internet users to secure and protect their privacy when online. Its standard features include a firewall, ad manager, form filler, word scanner, and cookie manager. These features combine to enable an Internet user to control how and when their personal information is released, and to protect their PC from malicious hackers. We also offer Freedom's Premium Services, which add the industry's most robust private encrypted email and private browsing to the suite. These two services utilize the global Zero-Knowledge Network of servers that re- route and privatize the traffic of Freedom users. Other privacy protection solutions are available to consumers and two of them are here to testify today, WebWasher and Microsoft with its P3P-enabled browser. Technologies such as these are essential to ensure that consumers have the tools necessary to protect their privacy. The second class of privacy solutions I referred to, Privacy Rights Management (PRM) technologies, represent an essential framework for building information privacy into the enterprise. In the information society, I must trust various organizations, businesses or individuals such as my doctor with my personal information. Hence, there is a requirement for those parties to be responsible and accountable for how they manage my data. Today, no tools exist for a business or organization to demonstrably protect and manage the personal information it has collected about its valued customers and employees. Businesses must adhere to a complex and constantly emerging global framework of privacy regulations and have begun hiring Chief Privacy Officers (CPO) and other data protection officers to help with the task. I have spoken with many of these new CPOs at Fortune 500 companies and they all articulate the same concern: they don't have the tools to do their job. Imagine a Chief Financial Officer attempting to do her job without tools such as Enterprise Resource Planning software or even spreadsheets. It would be close to impossible. Unfortunately, that's exactly the position that every CPO is in today. There is, quite simply, a lack of tools for the job. This is where PRM technologies will be applied. The core idea behind PRM is that the enterprise needs a policy-based framework for data management and protection if it is to comply with regulations, mitigate risk, support customer preferences and build consumer trust. There are several companies developing solutions that fit in the Privacy Rights Management framework. These include IBM, Novell, and Tivoli. PRM is an emerging category of enterprise software that will help close the current gap between stated policies, customer preferences and operational realities. Privacy Rights Management: Software Solutions for the Global Enterprise The proliferation of data systems in both the public and private sectors that handle sensitive personal information such as health/ medical records, financial/credit records, and location-based profiles demand that proper controls be put in place to ensure this data does not fall into the wrong hands and is not subject to misuse. It is of great value for a business to have these controls in place in order to mitigate risk, reduce the cost of compliance and build consumer trust. A comment I often hear from CPOs at major corporations is that they have no idea what personal information assets are present at their company, who has access to them and how the data is being used. As a case study, imagine a global corporation with operations in disparate countries and several divisions. As an incoming CPO you will need to first discover all of the personal information present throughout the organization. You will need to know who controls each repository of personal information, which people are allowed to access what information and in what cases this information is combined with other data resources. Once that information is gathered you will have to assess which regulations apply to what kinds of data. For example, a Customer Relationship Management database located in Canada will be subject to the recently enacted Personal Information Privacy and Electronic Documents Act. Data held in a European country will be subject to the EU Directive. American companies also face privacy legislation at the local, state and federal level including the Gramm-Leach-Bliley (GLB) Act and Health Insurance Portability and Accountability Act (HIPAA). Combined with this global patchwork of regulations are the data and privacy policies present in your company. As Chief Privacy Officer your next challenge is to apply and enforce data regulations and policies on the data and continually monitor and assess the data flows within the organization. A CPO also needs to grapple with issues such as providing consumers with access to certain types of data in order to foster trust, and restricting third party sharing of data in an environment where thousands of employees might have access to information assets that are spread across multiple applications. Some regulations such as HIPAA also call for businesses to obtain consent from consumers before sharing their data. Setting up a call center or mailing out hundreds of thousands of notices can be a costly exercise compared to having tools that can automate this procedure. Zero-Knowledge Systems' Privacy Rights Management Suite is an enterprise software solution designed to enable the entire range of processes detailed above. Our PRM Suite applies a policy-based framework to enterprise IT infrastructures for the responsible management of personal information, enabling business to mitigate risk, attain compliance and build consumer trust. The various components of the Suite are designed as tools to allow businesses to rollout their information privacy program in an efficient and reliable manner, and include:Discovery and inventory of personal information resources Definition and articulation of privacy policies in an application-readable form Policy implementation at the application and data store level System monitoring of personal information handling practices Enforcement of information privacy requirements Audit and assurance of information privacy practices The Zero-Knowledge PRM Console, the first component of our PRM Suite to be released in Q4 of this year, enables the end-to-end management of information privacy within an enterprise. Information security and privacy officers can discover, inventory, and classify personal information (PI) assets while applying relevant global data regulations and corporate privacy policy. The Console works with existing IT resources such as customer and employee databases, Web servers, enterprise applications and access control solutions. PRM Console features include: Discovery and Inventory module: Enables and centralizes the identification, classification and management of personal information throughout the enterprise Modeling module: Supports compliance efforts by enabling the application of rules based on regulation or corporate policy, and customer preferences to personal information Reporting module: Ensures privacy or security officers have the reports needed to facilitate management, auditing and verification Underlying PRM is Privacy Rights Markup Language (PRML), a language specification designed to capture the complex relationship between business operations and personal information. PRML formalizes privacy policies and operational procedures across enterprise applications and data stores, producing detailed reports and requirements as output. PRML's underlying principles are based on the OECD Fair Information Practices and support a wide range of possible privacy policies and several forms of output, including XML and plain English. Future releases of PRML will provide automated enforcement within the enterprise IT infrastructure. The goal of the PRM Suite is to define a standard of functionality that will secure personal information by providing data protection and security officers and CPOs with a toolkit to facilitate and reduce the cost of regulatory compliance, while supporting business objectives, and customer preference and choice. The PRM Suite takes advantage of a wide range of new and evolving technologies to support legacy enterprise applications while simplifying integration through a component-based application model. It supports applications ranging from traditional client-server applications delivered over corporate intranets to outward facing web services on the Internet. If the developments of recent data and communication technologies are going to fulfill their promise, customers need to trust businesses with the collection, disclosure and use of their personal information. The Zero-Knowledge PRM Suite provides a cost effective means to implement privacy solutions that enable global and industry-wide compliance, which in turn fosters consumer trust, and enhances both the value of information assets. THE PROMISE OF PRM AND PRIVACY ENABLING TECHNOLOGIES PRM technologies such as Zero-Knowledge's PRM Suite can be a major force in enabling businesses to build privacy into their operations and thus raise the bar for privacy in our society. The Zero-Knowledge PRM suite empowers data protection and security officers with the tools to effectively address the intensifying demand for consumer privacy, to navigate complex global regulations, and most of all, to institutionalize the enterprise's commitment to protecting consumer privacy in a demonstrable manner. Specifically, the Suite allows for assessment and mitigation of risk across the entire organization simplifies compliance in a cost-effective manner assembles a dynamic inventory of company-wide information assets and practices enforces policy on personal information assets generates reports to facilitate auditing and assurance The key to successful adoption of data protection and information privacy technologies within the enterprise is to assure that they support corporate objectives, do not hinder commercial activity or burden the enterprise with demands that cannot realistically be met. Privacy Rights Management technologies are being developed to privacy- enable everyday business operations in a way that is manageable and cost-effective to the organization, yet still meets the high privacy standards of consumers. Business objectives like personalization, marketing, and online transaction and payments do not have to compromise consumer privacy. Analytical research, direct marketing, and trends in ubiquitous communications also need not be impeded by privacy objectives such as compliance, consent, notice, opt-in, access, or use limitation. Building trust with consumers, managing data security risks, and implementing sufficient safeguards can be achieved by aligning business and privacy into a single, coherent, strategy that combines effective policies and Privacy Rights Management technologies. STANDING AT THE CROSSROADS As both an entrepreneur and privacy advocate I believe we are at a critical junction for privacy. We are currently experiencing the largest explosion of information in history. The new networks and devices being deployed will make personal information available anywhere, anytime. The overwhelming majority of this information being created and spread over a plethora of devices and networks will be personal information--and it will primarily reside with businesses and organizations, rather than with individuals themselves. The information and networking explosion affects every individual, organization and business. Whether the net effect will be positive for information privacy or negative will depend on the policies we adopt, and the availability of technologies to enforce those policies. I believe the combination of consumer privacy protection tools and Privacy Rights Management technologies within the enterprise provide an immediate and fundamental framework for addressing privacy in the information society. The combination of these privacy-enabling technologies with strong privacy and data handling policies is a powerful and effective approach. In conclusion I want to articulate that over the past four years I have been encouraged by the positive steps industry leaders and policy- makers such as yourselves have taken. As a society, we have a critical challenge and opportunity in front of us, and I hope we can continue to work together to ensure information privacy and business can flourish together. Again, I thank the Subcommittee for the opportunity to participate in today's hearing. This hearing provides a valuable opportunity to discuss the important role that technology solutions play in addressing both business and consumer needs with regard to privacy. Zero-Knowledge Systems looks forward to continuing to work with the Subcommittee in its review of privacy issues. Mr. Stearns. We have with us this morning on panel No. 1 Ms. Frances Schlosstein, VP, Business Development and Marketing, Webwasher, New York City; Mr. John Schwarz, CEO of Reciprocal of New York City; Mr. Michael Wallent, Product Unit Manager, Internet Explorer, Microsoft Corporation; and, last, Mr. Stephen Hsu, Co-founder, Chairman, and CEO of SafeWeb, Incorporated, Oakland, California. We are delighted that you are here, and we look forward to your opening statement. And we will start with you, Ms. Schlosstein. Oh, we are going to start with Mr. Wallent, sorry, with the demonstration. Go ahead. STATEMENTS OF MICHAEL WALLENT, PRODUCT UNIT MANAGER, INTERNET EXPLORER, MICROSOFT CORPORATION; FRANCES SCHLOSSTEIN, VICE PRESIDENT, BUSINESS DEVELOPMENT AND MARKETING, WEBWASHER; STEPHEN HSU, CO-FOUNDER, CHAIRMAN AND CEO, SAFEWEB, INC.; AND JOHN SCHWARZ, CEO, RECIPROCAL Mr. Wallent. I just want to ensure that the monitors are on before we--sorry for the delay, sir. Could we get a little bit more light, actually, so I can see my notes? Thank you. Turn on the monitors. It should be on. Did it get unplugged? Okay. Okay. It is great working for technology companies. Chairman Stearns---- Mr. Stearns. Mr. Wallent, just pull the microphone just a little bit more closer to you. That would be helpful. Mr. Wallent. Certainly. Mr. Stearns. Yes, okay. Great. Okay. Mr. Wallent. Chairman Stearns, ranking member Towns, members of this committee, thank you very much for the opportunity to testify here today. My name is Michael Wallent, and I run the Internet Explorer team at Microsoft Corporation in Redmond, Washington. We are currently working on Internet Explorer version 6, the next version of our popular browsing technology, which we had planned to release with Windows XP on October 25 of this year. What I am going to show you today is a tool that gives consumers on a broad scale greater control over their online information than they have ever had before. One of the most frequent issues that we hear are concerns about online profiling or online tracking, issues that many of the members here today raised in their statements. This is the practice of collecting a history of a user's actions as they work across the web or across a series of sites. Once this information is combined with what is called ``personally identifiable information,`` such as a name, an address, or a phone number, specific advertising or other services can be targeted directly to that consumer. Most of this tracking is done from a technological sense through the use of a technology called cookies. Cookies are simply small pieces of information that the website leaves on the user's computer for later access. It is important to note that cookies are neither good nor bad. Without cookies, the web as we know it would simply not work. There would be no customization, an important part of a consumer's web surfing experience. E-commerce would be accessibly difficult, and the economics of the web would be radically different. Before we get into details about cookie management, the topic I am going to talk about today, let me define a couple of terms. First of all, you will hear a lot about what are called first party cookies. A first party cookie is simply a cookie that comes from the website that the consumer knows that they are visiting. I go to MSN. MSN serves me a cookie. It is a first party cookie. The other concept you will hear is what is called a third party cookie. A third party cookie comes from some content on the page that the consumer may not know about. A very common example of this was seen with the online advertisers, such as Doubleclick, Avenue A, or Engage, many of which the services that even Microsoft uses today. When a consumer goes to a website that has this online advertising, if that online advertiser serves a cookie, that is what we call a third party cookie. Third party cookies were, in fact, implicated in many of the online tracking issues that consumers brought to us. However, I will also note that third party cookies do have some very consumer beneficial features and some are very benign, and also, as I said, beneficial for those consumers. Last summer we made a first attempt at providing some advanced cookie management for our customers. What we thought was is that whenever a consumer encountered one of these third party cookies that were at times implicated in online tracking we would simply ask the consumer, ``Consumer: Would you like to accept this cookie or block this cookie?'' When confronted with this choice, though, consumers didn't really have enough information to make that choice, and it was a confusing question. We didn't have the capabilities at that time to give consumers the information and the data they needed to answer that question. So they simply turned the feature off. At the same time, and for quite some time now, we have been working with the World Wide Web Consortium or W3C on a standard called P3P, which, again, many of you mentioned here today. The goal of P3P is to provide a common language for a site to describe its data practices, such as what data it collects, who that data is given to, what the use of that data collection is. It turned out that it was just this type of information that consumers needed to use to make better decisions about cookies. What we have now done in Internet Explorer 6's integrated P3P technology is provide a precisely controllable, non-intrusive model that gives consumers very easy-to-use cookie controls. One of the important issues that we faced, though, was how to provide a heightened level of protection, what we call out of the box, by default, so people would be protected without any intervention on their behalf. What we have come to, then, for this default or out of the box setting is that in order for these third party cookies to be used they must indicate--the company that provides the third party cookie must have a P3P compliant privacy policy. And if that privacy policy indicates that that site is reusing the consumer's personally identifiable information, they must allow the consumer to either opt in or opt out of that data practice, or, even with a privacy policy, that cookie is, in fact, blocked. Let me show you how this works. We have some screen shots that we took very recently that we will show you here today. It is a little bit quicker than an online presentation. So the first time a consumer connects to a website whose privacy practices do not match the consumer's settings, whatever they might be in Internet Explorer 6, this small window appears. The goal of this window is to educate the consumer about this new red-eye privacy icon that we see down in the bottom right corner of the screen. I don't know if the members can see that. There is an arrow, and I will point it out to you. We will blow it up. See this little red stop with the ``I.'' This is the new red-eye privacy icon. Whenever it disappears on a website, it indicates to the consumer that there is a fundamental mismatch between the privacy policy of the website and the consumer's current privacy preferences. The other thing I would like to call out here is that the privacy defaults that Microsoft created are by no means the only choices that a consumer has. Here we see a dialog that actually gives consumers control over what their privacy settings are. By default here, we see that the setting is on medium, which has the behavior that I described to you earlier, which requires privacy policies and requires opt-out for any personal information reuse. We have heard a lot of comments and feedback about opt-in privacy, and we felt it was very important to allow consumers a very easy mechanism for them to choose to move to an opt-in model. With this slider, if the user clicks up two notches, they go to high privacy. High privacy requires privacy policies across the board for all websites at all times. And further than that, it requires that if there is any personal information reuse that the user has expressly opted in to that data reuse. I would like to also point out that we also have a setting that we call accept all cookies or the lowest possible security setting, and this, in fact, is the status quo on the web with browsers today. Now, I would like to just show an example of what a consumer might encounter as they browse through the web at a later time. I shot an example here, sir, of The Wall Street Journal. The Wall Street Journal I know is using advertising from Doubleclick. And Doubleclick, while we are working with them actively to deploy P3P-compliant privacy policies, has not yet done so. Because The Wall Street Journal has this advertising from Doubleclick, Doubleclick is using third party cookies, and there is no privacy preference or privacy policy around those cookies. Those cookies are, in fact, blocked. So we actually see here on the bottom right-hand corner of the screen the little red-eye privacy icon. This is something that we expect consumers to notice over time and be able to clearly tell when they go to a site that has a privacy policy that matches their settings, versus a privacy policy that does not match their setting, helping them really control their browsing experience. And we can also see just in detail that the consumer can get a lot of information about what specifically was blocked on their behalf. So while I am not showing it here today, we have many other features in Internet Explorer 6 that help consumers control their privacy, such as a mechanism to easily read the P3P policy and provide a very common format such that consumers can compare them between site to site. We have also ways for consumers to import custom privacy settings of their own that might be created by experts such as folks on the panel sitting here with me today. We also have mechanisms that are very easy for the consumer to use to either block or opt out of specific sites, to either block or always allow that content. We are actively encouraging websites to deploy these P3P- compliant privacy policies. Based on the feedback we have received so far, we hope and expect that many of the top 100 websites, as well as the vast majority of the online advertisers, to deploy P3P-compliant policies by the time we ship Internet Explorer version 6. IE6 is not a silver bullet solution to all online privacy issues, though. But we believe it is a significant step, showing that technology can play a very critical role in addressing consumers' concerns. Fundamentally, we believe that we have done work that consumers want and it will delight them. Thank you, and I look forward to your questions. [The prepared statement of Michael Wallent follows:] Prepared Statement of Michael Wallent, Product Unit Manager, Internet Explorer, Microsoft Corporation Chairman Stearns, Ranking Member Towns, Members of this distinguished committee, thank you for the opportunity to testify before you today on subjects that are very important to consumers-- Internet privacy and the tools that consumers can use to protect their privacy. My name is Michael Wallent, and I lead the Internet Explorer technology team at Microsoft Corporation. At Microsoft, we are not only dedicated to protecting consumer privacy, but from an even broader perspective, to building an online community that customers trust and to promoting vigorous growth of online opportunities for all. overview: the marketplace is demanding better privacy tools Today I would like to share with you just one of the things our company is doing around the issue of online privacy. For several years, Microsoft has been at the forefront of promoting privacy online. We have been developing privacy best practices and procedures under the leadership of our Director of Corporate Privacy, Richard Purcell. We have been actively involved in coalitions such as getnetwise.org, which focuses on building a safer web for our children. Elsewhere in the company, we are developing futuristic technological tools that have the potential to ultimately transform how online privacy protection is delivered to consumers. My division of the company, the Internet Explorer team, is just one place where privacy protection is a part of our basic objectives. One of the great things about working on Internet browsing technology in general, and Internet Explorer specifically, is that almost everyone that I meet has used this web surfing capability in some way. Because the web is increasingly important in people's lives, one of the issues customers raise with us more and more is their desire to know that their privacy is being protected when they go online. When we receive such feedback, we attempt to the extent possible to incorporate features that meet this demand and that give consumers better control of their personal information. In the end, it's my job to build software that delights our customers. Because of consumer demand, I currently have about 25 people working on the privacy protections in Internet Explorer. INTERNET EXPLORER 6.0: TACKLING ONLINE TRACKING When we talk to our customers, one of the questions they raise most often is whether their web surfing activities can be tracked. It is an issue that the Microsoft Internet Explorer team has been working to address for about eighteen months now. Tracking or profiling is the practice of collecting a profile or history of a user's actions across a web site or series of sites. When combined with ``personally identifiable information,'' such as name, address, phone number or other identification, whoever collects this profile can market or target advertising or other services specifically to a customer. Much of the online tracking you hear about comes through the use of ``cookies,'' small benign pieces of information that a web site stores on an individual's computer. It is important to note that cookies in and of themselves are neither good nor bad. Without cookies, the web wouldn't work as people expect it to. There would be no customization, no e-commerce and the economics of the web would be called into question. However, consumers should still be in control of this technology. Since most online profiling comes through the use of cookies, Microsoft has been concentrating its privacy protection mechanisms in Internet Explorer around cookie management features, which we have designed to enhance notice and choice of the information practices of the web sites that consumers use. Based on our experience with a series of test versions of Internet Explorer and our work with the World Wide Web Consortium's (the ``W3C's'') Privacy Working Group, we believe that the next version of Internet Explorer--IE 6.0--will take significant strides in protecting consumers' privacy. One of the most challenging things about building software for tens or even hundreds of millions of people all around the world is that it needs to work in a way that provides the protection consumers want, but without disrupting or slowing their web browsing experience. In some of the earlier test versions of privacy protections in Internet Explorer, we found that consumers were actually frustrated with tools that popped-up questions or prompted the consumer every time a cookie might be used for tracking purposes. It turned out to be too burdensome and confusing for consumers to understand exactly what was going on behind the scenes on their computers. From the significant usability tests that Microsoft does, we know that if you constantly pop-up privacy questions, users either disregard them or perform whatever action is necessary to make these pop-ups go away. Obviously, this behavior undermines the goal of protecting the user more thoroughly. So we've been working to create a solution that helps consumers to control cookies. And we've been especially focused on so-called third-party cookies that can be used to track your activities across sites--that is, cookies that come from a party other than the site a consumer is visiting. Our tools help consumers better understand the source and purpose of the cookie, thereby giving the consumer more control over whether it is accepted or rejected. Our tools also offer a default level of privacy protection that is greater than exists on the web today, so that out of the box, users of Internet Explorer 6.0 enjoy protections they currently do not have. PROTECTING PRIVACY THROUGH INDUSTRY STANDARDS Before we get deeper into the details, let us focus on the role industry standards have played in getting us to where we are today. As my team of engineers was examining the best path to take to control cookies through Internet Explorer, we were simultaneously working with the World Wide Web Consortium on a technical standard called the ``Platform for Privacy Preferences Project'' or P3P. The goal of P3P is to provide a common language for a site to describe its data practices--such as what data the site collects, how the site uses it, who gets access to it, how long the data is retained, what consumers should do if they have a privacy complaint, etc. The common language helps web sites describe the important aspects of their information practices according to a standardized road map. P3P also provides a mechanism for a site to provide a machine- readable version of its data practices. The grand vision of P3P is that once sites code their privacy policies according to the standard, and consumers have P3P tools in their hands, consumers can automatically match their individual privacy preferences against the practices of the web sites they are visiting. If the web site satisfies the consumer's preferences, the consumer enters the web site without incident. If the site does not match the individual's personal setting, the consumer at least is warned of that fact before proceeding. In Internet Explorer 6.0, we take a significant first step in promoting adoption of the industry's P3P standard by both web sites and consumers. By providing a default level of protection out of the box, we are creating incentives for web sites--and especially those that use cookies in a third-party fashion--to code their privacy policies in the P3P language. These incentives will exist because we anticipate that millions of web surfers will choose to upgrade to IE 6.0 in the near term and will automatically get the protections IE 6.0 offers. USING P3P IN INTERNET EXPLORER 6.0 Again, based on our earlier research, consumers want to be able to automatically control the use of cookies based on the data practices of the site sending the cookie. The use of P3P technology to help solve this online tracking problem is a natural fit. How will this work? You can actually test these tools now by downloading the public beta version of IE 6.0 at www.microsoft.com/ windows/ie. But to go through them quickly, here is an overview. By default, in order for third-party cookies to be set to a consumer's computer, a third party that collects personally identifiable information must indicate, via a P3P-compliant mechanism, that the site offers ``Notice'' and ``Choice.'' By notice, we mean that the site provides the consumer a machine-readable privacy policy in P3P format, which clearly states the information collection practices of that party. If there is no notice, third-party cookies from this site are blocked automatically by IE 6.0. By choice, we mean that if a web site is reusing a consumer's personally identifiable information, then it must allow the consumer to ``opt out'' of or ``opt in'' to that data reuse. If personal information is being reused, and consumers don't have choice around that use, then the cookies from that third-party web site are blocked. This approach tracks the arrangement established last summer between the Federal Trade Commission and prominent web advertisers. The core of that arrangement is that a company that tracks users across sites, at a minimum, must provide notice of that practice and the choice of opting out of it. To help consumers understand the concepts of notice and choice, the first time a consumer connects to a web site whose privacy practices do not match the default setting in Internet Explorer 6.0, an informational dialog-box appears. This box attempts to educate the consumer about a new ``red eye'' privacy icon that appears at the bottom of the browser window and what this icon means in light of the user's privacy settings. Then, with Internet Explorer 6.0, as users browse other sites that attempt to set cookies but do not meet their privacy settings, the red-eye will reappear, alerting the consumer to potential privacy issues. While we have taken care to establish what we believe is a workable default setting, we've provided a sliding-scale feature that allows consumers to easily change their privacy settings. With a single click, consumers can change the default setting to higher privacy settings, which have more stringent requirements for the use of privacy policies, or to lower settings, which are less stringent. For example, the ``high'' setting requires all web sites, both first and third-party, to obtain explicit (opt-in) consent before the reuse of personal information. We additionally have a feature that allows almost infinite customizability of the privacy settings, and we have an ``import'' function that allows the consumer to download a third party's privacy settings (which, for example, may have default settings different from IE 6.0) and insert them into the browsing technology. This is just an overview of our technology's features. We are happy to visit with any congressional office to review the tools in greater detail. OUR OTHER EFFORTS TO PROMOTE P3P ADOPTION I also want to mention the fact that, in the run-up to the release of IE 6.0, we are actively encouraging web sites to deploy P3P- compliant privacy policies. Through our ongoing work with the top 100 sites on the web, and with the work that the Internet standards body is doing, by the time that Internet Explorer 6.0 launches this fall, we hope to see significant deployment. We've also developed what we call a ``Privacy Statement Wizard,'' an automated privacy statement generator that can help smaller sites become P3P-compliant by creating policies simply based on the site's answers to a series of questions about its practices (subject, of course, to legal review by the site's lawyer). The statement generator is currently available at http://microsoft.com/ privacy/wizard. It also will soon be available at Microsoft's small business web portal, at http://privacy.bcentral.com. PUTTING IE 6.0 IN PERSPECTIVE Since P3P is an open standard, not controlled by Microsoft in any way, we believe that other companies will develop additional privacy- enhancing technologies that will also interact in an automated fashion with sites that have posted P3P-compliant privacy policies. In fact, we've already seen the emergence of tools that provide analysis of P3P policies, as well as search engines that only return hits from sites that follow P3P guidelines. Over the long run, we hope to see widespread adoption of P3P by the web community, as well as increasing consumer understanding of the power that P3P tools put in their hands to enhance--and customize--their privacy protection. We believe strongly that P3P is an empowering technology and that it can address in a simpler way the complex questions around consumer preferences and the articulation of sites' privacy policies. We do not believe that the work we've done in IE 6.0 to enhance consumer privacy is a silver-bullet solution, but we do believe it is a significant positive step--showing that technology can play a critical role in addressing consumers' online privacy concerns. We believe we have done work that consumers want and that will delight them. We also believe that allowing individuals to control their own personal information is an important, enduring mission for Microsoft. It is an ongoing process, and not just a single, all-encompassing step. We take it seriously because our customers do. Finally, we believe that these first steps that we have taken to include serious privacy protection in Internet Explorer will lead to positive cooperation in the industry around this topic and will result in a better Internet and a better economy. In the future, we at Microsoft expect to do additional work in this area, using P3P or other technologies, and we would be happy to keep you abreast of those efforts. Again, thank you for allowing me to be with you today and I look forward to a continued dialogue. Mr. Stearns. I thank you. Ms. Schlosstein, we will start with you, then. Ms. Schlosstein. Thank you. Mr. Stearns. I think we are going to take a few moments here to reestablish the connection, so that the projector can provide the audience a little bit of view of what we are doing here, if that is possible, so that they also would enjoy what we see up here as members. We are hoping in the near future--I know the Financial Services Committee has retrofitted their committee hearing room to do video teleconferencing. And so in this case, Mr. Austin Hill of Montreal, Canada, could be with us today, if we had had that capability. And, likewise, we hope to have a projector screen here with us that will all be in place, and we would not have to continually have setups. We just move and plug it in, and we will have that capability, we are assured, that will take place in the near future. So we look forward to that. Are you ready? Ms. Schlosstein. I am. Mr. Stearns. Okay. Go ahead. STATEMENT OF FRANCES SCHLOSSTEIN Ms. Schlosstein. Could I have just a little more light, please? Mr. Stearns. Just a little bit more light. Ms. Schlosstein. Chairman Stearns, and members of the committee, Webwasher.com, a leader in internet access management and privacy technology, appears today not as an advocate for or against privacy regulations, but truly as an example of internet filtering technology. We believe the technology does not and should not establish policy. Technology executes policy. Those who use Webwasher filtering software in a very real sense are already regulating their own internet environment and establishing their own policies of privacy. What uniquely distinguishes Webwasher is our belief in internet self-determination for the user. There can be no internet privacy without the ability to control one's internet exposure. Webwasher's technology can filter out any hidden data object, oppose the security, privacy, band width, or legal risks. Today, 4 million individuals and small businesses are using Webwasher worldwide, along with a growing number of enterprise corporations. This morning I would like to take--to provide the subcommittee with a brief look into Webwasher software interface and the types of customizable results possible. And for your convenience, I have included a copy of the presentation slides that I will be discussing in our written testimony. Let us start now with an example of Webwasher in action, providing privacy protection from unwanted cookies attached to ads. This is Salon.com, a home page with no Webwasher filters activated. And now the same Salon.com home page with Webwasher filters activated for ad and cookie filtering. As you see, the ads are eliminated at the top and side. To assist the visuals, the same Webwash/Salon.com page with the ads replaced by logo placeholders. This page includes nine ads that represent 38 percent of the page's total band width. What you don't see are the non-permission-based cookies behind the ads which track user behavior. Fortunately, Webwasher does see them. Webwasher technology protects privacy and the results are measurable. On one average desktop, we conducted a 30-day filtering activity test. The test results--43 percent of band width was saved by filtering out ads. What is more, 79 percent of all cookies entering the network, nearly 5,000 cookies in all, were non-permission-based cookies attached to the filtered ads. What is behind this technology? Let me show you the Webwasher software interface. Take a look at the tabs across the top--the standard filter, privacy filter, access control, and security filters. You can customize each function. For example, the privacy tab, a user can filter web bugs, cookies, and referrer bugs. Similarly, the security feature interface can be customized to safeguard a corporate network. Webwasher includes a setting for eliminating bad Java scripts, ActiveX commands, including Trojan Horse-type viruses. This is accomplished through Webwasher's media type and embedded object filters. Webwasher also approaches privacy through access control. Our access control settings deploy a dynamic, new, URL filter data base to track, classify, and, when appropriate, block changing visual content on millions of web pages. Webwasher uses intelligent filtering and image recognition to generate the most advanced web block list in the world right now. Here you can see the filters for pornography and nudity have been activated. To illustrate, here is the Playboy.com page, including a pop-up ad before Webwasher is activated. Now, with Webwasher, a user can block access to the website based on the Playboy.com URL. This is the message generated when a user attempts to visit a blocked site. However, even if you did not know that Playboy was a site that contained inappropriate images, our technology can filter nudity, breast images, while leaving out content--leaving other content untouched. This is an important achievement in helping users control their privacy. Webwasher takes a proactive approach to developing new privacy technologies. Here is the next generation technology that enables businesses and media to partner with consumers more effectively. Webwasher is anticipating the day when consumers, businesses, and media cooperate to implement a tight filtering system. Our seclude-it technology featured here filters advertising according to user-determined interest profiles. For example, this user selected entertainment and lifestyle as just one category of ads they wish to receive. Seclude-it technology will create a new channel from advertiser to consumer that makes ads more targeted, effective, and welcomed. What we have demonstrated today is the robust privacy protection technology of Webwasher--a technology powerful and flexible enough to execute policy, whether driven by government, corporate, or individual users. Mr. Chairman, thank you for inviting Webwasher to appear and for assisting consumers, both individuals and corporations, to become more aware of privacy technology options such as Webwasher, already available today on the market and currently being used by 4 million users worldwide. Thank you. [The prepared statement of Frances Schlosstein follows:] Prepared Statement of Frances Schlosstein, Vice President, Business Development and Marketing USA, WebWasher.com INTRODUCTION Chairman Stearns, Ranking Member Towns, and members of the Subcommittee, thank you for the opportunity to participate in this timely hearing and to share webwasher.com's unique perspective on the role of technology in the Congressional information privacy debate. As your Subcommittee continues to explore these issues in the responsible manner that this series of hearings evidence, we firmly believe that how Congress ultimately defines Internet privacy will affirmatively determine Federal policy direction--as surely as webwasher.com's definition of privacy has shaped our own technological development strategy and core operational focus. Over the past eighteen months, webwasher.com has directly experienced the consumer demand for privacy--four million Internet users in homes and schools have installed a free version of webwasher.com's intelligent Internet filtering software. This initial track-record, coupled with our emergence in the corporate enterprise marketplace, demonstrates to us that available and currently deployable technologies such as WebWasher already critically shape the privacy policy debate, and thus must also play a role in any related Congressional response to consumer concerns. about webwasher and internet access management solutions WebWasher is a state-of-the-art, all-in-one software tool that blocks virus and worm-carrying Internet files, preempts the need for intrusive employee Web monitoring, protects children from pornography, and filters out up to 45% of Internet clutter that typically clogs corporate networks. How can one program do so many different things in facilitating consumer and corporate privacy protection? Although WebWasher is a single, streamlined piece of software, it has a fully modular menu of independently operating filters that each target a specific category of Internet content. Each filter can be easily toggled on or off and configured for individual preferences, allowing each user--corporate or individual--to execute a highly-customized Internet privacy policy: Our privacy filter allows the user to filter out non- permission-based cookies, Web bugs, and the HTTP ``referrer string.'' Almost everyone has heard of ``cookies'' that allow third parties to track without detection a user's movements on the Web. Even more troublesome to corporations is the ``referrer string'' usually sent from browser to Website server, potentially allowing an outsider to backtrack to the last browser location, which could be an internal company Web page. Our access control setting deploys a dynamic, new URL filter database to track, classify and, when appropriate, block changing visual content on millions of Web pages. This database--``DynaBLocator TM''--is being built with the help of an exclusive, new image recognition technology that can keep up with the thousands of porn sites and images that are dynamically generated every day, without stable URL addresses. WebWasher is using image recognition combined with a dozen text-based rating systems to generate the most advanced Web page blocklist in the world. Our advertising filter includes a setting for eliminating malicious (ill-intentioned) Java scripts, as well as Java scripts designed to lock advertising into a Web page such that the page will collapse if the advertising is removed. Bad ``ActiveX'' commands that could allow an intruder to read, delete, or commingle company files can also be filtered. Our advertising filter also includes dimension and pop-up settings that remove--at the user's command--unwanted banner and pop-up ads. Internet advertising becomes a serious business issue when 35% to 45% of every page downloaded onto a corporate network is not relevant for immediate core business needs. Our ``Seclude-It TM'' technology filters advertising according to a personal interest profile designed and stored on the user's computer, creating a whole new channel from advertiser to consumer that makes ads more valuable and sticky. Advertisers must partner and meta-tag their content so it can be read by the Seclude-It filter. DEFINING PRIVACY AND BALANCING THE REGULATORY IMPULSE: USER SELF- DETERMINATION AND INDIVIDUALIZED CONTROL What distinguishes WebWasher--and what is truly unique about our company--is that we equate Internet privacy with nothing less than Internet user self-determination. This commitment to self-determination for all Internet users--individual and corporate, public and private-- has from day one driven how we run our company and how we build our tools. Individualized user control is the reason why we developed, as our technology platform, an Internet filtering software solution. If you want to put the Internet's ``controls'' into the hands of its users--if you want to establish choice as a primary value in the Internet data transaction--then, we believe, you must create a broad technology for filtering many categories of Internet data that is customizable to the varying needs of users. Acting accordingly, we created and deployed WebWasher. Fundamentally, webwasher.com believes there can be no Internet privacy without the ability to control one's Internet exposure. This exposure is two-way because data simultaneously enters and exits a user's computer. Only Webwasher, in a single software tool, addresses the two-way need for consumers to control both what information is distributed about them over the Web as well as what information enters from the Web into the private realm of the workplace, home, or school. The benefits of webwasher.com's two-way, intelligent filtering solution are particularly obvious when compared to unidirectional privacy technologies like encryption and hosted (anonymous) surfing that are stuck in the one-way mode. WebWasher is the only leading Internet filtering software that does not compromise its own users' privacy by routing their Internet transmissions back through our own company's server. Privacy is the security of being able to set one's own course, and most fundamentally, to protect oneself from perceived costs and risks. Whether you are a home Web surfer, an education professional, or a corporate IT manager for a Fortune 100 company, webwasher.com provides a technology that empowers users to operate in a zone of privacy, safety, and choice. WEBWASHER IN THE ENTERPRISE: MEETING BUSINESS PRIVACY NEEDS In many respects, the negatives of raw and unfiltered Internet exposure are nowhere so great as in corporations, where thousands of employees have unlimited desktop Internet access for many hours each day. Many companies--whether they are global financial leaders or multinational manufacturers--provide unlimited Internet access to their employees. IDC has estimated that each employee with unlimited Internet access spends approximately one hour per day viewing non-work-related Internet content, at an annual cost in productivity of $9,600 per employee. Beyond this downtime, it only takes a few employees downloading music or streaming video to bog down an entire network, just as it takes only one employee viewing porn or hate content or downloading viral files in the workplace to put the organization at serious technological or legal risk. As a spin-off of Siemens Corporation and as a leading global developer of Internet access management software, webwasher.com has worked very hard to understand and be responsive toward the many categories of Internet data that pose security, privacy, or legal risks for the enterprise user, and to assist in meeting their corporate risk management needs through deployment of WebWasher. Corporations are only now beginning to pre-emptively address the privacy, security and cost implications of employee Internet access through a new category of software exemplified by WebWasher Enterprise Edition. According to a recent study by market analysts Frost & Sullivan, the Internet access control and filtering software market segment, while only a $68 million sector in 1999, is expected to approach $1 billion in revenue potential by 2007.'' As a direct result of our own origin and development in the Siemens corporate environment, WebWasher is especially suited for large business users and particularly suited to respond to corporate demands that mirror what our 4 million consumer users have already told us. The corporate user's WebWasher software application has a full menu of independently operating filters that each target a specific category of Internet content: one filter uses a database to block long lists of objectionable Websites and Web pages; other individual filters reach deep into the Web page to remove invisible data ``objects'' like Web bugs; and still another filter enables a block list for media-type files such as ``.exe'' that often carry worms and viruses. WebWasher's access control filter, powered by dynamic image recognition technology, may prove so effective at managing employee Internet use that it removes the need to monitor employee Internet use. It promises a solution that is every bit as powerful as employee Web monitoring, but much better at balancing the corporation's need to be an Internet gatekeeper with demands for employee privacy. This same tool could save corporations the cost of collecting and storing voluminous amounts of data on employee Web surfing habits by allowing companies to pre-emptively manage employee access to all relevant categories of Internet content. INTERNET ACCESS MANAGEMENT SOLUTIONS AND NEXT STEPS IN THE PRIVACY DEBATE While today's Internet is an amazing instrument of the Information Economy, there is a toll for travelers on this information superhighway and marketplace. With each click of a mouse, along with the information a user has requested, kilobytes of data are transmitted automatically without either the user's knowledge or consent. Most unseen data is enabling to the information transaction. However, a limitless array of behind-the-scenes channels open wide avenues for data operations designed and controlled by third parties of which the user may never be aware. In other cases, a user's self-determination and individualized control may be compromised by the persistence, copiousness, or mere offensiveness of unmanaged Internet content. For all these reasons, an intelligent Internet access management tool that can be easily customized and upgraded by the user seems the obvious technological solution-- though not a simple one--as the Internet dynamically expands and continually evolves new categories of invasive content. Webwasher.com is committed to keeping its filtering tool updated to address all new genres of Internet content that significant numbers of users, for any reason, may want to filter. Successful technologies like ours do not establish policy. In fact, we pride ourselves on having developed and introduced an apositional product that meets various users' needs. Again our definition of privacy--user self-determination--has guided our product development. Rather than be reactive to policy dialogue, our focus has been on-- merely providing real solutions responsive to growing demand. By bringing privacy-enhancing technologies quickly to market, webwasher.com has changed the privacy landscape and already has impacted the conditions policymakers seek to address. Yet, technology alone may not solve the Internet privacy dilemma. Business and consumer users must first know what their privacy problems are before they may act to adopt technical solutions to meet these concerns. Achieving such awareness often proves problematic in the Internet privacy arena since most privacy-violating data transfers over the Internet are not ``visible'' to the consumer. We respectfully recommend that removing this cloak of invisibility and assisting consumers to become aware of the technological options already available to them should be a primary focus of this Subcommittee's agenda. High privacy standards are often challenged as costly and limiting to the growth and development of Web-based business. However, as an Internet technology company that voluntarily adheres to very strict privacy rules, webwasher.com can only report positive results in the form of high customer retention and a sterling corporate image. Although we do not testify today as advocates for or against Federal privacy policy, we do see enhanced online privacy as an essential pre-condition for the Internet's next level of development, which will require winning the trust of those who have so far remained skeptical of this new medium. Mr. Chairman, allow me to thank you for the opportunity to appear before the Subcommittee, and to close with a pledge: webwasher.com intends to stay at the forefront of Internet technology in our continuing mission to put the tools of Internet self-determination in the hands of Internet users. Webwasher.com greatly appreciates the opportunity to be of assistance to the Subcommittee in this important review and is available to serve as a further resource as required. Mr. Stearns. I thank you. Mr. Schwarz? Oh, we are going to go to Mr. Hsu. Be sure to get that microphone right up close to you, so we can hear you. STATEMENT OF STEPHEN HSU Mr. Hsu. Mr. Chairman, and members of the subcommittee, thank you for this opportunity to share my views on this important subject. My company, SafeWeb, develops internet privacy and security technologies for businesses and consumers. Our core consumer product, SafeWeb.com, lets internet users surf the web anonymously and securely. SafeWeb's technology lets users access the entire web through a layer of encryption. All of the information coming in and out of their computer is fully encrypted, and dangerous codes such as cookies and web bugs ares filtered. Our servers act as a virtual intermediary and communicate directly with the SSL, or secure socket layer, engine present in every browser, so that no software download or installation on the part of a user is necessary. Because our solution is free, effective, and easy to use, it has quickly grown to become one of the most widely used online privacy services in the world. We currently secure 100 million web pages each month. We are currently licensing this technology to businesses and governmental agencies that place the utmost importance on security. The United States Central Intelligence Agency is one of our investors and has licensed our technology for internal use. The ideas for our technology originated when I was an assistant professor of physics at Yale University and was forced to deal with numerous hacker intrusions on our department network. A key insight that I had was that the Clinton administration's relaxation of export controls on encryption, combined with the requirements of secure e-commerce, would guarantee a nearly 100 percent installed base of strong encryption capability in every browser on every desktop. Although you might not be aware of it, the web browser on your computer has the capability of performing encryption that is believed to be unbreakable even by the National Security Agency or the Central Intelligence Agency. We set out to write software that would make use of this widespread encryption capability. On a global level, SafeWeb is committed to fighting against censorship and for freedom of information. Each day tens of thousands of individuals in closed societies like China and Iran use SafeWeb to access otherwise blocked contents, such as the BBC, New York Times, and Voice of America websites. They also use SafeWeb to anonymously express possibly forbidden political views in chat rooms and on discussion boards. Our foreign users can be confident that their activities can neither be tracked, nor monitored, during a SafeWeb session. We at SafeWeb share a strong belief in the power of technology to transform closed societies. It would be convenient to claim that technology alone can solve the problem of digital privacy. However, I think this is terribly optimistic. Tools such as ours tend to be adopted by sophisticated technologically literate people and less so by the average internet user. According to one survey, only 9 percent of online users have used encryption to scramble their e-mail, and a mere 5 percent have taken advantage of anonymous browsing. Americans should not have to become experts on cookies, web bugs, and relationship data bases in order to preserve their privacy. It is my opinion that the protection of consumer privacy requires both legal and technological action. I hope that legislators will recognize the current trends and pass laws that will protect the rights of individuals in this burgeoning information age. And now I would actually like to attempt something which is a little bit tricky, which is a live demonstration. So this laptop is the property of the U.S. Government, and I have not installed any software on it. I am running Mr. Wallent's IE, probably version 5, browser here. And what you see here is what you would see if you just typed in SafeWeb.com into the browser. It would connect to our servers which are located on the internet, and they would allow you to visit any website that you choose to view. For example, here I think I have Yahoo's site. If you choose to go to another site, you can type in--here I have typed in AltaVista.com. And what is actually happening now is that this computer is contacting our servers and requesting that page, so you are actually receiving AltaVista.com not through the normal means but through our servers. And if you look carefully, you can see this little lock icon, which means that you are viewing all of this information through a layer of encryption. Normally, you will only see that lock icon when you are about to give your credit card number to an e-commerce site. But if you use SafeWeb, all of the traffic coming in and out of your computer is encrypted with 128-bit encryption--encryption powerful enough that even intelligence agencies can't break it. Here I have an icon of a cookie, which when clicked will show you--this cookie will appear on the interface when a third party tries to place a tracking cookie on you. And so here it has intercepted one that would have come from AltaVista had it not been blocked. So if I click on that, you can see that the origin of the cookie was a server called ad.doubleclick.net. Once that cookie is on your computer, Doubleclick can track you from site to site and track all of your viewing habits. But we have actually blocked that cookie as it passed through our server. We also offer various levels of configuration similar to what Mr. Wallent talked about for his IE version 6, but currently available already from SafeWeb, which allow you to choose your level of sanitation of Java applets, plug-ins, and different levels of cookie settings. So I would like to thank the committee for this opportunity to say a few things about SafeWeb. Thanks. [The prepared statement of Stephen Hsu follows:] Prepared Statement of Stephen D.H. Hsu, CEO and Co-founder, SafeWeb, Inc. Mr. Chairman and members of the Subcommittee: Thank you for this opportunity to share my views on this important subject. SafeWeb develops Internet privacy and security technologies for businesses and consumers. Our core consumer product, www.safeweb.com, lets Internet users surf the Web anonymously so that no one can pry into their online communications. SafeWeb's technology lets users access the entire Web through a layer of encryption. All of the information coming in and out of their computers is fully encrypted, and dangerous code such as cookies and Web bugs is filtered. Our servers communicate directly with the SSL (Secure Socket Layer) engine present in every browser so that no software download or installation is necessary. Because our solution is free, effective and easy to use, it has quickly grown to become the most widely used online privacy service in the world. We currently secure over 100 million Web pages each month through www.safeweb.com. We are also licensing this technology to businesses and governmental agencies that place the utmost importance on security and require the strongest technology available to meet their stringent requirements. Before discussing the topic of privacy, let's begin with a broad view of what is happening in information technology. You may be familiar with Moore's Law, originally formulated by Gordon Moore, one of the co-founders of Intel. Moore observed that the computing power of microchips doubles roughly every 1.5 years. It is no surprise that today's laptop is far superior to the supercomputer of 10 years ago. A similar trend is occurring in the areas of data storage and data transmission: the cost of storing data is cut in half each year and the capacity to transmit data is doubling each year. With these factors in play, the end result is exponential growth in our ability to store, transmit and analyze information. What does this mean for privacy? It means that technology will inevitably make it easier for governments and corporations to invade the privacy of individual citizens. Consider the following example. Currently, someone with access to my credit card records could gain a fairly accurate picture of my eating, shopping and leisure habits. Perhaps two-thirds of all of my personal purchases are made on this credit card. Imagine the situation five years from now, when digital cash and smart cards are ubiquitous and nearly 100 percent of all purchases are executed digitally. Eventually, databases will be able to record not just how much money I spend, but exactly what I purchased, as well as where and when I made this purchase. This will apply to purchases of entertainment and food, as well as other items. It will not be long before databases will be capable of recording all of the phone and e-mail traffic of ordinary individuals--not just basic data (e.g., identities of sender/caller/ recipient, time and length of communication), but the actual content of the communications. Why would someone be motivated to assemble such data? The answer is simple. Most businesses, from banks to shoe stores, spend significant amounts of money on customer acquisition. As businesses, they are highly motivated to make this process as efficient and economical as possible, and technology can oblige in astounding ways. Government and law enforcement have different, but equally strong, motivations to know more about what people are doing. Is this a bad thing? Not necessarily. It would be foolish not to acknowledge the advantages this future will bring both to individuals as well as to corporations and governments. However, it is easy to see that these massive databases, once created, will be subject to myriad forms of abuse. Survey after survey indicates that the overwhelming majority of Americans is already concerned about their online privacy and desire greater protections when they surf the Web. According to one recent survey, Americans are more concerned about loss of privacy than health care, crime, or taxes.1 --------------------------------------------------------------------------- \1\ Harris Interactive survey (National Consumers League), October 2000 --------------------------------------------------------------------------- On a global level, the need for online privacy and freedom of speech is even more urgent. Despite different countries' differing laws, we at SafeWeb believe that the right to privacy and the right of free speech are not just rights granted to American citizens by the United States Constitution; these are human rights that every country, democratic or not, ought to accord their citizens. Approximately 327 million people worldwide use the Internet today, and an estimated 502 million people will be online by 2003. As the number of Internet users steadily grows, we can expect privacy concerns to escalate and grow increasingly volatile. The general public has only just begun to realize the extent of the privacy problem, and has only just begun to explore the possible privacy solutions. While it would be convenient to claim that technology alone can solve these problems, to do so would be to pronounce a fallacy. There are several companies like SafeWeb that create technologies to help consumers protect their online privacy. However, these technological tools tend to be used by sophisticated, technologically savvy people, and less so by the average Internet user. According to one survey, only nine percent of online users have used encryption to scramble their e- mail, and a mere five percent have taken advantage of anonymous Web browsing services.2 Americans should not have to become experts on cookies, Web bugs or relational databases in order to preserve their privacy. --------------------------------------------------------------------------- \2\ The Pew Internet & American Life Report; Trust and privacy online: Why Americans want to rewrite the rules (August 2000) --------------------------------------------------------------------------- It is my opinion that the protection of consumer privacy requires both legal and technological action. I hope that legislators will recognize the current trends and pass laws that will protect the rights of individuals in this burgeoning information age. Thank you. Mr. Stearns. Thank you. Mr. Schwarz, I guess we will offer you a little bit of time for you to set up. Mr. Schwarz. Actually, I can fly---- Mr. Stearns. You can fly? Mr. Schwarz. [continuing] directly. Mr. Stearns. Wait a second. I think he has to--our staff has to connect something here. STATEMENT OF JOHN SCHWARZ Mr. Schwarz. I decided that a presentation without the slides may be more appropriate. Mr. Chairman, Mr. Stearns, Congressman Towns, members of the subcommittee, my name is John Schwarz. I am the President and CEO of Reciprocal, Incorporated. I would like to thank you for the opportunity to speak or testify before the panel. I would like to start by saying that your committee is focusing on issues which are extremely important not just to my company but to our economy, to our citizens' privacy, and I would argue to our citizens' security, and, obviously, ultimately to my company's business. In our view, privacy, intellectual property, and copyright protection are all critical aspects of the same common issue. We live in an age where the physical world such as we knew it and continue to know it is being displaced by a digital one. In other words, virtually everything that we know today can be described in information and data. And once that knowledge is available, recreating the physical is pretty easy. Products are being converted to services. In other words, what we used to buy as a ``one of'' thing we now today buy as a service, as an access to something, as a way to use something. And I would argue that national boundaries are becoming more transparent each day as this data is being shipped across the internet and other networks, literally without any barriers at all. And so in this environment I think we can argue that securing digital assets and preventing unwanted digital intrusion is equivalent to defending personal and potentially national integrity. So we are talking about very important issues. My company, Reciprocal, provides customized business infrastructure for the secure online delivery of digital assets, such things as audio, video, books, documents, games, or software. Our solution includes a defined set of features and tools, access to prepaid transaction processing, and the implementation resources needed to integrate the solution into the customer's existing systems. So we are not a producer of technology. We are a services company that makes technology work for other people. And those other people could be other businesses. Those people could be the government. Those people could be private citizens. We also offer consulting services to clients that need help with the definition of business models or technology choices in this digital distribution world. We run a secure online delivery solution using our computer infrastructure. Simply stated, our clients only need to identify the digital assets that they wish to distribute and the channel through which these products are to be delivered, and we do the rest. We are arguing for a proactive management of digital assets. These can be personal, corporate, governmental or educational assets. But the proactive protection of those is very important. Just as an example, the global media market is approaching $200 billion annually. Many of the properties are extremely valuable. You have all seen first-run movies generating $75 million of sales in a single weekend or a best-selling book selling 500,000 copies in a month. In other industries, pharmaceutical clinical trials are distributed to thousands of subjects and their doctors. Contracts and other legal documents need to be verifiably delivered and secured. And the access to these documents and these media assets needs to be appropriately managed. Virtually all media information today is produced in a digital format. In fact, it is almost a definitive statement. This means that it is copyable with perfect fidelity. Software and hardware that enable the reproduction of digital assets is now a standard feature on most computers. Vast amounts of digital assets are, thus, illegally copied and redistributed, and these digital assets include the personal information which was described by my colleagues that is gathered from the analysis of personal behavior as people browse through the internet. The market or the industry, our industry, has responded with a large and all-too-often confusing array of solutions developed to assist digital owners to keep what is theirs--from a simple user ID and password, to certificates of authenticity, to cookie management, to digital watermarking, to fingerprinting, to encryption, and digital rights management. The simple truth is none of these are infallible, and that all are currently difficult to implement within what I would call a comprehensive solution. All of these tools require fairly substantial knowledge on the part of the people that will be using them. The Reciprocal role, or the role of my company, is to take the complexity out of the decision processes and the implementation and to provide the best flexible solution for the problem at hand. I would argue that our effectiveness and competitiveness as individuals, as companies, and as a Nation is enhanced in an environment where standards prevail, where systems can be open because there is intellectual property protection for the developer, where the invasion of privacy is treated as an illegal activity, and where the authors can be assured that their copyright has an enforceable contractual value. And I think, by extension, we can argue that our individual rights to privacy surpass the corporate rights to copyright and to intellectual property. The role of Reciprocal is to take it from there and make sure that these solutions are available in an easy, comprehensible, cheap, and effective way. Thank you for listening, and I am happy to take questions. [The prepared statement of John Schwarz follows:] Prepared Statement of John Schwarz, President and CEO, Reciprocal Inc. Dear Chairman Stearns, Congressman Towns, members of the sub- committee: My name is John Schwarz. I am the President and CEO of Reciprocal, Inc. Thank you for the opportunity to speak to you today. Your committee is focusing on issues that are very important to our economy, to our citizens' privacy and security, and to my company's business. In our view, privacy, intellectual property and copyright protection are all critical aspects of a common issue. We live in the age where the physical world is being displaced by a digital one, where products are being converted to services and where national boundaries become more transparent each day. Consequently, being able to secure digital assets and prevent unwanted digital intrusion is equivalent to defending personal and national integrity. Reciprocal provides customized business infrastructure for the secure online delivery of digital assets (audio, video, books and documents, games or software). Our solution includes a defined set of features and tools, access to pre-paid transaction processing, and the implementation resources needed to integrate the solution into the customer's existing systems. In addition, we offer consulting services to clients who need help with the definition of business models or technology choices in the digital distribution world. We run a secure online delivery solution using our own computer infrastructure. Simply stated, our clients only need to identify the digital assets they wish to distribute and the channel through which these products are to be delivered and we do the rest. The global media market is approaching $250B annually. Many of the properties are extremely valuable--you have all seen a first run movie generate $75M in sales in a single weekend, or a best selling book sell 500,000 copies in a month. In other industries, pharmaceutical clinical trials are distributed to thousands of subjects and their doctors, contracts and other legal documents need to be verifiably delivered and secured. Virtually all media today is produced in a digital format. This means that it is copyable with perfect fidelity. Software and hardware that enable the reproduction of digital assets is now a standard feature on most computers. Vast amounts of digital assets are thus illegally copied and redistributed. The market has responded with a large and all too often confusing array of solutions developed that assist digital asset owners to keep what's theirs. From simple user id and password, to certificates of authenticity, digital watermarking and fingerprinting, encryption and digital rights management, the simple truth is that none are infallible and all are currently difficult to implement within a comprehensive solution.Reciprocal's role is to take the complexity out of the decision process and implementation and to provide the best flexible solution for the problem at hand. Our effectiveness in enhanced in an environment where standards prevail, where systems can be open because there is intellectual property protection for the developer, where the invasion of privacy is treated as an illegal activity, and where the authors can be assured that their copyright has an enforceable contractual value. Reciprocal can take it from there. Once again, thank you for the opportunity to testify today and I look forward to answering any questions members of the panel may have. Mr. Stearns. Thank you. I will start with the questions. Mr. Schwarz, as I understand it, you were the general manager of the IBM plant down in Boca Raton before you started your business. Mr. Schwarz. That is correct. Mr. Stearns. And so you have seen it from a more--a longer perspective perhaps than most. In a nutshell, do you think the U.S. Government, we as legislators, should set a standard for internet privacy? Just yes or no, and then tell me why. Mr. Schwarz. I would say eventually yes. Now may not be the right time. Mr. Stearns. So right now you, in your personal opinion, with all of your experience at IBM, and your new company, you do not think that we need to establish internet privacy as a legislative body right at the moment. Mr. Schwarz. I think as Congressman Markey had said earlier, there has to be some sort of a minimum floor. Mr. Stearns. Minimum floor. Okay. Mr. Schwarz. What that is is going to be difficult to define, and I don't think we know enough today to set that standard. Mr. Stearns. Well, Microsoft has worked with their new P3P, when it is fully integrated I guess with Explorer 6--when is that going to be released, Mr. Wallent? Mr. Wallent. We actually have next Monday publicly available data that has all of the functionality that I showed you here today---- Mr. Stearns. Okay. Mr. Wallent. [continuing] that anyone can download onto Windows machines from Windows 98 forward. We expect to have a final release of Internet Explorer 6 by October 25 of this year, when we plan to launch Microsoft Windows XP. Mr. Stearns. How many people will eventually be using this new P3P technology? Mr. Wallent. Well, if past history is any guide, we expect that probably within the first 6 months of release of Internet Explorer 6 approximately 30 percent of the people who use Internet Explorer will be updated to the latest version. What that means in real numbers is that we expect by mid-2002 to have somewhere between 30 and 50 million people using Internet Explorer 6. Mr. Stearns. Worldwide. Mr. Wallent. Worldwide, yes, sir. Mr. Stearns. Okay. You noted your work with the World Wide Web Consortium privacy working group on P3P. How important are standards and standard-setting organizations when addressing privacy concerns with technological solutions? And I guess the question, like I talked to Mr. Schwarz, what role, if any, should the government have in setting these standards? Mr. Wallent. Certainly. With respect to the issue on standards, the work we did with the World Wide Web Consortium was critical, I believe, to creating a useable, worldwide solution that will help control users' privacy. As we saw last summer when Microsoft tried to do something that was not a standard, but what we did only in our browsing software, it wasn't very successful. But yet when we pulled together the resources of the overall internet economy and the internet community, I think we worked to create something that will be very powerful for consumers. Mr. Stearns. Mr. Hsu, when you talk about SafeWeb, as I understand it is a free service. Mr. Hsu. Right. Mr. Stearns. That you can go--the consumer can go on the internet and download it and interface. How do you make money with it? Mr. Hsu. Actually, one correction. It doesn't require any download. Mr. Stearns. Okay. Mr. Hsu. It interfaces directly with Internet Explorer or any browser. Mr. Stearns. So it is a seamless interface. Mr. Hsu. Yes. The consumer service that we offer, which is free to the consumer, actually pays for itself based on the advertising that we run on the actual toolbar that you saw. Mr. Stearns. What happens if somebody eliminates that advertising that you are hoping to use to make sufficient funds so that you can operate? Mr. Hsu. Well, then, I think we would be in trouble. Let me comment that I think most privacy startups are in trouble right now. It is very difficult to monetize privacy, although there is a widespread--if you look at opinion polls, a widespread demand for it. It is very hard to monetize. My company, like Austin Hill's company and all of the other privacy companies, are probably going to get most of our revenues from corporate clients, from security consulting, from developing BPN-like products. And so it would be a mistake to think that the privacy industry, technology industry, is in good shape right now. Mr. Stearns. Let me ask you the question I have asked Mr. Wallent and Mr. Schwarz. Do you think at this point the U.S. Government should set a standard in internet privacy? Mr. Hsu. I have to agree with Mr. Schwarz that in the long run I think it is absolutely necessary, because technologies can only protect you to a certain extent. And in the end, your data will be stored in data bases that you have no control over. Right now, I don't think it is a completely critical time. I think that we could wait a few years and see how things develop before we actually have to---- Mr. Stearns. Even so, the European Union has already developed a pretty comprehensive internet privacy program. And they argue that the opt-in or opt-out, depending upon the type of information, whether it is medical or financial, is very acute, and that this information should not be collected without the person's approval. So you don't think the citizen does have that right in the United States to either opt-in or opt-out? Mr. Hsu. I think that in the long run people should have that option. However, if we delay a year or 2, it is not going to kill anybody, because right now I think the data that is in those data bases is not nearly as dangerous as what we are going to see in 5 years. Mr. Stearns. Okay. And my last question to Ms. Schlosstein. Yours is also free to individuals but not to businesses, is that correct? Ms. Schlosstein. That is correct. Mr. Stearns. And how many Americans I think have downloaded your software? Ms. Schlosstein. We estimate it is--approximately 50 percent of our downloads are from the United States and from Americans, and that is 2 million of the consumers. Mr. Stearns. And what would be your answer to the question I have given to the other three. Should the Federal Government set standards for internet privacy now or in the future? Ms. Schlosstein. Well, we believe that it is inevitable. What we stand for at Webwasher is user self-determination, that individuals need and have the right to protect their privacy, whether--both through the regulations and through the technology that offers them a way to block and control their own settings and filtering. Mr. Stearns. All right. Thank you. And now the ranking member, Mr. Towns? Mr. Towns. Let me just sort of follow up along the same line. It is said that most companies do not take privacy seriously. Now, if most companies do not take privacy seriously, then should we still continue to wait? Let me sort of get a response as we move down the line, starting with you, Mr. Hsu. Mr. Hsu. I think companies are starting to take things more seriously. But the problem is that once data is collected it is very hard to tell how it will be used in the future. So that as a company, a very well-intentioned company may collect a tremendous amount of data, and there is no telling who will have access to that data base in the future. So there is an issue even though companies are taking privacy seriously. Mr. Wallent. I believe, and I think Microsoft believes, that given the work that we have done now in Internet Explorer going forward, because of the position that we have in the market, which we admit kind of carries much responsibility with it, it also means that at times choices that we make impact others, and I think that the choices that we have made around Internet Explorer 6 in requiring P3P policies--if those sites want to do user tracking. Websites still work just fine without privacy policies, but yet they don't get to track the users, and that user tracking is something that really aids the economics of those sites very greatly. So we think that this economic incentive of the consumer choosing a product like Internet Explorer, the sites wanting to have information from the consumer, but the consumer being in the driver's seat. Richard Purcell, our chief privacy officer at Microsoft, often says that consumers tell him that they want to use the web, not be used by the web. And I think the work we have done in Internet Explorer starts to deliver on that vision. Mr. Towns. All right. Thank you very much. Mr. Schwarz? Mr. Schwarz. Congressman Towns, I am not sure that I would argue that companies don't care about privacy. I think companies care about privacy, certainly privacy related to their own data. They also care about privacy relative to their customers' data. It is not clear whether companies care about data that isn't theirs or isn't their customers', but that, in fact, provides access to other people through that data. I also would argue that individuals have often an interest in transgressing privacy of other individuals' privacy. And this is where the real crux of the matter is, because it is not necessarily the willful behavior of companies disregarding privacy laws or privacy rules. It is the willful behavior of individuals that are disregarding those rules, and that is I think where the government needs to focus on is, how do we make sure that we manage the intrusion into people's privacy by people with ill intent? Ms. Schlosstein. Webwasher responds to--believes very strongly in the need for privacy protection and in the hands of the user, whether it be defined as the individual, the corporate user, or the school or government, whoever is controlling the entrance to the network. We believe right now we have technology--Webwasher has technology, and we are finding that corporate infrastructures are adopting this kind of technology for privacy and security. And what we believe is that, with policy or without, products such as Webwasher can, at the gateway or at the individual desktop, be used by individuals to determine what comes in and what comes out of their box now, and as a complement with future policy. Mr. Towns. All right. Thank you very much, Mr. Chairman. I yield. Mr. Stearns. I thank my colleague. The gentleman from New Hampshire, Mr. Bass, is recognized. Mr. Bass. Thank you very much, Mr. Chairman. Ms. Schlosstein, the Webmaster filtering software---- Ms. Schlosstein. Webwasher. Mr. Bass. I am sorry, Webwasher. Ms. Schlosstein. I would like to, for the record, make that correction. It is Webwasher.com. Mr. Bass. Webwasher.com. Ms. Schlosstein. Thank you. Mr. Bass. Filters out all of these ads. How are the people that are putting up these websites going to make money if everybody starts washing out their ads? Ms. Schlosstein. Well, one way to approach that is if you saw the last slide that we presented, which was Webwasher's secluded product, Webwasher takes really a pro-consumer stance in that we have a right to decide what comes in or doesn't come in to our networks. And, therefore, it is not anti-advertising, but only that we believe as the paradigm is shifting that the old paradigm of advertising in--traditional advertising is not working on the web, and that the future of advertising on the web is going to be a cooperative activity between the consumer, the media, and the businesses in the kind of activity that I demonstrated as seclude-it, where one can select what kind of advertising people want, when they want it, and making it really a more profitable and more convenient and welcomed activity than it currently is in the intrusive way. Mr. Bass. Are there different types of advertising, though? Is it a kind of advertising where it is just--is there any such thing as an ad on a website that just is the ad and it doesn't leave any information in your computer? Does that exist? Ms. Schlosstein. Well, most ads, you know, are multi- layered, so to speak, in that they--you will see the visual ad, or whatever. But behind that ad it was--of the ads that we have stripped out in that example that I gave you of Salon.com, there were nine ads on that page. One component is it invaded privacy. You could imply from the amount of band width or time or space it took of the consumer's actual space. But the other part that we didn't see were the cookies behind that. Thirty-eight percent--I mean, 38 percent of the band width, but 79 percent of all of the cookies that were coming into that particular box were attached--were non- permission-based. And so each ad that is coming in has attached to it other--could have malicious code, could have--the pop-ups could have cookies, could have other privacy-imposing activities going on at the same time. And many do. Mr. Bass. Does your service eliminate or filter out things other than ads? Ms. Schlosstein. Yes. The Webwasher technology takes a very broad look at privacy, in that we look at not only advertising or content filtering, we look at the access control. We view an invasion of privacy, having children, for example, being exposed to pornography inappropriately. We view privacy as another approach or a front on privacy in a corporate environment with malicious code, ActiveX, Trojan Horses, those kinds of things, that could invade a corporate network and scramble the files or whatever as another imposition on corporate privacy and individual privacy. And Webwasher's settings are such that you can customize them to really address any one of those privacy concerns. Mr. Bass. Do you or Mr.--is it Sue? Mr. Hsu. Shoe as in tennis shoe. Mr. Bass. You know who has your software, so you must have a data base of users. Is that right? Mr. Hsu. No. Actually, our product doesn't require you to install any software on your computer. You just connect--you point your browser at our servers. You set up that connection. It is all encrypted, and then you just go. Mr. Bass. Do you know that I have contacted you? Mr. Hsu. No. Mr. Bass. Really. How about you, Ms. Schlosstein? In other words, do you have--if I sign up for Webwasher.com, do you know I did? Ms. Schlosstein. Webwasher practices what it preaches, in that, no, we do not keep records of who downloads our---- Mr. Bass. So you can't use the information that I am using your server---- Ms. Schlosstein. Absolutely not. Mr. Bass. [continuing] and sell it to somebody else. It is sort of like two mirrors. It goes---- Ms. Schlosstein. Right. Let me make a distinction here, because I think it is very important between the two technologies. And I think they are both valid and they are both very important in terms of what Webwasher does and what Webwasher is is completely controlled by the user as determined whether it be the corporate, the individual, or whatever. There is no outside governing body. We do not take or keep or control any of that information, so there isn't any possibility of a leakage of that information or a misuse of that information, because it never leaves the control of who that self-determined user is. Mr. Bass. Can I interrupt you, because I am going to run out of time. Mr. Hsu, you made a comment at the very end of an answer to the Chairman's question that this is nothing--I am going to murder the quote here--that this is nothing compared to what it is going to be like 5 years from now. Mr. Hsu. That is absolutely true. I think---- Mr. Bass. Tell me about that. What is going to---- Mr. Hsu. Well, I think people might be familiar with Moore's Law, which is that the power of CPUs doubles every year and a half. Well, also the power of the band width we use to transmit information and the cost of storing it, those things increase by factors of two every year. So we are on an exponential growth path. And all of those abilities--to store data, transmit data, and analyze data--are all useful in invading people's privacy. So we are just at the very beginning right now. A few web entities have taken aggressive advantage of the way browsers are written to put these cookies on you and track you, but I think that is a very minor thing compared to what you will see 5 years from now. Mr. Bass. Thank you, Mr. Chairman. Mr. Stearns. I thank you. The gentlelady from California, Ms. Eshoo, is recognized for---- Ms. Eshoo. I am going to pass, sir. Mr. Stearns. All right. The gentleman from Nebraska, Mr. Terry? Sorry, sorry, sorry. Mr. Markey from Massachusetts? Sorry. Mr. Markey. Thank you, Mr. Chairman. Mr. Stearns. No problem. Mr. Markey. First of all, let me say that I think there is a false security privacy dichotomy which is made. In other words, industries say that we have top-notch security, meaning the information as it comes from your home to our company is very secure. Once we get it, now it is a privacy policy. That is a different thing altogether. And now we have a right to modify the privacy. Okay? But don't worry, it is secure. No purple-haired kid living next door to you will be able to crack through our very top-notch encryption. Now, from a consumer's perspective, they see the whole thing as privacy. They don't make this distinction. The reason corporate America makes the distinction is they want to give you confidence to let it go from your home to the bank or to the hospital or to the company, but then it is a different set of standards once it hits our company. Now, we reserve the right to do certain things with it, and you have got to check with us on an ongoing basis to see whether or not your privacy is protected. Of course, the individual doesn't quite see it that way. It is all security or all privacy--whichever word you want to use, but it should be the same the whole way. So WebTV is a good example. That is a Microsoft product. So I just pulled down here privacy policy for WebTV. So WebTV says that when you register as a primary user of the WebTV network service, WNI will request information that personally identifies you or allows us to contact you. On the WebTV network services information is your name, home address, phone number, e-mail address, and credit card number--my credit card number. Now, you say back here that I have the right to opt out of having this ever shared with anyone else. But I personally believe you should have to get my permission. I mean, I gave you my credit card number, but I want you to have to come to me if you want to give it to somebody else. Now, do you think that is unreasonable, Mr. Wallent, that that should be a national standard? That if you are going to take my very, very, very private credit card number, and I am going to use it to do business with you, that you should have to get permission from me if you are going to use it for any other purpose. Do you think that would be an unreasonable standard for the Congress to legislate? Mr. Wallent. Well, just to be clear, Microsoft doesn't oppose either privacy legislation or a specific standard per se. But with all of this---- Mr. Markey. So you would not oppose--so Microsoft would not oppose us applying an opt-in standard for credit card numbers. Is that what you are saying? Mr. Wallent. No, that is not what I am saying, sir. Mr. Markey. Oh, I---- Mr. Wallent. What I am saying is we are not opposed to legislation per se. Mr. Markey. No, I understand that. But would you oppose us applying an opt-in standard for credit card numbers that are obtained by private sector corporate or individuals, and, then, that they can't be retransferred for other purposes without the explicit permission of individuals in America? Mr. Wallent. I am certainly not a lawyer. I am a software developer, which gives me some benefit sitting here with you. Mr. Markey. Well, but you are American, you are a human being. Okay. Do you think that--would you want someone taking your credit card number and just selling it as information, or would you want to have them have to get permission from you if you had entrusted them with your credit card number? Mr. Wallent. Well, I believe, sir, that information like your credit card, there are laws today that prevent credit card fraud. If I give Amazon.com my credit card number to buy a book, that doesn't give them permission to charge pornography on that credit card or some--you know, 10 other books that they think I might like. So I am not sure I quite understand your question, sir, because I believe---- Mr. Markey. Right. There is a difference, though. We are talking about a difference here. There is misuse of it, in terms of creating credit card fraud, and then there is just my desire to be private. I am giving it to you. I don't want you to give it to somebody else, even if that other person isn't going to potentially engage in fraud. I just don't want the whole world to have my credit card number. Do you think that that is--would that be an unreasonable thing for us to legislate here? Mr. Wallent. Well, sir, I think there is two separate issues. One is Microsoft firmly believes in the concept of notice and choice. Mr. Markey. Well, that is what I am saying to you. So it is no--who has the choice? Do you have to come to us and say, ``Here is your choice. If you don't give us permission, then we can't use it. Please give us your permission.'' Or should it be the other way around where we are going to use it, unless you actively try to stop us. Do you think it would be unreasonable for us to say that you have to come to each of us and ask for our permission to use the credit card information which you have gathered from us for any purpose other than that which you originally contracted from a corporation perspective to gain access to that number? Mr. Wallent. As I said, we do fundamentally believe in the concept of notice and choice. And I think---- Mr. Markey. But you are not answering my question. The question is: what is the choice? Okay? Where is the burden here? I know you are not going to answer it. Here is why--I know you are not going to answer it, and I know this is the answer that you had. But here is the problem-- at the back end of this thing, changes to the WebTV network service statement of privacy. WNI may make changes to the statement from time to time. They will post changes to our privacy statement here, right at the very bottom of this six-page privacy--we will post changes here, so be sure to check that periodically to find out if you have any more privacy that might have been changed here tomorrow morning, even though today we gave you this. We may also notify you of significant changes by e-mail. We may also notify you. But we may not notify you, huh? Well, that doesn't sound like a very strong commitment. When I sign up, I want it to be my deal now and forever. Amen. So, you know, it is a little bit troubling to be honest with you. There is also another part in here that deals with video and other information that you might gain from me. But, you know, in the cable industry---- Mr. Stearns. The gentleman's time has expired. Mr. Markey. Could I just--30 seconds, Mr. Chairman, and I won't---- Mr. Stearns. By unanimous consent, so ordered. Mr. Markey. I thank you. In 1984, we passed the Cable Act, and in the Cable Act every American out here, as they are flipping from station to station, the cable industry cannot sell that information. They can't tell anyone that you flip to that particular station at 11 at night. You know? That no one else in the family knows you are watching at 11 at night, anyone else in the neighborhood, or your boss. That is yours. And they have to get your explicit permission to give out that information. Well, a lot of the information that now, as we move 5 years down the line, it is going to be online is the same kind of very sensitive information. And I would like to think that Microsoft would understand that, just as Americans, as human beings. That the very same laws from the analog world must make some sense, because each of us might not want everyone else knowing that we were watching--gaining access to that information. And a credit card number is a good example, and the fact that you won't give us a specific commitment here that we have a right to protect our credit card number. Your coming to us is a good indication of how far we have to go in this debate. Mr. Stearns. I thank the gentleman. His time has expired. The gentleman from Nebraska, Mr. Terry? Mr. Terry. Thank you, Mr. Chairman. I will actually allow you guys to talk a little bit here, but let us follow up on the comments by Mr. Markey, because there is different philosophies on how to help consumers with privacy. You have all developed different types of technologies that work. Some of us feel that each consumer should be in control of their own destiny here, they get to make their own decisions instead of Congress making the decisions for them, personal empowerment and allowing--and it seems like your technologies allow that. My question, though, is: what Mr. Markey is leading to, and what begs the question from my standpoint, is these technologies are great, they empower the consumer, but unless you are watching a congressional hearing, which amazingly very few people do, how do we get the word out? How do we actually let consumers know about this? How do we educate consumers about what is out there? Because I would guarantee you, if you just pull 10 people from my neighborhood together, and maybe one of them will even know what a cookie is. So if I believe in personal empowerment and letting consumers make their own decisions on their sliding scale like you have developed, how do we let them do that? They have to be educated to be able to make those type of decisions. So where do you fit into the process? And what do you believe should be done to educate consumers? I will let anybody start with it. Go down the panel. Mr. Hsu. Well, I think education is the main issue, because I think most people don't understand what cookies are, and most people don't understand that when they send an e-mail it is like sending a postcard, that anyone in the middle between you and the recipient can read it. I deal with venture capitalists and tech reporters every day who don't understand the privacy issues, and I don't think the average person understands them either. So for industry to say that people make these informed choices and punish companies that have bad privacy policies I think is a little optimistic, considering the privacy policy that Mr. Markey read is very complex and most people can't understand it. So I think that education is extremely important, but I am not optimistic at the rate at which people will understand these complex technologies. Mr. Wallent. This raises the interesting issue that I tried to bring up in my testimony, which is it comes to a question of defaults. It is all well and fine to have controls in a product like Internet Explorer that let people control their privacy after the fact once they discover that that can be done. We have tried to take a higher standard with Internet Explorer 6 and provide good privacy defaults, requiring privacy policies, and for reuse of personal information requiring that consumers have the ability to opt out and providing easy ways to let consumers dial up the bar, so it has to go to an opt-in model. Furthermore, besides just building our technology, I have a team of about 15 people who spend full-time now evangelizing P3P. Even though it is not a Microsoft technology, we evangelize it to the top 100 websites, and also to all of the online advertisers, to try to get them to use that technology because we think it is the right thing for consumers. Mr. Schwarz. I would just like to point out, in addition to Congressman Markey's point about the cable TV law of 1984, I would suspect that not one in a hundred people in this country would know that, in fact, passing that information back and forth is not allowed. And so we are now some 16 or 17 years past that point, and we still don't have that education in place. I am not even sure that that education is necessary. And so I think without some minimum floor that is, in fact, legislated or somehow provided as a standard by the government or by the industry, we will not make much progress in this regard. So I would argue that--to your point on education, education is important, but I think a minimum floor is going to be required. The question is going to be: what do we define as sensitive data or data that must be protected? And how do we make that standard happen? And I don't think we have the answer today. Ms. Schlosstein. I agree that when Webwasher first started out we allowed for--we actually didn't have settings, and we requested that people actually set the settings themselves. And the feedback that we got from our users was that they did actually want to have default settings set, so that they wouldn't have to deal with it on a microscopic basis. And I think that is one of the dangers that we have with the P3P platform and other very complex dialogs that occur. So what Webwasher has done is we have actually just listened to the consumer and what they want, and our default settings are such that we have cookies--non-permission-based advertising cookies are part of the default settings now as per request by the consumers that have been using the product, and then they can go in and customize it at will, whichever way they want, if they have the knowledge and the desire to go it a further--a higher level. So that is one way that we have resolved that privacy initiative. Mr. Terry. Thank you. Mr. Stearns. The gentleman's time has expired. The gentlelady from Colorado, Ms. DeGette, is recognized. Ms. DeGette. Thank you, Mr. Chairman. One thing that we are grappling with as policymakers is the fact that increasingly states are beginning to look at privacy issues, as well as Congress. And then you have an issue--an international issue, of course, which many of you are dealing with. And so what I am wondering is how difficult it is for companies to navigate between the divergent privacy policies of different countries. Perhaps, Mr. Wallent, you could speak to that for a moment. Mr. Wallent. Certainly. So, obviously, not having a single worldwide standard is obviously additional hurdles that companies need to jump over. At Microsoft we are blessed with a large number of people and good resources to help us solve those problems. So if you look at the work we have done on MSN, for example, and the affiliated products there, they are able to jump through the appropriate legislative and regulatory hoops across the world. Ms. DeGette. But I think you would probably agree that you are unique in that capability. Mr. Wallent. I absolutely would. And what I was going to comment was is that it becomes excessively hard for smaller companies who are just starting up or startups to kind of follow all the right rules and understand what the laws are in all of the different places. That is why, to some extent, I think that technology standards such as P3P--everyone is concerned about privacy regulation and defining the privacy standards on a site. P3P provides a common mechanism for a site to define their privacy policy. Now, whether or not---- Ms. DeGette. Well, let me stop you. We only get 5 minutes-- -- Mr. Wallent. I am sorry. Ms. DeGette. [continuing] so that is the problem. And so I guess what I am positing, almost as a devil's advocate position, except for I think there is some issue here, is wouldn't there be a benefit to trying to craft one uniform Federal law, so that at least we would have a consistent U.S. standard? And I don't know what that standard would look like. That is what we are grappling with. But, you know, what we are looking at here is not just all of the international issues, but now 50 divergent State laws. Mr. Wallent. Right. So, as I was trying to answer for Mr. Markey, Microsoft is not opposed to privacy legislation per se. We believe in the concepts of notice and choice. But the devil is in the details. What data---- Ms. DeGette. I understand that. But you think it would be a good idea to try to craft something working on the details. Mr. Wallent. I think that it is a challenge to decide what data should be opt-in and what data should be opt-out, what practices---- Ms. DeGette. I understand it is a challenge. But you think it is a goal we should try to work together on? Yes or no. Mr. Wallent. I think it is certainly a goal to protect consumers' privacy. Absolutely. Ms. DeGette. Right. Mr. Schwarz, I saw you nodding. Perhaps you would like to comment on that. Mr. Schwarz. I am in agreement. There is a requirement to set a standard, to set a base, to set a minimum, but the difficulty is going to be what data, to what extent, and I don't know. Ms. DeGette. Mr. Hsu, what is your view on this? Mr. Hsu. Well, I think a uniform standard is always preferable to a patchwork. A small company would have to do a lot of work to try and comply with every state's varying legislation. Ms. DeGette. Ms. Schlosstein? Ms. Schlosstein. I think that there is a need for a baseline standard. But I think that beyond--above and beyond that that the diversity in our country really demands a diversity in policy and allows--that will allow for a diversity in policy, and that the technology must be flexible enough in order to reflect that diversity in policy. Ms. DeGette. Thank you. Something else that I am wondering about. We sit here and we have these hearings, and we hear testimony about the cookies and the different levels, and so on. And I must say, mainly due to the fact that I have two young children, I feel like I am pretty up on computer stuff. And also, I have a husband who is active in high tech issues. But I don't think I represent the average American consumer, and I would bet that the average American consumer doesn't even know about what a cookie is or that it is happening on their computer when they order something from Amazon.com. And all of you are shaking your heads in agreement. I am wondering if any of you know what the level of knowledge of consumers is of these issues, and what the industry is doing to educate consumers about what they can do. Perhaps we should start with you, Ms. Schlosstein. Ms. Schlosstein. Well, I know--I would have to agree that the knowledge level is low, and it is increasing very, very quickly as these debates contribute to that, as conversations in the public press about advertising cookies, and that I believe in the last few weeks every single national and international paper has had some sort of public article on that. So I believe the issue is escalating. We have found that there is a completely growing demand for it, actually. Ms. DeGette. Mr. Chairman, if I can ask unanimous consent just for another additional time to allow the rest to answer perhaps as to what efforts the industry is making for consumer education. Mr. Stearns. By unanimous consent, so ordered. Ms. DeGette. Thank you. Mr. Stearns. Go ahead. If the rest of you will answer her question. Mr. Schwarz. My answer would be that the level of knowledge depends on the age of the person that you are talking to. I would argue that kids that are in grade school, high school, have no difficulty with most of what we talked about today. When you get to people of our age, it is a different story. And I don't think that we are going to change that. I think we will have to wait for this new generation of people that are growing up with computers as a toy to become consumers and adults, to have the level of knowledge that is necessary to make these informed decisions. And so in the meanwhile, while we are dealing with consumers that are not that educated, there is some level of base that is necessary to protect them. Mr. Wallent. To somewhat echo what Mr. Schwarz has said, I think there was an interesting issue, though, where I don't think in the technology industry it is our goal to try to educate consumers about all of the little nitty details about technology, about what a cookie is and what it does, and first party and third party. You have to have good consumer privacy and good solutions for consumers that don't require them to understand what my job is. It just has to work. It has to make sense for consumers and have understandable choices for them to make. And that is really something that we have tried to work very hard on. Mr. Hsu. I agree with Mr. Wallent. I don't have any hope that at any point in time 90 percent of the population will understand what a cookie is or what a profiling data base is. Even a kid who is very good at playing Doom may not understand what Doubleclick is doing with their data. So I think that we have to simply it in some way and inspire confidence in the individual that things are being done, even though they don't understand the technical nitty-gritty. Ms. DeGette. Well, I guess I would just say that if people don't know what is going on, they don't realize the need for privacy policy. And so I think consumer education needs to happen. And, Mr. Chairman, I would ask if all of these witnesses could perhaps supplement the record in writing by telling us what their consumer education efforts are. They are never going to understand the need to have a privacy policy if they don't know what their risk is. And I thank the Chair for its indulgence. Mr. Stearns. I think what the gentlelady is alluding to the panel is that we, as legislators, would like your input on what we could do to educate, and what can be done on a national scale to educate users of computers who will be let into this camouflaged area where they think they are safe, where, in fact, they could be detected and a lot of their privacy revealed. So if you would do that, it would be appreciated. The gentlelady's time is up, and the next person--there is no one on this side. We will move to Mr. Doyle of Pennsylvania. Mr. Doyle. Thank you, Mr. Chairman. It has been very interesting. Mr. Markey and I were just talking. I mean, when you think about the web and the computers, so many of us are in kindergarten in terms of understanding the applications. Those of us that started dabbling in these things at a later stage of our lives, we understand the implications of that information, but not the applications. Our children seem to understand the applications but don't think about the implications of what they are doing on the web. And how to bring everyone up to speed--I don't think we are ever going to be able to do that. I don't think there is going to be a way to effectively educate everybody on how to use these tools. I mean, most people just don't have a clue how to do any of this, and I don't think they are aware of how the information is being used. I think that is what is going to change this down the road. I mean, the idea that somebody would be able to sell a list of all of the telephone numbers you dialed in the last month--you know, people would--they grasp that, and they would never permit that. What they don't grasp is how this data is floating around the web and how people are able to track it and access it and use it. People really don't understand that is what is going on. I remember a lot of us, the first time we discovered that when you send an e-mail, and you erased it, everybody thought it was erased. Then you found out it is still on the hard drive, and I can bet you a lot less e-mails went out of this place once that was discovered a few years back. So I think, you know, as people come to understand, you know, how this works, and as we start to progress as a Nation in our education of the computer age, that it is inevitable that there is going to be standards. So maybe we are not ready just yet to figure out maybe what that standard should be today, but we are going to figure it out I think fairly quickly, because, as Mr. Hsu said, 3, 4, 5 years down the road, I mean, people are going to demand it once they come to more fully understand how this information is being used. But I find it--the discussion fascinating. Mr. Wallent, I am just curious. Now, you say there is sort of an incentive for people to join into the privacy policies--you know, adopt the privacy policies and code them in this P3P language because otherwise the browser won't accept their cookies. Right? Mr. Wallent. Yes, sir. Mr. Doyle. And I am just wondering, do you see future applications for this technology and the P3P standard, like to extend it into other areas such as minimum encryption standards? Mr. Wallent. Sir, to answer your first question, sir, yes, I do believe the P3P will be used--will be deployed onsites, because if sites do not deploy it their advertising revenue and some of their functionality will be blocked. With respect to the application of P3P to other technologies like encryption, P3P is a good generic technology to describe the data practices of a site. It is not exactly clear to me how that would be applied to encryption, other than for the consumer to decide what level of encryption that is required based on the data practices of that site. I just--if I could have just a moment, sir. I just wanted to make it clear that I don't actually work for WebTV. I have not worked on their privacy policy. Mr. Markey raises a very legitimate concern about the credit card issue that we absolutely will follow up with him after this to make sure that that is addressed. We take private information very seriously and want to make sure we address any concerns that exist on the panel. Mr. Doyle. I am just curious, too. What assurances are really in place to make sure that, you know, when a website agrees to Internet Explorer's privacy standards that they will actually adhere to the privacy policy? I mean, in other words, I may be secure on my side, but what stops a third party from saying they are going to follow your internet privacy but then just goes ahead and shares the information with someone else anyway? Mr. Wallent. Our analysis of that, sir, and from our conversations with many of the State attorneys general on this topic, is that existing consumer protection law about deceptive trade practices would be covered. Essentially, the company is making a legal representation as to what their business practices are. If they say, ``No, we don't keep any of your information,'' but yet go ahead and do it, then clearly they are in violation of that. And the great thing is that we have it on record as to what they said their practice was in an unambiguous fashion. Mr. Doyle. Yes? Ms. Schlosstein. Could I just add to that? And I think that is one of the issues that we are going to have to deal with with P3P and other privacy protections that exist outside of the user's immediate control. And one of the things that--I mean, it could be a complimentary function such as Webwasher or other technologies that allow both that preference selection, but at the same time, complimentary-wise, to be able to block or control anything that is going out or that information that you do not want circulated or you don't want, so that technology is available. Mr. Doyle. Great. Anyone else? Yes? Mr. Schwarz. I would just like to also add that one of the techniques that might be deployed is to work with companies that, in fact, produce information which is sensitive information, such as credit card, such as health data, and work with them to make sure that the data that they produce or the data that they control is never dealt with in an inappropriate way. Technology exists to protect that type of content, whether through encryption or whether through hardware implementation. And there may be another channel to get to the problem rather than looking at it bottoms up through the grass-roots effort. Mr. Doyle. Thank you. Thank you, Mr. Chairman. Mr. Stearns. I thank the gentleman. The gentlelady from California, Ms. Eshoo? Ms. Eshoo. Thank you, Mr. Chairman. Let me ask the panel if--first of all, if any of you advertise your technologies online. Mr. Hsu. We have in the past. Ms. Eshoo. You have in the past. You don't today? Mr. Hsu. Well, actually, I can't--it is possible that we may actually have some banners running on other people's sites right now. So---- Ms. Eshoo. It doesn't sound like it is a full-fledged program, though. Mr. Hsu. No, it is not a big effort. Mr. Wallent. Microsoft, in our advertising for Windows XP, privacy is one of the key messages around that. We plan to spend as much money, if not more, on Windows XP than we did on Windows 95 for the marketing efforts and launch. So we expect that we will be touting our privacy efforts very, very heavily, both online and through other media. Mr. Schwarz. Our entire business is built around protecting assets, and so we advertise by default. Ms. Schlosstein. Though we protect privacy, we don't advertise our product, but we do get--we have 4 million users just by the identified need from it. People find out about it through---- Ms. Eshoo. It really is a curiosity question more than anything else, because we are talking about how best to have the consumer understand that these technologies--first of all, that they are available, how did they find out about them, and I think there have been several questions kind of in and around that. But I was curious to know how, you know, the masses find out about this. Or is it kind of, as we say inside the Beltway here, is it within the--kind of the geek community that we know that this is available. So it was a curiosity question. Do any of your technologies--the P3P, Webwasher, SafeWeb-- do they slow down the browsing speeds of the online user? Ms. Schlosstein. I can speak for Webwasher--does not. Ms. Eshoo. Does not. Ms. Schlosstein. It actually speeds it up because it blocks--it actually filters out unwanted content and makes the actual browsing experience faster and more accessible for the user. Ms. Eshoo. I mean, it is obvious why I am asking the question. If it does slow down, then people will not be so apt to move to the technology if, in fact---- Ms. Schlosstein. Yes. I think that is one of the benefits of having it on your box or on your server is that you actually can control it. Whereas, if it is--if it does, you are at the mercy of another server. Mr. Wallent. The performance issue around P3P was one of the critical things that Microsoft participated on the committee to try to resolve. And, in fact---- Ms. Eshoo. We have got to get you over to the State Department. You know, you give these answers that are--there is an answer buried in the answer, but it is not like upfront. It is kind of diplomatic talk. But at any rate, I congratulate you for having refined that. Mr. Wallent. No, there is no performance problem with Internet Explorer. Ms. Eshoo. Okay. Mr. Hsu. In our case, because we are routing your data through an intermediary server before we encrypt it, there is a small performance hit. Ms. Eshoo. What kind of feedback have you gotten from consumers and businesses about what you have? And how do you assess that? Ms. Schlosstein. Webwasher has a support line where we get 500 to 600 e-mails a day, and 60 percent of them are positive. So we are getting--I mean, we are getting rave reviews, thank yous, all the time--not only for the privacy that we are protecting but for the convenience that we are offering and giving them user control and self-determination online. Ms. Eshoo. So for the time that you have had the product, give us just a little bit more. Put a little different---- Ms. Schlosstein. Okay. Well, we have 4 million users worldwide. We have been--Webwasher has been around for about 18 months, almost 2 years, from when it was deployed. And in that time, we find that as--ironically, it is a public education issue. And as this issue becomes more--every time there is an article in the paper, we have an enormous spike in terms of downloads onto our site. We can't tell you who they are because we don't know exactly. But we have an enormous spike, and we have an--we know that as the education and interest and awareness level rises, the demand for more privacy is going to really be enormous. Ms. Eshoo. So you said, what, 500---- Ms. Schlosstein. We get 500 to 600 e-mails a day. Ms. Eshoo. A day. Ms. Schlosstein. A day. And I---- Ms. Eshoo. And they all say, ``This is terrific''? Or do they give you---- Ms. Schlosstein. You know, unless it is a download blip or something like that, in terms of the technological issue, or they are saying it doesn't--they find the new advertising size that we need to add to our new filters, or whatever. Most of it is around, ``You are my hero,'' the convenience, ``I am not bothered by the downloads anymore,'' the privacy is protected. Ms. Eshoo. So it is positive. Ms. Schlosstein. And it is very positive. Ms. Eshoo. I love the name of your company. I think it is just terrific. Ms. Schlosstein. Thank you. Ms. Eshoo. Did you come up with it? Ms. Schlosstein. No, I would like to take credit. Ms. Eshoo. Yes, good. Good. Mr. Schwarz. Since our business, in fact, is making sure that people only get access to what they have paid for, or should have access to, this behavior is a fundamental component of the relationship we have with our clients. What we find is that if the service that we provide does not make the experience that they have with the product that they are trying to acquire any more difficult than it had been prior to the introduction of the service, then they are reasonably happy. Of course, when the service becomes intrusive, it becomes a real problem for them. So the convenience and the ease of use is a fundamental requirement that cannot be broached. Ms. Eshoo. But what do they say to you, and how do you---- Mr. Schwarz. Well, they simply stop buying. Ms. Eshoo. Do you hear from a lot of people? They are happy? They---- Mr. Schwarz. We have done implementation for about 300 firms that distribute---- Ms. Eshoo. I see. Mr. Schwarz. [continuing] online, and have millions of transactions actually using that service. What we find is when the implementation for a certain client is intrusive in a way that the user deals with the content that they are trying to acquire, they stop buying. It is that simple. And you can track that almost one for one. What they do like is once---- Ms. Eshoo. I think we are just about--the red light is on. Microsoft is not--can't get that information yet, because you are not out there. Mr.--yes, the next person, because I think-- the red light is on, so I don't have any more time. Mr. Hsu. We get tremendously positive feedback, and the most positive feedback we get is typically from people in closed societies like Saudi Arabia or China, who can't see most of the web and are enabled to see it by using our service. Ms. Eshoo. But do you know what I am looking for more than anything else? Your indulgence, Mr. Chairman, for 30 seconds more. Is it anecdotal, or do you actually--do you collect this, so that there is a building--there is a record-building of the technology and the response from people? Mr. Hsu. We store it. Ms. Eshoo. You do. Mr. Hsu. We have thousands of e-mails from users that are positive, yes. Ms. Eshoo. Okay. Thank you. Thank you, Mr. Chairman. Mr. Stearns. I thank the gentlelady. Mr. Shimkus? Mr. Shimkus. Thank you, Mr. Chairman, and I will be brief. A simple question, kind of tied to my brief opening statement. From the testimony--and as you can tell, I have been in and out with other meetings. But my perception is that the market has worked, the demand is present for a product to be offered. These are supposedly success stories of the basic supply and demand business model. Briefly, tell--and, again, I apologize. This may have been answered in some of the statements. But can you briefly just go by--because the real debate is, how much do we intervene? What do we do here in Washington to pass laws to protect privacy but give people options? Your testimony has made the compelling case that the market is working. There is a demand. If government is to intervene and attempt some standardization, which is--will be the argument that is being made for public safety of personal information--tell me the benefits and disadvantages of doing that. And if you can just go left to right, starting with Ms. Schlosstein. Ms. Schlosstein. The benefits and disadvantages to policy? Mr. Shimkus. Federal law mandating standards or standard practices. Actually, maybe software requirements. We do that. We do intervene so much sometimes that we actually dictate technology. So is that good or bad? Ms. Schlosstein. Well, the stance that Webwasher takes is that we really support using--that we provide a technology that allows for the execution of policies, whether they be minimal or really excessive. What we would suggest probably is that in the interest of protecting consumer privacy and the right--the personal right, user rights, that the minimum amount of regulation be imposed by the government, and that you allow people to have the technology to address it on their individual, corporate, or governmental policies, so that they can be customized to reflect the uniqueness that makes this country, which is that we have so many different perspectives. Mr. Shimkus. So that is a disadvantage, but you haven't told me if there is a benefit to government intervention. Ms. Schlosstein. Well, clearly, I mean, if you take the case of child pornography, there is not a person in this room that wouldn't--would say that children should not be protected from pornography. But at the same time, and this is the dilemma, the conundrum, is you also wouldn't say with the--with the education benefits that are available through the worldwide web, that you wouldn't, at the same time, obstruct a child for getting education through the web that is available to them, because--and I understand there has been some trouble with like the copyrights--that Middlesex College might be blocked from the students doing research in colleges because sexes in Middlesex has been blocked by a blocker. And the technology is such, and I demonstrated a little bit of that with our Dynablockade, or the block list function, with now the technology that allows for image recognition and contextual identification, so that you can read something within the context. So you can read skin tones and nudity within a context, identify is it a medical site, is it an educationsite, is it a pornography site, that the technology allows now for these kinds of distinctions that will protect--will play on both sides of the fence. Mr. Shimkus. Let me get to the rest of them. But my question stems to that. Does government intervention in legislative language help corporate America, who is assessing producing a product based upon demand, is our involvement helpful, or is it harmful? Will it impede the ability for you to do the research and development and reap the benefits of an identified demand? Let me go to the other members. So---- Ms. Schlosstein. Just to clarify that Webwasher is apositional in that what we are designed to do is allow for execution of policy that is needed. Mr. Shimkus. Mr. Schwarz? Mr. Schwarz. I think our view would be that you have to set an environment within which behavior can be managed and the markets can behave in a way that works. The point that I would like to leave with you is that you need to move incrementally. We don't know enough about these issues to set a standard for all times. So you need to work within what is available and work in a way that allows you to increment your way as the industry has the ability to deliver or as the industry itself learns. There are almost 20 million people producing this technology around the world each year. And they will be, by definition, ahead of anything that you can think of as a government or as a policymaking body. You need to stay in tune and need to stay with that advancement and not to damage it in some way. Mr. Shimkus. Mr. Wallent? Mr. Wallent. There are certainly critical areas that legislation and your body can help with, especially in areas like identity. In fact, we talked earlier about what if sites deceive the public or tell them the wrong thing. I think the challenge, though, is getting the technology right and making sure that any specifications in the technology don't actually retard progress. Eighteen months ago I couldn't have told you the way the P3P was going to work. It is hard to see into the future that far and define the technology. Mr. Shimkus. It is very hard for politicians who are not working in engineering to make those determinations. Mr. Hsu? Mr. Hsu. Well, the technologies you have heard about today can do things like protect you from cookie profiling or protect your data by encryption. But I think the key point is that if I make a transaction with Amazon, they know who I am, they know where I live, they have my credit card number. It is stored in their data base. I cannot develop any technology that protects that data once Amazon has it, and that is the province of legislation. Mr. Shimkus. Thank you, Mr. Chairman. I yield back. Mr. Stearns. Thank you. We have completed our questions. Oh, yes. Sure. Mr. Towns. One quick question. Mr. Stearns. Yes, Mr. Towns? Mr. Towns. Mr. Schwarz, you indicated in your testimony that the technology currently used to protect intellectual property could also be used to protect government documents and records. Could you explain how this technology could benefit consumers by protecting medical, financial records, and also just personal information? Mr. Schwarz. Absolutely, Congressman Towns. The fundamental technology which we deploy is based on encryption. We place the document in question into an encrypted envelope, and there is a key assigned to that envelope, and the key is the private property of the person that is designed or destined to be the recipient of that document. And so the key and the document are always in the hands of that one individual that has been authorized to get access. And that technology can be applied to any document, whether it is medical information, whether it is financial information, whether it is music, or whether it is video. Mr. Stearns. And I thank panel No. 1 very much. I know how valuable your time is. And we appreciate your answers, and we look forward to continuing our discussion with you. And now I will ask panel No. 2 to come forward. While panel No. 2 is coming forward, I would point out to my colleagues and to the audience that what has been alluded to by Webwasher is what I guess they have called contextual content. But this is really the start of artificial intelligence. And what Mr. Hsu has mentioned, that Moore's Law has been applying to chips, it is also applying to broad band and storage. And so the analyzing, the storage, and all of this is moving so rapidly that these logarithms that are going to be created thereby where they will make decisions based upon millions and millions shades of meaning, you will make a contextual content decision which ultimately will be artificial intelligence, which they will be able to determine whether to block out something or not. And I think that alone is pretty interesting in itself. Now, panel No. 2 is Mr. Trevor Hughes, Director, Privacy Compliance, Engage, Incorporated; Mr. Jerry Cerasale, Senior Vice President, Government Affairs, Direct Marketing Association, Incorporated; Mr. Steven J. Cole, Senior VP and General Counsel, Corporate Secretary of the Council of Better Business Bureaus, Incorporated; and Mr. Jerry DeVault, National Director, Innovative Assurance Solutions, Ernst & Young. We also have Mr. Marc Rotenberg, Executive Director, Electronic Privacy Information Center, Washington, D.C. What we have here is a decision as to whether to start here with our opening statements. It is quarter after 12. I always believe in just moving ahead, so we will just start with the first opening statement, and we will just continue on and we will break in about--a little after 7 or 8 minutes, and hopefully then we will come back after lunch and--we have one vote now, and then we have another vote in about 45 minutes to an hour. So we will start with the opening statements, if you folks are all set up and you are ready with your demonstration. Is that Okay? Okay. I can't see your name tag. Just move it to the left. Yes. Mr. Hughes, why don't you start? STATEMENTS OF J. TREVOR HUGHES, DIRECTOR, PRIVACY COMPLIANCE, ENGAGE, INC.; JERRY CERASALE, SENIOR VICE PRESIDENT, GOVERNMENT AFFAIRS, DIRECT MARKETING ASSOCIATION, INC.; STEVEN J. COLE, SENIOR VP AND GENERAL COUNSEL, CORPORATE SECRETARY OF THE COUNCIL OF BETTER BUSINESS BUREAUS, INC.; JERRY R. DEVAULT, NATIONAL DIRECTOR, INNOVATIVE ASSURANCE SOLUTIONS, ERNST & YOUNG; AND MARC ROTENBERG, EXECUTIVE DIRECTOR, ELECTRONIC PRIVACY INFORMATION CENTER Mr. Hughes. By all means. Mr. Chairman, members of the committee, good---- Mr. Stearns. If you don't mind just moving it as close as possible to you. Mr. Hughes. Absolutely. Good afternoon. My name is Trevor Hughes, and I am Director of Privacy at Engage. Engage is an online media company. I am speaking today on behalf of the Network Advertising Initiative. Engage is a member company of the Network Advertising Initiative. The NAI is comprised of six online advertising companies, such as Doubleclick, Engage, Avenue A, L90, Advanced Logic, and that is it. We, as a group, represent to our belief approximately 90 percent of the third party ad networks online today. What we do is provide services to both advertisers' and publishers' websites online. We help to get advertisements to websites, and we help websites to monetize the advertising inventory that they have on their sites. One of the things that we do in this process is online preference marketing, otherwise known as profiling. Profiling is the practice of viewing the click stream habits of a browser as it goes from site to site within any one of our members' networks. We, as a group, recognize that there are significant consumer privacy issues associated with this practice, and, as a result, almost 2 years ago now began a process of developing principles in conjunction with the FTC and the DOC, the Department of Commerce, to provide standard guidelines for our industry in regards to online preference marketing or profiling. Those principles were released last July, almost a year ago now, and we are very proud of them. We have been working for a year under those principles. The principles, at their heart, require notice and choice. They require that our members provide notice through the thousands of websites that we represent, and also that we provide choice, various different forms of choice depending on the context of the data that we are gathering. What I would like to talk to you today about is one of our most recent announcements, and that is of a gateway website that we launched just last month. This gateway website provides a number of important things to consumers. First of all, and perhaps most important, it provides a global opt out, a single opt-out source, where you can go and opt out of the online preference marketing practices of all six members. You can see here the home page of the NAI, the Network Advertising Initiative. And in the bottom left corner of the screen is the opt out. That button will take you to a page that describes the process of anonymous profiling. Anonymous profiling is one of the categories of online preference marketing discussed under the NAI principles. Anonymous profiling, or non-PII as we call it, does not involve any personally identifiable information. In other words, we don't know who you are. We don't have your name or your address or your phone number or your credit card number. We don't have any identifiable information. Rather, what we have is information about your visit to a certain site. Now, consumers may not want to have that information gathered. For that reason, we provide an opt out. This opt out is on this page. And as you scroll down, you can see each company has a description of their practices, and then a check box where you can select the opt-out option. You can say that you would like to opt out. Once you have done that, you have gone through the six companies, I have checked off two in this example here--Engage and L90--you get a confirmation page. The confirmation page tells you, indeed, that you have opted out. You can see green checkmarks indicating that the opt out was successful for both Engage and L90. We found that this is a very powerful tool for consumers. And in the 1 month that the NAI gateway has been up, we have had 30,000 visits to the website, and approximately 17,000 unique opt-outs at the website. Not only do we provide a confirmation at the time that you opt out, but you can also come to the site at any time to verify what types of cookies you have on your browser from NAI member companies. The verify function on the site is very powerful. You can see I ran it here just the other day. And what it does is it looks at your browser and tells you what types of cookies you have on your browser. You can see for most of the members there is no cookie on this browser. Doubleclick has an active cookie. And because we have just opted out of Engage and L90, we have opt-out cookies from both Engage and L90. The combination of the opt out, the confirmation, and the verify functions we feel provide really significant--really significant consumer protection around notice and choice. The other thing that I would like to speak to you about just briefly is the third party enforcement program that we have announced and also released. We have an independent audit firm, Arthur Andersen, now known as Andersen, and Andersen actually audits every member, or actually every member is responsible for obtaining an audit, whether through Andersen or another audit firm. Andersen also manages a compliance program for us, where consumers can go to this site, which is accessible through the NAI site, and actually file a complaint. There is a fairly simple process that they can go through by entering some information about what their complaint is, the member that is involved, and Andersen will investigate those complaints. Andersen also fully describes the complaint process. After an investigation, if Andersen feels that action is warranted it has a number of options available to it. It can expel a member from the compliance program and remove the compliance seal that Andersen offers. It can also notify the FTC. And through the Andersen website that we see here, it can also provide notice that the member has been expelled from the program. In summary, we feel that the NAI has truly worked diligently over the past 18 months or so to develop a series of protections and self-regulatory standards that are meaningful and substantive. And the combination of our global opt-out and the enforcement program offered through Andersen we feel really do offer significant protections for consumers online today. [The prepared statement of J. Trevor Hughes follows:] Prepared Statement of J. Trevor Hughes, Director of Privacy, Engage, Inc. Mr. Chairman and Members of the Committee, I want to thank you for inviting me to testify. My name is Trevor Hughes, and I am the Director of Privacy for Engage. Engage is an Internet marketing and advertising services company that provides strategic marketing solutions to companies both online and offline. We were founded in 1995 and currently operate as a majority-owned operating company of CMGI. I'm here today representing the Network Advertising Initiative, an industry group comprised of the leading Internet advertising companies formed to address consumer privacy concerns. The NAI companies represent more than 90 percent of the third-party Internet advertising industry in terms of revenue and numbers of ads served. At the request of the Federal Trade Commission and the Department of Commerce, we formed the NAI to develop self-regulatory principles that would govern the practice of online preference marketing, or so-called ``profiling'' practices. Mr. Chairman, as you know, the NAI announced its self-regulatory principles in July of last year after months of intensive consultations with the Federal Trade Commission and Commerce Department. The Internet advertising industry, and more specifically, the online preference marketing industry, needed to adopt ``rules of the road'' for its information practices to satisfy legitimate user concerns about privacy. For the industry to write these rules in a manner that would gain public confidence, the NAI needed the guiding hand of public officials. The talks between the NAI and the federal government were tough but fair, in that the industry had to make a number of important concessions. Ultimately, we were pleased that the NAI could develop industry self-regulatory guidelines that are meaningful and real and which the FTC and Clinton Administration could and did unanimously applaud. The NAI principles deal with the practice of Online Preference Marketing. We define this as ``data collected over time and across web- sites, which is used to determine or predict consumer characteristics or preferences for use in ad delivery on the Web.'' In other words, we try to figure out that which is the best ad to play to a consumer at a given point in time. This benefits the consumer, because they receive banner ads more relevant than would otherwise be the case. It also benefits the advertiser, because their advertising dollars are spent more effectively. Perhaps most important, this presentation of relevant advertisements allows many Web sites to gain a better return on their advertising space than they would in an untargeted environment. Collectively, our job is to make the Internet a more efficient and competitive advertising medium that will further stimulate the growth and viability of the Internet as a source for free or reduced-price content and services. Many web sites depend on our services to be competitive today. Although OPM can be, and often stays, strictly anonymous, there are valuable consumer services that can be offered by linking OPM data to PII in an environment where consumers are given the option to choose whether the combination of that data takes place. The NAI principles lay out the ground rules and safeguards for the collection and use of Non-PII, the collection and use of PII, and the merger of PII with Non- PII. In summary, here are the guidelines: For Non-PII, we require notice and choice. NAI members must disclose their OPM practices through their web sites and through the NAI gateway web site, and in addition, where possible, they must contractually require their web-sites partners to disclose the collection of Non-PII for OPM. NAI members provide mechanisms for consumers to opt-out from the use of Non-PII for OPM through their respective web-sites and through the NAI gateway web-site. For PII, we require that NAI members follow the Online Privacy Alliance (OPA) guidelines for Online Privacy Policies. These policies require the adoption and implementation of a privacy policy, and that notice and choice be afforded. In addition to and above the requirements of the OPA guidelines, NAI members will not use any sensitive personally identifiable data for OPM, that is, we have banned the use of any personally identifiable information about sensitive medical or financial data, sexual behavior or sexual orientation, or social security numbers for OPM. For the merger of non-PII with PII, we have two scenarios. The first case is where PII is linked with previously collected Non-PII. In this case NAI members will not, without prior affirmative consent (``opt-in'') merge PII with previously collected Non-PII. The second case is where PII will be merged with Non-PII for OPM purposes on a going forward basis. In this case NAI members will provide consumers with robust notice and choice. The NAI principles include several examples of what would be considered robust notice for each of these scenarios. The NAI principles commit NAI to develop a web site where consumers can go to ``opt-out''. We have done so and launched the site in May. Any consumer can today visit www.networkadvertising.org and opt-out for any or all of the NAI member ad networks. We think this is a very useful tool for consumers, and more than 30,000 consumers visited the site during its first week of operation. The NAI members also have agreed to establish a third-party enforcement program, and we have retained Arthur Andersen and have completed that task as well. I have attached a copy of the Andersen Compliance Program document, which describes in detail all the various elements of this independent enforcement mechanism. Andersen has launched a website--www.andersencompliance.com--where consumers can go to complain about failures to comply with the NAI Principles. If Andersen finds these complaints to be valid, Andersen can launch an investigation of any NAI member. And if Andersen finds that a Member refuses to comply with the Principles, then Andersen will remove the NAI member from the program, which means that the Member may no longer display the NAI seal. Moreover, in such an instance Andersen will notify the Federal Trade Commission with a summary of the complaint, its investigation and the failure of the Member to comply. Finally, the NAI members strongly believe that industry, government, consumer, and advertiser pressures to set and maintain high standards for privacy will render participation in the NAI all-but- mandatory for all network advertisers. We believe strongly that these principles represent a reasonable and workable self-regulatory approach that satisfies the needs of Internet commerce and advertising while addressing appropriately user concerns about privacy. In conclusion and to summarize, the NAI self-regulatory principles are designed primarily to accomplish two things: first, to force advertisers and web-sites where ``profiling'' occurs to post notices that are strong and clear, and second, to make it easy for users to opt-out. Under these principles, NAI companies agree to afford consumers with important notice disclosures and appropriate methods of choice for participation, while at the same time one of the main engines behind this nation's booming new economy, the Internet, can continue its remarkable growth and improve as a provider of free and reduced-price content. These agreements attested to by the signatories of the NAI Principles represent unprecedented levels of user privacy protections. Because of the contractual reach of these NAI companies across literally thousands of Web sites, the NAI Principles already have had a broad impact on Web privacy. We are very proud of these two new websites for consumers--the NAI site and the Andersen site--and we encourage you and your staff to visit these sites and give us your feedback, as we continue to refine the NAI program. Mr. Chairman, on behalf of the NAI, I want to pledge that we will continue to work with the FTC, the Commerce Department and you and members of your staff to ensure that these self-regulatory principles live up to their promise. Thank you, and I look forward to any questions you may have. Mr. Stearns. I thank Mr. Hughes. Mr. Cerasale? STATEMENT OF JERRY CERASALE Mr. Cerasale. Thank you, Mr. Chairman. Jerry Cerasale, the Senior Vice President for Government Affairs for the Direct Marketing Association. It is an association of companies with about 5,000 members who market goods directly to consumers and to businesses. Basically, that type of marketing requires trust. If you buy something without touching it, you paid for it before you receive it. And in the United States, it is about $1.7 trillion in sales a year. About $1 trillion of it is business to consumers. The DMA tries to build that trust through education, supporting technology, creating privacy policy generators for online marketers, self-regulatory guidelines, ethics procedures, etcetera. And these are all outlined in my written testimony, which I hope will be included in the record. I want to focus today on the DMA's privacy promise to American consumers, and I think they are putting up a chart which kind of explains it. Every member marketer of the DMA marketing to consumers must agree to this promise and reconfirm it annually, regardless of the medium, whether it is mail, telephone, or the internet. What does it require? It requires you to tell people if you are sharing their information, marketing information with others. You have to tell them. Second, you have to give the consumers a choice to say no, they don't want you to share it, and to honor it. The third one is if somebody tells you, listen, I am a customer of yours, but I don't want you to send me any more information via phone, telephone, whatever, phone, mail, or e- mail, you have to honor that as well. And the fourth thing is you have to use the preference service, the suppression list that the DMA has. We have three of them--the mail preference service, which has been in existence since 1972. There are 4 million people on that list. The telephone preference service has been in existence since 1985, 4 million again. By the way, the telephone preference service is the do not call list for the State of Connecticut, will be the do not call list for the State of Wyoming on July 1, and will be the do not call list for the State of Maine on August 1. And we also have an e-mail preference service, which we started after Y2K, which has 50,000 names on it at the moment. These services have to be used to eliminate the name, address, e-mail address, phone number, whatever, from any marketing campaign that a marketer has going out to try and find new prospects. So this, in a sense, is a do not contact me list based upon the type of medium you use. It is free to consumers. Marketers do have to pay to subscribe. But it is $460 a year, and it can be subscribed to by a letter shop, which will clean up all of the lists for anyone using that shop. So one subscription can be used for a significant number of marketers. The EMPA--to get on that list, go through E-MPS.org, and you can sign up right online. Now, what happens here with this? Well, we have staff in Washington that just deal with compliance for the privacy promise. So they are doing checks to make sure people are, in fact, following what they promised. The mail preference service, telephone preference service, and e-mail preference service also are seated to ensure that someone isn't using that list for marketing as opposed to suppression. And we do get after people there through contract, etcetera. But we also have a process at the DMA, the Committee on Ethical Business Practices, which reviews all DMA guidelines, not just the privacy promise. We work for correction. It is self-regulatory. We work to correct things to make it better, to stop what they are doing or correct what is happening which we think violates our guidelines, including the privacy promise. If you refuse to work with the DMA to correct it, we have a couple of things that we can do. We have the potential of public dismissal, and for the privacy promise we have an antitrust exemption from the FTC. Or we can refer the question to the appropriate law enforcement agency, be that the FTC, the Postal Inspection Service, State Attorney General, the FCC if it has to deal with telephone. That is our promise. That is what we try and do. We have a process already set up. We do a significant amount of education, because we think it is important to provide consumers with choice, with ability to control their information, because you cannot have direct marketing without information. I have to have your name and address to provide to you the good that you purchased. I have to have a means to collect payment, most likely a credit card, to be able to do it. So direct marketing, unlike going to a mall and paying cash, requires information, and we have to have that consumer trust. Thank you. I am ready to answer any questions. [The prepared statement of Jerry Cerasale follows:] Prepared Statement of Jerry Cerasale on Behalf of The Direct Marketing Association, Inc. I. INTRODUCTION. Good morning, Mr. Chairman, and thank you for the opportunity to appear before your Subcommittee as it examines industry best practices and technological solutions for information privacy. I am Jerry Cerasale, Senior Vice President of Government Affairs for The Direct Marketing Association, Inc. (``The DMA''), the largest trade association for businesses interested in online and offline direct, database, and interactive marketing and electronic commerce. The DMA represents nearly 5,000 companies in the United States and 53 foreign nations. Founded in 1917, its members include direct marketers from every business segment, as well as the non-profit and electronic marketing sectors. Included are catalogers, Internet retailers and service providers, financial services providers, book and magazine publishers, book and music clubs, retail stores, industrial manufacturers, and a host of other vertical segments including the service industries that support them. The DMA's leadership also extends into the Internet and electronic commerce areas through the companies that are members of The DMA's Internet Alliance and the Association for Interactive Media. Members of The DMA include L.L. Bean, Time Inc., Dell Computer, Gateway 2000, DoubleClick, autobytel.com, BMG Direct, Charles Schwab & Co., Lucent Technologies, eBay, Acxiom, AT&T, AOL TimeWarner, IBM, MCI WorldCom, and others. The DMA is a long-time leader in self-regulation and peer regulation. DMA member companies, given their track record in delivering high quality goods and services to consumers, have a major stake in the success of both online and offline commerce. The healthy, continued development of brick and mortar, catalog, and electronic commerce depends on consumer trust. It is important that these online and offline communications mediums engage in transparent marketing practices to earn that trust. Members of The DMA are held to effective industry standards. It is these practices that I wish to focus on in my testimony today, which will place into clearer focus the state of the direct marketing industry's best privacy practices. The DMA's best practices include: Several DMA programs which are essential to protecting privacy online that, when created, were ahead of their time, and are now industry tools and common best practices; The DMA's self-regulatory Ethical Business Practice Guidelines which protect consumers privacy by addressing complaints concerning practices contrary to the Guidelines; A new DMA program that will satisfy the enforcement requirement of the U.S.-E.U. Safe Harbor to the European Data Directive; Several technology solutions supported by The DMA which will help consumers to choose and enforce how their personal data is collected and used by businesses; and Important DMA public education initiatives which help the government, businesses, and, most importantly, consumers to better understand the information collection process. II. THE DMA'S BASIC ONLINE AND OFFLINE PROGRAMS. The DMA's members understand and respect the privacy needs of consumers, can react much faster than the government to new conditions in the marketplace, and therefore has developed a self-regulatory response to privacy. For decades, The DMA and its members have worked to develop effective consumer notice and choice practices as a fundamental element of self-regulation. Below is a brief description of The DMA's business practice tools created to incorporate both notice and choice elements and to bolster a responsible exchange of consumer information. A. The DMA's Privacy Promise. The DMA is providing leadership in the offline and online worlds through the ``Privacy Promise to American Consumers,'' (``Privacy Promise''), which became effective July 1, 1999. The Privacy Promise requires, as a condition of membership in The DMA, that companies, including online businesses, follow a set of privacy protection practices: Providing customers with notice of their ability to opt out of information exchanges for marketing purposes; Honoring promptly individual requests to opt out of the sale, rental, or exchange of their contact information to third parties for marketing purposes; Accepting and maintaining consumer requests to be on an in- house suppress file to stop receiving unwanted commercial solicitations; and Using The DMA Preference Service suppression files, which exist for mail, telephone, and e-mail lists. Members are permitted to display a recognizable ``seal'' that assures consumers of a company's commitment to privacy protection. B. The DMA's Privacy Principles and Guidance for Marketing Online. The DMA is also providing leadership in the online world. The DMA's Privacy Principles and Guidance for Marketing Online (``Online Guidelines'') explain and highlight issues unique to online and Internet marketing. When marketing online, companies are advised that the notice they provide to consumers regarding their information practices be placed in a prominent place. The notice should state whether the marketer collects personal information online from individuals, provide certain disclosures, identify the marketer and provide an e-mail, postal address, and telephone number at which the marketer can be contacted. Marketers sharing personal information collected online are also required to provide consumers with an opportunity to opt out from the rental, exchange, or sale of this information for commercial purposes. For online e-mail solicitations, The DMA Online Guidelines state that member solicitations should be clearly identified as such and disclose the marketer's identity. Marketers using e-mail are required to furnish consumers, with whom they do not have an established business relationship, with notice and a mechanism through which consumers can notify the marketer that they do not wish to receive future online solicitations. C. The DMA's Preference Services. The DMA has developed services to assist our members in adhering to our primary values of notice and consent. The DMA offers three different preference services for various mediums that empower consumers with effective choice: (1) the Mail Preference Service (``MPS''); (2) the Telephone Preference Service (``TPS''); and (3) the e-Mail Preference Service (``e-MPS''). Use of these services by member companies that market to consumers is required as a part of the Privacy Promise. To protect against abuse of these Preference Services, The DMA seeds and constantly monitors these lists. 1. Mail Preference Service.--In 1971, The DMA launched the MPS. The MPS gives consumers the power to choose whether to receive promotional mail at home. Those who wish not to receive promotional mail at home can register with The DMA's MPS by providing a name, home address, and signature by mail, at no cost, or online via the DMA Consumer Help Web site. Once a consumer's name and home address is added to the list, it remains on the list for five years. Consumers are informed about the availability of this service through state and local consumer agencies and print and broadcast advertising. 2. Telephone Preference Service.--Similar to the MPS, The DMA created the TPS in 1985 to honor consumer choice in telemarketing. TPS is a consumer service that is easy to use and offered at no cost. To register with TPS, individuals need only provide a name, home address, home telephone number, and signature, by either mail or via The DMA Consumer Help Web site. Afterwards, individuals' names will remain on the TPS list for five years. The DMA is also the official distributor of the do-not-call list of the States of Connecticut, Maine, and Wyoming. All of the names found on these three States' do-not-call lists have been incorporated into The DMA's TPS file. 3. e-Mail Preference Service.--In further developing responsible marketing practices for the Internet age, we adapted the fundamental principles of the MPS and TPS to create the e-MPS. The DMA's e-MPS similarly empowers consumers with notice and choice concerning the receipt of unsolicited commercial e-mail (``UCE''). Launched last year, the e-MPS allows individuals to remove their e-mail addresses from Internet marketing lists. This ambitious undertaking is aimed at empowering consumers to exercise choice regarding receipt of UCE, while creating opportunity for the many exciting new benefits of legitimate marketing in the interactive economy. Since January 2000, consumers have been able to register for the e- MPS at a special DMA Web site. Consumers can use this service, at no cost, to place their e-mail addresses on a list indicating that they do not wish to receive UCE. This service affords consumers the flexibility to determine the types of solicitations they receive. Through this service, individuals can opt out of business-to-consumer UCE, business- to-business UCE, or all UCE. Consumers on the e-MPS list will receive no e-mail from DMA members unless they have an established online business relationship with that company. This service also is available to companies that are not members of The DMA so that they too may take advantage of this innovative service and respect the choice of consumers who choose not to receive UCE. D. The DMA's Privacy Policy Generator. Another effective DMA program developed to help members provide effective notice and choice to consumers is The DMA's Privacy Policy Generator. This tool, available at The DMA's Web site, allows companies to create and post effective privacy policies. The DMA's Privacy Policy Generator (http://www.the-dma.org/ policy.html) enables companies, through a series of questions, to develop customized privacy policies for posting on their Web sites based on the companies' policies regarding the collection, use, and sharing of personal information. The utility of this tool, and the ease with which it is used, is demonstrated by the hundreds of companies that have used it and sent these policies to The DMA for review. E. The DMA's Children's Privacy Policy Generator. Similarly, The DMA created the Children's Privacy Policy Generator, which allows direct marketers to create and post effective children's privacy policies. This tool can be used by marketers to help them comply with the requirements of both the Children's Online Privacy Protection Act (``COPPA'') and the Federal Trade Commission COPPA Rule that implements the Act. The DMA's Children's Privacy Policy Generator is easy to use and guides marketers through an online step approach through which marketers answer a series of questions. From these questions, marketers are able to determine which disclosures they need to make in the privacy policies posted on their Web sites based on their information practices. III. THE DMA'S ETHICS GUIDELINES. The DMA's self-regulatory guidelines and procedures provide a comprehensive and meaningful approach to addressing consumer privacy. At the cornerstone of the DMA's self-regulatory approach are The DMA's Guidelines for Ethical Business Practice (``Ethical Guidelines'' or ``Guidelines''). These Ethical Guidelines were adopted to aid its members and others engaged in direct marketing in determining ethical conduct in dealing with customers and other businesses which will be in the best interest of their customers. The DMA has undertaken extensive efforts to ensure that its members market ethically for the protection of consumers. Indeed, on a daily basis, The DMA gives its members advice on how to ensure that they are complying with its Guidelines. In an effort to strengthen sound business practices in the marketplace, The DMA established the Committee on Ethical Business Practice to review direct marketing promotions and practices that may violate the Ethical Guidelines. The Committee reviews potential Guidelines violations of both association members and non-members. The Committee has applied the Ethical Guidelines to hundreds of direct marketing cases concerning deception, unfair business practices, personal information protection, and other ethics issues. A. The Process. The Committee receives promotions and practices for review in a number of ways: through consumers, member companies, non-members, or sometimes consumer protection agencies. If the majority of the Committee believes that the promotion or practice brought to its attention potentially violates the Guidelines, DMA staff contacts the company and points out the potential Guidelines violation. The company is then given an opportunity to respond. If the Committee does not believe the promotion violates the Ethical Guidelines, the case is closed and the company is not contacted again. Cases closed without company contact are handled confidentially. Most companies cooperate with the Committee's efforts and agree to modify the questioned promotion or practice. Because cooperation with the Committee and compliance with The DMA's Ethical Guidelines are voluntary, a confidential and meaningful dialogue about the particular promotion or practices usually occurs, and the Committee and the company are typically able to reach a satisfactory conclusion. In those cases where the Committee is successful in obtaining the company's cooperation to change the promotion or practice, or where the Committee is persuaded that the violation did not take place, the case proceedings remain confidential. The confidentiality protects all parties and helps ensure that the Committee's goal of obtaining compliance with the Guidelines is met. In those rare instances where the Committee cannot come to a satisfactory resolution with a member or non-member company, that is, the Committee believes that the violations are continuing, the case may be referred to The DMA's Board of Directors for further action. Cases referred to the Board of Directors are made public by the Committee. Board action could include censure, suspension of membership or expulsion from the DMA. The Board may also decide to publicize its action. Companies with promotions or practices that are found to violate the law in addition to the Ethical Guidelines are referred to appropriate law enforcement authorities for handling. The Guidelines have proven to be an effective means of ensuring ethical marketing practices by non-members as well. Although non- members are not bound by The DMA Ethical Guidelines, it has been our experience that non-member companies comply with Guidelines and policies so as to comport with industry standard practices. The net effect is to increase good business practices for the industry and to increase consumer confidence in the marketplace. In addition, where a non-member company's practice is illegal, we are able to refer the case to the appropriate federal and/ or state law enforcement authority. B. The Committee on Ethical Business Practice's Regulatory Approach. The DMA's self-regulatory approach has proven successful in addressing complaints regarding practices contrary to The DMA's Ethical Guidelines. Working with both members and non-members, The DMA has gained voluntary cooperation in adhering to these Guidelines. As a result of The DMA's efforts, many companies have reformed their practices in areas such as sweepstakes, predictive dialing, unsolicited faxes, and e-mail to address the concerns raised by activities that are violations of the Guidelines. IV. THE DMA SAFE HARBOR PROGRAM FOR EUROPEAN DATA. On May 22, 2001, The DMA became the first trade association to provide a European Union Safe Harbor Enforcement Program (``DMASHP'' or ``Program'') at no cost to its members. The DMASHP, which is an effective way for U.S. firms that choose to comply with European Union (``E.U.'') data export regulations. This Program is aimed at compliance with the enforcement element of the Safe Harbor Principles. Technical assistance and educational materials will be provided through the DMASHP to assist participants throughout the process for meeting the Safe Harbor requirements. To provide consumers with an easily recognizable symbol that signifies and distinguishes a Program participant as being in compliance with the Program, The DMA also created an easily recognizable DMASHP mark. The Third Party Dispute Resolution Mechanism is a major component under the DMASHP that provides businesses seeking to certify under the Safe Harbor with an independent third-party dispute mechanism that complies with the Safe Harbor enforcement requirements. The Safe Harbor requires that the dispute resolution mechanism be readily available to consumers, affordable, and be able to ensure compliance with the Safe Harbor privacy protections. The DMASHP: provides a fair and unbiased redress of the consumer's concerns; is visible so that consumers with concerns know where to turn for resolution of their problem; is accessible so that there are no barriers to the filing of a complaint, whether they be financial or otherwise; provides resolution in a timely manner; provides finality for the consumer by reaching an independent determination of the dispute; and provides enforceability of the final conclusions in the determination of the consumer's dispute. The DMA also created a DMASHP Committee (``Committee''), which has the power to hear both sides of a dispute and provide a final determination. As mentioned above, when businesses join the DMASHP, they are required to abide by the decisions of the Committee. They are also notified in the DMASHP contract that the Committee will have the authority to issue certain sanctions as a result of their decision. The lynchpin to any dispute resolution mechanism is that it be impartial. One way to ensure impartiality is to ensure openness of the results of the program by publishing the outcomes of the cases on a regular basis and for The DMA's staff to be constantly vigilant that the results are fair and legal. Overall, this Program will provide consumers with an easy method to bring their disputes before the Committee. It is the goal of the Program to obtain a determination of all cases in a quick and timely manner, but in no case longer than 60 days. V. TECHNOLOGY SOLUTIONS. Technology is playing an increasingly important role in helping users determine and enforce the ways that information about them is used and collected. The DMA and marketers have been, and continue to be, instrumental in the development of this important technology by encouraging, supporting, and indeed helping to develop and promote, such software. Since its inception, The DMA has been involved in an initiative that supports this concept--the Platform for Privacy Principles (``P3P''). This initiative, undertaken by the World Wide Web Consortium, has developed a ``negotiation'' approach for protecting privacy. A broad coalition of information providers, advertising and marketing specialists, software developers, credit services, telecommunications companies, and consumer and online advocates worked together on P3P to achieve a technological solution that will protect privacy without hindering the development of the Internet as a civic and commercial channel. P3P allows a user to agree to or modify the privacy practices of a Web site, and be fully informed of the site's practices before interacting with or disclosing information to a site. There also have been several announcements by companies in the last few months of other commercial products that will empower consumers with respect to privacy online. As technology continues to improve, so will consumer empowerment tools. We support the continued responsible use of this cutting-edge solution as Congress, businesses, and consumers evaluate it. VI. PUBLIC EDUCATION. Another important part of The DMA's efforts is spent in educating consumers and businesses about the numerous DMA programs that are available to them. The DMA has a vital interest in educating its members and the general public about the responsibilities of people who collect and use data, as well as the process. We take great pride in our education initiatives, because through them individuals and businesses will better understand the potential benefits of interactivity and the choices individuals have to control information that they submit to these businesses. Therefore, The DMA has developed a Web page devoted to privacy and launched its Privacy Action Now initiative. The DMA has also made a special effort to empower children, parents, educators, and librarians by establishing its http:// www.cybersavvy.org Web page for them and providing them with tools, information, and resources to ensure safe Web surfing. Additionally, we have produced a ``hard copy'' version of the Web site, Get CyberSavvy. Get CyberSavvy has the distinction of being awarded first place honors for excellence in consumer education by the National Association of Consumer Affairs Administrators. VII. CONCLUSION. The DMA is a long-time leader in the marketing industry's self- regulation and peer regulation. For decades, we have worked to develop practices that will address and protect consumer privacy. We understand that our online and offline worlds are more dynamic than ever and will continue to develop effective business practices in a timely manner to address consumer concerns as these mediums evolve. We congratulate the Subcommittee for taking a closer look at the industry's best practices and technology solutions and look forward to working with the Subcommittee. [The information on DMA is retained in subcommittee files.] Mr. Shimkus [presiding]. Thank you. Right on time. Next, we will turn to Mr. Cole, Senior Vice President and General Counsel for the Corporate Secretary of the Council of Better Business Bureaus, Incorporated. Welcome, and you have 5 minutes. And your full written testimony is already submitted in the record. Mr. Cerasale, your request was granted to put all of that into the record. STATEMENT OF STEVEN J. COLE Mr. Cole. Thank you very much, and good afternoon. I actually said good morning in my notes, but change that. Now, you know the Better Business Bureau well, our almost universal brand recognition and our reputation for impartiality in the marketplace. BBB online operates two so-called trust mark or seal programs, reliability and privacy, and both are designed to help consumers identify companies safe to do business with online by looking for sites with one of our trust marks or using our search mechanism to find those sites. It was our reputation and experience with self-regulation that led the business community to ask us to create an online privacy program. And the phrase ``self-regulation'' is not boilerplate to us. We take it seriously. Our program standards were formulated voluntarily, sleeves rolled up in work sessions by a working group of about 30 of the most important technology, consumer product, financial service, and information companies in the United States. Since our 1999 launch, we have received over 1,500 applications from over the United States and from 20 countries, and we have awarded seals covering over 800 websites. And there are now 1,000 sites that are either qualified or in the process of qualifying. We need to expand our reach, and I will touch on that later, but we do reach companies with a huge share of the market--high-tech companies like Hewlett-Packard, Intel, and Agilent; communications companies like AT&T and MCI; and travel services like American Airlines and Expedia; retailers like Lowe's and Fingerhut; entertainment companies like Lucas Films and Nickelodeon; and information companies like Dun & Bradstreet; and consumer goods firms like Procter & Gamble and Nestle. In addition, our reliability trust mark now displayed on about 10,000 websites will soon require, among other things, that online advertisers post and adhere to fair information principles. And this will apply to these 10,000 sites whether or not they participate in our separate privacy seal program. Now, our program that I am here to talk about today covers the collection of personal information online, although a few of our seal holders, such as Tupperware, apply their policies to all information collected, both online and offline. Disclosure is the cornerstone of our program. We want a transparent environment with no surprises. And one of our key requirements calls for easy-to-find, easy-to-read notices which tell consumers the types of information collected, how their information will be used, the choices available in preventing these uses, and how the consumer could access information and make corrections. We require the notices be placed wherever personal information is collected at the site, so that consumers are informed at the right place and the right time about the consequences of their actions, although some of our seal holders like Xerox go further and put the notice on virtually every page. Mr. Chairman, there has been recent critical media coverage of the complexity of some privacy notices, and we think it may miss an important point. There is a very delicate balance to draw between simple disclosures that may not tell the whole story and full disclosure which does but has a lot of ifs, ands, and buts, and definitions. We work hard to strike that balance reasonably, and we prefer full disclosure to the consumer with the simplest language possible. But we don't want material information to be hidden solely for the sake of brevity. Privacy notices mean very little unless backed up by a business' actual conforming practices to their notice. We use a unique assessment tool that inquires into a seal applicant's management processes. We ask about personnel policies and training, about their relationship with third parties like agents and contractors. We inquire into physical security and electronic security procedures. Our annual assessment process offers ongoing help and tailored advice. Actually, we have been told that applying for a seal is like getting a free consulting service. It is good public policy even if it isn't the best business model. Our program requirements include other important best practices. Consumers must be allowed to opt out of transfers of their personal information to third parties, and they must be given an opportunity to opt in for certain transfers of sensitive data, such as health care. Seal holder websites must prominently disclose how consumers can raise questions or complaints with the company and with BBB online. They must participate in our dispute resolution program, and they must afford consumers access to personal information at a reasonable cost, not just to allow correction of inaccuracies, but simply to inform them what is being retained and what is retrievable about them. And some companies like Kodak provide instant online access through password-protected profiles. Protection of online privacy requires a global outlook, so our standards now incorporate the online safe harbor terms negotiated by our government and the European Union. And I am proud to say that EU officials have singled out BBB's program as the most important factor in persuading them that self- regulation could work. We apply the safe harbor principles also to U.S. transactions and U.S. customers. That is not done by everybody. And we verify compliance with the requirements rather than rely on self-certification. On June 1 this month, I signed an agreement in Tokyo with the Japan Information Processing Development Corporation to launch the first ever cross-border, online trust mark program-- in this case, the reciprocal privacy seal program. The program, with the encouragement of Japan's government, provides for common privacy standards and recognition of each organization's award of a seal by the other, and it provides a co-branded privacy seal for use on the websites of either country. And we think this is going to be a very effective way to promote cross-border commerce. Let me close by recognizing that there is still a large portion of the marketplace that hasn't responded, and it is fair to ask why this is so. One reason, we suspect, is the marketplace is uncertain about the current legal environment. Will there be legislation or not? Will self-regulation technology have a role? What standards will ultimately govern? Such uncertainty may fuel a reluctance to embrace any particular voluntary self-regulation program. Now, this is not to say that the business community has ignored privacy. Quite to the contrary. But participating in a seal program is a big commitment closely related to predictions about the future legal framework. And, frankly, these predictions simply cannot be safely made at this time. Thank you for your interest. [The prepared statement of Steven J. Cole follows:] Prepared Statement of Steven J. Cole, Senior Vice President and General Counsel, Council of Better Business Bureaus, Inc. and BBBOnLine, Inc. Mr. Chairman and members of the Committee, my name is Steven J. Cole, and I am the Senior Vice President, General Counsel, and Corporate Secretary of the Council of Better Business Bureaus, Inc. I am pleased to be here to speak with you about the BBBOnLine Privacy Seal Program, one of the significant self-regulatory programs of BBBOnLine, the Internet subsidiary of the Council of Better Business Bureaus. The Council of Better Business Bureaus (CBBB) is the umbrella organization for the nation's Better Business Bureau system, which consists of 129 local BBB's and branches and 270,000 member businesses across the United States. The CBBB is a nonprofit business membership organization tax exempt under section 501(c)(6) of the Internal Revenue Code. More than 325 leading edge companies nationwide belong to the CBBB and provide support for its mission of promoting ethical business practices through voluntary self-regulation and consumer and business education. Each year, millions of consumers contact the Better Business Bureau for pre-purchase information or for assistance in resolving marketplace disputes. In large part, they are drawn to the BBB by its enormous name recognition, reputation, and proven credibility. The BBB trademark is one of the country's most widely recognized by both business and consumers. The public looks to the Better Business Bureau for impartial and reliable information on a broad range of companies, products and services. We offer consumers and businesses a means to resolve disputes through conciliation, mediation and, when necessary, arbitration. Our name recognition, the extremely high level of trust we have earned from the public, and our experience in operating self-regulation and dispute settlement programs, including our previous experience with offering another seal program in the BBBOnLine Reliability Program, are some of the reasons the business community asked BBBOnLine to provide a framework for self-regulation in the area of online privacy. BBBOnLine is a 501(c)(6) tax-exempt organization, supported by leading online marketing and technology companies in the United States. A wholly owned subsidiary of the CBBB, BBBOnLine was established by the CBBB and its member sponsors as a means to promote the highest ethical business practices online through self-regulation and consumer education and self-help measures, and thereby help to foster consumer trust and confidence in this new market. To help online companies distinguish themselves, BBBOnLine provides two separate seal programs for online businesses--the Reliability Seal Program and the Privacy Seal Program--and provides consumer information through our website, www.bbbonline.org. Both programs emphasize the importance of posting and adhering to a privacy notice that is based on fair information practices which includes notice, choice, access and security. These important privacy notice disclosures provide the consumer with knowledge so that they may understand the company's privacy and security practices before providing any personally identifiable information. BBBOnLine's Reliability Program has developed a Code of Online Business Practices which will help shape the rules of the road for e-commerce, not only for privacy but for many other aspects of consumer protection. This Code has become an international model for other countries looking to advise their own online businesses on best practices. The BBBOnLine Privacy Program awards seals to online businesses verified as meeting our high standards including: the posting of online privacy policies meeting rigorous privacy principles, completion of a comprehensive evaluation, monitoring and review by a trusted organization, and participation in a consumer dispute resolution system. Our goal as an organization has and continues to be providing education for businesses and consumers on fair and honest practices in the market place. Our Privacy Program is a logical extension of this objective. The Privacy Program is designed to be a user-friendly tool that helps foster trust and confidence in online commerce and as a resource for business as a simple, one-stop, non-intrusive way to demonstrate compliance with credible online privacy principles. The core of the BBBOnLine Privacy Program: Awards an easily recognizable and affordable ``seal'' to businesses that post online privacy policies meeting rigorous principles, including notice to consumers, disclosure, choice and consent, access, and security; Offers a separate and distinct seal for sites directed at children; Provides a thorough and consumer-friendly dispute resolution system; Monitors compliance through requirements that participating companies undertake, at application and at a minimum annually thereafter, assessments of their online privacy practices; and, Takes specific actions for non-compliance, such as seal withdrawal, publicity and referral to government enforcement agencies. To ultimately qualify for a privacy seal, applicants must successfully complete a comprehensive assessment process that examines all relevant aspects of an applicant's information practices, including privacy notice content and placement, security measures, transfer and merger of information, access, correction; and (if the website or online service falls within our children's guidelines) a comprehensive set of additional children's requirements. Our assessment is an educational tool, providing business with a template on how to institute and maintain a credible regime promoting fair information practices to foster protection of consumer privacy in the online world. In the 27 months that the BBBOnLine Privacy Program has been in operation, we have already gained much valuable experience. The assessment process involves a careful dialog between ourselves and our applicants, and often we find ourselves learning from each other. For instance, in the process of evaluating the information practices of applicants, we find that we are also educating them on the importance of drafting clear privacy policies that disclose with sufficient specificity what is being collected and how that information is being used. We are talking with applicants about the necessity of providing access to and correction of information, and simultaneously, the importance of having in place verification methods for providing access to only those individuals authorized to obtain it. We are educating applicants on security measures, the many issues that arise in clearly defining the scope of the privacy seal protections, and the best way to protect children's privacy. In this way, we believe we are not only certifying websites that follow the BBBOnLine criteria, but also greatly raising the bar by giving applicants the time and guidance needed to make them knowledgeable about the issues surrounding online privacy. In addition to the assessment process, BBBOnLine offers consumers and businesses significant experience in resolving disputes. Using BBB's dispute settlement experience, we stand ready to provide consumers with a specialized forum to air and resolve privacy-related disputes. We will accept complaints from both US residents and non-US residents about companies and organizations with posted privacy notices that misuse information or are alleged to have violated posted privacy policies. Complaints can be about the actions of seal participants and non-seal participants. Companies or organizations that do not cooperate with us in a dispute resolution proceeding can, in turn, be subject to public withdrawal of our seal and/or referral to the appropriate government agency. Both BBBOnLine's Privacy Program and Reliability Program are designed to foster consumer trust and confidence on the Internet and serve as a valuable resource for business as a simple, one-stop, non- intrusive way to demonstrate compliance with credible online commercial practices. As an aid to both businesses and the consumer, BBBOnLine's privacy standards evolve over time to ensure that they incorporate the rapidly evolving changes in this environment as well as important governmental concerns. As previously mentioned, the Better Business Bureau is well-known for its role in providing consumers with pre-purchase information and this role has become even more important with the increasing popularity of the Internet. This medium enables consumers to shop from their home computer instead of leaving home to visit a bricks and mortar establishment. The appearance of a BBBOnLine seal on a website provides consumers with a user-friendly tool because they can simply click on the seal to confirm a company's participation in one of our programs. This helps increase a consumer's comfort level when shopping online. BBBOnLine also helps businesses educate their own customers. A disclosure-based program both in process and design, BBBOnLine seeks to create a transparent environment with no ``privacy surprises.'' We require clear, easy to find, and easy to read privacy notices that contain relevant disclosures. Consumers of a BBBOnLine seal holder must be able to rely on the privacy notice, which means it must be available, must be understandable, and must contain those disclosures that consumers need to make informed choices about the collection and use of their own information. Some of the key disclosures required by BBBOnLine include: What types of personally identifiable information are being collected from them. How their information will be used. What choices the consumer has regarding the sharing of personal information How the consumer can access his or her personally identifiable information to review and/or make corrections. Recent critical media coverage of the complexity of some privacy notices may miss an important point here--namely, that we have a very delicate balance to draw between full disclosure, which includes ``ifs'' ``ands'' and ``buts'' and definitions because of the complexity and diversity of the state of privacy practices and ground rules in this country, and simpler disclosures that don't tell the whole story. We work hard to strike that balance in reviewing applicant's policies. We lean towards full disclosure, with an effort at using the simplest language possible. But, we don't want important exceptions or clarifications to be hidden for the sake of brevity. BBBOnLine's website also serves as a great shopping aid for consumers. One of the most popular features is BBBOnLine's searchable database, a resource for anyone seeking out trustworthy online businesses that have been approved by one of our seal programs. The website also provides guidance should a dispute arise between a consumer and a specific company. If necessary, the consumer also has the opportunity to file a complaint against the company. Online shoppers are increasing in numbers and these steps ensure that confidence levels can rise at the same time. BBBOnLine also serves as an educational resource for business, both for those seeking a seal, and those already carrying one. As an integral part of our application and renewal process, BBBOnLine offers ongoing help, guidance, and tailored advice for the creation, maintenance, and improvement of sound information policies. This educational component for business is critical. It is rare for us to receive an application from a business that is already 100% compliant with our program standards. Privacy remains a new and complex enough issue that many businesses are approaching the issue of online privacy for the first time, and still learning how to best protect privacy. For instance, in our application and review process it may become apparent that new procedures for consumer choice, access, data security, and site design need to be implemented. Privacy notices must often be amended to provide more meaningful and understandable disclosures. Binding promises must be obtained to guarantee the correct use of information. The interactive process begins with standards that already incorporate many of the best practices laid out by leading industry coalitions, privacy advocates, and government bodies such as the Federal Trade Commission. One best practice recommended by these groups is the ability of data subjects to not only correct their own information, but also to later access and review their information. This is also a standard requirement of BBBOnLine. Another is the ability of data subjects to discern not only ``what'' information is being collected, but by ``whom.'' In the increasingly seamless environment of the Internet, which can visually blur the line between data collectors, BBBOnLine requires its seal holders to provide specific disclosures when other data collectors are incorporated into a site design, and to provide visual cues and disclosures when there are links to outside parties that may look like part of a seal-holder's site, either because of co-branding, licensed services, or frames. Likewise, BBBOnLine follows recognized best practices by requiring all its seal holders to explain how they can be contacted in the instance there are questions or concerns. Their participation in BBBOnLine itself must be disclosed so that data subjects may take advantage of our dispute resolution process. Seal holders must provide a statement of their commitment to data security. Seal holders must explain whether or not information is shared with outside parties, and how that sharing can be prevented. These are all reflections of best practices that have been made an express part of the BBBOnLine Privacy Program standards. Equally important, BBBOnLine does not limit its inquiry to just the quality and placement of a seal holder's privacy notice. Because privacy notices mean little unless backed up by a business' actual practices, BBBOnLine also uses a unique assessment tool that inquires into a seal applicant's management processes. We ask about staff training. We ask about the relationship a seal applicant has with all parties that have access to data, including agents and contractors. We require the creation of internal security logs. We require confirmation of physical security devices, such as doors and locks, in addition to electronic security procedures such as encryption and passwords. In some cases, the comprehensive, interactive, and educational back-and-forth that leads to the grant of a BBBOnLine Privacy seal leads to exemplary information practices that may even exceed BBBOnLine's own standards. Once a business is educated on areas of privacy concern, and given concrete suggestions on how these concerns can be addressed, we find many companies creating even more creative and effective ways to protect online privacy. For example, BBBOnLine requires posted privacy notices that are easy-to-find, and appear at least on every homepage, every page where information is collected and every page that contains an active email address. Many of our seal-holders, such as Xerox, go beyond this requirement and place a link to their privacy notice on virtually every page of their Web site. BBBOnLine requires privacy notices to clearly explain a business' online policies, as well as what online elements may not be covered. A few of our seal holders, such as Tupperware, go the extra step of applying the promises they make in their privacy notices to all information collected (both online and offline) and honor these promises universally for all the company's sites. BBBOnLine requires its seal holders to provide data subjects access to their own information, subject only to reasonable frequency and fee limits. Practically all the BBBOnLine seal holders have chosen to provide access and correction free-of-charge, and many, such as Kodak, go the extra step of providing their customers instant access online through password protected profiles. In addition to these specific examples of good information practices, it has also become apparent that when an organization sets out with a comprehensive approach to privacy, many of the barriers, costs, and challenges imposed by privacy compliance are reduced. There are significant efficiencies realized when a ``privacy plan'' is implemented across the board from the beginning of an organization's online presence. When privacy is folded into a corporate culture, new information practices are implemented more quickly, online content and services are more swiftly modified, costs are kept down, and compliance with third party verification services (like BBBOnLine) becomes infinitely easier. In this respect, we have found that one of the most powerful ways to encourage good privacy practices is to empower businesses with the knowledge, tools, and advice they need to make privacy an integral part of their operation. Based on leading industry standards and an expert privacy panel, the guidance of the BBBOnLine Steering Committee, and the 88 year history of the Better Business Bureau system in providing effective self-regulation, the BBBOnLine standards continue to provide some of the most effective and relevant standards for privacy. To maintain our standards as a relevant education tool, BBBOnLine has continued to adapt in the face of new regulation and marketplace needs. BBBOnLine is able to do this because one of the inherent advantages of a self-regulatory program is this ability to move quickly and remain responsive, which proves especially important in the fast- paced environment of the Internet. To offer just one example, the BBBOnLine Privacy standards were updated almost a year ago to incorporate the safe harbor privacy principles negotiated between the Department of Commerce and the European Union for the adequate protection of information under the European Union's Directive on Data Protection. This program upgrade has allowed BBBOnLine Privacy Seal holders to enter the EU safe harbor. Several BBBOnLine seal holders, including Hewlett-Packard and Dun & Bradstreet have since gone on to self-certify on the DOC's safe harbor list. Unlike others, BBBOnLine's safe harbor compliance standards are made applicable to US businesses and US consumers--so we have enhanced protection in the US. As the EU negotiations highlighted, privacy is not purely a North American issue. In the borderless world of electronic commerce, online privacy protection has become a key component of doing business in today's global economy. Various countries have developed their own country or region specific regulatory approaches to privacy. For the US to remain competitive in e-commerce, privacy concerns need to be addressed. This is another area where self regulatory programs like BBBOnLine can help in the global arena to assist business and consumers in promoting sound privacy practices and offer consumers and business a forum for resolving disputes across borders. In further response to the global marketplace, on June 1 of this year I signed an agreement in Tokyo, Japan with the Japan Information Processing Development Corporation (JIPDEC), the Japanese Government sponsored privacy mark program, to launch the first ever cross border privacy seal program. The program provides for a reciprocal seal which provides US businesses who wish to market online to Japanese consumers with a combined privacy seal, granted by BBBOnLine, which incorporates the JIPDEC seal, which is easily recognizable in Japan. This effort will also provide Japanese online marketers, marketing to the US, with the BBBOnLine Privacy Seal for use in the US. Once a US company qualifies for the BBBOnLine Privacy Seal, it will also automatically qualify for the reciprocal JIPDEC seal. This groundbreaking agreement will help foster e-commerce across borders and also facilitate resolution of privacy disputes that may arise in cross border transactions. Since BBBOnLine's Privacy Seal Program has been officially ``open for business'' we have received over 1500 applications from all over the US and from 20 countries, and have awarded seals covering over 800 websites. When you factor in those currently in the application process, there are over a 1000 sites that have either qualified for or are in the process of qualifying for our seal. The credible nature of our assessment process is illustrated by the number of sites that do not ultimately qualify for the seal. The reason is our program is tough. However, even those sites that go through our process, but do not actually receive a seal, still benefit from learning how to implement good privacy practices. While this has been a good start, unfortunately, the percentage of applicants, compared to the wider universe of websites that could benefit from the program, is still small. Our applicants come from diverse segments of the market place. Our seal holders include high technology companies like Intel, Hewlett-Packard, Dell, Agilent Technologies; communications companies like AT&T and MCI; travel related companies like American Airlines, Union Pacific Railroad and Expedia; major retailers like Lowe's Companies and Fingerhut; entertainment companies like Lucasfilm, Nickelodeon, and Zagat Survey; major trade associations like the American Electronics Association and the Electronic Retailing Association, as well as major multinational firms like Proctor and Gamble and Nestle. When you consider that significant companies like these have all embraced the rigorous standards of the BBBOnLine Privacy Program, you can appreciate the large number of consumers that already benefit from our self regulatory program. Even so, most of the applications we have received have come from small to medium-sized businesses. The BBBOnLine Privacy Seal Program was intentionally priced so that companies of all sizes could apply. The only item keeping a company from participating in the program should be its inability to meet the eligibility requirements; price should not be a factor. The World Wide Web is made up of hundreds of thousands of websites, most of which are not large companies. In order for self-regulation to work it must be accessible to the majority of web marketers, large and small companies alike. However, even while BBBOnLine continues to grow, we recognize that there's still a large portion of the marketplace that hasn't responded to our message. One thing that the Committee might consider is why this is so. One reason we suspect is that the marketplace is still uncertain about the current legal environment. Will there be legislation or not? Will self-regulation and technology be deemed the preferred route? What standards will ultimately define widely accepted best practices? Such uncertainty may fuel a reluctance to embrace any particular rush to voluntary programs such as BBBOnLine, which is unfortunate, given what we have already accomplished in such a short time frame. This is not to say that the business community has ignored privacy. To the contrary-- as we have all seen, it is doing well in posting privacy policies on web sites--but participating in a seal program is a big step, and is closely related to predictions about the legal environment. It is our hope that as the program grows, and as consumer awareness and education increases, we will have been able to make the online marketplace a safer place to negotiate for all. We want to thank the Committee for your attention and hope that you share in our enthusiasm for the tremendous progress already made. I am available to answer any questions you may have. For those individuals that may be reading this document, I have provided a list of website addresses that may help you in further understanding the various aspects of BBBOnLine programs. Mr. Shimkus. Thank you. Next we will turn to Mr. Jerry--is it pronounced DeVault? Mr. DeVault. Yes, it is. Mr. Shimkus. National Director, Innovative Assurance Solutions. Welcome, and you have 5 minutes. STATEMENT OF JERRY R. DEVAULT Mr. DeVault. Thank you. Good afternoon. Ernst & Young is a leader in providing auditing and assurance services around the globe with 78,000 employees based in 130 countries. I will make three points illustrating how privacy practices have evolved and acquaint you with an emerging best practice independent verification. First, I would note that the mere existence of a privacy policy, even a policy that includes standard components, is not as impressive as it once was. Not long ago the privacy debate centered on whether a website posted a privacy notice. Having a policy and providing notice was the best practice. Privacy policies were once a rarity. Last year, all of the 100 most popular sites posted such notices, yet concern remained. Notices did not adequately discuss protections or key components emerging as industry standards. In response, industry groups developed self- regulatory policy, standards, and detailed components of the notices. Seal programs such as BBB online and trustee provided a seal of approval to sites that pledged to include certain requirements in their privacy policies. But with all of the improvement in the quality and quantity of privacy notices, why does public concern remain high? If effective policy practices have been identified and incorporated into policies, shouldn't that be enough? This brings me to my second point, that promises alone don't earn consumer trust. Today too many consumers don't trust that organizations will follow through on their promises. Providing notice, choice, access, and security will only work if consumers can trust that companies will enforce them. Leading companies are recognizing that it is not enough to say what they will do with personally identifiable information. Businesses must also prove to consumers that they are doing what they say they are doing. Leading companies now provide consumers and other stakeholders with more assurance about their actions. They are proactively having third parties test their assertions regarding the people, the processes, and the technologies that operate and enforce their stated policies. This testing requires that a company earn a compliance report as compared to promising to comply with a set of self- regulatory requirements stated on the website veneer. Businesses increasingly looking for a more effective private sector solution to privacy are turning to independent third parties for verification of their practices. Independent verification is not a new idea. More and more companies undertake independent verification because they realize it leads to enhanced consumer trust, which in turn can result in more loyal customers and a return on their investment. For example, a large international client credits our independent verification services with contributing significantly to its ability to double its online closing-to- sale ratio and increasing website revenue by more than 45 percent. In areas where Congress and the executive branch have regulated treatment of sensitive financial and health data, such as Gramm-Leach-Bliley and HPPA regulations, you have required that more than their promises are in place to safeguard consumer information. You have focused on actions, which brings me to my final point. Since building trust requires more than promises, the mechanism selected to protect consumers should include independent assurance or independent verification. And there are several ways to police or assure compliance with privacy policies: through the courts and increased litigation, through increased powers of the Federal Government, or through government facilitation of private sector solutions to this public policy concern. Determining which of these compliance measures to employ, whether individually or in combination, is the policy question faced by government and industry. If it is determined that the private sector is the appropriate venue, industry groups simply pledging to meet tailored promises will likely not be sufficient in the eyes of consumers to achieve the goal. As I previously indicated, companies will need to provide a high level of assurance that its people, processes, and technologies are operating effectively. The auditing profession has developed a set of principles and criteria for online privacy. The AICPA and the Canadian Institute's Web Trust Program for Online Privacy, which was mentioned earlier in opening remarks, provides a global best practice, a set of generally accepted privacy principles against which companies and self- regulatory groups can interpret and implement policies, procedures, and controls to maintain compliance with online privacy practice standards. The AICPA standards are the established criteria used by auditing firms globally in more than 13 countries to test that an organization operates in compliance with online privacy assertions. In conclusion, independent verification is an emerging best practice. Ultimately, just as notices and standard policy components and test seal programs took time to emerge and be accepted into the framework for internet privacy, so will third party independent verification. The adoption of independent verification as a best practice can provide increased assurance to consumers and to policymakers alike, and, importantly, it can help stave off more draconian governmental measures that could unduly impede private sector initiatives. I appreciate the opportunity to be here this morning, and I welcome your questions. [The prepared statement of Jerry R. DeVault follows:] Prepared Statement of Jerry R. DeVault, National Leader, Innovative Assurance Solutions I. INTRODUCTION Good morning Mr. Chairman, and thank you for the opportunity to appear before your subcommittee on the topic of industry best practices in your series of hearings on the important issue of privacy. I am Jerry DeVault, National Leader of Innovative Assurance Solutions for Ernst & Young LLP. As one of the ``big five'' accounting firms, Ernst & Young is a leader in providing accounting and assurance services around the globe, with 78,000 employees based in 130 countries. While the Internet revolution has been occurring, Ernst & Young has been adapting to offer our clients a variety of assurance services aimed at assisting our customers in establishing trust with consumers, businesses, and regulators on privacy and trust issues. Our clients include many of the Fortune 500 companies as well as many new and emerging companies. As a result of providing our services to numerous companies, Ernst & Young has a unique perspective on the best privacy practices of various industry sectors. Today, I would like to share this perspective with you, explain how industry practices have evolved over the past several years, and describe our premiere service in this area, the provision of independent third-party verification services. II. THE MERE EXISTENCE OF A PRIVACY POLICY ( EVEN A POLICY THAT INCLUDES STANDARD COMPONENTS ( IS NOT AS IMPRESSIVE AS IT ONCE WAS. Not long ago, the privacy debate centered on whether a web site posted a privacy notice. The idea was that consumer concerns would be alleviated if sites merely explained their practices in public notices. At one point, privacy policies were a rarity. However, by last year, according to the Federal Trade Commission's 2000 report to Congress, all of the 100 most popular sites posted such notices. Nonetheless, consumers and policymakers remained concerned because many of these notices did not adequately discuss protections or contain the key components emerging as industry standards. In response, industry groups began to develop self-regulatory privacy standards detailing the components of the notices. Seal programs such as BBBOnLine and TRUSTe began to provide a seal of approval to sites that pledged to include certain requirements in their privacy policies. Leading businesses also began to undertake other best practices to ensure that their publicly posted privacy notices were being followed. These measures included developing internal procedures and training for employees to follow the requirements of the organization's privacy policies. Additionally, many businesses have empowered a chief privacy officer or other dedicated official to develop and oversee internal compliance processes. Yet, even with this progress, consumers' and policymakers' concerns surrounding privacy have not been alleviated. The obvious question is: if effective privacy policies are posted on sites that compose the overwhelming majority of Internet traffic, why does public concern remain so high? III. PROMISES ALONE DON'T EARN CONSUMERS' TRUST One reason that concerns remain high is that consumers don't trust that organizations will follow through on their promises. Making a declaration to provide notice, choice, access and security will only work if consumers can trust that companies will enforce them. In the private sector, leading companies are recognizing that it is not enough to say what they will do with personally identifiable information; businesses must also prove to consumers that they are doing what they say they are doing. Leading companies now find it valuable to provide consumers and other stakeholders with more assurance about their actions. They are proactively having third parties test their assertions regarding the people, processes, and technologies that operate and enforce their stated practices. This additional step of robust testing requires a company to ``earn'' a compliance report as compared to simply agreeing to comply with a set of self-regulatory requirements stated on the web site ``veneer.'' Businesses, increasingly looking for a more effective private sector solution to privacy, are turning to independent third parties for verification of their practices. Independent verification is not a new idea in the e-business arena. More and more companies undertake independent verification as a best practice because they realize that it leads to enhanced consumer trust(which in turn can result in more loyal customers and a return on their investment. For example, a large international client credits our independent verification services with contributing significantly to its ability to double its online ``closing the sale'' ratio and increasing Web site revenue by more than 45 percent. In addition, our clients recognize value in other ways such as differentiating themselves from their competitors and proactively managing the risks of online business. Even in those areas in which Congress and the Executive Branch have regulated the treatment of particularly sensitive information like financial and health data, lawmakers have required more than mere promises to safeguard consumer information. Both the Gramm-Leach-Bliley Act and the HIPAA regulations are focused on actions--they require that organizations have appropriate controls and systems in place to ensure data is handled appropriately. When the Department of Commerce negotiated a Safe Harbor for compliance with the European Data Directive, they required that qualifying companies certify that their practices comply with the Safe Harbor principles. And certain self-regulatory organizations recognize that a promise to follow policies is not enough. When the Network Advertising companies found themselves under regulatory pressure, they wrote into their self-regulatory program a requirement that participating companies undergo independent verification of their privacy practices. IV. SINCE BUILDING TRUST REQUIRES MORE THAN PROMISES, THE MECHANISMS SELECTED TO PROTECT CONSUMERS SHOULD INCLUDE INDEPENDENT ASSURANCE. There are several ways to police or assure compliance with privacy policies: through the courts and increased litigation; through increased powers of the federal government; or through government facilitation of private sector solutions to this public policy concern. Determining which of these compliance measures to employ--whether individually or in combination--is the policy question faced by members of this Subcommittee, the entire Congress, as well as industry. If it is determined that the private sector is the appropriate venue, industry groups simply pledging to meet tailored promises will likely not be sufficient in the eyes of consumers to achieve the goal. As I previously indicated, companies will need to provide a high level of assurance that its people, processes, and technologies are operating effectively. Much like other areas where we provide assurance regarding business practices, the auditing profession has developed a set of principles and criteria for online privacy that incorporates an effective assurance component. The American Institute of Certified Public Accountants (AICPA) and the Canadian Institute of Chartered Accountants (CICA) WebTrust Program for Online Privacy provides a global best practice--a set of generally accepted privacy principles--against which companies and self-regulatory groups can interpret and implement policies, procedures, and controls to maintain compliance with online privacy practice standards. In addition to being a set of principles and criteria that have been reviewed by leading online privacy organizations, WebTrust is the established criteria used by auditing firms globally to test that an organization's people, processes and technology operate in compliance with online privacy assertions. Mr. Chairman, members of the subcommittee, widely adopted independent verification as a ``best practice'' can provide increased assurance to consumers and policy makers alike. It will reduce the need for enforcement and investigation of information practices that could unduly impede private sector initiatives. It will also serve as a mechanism to demonstrate compliance if Congress ultimately finds it necessary to legislate in this area and to assist companies in limiting litigation risks. V. CONCLUSION In conclusion, independent verification is emerging as a best practice. Ultimately, just as notices, standard privacy policy components, and seal programs took time to emerge and be accepted into a framework for Internet privacy, so too will independent third-party verification. The adoption of independent verification as a ``best practice'' can provide increased assurance to consumers and policymakers alike. And, importantly, it can help stave off more draconian governmental measures that could unduly impede private sector initiatives. I appreciate the opportunity to be here this morning, and am happy to answer any questions. Mr. Stearns. Thank you. Mr. Rotenberg? STATEMENT OF MARC ROTENBERG Mr. Rotenberg. Thank you very much, Mr. Chairman, Mr. Towns, members of the subcommittee. My name is Marc Rotenberg. I am Executive Director of the Electronic Privacy Information Center. I have also taught privacy law at Georgetown for the last 12 years. I am grateful to be here today, and I wanted to particularly thank you, sir, for this series of hearings that you have held on the privacy issue. I think it is very important that we are able to have this opportunity to carefully study this issue, and I appreciate the time that you and the committee members have spent on this. I would also like to say that while my organization and the privacy and consumer organizations across the country that we work with favor privacy legislation, we hope that you will introduce a bill to safeguard the right of privacy. We also appreciate the important role that technology plays in safeguarding privacy. In fact, my own group, EPIC, was one of the leading organizations working to make strong encryption tools available to users of the internet so that when people went online they could do so with some assurance that their personal information would be protected. And today on our website we make many privacy tools available so that people will be able to protect their online privacy. We have never viewed the use of technology and the passage of legislation as an either/or situation. We think they both go together. And I would like to use a simple example that I think will be familiar to many people about how this operates. Think about the use of the telephone. You pick up a telephone. You don't have to set a privacy setting on the side. You don't have to figure out how much privacy you are going to need for who you are talking to or who--you know, what you might be talking about. Federal law protects the privacy of that telephone call. It doesn't matter whether you are rich or poor. It doesn't matter whether you know a lot about how telephones work. The Federal law gives everyone in this country strong privacy protection of their communications when they use the telephone network. Now it is also the case that when new technologies for telephone came along, like the cordless phone, the cellular phone, for example, that created some new privacy issues. And so it was important to incorporate technological safeguards so that your telephone didn't operate like a radio, like a broadcasting device. And so my point, simply stated, is that I think we need both technology and law to protect privacy. And I think we need it in particular for the internet, because I have to tell you, frankly, what I am concerned about today, you have heard descriptions of some very powerful privacy tools. Some of these I think will work well; some of them not so well. But I am afraid what we are opening the door to is a form of privacy survivalism, which says to users of the internet, if you are very sophisticated, if you know the difference between 128-bit crypto and 40-bit crypto, if you can change the settings on your cookies, reconfigure your SSL, you can have very good privacy. But for the rest of you who are still trying to figure out how to set the VCR that is sitting on top on your television so it doesn't keep blinking, you may have some trouble. It is going to be a little bit more difficult for you, and maybe you have to get used to the idea of not having so much privacy. And that is why we need legislation, because not all of us are going to be able to figure out how to take advantage of these tools. We need them built into the network. People need to be able to use the internet like they use the telephone, with the assurance that their personal information will not be misused, that it won't be used for unrelated purposes, and that their privacy will be protected. Now, I would also like to suggest for you that as we look more closely at some of these new privacy technologies, it is very important to ask what type of privacy are they providing. If I say to you, for example, that privacy means giving you a notice about how your personal information might be used, and then I develop a technology that puts notices on your computer screens, on your cell phones, which is an interesting problem by the way--if you are relying on privacy notices, what is going to happen to people who begin doing business through their cell phones. They are looking at a little screen and trying to read a notice. That is a real problem. But maybe I can do it. Maybe I can put notices everywhere. Then the technology looks very good, because the standard that you have set is actually quite low. It is quite easy to put privacy notices on things. If you say, instead, that privacy means being able to limit how information is being used, or being able to see the information about you that is collected, or, where possible, maybe even minimizing the information so it doesn't stay around longer than it has to, than it is a harder problem. So I think it is very important as we are talking about these two technologies, these new types of technologies, we distinguish between those that genuinely protect privacy and those that simply provide privacy warning labels. Now, there is another interesting problem here to think about, and I know the members of the committee don't want to overregulate, and they are concerned about leaving the open nature of the internet. And I think that view is widely shared. But there is a bit of an irony here, and that is that in the past privacy legislation has also given individuals safeguards from government. We have used privacy laws so that when government agents go to private companies they have to satisfy a Fourth Amendment- like standard before they can get access to your personal information that is held by your bank, or held by your doctor, or held by some other institution that may have aspects of your private life that you don't want freely disclosed to the government. Now, by failing to enact privacy legislation out of concern that you may be burdening industry, you are also failing to establish traditional Fourth Amendment safeguards that have been put in place for a whole lot of other businesses in this country to safeguard the rights of citizens against their government. My final point is I think it is important when looking at privacy tools to ask this question. Do they provide better protection than could otherwise be provided in law? And in my testimony I give the example which Mr. Markey referred to earlier of the privacy provision in the Cable Act of 1984. Small provision in there, it is like a page and a half. It is one of the most powerful privacy laws in this country, and it gives every person who uses cable television service a lot of privacy rights. I don't think there is a single product or service that was presented to you this morning that provides as much privacy protection as that provision that was enacted by Congress more than 15 minutes ago. And so while we encourage these technological developments, we think they are very important for the future privacy, we also think that legislation is vital. Everyone in America should have the right to protect their privacy online, whether or not they can afford these new techniques or whether or not they understand them. Thank you very much. [The prepared statement of Marc Rotenberg follows:] Prepared Statement of Marc Rotenberg, Electronic Privacy Information Center, Executive Director, Georgetown University Law Center I appreciate the opportunity to appear before the Subcommittee today to discuss privacy issues. My name is Marc Rotenberg. I am Executive Director of the Electronic Privacy Information Center in Washington, and I have taught the Law of Information Privacy at Georgetown since 1990. I'd like to thank the Subcommittee and you, Mr. Chairman, for your continued interest in these issues and for the series of hearings that you have held. The privacy community remains hopeful that when these hearings are concluded you will introduce legislation to safeguard privacy and encourage confidence in the emerging electronic marketplace. I'd also like to acknowledge the work of the various companies that are appearing today on privacy issues. While we may disagree with some of their approaches, we recognize the ongoing effort to find technological solutions to the challenge of privacy protection. The focus of this hearing is on ``Industry Best Practices and Technological Solutions.'' This is an issue that has been central to the work of my organization--the Electronic Privacy Information Center--since our first day and was also discussed in our book Technology and Privacy: The New Landscape (MIT Press 1997). While we favor legislation to protect privacy on the Internet, we clearly understand that technology plays a critical role in safeguarding privacy. In fact, we helped organize the online campaign to reform the United States encryption policy so that Internet users could exchange private communications and engage in secure online transactions. And we have worked to encourage the development of technical standards that allow Internet users to safeguard their data and protect their identity. One of the most popular features on our web site are the Practical Privacy Tools page which allows Internet users to surf anonymously, delete cookies, encrypt private messages, erase files, and filter ads. DEFINITION OF PRIVACY IS CRITICAL First, it is important at the beginning when discussing any technological approach to privacy protection to have a clear understanding of what privacy protection means. If you say, for example, that privacy protection is simply telling people how you will use their personal information and then you develop technologies that provide notices on web sites, symbols on cell phone displays, or technical standards for computers to exchange information about privacy preferences, you actually do very little to safeguard personal information. All of these approaches simply provide warnings to consumers about how their personal data will be disclosed to others. But if you understand that genuine privacy technologies actually promote trust and confidence in the online environment, then you will understand very quickly that notices do very little to protect privacy. For example, one of the most important privacy technologies operating on the Internet today is the Secure Socket Layer in Internet browsers that allows two computers connected by the Internet to exchange information securely. Because of SSL you can enter a credit card number in your computer and a merchant will receive the number and neither of you have to worry that the number will be intercepted as it travels across the Internet. It is a built-in security feature that protects the privacy of the customer's personal information. SSL operates for Internet transactions much like car safety features, such as air bags or seat belts. It provides a basic level of safety that promotes consumer confidence in the use of technology. The problem today is that too many of the ``privacy solutions'' are really just warning labels. They do not provide any actual technical safeguard for personal information. There should be good privacy technologies, such as SSL, built into the network and the services provided to consumers. EVALUATING PRIVACY TECHNOLOGIES AGAINST PRIVACY LEGISLATION One critical standard for evaluating the various technical approaches to privacy protection is to ask whether they provide at least as much privacy for the consumer as would privacy legislation. Consider, for example, the privacy provisions contained in the Cable Act of 1984. Under that law, every consumer in the United States who subscribes to a cable television service receives certain basic privacy rights. Cable providers must provide written notice to subscribers of their privacy rights at the time they first subscribe to the cable service and, thereafter, at least once a year. These notices must specify the kind of information that may be collected, how it will be used, to whom and how often it may be disclosed, how long it will be stored, how a subscriber may access this information and the liability imposed by the Act on providers. Subject to limited exceptions, the Act requires cable service providers to obtain the prior written or electronic consent of the cable subscriber before collecting or disclosing personally identifiable information. The Act grants cable subscribers the right to access the data collected about them and to correct any errors. It also provides for the destruction of personally identifiable information if that information is no longer necessary. There is a clear Fourth Amendment standard that limits the circumstances under which government may gain access to our private viewing records. Finally, the law sets out a private right of action including actual and punitive damages, attorney's fees and litigation costs for violations of any of its provisions. State and local cable privacy laws are not preempted by the Act. This is genuine privacy protection that legislation make possible. Short of techniques that provide actual anonymity, I don't believe there is a single proposal presented to you today that provides the same level of privacy protection for consumers as the Cable Act that was passed by the Congress more than 15 years ago. NEED FOR LEGISLATION REMAINS Over the past thirty years the United States Congress has done a good job developing legislation to safeguard personal privacy even as new technologies have emerged. We have laws to protect the privacy of telephone calls, video rental records, automated health records, and more. And just this past week, the Supreme Court made clear that simply because there is new technology for surveillance does not mean that we must sacrifice our right to privacy. The problem is clear. Data collection by commercial firms has become more intrusive as more commerce has moved online. The Internet advertising industry, for example, believes there is nothing wrong with creating an online profile of where you go on the Internet as long as they give you the chance to ``opt-out.'' You won't know who is profiling you. You won't be able to see what is collected about you. And you won't know how this information affects your ability to buy goods and services online. And it is going to get worse. The interview that appeared in US News and World Report this week with a former industry insider is particularly revealing. An expert in business practices and privacy audits Larry Ponemon told US News that customer profiles, containing detailed personal information typically have an 85% error rate. ``As an auditor,'' he said, ``you reach the conclusion that it's pretty awful out there.'' When asked what the bottom line is for consumers, he answered: Most companies don't take privacy seriously. The general view is: Collect as much data as you can, as quietly as possible. It's dirt-cheap to store, and you never know when it will come in handy. I still use the Internet, but I'm more cautious. I won't share any medical data or do financial planning online. I'll use my credit card only if I think the privacy policy is reasonable, but I assume the worst. LOOKING AHEAD It would be tempting to say that industry is developing good solutions, that more needs to be done, and that it is premature to legislate, but I believe this is a short-sighted assessment of what is currently taking place. In the absence of clear standards set out in statute, privacy is being redefined from a set a basic rights to a series of warning notices. The bottom line is that consumers are being asked to trade their privacy when they go online. The companies post privacy policies that are incomprehensible and easily changed. It doesn't have to be this way. Congress can pass good privacy legislation, similar to the provisions contained in the Cable Act of 1984, and still encourage the development of technological solutions. This is the right way to go. We will need both good technology and good legislation to safeguard privacy in the years ahead. I appreciate the opportunity to appear before the Committee today and will be pleased to answer your questions. REFERENCES Phil Agre and Marc Rotenberg, eds., Technology and Privacy: The New Landscape (MIT Press 1997) EPIC Practical Privacy Tools[http://www.epic.org/privacy/ tools.html] EPIC and Junkbusters, ``Pretty Poor Privacy: An Assessment of P3P and Internet Privacy'' [http://www.epic.org/Reports/ prettypoorprivacy.html] Privacy Coalition [http://www.privacypledge.org] Privacy Site [http://www.privacy.org] Marc Rotenberg, The Privacy Law Sourcebook 2000: United States Law, International Law, and Recent Developments (EPIC 2000). Marc Rotenberg, ``Can We Keep a Secret?'' American Lawyer 57 (January 2001). Paul M. Schwartz, ``Internet Privacy and the State: Charting a Privacy Research Agenda,'' 32 Connecticut Law Review 815 (Spring 2000) Mr. Stearns. I thank you for your opening statement. You probably listened with interest to the preceding panel, and particularly Microsoft when they talked about their P3P, in effect that it is a default information privacy standard. Now, I suspect that some of you would disagree and some of you would agree with that. Let me start with Mr. Hughes. What do you think of the P3P as a default information privacy standard? Do you agree or not? Mr. Hughes. Absolutely. The company that I work for, Engage, actually was one of the companies that was involved in the development of P3P. And the cookie management features that you heard about in the Microsoft browser are a result of some early work that Engage had done, our co-founder had done, on something called trust labels. So from the perspective of my company, we definitely have been very involved in the development of P3P and cookie management features. Mr. Stearns. But Mr. Rotenberg I think made a very good point in terms of talking about the Cable Act of 1984, and this one and a half page document which outlined the privacy provisions dealing with your cable. And I think he makes a pretty good case that that same standard has to be applied to the internet. Do you disagree? Mr. Hughes. I think there are difficulties on the internet. I think the internet, as a global medium, requires a standard that has comparable ubiquity. And that standard is technology. And by embedding the privacy protections in the technology, you provide the greatest coverage possible. So I believe that the browser is the right place to put those tools. Mr. Stearns. So you are saying that you think government has a role to do something like we did with the Cable Television Act of 1984 or not? Just yes or no. Mr. Hughes. The Network Advertising Initiative is definitely open to the possibility of Federal legislation. However, we would request or push for or suggest that a safe harbor for self-regulatory regimes that are operating and functional and meaningful, like the NAI self-regulatory regime, be put in place. Mr. Stearns. Mr. Cole, you know, he makes the analogy, you pick up your phone and you don't think about privacy, but you already have the privacy in place unless you go to the Fourth Amendment that the government can't get involved and listen to your phone calls--you know, tap into your phone. Do you agree that we need a privacy bill, an internet privacy bill here in Congress, much like we did for the Cable Act of 1984? Mr. Cole. I would like to respond to that in two ways, Mr. Chairman. Mr. Stearns. Sure. Mr. Cole. First of all, I am not sure it is as clear-cut as Marc would have it. I used to run Maryland's Consumer Protection Program for the Attorney General, and I remember that it depended often on State law whether or not you actually had all of the privacy you wanted on those phone calls. So it is a very--it is complicated, and it is not as clear. And I am sure the internet---- Mr. Stearns. Well, I am sure the details of it--but as a broad scope---- Mr. Cole. Well, it is not so clear that we have perfectly legislated privacy, even of those areas where we tried. And there may be a lesson about that. Either we need better legislation or maybe legislation doesn't always work. But let me get also to your question. Our organization, simply as a matter of policy, does not take position on legislation. Self-regulation could work without legislation. We could help promote voluntary standards for the business community in the absence of legislation, and we could help provide compliance when there is legislation. I would like to endorse the point made earlier--if there is legislation from the Congress, you should follow the lead that you took with the children's online privacy and in other legislation, and there really should be a safe harbor for voluntary efforts of compliance. Mr. Stearns. Mr. DeVault, can you give us a scope of the number of companies Ernst & Young provides privacy service for, and how much revenues does the privacy protections practice take in for your company? And what are the typical ballpark costs for such services? Is that possible, to get this in a broad way? Mr. DeVault. Well, we are, as I mentioned, a global firm. We have thousands of people that are focused on security, privacy, and IT risk advisory services. Mr. Stearns. Why don't we just take it in the United States. Mr. DeVault. In the United States, we have approximately 800 to 1,000 people that are, and that employs--obviously, it keeps those people busy. That gives you a degree of the fees that we have out of that business. Mr. Stearns. So of the revenues in the United States, is this--I think what we are--in the committee we are starting to realize that this is a whole new area of revenue generation, and that it could be a large segment in the future. When you move to broad band, people will come to you, and so this--what I think is an incipient industry which is going to create a great deal of profit for people like yourself and others. Mr. DeVault. Well, to give you an idea, the web trust principles that I mentioned earlier were released on September 6, 2000. So they are very young, so our independent third party verification services are very nascent as well. We have been helping companies with their privacy policies and compliance now for several years, since really the advent of the commercialized internet. And we see that this is a large business for software companies, for marketing companies, for professional services companies. Mr. Stearns. Do companies tend to overpromise and underdeliver in the privacy area? Mr. DeVault, how many companies have failed Ernst & Young initial verification tests, if any? How many have failed a followup verification test? Mr. DeVault. At this point in time, we have certified as a profession less than 10 companies. As I said, it is a very new area for us. I would say, though, that every time we test there are gaps between our criteria and the actions that we see, and the good news is that we have clients that are interested in filling those gaps, and we are helping them do that. I think on a go-forward basis we will see what the experience is in terms of testing as we go through. Our testing is required every 6 months. Mr. Stearns. Mr. Rotenberg, I think what you are sort of saying is trust but verify, and the government has to verify in some way by setting up a standard so that the public feels comfortable. After listening to the first panel, were you impressed, though, that Webwasher--the type of things they can do, and that maybe if that was part of an integral part of a web browser that the legislation would be maybe not required as much but it would help to alleviate the problem? Mr. Rotenberg. Well, I think there were a number of good approaches suggested on the first panel. And none of them I think would be incompatible with privacy legislation. In fact, I rather suspect that privacy legislation can provide a foundation that builds support for a number of these techniques. I mean, this has always been our view, that you should have legislation that enables strong tools for privacy. If you don't have the legislation, I think that is really ultimately the decision that this subcommittee will have to make. And if you say we are going to rely on these techniques and hope this works, I think you are going to head toward a world where people, in effect, will turn to their telephones, know that there is no real legal protection there, and have to figure out, in effect, what are the privacy settings right now? Are the settings appropriate for the call I am about to make? Do I need to purchase a little bit more privacy because this call is particularly sensitive? And you can imagine that that would evolve in the marketplace. But I think over the long term people would be less willing to use the telephone, because there will be no baseline protection established in law that safeguards privacy. So I really think that the best outcome is one that provides that baseline assurance to everybody that privacy will be protected and allows people to innovate and develop better techniques and take it forward. I think that is the win-win outcome here. Mr. Stearns. Yes. My time has expired. The ranking member, Mr. Towns, is recognized. Mr. Towns. Thank you very much, Mr. Chairman. Let me begin with you, Mr. Rotenberg. And let me say I was very impressed with your testimony. I want to say that before I ask this question. Mr. Rotenberg. Thank you, sir. Mr. Towns. You heard on the other panel, I think it was Mr. Schwarz who said that, yes, eventually we need to pass legislation, that laws should be in effect, but we do not know enough now to do it. What is your response to that? Mr. Rotenberg. Well, I would be happy to give him a couple of copies of my books, but I think he has left the room. I mean, I have been teaching privacy law for, you know, I said more than 10 years. I have got a 500-page book that surveys privacy law. I think that Congress has done a good job over the years. I mean, it was done for telephone. It was done for cable service. It was done for electronic mail. There are a lot of good principles in place, and I think we just need to take advantage of them. Mr. Stearns. Could we just have those two books brought up to Mr. Towns and just let him quickly have access to them? And then we will give them right back. Mr. Towns. So the theory in terms of waiting and learning more is ridiculous. Mr. Rotenberg. Well, I don't see the benefit of waiting. I see the caution about not passing legislation that creates problems that might discourage innovation. But I do believe that legislation can promote innovation, and that is the approach I hope to end up with. Mr. Towns. Yes. I was around in terms of the cable bill and also the Telecommunications Act of 1996. And, of course, we heard--some of the same arguments that are being put forth now were put forth at that time, that we should not move forward with the Telecommunications Act because things are just moving too quickly, we need to wait and see. But I don't think they are going to slow down. I think they are going to continue to move. And I agree with you. I think at some point in time that we have to come forward with some legislation in order to make certain that the consumer is protected. The question is in terms of, you know, how quick we do it. I think that is something that we are dealing with. But, here again, we are having a lot of hearings, and I think we are collecting information. And then I hope that when we do do it that we do not hurt a lot of folks. I think that we want to help people, and that is the key. The other issue is that, you know, what do we do with the little folks out there that are providing information, that is basically all they are doing. And this is, you know, their business, and if we pass laws that a lot of them could be put out of business. I mean, have you thought about that at all? Mr. Rotenberg. Well, I think we need some standards in place about how personal information is being collected and used. I mean, I am concerned about these information brokers, for example, that are getting access to a lot of very private details. You know, and that stuff is being repackaged and sold. There is a debate, as you probably know, taking place right now about whether or not all court records should be put online. Now, public trials in open courtrooms is critical to the democratic system. But if you put in all of the information in depositions, including, you know, psychologists who testify in child custody cases, I mean, this has enormous implications for personal privacy. So I think we need to have, you know, a rule that will apply to everybody--I mean, the big folks and the little folks. Mr. Towns. Okay. Mr. DeVault, you talked about in terms of the verification, and what are some of the things you think we should do in order to verify whether or not a person is actually--the consumer is protected? Mr. DeVault. One of the things we do is we go much further than, as I said, the veneer of the website. We really look past just asking questions. And if a client is saying that they are protecting data, we actually look at the data base, the machine that the data resides on within that data base. We determine whether it is approachable from the outside, so we actually get into the process, we put together a robust set of tests that we can then opine on and say that we believe that that data has been protected in accordance with their policies. And that is a level of testing that is much different than I think people recognize has been occurring. Mr. Towns. Yes. In your audit, they failed to come up to standards. At what point in time would you say, okay, we are not dealing with you anymore? I mean, how do you do that? I mean, what do you do with this? I mean, I am not clear. It is not clear to me what happens here. Mr. DeVault. Well, if a company has engaged us to provide them with a certification or an audit, and they are granted that opinion, they can post a seal on their site which clicks to our report, and a report from management that says we assert that we are holding these promises to be true, and a report from Ernest & Young which says that we have tested those assertions. If they fail to continue to maintain that posture, we will take our report away. And so there is a consequence at this point in time because it is voluntary. There isn't a signal necessarily to any kind of a regulator or the government or somebody else, other than the fact that if they had, in the past, disclosed that they had passed the test, and afterwards decided to not pass or fail, then our reports would come off their website. Mr. Towns. Thank you. I yield back. I don't have anything to yield back, do I, Mr. Chairman? I am out of time. Mr. Stearns. All right. Thank you, Mr. Towns. The gentleman from Illinois, Mr. Shimkus? Mr. Shimkus. Thank you, Mr. Chairman. Mr. Rotenberg, you mentioned the Cable Act. I wasn't a Member of Congress during that time. Can you tell me what the cable industry was doing at that time to warrant this page and a half on privacy that obviously you are very supportive of? Mr. Rotenberg. Well, it is very interesting, sir. I have actually studied the period. In the early 1980's when cable television was being developed, people talked about it in a very similar way that they talk about the internet today. You are going to do online banking, you are going to be like watching a football game and answer a poll question about what the next, you know, play should be called. People had a sense when cable television was being developed in the early 1980's that it had interactive capability. And there was consensus--and this is the key answer--there was consensus then with the industry and with Congress that because of this interactive capability, because of the ability now with the television to collect information from the viewer, which didn't previously exist because it is a broadcast medium, that privacy safeguards should be established. And privacy safeguards, as I said, were very good, and I don't believe that the cable industry in 1984 opposed them. So when I come before you, sir, and testify and say basically that I think people today for the internet should have similar protections, it is partly because of this experience 20 years ago that when faced with a very similar issue I think Congress did the right thing, and I think it has worked out. Now, people can say, well, you know, cable television isn't doing all of those things that the internet might, but the privacy is there. Mr. Shimkus. I appreciate that historical look. But at the time of the Act, the cable industry was not doing that. That was just a forward-looking---- Mr. Rotenberg. Yes. Mr. Shimkus. [continuing] response based upon what they saw, the evolution. And as we see now, cable now is moving in that shape or form somehow with interactivity, which is very similar to high-speed internet service or the broad band debate, and the like. Obviously, last year we also talked about, debated, and passed the electronic signatures and electronic records issue. Because of that, we are transmitting actual legal documents, signed, you know, through the vast unknown. We should still be doing that, shouldn't we? Mr. Rotenberg. I am sorry. Transmitting authenticated documents? Mr. Shimkus. Yes. Mr. Rotenberg. I think so. I mean, I think the Digital Signature Act provides some benefits for online commerce. That is clear. But I don't think it resolves the privacy issue. I mean, I think the privacy issue is still out there. Now, I will say it was addressed in part by the past Congress in the Children's Online Privacy Protection Act. And there you looked at the situation involving kids under the age of 13 and said, well, it would be nice for kids to be able to go online and use some of these new services, but there are justifiable concerns about the collection of their data. And so you had legislation there to protect, you know, the privacy, so I think that went part way. Mr. Shimkus. I would like to turn to Mr. Cole and ask, in reference to the compliance monitoring that you are attempting to accomplish, first, the question is, how is that--first of all, how is that going in that? And then I am going to really then switch to Mr. DeVault to--in his testimony he talked about the questions of compliance monitoring. Mr. Cole. Yes, sir. We were talking earlier about trust and verify. The Chairman mentioned that. And I want to make an important distinction. Setting standards, whether it is a voluntary organization doing it or the Congress doing it, it is very different from verification, and we all need to take that into account because finding out whether or not there really is compliance with the standards requires a whole other set of techniques than just writing the standards. What we do is--I referred to it in my brief remarks is we use a unique assessment device that over a period of weeks brings the company through a series of questions that are geared to determine whether it has set up the internal processes it needs to comply with the promises it makes in its privacy promise, whether it is training of staff in security techniques within the company, and contracts with agents and contractors with whom they may have to share information. So we work with the company on the details of how it is implementing its privacy policy. Over the 2 years we have been running our program a few hundred companies have failed to meet our requirements after applying. They either decided they did not choose to meet them, or we found that they were unable to meet them. We have not had a need to withdraw a seal from a company that we granted one to, and that is not surprising, because they have gone through an intense process. They verified their procedures, and they are willing to make corrections when we call it to their attention. Mr. Shimkus. Mr. Chairman, can Mr. DeVault respond? Mr. Stearns. Sure. Go ahead. We will probably go another round here, so---- Mr. Shimkus. Based upon the auditing aspect, you are probably auditing some that have the seal and some who do not. What is your--can you just give some input on that? Mr. DeVault. I would just say that I think there is a bit of expectation gap between what some of the seals may mean to a consumer and what they are intended to do and what they describe in the practices--what they are doing. And that has been seen in some of the issues that have come up onsites that have had seals on them. We do see that there is some gap between the promises that are being made and the actual actions within the people, the processes, and the technologies, the real behind-the-scenes processes. But I think that companies that are subscribing to these seal programs really want to have good privacy policies. Many of them are engaging us to come in and help them, make sure that they can qualify for those seals, and then I think that they are determining whether they want to go further and make a public declaration of their compliance with that. And that is what we are seeing in this next stage. It is really an evolution from just making a policy that has been read on a website to one that has been read and conforms to some kind of a standard, and there is some inquiry as to whether or not they are really doing what they say they are doing, to the final step, which is some proof that says I have engaged somebody independently to come in and really robustly, in essence, rip my processes apart and determine whether or not they are actually working. And there are companies that are using that, not necessarily just for a marketing purpose, but they are doing it as a good internal practice, not publicly mentioned, as a risk management approach to determine that the promises they are making are promises that are kept. Mr. Shimkus. Thank you. And I yield back, Mr. Chairman. Thank you. Mr. Stearns. Yes. I am just going to close here, and anyone else can close with a question or two. Dealing with what is called legacy data--and, Mr. Cerasale, this might be approach for you. AT&T came in, and I was talking with them about my cell phone. And I said to them, ``When I delete a--when my answering machine comes in on my cell phone and someone calls me and then I delete it, where does it go?'' And they said, ``To a hard disk.'' And I said, ``Well, how long do you keep that?'' they said, ``The law has not determined how long.'' And I said, ``Are you going to keep it a year?'' They said, ``Well, right now, we are not keeping it very long. We almost arbitrarily--in 30 days we get rid of it. But there is a possibility we might have to keep it a longer period of time.'' So that goes to the point that if we today passed a bill, what happens to all of the information that has been collected? And how do we write a bill to allow today a U.S. citizen who has all of their credit cards and all of this legacy data protected? How do you do that? And is there much of that that you think that would be a problem? Mr. Cerasale. Well, keeping data is expensive, and, of course, that is going to go--that will drop in time. But part of the marketing process is that customers can go pretty freely back to marketers they have dealt with before, and they have information already on file, and so forth, that they use and it can go quickly. For example, purchasing online through Travelocity, I don't have to enter a lot of data because it is already held in there, including my credit card number. I think that the thing that we have to focus on in this part of privacy, which I think in the first panel we discussed security versus privacy, I think the phone legislation is basically the security of talking. But if I call a catalog and give them my name and, therefore, address and credit card number, so that they have it, and then it goes to their privacy policy, it is totally outside of that phone law, the law concerning telephones. You have to--it is a problem that we do through self-regulation on anything that you have already before. And if you go, therefore, and change a privacy policy or have something different, what do you do with the information beforehand? Is it expensive to mark that data so that you treat it differently than others? Part of the situation that we look at is markers would hold, in a sense, legacy data--is a customer, to try and see if they can deal with that customer and how long it is to hold an expense. Mr. Stearns. How long do you hold information? Mr. Cerasale. Well, DMA is not a marketer. It is an association. So each---- Mr. Stearns. Well, I mean, your account, your clients. Mr. Cerasale. The client---- Mr. Stearns. Just on the average. Mr. Cerasale. Members will hold information--I don't think there is any member that would hold customer information beyond 5 years, and that is probably less--it is probably less than that because you have to try--20 percent of Americans move every year. A phone number is good for only maybe 7 years, so that information gets stale and it is useless after a certain amount of time. Mr. Stearns. Mr. Rotenberg, you know, if I want to look at my credit report I can do that. Do you think there should be a way for a consumer to take an active hand in tracking his or her personal data in the marketer's data base, be able to access and go in and to, you know---- Mr. Rotenberg. I think so. I think in particular where personal profiles are credited. I mean, the issue of access obviously is a question about how far do you go. Congress said 30 years ago if there are companies out there that are creating these reports that are being used for credit determinations, people should have the right to see those reports to make sure they are accurate. Now, if it is, you know, a single purchase, I think people would say, well, maybe it is not so important. But what is happening on the internet, and particularly with online advertising, is companies are creating these profiles using cookies very much like credit reports. But they don't have the same obligation to tell you what is in that file about you, and you don't know how that information is being used. So I think the right of access to the profile would do a lot to allow the individual to figure out how that data is being used. It would keep the companies more honest. They could still collect it. The Fair Credit Reporting Act doesn't say you can't collect the information, but it does make the company accountable to the person. Mr. Stearns. Where would I go today to find out if somebody was doing a composite of my personal information? Mr. Rotenberg. I don't know the answer to that, sir. Mr. Stearns. Does anyone know? Where would you go if--you know, if I wanted to find who had a composite of my information? Mr. Cerasale. A great deal of information--marketing information is held by the credit bureaus on the marketing side, and all of them--all three major credit reporting companies have--you go to them and see what they have in their marketing side on them. And they all have that ability today. Mr. Stearns. I want to thank the second panel for your participation, and we know how busy you are, and also for waiting through the first panel. And this is the--we have one more internet privacy hearing, I think in July, but your participation has been very helpful, and we look forward to perhaps in the future calling you back--or calling you just with any additional questions. Thank you very much. The subcommittee is adjourned. [Whereupon, at 1:14 p.m., the subcommittee was adjourned.]