Feeds

Phone, slab location data 'is personal' - EU watchdogs

Don't slurp my snail-trail

Combat fraud and increase customer satisfaction

Data identifying mobile phone users' locations should count as personal data and receive a high level of protection, the EU's data protection watchdogs will tell the European Commission, according to a newspaper report.

If the Commission adopts the recommendation, provision for the protection of location-revealing data could be written in to the Commission's revised Data Protection Directive later this year.

Mobile networks record location data, but in the UK the information is only supposed to be available to law enforcement authorities through a court order obtained under the Regulation of Investigatory Powers Act (RIPA).

The New York Times reported an EU official as having said that the Article 29 Working Party is due to make its opinion public on Friday. The Article 29 Working Party is made up of data protection regulators from 27 member countries and is independent of the Commission.

A source from the organisation said it was "very likely" that it would adopt an opinion on geographic location, the NYT reported.

Matthew Newman, a spokesman for the Commission's vice president Viviane Reding, said that protecting personal data obtained through new technologies was a priority for the Commission. Reding is leading a review of European privacy laws.

"The Commission is currently analysing all forms of new technology and we will take into consideration social network sites and the rise of data-sharing like photos and the use of cloud computing and behavioural advertising when we reform the Data Protection Directive later this year," Newman said.

"The technology has moved on in leaps and bounds since the Directive came into force more than 15 years ago, so what we want to do is see how people are using the technologies and how that relates to personal data to make sure that people's fundamental rights are protected," Newman said.

Last month, researchers Alasdair Allan and Pete Warden claimed that versions of Apple's iPhone and iPad devices stored information about where the devices had been.

Files containing coordinates for longitude and latitude and the time that the information was recorded were automatically copied and stored, without protection, on a user's computer when the device connected to the machine, the researchers said.

"As far as we can tell, the location is determined by triangulating against the nearest cellphone towers. This isn't as accurate as GPS, but presumably takes less power. In some cases it can get very confused and temporarily think you're several miles from your actual location, but these tend to be intermittent glitches," Allan and Warden said.

"This information being stored on the device raises concerns about access by third-party iOS apps which collect data and share with advertisers; by police and border controls agencies that in many countries routinely look through phones without warrants; as well as access concerns if the phone is lost," Simon Davies, director of lobby group Privacy International said at the time.

Apple subsequently updated its iOS 4 operating system and said it did not track users' locations.

The European Commission is currently investigating Apple following the researchers' apparent discovery. The UK, Ireland, Germany, France and Italy have all said that they are looking into whether Apple broke national data protection laws.

In 2009, MPs criticised Google after the company established a system to allow mobile users to permit tracking of their location. Google argued that it anonymously processed the data and only recorded it in the first place if mobile users consented.

Copyright © 2011, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Top three mobile application threats

More from The Register

next story
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
APPLE FAILS to ditch class action suit over ebook PRICE-FIX fiasco
Do not pass go, do cough (up to) $840m in damages
Whoever you vote for, Google gets in
Report uncovers giant octopus squid of lobbying influence
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.