Feeds

MS: We'll slash search data retention if big boys play ball

Anonymise after six months...

Secure remote control for conventional and virtual desktops

Microsoft will only agree to European demands to slash the time it keeps online search query data if Google and Yahoo! adopt the same methods.

The software giant said yesterday it supports the Article 29 Working Party’s guidelines for anonymisation on the web, before adding that such rules can only be adopted if they are introduced industry-wide.

The Article 29 Working Party is a group of European Union bureaucrats who have been pushing to get search engine firm’s to purge their user records after six months.

But, while MS claims to agree in principle with such a move, the company is refusing to budge until its rivals cut back the amount of time they keep private data.

Microsoft also pointed out that it only holds about two per cent of the online search market in Europe, so it doesn’t really have the muscle to go it alone with privacy web standards.

Here’s a statement from Redmond chief strategist Peter Cullen in which he pleads with the big boys to play nice.

[I]t is imperative that all search companies adopt the same standard to better protect people's privacy. We agree with the Article 29 Working Party's call for a common industry standard for search data anonymisation methods and timeframes to help protect people's privacy.

We've evaluated the multiple uses of search data and believe that we can, in time, move to a six month timeframe while retaining our strong method of anonymisation.

However, we don't believe that Microsoft moving alone will offer the level of consumer protection desired by the Working Party. While we're certainly working to grow our market share, today Microsoft has only two per cent of the search market in Europe and a small share globally.

We can't do it alone — all search companies must embrace high privacy standards to provide greater protection for European consumers.

Google has long argued that keeping the data meant it could offer improved services and cope better with combating fraud and spam.

However, in September this year Google agreed to half the amount of time it retains IP addresses and user data garnered from search query logs.

The internet kingpin said it would anonymise IP addresses on its server logs after nine months “to address regulatory concerns to take another step to improve privacy for our users”.

But Mountain View later admitted to El Reg that it will only "change some of the bits" in the user IPs stored in its server logs. So as the plan stands now, it will leave cookie data alone. ®

Beginner's guide to SSL certificates

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.