Risk
6/20/2013
02:41 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Google Given Three Months To Meet Privacy Law

French data protection agency threatens fines if privacy fixes aren't implemented soon.

France's national data protection agency, CNIL, has given Google three months to alter its privacy policy so that it conforms with French law. If the company fails to do so, CNIL warns that it may impose sanctions.

CNIL objects to Google's privacy policy because, it claims, Google users are not adequately informed how their data will be used and are not given enough control over their data. It also wants to ensure that data isn't held longer than necessary, that data is only combined in a lawful way, and that users provide informed consent when data is collected for analytics.

The agency says its goal is to encourage Google to conform with the law without limiting its ability to innovate.

Google didn't immediately respond to a request for comment.

[ What do you know about NSA's digital dragnet? Read What Prism Knows: 8 Metadata Facts. ]

The agency also says that data protection authorities in Germany, Spain, France, Italy, the Netherlands and the U.K. plan to initiate legal proceedings against Google for privacy law violations in the respective countries.

These European data protection agencies have objected to Google's decision last year to harmonize its privacy policies across some 60 services.

When Google announced its plan to consolidate its privacy policies last year, the Article 29 Working Party, a European Union privacy body that includes CNIL representatives, asked Google to delay implementing the change to ensure there were no misunderstandings about Google's commitment to user privacy. Google refused, noting that it had briefed data protection authorities and provided both conspicuous notice to users of its services and adequate advanced warning of the change.

It also defended the change by pointing out that regulators have been asking for shorter, more comprehensible privacy policies.

Privacy has been something of a quagmire for Google in Europe, ever since the company revealed that its Street View cars, since 2007, had been collecting unprotected Wi-Fi data as they drove around.

Though such wholesale data gathering seems quaint following revelations about the extent of NSA data gathering and of private sector cooperation, it nonetheless continues to dog Google abroad if not in the U.S.

For example, the Article 29 Working Party, along with the privacy commissioners of Canada and Australia, wrote a letter to Google earlier this week seeking details about how Google Glass works, despite the fact that Google's Android-based eyewear is presently only available in the U.S. and has only been distributed to a few thousand people. In terms of privacy, Google's reputation precedes its products, at least among regulators.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
xBaja
50%
50%
xBaja,
User Rank: Apprentice
6/20/2013 | 9:37:24 PM
re: Google Given Three Months To Meet Privacy Law
The small fines will not dent their profits from tracking people, habits and preferences, so they can keep delivering ad content to them. They are also a valuable resource for the government, when they want that information.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0485
Published: 2014-09-02
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.

CVE-2014-3861
Published: 2014-09-02
Cross-site scripting (XSS) vulnerability in CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted reference element within a nonXMLBody element.

CVE-2014-3862
Published: 2014-09-02
CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to discover potentially sensitive URLs via a crafted reference element that triggers creation of an IMG element with an arbitrary URL in its SRC attribute, leading to information disclosure in a Referer log.

CVE-2014-5076
Published: 2014-09-02
The La Banque Postale application before 3.2.6 for Android does not prevent the launching of an activity by a component of another application, which allows attackers to obtain sensitive cached banking information via crafted intents, as demonstrated by the drozer framework.

CVE-2014-5136
Published: 2014-09-02
Cross-site scripting (XSS) vulnerability in Innovative Interfaces Sierra Library Services Platform 1.2_3 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.