Privacy groups have raised a number of concerns about Glass in recent months as the new technology has become available to early adopters, developers, and critics through Google's Explorer program. One of the biggest concerns is Glass' perceived potential as a tool to stealthily snap pictures and videos of people walking down the street, attending company meetings, hanging out in a bar, or simply going to the bathroom. Facial recognition is also a big fear with Glass; however, Google says it won't allow facial recognition on Glass until strong privacy protections are in place.
While Google's letter to Congress contains some lengthy responses to the privacy group's questions about Glass, Congressman Joe Barton, who co-founded the privacy caucus, says they won't suffice.
"I am disappointed in the responses we received from Google," Barton said in a statement. "There were questions that were not adequately answered and some not answered at all...Google Glass has the potential to change the way people communicate and interact...it is important that people's rights be protected and vital that privacy is built into the device."
Google's responses do come up short in a few areas. Barton and members of the Congressional privacy caucus asked, for example, what kind of device-specific information Google planned to collect from Glass. This could include hardware identification numbers, hardware model, operating system versions and so on--but Google's response to this relatively innocuous question was cagey at best.
- Enabling devices and device management for your mobility/BYOD program In this white paper, learn how to select the right mobile devices for your organization and manage them with efficiency, flexibility and security...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Personal Technology White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!