Google asked to add home page link to privacy policies
Company's refusal to do so violates California law, privacy advocates say
Computerworld - In the latest indication of the growing unease in some quarters over Google Inc.'s privacy policies, a coalition of advocacy groups is asking the search company to provide a direct link to its privacy policies on its home page.
In their letter, the groups called Google's reluctance to post the link on its home page "alarming."
Google's refusal to do so also sets it apart from other popular Web sites that routinely put such links on their home pages, Rotenberg said. "It is so very straightforward. Just put the link there. Not only are they required to under California law, but just about everybody else is doing it," he said.
In a press conference this morning, Beth Givens, director of the Privacy Rights Clearinghouse, said that Google's addition of a simple seven-letter word to its home page would do nothing to change its aesthetics. Yet, "it makes all the difference from a privacy compliance standpoint," she said.
The California law that requires company's to post prominent home page links to their privacy policies was specifically designed to give consumers easy, one-click access to the information, said Pam Dixon, executive director of the World Privacy Forum.
As a company that collects and stores a range of information, including health care data, it is important for Google comply with the law, Dixon said. "It is a very straightforward, very simple law in many ways. It is something that most businesses provide for anyhow," she said.
In an e-mailed statement, a Google spokeswoman said the company shared the view that it was important for consumers to easily find privacy policies. However, the statement gave no indication that Google has any plans to put a link on its home page.
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts