ICO reopens Google Street View case

Data protection watchdog is to resume its probe into the search giant's Street View operations.

Google Street View man

The Information Commissioner's Office (ICO) is to reopen its investigation into Google Street View and the personal data it collected on unsecured wireless networks.

The search giant had agreed to delete all the information it gathered in November 2010, and told the privacy watchdog that the data was collected in error.

It seems likely that information was deliberately captured during the Google Street View operations.

However, the ICO has reopened the case following a report by the US Federal Communications Commission (FCC).

The FCC found that emails, passwords and other data had been amassed from millions of people using software written by an engineer.

The ICO confirmed to IT Pro last month that it was studying the FCC's report and considering what action, if any, it would take in light of its findings.

The FCC report said a wide range of personal data together was collected by the Street View team.

"It therefore seems likely that such information was deliberately captured during the Google Street View operations conducted in the UK," said Steve Eckersley, the ICO's head of enforcement.

"During the course of our investigation, we were specifically told by Google that it was a simple mistake, and if the data was collected deliberately, then it is clear that this is a different situation than was reported to us in April 2010."

As a result, confirmed Eckersley, the ICO has reopened its investigation and asked the firm for more information about the data it collected.

Google said it would co-operate with the ICO in a new investigation.

"We're happy to answer the ICO's questions. We have always said that the project leaders did not want and did not use this payload data. Indeed, they never even looked at it," a Google spokesperson said in a statement.

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Recommended

Ryuk behind a third of all ransomware attacks in 2020
Security

Ryuk behind a third of all ransomware attacks in 2020

29 Oct 2020
REvil hacking group says it has made more than $100m in a year
Security

REvil hacking group says it has made more than $100m in a year

29 Oct 2020
36 billion personal records exposed by hacks in 2020 so far
Security

36 billion personal records exposed by hacks in 2020 so far

29 Oct 2020
Trump website defaced in second successive cyber breach
Security

Trump website defaced in second successive cyber breach

28 Oct 2020

Most Popular

Do smart devices make us less intelligent?
artificial intelligence (AI)

Do smart devices make us less intelligent?

19 Oct 2020
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020
What is Neuralink?
Technology

What is Neuralink?

24 Oct 2020