Ford exec says automaker doesn't collect or share car location data
Automaker contends it only uses data for customer requests and to troubleshoot problems
Computerworld - A Ford executive told U.S. Sen. Al Franken (D-Minn.) that the automaker does not collect or share location data from cars without the operator's explicit permission.
Franken had asked Ford CEO Alan Mullaly for the information after Ford marketing chief Jim Farley told reporters at the Consumer Electronics Show last month that the company has a pretty good idea of a person's driving habits based on data compiled from the navigation system data in their Ford vehicle.
In a letter, Franken asked Mulalley to spell out precisely what data Ford collects via in-vehicle GPS systems and how the company obtains driver consent to collect and share that data. Franken also asked who the information is shared with, how long it's stored and what security measures are used to protect it.
In a letter released by Franken this week, Ford's vice president of government relations Curt Magleby maintained the automaker only collects and uses location information from vehicles to support specific customer requests for service and to troubleshoot problems.
He contended that Ford has strong accountability for the handling of any personally identifiable information of car owners, and that it employs strong physical, technological and administrative controls to protect the data.
Additionally, the company allows customers to delete any stored location data by calling the company, he said.
Magleby said that the embedded navigation systems in all Ford 2013 and 2014 model year vehicles store latitude, longitude, and timestamp data in a temporary buffer onboard the vehicle. The location data is typically stored for two to three weeks but is never transmitted off vehicle to Ford or any third-party Magleby said.
Ford's voice-activated SYNC system, which controls audio, climate, navigation and other features, can be paired via Bluetooth to a driver's mobile device, he said. Thus Ford can deliver a variety of other SYNC services, such as turn-by-turn navigation, traffic updates and business searches. A customer can also upload vehicle diagnostic information to Ford via SYNC, when it is paired with a customer's mobile device.
Some of the wirelessly connected applications involve off-vehicle transmission of location data, travel direction, saved charge locations (in the case of electric vehicles) and other information, to Ford and third-party service providers.
In all cases, the applications require specific consent from the vehicle operator via in-vehicle prompts, website user agreements or mobile app agreements, before they collect and transmit data from a vehicle. Ford and third-party service providers do not hold on to any personally identifiable location data collected via these services for more than 90 days, Magleby said.
The only time Ford shares location data with government or with law enforcement is in the event of an accident or in response to a court order.
In a statement, Franken said he was glad that Ford had responded to his question but said that companies need to provide more to information about location data collection practices to consumers.
"This is sensitive information -- and notices to consumers about this sensitive data shouldn't get lost in fine print," Franken said.
The Senator said he will soon reintroduce a location privacy bill he filed last year.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His email address is firstname.lastname@example.org.
Read more about Mobile/Wireless in Computerworld's Mobile/Wireless Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Omnichannel: From Buzzword to Strategy Customers demand a seamless experience across channels, especially mobile. Read this whitepaper for a research-based framework for using omnichannel for higher customer engagement.
- The 5 Big Lies About Going Mobile You've heard about the power of mobile to change your business. But have you realized your mobile potential? It's about much more than...
- Developing a Winning Mobile Strategy: Playing Offense vs Defense Don't lose time and money with a "throw an app against a wall to see if sticks" approach to mobile. You need a...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Workforce Mobilization for Improved Productivity A mobility research director from Aberdeen discusses reasons for extending legacy applications to mobile devices, and an integration strategist from Attachmate shows how...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Mobile/Wireless White Papers | Webcasts
As emerging technologies evolve they often find an initial niche in highly specialized scenarios, or in specific industry verticals, before expanding to wider areas of applicability. Within these initial niches, the early adopters can be anything from digital enthusiasts to fashionistas, or they can be folks simply using the technology because it serves a specific need extremely well. (free registration required) more