Welcome!

Search Authors: Elizabeth White, Pat Romanski, Carmen Gonzalez, Sematext Blog, Jnan Dash

News Feed Item

Consumer Watchdog Calls On Federal Trade Commission To Act Against Google's App Store Privacy Violations; Says Penalties Should Be In Billions of Dollars

Public Interest Group Also Asks California Attorney General to Investigate

Dial into news conference at 2 pm ET (11 am PT): 800-920-7487 - Dial-In Code: 65248697#

SANTA MONICA, Calif., Feb. 25, 2013 /PRNewswire-USNewswire/ -- Consumer Watchdog today called on the Federal Trade Commission to act immediately against Google's most recent privacy violation – sharing users' personal information with apps developers – and said the penalties for violating a previous consent order should reach into the billions of dollars.

Consumer Watchdog also asked California Attorney General Kamala Harris to investigate whether Google's privacy breach also violates California law in addition to violating the so-called "Buzz Consent Order" with the FTC.

"Google has become a serial privacy abuser and the FTC must change its tactics to curb the Internet giant's abuses. Google's wanton disregard for its obligations under the law demonstrate the need for meaningful penalties – in this case a fine in the billions of dollars," said John M. Simpson, Consumer Watchdog's Privacy Project director, at a news conference to discuss the nonprofit, nonpartisan public interest group's complaint.

In a seven-page formal letter of complaint to Charles A. Harwood, the FTC's Acting Director of the Bureau of Consumer Protection, Simpson, wrote:

"To no one's surprise (and the Commission's prior statements notwithstanding), the press is now awash in reports that Google has violated the Buzz Order yet again – and this time in a most substantive and egregious manner, by giving personal and closely held information from tens (if not hundreds) of millions of Android users to independent and unrestrained application developers, in contravention of Google's own stated privacy policy (as well as its obligations under the Buzz Order).  This represents the fifth significant misuse of confidential user data by Google in the last three years (previously, the "Wi-Spy" scandal, the Google Buzz fiasco, Google's improper combining and use of personal data, and the Safari Hacking episode)."

Read Consumer Watchdog's letter to the FTC here: http://www.consumerwatchdog.org/resources/ltrftc022513.pdf

Consumer Watchdog's letter said Google had been sending to app developers personal information about each user who purchased an app from Google, without obtaining the user's permission. The personal information sent by Google included the users' names, certain physical address information and email addresses. Neither Apple nor Microsoft had engaged in similar conduct.  Consumer Watchdog's letter warned:

"Google's conduct constitutes a most serious breach of user privacy.  Google Play apps deal with sensitive personal subjects, including health conditions and sexual activity.  By disclosing personal user information to app developers, Google enables the identification of people who downloaded apps such as:

  • "Depression App Counselor:  an app designed to help people suffering from depression to manage their symptoms.
  • "Pregnancy+:  an app for expectant parents.
  • "Heart Disease:  an app for people concerned that they are at risk of heart disorders.
  • "Utoopi:  a former app (now removed) 'used for the purposes of advertising, soliciting and recruiting sex workers.'

"Many Google app developers are young people.  Google's disclosure of personal user information to these developers makes it possible for them to further disseminate the information.  App developers can, for example, sell lists of customers to marketing services and data brokers – who will, in turn, sell the information to others."

Consumer Watchdog's letter noted that the group had gone to court to block the FTC's $22.5 million settlement with Google in the "Safari Hacking episode" because it "was inadequate to deter future Google violations of the Buzz Order because the settlement lacked a court injunction proscribing future violations, contained an express denial of liability by Google, and imposed a manifestly inadequate civil penalty."

Consumer Watchdog said now that Google has once again breached the Buzz Consent Order, the FTC must use new tactics.

"The strategy of initiating enforcement procedures by proposing a settlement followed by secret negotiations and a toothless decree has brought the Commission little beyond public condemnation.  And consumers have not been protected adequately by the Commission's enforcement actions," the letter said.  "We suggest, this time around, that the Commission begin its enforcement procedure by assigning a team of trial litigators – people who can actually conduct a trial – to the latest Google transgression and that these lawyers actually bring suit in federal court against Google for the latest violation of the Buzz Order.  The complaint should seek injunctive relief sufficient to enforce compliance to the Buzz Order through contempt actions, as well as an appropriate civil penalty – which, as we explain below, will run into the billions of dollars."

The law provides a penalty of $16,000 per violation.  Millions of apps have been purchased and downloaded.  "Calculating the amount of the penalty is a simple matter of multiplication.  The number is enormous (in the billions of dollars), and only a penalty of that magnitude will deter Google from future violation of the Buzz Order," Consumer Watchdog's letter said.

The letter recapped Google's privacy violations over the last three years including the Wi-Spy scandal, the Buzz fiasco, Google's improper combining data across services without consent and the Safari Hacking episode.  The letter spelled out how the FTC's actions and tactics have proved inadequate in an attempt to thwart Google's abuses against privacy.

Gary Reback, an attorney with Carr & Ferrel, in Menlo Park, CA., assisted Consumer Watchdog in preparing its formal complaint to the FTC.

Read Consumer Watchdog's letter to the FTC here: http://www.consumerwatchdog.org/resources/ltrftc022513.pdf

Visit our website at www.consumerwatchdog.org

SOURCE Consumer Watchdog

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
"People are a lot more knowledgeable about APIs now. There are two types of people who work with APIs - IT people who want to use APIs for something internal and the product managers who want to do something outside APIs for people to connect to them," explained Roberto Medrano, Executive Vice President at SOA Software, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In his General Session at 15th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, discussed how to take advantage of a multitude of compute options and platform features to make cloud the cornerstone of your online presence.
SYS-CON Media announced that Splunk, a provider of the leading software platform for real-time Operational Intelligence, has launched an ad campaign on Big Data Journal. Splunk software and cloud services enable organizations to search, monitor, analyze and visualize machine-generated big data coming from websites, applications, servers, networks, sensors and mobile devices. The ads focus on delivering ROI - how improved uptime delivered $6M in annual ROI, improving customer operations by mining large volumes of unstructured data, and how data tracking delivers uptime when it matters most.
In this Women in Technology Power Panel at 15th Cloud Expo, moderated by Anne Plese, Senior Consultant, Cloud Product Marketing at Verizon Enterprise, Esmeralda Swartz, CMO at MetraTech; Evelyn de Souza, Data Privacy and Compliance Strategy Leader at Cisco Systems; Seema Jethani, Director of Product Management at Basho Technologies; Victoria Livschitz, CEO of Qubell Inc.; Anne Hungate, Senior Director of Software Quality at DIRECTV, discussed what path they took to find their spot within the technology industry and how do they see opportunities for other women in their area of expertise.
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential.
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective storage designed to handle the massive surge in back-end data in a world where timely analytics is e...
"There is a natural synchronization between the business models, the IoT is there to support ,” explained Brendan O'Brien, Co-founder and Chief Architect of Aria Systems, in this SYS-CON.tv interview at the 15th International Cloud Expo®, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrategies, will examine why IT must finally fulfill its role in support of its SBUs or face a new round of...
The BPM world is going through some evolution or changes where traditional business process management solutions really have nowhere to go in terms of development of the road map. In this demo at 15th Cloud Expo, Kyle Hansen, Director of Professional Services at AgilePoint, shows AgilePoint’s unique approach to dealing with this market circumstance by developing a rapid application composition or development framework.

ARMONK, N.Y., Nov. 20, 2014 /PRNewswire/ --  IBM (NYSE: IBM) today announced that it is bringing a greater level of control, security and flexibility to cloud-based application development and delivery with a single-tenant version of Bluemix, IBM's platform-as-a-service. The new platform enables developers to build ap...

Advanced Persistent Threats (APTs) are increasing at an unprecedented rate. The threat landscape of today is drastically different than just a few years ago. Attacks are much more organized and sophisticated. They are harder to detect and even harder to anticipate. In the foreseeable future it's going to get a whole lot harder. Everything you know today will change. Keeping up with this changing landscape is already a daunting task. Your organization needs to use the latest tools, methods and expertise to guard against those threats. But will that be enough? In the foreseeable future attacks w...
Building low-cost wearable devices can enhance the quality of our lives. In his session at Internet of @ThingsExpo, Sai Yamanoor, Embedded Software Engineer at Altschool, provided an example of putting together a small keychain within a $50 budget that educates the user about the air quality in their surroundings. He also provided examples such as building a wearable device that provides transit or recreational information. He then reviewed the resources available to build wearable devices at home including open source hardware, the raw materials required and the options available to power s...
“The age of the Internet of Things is upon us,” stated Thomas Svensson, senior vice-president and general manager EMEA, ThingWorx, “and working with forward-thinking companies, such as Elisa, enables us to deploy our leading technology so that customers can profit from complete, end-to-end solutions.” ThingWorx, a PTC® (Nasdaq: PTC) business and Internet of Things (IoT) platform provider, announced on Monday that Elisa, Finnish provider of mobile and fixed broadband subscriptions, will deploy ThingWorx® platform technology to enable a new Elisa IoT service in Finland and Estonia.
From telemedicine to smart cars, digital homes and industrial monitoring, the explosive growth of IoT has created exciting new business opportunities for real time calls and messaging. In his session at @ThingsExpo, Ivelin Ivanov, CEO and Co-Founder of Telestax, shared some of the new revenue sources that IoT created for Restcomm – the open source telephony platform from Telestax. Ivelin Ivanov is a technology entrepreneur who founded Mobicents, an Open Source VoIP Platform, to help create, deploy, and manage applications integrating voice, video and data. He is the co-founder of TeleStax, a...
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover how hardware commoditization, the ubiquitous nature of connectivity, and the emergence of Big Data a...
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core of our infrastructures. At the same time, we have old approaches made new again like micro-services...