SlideShare a Scribd company logo
1 of 19
Meet Jane.
Google: A Policy Primer Case Study
By using Google, you agree to the Terms of Service (and any additional terms) provided by Google Inc. (Google Inc., 2014).
Furthermore, Google is not required to individually notify its users of any changes to their policies – users are expected to
regularly monitor the terms.
So lets have a look at the Privacy Policy and just how private Google is.
Meet Jane.
Jane Obscurus
Jane Obscurus is a 25 year-old female living in Incognitus, Australia.
She is a typical, run-of-the-mill, average Jane.
One of these days, Jane wants to be famous.
What Jane Gives Google.
What Jane Gave Google.
Jane Sets Up with Google
Jane needs a Google account to access some content, for example, 18+ on YouTube (Google Inc., 2014).
So she sets up an account and fills in her basic info:
o Name
o Date of birth
o Email address
o Telephone number
o Credit card
She also sets up a new email account with Gmail so everything can be in the same place.
Plus a Little Visual Data.
Photographs
Jane has uploaded a photograph to Google Drive. This photo is a little racy and has been uploaded purely for her own
posterity… and perhaps to email to her boyfriend.
Videos
Jane is tagged in a video on YouTube from the night she had a bit too much to drink. Jane also frequently watches YouTube
clips about cats... it is her secret pleasure to watch hours and hours of cats.
Fun Fact:
Google uses facial recognition technology to “compare known faces against a new face and see if there is a probable match
or similarity” (Google Inc., 2016b).
What Google Collects from Jane.
“Google keeps search requests? It does.
Curiosity is monitored, producing a
searchable database of the curious.”
Lessig, 2006, p. 204
What Google Collects.
Device Information
o Hardware model
o Operating system
o Unique device identifiers
o Mobile network information (phone number and carrier)
Log Information
o Search queries
o Telephone log information
o Phone number
o Type, time, date and duration of calls
o SMS routing information
o IP Address
o Cookies
o ‘Device event information’ so even turning her phone off is logged
Search History.
‘Google it':
Jane, like the rest of us, is inadvertently revealing personal, private, medical, professional and financial information each time
she ‘googles it’ (Barbaro & Zeller, 2006; Philipson, 2013).
Out of Context:
In the last week Jane has been busy, she:
o Googled ‘BDSM’ after reading a review of Fifty Shades of Grey
o Heard about syphilis on an episode of House and wanted to read up on it
o Purchased a cat costume for Halloween
As far as Google is concerned, Jane is a cat-costume-wearing, sadomasochist with a side of syphilis. As you can see, the
little bites of metadata, without the relevant context, can prove to be very misleading (Barbaro & Zeller, 2006).
Location, Location, Location.
Google Maps & GPS
Jane uses Google Maps to find her way to work from her new apartment – a cool feature lets Jane save these locations as
‘Jane Home’ and ‘Jane Work’.
IP Addresses, Android, and “Other Sensors”
When Jane uses Google services, they can glean location information using her IP address, GPS, nearby devices and cell
phone towers, and if she is lucky they can access her phones accelerometer to determine how fast she is going (Google Inc.,
2016a).
What Google Does with Jane’s
Information.
What Now.
Collecting Jane’s Data
Google uses Jane’s information to:
o Provide, maintain, protect, improve and develop services
o “…to protect Google and our users”
o Provide relevant search results and ads
To really deliver the above, Google even analyses Jane’s personal emails.
“Our automated systems analyse your content (including emails) …” (Google Inc., 2014)
Sharing Jane’s Data
Personal information is sent for external processing to “affiliates or other trusted business or persons” who are “in compliance
with our Privacy Policy” (Google Inc., 2016a).
Google can share personal information with other ‘companies, organisations or individuals’ if they believe that it is necessary
to (Google Inc., 2016a):
o Meet any law, regulation, or enforceable government request
o An investigation of a potential violation of the Terms of Service
o To stop fraud, security or technical issues
o Protect the rights, property or safety of Google or members of the public
Link ‘That’ to ‘This’
Consistent Representation
“In addition, we may replace past names associated with your Google Account so that you are represented consistently
across all our services” (Google Inc., 2016a).
So if Jane had previously changed her name, Google would still create a link between ‘that’ data and ‘this’ data.
Linking
“Google may associate your device identifiers or phone number with your Google Account” (Google Inc., 2016a). So without
even signing in, more pieces of data are being added to the pile with Jane’s name on it.
“We may combine personal information from one service with information, including personal information, from other Google
services…” (Google Inc., 2016a)
Meet Google’s Jane.
A Portrait of Jane.
What Google knows about Jane:
Google is sitting on a catalogue of dubious emails and questionable search queries that are linked to Jane’s name and IP
address in a database waiting to be discovered (Lessig, 2006).
o Full name
o Gender
o Birthday
o Address
o Credit card number
o What she looks like (facial recognition)
o Her interests
o Medical history
o What devices she uses (phone, tablet, laptop)
o What her favourite website is
o Search habits
Google also probably knows Jane’s:
o The name of her primary school
o Sexual orientation
o Political affiliation
o Bra size
o Her cat obsession
o Her sexual preferences
o Ex-boyfriends new fiancé's ring size
“…after you delete information from our services, we may
not immediately delete residual copies from our active
servers and may not remove information from our backup
systems.”
- Google Privacy Policy
Don’t Be Like Jane.
Minimizing Your Trail
Touted as a means to prevent organised crime and terrorism, Australia’s media retention scheme keeps a record of every
search query, each website visit, every phone call, text message, and email that Jane makes (Tucker, 2015). This information
waits patiently in a database until someone in the police force, customs, Border Protection Service, or other law-enforcement
agencies, decides to take a look (Tucker, 2015). Much of this data is collected by Google.
This data collection is supposedly for providing accurate advertising to potential consumers, but the future consequences of
each little piece of seemingly innocuous information that is stored, compiled and aggregated are yet to materialise (Barbaro &
Zeller, 2006)
To prevent your email address and search history from being linked…
o Log out of your email account after using it and clear your browser’s cookies before going to other websites
o Don’t use the same search engine website as your email address (e.g. Google search engine and a Gmail account)
o Use a different browser for accessing emails and for using a search engine
(Privacy Rights Clearing House, 2015)
References.
Barbaro, M., & Zeller, T. (2006, August 9). A Face Is Exposed for AOL Searcher No. 4417749. New York Times. http://w2.eff.org/Privacy/AOL/exhibit_d.pdf
Google Inc., (2014). Terms of Service. Google. Retrieved from: https://www.google.com.au/intl/en/policies/terms/regional.html
Google Inc., (2016a). Privacy Policy. Google. Retrieved from:
https://static.googleusercontent.com/media/www.google.com.au/en/au/intl/en/policies/privacy/google_privacy_policy_en.pdf
Google Inc., (2016b). Technologies: How Google Uses Pattern Recognition. Google. https://www.google.com.au/intl/en/policies/technologies/pattern-recognition/
Google Inc., (2016c). Transparency Report: Requests for User Information. Google. Retrieved from:
https://www.google.com/transparencyreport/userdatarequests/?hl=en
Lessig, L. (2006). Privacy. Code: And Other Laws of Cyberspace, Version 2.0. pp. 200-233. Basic Books.
Philipson, J. (February 1, 2013). How Google Became a Verb. The Lingua File: The Language Blog. http://www.thelinguafile.com/2013/02/how-google-became-
verb.html#.WBG34zJ7FE4
Privacy Rights Clearinghouse (2015). Privacy and the Internet: Travelling in Cyberspace Safely. Privacy Rights Clearinghouse. https://www.privacyrights.org/consumer-
guides/online-privacy-using-internet-safely
Shervell, J. (2015). How Much Does Google Really Know About You? Visua.ly. http://visual.ly/how-much-does-google-really-know-about-you
Tucker, H. (2015, October 8). New Data Retention Laws Begin Today, this is What You Need to Know. News.com.au. http://www.news.com.au/technology/online/new-
data-retention-laws-begin-today-this-is-what-you-need-to-know/news-story/28ea2dc1b01d15e53f474e21b6d68501

More Related Content

Viewers also liked

Search engine optimization dubai - sm es - gregory bolle
Search engine optimization   dubai - sm es - gregory bolleSearch engine optimization   dubai - sm es - gregory bolle
Search engine optimization dubai - sm es - gregory bolle
MajidHaider
 
Manual características básicas del servicio edición 8
Manual características básicas del servicio  edición 8 Manual características básicas del servicio  edición 8
Manual características básicas del servicio edición 8
AUTOCARES CARRIÓ SL
 
Campaña este libro es mío, tuyo, es de todos no los robes
Campaña este libro es mío, tuyo, es de todos no los robesCampaña este libro es mío, tuyo, es de todos no los robes
Campaña este libro es mío, tuyo, es de todos no los robes
Diana Karina Palomo
 

Viewers also liked (18)

IERC Salzburg MBA Polymers
IERC Salzburg MBA PolymersIERC Salzburg MBA Polymers
IERC Salzburg MBA Polymers
 
Supercharged Personal Branding
Supercharged Personal BrandingSupercharged Personal Branding
Supercharged Personal Branding
 
Financiación Pública Andalucía - INVERCARIA
Financiación Pública Andalucía - INVERCARIAFinanciación Pública Andalucía - INVERCARIA
Financiación Pública Andalucía - INVERCARIA
 
De Japón a Roma buscando el sol de la cristiandad
De Japón a Roma buscando el sol de la cristiandadDe Japón a Roma buscando el sol de la cristiandad
De Japón a Roma buscando el sol de la cristiandad
 
Ensayo isopyrazam y azoxystrobin.
Ensayo isopyrazam y azoxystrobin.Ensayo isopyrazam y azoxystrobin.
Ensayo isopyrazam y azoxystrobin.
 
Convocatorias 22 09
Convocatorias 22 09Convocatorias 22 09
Convocatorias 22 09
 
BLUE ACACIA
BLUE ACACIABLUE ACACIA
BLUE ACACIA
 
Search engine optimization dubai - sm es - gregory bolle
Search engine optimization   dubai - sm es - gregory bolleSearch engine optimization   dubai - sm es - gregory bolle
Search engine optimization dubai - sm es - gregory bolle
 
Manual características básicas del servicio edición 8
Manual características básicas del servicio  edición 8 Manual características básicas del servicio  edición 8
Manual características básicas del servicio edición 8
 
Cambio de paradigma en el sector turístico
Cambio de paradigma en el sector turísticoCambio de paradigma en el sector turístico
Cambio de paradigma en el sector turístico
 
Escuela de Lideres. Soldados de Jesucristo
Escuela de Lideres. Soldados de JesucristoEscuela de Lideres. Soldados de Jesucristo
Escuela de Lideres. Soldados de Jesucristo
 
Campaña este libro es mío, tuyo, es de todos no los robes
Campaña este libro es mío, tuyo, es de todos no los robesCampaña este libro es mío, tuyo, es de todos no los robes
Campaña este libro es mío, tuyo, es de todos no los robes
 
Orderbird
OrderbirdOrderbird
Orderbird
 
Vegetta777
Vegetta777Vegetta777
Vegetta777
 
Kushi kushilla abelino chávez dueñas
Kushi kushilla   abelino chávez dueñasKushi kushilla   abelino chávez dueñas
Kushi kushilla abelino chávez dueñas
 
DMAI Fundamentals - Chapter 7 - Technology
DMAI Fundamentals - Chapter 7 - TechnologyDMAI Fundamentals - Chapter 7 - Technology
DMAI Fundamentals - Chapter 7 - Technology
 
4 timmar framgang 20130521
4 timmar framgang 201305214 timmar framgang 20130521
4 timmar framgang 20130521
 
Estandares en sistemas de informacion en salud
Estandares en sistemas de informacion en saludEstandares en sistemas de informacion en salud
Estandares en sistemas de informacion en salud
 

Similar to Jane Obscurus

Policy Primer - Google's Privacy Policy
Policy Primer - Google's Privacy PolicyPolicy Primer - Google's Privacy Policy
Policy Primer - Google's Privacy Policy
Camille Davey
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
apazooki2
 
Net303 a.2 policy_primer_muirg
Net303 a.2 policy_primer_muirgNet303 a.2 policy_primer_muirg
Net303 a.2 policy_primer_muirg
Muir_Net303
 
Google Health - NYHIMA
Google Health - NYHIMAGoogle Health - NYHIMA
Google Health - NYHIMA
Raj Goel
 
Think Holiday Webinar 8.24.10
Think Holiday Webinar 8.24.10Think Holiday Webinar 8.24.10
Think Holiday Webinar 8.24.10
EDSONFBONFIM
 
Ethics and Management7Google” Ethics and ManagementIs.docx
Ethics and Management7Google” Ethics and ManagementIs.docxEthics and Management7Google” Ethics and ManagementIs.docx
Ethics and Management7Google” Ethics and ManagementIs.docx
gitagrimston
 

Similar to Jane Obscurus (20)

Online policy primer google - al black
Online policy primer   google - al blackOnline policy primer   google - al black
Online policy primer google - al black
 
Policy Primer - Google's Privacy Policy
Policy Primer - Google's Privacy PolicyPolicy Primer - Google's Privacy Policy
Policy Primer - Google's Privacy Policy
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
1 nameellington david assignmentcase 8 google an
1 nameellington david assignmentcase 8 google an1 nameellington david assignmentcase 8 google an
1 nameellington david assignmentcase 8 google an
 
Net303 a.2 policy_primer_muirg
Net303 a.2 policy_primer_muirgNet303 a.2 policy_primer_muirg
Net303 a.2 policy_primer_muirg
 
Google Terms of Service, Privacy, Surveillance and Censorship
Google Terms of Service, Privacy, Surveillance and CensorshipGoogle Terms of Service, Privacy, Surveillance and Censorship
Google Terms of Service, Privacy, Surveillance and Censorship
 
Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy Primer
 
Google search recommendation
Google search recommendationGoogle search recommendation
Google search recommendation
 
google_privacy_policy_en.pdf
google_privacy_policy_en.pdfgoogle_privacy_policy_en.pdf
google_privacy_policy_en.pdf
 
Google Policy Primer 2013
Google Policy Primer 2013Google Policy Primer 2013
Google Policy Primer 2013
 
Letter to Google CEO Larry Page from privacy advocates
Letter to Google CEO Larry Page from privacy advocatesLetter to Google CEO Larry Page from privacy advocates
Letter to Google CEO Larry Page from privacy advocates
 
Google maps the new stalker service
Google maps   the new stalker serviceGoogle maps   the new stalker service
Google maps the new stalker service
 
Why Google Scares People
Why Google Scares PeopleWhy Google Scares People
Why Google Scares People
 
Google Health - NYHIMA
Google Health - NYHIMAGoogle Health - NYHIMA
Google Health - NYHIMA
 
Web Meets World: Privacy and the Future of the Cloud
Web Meets World: Privacy and the Future of the CloudWeb Meets World: Privacy and the Future of the Cloud
Web Meets World: Privacy and the Future of the Cloud
 
Google Presentation for COM 495
Google Presentation for COM 495Google Presentation for COM 495
Google Presentation for COM 495
 
Think Holiday Webinar 8.24.10
Think Holiday Webinar 8.24.10Think Holiday Webinar 8.24.10
Think Holiday Webinar 8.24.10
 
Net303 Policy Primer Google Drive
Net303 Policy Primer Google DriveNet303 Policy Primer Google Drive
Net303 Policy Primer Google Drive
 
Voice Search Blue Paper
Voice Search Blue PaperVoice Search Blue Paper
Voice Search Blue Paper
 
Ethics and Management7Google” Ethics and ManagementIs.docx
Ethics and Management7Google” Ethics and ManagementIs.docxEthics and Management7Google” Ethics and ManagementIs.docx
Ethics and Management7Google” Ethics and ManagementIs.docx
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Jane Obscurus

  • 2. Google: A Policy Primer Case Study By using Google, you agree to the Terms of Service (and any additional terms) provided by Google Inc. (Google Inc., 2014). Furthermore, Google is not required to individually notify its users of any changes to their policies – users are expected to regularly monitor the terms. So lets have a look at the Privacy Policy and just how private Google is.
  • 3. Meet Jane. Jane Obscurus Jane Obscurus is a 25 year-old female living in Incognitus, Australia. She is a typical, run-of-the-mill, average Jane. One of these days, Jane wants to be famous.
  • 4. What Jane Gives Google.
  • 5. What Jane Gave Google. Jane Sets Up with Google Jane needs a Google account to access some content, for example, 18+ on YouTube (Google Inc., 2014). So she sets up an account and fills in her basic info: o Name o Date of birth o Email address o Telephone number o Credit card She also sets up a new email account with Gmail so everything can be in the same place.
  • 6. Plus a Little Visual Data. Photographs Jane has uploaded a photograph to Google Drive. This photo is a little racy and has been uploaded purely for her own posterity… and perhaps to email to her boyfriend. Videos Jane is tagged in a video on YouTube from the night she had a bit too much to drink. Jane also frequently watches YouTube clips about cats... it is her secret pleasure to watch hours and hours of cats. Fun Fact: Google uses facial recognition technology to “compare known faces against a new face and see if there is a probable match or similarity” (Google Inc., 2016b).
  • 7. What Google Collects from Jane.
  • 8. “Google keeps search requests? It does. Curiosity is monitored, producing a searchable database of the curious.” Lessig, 2006, p. 204
  • 9. What Google Collects. Device Information o Hardware model o Operating system o Unique device identifiers o Mobile network information (phone number and carrier) Log Information o Search queries o Telephone log information o Phone number o Type, time, date and duration of calls o SMS routing information o IP Address o Cookies o ‘Device event information’ so even turning her phone off is logged
  • 10. Search History. ‘Google it': Jane, like the rest of us, is inadvertently revealing personal, private, medical, professional and financial information each time she ‘googles it’ (Barbaro & Zeller, 2006; Philipson, 2013). Out of Context: In the last week Jane has been busy, she: o Googled ‘BDSM’ after reading a review of Fifty Shades of Grey o Heard about syphilis on an episode of House and wanted to read up on it o Purchased a cat costume for Halloween As far as Google is concerned, Jane is a cat-costume-wearing, sadomasochist with a side of syphilis. As you can see, the little bites of metadata, without the relevant context, can prove to be very misleading (Barbaro & Zeller, 2006).
  • 11. Location, Location, Location. Google Maps & GPS Jane uses Google Maps to find her way to work from her new apartment – a cool feature lets Jane save these locations as ‘Jane Home’ and ‘Jane Work’. IP Addresses, Android, and “Other Sensors” When Jane uses Google services, they can glean location information using her IP address, GPS, nearby devices and cell phone towers, and if she is lucky they can access her phones accelerometer to determine how fast she is going (Google Inc., 2016a).
  • 12. What Google Does with Jane’s Information.
  • 13. What Now. Collecting Jane’s Data Google uses Jane’s information to: o Provide, maintain, protect, improve and develop services o “…to protect Google and our users” o Provide relevant search results and ads To really deliver the above, Google even analyses Jane’s personal emails. “Our automated systems analyse your content (including emails) …” (Google Inc., 2014) Sharing Jane’s Data Personal information is sent for external processing to “affiliates or other trusted business or persons” who are “in compliance with our Privacy Policy” (Google Inc., 2016a). Google can share personal information with other ‘companies, organisations or individuals’ if they believe that it is necessary to (Google Inc., 2016a): o Meet any law, regulation, or enforceable government request o An investigation of a potential violation of the Terms of Service o To stop fraud, security or technical issues o Protect the rights, property or safety of Google or members of the public
  • 14. Link ‘That’ to ‘This’ Consistent Representation “In addition, we may replace past names associated with your Google Account so that you are represented consistently across all our services” (Google Inc., 2016a). So if Jane had previously changed her name, Google would still create a link between ‘that’ data and ‘this’ data. Linking “Google may associate your device identifiers or phone number with your Google Account” (Google Inc., 2016a). So without even signing in, more pieces of data are being added to the pile with Jane’s name on it. “We may combine personal information from one service with information, including personal information, from other Google services…” (Google Inc., 2016a)
  • 16. A Portrait of Jane. What Google knows about Jane: Google is sitting on a catalogue of dubious emails and questionable search queries that are linked to Jane’s name and IP address in a database waiting to be discovered (Lessig, 2006). o Full name o Gender o Birthday o Address o Credit card number o What she looks like (facial recognition) o Her interests o Medical history o What devices she uses (phone, tablet, laptop) o What her favourite website is o Search habits Google also probably knows Jane’s: o The name of her primary school o Sexual orientation o Political affiliation o Bra size o Her cat obsession o Her sexual preferences o Ex-boyfriends new fiancé's ring size
  • 17. “…after you delete information from our services, we may not immediately delete residual copies from our active servers and may not remove information from our backup systems.” - Google Privacy Policy
  • 18. Don’t Be Like Jane. Minimizing Your Trail Touted as a means to prevent organised crime and terrorism, Australia’s media retention scheme keeps a record of every search query, each website visit, every phone call, text message, and email that Jane makes (Tucker, 2015). This information waits patiently in a database until someone in the police force, customs, Border Protection Service, or other law-enforcement agencies, decides to take a look (Tucker, 2015). Much of this data is collected by Google. This data collection is supposedly for providing accurate advertising to potential consumers, but the future consequences of each little piece of seemingly innocuous information that is stored, compiled and aggregated are yet to materialise (Barbaro & Zeller, 2006) To prevent your email address and search history from being linked… o Log out of your email account after using it and clear your browser’s cookies before going to other websites o Don’t use the same search engine website as your email address (e.g. Google search engine and a Gmail account) o Use a different browser for accessing emails and for using a search engine (Privacy Rights Clearing House, 2015)
  • 19. References. Barbaro, M., & Zeller, T. (2006, August 9). A Face Is Exposed for AOL Searcher No. 4417749. New York Times. http://w2.eff.org/Privacy/AOL/exhibit_d.pdf Google Inc., (2014). Terms of Service. Google. Retrieved from: https://www.google.com.au/intl/en/policies/terms/regional.html Google Inc., (2016a). Privacy Policy. Google. Retrieved from: https://static.googleusercontent.com/media/www.google.com.au/en/au/intl/en/policies/privacy/google_privacy_policy_en.pdf Google Inc., (2016b). Technologies: How Google Uses Pattern Recognition. Google. https://www.google.com.au/intl/en/policies/technologies/pattern-recognition/ Google Inc., (2016c). Transparency Report: Requests for User Information. Google. Retrieved from: https://www.google.com/transparencyreport/userdatarequests/?hl=en Lessig, L. (2006). Privacy. Code: And Other Laws of Cyberspace, Version 2.0. pp. 200-233. Basic Books. Philipson, J. (February 1, 2013). How Google Became a Verb. The Lingua File: The Language Blog. http://www.thelinguafile.com/2013/02/how-google-became- verb.html#.WBG34zJ7FE4 Privacy Rights Clearinghouse (2015). Privacy and the Internet: Travelling in Cyberspace Safely. Privacy Rights Clearinghouse. https://www.privacyrights.org/consumer- guides/online-privacy-using-internet-safely Shervell, J. (2015). How Much Does Google Really Know About You? Visua.ly. http://visual.ly/how-much-does-google-really-know-about-you Tucker, H. (2015, October 8). New Data Retention Laws Begin Today, this is What You Need to Know. News.com.au. http://www.news.com.au/technology/online/new- data-retention-laws-begin-today-this-is-what-you-need-to-know/news-story/28ea2dc1b01d15e53f474e21b6d68501