In letter to Congress, Google defends privacy changes
Google exec contends users still retain control, and private information remains private
Computerworld - In a letter sent to eight members of Congress, Google yesterday defended its move to consolidate its privacy policies and users' personal information.
The 13-page letter explains Google's decision to alter its privacy policies and answers specific questions from the legislators. In sum, Google contended that its approach to privacy has not changed, that users still have control over how they use the company's various online services, and that private information remains private.
Google stirred up something of a privacy firestorm last week when company executives disclosed plans to rewrite privacy policies and to meld user information across its various products and services.
Google has been combining users' information from different services, like Gmail and Calendar, for a while, but company is expanding that effort to encompass user information across all products and services.
Privacy advocates and some users were particularly concerned because Google didn't seem to offer users an opt-out option. Instead, the company said if users didn't like their data being combined across services, they could simply stop using them.
Google also took on that complaint in the letter to Congress.
Chavez also wrote that private user information will remain private -- it will not be given to third parties, he added.
And Chavez also noted that Google will not be collecting more information on users than it was before.
He went on to say Google's moves aim to simplify what had become a "wide range" of privacy policies as well as "improve the user experience."
For instance, he said sharing information across services would allow a user to send friends directions in Google+ Circles without leaving Google Maps. And if a user is searching for a recipe, he or she would get cooking video recommendations when visiting YouTube.
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin, or subscribe to Sharon's RSS feed . Her e-mail address is email@example.com.
Read more about Privacy in Computerworld's Privacy Topic Center.
- Combating Identity Theft in a Mobile, Social World Offering identity theft protection and remediation allows businesses to give their workforce the confidence to efficiently engage while bringing financial reward to the...
- After a Breach: Managing Identity Theft Effectively This white paper from LifeLock Business Solutions notes that FIs in addition to managing fraud should strive to turn a negative event for...
- Combating Identity Fraud in a Virtual World This slide presentation reveals findings from the Javelin Strategy & Research 2012 Identity Fraud Report about mobile and social trends, the real risks...
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Business-driven data protection Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the ARCserve team will... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!