Telstra's take two on Web tracking is opt-in
- 05 November, 2012 15:01
Telstra has revived its controversial “Smart Controls,” turning the filtering tool into a purely opt-in program. The product will become available in late November.
In June, Telstra revealed it was tracking websites visited by Next G customers and sending the information to a US-based company called Netsweeper. The data was to be used for Smart Controls. Telstra stopped the collection after Next G customers raised privacy concerns.
“We got the design of this component wrong and in the process we disappointed our customers,” Telstra core mobile services director Nick Ruddock wrote today on the Telstra blog.
Telstra has pitched Smart Controls as a cyber safety tool for families. Parents can block unwanted calls or callers, set up a safe list of numbers and websites, place daily time limits on Web browsing and phone calls and prohibit access to certain types of Web content such as adult and gambling websites.
“Many customers have told us that, in principle, they thought the product was a good idea,” Ruddock wrote on the Telstra blog. “Parental control software is broadly available for fixed internet services but Australian parents have few options for protecting their kids when they’re on smartphones.
“However, many other customers told us that they did not want the network practices used to categorise websites for such a product applied to their mobile service if they had not opted in to the Smart Controls service.”
Under the redesigned Smart Controls, Telstra only looks at websites visited by customers who opt-in, he said.
This time around, Telstra has opted to ask for customer feedback.
“We are speaking to customers, government, consumer groups and child protection organisations to ensure we transparently explain our plans and how the revised product operates—this blog is part of this process,” Ruddock wrote.
Follow Adam Bender on Twitter: @WatchAdam
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Building a Better Mousetrap in Anti-Malware
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.
A Holistic Approach to your BYOD Challenge
More and more enterprises are seeing significant benefits from allowing employees to choose the device they use to get their jobs done, and are adopting bring your own device (BYOD) initiatives. While the BYOD trend increases flexibility and productivity, it introduces a host of new challenges for your IT administrators. Click for more!
Managing the Rapid Rise in Database Growth: 2011 IOUG Survey on Database Manageability
As the era of “Big Data” marches on unabated, data is coming from an ever wider range of sources, including transactional systems, mobile devices, sensors, streaming media, and social networks. Businesses are looking for innovative ways to better leverage terabytes—and for some, petabytes—of information. Read more.