Risk
2/1/2011
02:11 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Apple Sued Over iPhone Data Privacy

The disclosure of Unique Device Identifiers associated with Apple's mobile devices represents a privacy law violation, the complaint claims.

Apple last week was sued in San Jose, Calif., for alleged privacy and state business law violations arising from its disclosure of iPhone device identifiers and personal information.

Plaintiff Anthony Chiu, a resident of Alameda, Calif., claims that Apple knowingly transmits data to third parties that can be used to identify users of Apple's mobile devices, without user consent and in violation of various laws. The legal filing also targets 50 unnamed "John Doe" defendants, raising the possibility that third-party developers of apps that use the data in question could wind up in court.

The case hinges on Apple's use Unique Device Identifiers (UDIDs), serial numbers associated with every mobile device. The complaint states that Apple allows UDIDs to be displayed to application developers and allows downloaded apps to access the user's browsing history whenever the user clicks on an ad or application using his or her mobile device.

"Consequently, anyone who has used a mobile device to browse the Internet to obtain advice about hemorrhoids, sexually transmitted disease, abortion, drug rehabilitation, or care for the elderly; to search for jobs, seek out new romantic partners, engage in political activity; in fact, to do more or less anything; can be reasonably sure that the browsing history created by such investigation has been incorporated into a detailed dossier for sale to marketers," the complaint says.

The complaint goes on to cite a Wall Street Journal investigation that found 56 out of 101 iOS and Android apps tested transmitted UDID numbers without authorization or consent. It also cites an academic paper published last year that found 68% of apps tested transmitted UDIDs.

The UDID is effectively a "super-cookie," the complaint alleges, and Apple fails to inform users about it in its privacy policy. In fact, the complaint states, Apple specifically disavows the sharing of personal information with third-parties for marketing purposes. As such the company's privacy policy would be more accurately described as a disclosure policy, the complaint suggests.

The key issue here is whether UDID numbers are actually deemed to be personal information. It's not entirely clear that they are. Eric Goldman, associate professor of law at Santa Clara University School of Law, said in an e-mail that there has been a flood of lawsuits in recent months over the disclosure of unique identifiers. He pointed to Facebook, which is being sued over its disclosure of Facebook's user ID numbers in its URLs. (In response to privacy concerns, Facebook has proposed encrypting user ID numbers.)

Goldman says that before the merits of the case can be evaluated, a number of questions have to be answered. "Does disclosing a unique ID actually disclose anything 'private' or otherwise legally protected?" he asked in an e-mail. "Did the users expressly or impliedly consent to the disclosures? Perhaps most importantly, did the users suffer any legally cognizable harm? Courts have been suspicious of privacy lawsuits where the consumer's only 'harm' is that the company made a contrary promise."

According to Andre Rado, a partner at Milberg LLP, the firm representing the plaintiff, UDID numbers do represent protected personal information.

"Privacy is 'protected' under the California constitution," Rado wrote in an e-mailed statement. "Transmission of the UDID would allow the recipient to identify exactly what a user is browsing and, together with other information, where they are at any given time. In addition, there are are disclosure-based and contract-based claims in the action."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Things Every Business Executive Should Know About Cybersecurity
Don't get lost in security's technical minutiae - a clearer picture of what's at stake can help align business imperatives with technology execution.
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.