Cloud Privacy, An Unreasonable Expectation?
This morning it was announced that Google and other companies bypassed the privacy settings of iPhone users and computers using Apple’s Safari browser. After the discovery, Google, who has been reprimanded both here and abroad for violating privacy guidelines and policies, removed language from its site indicating Safari users could trust the Safari's privacy settings to prevent tracking. In a separate story Twitter acknowledged that it had copied the entire address books from both iPhones and Android smartphones. The question is does this matter?
An ex-colleague found my interest in online privacy, quaint or antiquated. He stated that he had given up his online privacy years ago and, in fact, for users of social media sites, only 28% have an expectation of privacy. I, too, have given up more information than I like just in writing this blog. I have to register at all kinds of sites to gain access to research in order to present supporting statistics. Consequently, I usually receive an undesired burst of junk mail and unsolicited information after every new site registration. In fact, some 76% of adults believe that their online data is distributed too widely. However, I still maintain a belief in a “reasonable expectation of privacy”.
Charles Katz was using a telephone booth in 1967 to communicate illegal gambling bets from Los Angeles to other cities. However, the FBI using had attached a listening device to the booth and recorded his conversations. Using that information, Katz was convicted but his lawyers appealed. Ultimately, the case reached the Supreme Court where Katz prevailed 7-1. The argument was since it was a “private conversation in a public place” a search warrant was required thus leading to case law in support of a “reasonable expectation of privacy”.
It seems as though we face a growing need to develop establish law to protect us from the actions of companies that can secretly or knowingly use our private information for either research or commercial exploitation. It is clear that self monitoring to comply with publicly stated policies is not effective. This is a threat to individuals and also to the commercial interests of cloud computing.
A survey found that 70% of businesses expect their data to be kept private and secure when using cloud computing services. This is important for hosted service providers such as Broadvox. Business customers must believe we will honor our policies and contractual agreements to protect and avoid the misuse of their data. 80% of users of cloud computing services have expressed a growing concern over data security and privacy. Whereas, most conference and industry panels concentrate security discussions on the strength of firewalls, encryption and access management, the greatest risk of a security breach is from within the service provider infrastructure. Therefore, it is very important that the service provider become a trusted entity with the proper development and execution of internal security and privacy practices.
Unified Communications as a Service (UCaaS) and other cloud computing applications must deliver what is expected, going beyond what may be considered reasonable.
See you on Monday!