Feeds

California votes for Google mail safeguards

Landmark legislation

  • alert
  • submit to reddit

The Power of One Infographic

The Californian state Senate has voted to introduce safeguards on email services that, like Google's Gmail, scan incoming and outgoing email for specific terms in order to display advertisements. Google views its new email service as an extension of its advertising business.

Despite intensive lobbying, and the full weight of right-wing think tanks and Internet marketing hypesters, keen to exploit the commercial potential of personal data troves, the Senate voted 24-8 to prevent the misuse of the data.

Few will object to the terms in Sen. Liz Figueroa's bill, which explicitly allows instant messaging and email providers to scan the text of messages for advertising and to remove spam and malicious code. However, data-hoarders won't be able to transfer it to third-parties or allow their staff to examine emails without consent. Most importantly, the service provider is forbidden from retaining "personally identifiable information or user characteristics obtained, derived, or inferred" from the scanning process.

Privacy campaigners have responded to the defense of "don't like it - don't' use it" by pointing to the pervasive nature of the service. Because content scanning is applied to incoming as well as outgoing emails, Internet users have the choice of being scanned or ignoring friends. "We're not going to have any choice but to send mail to people at Gmail just to function in the e-mail world," says campaigner Daniel Brandt.

"Quite simply, there is no hue and cry among e-mailers to have ads put into their e-mails, just as there is little or no interest among phone users to hear, at the beginning of a call, 'This conversation is brought to you by?'" the Sen. Figueroa had written, introducing the legislation. "In addition, there is a general abhorrence for the idea that the privacy and confidentiality we expect in virtually every other communicative medium is something that is, or should be, optional."

The wording may yet be amended. The bill now moves to the State Assembly, where the Democrats have a majority. ®

External link

Bill SB.1822 - Privacy: online communications

Related Stories

State senator drafts Google opt-out Bill
Google values its own privacy. How does it value yours?
Germans garotte Google Gmail over privacy
Google mail is evil - privacy advocates

Google's Ethics Committee revealed
Google decides banner ads, skyscrapers are not evil
Yahoo! blasts back at Google
Google files Coca Cola jingle with SEC
Big Brother nominated for Google Award

Mobile application security vulnerability report

More from The Register

next story
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.