Groups raise questions about privacy on Skype
Advocacy groups call on Skype and owner Microsoft to detail access by third parties such as governments
IDG News Service - Skype owner Microsoft should release information about how much user data it gives to third parties, including government agencies, several organizations and individuals said in a letter to company officials.
The groups, including the Electronic Frontier Foundation, Reporters Without Borders and GreatFire.org, called on Microsoft and Skype to also release information about whether third parties can intercept Skype calls and to explain their position on complying with U.S. wiretap laws. Forty-five groups and more than 60 people signed the letter to Microsoft officials.
With about 600 million users, Skype is effectively one of the largest telecommunications providers worldwide, the letter noted.
"Many of its users rely on Skype for secure communications --- whether they are activists operating in countries governed by authoritarian regimes, journalists communicating with sensitive sources, or users who wish to talk privately in confidence with business associates, family, or friends," the letter said.
Skype is reviewing the letter, a spokesman said.
Skype users "work in the face of persistently unclear and confusing statements about the confidentiality of Skype conversations," including access by government agencies, the letter said.
The letter called on Microsoft and Skype to disclose what user information they collect and to disclose Skype's relationship with Chinese mobile provider TOM Online and other third-party licensees of Skype technology.
Other online companies, including Google and Twitter, release regular reports detailing request for user data by third parties, the letter noted.
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's e-mail address is firstname.lastname@example.org.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts