Court Rules In Favor of Firm 'Scraping' Public DataCourt Rules In Favor of Firm 'Scraping' Public Data
US appeals court said a company can legally use publicly available LinkedIn account information.
September 17, 2019
If you make data public online, can someone be prevented from using it? HiQ Labs (a data analytics company) said "no," LinkedIn said "yes," and now a federal court has agreed with HiQ in the latest courtroom round of a case that could have significant implications for securing enterprise data.
HiQ Labs scrapes information from LinkedIn profiles that users have set to be viewable to the Internet at large. It then combines that data with public data gleaned from other websites, and sells the results to employers looking for more insight into potential employees.
LinkedIn reportedly at first appeared to have no problem with the practice, but after launching its own somewhat similar service, served HiQ with a cease-and-desist letter which the smaller company has fought.
According to a report by Vice LinkedIn claimed that access to this public data violated the Computer Fraud and Abuse Act (CFAA). The Ninth Federal Circuit Court of Appeals ruled that, because the data belongs to the individual LinkedIn user and those users obviously intended it to be widely available, HiQ is breaking no laws in finding and using the data.
At its heart, the legal issue is over the definition of "authorized use" of data — something that security professionals must consider in many cases of deciding whether legal remedies can be sought for individuals and companies accessing data that is available through a Web interface. LinkedIn is likely to appeal this verdict.
For more, read here.
About the Author(s)
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks