Feeds

Dropbox defends fantastically badly timed Condoleezza Rice appointment

'Nothing is going to change with Dr. Rice's appointment,' file sharer promises

Securing Web Applications Made Simple and Scalable

File sharing service Dropbox has taken to the internet to defend its ill-timed appointment of Condoleezza Rice to its board of directors.

The storage company wrote in a blog post that "there's nothing more important to us than keeping your stuff safe and secure" on Friday after being subjected to a full-throated outcry over its appointment of Dr Rice.

Condoleezza Rice was the 66th Secretary of State and served in the administration of George W Bush. She was a supporter of wiretapping, surveillance, the invasion of Iraq, and waterboarding.

Given recent revelations around the spy-happy NSA it was somewhat perplexing to see the former spy-friendly politician gain a seat on the board of a widely used file-sharing startup.

"We're honored to have Dr. Rice join our board — she brings an incredible amount of experience and insight into international markets and the dynamics that define them," the company wrote. "As we continue to expand into new countries, we need that type of insight to help us reach new users and defend their rights. Dr. Rice understands our stance on these issues and fully supports our commitments to our users."

Though Dropbox claimed that Dr. Rice's appointment wouldn't change its commitment to transparency and fighting government surveillance, many commentators on the blog post were not so impressed.

"She is a very accomplished person, I admire many things about her. She could serve well on the boards of many companies," said one, "but her being on the board of a company that should be as concerned about the rights of its customers as Dropbox should be, makes no sense."

It's worth noting that last time we checked, Dropbox had built the majority of its technology on Jeff Bezos's cloud wing Amazon Web Services – a company that last year successfully fought off IBM in gaining a $600m cloud contract for ... wait for it ... the CIA! ®

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.