Intel drafts privacy license for mobile device software
Consumer-friendly policy requires good behavior from developers
IDG News Service - Intel Corp. has attached a privacy license to its new location-aware software product, intended to protect cell phone users’ personal information as mobile devices increasingly rely on tracking technology to provide targeted services.
Installed on a smart phone or ultramobile PC, location-aware software can use GPS (Global Positioning System) technology to produce tailored information like driving directions, nearby restaurants and movie schedules. The downside of that feature is that handsets can double as tracking devices if location data is not kept private. The abuse of such access could range from civil liberties violations to physical threats in the cases of vulnerable people like battered spouses, Intel fears.
So, Intel has added a privacy addendum to the Eclipse Public License it uses for the software application called Privacy Observant Location System (POLS), according to a posting on Intel's Web site by John Miller, the privacy and security policy manager of Intel's corporate technology group.
The addendum says that vendors must inform the end user what information is recorded and how long it is stored, and it requires developers to include opt-out capability so users can change those settings, Miller said.
POLS is a tool for mobile application developers that determines its location by triangulating between nearby radio beacons such as GSM (Global System for Mobile Communications) cells or Wi-Fi access points. Location-aware devices use various approaches, relying on the wireless provider to track every device, or on GPS chips, which can have poor reception in dense cities.
POLS supports eight models of Windows Mobile-based phones made by HTC (High Tech Computer Corp.) and Motorola Inc., branded by carriers including Audiovox Corp., Cingular Wireless, Orange PLC and T-Mobile USA Inc.
While Intel's ethics concerns are compelling, the market may be slow to react to this initiative because so few customers actually use location-based technology, analysts say.
Only 10% of the PDAs sold today are equipped with internal GPS antennas, and most of those are in Europe, where the more complex roads and diversity of languages have made street mapping a larger market, said Todd Kort, principal analyst for Gartner Dataquest.
In contrast, nearly 90% of CDMA (code division multiple access) phones from Sprint Nextel Corp. and Verizon Communications Inc. offer assisted-GPS technology, which relies on Intel's type of cell tower navigation technique. But most users don't know it exists or have chosen not to use it, he said.
"It's great that it's there, and someday we'll appreciate it, but it is something that's in the back of Americans' minds and will not be a driving force for sales," Kort said.
In the meantime, Intel faces a continuing challenge as it must convince developers to abide by its privacy initiative. The new addendum is useless if software developers don't obey it, so the company has begun a campaign to build support in the open-source community. Intel has asked members of the Open Source Initiative to refine and adopt the policy as an acceptable amendment to the OSI's standard open-source license, and made available to the open-source community at large.
"We believe that a bottoms-up effort to encourage the development of privacy-sensitive social norms is necessary, and in fact critical, for both privacy and public adoption of the technology," Miller said. "We post this information here with the hope that others will see value in this approach."
Intel drafted the policy after discussions with the Value Sensitive Design Research Lab at the University of Washington, with other academics at the University of California, Berkeley, and Johns Hopkins University, and with private-sector lawyers.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast Best Practices: How to Improve Business Continuity with Virtualization VMware solutions include a range of business continuity capabilities to help ensure availability for applications across your virtualized environment. Learn More>>
- Live Webcast
Transforming Finance, Procurement and Supply Chain Effectiveness with Cross-Functional Analytics
Date: May 6th, 2014
Time: 1 PM EDT
Attend this Webcast to find out how Oracle's packaged analytic applications enable line-of-business managers to examine all...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...