Ask.com to let users scrub search records
AskEraser will provide option for anonymous searching
IDG News Service - Search portal Ask.com plans to make it easier for Web searchers to cover their tracks.
The company is introducing a feature to its Web portal later this year called AskEraser, which will let users perform anonymous searches.
When AskEraser is turned on, the Web site will not retain the data it typically stores during a search, said Patrick Crisp, an Ask.com spokesman. "We will allow users to select a privacy setting that says, 'I do not want you to retain my data at all,'" he said.
If AskEraser is not turned on, the site will store the search query, the IP (Internet Protocol) address and some cookie information from the user, as well as the URL the user visited before coming to Ask.com, Crisp said.
Search engines like Ask.com say that they retain this sort of information in order to improve their sites, but this practice has become controversial, with privacy advocates worrying that the data could be leaked or misused.
Last year, AOL LLC researchers inadvertently disclosed data on about 650,000 of searches made on the company's Web site. New York Times reporters were able to track down one of the searchers, based on the information contained in the AOL database.
Ask.com, which is owned by IAC/InterActiveCorp., said it plans to implement a similar policy and will no longer link searches to IP addresses after a period of 18 months. That policy will be implemented by year's end, Crisp said. "We are eliminating the possibility of someone associating those queries with the person who made them."
AskEraser will be available on the Ask.com and Ask.co.uk Web sites by the end of 2007. It will roll out to other markets next year.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!