Feeds

Smartphone users sue Apple, Facebook over mobile app privacy

18 social media firms slapped with lawsuit

Beginner's guide to SSL certificates

Facebook, Twitter, Yelp and Apple, Foursquare and 13 other prominent social media firms have been hit with a lawsuit accusing them of supplying mobile applications that invade users' privacy.

The class-action lawsuit was filed by 13 private individuals in Austin, Texas – where geek tech fest SXSW has just shut up shop. The suit accuses 18 companies of harvesting the address books of millions of smartphone users without their knowledge or informed consent.

"The defendants - several of the world's largest and most influential technology and social networking companies – have unfortunately made, distributed and sold mobile software applications that, once installed on a wireless mobile device, surreptitiously harvest, upload and illegally steal the owner's address book data without the owner's knowledge or consent," the lawsuit alleges, PC World reports.

The people behind the lawsuit are seeking a permanent injunction prohibiting such data collection and the destruction of data previously gathered. Those behind the lawsuit describe themselves as users of Apple's iPhone as well as Android-based smartphones.

The lawsuit comes against the backdrop of growing concerns about the handling of sensitive information on mobile phones. At the beginning of February it was discovered that social media iPhone apps from Path and Hipster were uploading user address book information without seeking the consent of smartphone users. Path apologised and promised to mend its ways. Days later, Twitter came under fire for failing to explain that its "Find Friends" service accessed users' smartphone address books.

Democrat Senator Charles Schumer was prompted to write to consumer watchdogs at the FTC calling for action after the location-finding services on smartphones were also granted permission to siphon off users' photos on both iPhones and Android devices.

Smartphone security boffin Graham Lee recently told The Reg that the app development industry might not be able to retain existing business models – thus forcing up prices – should a crackdown take place on the practice of info-slurping in exchange for targeted ad bucks. ®

Security for virtualized datacentres

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Big Content outs piracy hotbeds: São Paulo, Beijing ... TORONTO?
MPAA calls Canadians a bunch of bootlegging movie thieves
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.