Risk
2/1/2011
02:11 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Apple Sued Over iPhone Data Privacy

The disclosure of Unique Device Identifiers associated with Apple's mobile devices represents a privacy law violation, the complaint claims.

Apple last week was sued in San Jose, Calif., for alleged privacy and state business law violations arising from its disclosure of iPhone device identifiers and personal information.

Plaintiff Anthony Chiu, a resident of Alameda, Calif., claims that Apple knowingly transmits data to third parties that can be used to identify users of Apple's mobile devices, without user consent and in violation of various laws. The legal filing also targets 50 unnamed "John Doe" defendants, raising the possibility that third-party developers of apps that use the data in question could wind up in court.

The case hinges on Apple's use Unique Device Identifiers (UDIDs), serial numbers associated with every mobile device. The complaint states that Apple allows UDIDs to be displayed to application developers and allows downloaded apps to access the user's browsing history whenever the user clicks on an ad or application using his or her mobile device.

"Consequently, anyone who has used a mobile device to browse the Internet to obtain advice about hemorrhoids, sexually transmitted disease, abortion, drug rehabilitation, or care for the elderly; to search for jobs, seek out new romantic partners, engage in political activity; in fact, to do more or less anything; can be reasonably sure that the browsing history created by such investigation has been incorporated into a detailed dossier for sale to marketers," the complaint says.

The complaint goes on to cite a Wall Street Journal investigation that found 56 out of 101 iOS and Android apps tested transmitted UDID numbers without authorization or consent. It also cites an academic paper published last year that found 68% of apps tested transmitted UDIDs.

The UDID is effectively a "super-cookie," the complaint alleges, and Apple fails to inform users about it in its privacy policy. In fact, the complaint states, Apple specifically disavows the sharing of personal information with third-parties for marketing purposes. As such the company's privacy policy would be more accurately described as a disclosure policy, the complaint suggests.

The key issue here is whether UDID numbers are actually deemed to be personal information. It's not entirely clear that they are. Eric Goldman, associate professor of law at Santa Clara University School of Law, said in an e-mail that there has been a flood of lawsuits in recent months over the disclosure of unique identifiers. He pointed to Facebook, which is being sued over its disclosure of Facebook's user ID numbers in its URLs. (In response to privacy concerns, Facebook has proposed encrypting user ID numbers.)

Goldman says that before the merits of the case can be evaluated, a number of questions have to be answered. "Does disclosing a unique ID actually disclose anything 'private' or otherwise legally protected?" he asked in an e-mail. "Did the users expressly or impliedly consent to the disclosures? Perhaps most importantly, did the users suffer any legally cognizable harm? Courts have been suspicious of privacy lawsuits where the consumer's only 'harm' is that the company made a contrary promise."

According to Andre Rado, a partner at Milberg LLP, the firm representing the plaintiff, UDID numbers do represent protected personal information.

"Privacy is 'protected' under the California constitution," Rado wrote in an e-mailed statement. "Transmission of the UDID would allow the recipient to identify exactly what a user is browsing and, together with other information, where they are at any given time. In addition, there are are disclosure-based and contract-based claims in the action."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.