Google and the privacy Richter scale | Opinions | ChannelWorld.in

PARTNER HOTLINES

Google and the privacy Richter scale

Added on Mar 07, 2012 by Jay Cline
Jay Cline About the author

Jay Cline

Jay Cline is president of Minnesota Privacy Consultants . You can reach him at cwprivacy@computerworld.com

Last week, Google followed through on its plan to consolidate its 60 privacy policies into a single approach. Some privacy advocates and regulators are worried that Google will now be able to know and track people like never before. But on the scale of all the bad things that could happen to our privacy, where does Google's change in approach rank? Have we crossed a Rubicon toward the obliteration of personal privacy, or is a new day dawning for more control over our personal data?

There really isn't any universally accepted way to answer this question.

On one extreme are people who tend to see any increase in data collection, sharing and exposure as a long slide down the slippery slope toward losing our liberty. On the other extreme are people who love the benefits of new technologies enough that they disregard any privacy concern as a non-issue.

The truth has to be somewhere in between. Not all privacy issues are created equal. Some rank only a 1 on the privacy Richter scale -- an unnoticeable tremor that does no damage -- while others rank an unqualified 10 that merit a widespread emergency response. Knowing the difference can help you sort through all the hype and know which privacy news to pay attention to.

What would a privacy Richter scale look like? See if these criteria make sense for you.

Privacy Richter readings 1 to 3

Earthquakes measuring on the lower end of the Richter scale are detected but hardly felt. What is the equivalent for a privacy tremor? These would be privacy events that make the news but pose no lasting harm to individuals or society as a whole.

You've probably experienced some or many of these privacy tremors -- receiving someone else's mail, having someone expose something embarrassing about you to co-workers or friends, or losing your wallet or purse. A privacy Richter 1 or 2 event is a temporary bad turn for you or a handful of people, but nothing systemic.

At the upper end of this category, you might see incidents affecting millions of people but in a minor way. I'd rank the controversies over online-behavioral advertising, consumer tracking and customer data analytics at this level -- a privacy Richter 3. A lot of data is being collected, but it's being used to sell people stuff. They don't have to buy the stuff, and they might actually like the stuff, so it's not clear what harm has been caused or where liberty or dignity has been irreparably lost.

Privacy Richter readings 4 to 7

Earthquakes measuring 4 to 7 on the Richter scale can knock you down, level buildings and cause real and lasting damage. Privacy events in this range should be taken seriously.

Two recent incidents on the lower end of this range would include the Epsilon breach of its customer email addresses and Apple 's storage of the iPhone location-tracking file on users' Macs. The Epsilon breach put people at heightened risk of "spear phishing," where thieves target email addressees at a single company for social engineering purposes. The Apple incident put people at risk if their Macs were lost or stolen and recovered by someone intent on exploiting the knowledge contained in the machine about their daily patterns. These are real risks to a lot of people.

Stolen laptops containing thousands of Social Security numbers and credit-card numbers would also fall in this range. Identity thieves could use this information to make fraudulent transactions that could impact credit scores for years. I'd put the large TJX, Heartland and Sony breaches of millions of credit-card numbers in this category, too, because the total financial damage was extensive, topping $1 billion by some estimates. I wouldn't put these breaches in the top category, however, because the financial damage was ultimately contained and society as a whole was not changed in a lasting way.

Privacy Richter readings 8 to 10

Earthquakes topping 8 on the Richter scale make the all-time list and usually involve widespread destruction and loss of life. Privacy events making this short list would similarly be points of no return for large numbers of people and society as a whole.

DARPA's Total Information Awareness program, proposed in 2002 and defunded by Congress in 2003, could have topped the scale. The massive collection of data about U.S. citizens could have created a perpetual bureaucracy that put at risk our right of due process and protection against unlawful search and seizure. The promulgation of a national ID card could similarly have irreversible and negative effects. The current trend to deploy more and more of TSA's "naked image" machines, even at places outside of airports, could also rank this high because these machines treat people like cattle and reduce their human dignity.

If a corporation such as Google attained as much power as a government agency or exerted unrivaled influence over society, its privacy problems could also rank this high. The data inaccuracies of U.S. credit-reporting agencies in the 1960s -- which led to errant denials of credit and ultimately to the 1970 Fair Credit Reporting Act -- would be a candidate for a privacy Richter 8 rating.

So how serious is the Google policy change? By the sound of the running commentary, this is the worst thing for privacy that's happened so far this year.

The French privacy regulator, the Commission nationale de l'informatique et des liberts (CNIL), issued a critical statement this week. The CNIL claimed that "trained privacy professionals" could not deduce from the new consolidated privacy policy exactly what Google would now be doing with users' data.

For their part, 37 U.S. state attorneys general sent Google CEO Larry Page a sharp letter last week. (I don't think they Gmailed it.) They listed several problems they had with the policy change, which they say amounts to an "invasion of privacy." Their overall concern was that Google consumers such as Android phone users and government agency customers of Google Docs have no real choice to opt out of the change.

A related class-action lawsuit alleges that Google has violated the Wiretap Act, has been unjustly enriched and has intruded upon the seclusion of the users.

This is a lot of heat. I can't remember a privacy policy change that generated this much controversy.

What's the worst-case scenario here? Google amasses a detailed profile about each one of us who continues to use its mostly free products. It uses that information to deliver strangely relevant ads to us. Potentially, that information later on gets breached, sold or subpoenaed by the federal government.

When I look at the privacy Richter scale, the current change ranks at a 3. Larry Page's company will weather this change. I don't see irreparable or lasting harm or loss of liberty. If you don't like Google, use Bing. Don't watch weird things on YouTube. You shouldn't be sending confidential things through Gmail in the first place. You knew Google was the big data hound when you bought your Android phone. So get an iPhone. And be thankful Google is not a North Korean company. It actually does not share everything with the government.

A 3 ranking doesn't mean this isn't an important development. An external disclosure of Google's growing farm of data could easily make the second tier of the privacy Richter scale. Google now has a growing accountability to keep its data controlled within its own enterprise and to resist governmental intrusion into that data.

So the next time you see privacy in the headlines, ask these questions: Who is harmed? Is liberty or dignity reduced? And see where it measures up on the privacy Richter scale.

Latest Opinions

  • Security threats and why you never want to name anything

    Let's talk about the technology and even more about why you never want to volunteer to name a product.

    Rob Enderle
  • Consumers love Samsung, but don't trust Apple or Facebook

    Judging by its huge sales numbers and unrivaled consumer interest in its products, you'd think that no company in the tech arena was more beloved than Apple. Think again. It turns out Samsung is the "most reputable" tech company in the world, at least according to a recent survey of more than 5,000 consumers.

    Bill Snyder
  • Why Apple Watch is a business traveler's best friend

    Last month, a week after I got my Apple Watch, I took a trip from Boston to San Francisco to cover a wearable technology conference. I purposely loaded up on travel-related Watch apps -- or iPhone apps that have Apple Watch extensions -- with the idea that I'd write a post about my experiences.

    Al Sacco
  • Turning off Connect makes Apple Music better

    Connect is the part of Apple Music where you'll supposedly enjoy a close, personal relationship with the artists and bands you care about. But just artists, not your friends--unlike Spotify and Rdio, you can't build a list of your friends, see what they're listening to and enjoying, subscribe to each other's handmade playlists, or collaborate on a shared playlist, say, for an upcoming road trip or party.

    Susie Ochs
Latest Videos

Vishal Dhupar: NVIDIA is taking Graphics Virtualization to the next level

Vishal Dhupar, MD - South Asia, NVIDIA, talks cloud GPU, the power of graphics virtualization and how NVIDIA is going to be one of the cornerstones of the smart city pie.

Revisiting Customer Strategy Pays: Ram Kumar R, Gemini Communication

R Ram Kumar, Director of Chennai’s Gemini Communication (GCL), explains at length why an overhaul of GCL’s customer strategy and re-establishing connect were vital in helping the company bounce back.

EDITOR'S PICK

Why Flash Storage Will Rule: Analysts

Analysts say flash storage’s enviable speed and performance are stirring up a revolution in the Indian storage market, opening new opportunities for organizations. 

3 steps to digitizing your work for maximum productivity

From the earliest days as a marketing slogan, the elusive concept of the so-called paperless office may finally be taking shape, if anecdotal evidence is anything to go by. A growing number of small businesses and startups, unencumbered by legacy processes, are quietly ditching printouts for an all-digital ecosystem, buoyed by soaring BYOD ownership and growing familiarity with a plethora of cloud services.

Is the information security industry having a midlife crisis?

The information security industry is hot right now, but it's hot because it's failing. The daily announcements about breaches and lost data confirm that criminals are winning the security battle, but how can InfoSec reposition itself in order to win the war?

SLIDESHOWS

The State of the Internet

Akamai's Q1 2015 state of the internet report provides insights into key global statistics including connection speeds, broadband adoption (fixed and mobile networks), and IPv4 exhaustion and IPv6 implementation.

India Software Market on an Upswing

According to IDC, the Indian software market has witnessed consistent growth of 10 percent since the second half of 2014, showing signs of growth and revival. 

7 Jobs Technology Has Replaced

Albert Einstein said once that it has become appallingly obvious that our technology has exceeded our humanity. With every invention of technology some poor soul becomes vulnerable to losing his or her job in some corner of the world. Here are few jobs that will cease to exist soon.

Changing Fortunes of Top Tech Companies

The tech sector has been led by these companies for a long time. But how have they fared over the quarters?

India's Leading VADs

Why Channels Want to Partner With Inflow Technologies

Inflow Technologies’ tie up with 39 vendor companies, an extensive tech portfolio, and a services play, are great value propositions for enterprise channels, says its President and CEO, Byju Pillai.

iValue Creates Real Value for Channels in India

Focused on niche vendor alliances around data, network and app management backed by a robust channel ecosystem marked iValue's success in 2014. What clicked for the seven-year-old VAD?

RAH Infotech Shows Channels the Way Ahead

Mutual trust and long lasting bond with vendor companies and channel partners helps VADs to evolve and succeed in today’s aggressively competitive market. Leveraging competent channel partners and forge niche vendor alliances marks RAH Infotech’s success in 2014.

How Satcom Infotech is Adapting to New Security Landscape

As a leading value added distributor, Satcom Infotech is emerging as an end-to-end security player, helping both customers and partners grow.

How ComGuard Shields Channel Partners

As emerging technologies introduce new threats to the enterprise landscape, they are making channel partners anxious. But VADs like ComGuard are putting their worries to rest. Here's how.

Tech Chat

Collaborating To Outcome Based World: Priyadarshi Mohapatra, Avaya

Priyadarshi Mohapatra, Managing Director, India and SAARC, Avaya, on how IT is transitioning from a keep-the-lights-on role to one that enables customers to deliver results.

The Dawn of the Digital Age: Akhilesh Tuteja, KPMG

The development of digital infrastructure will be a key growth driver for technology and solution providers. 

Paradigm Shift from End-Users to User-First : Parag Arora,Citrix

Parag Arora, Area Vice President and India Head, India Sub-continent, Citrix, says new technologies will force organizations to take a user-first approach in 2015.

Mobile and Cloud Are Gamechangers of the Future: Karan Bajwa, Microsoft

Karan Bajwa, Managing Director, Microsoft India, says, in  2015, organizations will adopt a mobile-first and cloud-first strategy to get ahead of competition.

A Network for the Internet of Everything : Dinesh Malkani,Cisco

Dinesh Malkani, President, India and SAARC, Cisco, talks about IoT and the significant technology transitions in the networking world.

Moving to the Third Platform: Jaideep Mehta, IDC

Cloud and mobility are the two technologies that will fuel the rapid adoption of the third platform in India.

Envisaging a Holistic Security Strategy For 2015: Sanjay Rohatgi,Symantec

Sanjay Rohatgi, President–Sales, Symantec India, says the company has a set of holistic solutions in place to secure organizations from security threats. 

Beating the Bad Guys: Sivarama Krishnan, PwC

Organizations will need to turn inwards to establish robust information security strategies.

Building Capabilities for a Digital Tomorrow: Alok Ohrie,Dell

Alok Ohrie, President and Managing Director, Dell India, on the company’s investments to build end-to-end solutions and delivery capabilities for a digital world.

FAST TRACK

Kamtron Systems

Transitioning towards a service-oriented company will boost our growth, believes Kavita Singhal, director, Kamtron Systems.

TIM Infratech

Delivering ‘best of breed’ technologies to enterprises is key to success, says Monish Chhabria, MD, TIM Infratech

Mudra Electronics

A vendor-agnostic strategy helped us sustain business, says Bharat Shetty, CMD, Mudra Electronics.

Systematix Technologies

Our USP is a customer-friendly approach backed by services, says Akhilesh Khandelwal, Director, Systematix Technologies.

CorporateServe Solutions

Our ability to turnaround complex ERP projects in record time is what gets us customer referral, says Vinay Vohra, Founder & CEO, CorporateServe Solutions.

KernelSphere Technologies

We are emerging as an end-to-end systems integrator, says Vinod Kumar, MD, KernelSphere Technologies.

Uniware Systems

We constantly validate emerging technologies for first-mover advantage, says Vergis K.R., CEO, Uniware Systems.

Astek Networking & Solutions

An innovative approach helps us stay successful, says Ashish Agarwal, CEO, Astek Networking & Solutions.

CSM Technologies

Our approach is backed by innovation and simplicity, says Priyadarshi Nanu Pany, CEO, CSM Technologies.

SOCIAL MEDIA @ CW India
SIGNUP FOR OUR NEWSLETTER

Signup for our newsletter and get regular updates.