ICO reopens Google Street View case
Data protection watchdog is to resume its probe into the search giant's Street View operations.
The Information Commissioner's Office (ICO) is to reopen its investigation into Google Street View and the personal data it collected on unsecured wireless networks.
The search giant had agreed to delete all the information it gathered in November 2010, and told the privacy watchdog that the data was collected in error.
It seems likely that information was deliberately captured during the Google Street View operations.
However, the ICO has reopened the case following a report by the US Federal Communications Commission (FCC).
The FCC found that emails, passwords and other data had been amassed from millions of people using software written by an engineer.
The ICO confirmed to IT Pro last month that it was studying the FCC's report and considering what action, if any, it would take in light of its findings.
The FCC report said a wide range of personal data together was collected by the Street View team.
"It therefore seems likely that such information was deliberately captured during the Google Street View operations conducted in the UK," said Steve Eckersley, the ICO's head of enforcement.
"During the course of our investigation, we were specifically told by Google that it was a simple mistake, and if the data was collected deliberately, then it is clear that this is a different situation than was reported to us in April 2010."
As a result, confirmed Eckersley, the ICO has reopened its investigation and asked the firm for more information about the data it collected.
Google said it would co-operate with the ICO in a new investigation.
"We're happy to answer the ICO's questions. We have always said that the project leaders did not want and did not use this payload data. Indeed, they never even looked at it," a Google spokesperson said in a statement.
The complete guide to changing your phone system provider
Optimise your phone system for better business resultsDownload now
Simplify cluster security at scale
Centralised secrets management across hybrid, multi-cloud environmentsDownload now
The endpoint as a key element of your security infrastructure
Threats to endpoints in a world of remote workingDownload now
2021 state of IT asset management report
The role of IT asset management for maximising technology investmentsDownload now