{"id":1843,"date":"2013-05-16T10:00:25","date_gmt":"2013-05-16T14:00:25","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=1843"},"modified":"2020-02-26T18:56:57","modified_gmt":"2020-02-26T14:56:57","slug":"eff-report","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/eff-report\/1843\/","title":{"rendered":"EFF Report of Digital Privacy. Who&#8217;s Got Your Back?"},"content":{"rendered":"<p>When the U.S. Government comes poking around the world\u2019s major Internet companies asking for customer data, Verizon, AT&amp;T, Apple, and Yahoo are not particularly interested in protecting the general public, according to the 2013 edition of the Electronic Frontier Foundations\u2019 <a href=\"https:\/\/www.eff.org\/who-has-your-back-2013?support_whyb=1&amp;social=1#conclusion\" target=\"_blank\" rel=\"noopener nofollow\">\u201cWho Has Your Back?\u201d report<\/a>. On the other hand, Twitter and the Internet Service Provider Sonic.net received passing grades in all six of the EFF\u2019s criteria.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/05\/05113702\/eff_title.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1845 aligncenter\" alt=\"EFF\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/05\/05113702\/eff_title.png\" width=\"640\" height=\"420\"><\/a><\/p>\n<p>The report examines the ways that online service providers respond to government requests for user-information held by a handful of well-known, widely relied upon, and influential Internet companies. The EFF bases this report on six yes or no categories of corporate data protection policy: do the companies in question require a warrant for content of communications? Do they tell users about government data requests? Do they publish transparency reports? Do they publish law enforcement guidelines? Do they fight for users\u2019 privacy rights in courts? And finally, do they fight for users\u2019 privacy in congress?<\/p>\n<p>Only Sonic.net and <a href=\"https:\/\/me-en.kaspersky.com\/blog\/twitter-ap-hack\/\" target=\"_blank\" rel=\"noopener\">Twitter<\/a> received six stars, meaning they could honestly answer yes to all of these questions. Only Verizon received zero stars, meaning that their honest answer to all of these questions would have to be no, according to the EFF\u2019s findings. Google appears to be the only company that regressed this year. In last year\u2019s report, Google received a star for telling users about government requests for data. This year, Google introduced some ambiguous wording into their privacy policy by saying that they would notify users about government data requests \u201cwhen appropriate,\u201d and, consequently, the EFF did not give them a star in that category and <a href=\"https:\/\/me-en.kaspersky.com\/blog\/gmail-safe-for-work\/\" target=\"_blank\" rel=\"noopener\">the information in you Gmail inbox<\/a> could be handled somewhat less transparently than in recent years.<\/p>\n<div class=\"pullquote\">As noted by the EFF, these are not the only ways that companies can stand up for users\u2019 privacy, but they are significant benchmarks nonetheless and they are publically verifiable.<\/div>\n<p>As noted by the EFF, these are not the only ways that companies can stand up for users\u2019 privacy, but they are significant benchmarks nonetheless and they are publically verifiable. The companies included in the EFF\u2019s examination are, the Web-hosting and sales giant, Amazon; the world\u2019s most valuable tech company, <a href=\"me-en.kaspersky.com\/blog\/good-news-and-bad-news-as-apple-adds-two-factor-authentication\" target=\"_blank\" rel=\"noopener\">Apple<\/a>; the cellular service providers, AT&amp;T and Verizon; the Internet service providers, Comcast and Sonic.net; the online storage up-and-comers, Dropbox and Spideroak; the world\u2019s most populous social network, <a href=\"https:\/\/me-en.kaspersky.com\/blog\/delete-facebook-account\/\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>; the check-in-based social network, <a href=\"https:\/\/me-en.kaspersky.com\/blog\/risks-checking-in\/\" target=\"_blank\" rel=\"noopener\">Foursquare<\/a>; the search and everything-else-internet-and-computer-related giants, Google and Microsoft; the professional\u2019s social network, LinkedIn; the once-dominant social network, Myspace; the micro-blogging social sites, <a href=\"https:\/\/me-en.kaspersky.com\/blog\/twitter-ap-hack\/\" target=\"_blank\" rel=\"noopener\">Twitter<\/a> and Tumblr; the content management and blog-hosting provider, WordPress; and the recently-famous-for-not-letting-employees-telecommute, Yahoo. You can see how each of these companies fared in the image below:<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/05\/05113704\/EFF-who-has-your-back-png.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1844 aligncenter\" alt=\"EFF\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/05\/05113704\/EFF-who-has-your-back-png.png\" width=\"653\" height=\"873\"><\/a><\/p>\n<p>It used to be the case that if the U.S. Government wanted access to information about its citizens as part of an investigation, prosecutors or police would need to acquire warrants from Judges granting them permission to conduct searches of the houses or offices of persons of interest. In certain cases, judges would grant warrants giving investigators permission to conduct wiretaps along with help from the telephone companies or monitor mail with the United States Parcel Service.<\/p>\n<p>That was the twentieth century. Now we\u2019re thoroughly engaged in the information age, and as the name of this latest period of human existence suggests, information about our lives is more diffuse than ever. In addition to wiretaps, mail-monitoring, and home and office seizures, investigators also gather evidence from the services used by suspects online. Unlike phone-tapping, physical searching and seizures, and the monitoring of mail, all of which are clearly regulated under U.S. law, there is no clear precedent protecting user communications of information stored online against unreasonable search and seizure.<\/p>\n<div class=\"pullquote\">Strong consumer protections against and transparency in regards to government data requests are trending toward the industry standard, particularly when it comes to companies informing customers when the government comes knocking.<\/div>\n<p>The EFF is fighting to change this, but draconian laws like the patriot act, questionable interpretations of laws written when computers were the size of tennis courts, and other controversial surveillance initiatives like the National Security Administration\u2019s warrantless wiretapping program make it so that consumer data is more susceptible to government interception than ever. The good news, according to the report, is that strong consumer protections against and transparency in regards to government data requests are trending toward the industry standard, particularly when it comes to companies informing customers when the government comes knocking.<\/p>\n<p>There is an old saying that, \u201cIt\u2019s bad to be right when the government is wrong.\u201d So, as I have said before, <a href=\"https:\/\/me-en.kaspersky.com\/blog\/skype-government-surveillance\/\" target=\"_blank\" rel=\"noopener\">if you are communicating information that runs afoul of your government\u2019s laws or preference<\/a>, <a href=\"https:\/\/me-en.kaspersky.com\/blog\/what-is-tor\/\" target=\"_blank\" rel=\"noopener\">you\u2019ll need to be very careful<\/a>, and should probably avoid these companies\u2019 altogether.<\/p>\n<p>There is another saying that goes, \u201cIf you\u2019ve done nothing wrong then you have nothing to hide.\u201d That\u2019s nonsense. Just because you are not doing anything wrong doesn\u2019t mean you\u2019d be comfortable under the constant scrutiny of federal investigators.<\/p>\n<p>Pragmatically though, most of us don\u2019t have to worry about living under constant scrutiny or communicating information that puts our livelihood at risk. So what does this report mean to us relatively normal people? Well, our friends at the EFF are smart and judicious, and it does the Internet user in all of us well to listen when the EFF speaks. At the very least, we should read this report every year, and be aware of how the services we use protect our data. When possible, we should also give preference to companies that fight for our privacy rights in courts and congress, publishing guidelines for law enforcement and transparency reports. Beyond that, I think we should vote with our feet and be very reluctant to entrust our personal data to companies that don\u2019t require warrants and don\u2019t inform users about data requests.<\/p>\n<p>No matter what we do, we should take to our respective pulpits, whether they are our personal blogs, social media platforms, comment boxes, or good old fashioned letters to our elected officials, urging all companies to follow the leads of Twitter and Sonic.net and do everything in their power to protect consumer data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When the U.S. Government comes poking around the world\u2019s major Internet companies asking for customer data, Verizon, AT&amp;T, Apple, and Yahoo are not particularly interested in protecting the general public,<\/p>\n","protected":false},"author":42,"featured_media":1846,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[314,396,43],"class_list":{"0":"post-1843","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-data-breach","9":"tag-internet-providers","10":"tag-privacy"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/eff-report\/1843\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/eff-report\/1843\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/eff-report\/1843\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/eff-report\/1843\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/eff-report\/1843\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/eff-report\/848\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/eff-report\/1843\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/eff-report\/1843\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/data-breach\/","name":"data breach"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1843"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1843\/revisions"}],"predecessor-version":[{"id":15538,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1843\/revisions\/15538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/1846"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}