18 firms sued for using privacy-invading mobile apps
- 15 March, 2012 22:21
Facebook, Apple, Twitter, Yelp and 14 other companies have been hit with a lawsuit accusing them of distributing privacy-invading mobile applications.
The lawsuit was filed by a group of 13 individuals in the United States District Court for the Western District of Texas earlier this week. The suit charges 18 companies with surreptitiously gathering data from the address books of tens of millions of smartphone users.
"The defendants -- several of the world's largest and most influential technology and social networking companies -- have unfortunately made, distributed and sold mobile software applications that, once installed on a wireless mobile device, surreptitiously harvest, upload and illegally steal the owner's address book data without the owner's knowledge or consent," the lawsuit alleged.
The lawsuit seeks a permanent injunction against such data collection and the destruction of all personal data collected by mobile application vendors so far.
Most of the plaintiffs are from Austin and describe themselves in the complaint as users of Apple's iPhone users Android-powered handsets.
One of the companies, social networking service Path, was pressured last month into issuing a public apology after a Singapore-based programmer wrote a blog post describing how the company's journal application for iOS- and Android-based phones was secretly collecting address book data.
The apology by Path co-founder and CEO Dave Morin acknowledged that the company had made a mistake in gathering the data but noted that the information was collected purely to improve the quality of friend suggestions made by the application.
This week's lawsuit appears to have been inspired, at least in part, by an article in the New York Times in February which highlighted the practice by Path and several other developers and distributors of smartphone applications to collected data from address books without the user's permission. The article, headlined Mobile Apps Take Data Without Permission , was cited several times in the 152-page complaint.
The lawsuit comes at a time when privacy concerns over mobile applications appears to be steadily rising.
On Wednesday for instance, two senior lawmakers asked Apple for more details about the company's privacy policies for mobile applications running iOS software.
Rep. Henry Waxman, ranking member of the House Energy and Commerce Committee and Rep. G.K. Butterfield last month had asked Apple to respond to a series of questions about the company's polices for vetting the privacy practices of iOS mobile application developers.
The questions were prompted by the controversy surrounding the Path disclosure.
Apple submitted its initial responses earlier this month.
However, the two lawmakers this week contended that the letter did not answer all their questions and asked that Apple representatives brief members of the committee on the remaining issues.
Earlier this month, U.S. Senator Charles Schumer (D-NY) called on the Federal Trade Commission to investigate Apple and Google following reports that some iOS and Android applications uploaded photos from mobile phones without the user's knowledge or permission.
Apple, Facebook, Yelp and Foursquare did not immediately respond to a request for comment on this week's lawsuit. A Twitter spokesman said the company did not comment on pending litigation.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan , or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org .
Read more about security in Computerworld's Security Topic Center.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Path uploads your entire iPhone address book to its servers
- Mobile Apps Take Data Without Permission - NYTimes.com
- Lawmakers want Apple to brief them on iOS app privacy - Computerworld
- Sen. Schumer wants FTC probe of Apple, Google - Computerworld
- Computerworld Jaikumar Vijayan News
- Security Topic Center - Computerworld
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Advanced Malware Exposed
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. This ebook will provide readers with a new understanding of the rapidly developing cyber threat landscape and practical insights into how they can protect their data and computing infrastructures. Download now.
Moving to a Private Cloud? Infrastructure Really Matters!
The Cloud isn’t about locality. It is about quality of service delivery, cost, and whether the services consumed satisfy our objectives. For the enterprise, you need to select the right QoS to mitigate the inherent risks or you face the problem of losing data and the ability to execute operationally. Read on.
Endpoint Security and Virtualisation
Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.