Feeds

ICO reopens Google Street View privacy probe

Move follows slurp-car confessions by ads giant

Choosing a cloud hosting partner with confidence

The Information Commissioner's Office is reopening its investigation into Google's collection of unsecured Wi-Fi by its fleet of Street View cars.

The change of heart by the regulator comes in the light of tougher stances taken by other countries, and Google's confession on Friday that its cars collected entire emails, URLs and passwords.

The search giant previously said it had only collected MAC addresses and information to identify individual networks.

The UK privacy regulator looked at Street View snooping earlier this year but concluded that no meaningful personal information was collected. Google claimed the data was collected accidentally.

A spokesman for the ICO told the Guardian that it would look again at the data slurp.

The spokesman said:

Earlier this year the ICO visited Google's premises to make a preliminary assessment of the payload data it inadvertently collected while developing Google Street View. While the information we saw at the time did not include meaningful personal details that could be linked to an identifiable person, we have continued to liaise with, and await the findings of, the investigations carried out by our international counterparts."

"Now that these findings are starting to emerge, we understand that Google has accepted that in some instances entire URLs and emails have been captured.

We will be making enquires to see whether this information relates to the data inadvertently captured in the UK, before deciding on the necessary course of action, including a consideration of the need to use our enforcement powers.‬

Google has appointed a director of privacy to oversee improvements in its practises and promised to train all staff and consider the privacy implications of all its products. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.