Risk
2/1/2011
02:11 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Apple Sued Over iPhone Data Privacy

The disclosure of Unique Device Identifiers associated with Apple's mobile devices represents a privacy law violation, the complaint claims.

Apple last week was sued in San Jose, Calif., for alleged privacy and state business law violations arising from its disclosure of iPhone device identifiers and personal information.

Plaintiff Anthony Chiu, a resident of Alameda, Calif., claims that Apple knowingly transmits data to third parties that can be used to identify users of Apple's mobile devices, without user consent and in violation of various laws. The legal filing also targets 50 unnamed "John Doe" defendants, raising the possibility that third-party developers of apps that use the data in question could wind up in court.

The case hinges on Apple's use Unique Device Identifiers (UDIDs), serial numbers associated with every mobile device. The complaint states that Apple allows UDIDs to be displayed to application developers and allows downloaded apps to access the user's browsing history whenever the user clicks on an ad or application using his or her mobile device.

"Consequently, anyone who has used a mobile device to browse the Internet to obtain advice about hemorrhoids, sexually transmitted disease, abortion, drug rehabilitation, or care for the elderly; to search for jobs, seek out new romantic partners, engage in political activity; in fact, to do more or less anything; can be reasonably sure that the browsing history created by such investigation has been incorporated into a detailed dossier for sale to marketers," the complaint says.

The complaint goes on to cite a Wall Street Journal investigation that found 56 out of 101 iOS and Android apps tested transmitted UDID numbers without authorization or consent. It also cites an academic paper published last year that found 68% of apps tested transmitted UDIDs.

The UDID is effectively a "super-cookie," the complaint alleges, and Apple fails to inform users about it in its privacy policy. In fact, the complaint states, Apple specifically disavows the sharing of personal information with third-parties for marketing purposes. As such the company's privacy policy would be more accurately described as a disclosure policy, the complaint suggests.

The key issue here is whether UDID numbers are actually deemed to be personal information. It's not entirely clear that they are. Eric Goldman, associate professor of law at Santa Clara University School of Law, said in an e-mail that there has been a flood of lawsuits in recent months over the disclosure of unique identifiers. He pointed to Facebook, which is being sued over its disclosure of Facebook's user ID numbers in its URLs. (In response to privacy concerns, Facebook has proposed encrypting user ID numbers.)

Goldman says that before the merits of the case can be evaluated, a number of questions have to be answered. "Does disclosing a unique ID actually disclose anything 'private' or otherwise legally protected?" he asked in an e-mail. "Did the users expressly or impliedly consent to the disclosures? Perhaps most importantly, did the users suffer any legally cognizable harm? Courts have been suspicious of privacy lawsuits where the consumer's only 'harm' is that the company made a contrary promise."

According to Andre Rado, a partner at Milberg LLP, the firm representing the plaintiff, UDID numbers do represent protected personal information.

"Privacy is 'protected' under the California constitution," Rado wrote in an e-mailed statement. "Transmission of the UDID would allow the recipient to identify exactly what a user is browsing and, together with other information, where they are at any given time. In addition, there are are disclosure-based and contract-based claims in the action."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Secure Wifi Hijacked by KRACK Vulns in WPA2
Jai Vijayan, Freelance writer,  10/16/2017
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLink,  10/17/2017
Game Change: Meet the Mach37 Fall Startups
Ericka Chickowski, Contributing Writer, Dark Reading,  10/18/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.