Feeds

Google and Microsoft bombard Brussels over ad tracking

Intense lobbying

Maximizing your infrastructure through virtualization

Google, Microsoft and other special interests are subjecting the European Commission to the most intense lobbying campaign it has ever faced, over regulation of how data is used to target advertising online, according to officials in Brussels.

Commissioner Meglena Kuneva announced in March that her department would investigate whether it should intervene to protect consumers from potential harm caused by digital advertising companies tracking them across the web.

In response, dozens of representatives of technology, advertising and publishing have now bombarded the Commission with familiar suggestions that self-regulation is the best system for internet industries.

"Of all the topics we've covered this has generated the biggest industry response," an offical close to Kuneva told The Register.

"We've never known anything like it," she added.

Brussels aims to produce a green paper based on its research early next year, although the current cohort of Commissioners are due for reappointment or replacement before the end of this year, which may delay the draft.

A similar lobbying frenzy is expected on Capitol Hill, where Congressman last week signalled they don't believe self-regulation will be adequate to protect consumers from tracking by online commercial interests. Laws are being considered to insist on explicit opt-in consent for some technologies and sensitive types of data, such as financial histories.

Kuneva's research is wrestling with similar issues. She and her team will visit Washington in early October to meet Obama's new FTC chairman Jon Leibowitz and consumer organisations to discuss their concerns.

"The aim of the trip in the behavioural targeting aspect is to discuss possible approaches to shared concerns," an official said.

"The US has adopted a self regulatory approach so far and we want to hear about that experience. Do they think it is sufficient? Obviously some in Congress think it is not."

Kuneva's consumer rights investigation is separate to ongoing legal action against the UK government by telecoms Commissioner Viviane Reding over its alleged failure to properly implement European laws. The claimed enforcement loophole around interception was highlighted last year when The Register revealed BT had twice secretly trialled behavioural targeting technology provided by Phorm.

The resulting outcry and public opposition to the deep packet inspection effectively shut down Phorm's UK ambitions for the forseeable future. Other forms of behavioural targeting, such as Google's website display ad tracking cookies, which opt every user in by default, are already deployed. ®

Top three mobile application threats

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.