Home
BYTE Newsletter
Keep up with all the BYTE News and Reviews

Subscribe
David Chernicoff

David Chernicoff



Google's New Privacy Policy Strips Away Users' Anonymity

Comments | David Chernicoff, BYTE | January 25, 2012 12:40 PM

Category: Smartphones, Social Networking

Framed in glowing terms on its official blog site, Google’s new simplified privacy policy might, on the surface, seem like a simpler alternative than trying to explain 70 different privacy policy documents to end users, but the truth is, its decision to link together information from the 60 or so different Google offered services is anything but a privacy improvement. Normally I would agree that simplicity is a good thing, but I think that Google might have gone way overboard with this decision.

More Insights

Webcasts

More >>

White Papers

More >>

Reports

More >>

Basically it boils down to this: If you are logged in to Google it might choose to combine information you have already provided in one of their services with the capabilities of another service. This isn't just agreeing to a single sign-in across all of the services offered by Google; it's allowing Google to use information that you have provided to any of their services to "improve" your user experience.


Google's new privacy policy: protection or a trap?

It's also likely to mean that the same policy that applies to one service, such as Google+, will be applied across all of the Google services. So if you've allowed yourself to use Google+, with its real-name policy, you might suddenly find that your YouTube videos of yourself doing stupid frat boy tricks, posted under the pseudonym you used on YouTube, might be linked with your business posts on Google+. In an era in which employers already scrutinize employees' publicly posted information on sites such as Facebook, it seems like not having an in-depth understanding of exactly what you are agreeing to with Google's privacy policy could have some very unexpected consequences.

Although some hypothetical "average" user might already be using a single online identity for everything, it is far more common for people to take pains to separate, at the very least, their personal and business lives. And don't think that you can choose to opt out of this new policy; that's not an option. When it goes into effect on March 1, you won't be given a choice.

If you're thinking, "Well, all I have is a personal Gmail account and I don't really see a problem here," I hope you're not an Android smartphone user, because you had to provide the login information when you set up your phone. You know the one that you carry with you all the time, that is always logged in to Gmail, and that knows where you are because of that built-in GPS. Big brother is not only tracking you, but it's watching your online footprint, correlating things you do or talk about in email, analyzing your Web searches, keeping track of navigation that you have done, and cross checking the various components of your life that you have given Google access to, all in the name of "improving your user experience."

If you're a Gmail user you might already have noticed that you get ads at the top of the page that are targeted to you based on your searches and email content. The more information Google is able to obtain about you, the more carefully it can target its ads, increasing the click-through rate and charging more for its advertising based on the success of those targeted ads. That's one of the ways that Google funds all of the "free" services that are so popular with users.

But what we are talking about now goes well beyond that simple targeted ad. Let's consider the simple event of going away for the weekend. You mark in your Google calendar that you're planning on attending an event in a different city from home. Google starts sending you hotel, restaurant, and activity suggestions for that city. Perhaps it also reminds you that you have a half-dozen friends and family members in that city that you could visit.

It seems rather innocuous, but this also means that your Google+ friends in that city might also be told that you are in town, because you didn't tell Google to keep that piece of information private. In current Google fashion you will likely have to navigate a maze of screens and menus to determine what information is made available and what isn't, should you choose to turn features on or off. Perhaps those friends are also relatives who are now annoyed that you didn't call to say you were visiting. No one really wants that guilt call from their mother because she found out via Google that you were in town and didn't visit.

Okay, maybe that doesn't sound so bad. But what happens when it isn't your mother but your employer who, thanks to the fact that the Android phone in your pocket that you used to find your way to a job interview, is one of your Google+ associates who now knows that you just navigated to the location of your company's biggest competitor?

Not so innocuous anymore, is it?



Related Reading




Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

BYTE encourages readers to engage in spirited, healthy debate, including taking us to task. However, BYTE moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. BYTE further reserves the right to disable the profile of any commenter participating in said activities.

COMMENTS

Tune In to BYTE
Facebook Twitter LinkedIn Newsletter RSS
Whitepapers
whitepaper
In this paper you will learn the five trends shaping the future of enterprise mobility. Learn how the rise of social media as a business application, the lurring between work and home, the emergence of new mobile devices, the demand for tech savvy employees and changing expectations of corporate IT will fundamentally change the workplace.
whitepaper
In a survey of more than 1,700 information workers (iWorkers) in North America, notebooks, desktops, and smartphones were found to be “must-have” devices, while tablets, slates, and netbooks were relegated to “nice-to-have” status, according to a commissioned study conducted by Forrester Consulting on behalf of Dell and Intel.
Sponsored by: Dell
Upcoming Events


Oct 20: Becoming a Security Detective - Gathering and Analyzing Security Intelligence in the Enterprise

In this all-day virtual event, experts will offer detailed insight in how to collect security intelligence in the enterprise, and how to analyze and study it in order to efficiently identify new threats as well as low-and-slow attacks such as advanced persistent threats. Register today!

Platinum Sponsors: ArcSight, NetIQ, Proofpoint, Thawte
Gold Sponsor: Q1 Labs



October 6: InformationWeek 500 Virtual Event: The Need for Speed

At the 2011 InformationWeek 500 Virtual Conference, C-level executives from leading global companies will gather to discuss how their organizations are turbo-charging business execution and growth.

Platinum Sponsor: ArcSight, Workday
Gold Sponsor: IBM


Aug 25: InformationWeek & Dark Reading present: How Security Breaches Happen and What Your Organization Can Do About Them

Attendees will get insights on how to prevent breaches from happening, how to research and identify the source of a breach, and how to remediate a compromise as quickly and efficiently as possible.

Platinum Sponsor: ArcSight, NetIQ, Thawte
Gold Sponsors: Lumension, NetGear, GFI
Silver Sponsor: Motorola


July 28: InformationWeek & Symantec present: Infrastructure at Risk -- Taking Decisive Action to Secure Your Critical Data Assets

Join the editors of InformationWeek and leading security experts from Symantec for an in-depth look at the current threats faced by large and small organizations, and the implications for your business, your customers, and even your country. You'll hear how today's threat landscape is changing drastically, and learn the latest countermeasures and best practices to keep your company's precious data assets out of the hands of determined cybercriminals.


July 27: Electronic Health Records -- Moving from Concept to Reality

At this InformationWeek Healthcare Virtual Event, we will talk with healthcare practitioners, IT professionals and other industry experts about issues surrounding EHR selection, deployment and use.

Platinum Sponsor: HP, Intel, GBS, Geotrust, NextGen
Silver Sponsor: Proofpoint


On-Demand: InformationWeek & Interop present: Business Mobility Unleashed

In this virtual event, the leaders behind InformationWeek Business Technology Network and Interop zero in on the top mobile technologies and techniques you'll need to understand and master to ensure your organization thrives in the wireless world.
Platinum Sponsors: Alcatel-Lucent, APC
Gold Sponsor: HP
Silver Sponsor: Emerson Network Power
Bronze Sponsor: Skybot


On-Demand: Cybersecurity Best Practices

In this half-day virtual event, experts assess the state of cybersecurity in government and present the latest strategies for creating a more secure, attack-proof IT infrastructure. This event will help CISOs and other information assurance professionals in federal, state, and local government stay on top of the latest developments in the field.
Platinum Sponsor: GeoTrust
Gold Sponsor: Bit9


On-Demand: Data Center Transformation

Data centers are undergoing incredible transformations that create both opportunities and challenges for IT professionals. Server virtualization enables rapid provisioning, more efficient use of resources, and improved disaster recovery. That trend will continue with storage and network virtualization, allowing IT pros to further abstract -- and optimize -- data center resources.In this virtual event, you will learn how prepare your organization for a data center transformation.
Platinum Sponsors: AMD, APC, Cisco, Eaton, SunGard
Gold Sponsor: Emerson Network Power


On-Demand: Cloud Computing Roadmap: Controlling the Cloud - Managing, Optimizing and Integrating Cloud Services with Your Existing IT Infrastructure

In this virtual event, you'll learn how to craft your own strategy for successfully embracing and integrating new cloud computing capabilities without derailing or destroying your current IT roadmap.
Platinum Sponsors: ArcSight, GoToAssist, SunGard, thawte
Gold Sponsor: Symform
Silver Sponsor: Skybot


On-Demand: Plugging the Leaks -- Finding and Fixing the IT Security Holes in your Enterprise

In this virtual event presented by Dark Reading and InformationWeek, you'll find out how criminals target the flaws in your IT environment, and you'll get some insight on the best methods for finding and fixing your vulnerabilities -- before you're hit by malware or unauthorized access.
Platinum Sponsors: NetIQ, Novell, thawte, Webroot
Gold Sponsors: ArcSight, Bit9, OpenText
Silver Sponsor: Application Security, Core Security, Lumension

 



The 2011 Informationweek 500 Conference will be held at the beautiful St. Regis Monarch Beach Resort, Dana Point, CA. Mark your calendars for September 11-13, 2011.



InformationWeek Healthcare IT Leadership Forum




Bank Systems & Technology Executive Summit 2011