Audacity privacy update sparks 'spyware' criticism
Users’ personal data will be shared with its parent company’s main office in Russia
The update, which was announced on 2 July, states that Audacity may collect "data necessary for law enforcement, litigation and authorities’ requests (if any)".
Although data is stored on “servers in the European Economic Area (EEA)” and is protected by GDPR, the new update states that users’ personal data will be shared with its parent company Muse Group’s main office in Russia as well as its “external counsel in the USA”.
Users of Audacity took to Twitter to express their outrage, with one asking: “Wait what? Why is the most robust and widely used free audio recording software collecting personal data and sending it to [expletive] Russia? What the hell is going on?”.
Others have branded the software as “spyware”, with calls to delete the app or disconnect it from accessing the internet.
However, according to DPO and infosec lawyer Whitney Merrill, “nothing about this is unusual”.
“Updates - responding to [law enforcement] requests [and] sale of company language - here are misunderstood. But it’s a good example of why you need to thoughtfully explain data processing in policies: people will assume the worst,” she said, adding that most other privacy policies use “the same language”.
Owning your own access security
The key to building strong cloud security and avoiding the risk of vendor lock-inDownload now
Merrill also addressed another point of concern in Audacity’s new privacy update, which states that the app is “not intended for individuals below the age of 13”.
“This is because of COPPA (Children’s Online Privacy Protection Act),” she said on Twitter, referring to United States federal law which aims to protect children’s data by requiring companies to label their websites as 13+ to start collecting minors' personal information.
“You have to include this to make clear you don’t intend to collect data from children subjecting you to COPPA,” added Merrill.
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download