New software targets hard-to-understand privacy policies
The Privacy Icons browser add-on translates websites' privacy policies into nine easy-to-grasp categories
The companies' Privacy Icons software, released Monday for a pay-what-you-want fee, analyzes websites' privacy policies, breaking them down into nine categories, including location tracking, do-not-track browser request compliance and data retention policies.
"The end goal is to help individuals regain control of their personal information online," he said. "As a means to that end, we definitely hope that this project will inspire companies to improve their data practices and compete, even more, on the basis of privacy and security."
The software, available now for recent versions of Chrome, Firefox and Opera and with versions for Internet Explorer, Safari, and mobile browsers available soon, attempts to simplify website privacy policies.
"In the case of the Privacy Icons we hope to make data practices more transparent, so that people can make more informed choices when it comes to visiting websites and using services," Oppenheim said. "If a person feels comfortable sharing all their information with a certain site after seeing it has all red icons, that's better than the alternative, which is sharing all their information without any understanding that's happening."
While more transparency may be good news for Web users concerned about privacy, the bad news is that many of the Web's top destinations get some red marks from Privacy Icons.
Google.com, the world's most-visited website, according to Alexa's February rankings, received red marks in the data retention category, for no stated policy on when it deletes user data, and in the precise location category, for tracking users' geolocation.
Facebook, the No. 2 most-visited site, gets red marks for precise location and for expected use, for not disclosing whether data it collects about visitors is used in ways other than that they would reasonably expect.
Yahoo.com, the No. 4 website, gets a red mark for expected use. Twitter, No. 10, gets red marks in expected use and precise location, while Amazon.com, No. 11, gets red marks in four of the nine privacy categories, and grey marks, meaning the information is not available, in four more.
- Top 3 Myths about Big Data Security : Debunking common misconceptions about big data security Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are...
- Magic Quadrant for Data Masking Technology IBM is a leader in Gartner Inc's Magic Quadrant for Data Masking Technology. Read the full report to learn about IBM.
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different.... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!