Feeds

Yahoo! gets animated GIF commendation for defending user privacy

'If a company secretly fights a secret court, is it still PR?'

Internet Security Threat Report 2014

The Electronic Frontier Foundation has commended Yahoo! for parrying the federal government's attempts to secretly slurp user data.

Yahoo! was awarded a sparkling-star GIF and a commendation by the Electronic Frontier Foundation on Monday for its thankless fight to preserve its users' privacy against secret requests from secret courts in the democracy surveillance state known as America.

"Yahoo went to bat for its users – not because it had to, and not because of a possible PR benefit – but because it was the right move for its users and the company," Mark Rumold of the EFF wrote. "It's precisely this type of fight – a secret fight for user privacy – that should serve as the gold standard for companies, and such a fight must be commended."

Although Yahoo's fight was unsuccessful, and a ruling against it by the US Foreign Intelligence Surveillance Court of Review in 2008 caused it to hand over data, the EFF commended the Purple Palace for taking a stand.

Yahoo! is the only company in the EFF's "Who Has Your Back" report to have received a flashing gold star, as opposed to the static stars awarded to all other companies. However, the company "still has a way to go in the other Who Has Your Back categories," the EFF observed, noting that it is the last major email provider to not use HTTPS by default.

Besides Yahoo!, the EFF also recognized Twitter, MySpace, Sonic.net, Google, Comcast, and Amazon for fighting for their user's rights to privacy within the courts.

The commendation of Yahoo! for defending user privacy comes after reports surfaced that Marissa Mayer, has given each of Yahoo!'s 11,000 employees an athletic wrist band that can track movement, sleep patterns, and other data as part of a rumored revamp that will turn the Purple Palace into a futuristic panopticon. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.