Google faces US privacy suit over user data policy

A California court has allowed a privacy class action suit against Google to continue, though only in part.

After evaluating each claim of each sub-class in the suit, Magistrate Judge Paul S. Grewal has allowed two claims of the "Android Application Disclosure Subclass," which includes all persons and entities in the U.S. that acquired an Android-powered device between Aug. 19, 2004 and the present, and downloaded at least one Android application through the Android Market or Google Play.

On March 1, 2012, Google introduced a single, unified policy that allows the company to comingle user data across accounts and disclose it to third parties for advertising purposes.

This move triggered the class action lawsuit in March, 2012 in the U.S. District Court for the Northern District of California, San Jose division, which argued that by switching to the less-restrictive privacy policy without user consent, Google violated both its prior policies and consumers' privacy rights, according to court records.

The Android Application Disclosure Subclass claimed Google's disclosures to third parties caused increased battery and bandwidth consumption as well as invasions of their statutory and common law privacy rights.

The suit was filed over two years ago and since then the court twice dismissed the plaintiffs' claims. Google moved for a third dismissal.

The claims allowed by the judge includes a breach of contract claim that Google breached terms of the contract by disclosing user data to third parties following every download or purchase of an app, resulting in damages in the form of resource consumption. The second claim is under California's Unfair Competition Law.

Claims by persons and entities in the U.S. that acquired an Android-powered device between May 1, 2010 and Feb. 29, 2012 and switched to a non-Android device on or after March 1, 2012 were dismissed.

http://www.computerworld.com/s/article/9249913/Google_to_face_US_privacy_suit

« Mass Surveillance: The Internet’s best engineers are fighting back
Cyber Security Insurance Underwriters Demand their Clients Understand the Threat Landscape »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

Spiceworks

Spiceworks

Spiceworks provide a range of free apps for IT professionals including network inventory, network monitor, and help desk.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

Conceptivity +360 Cybersecurity

Conceptivity +360 Cybersecurity

Conceptivity +360 Security addresses advanced cybersecurity and supply chain security issues in policy, regulatory, legislation, standardisation, compliance and project management areas.

Cervello

Cervello

Cervello is a leading provider of comprehensive and proven solutions to protect railways against cyber attacks.

Indeed

Indeed

Indeed is a worldwide employment-related search engine for job listings covering job types in all industries, including cybersecurity.

Pristine InfoSolutions

Pristine InfoSolutions

Pristine InfoSolutions is a global IT services and Information Security Company focused on delivering smart, next-generation business solutions.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

Aptum

Aptum

Aptum is a global hybrid multi-cloud managed service provider delivering complex and high-performance cloud solutions with an integrated secure network.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions and cyber defense consultancy service.

LaScala

LaScala

LaScala is an IT Managed Services provider delivering technical, security, and compliance solutions with dedication, compassion, and agility.

Liquis Inc.

Liquis Inc.

Liquis, founded in 2002, is one of the largest facility decommissioning services companies in the U.S.

Ventum Consulting

Ventum Consulting

Ventum Consulting stands for digitalization, networking and agilization. We take this up on the strategic, professional and technical side and support our customers in the digital transformation.

GlassHouse Technology

GlassHouse Technology

GlassHouse supports customers in their digitalization journey with our deep technical expertise in Managed Cloud and Security Services, SAP Infrastructure Service and Business Continuity Services.

Redport Information Assurance

Redport Information Assurance

Redport Information Assurance is an information assurance and cyber security solutions provider offering integrated business solutions for all levels of government.

ZIUR Industrial Cybersecurity Center

ZIUR Industrial Cybersecurity Center

ZIUR is a public initiative to help industrial companies reinforce their protection and that of their products or services against cyberattacks.