The change is in response to concerns from an EU working group
Computerworld - Google Inc. has decided to make the data it stores about end users anonymous in its server logs after 18 months, according to a blog posted yesterday by the company's global privacy counsel.
Previously, Google had said it would make the data anonymous after 18 to 24 months.
In its letter, the Article 29 Working Party, an advisory panel of representatives from the EU's national data protection authorities, asked Google to explain why it needed to keep user data for 18 to 24 months. The group said server logs contain information that can be linked to a particular person and that collecting such data must comply with the EU's data protection laws.
The working group said keeping the information for 18 to 24 months does not meet those laws, and it asked Google to justify its reasons for keeping the information for that length of time. The group said it planned to discuss this issue at a meeting later this month.
In response, privacy counsel Peter Fleischer said: "The Internet is a global medium, and the principles at stake -- privacy, security, innovation and legal obligations to retain data -- have an impact beyond Europe, and outside of the realm of privacy." He added: "These principles sometimes conflict; while shorter retention periods are good for privacy, longer retention periods are needed for security, innovation and compliance reasons."
Fleischer said Google believed it had "struck a reasonable balance between these various factors" and that its policies were consistent with EU data protection laws. Fleischer said Google needed to retain server logs for a variety of reasons, including to improve its search algorithms for the benefit of users; to defend its systems by fighting click fraud and spam; to comply with data retention legal obligations; and to "meet valid legal orders from law enforcement as they investigate and prosecute serious crimes like child exploitation."
"After considering the working party's concerns, we are announcing a new policy: to anonymize our search server logs after 18 months, rather than the previously established period of 18 to 24 months," Fleischer said. "We believe that we can still address our legitimate interests in security, innovation and antifraud efforts with this shorter period. However, we must point out that future data retention laws may obligate us to raise the retention period to 24 months."
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Accelerating Network Convergence in Virtualized and Cloud Data Centers Adopting a converged networking strategy enables organizations to traffic server and storage I/O workloads on consolidated data throughput channels. Intelligent software helps optimize...
- How 10GbE Network is the Backbone of the Virtual Data Center The shift to a virtual data center has put tremendous strain on legacy networks; driving the need for more speed, lower latency, more...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts