Court decision in Google Street View case called unpersuasive, flawed
Tech think-tank argues Google did not violate Wiretap Act
Computerworld - A U.S appellate court's decision earlier this week to permit a wiretapping case against Google to proceed, is based on flawed reasoning, a leading technology think-tank says.
On Tuesday, the U.S. Appeals Court for the Ninth Circuit rejected Google's motion to dismiss claims that it had violated the federal Wiretap Act when it collected data from unencrypted Wi-Fi networks when capturing Street View photographs.
In 2010, Google admitted that its Street View cars had inadvertently captured data transmitted by open Wi-Fi networks in homes and businesses when shooting photographs. The company publicly apologized for what it claimed was an honest mistake and offered to destroy or make inaccessible the nearly 660GB of data it had collected from the networks.
Several individuals later sued Google, claiming the company had violated the Wiretap Act, which prohibits the intentional interception of electronic data. In the lawsuit, the plaintiffs noted that Google's Street View cars had recorded a considerable amount of data from open Wi-Fi networks including SSIDs, MAC addresses and even "payload" data such as personal emails, passwords, videos and documents.
Google claimed that it had not violated any laws because the data it had inadvertently collected had been unencrypted and was "readily accessible to the general public," and was therefore statutorily exempt under the Wiretap Act.
The company maintained that under the Wiretap Act, people who do not make an affirmative attempt to make their communications private, can have no expectation of privacy if that communication is later intercepted over an open Wi-Fi network
A District Court judge who heard the case rejected Google's argument and held that the company had indeed violated the Wiretap Act. In coming to its conclusion the judge noted that the statutory exemption that Google claimed under the Wiretap Act only applied to "radio communications," and not to electronic data transmitted over a Wi-Fi network, because the term was not defined in the Act.
The judge also maintained that unencrypted communications sent from or received by an open Wi-Fi network was not generally accessible to the public, as defined under the Wiretap Act.
The three-judge panel from the Ninth Circuit that considered Google's appeal of the District Court ruling also came to the same conclusion. In a 35-page ruling, the panel concurred with the District Court's ruling and rejected Google's motion for dismissal of the lawsuit.
Like the District Court judge, the appellate court judges too held that payload transmitted over an open Wi-Fi network is not "radio communication" as defined under the Wiretap Act, and is therefore not exempt under the act.
The judges also maintained that Wi-Fi transmissions over an unencrypted network are not readily accessible to the general public, because "they are geographically limited and fail to travel far beyond the walls of the home or office where the access point is located."
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Privacy White Papers | Webcasts