Feeds

OnStar backs down over GPS tracking of ex-customers

Slams brakes after consumer revolt

The Power of One eBook: Top reasons to choose HP BladeSystem

OnStar has backed down from a proposed change in its terms and conditions that would have seen the vehicle info system collecting car monitoring data on former customers.

The OnStar system, operated as part of General Motors, embeds a mobile phone and GPS in customer’s cars and relays a constant stream of data back to the company recording basic speed and location, whether the driver is wearing a seat belt, and tire pressure, as well as reporting accidents. This latter function is the system’s principal selling point, and numerous lives have been saved by the car alerting emergency services that a crash has occurred.

But last week OnStar decided to change its terms and conditions, so that if a customer cancelled the service it would still collect the data. To make matters worse it retained the right to sell it to any third party - unless it received a specific opt-out request. Such information would be a valuable commodity for advertisers, but under the new terms OnStar could conceivably have sold the data to law enforcement looking to issue tickets or insurance investigators examining crash claims.

The move provoked something of a storm among the public, and prompted Democratic senators Al Franken of Minnesota, Chris Coons of Delaware, and Charles Schumer of New York to contact the company about its policy, the latter calling it “one of the most brazen invasions of privacy in recent memory” and suggesting a Federal Trade Commission investigation. Now, barely a week later, OnStar has abandoned the proposed changes.

“We realize that our proposed amendments did not satisfy our subscribers,” OnStar president Linda Marshall said in a statement. “This is why we are leaving the decision in our customers’ hands. We listened, we responded and we hope to maintain the trust of our customers.”

While the company has backed down on its initial proposal, the move has also sparked an investigation by some customers into what OnStar can do with their private data under the current terms and conditions.

“I’m glad to see OnStar responding to its customers, however simply amending their terms and conditions to stop monitoring a vehicle after the user cancels is not enough to satisfy the level of privacy OnStar customers received prior to these updates,” writes forensic scientist, customer, and part-time hacker Jonathan Zdziarski.

“To win back the respect of the many customers who must have canceled over the new terms, OnStar will need to make a full 180 and agree not to collect customer GPS information “for any purpose, at any time”, but only when the customer would expect it to be collected, as the old contract enforced.” ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.