Risk
6/20/2013
02:41 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Google Given Three Months To Meet Privacy Law

French data protection agency threatens fines if privacy fixes aren't implemented soon.

France's national data protection agency, CNIL, has given Google three months to alter its privacy policy so that it conforms with French law. If the company fails to do so, CNIL warns that it may impose sanctions.

CNIL objects to Google's privacy policy because, it claims, Google users are not adequately informed how their data will be used and are not given enough control over their data. It also wants to ensure that data isn't held longer than necessary, that data is only combined in a lawful way, and that users provide informed consent when data is collected for analytics.

The agency says its goal is to encourage Google to conform with the law without limiting its ability to innovate.

Google didn't immediately respond to a request for comment.

[ What do you know about NSA's digital dragnet? Read What Prism Knows: 8 Metadata Facts. ]

The agency also says that data protection authorities in Germany, Spain, France, Italy, the Netherlands and the U.K. plan to initiate legal proceedings against Google for privacy law violations in the respective countries.

These European data protection agencies have objected to Google's decision last year to harmonize its privacy policies across some 60 services.

When Google announced its plan to consolidate its privacy policies last year, the Article 29 Working Party, a European Union privacy body that includes CNIL representatives, asked Google to delay implementing the change to ensure there were no misunderstandings about Google's commitment to user privacy. Google refused, noting that it had briefed data protection authorities and provided both conspicuous notice to users of its services and adequate advanced warning of the change.

It also defended the change by pointing out that regulators have been asking for shorter, more comprehensible privacy policies.

Privacy has been something of a quagmire for Google in Europe, ever since the company revealed that its Street View cars, since 2007, had been collecting unprotected Wi-Fi data as they drove around.

Though such wholesale data gathering seems quaint following revelations about the extent of NSA data gathering and of private sector cooperation, it nonetheless continues to dog Google abroad if not in the U.S.

For example, the Article 29 Working Party, along with the privacy commissioners of Canada and Australia, wrote a letter to Google earlier this week seeking details about how Google Glass works, despite the fact that Google's Android-based eyewear is presently only available in the U.S. and has only been distributed to a few thousand people. In terms of privacy, Google's reputation precedes its products, at least among regulators.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
xBaja
50%
50%
xBaja,
User Rank: Apprentice
6/20/2013 | 9:37:24 PM
re: Google Given Three Months To Meet Privacy Law
The small fines will not dent their profits from tracking people, habits and preferences, so they can keep delivering ad content to them. They are also a valuable resource for the government, when they want that information.
Printers: The Weak Link in Enterprise Security
Kelly Sheridan, Associate Editor, Dark Reading,  10/16/2017
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLink,  10/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.