Groups raise questions about privacy on Skype
- 24 January, 2013 16:50
Skype owner Microsoft should release information about how much user data it gives to third parties, including government agencies, several organisations and individuals said in a letter to company officials.
The groups, including the Electronic Frontier Foundation, Reporters Without Borders and GreatFire.org, called on Microsoft and Skype to also release information about whether third parties can intercept Skype calls and to explain their position on complying with wiretap laws in the US. Forty-five groups and more than 60 people signed the letter to Microsoft officials.
With about 600 million users, Skype is effectively one of the largest telecommunications providers worldwide, the letter noted.
"Many of its users rely on Skype for secure communications - whether they are activists operating in countries governed by authoritarian regimes, journalists communicating with sensitive sources, or users who wish to talk privately in confidence with business associates, family, or friends," the letter said.
Skype is reviewing the letter, a spokesman said.
Skype users "work in the face of persistently unclear and confusing statements about the confidentiality of Skype conversations," including access by government agencies, the letter said.
The letter called on Microsoft and Skype to disclose what user information they collect and to disclose Skype's relationship with Chinese mobile provider TOM Online and other third-party licensees of Skype technology.
Other online companies, including Google and Twitter, release regular reports detailing request for user data by third parties, the letter noted.
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's e-mail address is firstname.lastname@example.org.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Tolly Report: Performance Survey of Virtual Environment Security
- Spear-Phishing Email: Most Favored APT Attack Bait
- The Challenges of Securing a Virtual IT Infrastructure
- A Clear Route to Data Protection - Your information: Clearly controlled
- IDC Technology Spotlight: Easing the Transition to a Virtual End Point Infrastructure
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Maximising productivity without sacrificing security
Advances in mobility and client computing technology combined with the ubiquity of the Internet and social media are creating a culture and desire for constant connectivity and anywhere access to information. As these trends extend from the home into the work place, IT managers should consider seriously the opportunities for increased productivity and communication with customers and constituents, as well as understand the increased security risks posed by online, anytime access to private networks and data. Read more.
BYOD and Beyond - Implementing a Unified Access Solution
The rise of BYOD programs is the single most radical shift in the economics of client computing for business since PCs invaded the workplace. Whether you are contemplating the creation of a BYOD program or currently trying to establish one, this fact cannot be overstated. Find out how to overcome these challenges.
Best Practice in BYOD
The key trend affecting enterprise mobility today can be summarized in four letters: BYOD – Bring Your Own Device. As the number of end-users bringing devices into your organization grows, so does the need for an effective Enterprise Mobility Management (EMM) solution. Learn how to manage devices across multiple platforms all from a single, centralised and unified management console. Download for more!