Feeds

Google: Keep user data safe by letting us hoard it forever

Fleischer demands EU trust Google

Beginner's guide to SSL certificates

Google has sought to turn its China crisis to its advantage by arguing it demonstrates why it should be allowed to hang onto search logs indefinitely.

Privacy supremo Peter Fleischer told ComputerWorld in an interview that, "The unprecedented hacking... and the threat of similar such attacks in the future emphasized the importance of internal analysis of logs."

Google has been under particular pressure in Europe to stick a time limit on how long it hangs onto information that can be used to identity searchers.

In 2008 it halved the time it hung onto such info to nine months, a cut that still did not find favour with Eurocrats. It continues to hold data beyond that date, but says it does not hold the full IP address of users, effectively anonymizing the data, but still making it useful to the world's largest ad broker.

Microsoft has upped the ante by lowering the amount of time it hangs onto data about Bing users to six months. Which would be significant if anyone used the service.

"We find it reprehensible that a company would throw away useful data when it holding it poses no privacy threat," Fleischer thundered.

Which illustrates how Google's view of privacy differs from many other people's, and ignores the possibility of the data becoming a privacy (and/or security) threat if it fell into the hands of, say, Chinese hackers.

Fleischer also called for the creation of an EU panel featuring data protection and cyber security experts. This demand will be part of a submission to Europe's Article 29 committee on data protection, in which it will also rule out any further reduction in the amount of time it holds onto data.

This could presumably mean Fleischer spending even more time in Brussels. In December 2008 he was asked to join an EU quango which would advise on future data protection legislation.

Of course, Fleischer's not the only one who believes that the best way to preserve security (and sell a few ads as well) is by hoarding every bit of information a user generates. This is the same principle behind the UK government's Interception Modernisation Program. Except for the ads flogging bit.

We asked Google if it could add anything more to Fleischer's comments, or confirm if he was still serving on the data protection panel. They're still holding onto that data. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.