IDG News Service - The Privacy Commissioner of Canada has started an investigation into Google's collection of data from unsecured wireless networks, the office said in a statement on Tuesday.
Data protection authorities in France, Italy and Germany are already investigating Google's Street View service, after the company said last month that its camera cars mistakenly collected data from unencrypted Wi-Fi networks while compiling images of city streets for its Google Maps site.
The company had said in April that it had collected only the Wi-Fi network names and MAC (media access control) addresses, but not data from unencrypted Wi-Fi connections. The data helps it locate users of its mobile services when they connect over a Wi-Fi network.
Google did not immediately respond to a request for comment on the investigation in Canada.
Expressing concern about the privacy implications of Google's confirmation that it had been capturing Wi-Fi data in neighborhoods across Canada and around the world over the past several years, the statement also quoted Privacy Commissioner Jennifer Stoddart as saying that her office had a number of questions about how this collection could have happened and about its impact on people's privacy.
Rapidly growing location-based online services are raising new risks for privacy, as the incident involving Google shows, according to Assistant Privacy Commissioner Elizabeth Denham.
Denham expects the investigation will promote better handling of personal information among other organizations involved in the collection of Wi-Fi data for the purpose of facilitating the delivery of location-based services.
The office of the Privacy Commissioner of Canada has asked Google to retain the data it collected in Canada. The Privacy Commissioner of Canada is mandated by the country's Parliament to act as an ombudsman, advocate and guardian of privacy and the protection of personal information rights of Canadians.
- Google I/O 2013's Coolest Products and Services
- 10 Star Trek Technologies That are Almost Here
- 19 Generations of Computer Programmers
- 25 Must-Have Technologies for SMBs
- A walking tour: 33 questions to ask about your company's security
- 15 social media scams
- The 7 elements of a successful security awareness program
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Federal IT Innovation Caught in a Catch-22
- Fed resources shoring up old infrastructure, holding back new technologies.
- Case Study: Hospital Turns to Email Archiving Solution to Ensure Regulatory Compliances
- Read this case study to learn how a cloud-based email archiving solution enabled the hospital to meet government mandates and helps avoid thousands...
- Case Study: In-the-Cloud Email Service Replaces Three Point Products
- Read this case study for more information on a comprehensive in-the-cloud email service to help replace three point products.
- Case Study: Simplifying the Transition to Exchange 2010 with Email Management Solutions
- Read this case study to learn how a cloud-based email management solution greatly simplified the company's transition to Exchange 2010.
- What does it take to deliver Security, Privacy and Trust at Mimecast?
- This whitepaper explains the process and controls that Mimecast put in place to deliver a secure, private and trusted SaaS platform for your... All Government IT White Papers
- 3 Reasons Why Sepaton is the World's Fastest Backup Solution
- Leading analyst, Storage Switzerland learns how Sepaton backs up and deduplicates massive data volumes while maintaining the industry's fastest performance - all in...
- Enterprise File Sharing: All You Need to Know
- Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with...
- Bridging HTTP and FTP with FileXpress Internet Server
- What if you could take an FTP server on your internal network, and allow external users (partners or customers) to securely access it...
- MFT and FileXpress - An Overview
- Business users and applications exchange files on a regular basis. File transfer is a core part of the flow of business activity.
- Content Analytics: Big Data Conquered, Customer Service Elevated
- For organizations looking to start a content analytics program or improve their existing capabilities, Aberdeen Group and IBM will lay out several recommendations... All Government IT Webcasts