Google faces US privacy suit over user data policy

A California court has allowed a privacy class action suit against Google to continue, though only in part.

After evaluating each claim of each sub-class in the suit, Magistrate Judge Paul S. Grewal has allowed two claims of the "Android Application Disclosure Subclass," which includes all persons and entities in the U.S. that acquired an Android-powered device between Aug. 19, 2004 and the present, and downloaded at least one Android application through the Android Market or Google Play.

On March 1, 2012, Google introduced a single, unified policy that allows the company to comingle user data across accounts and disclose it to third parties for advertising purposes.

This move triggered the class action lawsuit in March, 2012 in the U.S. District Court for the Northern District of California, San Jose division, which argued that by switching to the less-restrictive privacy policy without user consent, Google violated both its prior policies and consumers' privacy rights, according to court records.

The Android Application Disclosure Subclass claimed Google's disclosures to third parties caused increased battery and bandwidth consumption as well as invasions of their statutory and common law privacy rights.

The suit was filed over two years ago and since then the court twice dismissed the plaintiffs' claims. Google moved for a third dismissal.

The claims allowed by the judge includes a breach of contract claim that Google breached terms of the contract by disclosing user data to third parties following every download or purchase of an app, resulting in damages in the form of resource consumption. The second claim is under California's Unfair Competition Law.

Claims by persons and entities in the U.S. that acquired an Android-powered device between May 1, 2010 and Feb. 29, 2012 and switched to a non-Android device on or after March 1, 2012 were dismissed.

http://www.computerworld.com/s/article/9249913/Google_to_face_US_privacy_suit

« Mass Surveillance: The Internet’s best engineers are fighting back
Cyber Security Insurance Underwriters Demand their Clients Understand the Threat Landscape »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CERT-MU

CERT-MU

CERT-MU is the Mauritian National Computer Security Incident Response Team.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

National Cyber Security Centre (NCSC) - Ireland

National Cyber Security Centre (NCSC) - Ireland

The National Cyber Security Centre (NCSC) is the operational side of the Department of Communications in regard to network and information security in the Republic of Ireland.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Symantec

Symantec

Symantec delivers data-centric hybrid security for the largest, most complex organizations in the world – on devices, in private data centers, and in the cloud.

KDM Analytics

KDM Analytics

KDM Analytics software products automate the NIST risk management framework (RMF) assessment for operational technology (OT) systems.

European Cyber Competence Network

European Cyber Competence Network

The purpose of the European Cyber Competence Network is to retain and develop the cybersecurity technological and industrial capacities of the EU necessary to secure its Digital Single Market.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

Charles IT

Charles IT

Charles IT is your friendly, no-nonsense IT team focused on helping companies make their technology work for them. We focus on building relationships that deliver results.

ArmorCode

ArmorCode

ArmorCode's intelligent application security platform gives us unified visibility into AppSec postures and automates complex DevSecOps workflows.

Accedian

Accedian

Accedian is a leader in performance analytics and end user experience solutions, dedicated to providing our customers with the ability to assure their digital infrastructure.

Toka Group

Toka Group

Toka empowers government agencies with critical and previously out-of-reach digital forensics, force protection and Intelligence capabilities, tackling the fields' most pressing challenges.

Trenton Systems

Trenton Systems

Trenton Systems are committed to providing high-performance computing solutions to customers running mission-critical applications in harsh settings worldwide and across various industries.

ZX Security

ZX Security

ZX Security is a New Zealand owned and operated cyber security consultancy.

NetHope

NetHope

NetHope is a membership-based organization serving the international nonprofit humanitarian, development, and conservation sector through digital transformation.