In letter to Congress, Google defends privacy changes
Google exec contends users still retain control, and private information remains private
Computerworld - In a letter sent to eight members of Congress, Google yesterday defended its move to consolidate its privacy policies and users' personal information.
The 13-page letter explains Google's decision to alter its privacy policies and answers specific questions from the legislators. In sum, Google contended that its approach to privacy has not changed, that users still have control over how they use the company's various online services, and that private information remains private.
Google stirred up something of a privacy firestorm last week when company executives disclosed plans to rewrite privacy policies and to meld user information across its various products and services.
Google has been combining users' information from different services, like Gmail and Calendar, for a while, but company is expanding that effort to encompass user information across all products and services.
Privacy advocates and some users were particularly concerned because Google didn't seem to offer users an opt-out option. Instead, the company said if users didn't like their data being combined across services, they could simply stop using them.
Google also took on that complaint in the letter to Congress.
Chavez also wrote that private user information will remain private -- it will not be given to third parties, he added.
And Chavez also noted that Google will not be collecting more information on users than it was before.
He went on to say Google's moves aim to simplify what had become a "wide range" of privacy policies as well as "improve the user experience."
For instance, he said sharing information across services would allow a user to send friends directions in Google+ Circles without leaving Google Maps. And if a user is searching for a recipe, he or she would get cooking video recommendations when visiting YouTube.
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin, or subscribe to Sharon's RSS feed . Her e-mail address is email@example.com.
Read more about Privacy in Computerworld's Privacy Topic Center.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!