Internet giants can access your data, too
Internet companies can access your data even as they secure it from intrusion by others
IDG News Service - Security protections have been tightened at many of the major online services, as firms like Google and Microsoft pledge to protect their users against unwanted prying eyes. But while many people fret about unwarranted government access to their data, the Internet firms themselves play by their own set of rules.
Some of the heat directed lately at the U.S. National Security Agency was focused this week on Microsoft instead. On Wednesday, Microsoft revealed that it had taken a peek at a French blogger's personal Hotmail emails as part of a company investigation into trade-secret leaks.
Microsoft said it had a right to do so, because its policies allow it to search personal emails to protect its intellectual property. In this case, a former Microsoft employee allegedly leaked Windows RT updates to the blogger via email. Microsoft's terms of service state that it's forbidden to use the company's services to upload or otherwise make available files that contain software or other material protected by intellectual property laws.
Microsoft responded to the criticism by pledging to update its procedures to make them more "transparent." In the future, it said, a separate legal team at Microsoft will review any evidence and proceed "only if that team concludes there is evidence of a crime that would be sufficient to justify a court order, if one were applicable." It will then submit the evidence to an outside attorney -- a former federal judge -- and conduct a search only if that person agrees with its conclusions.
But Microsoft's explanation of why it needs to pursue this route is itself telling. "Courts do not issue orders authorizing someone to search themselves, since obviously no such order is needed," it explained. "So even when we believe we have probable cause, it's not feasible to ask a court to order us to search ourselves."
In other words, there are no laws preventing Microsoft from looking at the data in its own services, so only Microsoft can decide when it's appropriate.
There are at least two class-action lawsuits looking at the way Google's automated systems scan emails for advertising and other purposes. One of the suits accuses Google of crossing a "creepy line" by scanning the data of Apps for Education users to build profiles that could be used for marketing, according to a report this week in Education Week.
- AWS and Jaspersoft Disrupt BI TIBCO Jaspersoft for AWS and Amazon Redshift disrupt business intelligence with cost-effective analytics in the cloud. Available by the hour in a pay-as-you-go...
- Cloud BI Demo: Jaspersoft for AWS Watch a 5-minute overview demo of Jaspersoft for AWS and see how to easily and affordably build business intelligence solutions as well as...
- Automating Cost Transparency By making all of the costs of running IT transparent, IT can change the way business units consume IT resources, drive down total...
- Forrester: The Business Technology Value Scorecard The "Business Technology Value Scorecard" paper proposes four categories of KPIs as the basis for a common language of metrics between IT leaders...
- Cloud BI in Action: Recorded Webinar of Customer, Kony, Inc. See how Kony, Inc., a leading enterprise mobility company, is using TIBCO Jaspersoft for Amazon Web Services and Redshift to achieve embedded analytics...
- Cloud BI Overview: Jaspersoft for AWS Check out this overview of Jaspersoft for AWS, to easily and affordably build business intelligence solutions as well as embed visualizations and analytics... All Business Intelligence/Analytics White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!