The Android fine print: Kill switch and other tidbits
IDG News Service - An uproar erupted when iPhone users discovered a so-called remote kill switch on their phones -- will it spur the same reaction in users of the G1, the first Android phone?
In the Android Market terms of service, Google expressly says that it might remotely remove an application from a user's phone. "Google may discover a product that violates the developer distribution agreement ... in such an instance, Google retains the right to remotely remove those applications from your device at its sole discretion," the terms, linked to from the phone, read.
That item is one of a few hints of things to come in the "About phone" section of the device, which also alludes to some hitherto unknown people and companies that were instrumental in developing the software.
The G1, the first phone to run the Android software developed by Google, goes on sale Oct. 22, and many people are getting their first in-depth look at it because T-Mobile has loaned the devices to reporters. The Android Market is the online store that's accessible from the phone from which users can download applications.
Android users might be more receptive to Google's remote kill switch than iPhone users were to Apple's for a couple of reasons. First, Google is being upfront about it. Apple didn't confirm the capability for the iPhone until days after a developer discovered it.
In addition, Google says that if it does remotely remove an application, it will try to get users their money back, a question that iPhone users have wondered about in the case of an iPhone application recall. Google said that it will make "reasonable efforts to recover the purchase price of the product ... from the original developer on your behalf." If Google fails to get the full amount back, it will divide what it gets among affected users.
Google may have more need to use a kill switch than Apple. That's because Apple vets applications before putting them into its Apps Store. Anything goes in Google's Android Market, opening the chances of malicious or otherwise unwanted applications appearing in the market.
The Android Market business and program policies also include an item that says users can return any application for a full refund within 24 hours of the time of purchase. In the absence of a trial version of applications, this offer will let users return an application that might not deliver exactly what they expected.
Android Market users can also reinstall as many times as they wish an application that they buy, another useful feature in case a phone fails.
- Review: G1 is no iPhone, but Android has promise
- John Brandon: T-Mobile G1 -- a real Web 2.0 stunner
- The Android fine print: Kill switch and other tidbits
- G1 Android phone is only half 'open,' with T-Mobile lock-in
- Android about advertising, not the enterprise
- Android-Amazon music deal should worry Apple, analyst says
- FAQ: What T-Mobile's Android G1 phone will do for you
- As Google's Android approaches, carriers embrace change
- Steven J. Vaughan-Nichols: The Android phone is here! So what?
- John Brandon: T-Mobile G1 with Google Android is Smartphone 2.0
- Seth Weintraub: Ten areas where Android could make waves vs. iPhone
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts