U.S. Regulators Probe Google's Safari Breach

By Shawn Hebert March 19, 2012

U.S. Government officials have launched an investigation into Google for bypassing the privacy settings of users of the popular Safari Web browser by Apple.

The investigation stems from a February 17, 2012 report published by Stanford researcher Jonathan Mayer, and subsequently reported on by the Wall Street Journal. The author of the report found that Google, along with several other companies, had been using code to override Safari Web browser's default privacy settings in order to monitor its users across Apple devices, including the iOS platform.

In a phone interview with TalkingPointsMemo, Mayer stated that the Federal Trade Commission has a “slam dunk” case against Google.

“The facts in this care are unusually clear cut,” said Mayer. “It's fairly clear Google made misrepresentation and under the consent order established from the Google Buzz debacle, it was required that they not make misrepresentations going forward. It's fair to say they weren't in compliance.”

Last year, the FTC charged Google with deceptive practices related to its failed networking service, Google Buzz. Under the Buzz settlement, of which Google did not admit to any legal wrongdoing, the company promised not to misrepresent its privacy policies and agreed to 20 years of independent privacy audits.

In an interview with the Wall Street Journal, Justin Brookman, director of consumer privacy project at the Center for Democracy and Technology, told the source that while he agrees it's a clear case of deception, the FTC may have a difficult time proving that the actions of Google were intentional.

“Google can credibly argue, 'We meant to do something else which was borderline, but probably not deceptive,'” he said. “I think over the past year or two, there has been an effect on Google's image. It definitely has to concern them.”

An FTC spokesperson noted the agency will not comment on the investigation. Google has since stopped the practice as of last month and the company has stated that they will cooperate with privacy regulators.




Edited by Braden Becker

TechZone360 Contributing Writer

SHARE THIS ARTICLE
Related Articles

Secure Shell Key Management in Light of OpenSSL Vulnerabilities: Part 2

By: TMCnet Special Guest    3/2/2015

Identity and access management solutions assist in controlling the access to cloud infrastructure, applications, servers and both structured and unstr…

Read More

The FCC's Big Net Neutrality Day

By: Peter Bernstein    2/27/2015

I am going to admit to being surprised by the U.S. Federal Communications Commission's (FCCs) Open Internet decision. FCC Chairman Tom Wheeler's new n…

Read More

FCC Vote Endorses Title II Approach to Net Neutrality

By: Paula Bernier    2/26/2015

After months of debate and the collection of comments from four million Americans, the Federal Communications Commission today voted on - and approved…

Read More

Frontier Customers Get DVR-Driven Free and Web TV

By: Bob Wallace    2/26/2015

In what could be a match made in cord cutter heaven, Frontier Communications said it will bundle the TiVo Roamio OTA DVR with its high-speed data serv…

Read More

Secure Shell Key Management in Light of OpenSSL Vulnerabilities: Part 1

By: TMCnet Special Guest    2/25/2015

Ever since computers started connecting to each other, people have been thinking about how to keep information on them secure. As the Internet evolved…

Read More