Twitter gets transparent; releases list of government data requests
- 03 July, 2012 19:06
Twitter has received more government requests for user information in the first six months of this year than it did in all of 2011, the company reported this week.
Taking a page from Google, the micro-blogging site released on Monday its first Twitter Transparency Report listing government requests for user information and to withhold content, and copyright holders DMCA takedown notices.
Google has had its own Transparency Report for the past several years and yesterday tweeted "props" to Twitter for releasing a similar report.
"Wednesday marks Independence Day here in the United States," wrote Jeremy Kessel, Twitter's manager of legal policy. "Beyond the fireworks and barbecue, July 4th serves as an important reminder of the need to hold governments accountable, especially on behalf of those who may not have a chance to do so themselves."
So here's a look at some of the numbers for the more than 20 countries that Twitter is listing:
- The United States, by far, had the most requests -- 679 seeking user information from 948 users or accounts. Twitter said it fully or partially complied with 75% of requests from the U.S. -- more than from any other country.
- With 98 requests, Japan was second highest. The Japanese government sought information on 147 users or accounts. Twitter reported that it fully or partially produced information for 20% of Japan's requests.
- Canada and the United Kingdom each issued 11 requests for information, the third most in its list. Twitter complied with 18% of the requests from both countries.
- Twitter lists 19 countries that made fewer than 10 requests, including Australia, Greece, Spain and Sweden.
- Twitter did not comply with any requests from 16 countries, including Turkey, Germany, Brazil and France.
Kessel noted that Twitter plans to release a Transparency Report twice a year.
Twitter's Transparency Report comes on the heels of the company losing a court battle in which it tried to challenge a subpoena ordering it to provide prosecutors with Twitter messages written by an Occupy Wall Street protestor.
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin, or subscribe to Sharon's RSS feed. Her e-mail address is email@example.com.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Devising a Server Protection Strategy with Trend Micro
With so many Information Technology solutions available to choose from today, many organizations put their trust in the experience, insight and advice of Gartner, and their industry-leading analysts. Trend Micro’s portfolio of solutions meets and exceeds Gartner’s recommendations on how to devise a server protection strategy. Precisely how Trend Micro does it is detailed in this whitepaper. Read now.
New Demands for Real-time Threat Management
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.
Batten Down the Hatches! A Guide to Protecting Data in Motion
The risks facing high-speed data networks and unencrypted data while in motion are very real and on the rise. As information becomes one of the most valuable ‘off balance sheet’ assets, protection of that information and the investment in it is a paramount obligation of office-holders and management. Read now for a better understanding of the risks to data in motion.