Amazon 'adware' laden Ubuntu passes ICO's data smell test

Linux love for Bezos' goods is not illegal, says UK watchdog

Providing a secure and efficient Helpdesk

The Amazon "shopping suggestions" feature built into Ubuntu desktops does not violate consumer protections under European and UK privacy law.

That’s according to the Information Commissioner following a complaint lodged by a Ubuntu blogger over Ubuntu’s controversial Shopping Lens.

Introduced in Ubuntu 12.10, the Amazon Lens combined results from users’ desktop search with supposedly relevant product search results from Amazon.

The Lens debuted in the 12.10 beta in late 2012 and ignited a immediate firestorm of protest.

Two years later, the ICO has now said it’s satisfied that Canonical, chief steward of Ubuntu, has “reasonably ensured compliance” with the Data Protection Act.

In other words, it’s happy users’ data and privacy are protected.

Further, built-in Lens notifications for users built into the Ubuntu desktop means Canonical “reasonably ensured compliance” with the DPA.

Also, according to the ICO, Canonical has given users “suitable information” to help people in turning off or disabling the feature.

“As a result, we do not consider that any further action is required by the ICO at the moment,” the ICO said in a letter published on blogger Luis de Sousa’s site.

Contacted by The Reg, the ICO confirmed the letter is genuine.

The UK’s data watchdog was responding to complaints from blogger De Sousa, who contacted the ICO.

De Sousa had campaigned against the Amazon Shopping Lens feature for some time, going as far to launch an online petition against it.

At the time, the Lens feature debuted, in 2012, Ubuntu diehards revolted and threatened to dump their favorite Linux for Mint, a rival distro modelled closely on that of Mark Shuttleworth.

Concern centred on the collection of users’ data and exposure to a third party – Amazon.

The issue went right to the top of the Ubuntu tree, with Ubuntu daddy Mark Shuttleworth trying to quell concerns. He said users' anonymity was protected bcause Canonical’s own servers conducted the searches and stood between users’ desktops and the mighty server farms and product-slinging systems of Jeff Bezos’ Amazon.

He also denied Canonical would be selling ads or product placements.

Such was the revolt, though, that Canonical’s engineers introduced a button allowing users to kill the adware feature before the final release of Ubuntu 12.10.

Closing the blog post, and the shopping matter, De Souza wrote: "I rest my case. I am still happy to use Ubuntu (with the Shopping Lens switched off)." ®

Providing a secure and efficient Helpdesk

More from The Register

next story
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
prev story


Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.