Lawmakers quiz Apple, Google about location tracking
IDG News Service - Minnesota Senator Al Franken and the attorney general of Illinois have separately pressed Apple and Google to provide more information about the location data they collect about their end users.
The requests from Franken and Illinois Attorney General Lisa Madigan follow recent reports that Google and Apple have been collecting data about the location of Android and iPhone users without their permission.
While both companies ask permission before collecting the location data required for certain applications, the reports, starting with one in the Wall Street Journal, show the companies also collect location information when not required to do so by an application.
Madigan said she has asked the companies to explain what information they store, for how long and what it's used for. "I want to know whether consumers have been informed of what is being tracked and stored by Apple and Google and whether those tracking and storage features can be disabled," she said in a statement.
Franken on Monday asked representatives from Google and Apple to attend a hearing on May 10 about protecting mobile privacy.
The lawmakers aren't the only ones concerned about the data collection. Two consumers filed a lawsuit in Florida on Friday that charges Apple with fraud over the alleged data collection. South Korea and some countries in Europe have also reportedly launched investigations.
In addition, Congressman Edward Markey, a Democrat from Massachusetts, said he wrote to Apple's CEO last week with questions about the company's data collection practices.
Apple has not commented on the matter and did not reply to a request for comment for this story.
Google says it does not collect location information without user permission.
"All location sharing on Android is opt-in by the user," the company said in a statement. "We provide users with notice and control over the collection, sharing and use of location in order to provide a better mobile experience on Android devices. Any location data that is sent back to Google location servers is anonymized and is not tied or traceable to a specific user."
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
- Privacy groups seek FTC probe of Google, Yahoo for exposing data to NSA
- FAA road map sees challenges in allowing drones over U.S. airspace
- 'Reform bill' would codify ability of NSA to spy on Americans, critics say
- Is French outrage against U.S. spying misplaced?
- Calif. governor vetoes email privacy legislation for third time
- So much data, so little security -- what happens if your city gets hacked?
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you think getting it right from day one is always what matters, you probably haven't been following technology too closely.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
Top Considerations for Moving to a Cloud Delivery Model for ITSM
Find out whether SaaS-based ITSM is right for you
- Software-as-a-service is more than just a cloud-based delivery model-it's a new approach to service that lets companies optimize utilization of in-house IT resources... All Government IT White Papers
- Fighting Fraud Videos: IBM Intelligent Investigation Manager Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both...
- IBM Intelligent Investigation Manager: Online Product Demo Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more...
- Webinar: IBM IIM for Fraud, Abuse and Waste in Government View this IBM webinar to learn about the challenges and opportunities in fraud reduction, waste, and abuse in government programs and agencies. You...
- Pre-Engineered solutions from VCE Simplify Core Infrastructure Implementation In this video, the CTO of Purdue Pharma, a privately held pharmaceutical company explains how Purdue transformed their data center infrastructure with VCE.
- Integrated Infrastructure: Simplify Operations, Speed Deployments and Reduce Costs George Weiss, Gartner Vice President and Analyst, and Praveen Akkiraju, CEO of VCE, provide practical information regarding the various aspects of Integrated Infrastructures...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.