Feeds

Comcast promises not to track subscribers

Except when they feel like it

  • alert
  • submit to reddit

Intelligent flash storage arrays

A little brouhaha started last week with a post to the Vuln-Dev mailing list, in which a contributor called J Edgar Hoover observed that Comcast's cable Internet service was using an Inktomi traffic server capable of recording the individual comings and goings of its subscribers.

Several days later the Associated Press' Ted Bridis ran the story after doing some legwork, but unfortunately neglecting to credit the original source.

We didn't see a great deal in this story beyond speculation, or you'd have read it here back on the seventh, when J Edgar stepped forward. To us it appeared to be an oversight by Comcast, whose techies probably didn't even realize what their new equipment was capable of.

The questionable equipment isn't necessarily a problem, though it could be if it were misused. ISPs and NSPs routinely use caching hardware to serve pages more quickly and balance traffic loads. Companies also gather aggregate traffic data which they sell to the ever-inquisitive advertising industry. This is all routine, and relatively harmless in and of itself.

The upshot is that Comcast has publicly stated that it wasn't tracking individual users' surfing habits and wasn't selling user-specific marketing data. The company further issued a guarantee that they won't do any such thing in future.

"Comcast reassured customers Wednesday that the information had been stored only temporarily, was purged automatically every few days and 'has never been connected to individual subscribers,'" Bridis writes.

Meanwhile, on the strength of the AP story, US Representative Edward Markey (Democrat, Massachusetts) got his privacy-advocacy knee a-jerking (not that it takes much to effect this phenomenon), and contacted Comcast warning them that they might or might not be in violation of federal law, depending on what they were or weren't doing with the data, which of course no one knows, and now probably never will.

But if we look at the Comcast subscriber agreement, we get the feeling that they wouldn't dream of collecting user-specific data, unless they happen to feel like doing so.

"Comcast considers the personally-identifiable Customer information that is collected to be confidential. Comcast will disclose to third parties personal information that Comcast maintains related to Customers only when it is necessary to deliver the Service to customers or carry out related business activities, in the ordinary course of business, for ordinary business purposes, and at a frequency dictated by Comcast's particular business need, or pursuant to a court order or order of any regulatory body having jurisdiction over matters which are the subject of this Agreement."

Mostly that's a lot of idiotic legal boilerplate meant to discourage frivolous lawsuits. The fact is there are laws which make it a crime to intercept a person's communications without their knowledge and consent; and subscriber agreements aren't quite at the point where they absolve companies of responsibility for criminal activity.

Not yet, anyway. ®

Remote control for virtualized desktops

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.