Deal Allows Google To Keep Users' WiFi Data Confidential

GoogleStreetViewCar

The Connecticut Attorney General has agreed that Google need not turn over "payload data" -- including WiFi users' passwords, emails and the sites they visited -- accidentally collected by its Street View cars.  

Instead, Connecticut's top law-enforcement official allowed Google to stipulate that its cars collected such data. George Jepsen, who is spearheading a 40-state investigation originally launched by predecessor Richard Blumenthal (now a U.S. senator), said agreement paves the way for a settlement of the privacy issues posed by Google's WiFi snafu.

Google admitted last year that its Street View cars collected URLs, passwords, emails and other data sent over unencrypted WiFi networks. Google apologized for the interception, and said it intended to destroy the data, but also says that it did not violate any U.S. laws by collecting data from unsecured networks.

News of the interceptions pitted digital-rights advocates against each other -- with some groups, including the Electronic Privacy Information Center, arguing that Google should reveal what it collected to government officials. Others, like the Electronic Frontier Foundation, maintained that disclosing the communications could further compromise users' privacy.

Google's revelation also triggered investigations in the U.S. and abroad, where many countries have broad privacy laws. In the U.S., in addition to the probe led by Connecticut, the Federal Trade Commission and Federal Communications Commission launched investigations. The FTC closed the matter without taking action, but the FCC probe remains ongoing.

Google's admission also sparked more than a dozen potential class-action lawsuits in the U.S., which were consolidated into one case now pending in federal court in San Jose.

The search giant recently filed court papers asking for that case to be dismissed. The company argues that federal wiretap law only prohibits companies from collecting material from password-protected networks, not unsecured ones. The statute itself says it's not unlawful to intercept communications that are "readily accessible to the general public."

Last week, consumers who are suing opposed that motion. They argued in court papers that even unsecured WiFi networks should not be considered accessible to the public. "Google would have the Court believe that what it did was no more invasive than 'free-riding' a neighbor's WiFi network to access the Internet without payment," the consumers argued. "Google intentionally went far beyond identifying home-based wireless networks or even surfing the Web over them."

The search giant continues to deal with fallout abroad. Late last year, the New Zealand privacy commissioner reported that Google broke that country's law by capturing WiFi transmissions. South Korea authorities likewise said that Google violated the country's law.

 

Next story loading loading..