Risk
2/18/2014
02:16 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Future of Privacy Forum Partners with The Wireless Registry to Create Central Location Analytics Opt-out Service

Consumers Get New Mobile Privacy Option

WASHINGTON, D.C. - Tuesday, February 18, 2014 – The Future of Privacy Forum (FPF), a Washington, DC-based think tank seeking to advance responsible data use and consumer privacy, and The Wireless Registry Inc., the first global registry of wireless names and identifiers, today announced the launch of a new platform that will allow consumers to easily and quickly opt-out of mobile location analytics at thousands of locations in the U.S.

Increasingly, facilities such as airports, stores and hotels use Mobile Location Analytics technology to understand the traffic patterns of people in their venues. By learning and using insights, such as how long customers stand in line and how they generally move around an area, these facilities can enhance operational efficiency and improve user experience.

Mobile location analytics companies that have agreed to FPF’s new Mobile Location Analytics Code of Conduct will honor the requests of consumers who wish to opt-out of having their location collected. Consumers opt-out by entering their phones’ Wi-Fi or Bluetooth MAC address at www.smartstoreprivacy.org.

Once a consumer has opted out, participating companies will no longer associate information about that consumer’s presence at a location with a MAC address. These companies will only use that MAC address to maintain the device’s opt-out status. The opt-out site will be live as of today, February 18th, and companies will begin processing opt-outs within 30 days.

The platform was built for the Future of Privacy Forum by The Wireless Registry, and will be operated under the direction of the FPF.

“Retailers, airports, and other venues increasingly use technologies that analyze customer location to help learn about wait times in check-out lines and to improve the customer experience. But with the use of data comes the obligation of committing to responsible privacy practices”, said Jules Polonetsky, Executive Director, Future of Privacy Forum. “With the Wireless Registry, we are pleased to join with the leading mobile analytics companies to offer consumers a choice about the use of these services.”

FPF worked with the companies and U.S. Senator Charles Schumer (NY) to develop a Code of Conduct, announced in October 2013, ensuring that appropriate privacy controls are available as companies seek to improve the consumer shopping experience.

Participating mobile location analytics companies in the Code of Conduct and opt-out website include: Aislelabs, Brickstream, Euclid, iInside, Measurence, Mexia Interactive, Path Intelligence, Radius Networks, ReadMe Systems, SOLOMO, and Turnstyle Solutions.

“This platform will give consumers the ability to seamlessly inform companies they do not want the identity of their devices used for analytics purposes,” said Patrick Parodi, CEO and co-founder, The Wireless Registry. “The Future of Privacy Forum and The Wireless Registry share the mission of providing individuals with the ability to take control while giving mobile analytics companies the ability to act responsibly in honoring an individual’s privacy choices.”

About the Future of Privacy Forum The Future of Privacy Forum (FPF) is a Washington, DC-based think tank that seeks to advance responsible data practices. The forum is led by internet privacy experts Jules Polonetsky and Christopher Wolf and includes an advisory board comprised of leading figures from industry, academia, law and advocacy groups. Visit www.futureofprivacy.org.

About The Wireless Registry The Wireless Registry Inc. is the first global registry for wireless names and identifiers, which enables thousands of new proximal services and gives businesses and individuals the power to engage with their surroundings in ways never before possible. Basing our system on an innovative global IP portfolio (www.8335174.com), The Wireless Registry has built new infrastructure that allows individuals and businesses to take control of the meaning of wireless signals they already have.

Media Contacts Nicholas Graham, for Future of Privacy Forum 571-291-2967, fpfmedia@futureofprivacy.org

Michael Lock, for The Wireless Registry 202-261-7811, wirelessregistry@waggeneredstrom.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7298
Published: 2014-10-24
adsetgroups in Centrify Server Suite 2008 through 2014.1 and Centrify DirectControl 3.x through 4.2.0 on Linux and UNIX allows local users to read arbitrary files with root privileges by leveraging improperly protected setuid functionality.

CVE-2014-8346
Published: 2014-10-24
The Remote Controls feature on Samsung mobile devices does not validate the source of lock-code data received over a network, which makes it easier for remote attackers to cause a denial of service (screen locking with an arbitrary code) by triggering unexpected Find My Mobile network traffic.

CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.