Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Microsoft/Windows
Real-time info services with Neustar
Average Rating:
Rate this article:  
Google, Security Researcher Outline Data Privacy Protections
Google, Security Researcher Outline Data Privacy Protections

By Jennifer LeClaire
January 28, 2013 1:36PM

    Bookmark and Share
David Drummond, Google's chief legal officer, said Google requires that government agencies conducting criminal investigations use a search warrant to compel the company to provide a user's search query information and private content stored in a Google account, such as Gmail messages, documents, photos and YouTube videos.
 



It's Data Privacy Day, a day when the world seeks to draw attention to how important it is to preserve online privacy and security. Google took the opportunity to share how it deals with government requests for user data.

David Drummond, senior vice president and chief legal officer at Google, noted that it's important for law enforcement agencies to pursue illegal activity and keep the public safe. Although Google complies with law enforcement, Drummond also keeps in mind laws that protect consumers against overly broad requests for personal information.

The keyword is balance. How does Google strike it?

"First, for several years we have advocated for updating laws like the U.S. Electronic Communications Privacy Act, so the same protections that apply to your personal documents that you keep in your home also apply to your e-mail and online documents," Drummond said. Second, we'll continue our longstanding strict process for handling these kinds of requests."

What Google Does for You

When government agencies ask for a user's personal information, Google does several things, including scrutinizing the request to make sure it satisfies the law and Google policies, evaluating the scope of the request, and notifying the user about legal demands when appropriate so the user can contact the entity requesting it or consult a lawyer.

Drummond said Google requires that government agencies conducting criminal investigations use a search warrant to compel the company to provide a user's search query information and private content stored in a Google account, such as Gmail messages, documents, photos and YouTube videos. Google believes such a warrant is required by the Fourth Amendment, which prohibits unreasonable search and seizure and overrides provisions in the electronic privacy act if they conflict.

"We've added a new section to our Transparency Report that answers many questions you might have," Drummond said. "And last week we released data showing that government requests continue to rise, along with additional details on the U.S. legal processes -- such as subpoenas, court orders and warrants -- that governments use to compel us to provide this information."

What You Can Do for Yourself

Lee Reiber, director of Mobile Forensics at Access Data, told us one of the biggest threats to data privacy comes through mobile devices. Reiber said the types of data accessible just by opening a phone and looking on a screen include contacts, e-mail and text messages, pictures and memos.

But cyber criminals can go deeper with widely available forensic technology and access any application data, including banking, social, Web and productivity apps. They can also access passwords, deleted call logs and e-mails and other data, Reiber said.

"Smartphones and tablets hold a treasure trove of information. Data recovered can include lists of LinkedIn contacts, your tweets, your SMS and your contacts. If you are reselling your old device on a site like Craigslist or eBay, you shouldn't include your SIM card since data is stored there as well as on the device," Reiber said.

"Because everything is location-based right now, I have analyzed phones where I could plug a latitude and longitude recovered from an application the user had installed on the phone into a browser and pull up a street view of someone's house."
 

Tell Us What You Think
Comment:

Name:





 Microsoft/Windows
1.   Win Phone 8.1 Update Already on Way
2.   Yammer Moved to Office 365
3.   Can One Size Windows OS Fit All?
4.   Microsoft CEO Sees 'Bold' Plan Ahead
5.   Future of Laid-Off MS Employees


advertisement
Microsoft CEO Sees 'Bold' Plan Ahead
With unified Windows for all platforms.
Average Rating:
Design Central to Microsoft Future
New ethos a break from functional past.
Average Rating:
Bing Lets Europeans Be 'Forgotten'
Following in Google's footsteps.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 
Dropbox for Business Beefs Up Security
Dropbox is upping its game for business users. The cloud-based storage and sharing company has rolled out new security, search and other features to boost its appeal for businesses.
 

Enterprise Hardware Spotlight
Watson Gets His First Customer Service Gig
Since appearing on Jeopardy, IBM's Watson supercomputer has been making a living using his super-intelligent knowledge base for business verticals. Now, Watson's been hired for his first customer service job.
 
Tablet Giants Apple and Samsung Feel the Heat
When a company saturates its home market with a once-hot product, expect it to pump up efforts elsewhere. Apple, for its part, is now pushing iPads to big corporations and the enterprise market.
 
Microsoft Makes Design Central to Its Future
Over the last four years, Microsoft has doubled the number of designers it employs, putting a priority on fashioning devices that work around people's lives -- and that are attractive and cool.
 

Mobile Technology Spotlight
T-Mobile Calls 'BS' on AT&T's New Promotion
While Verizon Wireless is moving to throttle bandwidth hogs, a scrappy T-Mobile is taking on the giants with a limited-time promotion it hopes will drive up the churn rates of its wireless rivals.
 
Microsoft Update to Windows Phone 8.1 Already Coming
An update to Windows Phone 8.1 is on the way just weeks after the release of the product itself. Microsoft has begun detailing some of the update features to phone manufacturers.
 
Stanford Researchers Report Battery Breakthrough
Stanford researchers have found a way to use lithium in a battery's anode, a breakthrough that could triple capacity and has been described as the "holy grail of battery science."
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.