Open letter asks for Phorm boycott

The Open Rights Group has sent an open letter to several big web firms asking them to boycott the use of Phorm.

The Open Rights Group has urged seven of the UK's biggest web companies to opt out of Phorm.

The group have sent an open letter to the firms - Microsoft, Google/YouTube, Facebook, AOL/Bebo, Yahoo, Amazon and eBay asking them to block Phorm, which tracks the sites a user visits to profile what adverts to display.

Jim Killock, executive director of the Open Rights Group, said: "Websites need to act to protect their user's data, and preserve trust in our basic privacy online. Phorm acts to gather data without the consent of website owners, and provides only an opt out system for them. That means all kinds of web content could be read without the consent of both parties."

The letter highlights the recent parliamentary meeting where Sir Tim Berners-Lee, inventor of the world wide web, made a "firm stand against technologies which 'snoop' on the internet" as well as drawing attention to a recent petition against Phorm's deployment that has over 21,000 signatures.

It also laid out the group's view that Phorm is illegal. "Communications cannot be lawfully intercepted, as this system does, without the informed consent of both the sender and receiver. The system will make copies of copyright material without permission, a further unlawful activity. Also, by forging extra tracking' cookies in your name, it may well bring your own system into disrepute."

A Phorm spokesman said: "We are aware of the letter and note that the vast majority of recipients use or offer interest based advertising. Many of them have, like Phorm, demonstrated their commitment to user privacy as signatories to the IAB UK's interest based advertising good practice principles."

Killnock added: "We hope that major websites will send a strong signal that they wish to protect their user's rights, rather than allowing Phorm's snooping, which may be illegal."

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

Data breach exposes widespread fake reviews on Amazon
data breaches

Data breach exposes widespread fake reviews on Amazon

7 May 2021
TsuNAME vulnerability could enable DDoS attacks on major DNS servers
distributed denial of service (DDOS)

TsuNAME vulnerability could enable DDoS attacks on major DNS servers

7 May 2021
What are SSH keys?
cyber security

What are SSH keys?

7 May 2021
Google’s about to push everyone into two-factor authentication
Security

Google’s about to push everyone into two-factor authentication

6 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021